<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cyber on Hyperbolicity</title>
    <link>https://www.hyperbolicity.com/tags/cyber/</link>
    <description>Recent content in Cyber on Hyperbolicity</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-US</language>
    <copyright>CC-BY-SA-NC</copyright>
    <lastBuildDate>Sun, 15 Apr 2018 01:01:00 -0500</lastBuildDate>
    
	<atom:link href="https://www.hyperbolicity.com/tags/cyber/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>The instruction set of the x86 is too complicated</title>
      <link>https://www.hyperbolicity.com/journal/x86instructions/</link>
      <pubDate>Sun, 15 Apr 2018 01:01:00 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/x86instructions/</guid>
      <description>When reading the report of an exploit by a security firm, one invariably finds x86 assembly code. I would stumble on
xbegin mayEnd cmp mutex, 0 jz weAreDone xabort $0xff  and not be sure what it did. Long ago I had programmed other chips in assembly, so I felt a day or two would give me some idea of the assembly language for the Intel chips.</description>
    </item>
    
    <item>
      <title>It takes days to find it</title>
      <link>https://www.hyperbolicity.com/journal/days-not-minutes/</link>
      <pubDate>Mon, 04 Dec 2017 23:37:39 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/days-not-minutes/</guid>
      <description>To find something anomalous one needs to be able to describe what is common. At PermissionBit we do that by recording every interaction between the CPU and the hardware (every system call). That gives us enough data to identify hacking, malware, and misuse.</description>
    </item>
    
    <item>
      <title>What is your computer doing?</title>
      <link>https://www.hyperbolicity.com/journal/activities/</link>
      <pubDate>Tue, 14 Nov 2017 19:13:42 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/activities/</guid>
      <description>Over four years ago one of our clients from IPS came to us with a cyber security problem. We were asked to take their task not as a symptom to alleviate, but as a reflection of a deeper problem to solve.</description>
    </item>
    
    <item>
      <title>High accuracy AI for malware classification</title>
      <link>https://www.hyperbolicity.com/journal/tera-paper/</link>
      <pubDate>Mon, 06 Nov 2017 09:38:00 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/tera-paper/</guid>
      <description>On Tuesday the paper Computer activity learning from system call time series that Curt and I wrote was posted to the Arxiv. It explains how we used machine learning to create a minute-by-minute description of what is happening on a computer.</description>
    </item>
    
    <item>
      <title>General malware detectors are impossible</title>
      <link>https://www.hyperbolicity.com/journal/malware-detector-impossible/</link>
      <pubDate>Mon, 23 May 2016 17:44:27 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/malware-detector-impossible/</guid>
      <description>It is impossible to write a general purpose malware detector. Not hard, not difficult, impossible. The argument for the impossibility relies on building an odd program. We may not write such a program in practice, but it does arise as a combination of things we do write &amp;mdash; things like Perl-like regular expressions and input parsers &amp;mdash; and carefully crafted inputs.</description>
    </item>
    
    <item>
      <title>Given a wall, who wins?</title>
      <link>https://www.hyperbolicity.com/journal/given-a-wall/</link>
      <pubDate>Wed, 06 Apr 2016 15:38:00 -0500</pubDate>
      
      <guid>https://www.hyperbolicity.com/journal/given-a-wall/</guid>
      <description>Walls guard. Walls constrain. They defy us to break them. And so it has been since the dawn of agriculture. We see defensive walls protecting ancient cities from China through sub-Saharan Africa. Their widespread prevalence is a testment of their desirability.</description>
    </item>
    
  </channel>
</rss>