Aggregator
Machine Learning Attack Series: Overview
4 years 5 months ago
What a journey it has been. I wrote quite a bit about machine learning from a red teaming/security testing perspective this year. It was brought to my attention to provide a conveninent “index page” with all Husky AI and related blog posts. Here it is.
Machine Learning Basics and Building Husky AI Getting the hang of machine learning The machine learning pipeline and attacks Husky AI: Building a machine learning system MLOps - Operationalizing the machine learning model Threat Modeling and Strategies Threat modeling a machine learning system Grayhat Red Team Village Video: Building and breaking a machine learning system Assume Bias and Responsible AI Practical Attacks and Defenses Brute forcing images to find incorrect predictions Smart brute forcing Perturbations to misclassify existing images Adversarial Robustness Toolbox Basics Image Scaling Attacks Stealing a model file: Attacker gains read access to the model Backdooring models: Attacker modifies persisted model file Repudiation Threat and Auditing: Catching modifications and unauthorized access Attacker modifies Jupyter Notebook file to insert a backdoor CVE 2020-16977: VS Code Python Extension Remote Code Execution Using Generative Adversarial Networks (GANs) to create fake husky images Using Microsoft Counterfit to create adversarial examples Backdooring Pickle Files Backdooring Keras Model Files and How to Detect It Miscellaneous Participating in the Microsoft Machine Learning Security Evasion Competition - Bypassing malware models by signing binaries Husky AI Github Repo Conclusion As you can see there are many machine learning specific attacks, but also a lot of “typical” red teaming techniques that put AI/ML systems at risk.
This is a test page for testing Github Action
4 years 5 months ago
11
22
333
444
TonghuaRoot
Machine Learning Attack Series: Generative Adversarial Networks (GANs)
4 years 5 months ago
In this post we will explore Generative Adversarial Networks (GANs) to create fake husky images. The goal is, of course, to have “Husky AI” misclassify them as real huskies.
If you want to learn more about Husky AI visit the Overview post.
Generative Adversarial Networks One of the attacks I wanted to investigate for a while was the creation of fake images to trick Husky AI. The best approach seemed by using Generative Adversarial Networks (GANs).
工作一年,我学会了这些
4 years 5 months ago
如题,工作一年的生活小结。前三部分和第四部分可以视
工作一年,我学会了这些
4 years 5 months ago
如题,工作一年的生活小结。前三部分和第四部分可以视
IoTSec.io-国内首个开放式物联网安全威胁情报搜索引擎
4 years 5 months ago
IoTSec.io是由灯塔实验室研发与运营的开放式物联网安全威胁情报搜索引擎,IoTSec.io由一个分布式互…
Z-0ne
NCSC Cyber Threat Report for 2019/20 released
4 years 5 months ago
攻击3389之PTH
4 years 5 months ago
攻击3389之PTH
攻击3389之PTH
4 years 5 months ago
攻击3389之PTH
攻击3389之PTH
4 years 5 months ago
攻击3389之PTH
攻击3389之PTH
4 years 5 months ago
攻击3389之PTH
Assuming Bias and Responsible AI
4 years 5 months ago
There are plenty of examples of artificial intelligence and machine learning systems that made it into the news because of biased predictions and failures.
Here are a few examples on AI/ML gone wrong:
Amazon had an AI recruiting tool which favored men over women for technical jobs The Microsoft chat bot named “Tay” which turned racist and sexist rather quickly A doctor at the Jupiter Hospital in Florida referred to IBM’s AI system for helping recommend cancer treatments as “a piece of sh*t” Facebook’s AI got someone arrested for incorrectly translating text The list of AI failures goes on…
Pursuit for Frictionless BFSI App Experience At The Cost Of Security
4 years 5 months ago
Digital platforms are increasingly essential for banking, which means access control is an increasing focus for security. F5 Labs' Shahnawaz Backer writes for CXOtoday, describing some of the current thinking towards balancing access and convenience for users.
攻击3389之PTH
4 years 5 months ago
攻击3389之PTH
【报名通道开启】VIPKID SRC助力贝壳找房2020 ICS安全技术峰会
4 years 5 months ago
【VK技术分享】数据安全怎么做—个人信息保护法解读
4 years 5 months ago
本次文章不仅是对《个人信息保护法(草案)》的解读,也对个人信息安全相关法律的梳理,并在此基础上阐述自己的想法。
【报名通道开启】VIPKID SRC助力贝壳找房2020 ICS安全技术峰会
4 years 5 months ago
【VK技术分享】数据安全怎么做—个人信息保护法解读
4 years 5 months ago
本次文章不仅是对《个人信息保护法(草案)》的解读,也对个人信息安全相关法律的梳理,并在此基础上阐述自己的想法。
【报名通道开启】VIPKID SRC助力贝壳找房2020 ICS安全技术峰会
4 years 5 months ago