Usage of Adversarial Examples as a Defensive Mechanism in Cybersecurity
dc.contributor.advisor | Yu, Ning | |
dc.contributor.author | Thurnau, Carl Jake | |
dc.date.accessioned | 2021-09-08T14:17:06Z | |
dc.date.available | 2021-09-08T14:17:06Z | |
dc.date.issued | 2020-09-16 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12648/6871 | |
dc.description.abstract | The focus of this research article is on defenses to a theoretical threat model of malware. The malware, or GUI-Attack, aims to search the victim computer’s desktop and use image recognition to find the icons for highly used web browsers such as Google Chrome, Internet Explorer, Mozilla Firefox, and Opera, and gain access to secure data and information. We propose that adversarial examples can be used as a defensive mechanism to protect secure information from these GUI-Attacks. We hope to prove that these adversarial examples can be used to prevent malicious AI from being able to recognize the icons for popular web browsers, making an effective defensive mechanism against AI-powered GUI-Attacks. | |
dc.subject | Malware | |
dc.subject | GUI-Attack | |
dc.subject | Web Browsers | |
dc.subject | Secure Data | |
dc.subject | Adversarial | |
dc.title | Usage of Adversarial Examples as a Defensive Mechanism in Cybersecurity | |
dc.type | thesis | |
refterms.dateFOA | 2021-09-08T14:17:06Z | |
dc.description.institution | SUNY Brockport | |
dc.description.department | Computing Sciences | |
dc.source.status | published | |
dc.description.publicationtitle | Senior Honors Theses | |
dc.contributor.organization | State University of New York College at Brockport | |
dc.languate.iso | en_US |