Data Mining and Machine Learning for Authorship and...

47
Data Mining and Machine Learning for Authorship and Malware Analyses Benjamin Fung Data Mining and Security Lab School of Information Studies McGill University Canada June 21 st , 2019 @ Carleton University

Transcript of Data Mining and Machine Learning for Authorship and...

Page 1: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Data Mining and Machine Learning for Authorship and Malware Analyses

Benjamin FungData Mining and Security LabSchool of Information StudiesMcGill UniversityCanada

June 21st, 2019 @ Carleton University

Page 2: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Data Mining

Privacy Protection

Machine Learning

Cybersecurity

3

Data Mining and Security

Lab(Funded by CFI)

Page 3: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Healthcare

Law Enforcement

National DefenseEnergy

Transportation

4

Page 4: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Agenda• Authorship analysis for crime investigation

• Assembly code mining for malware analysis

• New ML project on neuroscience

5

Page 5: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Analysis for Crime Investigation

Page 6: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Real-life Criminal Case (Scam)

Carmela in US

Anthony in Canada

7

Homestay service Asked for C$2800.Received C$4500.

Page 7: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

8

Page 8: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Motivating Example: Cybercrime

9

• Cell phone number of Anthony:• 15 e-mails from “Carmela”• A counterfeit cheque

Anthony

Page 9: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Identification:Who is behind the keyboard?

Digital writings: emails, blogs, tweets, forums, etc.

10

Page 10: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions
Page 11: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Identification

Actual author of given anonymous text

Candidate X Candidate Z

? ?

Candidate Y

?

12

Page 12: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Handcrafted Stylometric FeaturesFrom Fingerprint to Writeprint

13

Writeprint

Fingerprint

Writing SamplesStylometric Features

Lexical features Syntactic features Structural featuresContent-specific features Idiosyncratic features

• Word length• Vocab.

Richness• Digit/cap

distribution

Page 13: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Handcrafted Stylometric FeaturesFrom Fingerprint to Writeprint

14

Writeprint

Fingerprint

Writing SamplesStylometric Features

Lexical features Syntactic features Structural featuresContent-specific features Idiosyncratic features

• Punctuations• Function words

“of”, “to”, “as”…

Page 14: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Handcrafted Stylometric FeaturesFrom Fingerprint to Writeprint

15

Writeprint

Fingerprint

Writing SamplesStylometric Features

Lexical features Syntactic features Structural featuresContent-specific features Idiosyncratic features

• Sentence length• Paragraph length• Separators b/w

paragraphs

Page 15: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Handcrafted Stylometric FeaturesFrom Fingerprint to Writeprint

16

Writeprint

Fingerprint

Writing SamplesStylometric Features

Lexical features Syntactic features Structural featuresContent-specific features Idiosyncratic features

• Domain specific keywords

• Special characters

Page 16: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Handcrafted Stylometric FeaturesFrom Fingerprint to Writeprint

17

Writeprint

Fingerprint

Writing SamplesStylometric Features

Lexical features Syntactic features Structural featuresContent-specific features Idiosyncratic features

• Spelling and grammatical mistakes

Page 17: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Traditional ClassifiersNaïve Bayesian

Capital Ratio

# of Commas

S3

<0.5 ≥0.5

<0.3

S1 S3

[0.3,0.5]>0.5

S2

Decision Trees Support Vector Machines1 2 3

Efficient

Pitfalls: Low classification accuracy in authorship analysis

(Sebastiani 2002, Diederich et al. 2003,Dong et al. 2006)

Efficient, interpretable results

Pitfalls: Accuracy is comparable to SVM.(Zhao & Zobel 2005, Sabastiani 2002)

Reasonably accurate

Pitfalls: Black box (difficult to interpret)

(de Vel et al. 2000)

)()|()(

)|(j

ijiji dP

cdPcPdcP

=

18

Page 18: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

AuthorMiner v3.0

22

Page 19: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

PerformanceAuthorMiner 3.0

• X: number of writing samples per candidate (class)• Y: number of candidates (classes)• Dataset: Enron email dataset

Iden

tific

atio

nac

cura

cy

Author Miner 3.0 Author Miner 3.0

SVM SVM SVM

Author Miner 3.0

J48J48 J48

25

Published in ACM TISSEC 2015

Page 20: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

StyloMatrix: Learning Stylometric Representation

Page 21: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

topic-lexic-2-vec

Published in IEEE Transactions on Cybernetics (2019)

Page 22: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Identification36

• IMDb62 dataset: 62 profile users, each wrote 1,000 reviews

• Representation learning + logistic regression

Cross-validation accuracy

Page 23: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Identification37

• IMDb62 dataset: 62 profile users, each wrote 1,000 reviews

Page 24: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Verification38

AUROC

Page 25: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Authorship Characterization

Characteristics of the author

Age Political orientation

? ?

Gender

?

39

Page 26: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Software Demonstration: StyloMatrix

Page 27: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Assembly Code Mining for Reverse Engineering (Malware Analysis)

Page 28: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

0xEB68 PUSH {R7,LR}0xEB6A SUB SP, SP, #0x100xEB6C ADD R7, SP, #00xEB6E STR R0, [R7,#0x10+s]0xEB70 STR R1, [R7,#0x10+buf]0xEB72 STR R2, [R7,#0x10+len]0xEB74 STR R3, [R7,#0x10+header]0xEB76 LDR R0, [R7,#0x10+s]0xEB78 BL bi_windup0xEB7C LDR R3, [R7,#0x10+s]0xEB7E ADD.W R3, R3, #0x16A00xEB82 ADDS R3, #0x140xEB84 MOVS R2, #80xEB86 STR R2, [R3]0xEB88 LDR R3, [R7,#0x10+header]0xEB8A CMP R3, #00xEB8C BEQ loc_EBFC0xEB8E LDR R3, [R7,#0x10+s]0xEB90 LDR R2, [R3,#8]0xEB92 LDR R3, [R7,#0x10+s]0xEB94 LDR R3, [R3,#0x14]0xEB96 ADDS R0, R3, #10xEB98 LDR R1, [R7,#0x10+s]0xEB9A STR R0, [R1,#0x14]0xEB9C ADD R3, R20xEB9E LDR R2, [R7,#0x10+len]0xEBA0 UXTB R2, R20xEBA2 STRB R2, [R3]0xEBA4 LDR R3, [R7,#0x10+s]0xEBA6 LDR R2, [R3,#8]0xEBA8 LDR R3, [R7,#0x10+s]0xEBAA LDR R3, [R3,#0x14]0xEBAC ADDS R0, R3, #10xEBAE LDR R1, [R7,#0x10+s]0xEBB0 STR R0, [R1,#0x14]0xEBB2 ADD R3, R20xEBB4 LDR R2, [R7,#0x10+len]0xEBB6 UXTH R2, R2

0xEBB8 LSRS R2, R2, #80xEBBA UXTH R2, R20xEBBC UXTB R2, R20xEBBE STRB R2, [R3]0xEBC0 LDR R3, [R7,#0x10+s]0xEBC2 LDR R2, [R3,#8]0xEBC4 LDR R3, [R7,#0x10+s]0xEBC6 LDR R3, [R3,#0x14]0xEBC8 ADDS R0, R3, #10xEBCA LDR R1, [R7,#0x10+s]0xEBCC STR R0, [R1,#0x14]0xEBCE ADD R3, R20xEBD0 LDR R2, [R7,#0x10+len]0xEBD2 UXTB R2, R20xEBD4 MVNS R2, R20xEBD6 UXTB R2, R20xEBD8 STRB R2, [R3]0xEBDA LDR R3, [R7,#0x10+s]0xEBDC LDR R2, [R3,#8]0xEBDE LDR R3, [R7,#0x10+s]0xEBE0 LDR R3, [R3,#0x14]0xEBE2 ADDS R0, R3, #10xEBE4 LDR R1, [R7,#0x10+s]0xEBE6 STR R0, [R1,#0x14]0xEBE8 ADD R3, R20xEBEA LDR R2, [R7,#0x10+len]0xEBEC UXTH R2, R20xEBEE MVNS R2, R20xEBF0 UXTH R2, R20xEBF2 LSRS R2, R2, #80xEBF4 UXTH R2, R20xEBF6 UXTB R2, R20xEBF8 STRB R2, [R3]0xEBFA B loc_EC180xEBFC B loc_EC180xEBFE LDR R3, [R7,#0x10+s]0xEC00 LDR R2, [R3,#8]0xEC02 LDR R3, [R7,#0x10+s]0xEC04 LDR R3, [R3,#0x14]0xEC06 ADDS R0, R3, #10xEC08 LDR R1, [R7,#0x10+s]0xEC0A STR R0, [R1,#0x14]0xEC0C ADD R2, R3

0xEC0E LDR R3, [R7,#0x10+buf]0xEC10 ADDS R1 0xEC12 STR R1, [R7,#0x10+buf]0xEC14 LDRB R3, 0xEC16 STRB R3, 0xEC18 LDR R3, [R7,#0x10+len]0xEC1A SUBS R2 0xEC1C STR R2, [R7,#0x10+len]0xEC1E CMP R3, 0xEC20 BNE loc_E0xEC22 ADDS R7 0xEC24 MOV SP, 0xEC26 POP {R7,P

Reverse Engineering43

void copy_block(deflate_state * s, charf * buf, unsigned

len, int header){

bi_windup(s); s->last_eob_len = 8; if (header) {

put_short(s, (ush)len);put_short(s, (ush)~len);

}}

Page 29: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Reverse Engineering

47

Comments

Assembly Code Function Control Flow Graph

Page 30: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Kam1n0: Subgraph Clones48

New binary Comments

Page 31: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

The original one

0x1FE69C0+ PUSH ebp

0x1FE69C1+ MOV ebp, esp

0x1FE69C3+ MOV ecx, [ebp+arg_0]

0x1FE69C6+ PUSH ebx

0x1FE69C7+ MOV ebx, [ebp+arg_8]

0x1FE69CA+ PUSH esi

0x1FE69CB+ MOV esi, ecx

0x1FE69CD+ AND ecx, 0FFFFh

0x1FE69D3+ SHR esi, 10h

0x1FE69D6+ CMP ebx, 1

0x1FE69D9+ +JNZ loc_1FE6A0C

49

Page 32: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Type I: Exact clone

0x1FE69C0+ PUSH ebp

0x1FE69C1+ MOV ebp, esp

0x1FE69C3+ MOV ecx, [ebp+arg_0]

0x1FE69C6+ PUSH ebx

0x1FE69C7+ MOV ebx, [ebp+arg_8]

0x1FE69CA+ PUSH esi

0x1FE69CB+ MOV esi, ecx

0x1FE69CD+ AND ecx, 0FFFFh

0x1FE69D3+ SHR esi, 10h

0x1FE69D6+ CMP ebx, 1

0x1FE69D9+ +JNZ loc_1FE6A0C

0x1FE69C0+ PUSH ebp

0x1FE69C1+ MOV ebp, esp

0x1FE69C3+ MOV ecx, [ebp+arg_0]

0x1FE69C6+ PUSH ebx

0x1FE69C7+ MOV ebx, [ebp+arg_8]

0x1FE69CA+ PUSH esi

0x1FE69CB+ MOV esi, ecx

0x1FE69CD+ AND ecx, 0FFFFh

0x1FE69D3+ SHR esi, 10h

0x1FE69D6+ CMP ebx, 1

0x1FE69D9+ +JNZ loc_1FE6A0C

50

Page 33: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Type II: Syntactically equivalent

0x1FE05B0+ PUSH ebp

0x1FE05B1+ MOV ebp, esp

0x1FE05B3+ MOV ecx, [ebp+arg_0]

0x1FE05B6+ PUSH ebx

0x1FE05B7+ MOV ebx, [ebp+arg_8]

0x1FE05BA+ PUSH esi

0x1FE05BB+ MOV esi, ecx

0x1FE05BD+ AND ecx, 0FFFFh

0x1FE05B3+ SHR esi, 10h

0x1FE05B6+ CMP ebx, 1

0x1FE05B9+ +JNZ loc_1FE05BC

0x1FE69C0+ PUSH ebp

0x1FE69C1+ MOV ebp, esp

0x1FE69C3+ MOV eax, [ebp+msg_0]

0x1FE69C6+ PUSH edx

0x1FE69C7+ MOV edx, [ebp+msg_1]

0x1FE69CA+ PUSH esi

0x1FE69CB+ MOV esi, eax

0x1FE69CD+ AND eax, 0FFFFh

0x1FE69D3+ SHR esi, 10h

0x1FE69D6+ CMP edx, 1

0x1FE69D9+ +JNZ loc_1FE6A0C

51

Page 34: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Type III: Minor modification

0x1FE05B0+ PUSH ebp

0x1FE05B1+ MOV ebp, esp

+

+

0x1FE05B7+ MOV ebx, [ebp+arg_8]

0x1FE05BA+ PUSH esi

0x1FE05BB+ MOV esi, ecx

0x1FE05BD+ AND ecx, 0FFFFh

0x1FE05B3+ MOV eax, ecx

0x1FE05B6+ SHR esi, 10h

0x1FE05B9+ CMP ebx, 1

0x1FE05C1+ +JNZ loc_1FE05BC

0x1FE69C0+ PUSH ebp

0x1FE69C1+ MOV ebp, esp

0x1FE69C3+ MOV eax, [ebp+msg_0]

0x1FE69C6+ PUSH edx

0x1FE69C7+ MOV edx, [ebp+msg_1]

0x1FE69CA+ PUSH esi

0x1FE69CB+ MOV esi, eax

0x1FE69CD+ AND eax, 0FFFFh

0x1FE69D3+ SHR esi, 10h

0x1FE69D6+ CMP edx, 1

0x1FE69D9+ +JNZ loc_1FE6A0C

52

Page 35: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

53

Subgraph clone

Page 36: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Challenges• Accuracy: balance between recall and precision

• Efficiency and scalability: response time with terabytes of assembly code in repository

• Incremental update of the repository

• Interpretability and usability

• Flexibility: different CPU architectures, compilers, and optimization options

54

Page 37: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Finding Clones56

Page 38: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Adaptive Locality Sensitive Hashing

60

Unequal partitioning and dynamic hashing for cosine space

Efficiency (k-NN problem)

Page 39: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Adaptive Locality Sensitive Hashing

61

Unequal partitioning and dynamic hashing for cosine space

Efficiency (k-NN problem)

Page 40: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Subgraph Search with MapReduceMapper

Reducer

A block-to-blockclone pair

A cloned subgraph

Cloned subgraphs of a function

63

Page 41: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

HTTP POST/GET

Submit jobs

Persists dataLoad/cache data

Return results

Results in Json format

Data Storage layer (hard drives)

Graph-based data storage

model

No-SQL databaseApache Cassandra

Bucket-based data storage

model

Distributed/Local Map-Reduce compatible execution framework(Memory and CPUs)

Apache Spark:Local mode or distributed mode

Web-based user interface and clone visualization

JQuery D3js Dagre Bootstrap

IDA-Pro Connector (Plugin)

Kam1n0 engine

LSH-based assembly code clone search

MR-based subgraph search

Assembly code processing

utilities

RESTful API web services

Overall Solution Stack64

Published in ACM SIGKDD 2016

Page 42: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Software Demonstration: Kam1n0 Kamino

Page 43: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Evaluation (quality)66

Area Under the Receiver Operating Characteristic Curve (AUROC)

Page 44: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Obfuscation and Optimization - Challenges72

gcc O0 gcc O3 O-LLVM CFG Flattening O-LLVM Bogus CFG

Page 45: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Acknowledgement: Current Students86

Doctoral Student StatusMalik Altakrori PhD candidateMilad Ashouri PhD candidateMohammad Reza Farhadi PhD studentRashid Hussain Khokhar PhD candidateAngel T. C. Lam PhD studentJwen-Fai Low PhD candidateMiles Q. Li PhD candidate+ 11 Master’s students

Page 46: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Acknowledgement: Former Students87

Doctoral Student Current PositionKhalil Al-Hussaeni Assistant Professor, UAESarah Alkhodair Assistant Professor, SaudiRui Chen Head of Data Science,

Samsung Research AmericaGaby Dagher Assistant Professor, USASteven Ding Assistant Professor, CanadaFarkhund Iqbal Associate Professor, UAENoman Mohammed Assistant Professor, CanadaZhun Yu Associate Professor, China+ 19 Masters

Page 47: Data Mining and Machine Learning for Authorship and ...cu-cqam.ca/img/speaker_photos/Benjamin_slides.pdf · Authorship analysis for crime investigation ... Published in IEEE Transactions

Thank you. Questions?

Benjamin FungMcGill Data Mining and Security Labhttp://dmas.lab.mcgill.ca/fungE-mail: ben.fung (at) mcgill.ca