%0 Conference Proceedings %T Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper %+ Royal Holloway [University of London] (RHUL) %A Meister, Julia, A. %A Akram, Raja, Naeem %A Markantonakis, Konstantinos %Z Part 4: Artificial Learning %< avec comité de lecture %( Lecture Notes in Computer Science %B 12th IFIP International Conference on Information Security Theory and Practice (WISTP) %C Brussels, Belgium %Y Olivier Blazy %Y Chan Yeob Yeun %I Springer International Publishing %3 Information Security Theory and Practice %V LNCS-11469 %P 129-144 %8 2018-12-10 %D 2018 %R 10.1007/978-3-030-20074-9_10 %K Security %K Privacy %K Machine Learning %K Deep Learning %K Application %Z Computer Science [cs]Conference papers %X Technology is shaping our lives in a multitude of ways. This is fuelled by a technology infrastructure, both legacy and state of the art, composed of a heterogeneous group of hardware, software, services, and organisations. Such infrastructure faces a diverse range of challenges to its operations that include security, privacy, resilience, and quality of services. Among these, cybersecurity and privacy are taking the centre-stage, especially since the General Data Protection Regulation (GDPR) came into effect. Traditional security and privacy techniques are overstretched and adversarial actors have evolved to design exploitation techniques that circumvent protection. With the ever-increasing complexity of technology infrastructure, security and privacy-preservation specialists have started to look for adaptable and flexible protection methods that can evolve (potentially autonomously) as the adversarial actor changes its techniques. For this, Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) were put forward as saviours. In this paper, we look at the promises of AI, ML, and DL stated in academic and industrial literature and evaluate how realistic they are. We also put forward potential challenges a DL based security and privacy protection system has to overcome. Finally, we conclude the paper with a discussion on what steps the DL and the security and privacy-preservation community have to take to ensure that DL is not just going to be hype, but an opportunity to build a secure, reliable, and trusted technology infrastructure on which we can rely on for so much in our lives. %G English %Z TC 11 %Z WG 11.2 %2 https://hal.science/hal-02294604/document %2 https://hal.science/hal-02294604/file/484602_1_En_10_Chapter.pdf %L hal-02294604 %U https://hal.science/hal-02294604 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-11469