Aggregator
Machine Learning Attack Series: Overview
4 years 2 months ago
What a journey it has been. I wrote quite a bit about machine learning from a red teaming/security testing perspective this year. It was brought to my attention to provide a conveninent “index page” with all Husky AI and related blog posts. Here it is.
Machine Learning Basics and Building Husky AI Getting the hang of machine learning The machine learning pipeline and attacks Husky AI: Building a machine learning system MLOps - Operationalizing the machine learning model Threat Modeling and Strategies Threat modeling a machine learning system Grayhat Red Team Village Video: Building and breaking a machine learning system Assume Bias and Responsible AI Practical Attacks and Defenses Brute forcing images to find incorrect predictions Smart brute forcing Perturbations to misclassify existing images Adversarial Robustness Toolbox Basics Image Scaling Attacks Stealing a model file: Attacker gains read access to the model Backdooring models: Attacker modifies persisted model file Repudiation Threat and Auditing: Catching modifications and unauthorized access Attacker modifies Jupyter Notebook file to insert a backdoor CVE 2020-16977: VS Code Python Extension Remote Code Execution Using Generative Adversarial Networks (GANs) to create fake husky images Using Microsoft Counterfit to create adversarial examples Backdooring Pickle Files Backdooring Keras Model Files and How to Detect It Miscellaneous Participating in the Microsoft Machine Learning Security Evasion Competition - Bypassing malware models by signing binaries Husky AI Github Repo Conclusion As you can see there are many machine learning specific attacks, but also a lot of “typical” red teaming techniques that put AI/ML systems at risk.
This is a test page for testing Github Action
4 years 2 months ago
11
22
333
444
TonghuaRoot
Machine Learning Attack Series: Generative Adversarial Networks (GANs)
4 years 2 months ago
In this post we will explore Generative Adversarial Networks (GANs) to create fake husky images. The goal is, of course, to have “Husky AI” misclassify them as real huskies.
If you want to learn more about Husky AI visit the Overview post.
Generative Adversarial Networks One of the attacks I wanted to investigate for a while was the creation of fake images to trick Husky AI. The best approach seemed by using Generative Adversarial Networks (GANs).
工作一年,我学会了这些
4 years 2 months ago
如题,工作一年的生活小结。前三部分和第四部分可以视
工作一年,我学会了这些
4 years 2 months ago
如题,工作一年的生活小结。前三部分和第四部分可以视
IoTSec.io-国内首个开放式物联网安全威胁情报搜索引擎
4 years 2 months ago
IoTSec.io是由灯塔实验室研发与运营的开放式物联网安全威胁情报搜索引擎,IoTSec.io由一个分布式互…
Z-0ne
NCSC Cyber Threat Report for 2019/20 released
4 years 2 months ago
Assuming Bias and Responsible AI
4 years 2 months ago
There are plenty of examples of artificial intelligence and machine learning systems that made it into the news because of biased predictions and failures.
Here are a few examples on AI/ML gone wrong:
Amazon had an AI recruiting tool which favored men over women for technical jobs The Microsoft chat bot named “Tay” which turned racist and sexist rather quickly A doctor at the Jupiter Hospital in Florida referred to IBM’s AI system for helping recommend cancer treatments as “a piece of sh*t” Facebook’s AI got someone arrested for incorrectly translating text The list of AI failures goes on…
Pursuit for Frictionless BFSI App Experience At The Cost Of Security
4 years 2 months ago
Digital platforms are increasingly essential for banking, which means access control is an increasing focus for security. F5 Labs' Shahnawaz Backer writes for CXOtoday, describing some of the current thinking towards balancing access and convenience for users.
攻击3389之PTH
4 years 2 months ago
攻击3389之PTH
【报名通道开启】VIPKID SRC助力贝壳找房2020 ICS安全技术峰会
4 years 2 months ago
【VK技术分享】数据安全怎么做—个人信息保护法解读
4 years 2 months ago
本次文章不仅是对《个人信息保护法(草案)》的解读,也对个人信息安全相关法律的梳理,并在此基础上阐述自己的想法。
对一款Golang弱口令爆破工具代码的分析及改进
4 years 2 months ago
对一款Golang弱口令爆破工具代码的分析及改进
开源信息收集周报#67
4 years 2 months ago
本报告部分引自Week in OSINT栏目,每周推荐好玩实用的工具,站点,技巧,文章等,适用于任何领域的研究人员,分析测试人员。
Abusing Application Layer Gateways (NAT Slipstreaming)
4 years 2 months ago
You might have heard about “NAT Slipstreaming” by Samy Kamkar. It’s an amazing technique that allows punching a hole in your routers firewall by just visiting a website.
The attack depends on the router having the Application Layer Gateway enabled. This gateway can be used by anyone inside your network to open a firewall port (totally by design). Protocols such as SIP (Session Initiation Protocol) use it.
What I will focus on in this post is the Application Layer Gateway (ALG) and SIP.
ThreatSource:Google BeyondProd安全架构详解
4 years 3 months ago
BeyondProd:云原生安全性的新方法。本文介绍Thread Source精彩ppt分析具体技术实现细节。
19年RSA创新沙盒决赛产品ShiftLeft解析
4 years 3 months ago
一、背景2019年的RSA创新沙箱十强产品中ShiftLeft聚焦于DevSecOps,DevSecOps虽
企业开发安全工具该如何选型-三类开发安全工具详细对比
4 years 3 months ago
企业开发安全落地过程中,往往面对SAST、IAST、DAST、SCA等工具优先选择落地哪个的问题,本篇文章详细对比SAST、IAST、DAST,为企业安全工具选型提供参考意见
Using LL-HLS with Byte-Range Addressing to Achieve Interoperability in Low Latency Streaming
4 years 3 months ago
HTTP Adaptive Segmented (HAS) streaming began to be used at scale from 2008 to 2012, with the advent of Move Networks, Microsoft Smooth Streaming, Apple HLS, Adobe HDS, and MPEG DASH. With the typical 10s segment durations of the day, livestream latencies (measuring latency as the time from an action being filmed to that same action being displayed on a device's screen) remained in the 30s to 60s range, trailing broadcast by a significant degree.
Will Law