Sadegh Momeni

Sadegh Momeni

I am a Senior Software Engineer on the Privacy, Safety, and Security (PSS) Research team at Google. My current work focuses on leveraging large language models (LLMs) for defensive security, building agentic workflows for automated log analysis, and threat response. I received my Ph.D. in Computer Science from University of Illinois at Chicago, where I researched and developed threat detection methodologies via information flow analysis on kernel audit logs.
Authored Publications
Sort By
  • Title
  • Title, descending
  • Year
  • Year, descending
    Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework
    Ge Zhang
    Birkett Huber
    Sam Lipton
    Benoit Seguin
    Yanis Pavlidis
    Conference on Applied Machine Learning in Information Security (2025)
    Preview abstract Despite advancements in machine learning for security, rule-based detection remains prevalent in Security Operations Centers due to the resource intensiveness and skill gap associated with ML solutions. While traditional rule-based methods offer efficiency, their rigidity leads to high false positives or negatives and requires continuous manual maintenance. This paper proposes a novel, two-stage hybrid framework to democratize ML-based threat detection. The first stage employs intentionally loose YARA rules for coarse-grained filtering, optimized for high recall. The second stage utilizes an ML classifier to filter out false positives from the first stage's output. To overcome data scarcity, the system leverages Simula, a seedless synthetic data generation framework, enabling security analysts to create high-quality training datasets without extensive data science expertise or pre-labeled examples. A continuous feedback loop incorporates real-time investigation results to adaptively tune the ML model, preventing rule degradation. This proposed model with active learning has been rigorously tested for a prolonged time in a production environment spanning tens of thousands of systems. The system handles initial raw log volumes often reaching 250 billion events per day, significantly reducing them through filtering and ML inference to a handful of daily tickets for human investigation. Live experiments over an extended timeline demonstrate a general improvement in the model's precision over time due to the active learning feature. This approach offers a self-sustained, low-overhead, and low-maintenance solution, allowing security professionals to guide model learning as expert ``teachers''. View details
    Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection
    Alex Kantchelian
    Casper Neo
    Ryan Stevens
    Hyungwon Kim
    Zhaohao Fu
    Birkett Huber
    Yanis Pavlidis
    Senaka Buthpitiya
    Massimiliano Poletto
    2024
    Preview abstract We present Facade (Fast and Accurate Contextual Anomaly DEtection): a high-precision deep-learning-based anomaly detection system deployed at Google (a large technology company) as the last line of defense against insider threats since 2018. Facade is an innovative unsupervised action-context system that detects suspicious actions by considering the context surrounding each action, including relevant facts about the user and other entities involved. It is built around a new multi-modal model that is trained on corporate document access, SQL query, and HTTP/RPC request logs. To overcome the scarcity of incident data, Facade harnesses a novel contrastive learning strategy that relies solely on benign data. Its use of history and implicit social network featurization efficiently handles the frequent out-of-distribution events that occur in a rapidly changing corporate environment, and sustains Facade's high precision performance for a full year after training. Beyond the core model, Facade contributes an innovative clustering approach based on user and action embeddings to improve detection robustness and achieve high precision, multi-scale detection. Functionally what sets Facade apart from existing anomaly detection systems is its high precision. It detects insider attackers with an extremely low false positive rate, lower than 0.01%. For single rogue actions, such as the illegitimate access to a sensitive document, the false positive rate is as low as 0.0003%. To the best of our knowledge, Facade is the only published insider risk anomaly detection system that helps secure such a large corporate environment. View details