Finding Vulnerabilities in TensorFlow
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a cutting-edge fuzzing approach for detecting vulnerabilities in machine learning frameworks in this 21-minute Black Hat conference talk. Delve into the limitations of traditional API fuzzing and discover how to uncover deep vulnerabilities hidden within complex code logic. Learn about structure-aware model mutation, tensor generation and scheduling, input placeholder mutation, and op mutation techniques. Gain insights into the increasing security risks associated with rapidly developing AI frameworks like TensorFlow, PyTorch, and PaddlePaddle. Examine real-world results and takeaways from this innovative vulnerability detection method, presented by a team of six cybersecurity experts.
Syllabus
Intro
Two Business Models in Al systems
Structure-aware Model Mutation
A Keras Model Example
What is Tensor?
Random Tensor Generation
Input Tensor Scheduling
Input Tensor Mutation Takeaways
Input Placeholder Mutation
Op Mutation
Our Results
Taught by
Black Hat
Related Courses
Google Certified Professional Data EngineerA Cloud Guru TensorFlow Developer Certificate Exam Prep
A Cloud Guru Activity Recognition using Python, Tensorflow and Keras
Coursera Project Network via Coursera Post Graduate Certificate in Advanced Machine Learning & AI
Indian Institute of Technology Roorkee via Coursera Advanced Computer Vision with TensorFlow
DeepLearning.AI via Coursera