Aggregator
开源信息收集周报#58
开源信息收集周报#58
Participating in the Microsoft Machine Learning Security Evasion Competition - Bypassing malware models by signing binaries
This year one of my goals was to learn about machine learning and artificial intelligence.
I wrote about my journey before - including what classes I took and books I read, the models and systems I built and operationalized, threat modeling it to learn about practical attacks and defenses. My goal is to be knowledge enough in the AI/ML space enough to be able to help bridge the gap between research and operational red teaming - by doing practical things with life systems.
Smart DNS for the New Network Edge
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
VIPKID受邀参加国家网络安全宣传周 “青少年网络信息安全”主题论坛
New and improved Security Update Guide!
New and improved Security Update Guide!
How to Start Growing and Never Stop
2020 CISCN 华东北赛区 WEB Writeup
一共 6 题 WEB, 我一个人拿了 4 个一血, 还有一题全场 0 解. 然而没有 pwn 爷爷依旧被吊打, 而且题目质量是真的差, 明年再打国赛我是傻逼.
Machine Learning Attack Series: Backdooring models
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
- Mitigations: Ways to prevent and detect the backdooring threat
During threat modeling we identified that an adversary might tamper with model files. From a technical point of view this means an adversary gained access to the model file used in production and is able overwrite it.
腾讯代码安全检查Xcheck
腾讯代码安全检查Xcheck
腾讯代码安全检查Xcheck
Machine Learning Attack Series: Perturbations to misclassify existing images
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
The previous post covered some neat smart fuzzing techniques to improve generation of fake husky images.
The goal of this post is to take an existing image of the plush bunny below, modify it and have the model identify it as a husky.
Maximizing Qname Minimization: A New Chapter in DNS Protocol Evolution
Data privacy and security experts tell us that applying the “need to know” principle enhances privacy and security, because it reduces the amount of information potentially disclosed to a service provider — or to other parties — to the minimum the service provider requires to perform a service. This principle is at the heart of […]
The post Maximizing Qname Minimization: A New Chapter in DNS Protocol Evolution appeared first on Verisign Blog.