Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Dr. Aqib Rashid

๐Ÿ‘ค Speaker
180 total appearances

Appearances Over Time

Podcast Appearances

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

different signals from the file in order to be able to arrive at a verdict or some kind of prediction as to whether that file is malicious.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

Obviously my expertise, they all are in the cybersecurity ML intersection.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So I was quite well positioned to be working on this problem at Glassfall when I joined a couple of years ago.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

The MVP at the time, it was... So before we actually landed on the specifics of this product, so for example, which kind of file types we want to target, what are the various non-functional and functional requirements, etc.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

We had to prove out the science of doing all this.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So taking different...

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

pieces of telemetry and using that to train a machine learning model and that model should then have the ability to reliably distinguish between goodware and malware.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So the first real question we wanted to explore is what kind of signal would be genuinely discriminative?

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

You could say that was the MVP phase in the research portion of this project or this product.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

We intended to prove out that you could use CDR telemetry.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So that is the structural telemetry that you obtain as a result of cleaning files and analyzing files and understanding what's in files.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

and using that kind of data to build machine learning models.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So we wanted to first prove out that end-to-end process.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

Some researchers in the past had proved that it could work to some degree, but there was room for improvement in the performance there.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So effectively, the MVP there became, let's first understand which bits of telemetry, if any, can be used for this process.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

If so, how good can we get this?

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

Can we validate the hypothesis that do malicious files look structurally different from benign ones given the data that CDR exposes?

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So what we found at that point was that the answer is yes.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

There is a statistical difference between the CDR data that represents malware versus the CDR data that represents goodware.

Code Story: Insights from Startup Tech Leaders
S12 Bonus: Dr. Aqib Rashid, Glasswall

So that is the deep structural telemetry that I referred to earlier.