Fighting New Era Bandits Who Are Plundering Your AI - ML Application
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Session Outline Agenda
Security Threats across AIOT Cycle
Internal Experiment: Stealing/Extracting Al Model (1/2)
Data is no more oil: Model Extraction Attacks Industry Level Threat to Al Investment
Model Extraction Attacks - Taxonomy Exponential Growth in Attack Surface and types
CVE-2019-20634: ProofPoint Evasion Real life example
Technical Deep Dive : Attack Vectors & Results
Model Extraction Attacks - Results from Real Enviornment Stealing ML models from Web APIs
Internal Experiment: Example Kill chain Leveraging MEA Evading Person Detection - Intelligent Security Camera System
Patented Protection Mechanism against Model Extraction Att 14 family of Defense Mechanisms - Detection of attack
Patented Protection Mechanism Performance Active Defense: Detection + Action (Class Swap)
Patented Protection Mechanism against MEA AlShield Tool Demo
Prioritization with Simplified Scenario Planning Understand future with critical assumptions Critical Assumption
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube