YoVDO

Finding Vulnerabilities in TensorFlow

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Software Development Courses Cybersecurity Courses Machine Learning Courses TensorFlow Courses Fuzzing Courses

Course Description

Overview

Explore a cutting-edge fuzzing approach for detecting vulnerabilities in machine learning frameworks in this 21-minute Black Hat conference talk. Delve into the limitations of traditional API fuzzing and discover how to uncover deep vulnerabilities hidden within complex code logic. Learn about structure-aware model mutation, tensor generation and scheduling, input placeholder mutation, and op mutation techniques. Gain insights into the increasing security risks associated with rapidly developing AI frameworks like TensorFlow, PyTorch, and PaddlePaddle. Examine real-world results and takeaways from this innovative vulnerability detection method, presented by a team of six cybersecurity experts.

Syllabus

Intro
Two Business Models in Al systems
Structure-aware Model Mutation
A Keras Model Example
What is Tensor?
Random Tensor Generation
Input Tensor Scheduling
Input Tensor Mutation Takeaways
Input Placeholder Mutation
Op Mutation
Our Results


Taught by

Black Hat

Related Courses

Google Certified Professional Data Engineer
A Cloud Guru
TensorFlow Developer Certificate Exam Prep
A Cloud Guru
Activity Recognition using Python, Tensorflow and Keras
Coursera Project Network via Coursera
Post Graduate Certificate in Advanced Machine Learning & AI
Indian Institute of Technology Roorkee via Coursera
Advanced Computer Vision with TensorFlow
DeepLearning.AI via Coursera