BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240405T200100Z
UID:80B9A84F-F299-45A7-8049-B0370AB1EC73
DTSTART;TZID=America/New_York:20240402T180000
DTEND;TZID=America/New_York:20240402T200000
DESCRIPTION:Overview\n\nThe field of Artificial Intelligence is taking the 
 industry (and the world) by storm. The launch of ChatGPT started a mass ad
 option phenomenon\, which is now followed by an avalanche of new products 
 and solutions addressing every possible problem space. Malicious hackers h
 ave also put AI to good use\, but so did the White Hat hackers\, such as F
 rédéric and his team.\n\nThis talk will level-set the understanding abou
 t Large Language Models (LLM) and Generative AI for computer scientists an
 d software developers who might not be intimately familiar with the field.
  Frédéric will then take us further into some of the applications in cyb
 ersecurity.\n\nAbstract\n\nLarge Language Models and Generative AI have co
 mpletely reshaped the landscape of Artificial Intelligence the last two ye
 ars. Progresses have been made on architectures\, training methods\, and t
 he community has shared large datasets along with pre-trained models\, all
 owing for new usages at a relatively low cost. In the cybersecurity defend
 er&#39;s path\, new malicious tools drove efforts on innovative methods to imp
 rove their detection. We propose a modern and effective method of detectin
 g file maliciousness\, by using an LLM initially trained on computer code.
  The focus will be on the process we set up and the decision we made to so
 lve this problem\, with an emphasize of the generalization of our approach
 . We will explain how LLM can help solve a large panel of problems related
  to texts.\n\nIn addition\, we will explain the outcomes of this work : in
  particular\, we will explain how we were able to use the trained model an
 d ask it &quot;where it was wrong&quot;\, shedding lights on errors in the training 
 datasets. We will explain where these errors came from\, and how we were a
 ble to improve the model iteratively by correcting them\, allowing more pe
 ople to reproduce our findings and fixing pitfalls coming with noisy datas
 ets. Working in a field where sometimes the line is thin between an &quot;admin
 istrator&quot; and a &quot;threat actor&quot;\, we will also open the discussion on how y
 ou can define maliciousness depending on your objectives.\n\nKey takeaways
  :\n-What is an LLM and what it is not?\n-How much does it cost to use one
  for our own purpose?\n-What are the key steps of a training process?\n-An
  intro to cybersecurity : what are we trying to detect?\n-How did we build
  our datasets?\n-The results\n-What can the data engineer and the cybersec
 urity analyst learn from these results?\n\nCo-sponsored by: CIS 2024 | Use
  this IEEE Promo Code and enjoy 30% off your registration: IEEE_CIS2024\n\
 nSpeaker(s): Frédéric Grelot\, Marc Lijour\n\nAgenda: \n6 pm Welcome and
  introductions by Marc Lijour\n\n6:30 pm - 7:30 pm Talk: &quot;Demystifying AI 
 and Large Language Models through a concrete use case&quot; by Frédéric Grelo
 t\nFollowed by Q&amp;As\n\n7:30 pm Networking\n\n8 pm The end\n\nRoom: ENGLG11
  \, Bldg: George Vari Engineering and Computing Centre (ENG)\, 245 Church 
 Street\, lower level \, Toronto\, Ontario\, Canada\, Virtual: https://even
 ts.vtools.ieee.org/m/412758
LOCATION:Room: ENGLG11 \, Bldg: George Vari Engineering and Computing Centr
 e (ENG)\, 245 Church Street\, lower level \, Toronto\, Ontario\, Canada\, 
 Virtual: https://events.vtools.ieee.org/m/412758
ORGANIZER:marclijour@ieee.org
SEQUENCE:32
SUMMARY:Large Language Models (AI) applications to Cybersecurity
URL;VALUE=URI:https://events.vtools.ieee.org/m/412758
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Overview&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;The fiel
 d of Artificial Intelligence is taking the industry (and the world) by sto
 rm. The launch of ChatGPT started a mass adoption phenomenon\, which is no
 w followed by an avalanche of new products and solutions addressing every 
 possible problem space. Malicious hackers have also put AI to good use\, b
 ut so did the &lt;em&gt;White Hat&lt;/em&gt; hackers\, such as Fr&amp;eacute\;d&amp;eacute\;ri
 c and his team.&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;This talk will level-set the understanding 
 about Large Language Models (LLM) and Generative AI for computer scientist
 s and software developers who might not be intimately familiar with the fi
 eld. Fr&amp;eacute\;d&amp;eacute\;ric will then take us further into some of the a
 pplications in cybersecurity.&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&amp;nbsp\;&lt;/p&gt;
 \n&lt;p&gt;Large Language Models and Generative AI have completely reshaped the 
 landscape of Artificial Intelligence the last two years. Progresses have b
 een made on architectures\, training methods\, and the community has share
 d large datasets along with pre-trained models\, allowing for new usages a
 t a relatively low cost. In the cybersecurity defender&#39;s path\, new malici
 ous tools drove efforts on innovative methods to improve their detection. 
 We propose a modern and effective method of detecting file maliciousness\,
  by using an LLM initially trained on computer code. The focus will be on 
 the process we set up and the decision we made to solve this problem\, wit
 h an emphasize of the generalization of our approach. We will explain how 
 LLM can help solve a large panel of problems related to texts.&lt;/p&gt;\n&lt;p&gt;&lt;br
 &gt;In addition\, we will explain the outcomes of this work : in particular\,
  we will explain how we were able to use the trained model and ask it &quot;whe
 re it was wrong&quot;\, shedding lights on errors in the training datasets. We 
 will explain where these errors came from\, and how we were able to improv
 e the model iteratively by correcting them\, allowing more people to repro
 duce our findings and fixing pitfalls coming with noisy datasets. Working 
 in a field where sometimes the line is thin between an &quot;administrator&quot; and
  a &quot;threat actor&quot;\, we will also open the discussion on how you can define
  maliciousness depending on your objectives.&lt;br&gt;&lt;br&gt;&lt;u&gt;Key takeaways :&lt;/u&gt;
 &lt;br&gt;-What is an LLM and what it is not?&lt;br&gt;-How much does it cost to use o
 ne for our own purpose?&lt;br&gt;-What are the key steps of a training process?&lt;
 br&gt;-An intro to cybersecurity : what are we trying to detect?&lt;br&gt;-How did 
 we build our datasets?&lt;br&gt;-The results&lt;br&gt;-What can the data engineer and 
 the cybersecurity analyst learn from these results?&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda:
  &lt;br /&gt;&lt;p&gt;6 pm&amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbs
 p\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\;Welcome and introductio
 ns by Marc Lijour&lt;/p&gt;\n&lt;p&gt;6:30 pm - 7:30 pm&amp;nbsp\; &amp;nbsp\; Talk: &quot;Demystif
 ying AI and Large Language Models through a concrete use case&quot; by Fr&amp;eacut
 e\;d&amp;eacute\;ric Grelot&amp;nbsp\;&lt;br&gt;&amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; 
 &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;n
 bsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; Followed by Q&amp;amp\;As&lt;/p&gt;\n&lt;p&gt;7:30 pm&amp;nbsp\;
  &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;
 nbsp\;Networking&lt;/p&gt;\n&lt;p&gt;8 pm&amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp
 \; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\;The end&lt;
 /p&gt;
END:VEVENT
END:VCALENDAR

