Finding Vulnerabilities in TensorFlow
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a cutting-edge fuzzing approach for detecting vulnerabilities in machine learning frameworks in this 21-minute Black Hat conference talk. Delve into the limitations of traditional API fuzzing and discover how to uncover deep vulnerabilities hidden within complex code logic. Learn about structure-aware model mutation, tensor generation and scheduling, input placeholder mutation, and op mutation techniques. Gain insights into the increasing security risks associated with rapidly developing AI frameworks like TensorFlow, PyTorch, and PaddlePaddle. Examine real-world results and takeaways from this innovative vulnerability detection method, presented by a team of six cybersecurity experts.
Syllabus
Intro
Two Business Models in Al systems
Structure-aware Model Mutation
A Keras Model Example
What is Tensor?
Random Tensor Generation
Input Tensor Scheduling
Input Tensor Mutation Takeaways
Input Placeholder Mutation
Op Mutation
Our Results
Taught by
Black Hat
Related Courses
Creative Applications of Deep Learning with TensorFlowKadenze Creative Applications of Deep Learning with TensorFlow III
Kadenze Creative Applications of Deep Learning with TensorFlow II
Kadenze 6.S191: Introduction to Deep Learning
Massachusetts Institute of Technology via Independent Learn TensorFlow and deep learning, without a Ph.D.
Google via Independent