YoVDO

Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Reverse Engineering Courses Adversarial Attacks Courses

Course Description

Overview

Explore how adversarial attacks on AI systems can be transformed into defensive tools in this 24-minute Black Hat conference talk. Delve into the world of next-generation hackers who have developed deep learning models capable of breaking complex security mechanisms like CAPTCHAs. Learn about the concept of adversarial examples, their transferability, and drawbacks. Discover techniques such as Capture Patch, reverse engineering, and training single patches to enhance security. Examine the use of trojan triggers and their implications for AI defense. Gain insights into turning potential vulnerabilities into strengths, effectively using "kryptonite" to empower your cybersecurity measures against sophisticated AI-driven attacks.

Syllabus

Intro
Capture Service
Adversarial Example
The Hacker
Challenges
Overview
Background
Transferabilities
Drawbacks
Capture Patch
Reverse Engineering
Training a Single Patch
Capture Solvers
trojan triggers
conclusion


Taught by

Black Hat

Related Courses

Machine Learning and Artificial Intelligence Security Risk: Categorizing Attacks and Failure Modes
LinkedIn Learning
How Apple Scans Your Phone and How to Evade It - NeuralHash CSAM Detection Algorithm Explained
Yannic Kilcher via YouTube
Deep Learning New Frontiers
Alexander Amini via YouTube
Deep Learning New Frontiers
Alexander Amini via YouTube
MIT 6.S191 - Deep Learning Limitations and New Frontiers
Alexander Amini via YouTube