AI For Security and Security For AI: Elisa Bertino Murat Kantarcioglu Cuneyt Gurcan Akcora
AI For Security and Security For AI: Elisa Bertino Murat Kantarcioglu Cuneyt Gurcan Akcora
333
Panel CODASPY '21, April 26–28, 2021, Virtual Event, USA
models, and show that such tailored tools could be more resistant and Blockchain networks. He has worked at and collaborated with
to adversarial behavior compared to existing SVM alternatives. Qatar Computing Research Institute, Yahoo Research Barcelona,
Murat Kantarcioglu is a Professor in the Computer Science and Huawei Research in Istanbul. He is a Fulbright Scholarship
Department and Director of the Data Security and Privacy Lab recipient, and his research works have been published in leading
at The University of Texas at Dallas (UTD). He received a PhD conferences and journals such as IEEEtran, VLDB, ICDM, SDM,
in Computer Science from Purdue University in 2005 where he IJCAI, and ICDE.
received the Purdue CERIAS Diamond Award for Academic excel- Statement of Sagar Samtani
lence. He is also a visiting scholar at Harvard Data Privacy Lab. Dr. Modern society’s irreversible dependence on information tech-
Kantarcioglu’s research focuses on the integration of cyber secu- nology has placed a significant impetus on cybersecurity analysts to
rity, machine learning, data science and blockchains for creating enhance the confidentiality, integrity, and availability of their ever-
technologies that can efficiently and securely store, analyze and increasing asset-bases from a rapidly evolving threat landscape. In
share data and machine learning results. His research has been particular, methodologies such as deep learning, machine learning,
supported by grants including from NSF, AFOSR, ARO, ONR, NSA, network science, text analytics, and others can help human analysts
and NIH. He has published over 170 peer reviewed papers in top sift through large quantities of heterogeneous cybersecurity data
tier venues such as ACM KDD, SIGMOD, ICDM, ICDE, PVLDB, with unprecedented efficiency and effectiveness to detect patterns
NDSS, USENIX Security and several IEEE/ACM Transactions as missed by conventional approaches. To date, AI for cybersecurity
well as served as program co-chair for conferences such as IEEE has been leveraged in four major cybersecurity applications areas:
ICDE, ACM SACMAT, IEEE Cloud, ACM CODASPY. He is the re- (1) cyber threat intelligence (CTI) to create, manage, and leverage
cipient of various awards including NSF CAREER award, the AMIA information about emerging threats and key threat actors to enable
(American Medical Informatics Association) 2014 Homer R Warner effective cybersecurity decision making, (2) security operations cen-
Award and the IEEE ISI (Intelligence and Security Informatics) 2017 ters (SOCs) to assist human analysts in tactical tasks such as alert
Technical Achievement Award presented jointly by IEEE SMC and management, vulnerability management, security orchestration,
IEEE ITS societies for his research in data security and privacy. and others, (3) disinformation and computational propaganda to
Statement of Cuneyt Gurcan Akcora identify how fake content can sway public actions and perceptions,
Recent years have seen increased user participation in digital and (4) adversarial machine learning (AML) that relies on tech-
technologies. In the past, social networks had been the primary niques such as generative adversarial networks (GANs) to generate
venue for a user to reach a global audience. Nowadays a user has fake or synthesized content to enhance offensive and defensive
many devices that collect data and share on the web. From self- cybersecurity postures. Despite significant advancements in these
driving cars to mobile and smart home devices, users connect to a areas from both industry and academia alike, key challenges remain
wider audience through popular applications. This increased con- that require significant attention. First, many practitioners and aca-
nection has not always been a boon. Data collected from other demics often work in siloes. Second, there is currently a dearth of
users without proper auditing is used to train ML models and make publicly accessible datasets that accurately depict the nuances and
decisions with them. Companies seem to be most interested in in- complexities of production environments. Third, many AI-based
creasing their revenues by using the data - any data. Suddenly, we models deployed in cybersecurity contexts often lack interpretabil-
have found ourselves governed by decisions that are conditioned on ity. Finally, many students and faculty may lack the resources to
other people’s preferences and actions. Well-documented cases of start and/or execute their AI for cybersecurity research.
bias and racism seeping into machine learning models have caused Sagar Samtani is an Assistant Professor and Grant Thornton
outrage. With these harmful effects, it is imperative to learn how Scholar in the Department of Operations and Decision Technolo-
Machine Learning models use data to make decisions that affect gies at the Kelley School of Business at Indiana University (IU).
users’ lives. Governments have joined efforts as well and passed He is also a Fellow within the Center for Applied Cybersecurity
legislation that forces companies to explain their ML models’ deci- Research at IU. Samtani graduated with his Ph.D. in May 2018 from
sions. AI and ML researchers have responded to this growing issue the Artificial Intelligence Lab in University of Arizona’s Manage-
with novel directions called Interpretable (IAI) and Explainable ment Information Systems (MIS) department at the University of
(XAI) AI. Interpretability attempts to explain the cause and effect Arizona. From 2014 – 2017, Samtani served as a National Science
observed within a system, whereas Explainability deconstructs a Foundation (NSF) Scholarship-for-Service (SFS) Fellow. Samtani’s
machine learning system to explain it in human terms. Both areas research centers around Explainable Artificial Intelligence for Cy-
are developing tools that wrap around existing ML models and ex- bersecurity and cyber threat intelligence. Samtani has published
plain algorithm decisions and predictions. ML research must note over three dozen journal and conference papers on these topics
the growing fields of IAI and XAI, and attempt to explain their ML in leading venues such as MIS Quarterly, Journal of Management
models before model deployment. The benefits can be far-reaching Information Systems, ACM Transactions on Privacy and Security,
as we believe that this practice will speed up ML adoption in society. IEEE Intelligent Systems, Computers and Security, IEEE S&P, IEEE
Cuneyt Gurcan Akcora is an Assistant Professor of Computer ICDM, and others. His research has received nearly $1.8M (in PI
Science and Statistics at the University of Manitoba, Canada. He and Co-PI roles) from the NSF CICI, CRII, and SaTC-EDU programs.
received his Ph.D. from the University of Insubria, Italy. His primary Samtani has won several awards for his research, including the
research interests are Data Science on complex networks and large- ACM SIGMIS Doctoral Dissertation award in 2019.
scale graph analysis, with applications in social, biological, IoT
334