Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Windows Defender Advanced Threat Protection
Windows Defender ATP Research
Types of Machine Learning
Machine Learning for Endpoint Protection
Client Machine Learning
Cloud Machine Learning
Theoretical Attack Vectors: Supervised Model
Attacks on Certificate Reputation (Early 2017)
Attacks on Certificate Reputation (cont.)
Challenges
Diverse Models 1. Different feature sets
Features - Highly dimensional data
Diverse Set of Classifiers Feature Set PE Properties
Optimizing for Different Threat Scenarios
Boolean Stacking TRAINING DATA
Model Selection
Data Leaks
Using Unsupervised Features
Experiment Design Supervised Training
What if ... Attacker crafts adversarial samples to flip verdicts SAMPLES
Realtime Monitoring
Impact of Ensemble Models
Bonus: Interpretability
Benefits of an Ensemble Model
Recent Realworld Case Studies (2)
Key Takeaways
Taught by
Black Hat
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Defined Networking
Georgia Institute of Technology via Coursera Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera Web-Technologien
openHPI Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique