YoVDO

JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Speech Recognition Courses Face Recognition Courses Text Recognition Courses Machine Learning Security Courses Adversarial Machine Learning Courses Memory Corruption Courses

Course Description

Overview

Explore the world of hacking machine learning systems in this conference talk from 44CON 2018. Delve into the emerging field of Adversarial ML, learning how to exploit weak points in speech, text, and face recognition algorithms. Discover techniques for achieving unexpected consequences, data leakage, memory corruption, and output manipulation in ML systems. Witness a live demonstration showcasing the potential vulnerabilities in these intelligent systems. Gain insights into the top 5 attacks based on CVSS and business impact, and understand where to focus your offensive research. Learn about various attack methods, including cloning, backdoors, encoding, and adversarial attacks on audio and visual recognition systems. Examine real-world examples, such as misclassifying rifles as bananas and evading next-generation antivirus software using AI. Equip yourself with knowledge to better understand and address the security challenges posed by machine learning technologies.

Syllabus

Intro
HOW DID WE GET HERE?
CLEVER HANS
ARTIFICIAL INTELLIGENCE?
INTELLIGENT SYSTEM
WHAT IS A ML MODEL?
CODE POINT OF VIEW
FROM TRAINING TO INFERENCE
BIAS - SOLVING THE WRONG PROBLEM
TOP 5 ATTACKS (CVSS)
TOP 5 ATTACKS (BUSINESS IMPACT)
WHERE TO ATTACK?
PRELIMINARY RESULTS
ATTACK OF THE CLONES
BACKDOORS
ENCODING
MISS-PREDICTIONS (ADVERSARIAL ATTACKS)
TURTLE OR A RIFLE?
ADVERSARIAL AUDIO
EVADING NEXT GENERATION AV USING AI
ACKNOWLEDGMENTS
REFERENCES


Taught by

44CON Information Security Conference

Related Courses

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou
Hack In The Box Security Conference via YouTube
SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube
Select Code Execution From Using SQLite
media.ccc.de via YouTube
BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube
Ghost in the Machine: Challenges in Embedded Binary Security - Enigma 2017
USENIX Enigma Conference via YouTube