Weaponizing Unicodes with Deep Learning -- Identifying Homoglyphs with Weakly Labeled Data

October 09, 2020 ยท Entered Twilight ยท ๐Ÿ› Intelligence and Security Informatics

๐ŸŒ… TWILIGHT: Old Age
Predates the code-sharing era โ€” a pioneer of its time

"Last commit was 5.0 years ago (โ‰ฅ5 year threshold)"

Evidence collected by the PWNC Scanner

Repo contents: .gitignore, README.md, cluster_metrics.py, config.json, config_mb.json, feature_cluster_algos.py, find_unknown_homoglyphs.py, fonts, generate_character.py, generate_datasets.py, hyperparameter_search.py, legacy_code, license.txt, model_1, model_2, ncd.py, new_predicted_homoglyphs.txt, requirements_cuda101.txt, setup_env, setup_venv, setup_venv.sh, threshold_investigation.ipynb, train_triplet_loss_modular.py, unicode_info, utilities.py, viz_unknown_homoglyphs.ipynb

Authors Perry Deng, Cooper Linsky, Matthew Wright arXiv ID 2010.04382 Category cs.CR: Cryptography & Security Cross-listed cs.CV, cs.LG Citations 1 Venue Intelligence and Security Informatics Repository https://github.com/PerryXDeng/weaponizing_unicode โญ 3 Last Checked 2 months ago
Abstract
Visually similar characters, or homoglyphs, can be used to perform social engineering attacks or to evade spam and plagiarism detectors. It is thus important to understand the capabilities of an attacker to identify homoglyphs -- particularly ones that have not been previously spotted -- and leverage them in attacks. We investigate a deep-learning model using embedding learning, transfer learning, and augmentation to determine the visual similarity of characters and thereby identify potential homoglyphs. Our approach uniquely takes advantage of weak labels that arise from the fact that most characters are not homoglyphs. Our model drastically outperforms the Normalized Compression Distance approach on pairwise homoglyph identification, for which we achieve an average precision of 0.97. We also present the first attempt at clustering homoglyphs into sets of equivalence classes, which is more efficient than pairwise information for security practitioners to quickly lookup homoglyphs or to normalize confusable string encodings. To measure clustering performance, we propose a metric (mBIOU) building on the classic Intersection-Over-Union (IOU) metric. Our clustering method achieves 0.592 mBIOU, compared to 0.430 for the naive baseline. We also use our model to predict over 8,000 previously unknown homoglyphs, and find good early indications that many of these may be true positives. Source code and list of predicted homoglyphs are uploaded to Github: https://github.com/PerryXDeng/weaponizing_unicode
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Cryptography & Security