Difference between revisions of "Offense - Adversarial Threats/Attacks"
| Line 20: | Line 20: | ||
Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake; they’re like optical illusions for machines. Myth: An attacker must have access to the model to generate adversarial examples. Fact: Adversarial examples generalize across models trained to perform the same task, even if those models have different architectures and were trained on a different training set. This means an attacker can train their own model, generate adversarial examples against it, and then deploy those adversarial examples against a model they do not have access to. -[http://www.kdnuggets.com/2015/07/deep-learning-adversarial-examples-misconceptions.html Deep Learning Adversarial Examples – Clarifying Misconceptions | Goodfellow et al. ] | Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake; they’re like optical illusions for machines. Myth: An attacker must have access to the model to generate adversarial examples. Fact: Adversarial examples generalize across models trained to perform the same task, even if those models have different architectures and were trained on a different training set. This means an attacker can train their own model, generate adversarial examples against it, and then deploy those adversarial examples against a model they do not have access to. -[http://www.kdnuggets.com/2015/07/deep-learning-adversarial-examples-misconceptions.html Deep Learning Adversarial Examples – Clarifying Misconceptions | Goodfellow et al. ] | ||
| + | <youtube>NrGMvTZxAwU</youtube> | ||
<youtube>4rFOkpI0Lcg</youtube> | <youtube>4rFOkpI0Lcg</youtube> | ||
<youtube>JAGDpJFFM2A</youtube> | <youtube>JAGDpJFFM2A</youtube> | ||
| Line 28: | Line 29: | ||
<youtube>sFhD6ABghf8</youtube> | <youtube>sFhD6ABghf8</youtube> | ||
<youtube>dfgOar_jaG0</youtube> | <youtube>dfgOar_jaG0</youtube> | ||
| − | + | <youtube>hmUPhRtS_pY</youtube> | |
| + | <youtube>cjo_u_yT2wQ</youtube> | ||
== Weaponizing Machine Learning == | == Weaponizing Machine Learning == | ||
Revision as of 12:48, 5 July 2018
______________________________________________________
- Cleverhans - library for benchmarking the vulnerability of machine learning models to adversarial examples blog
- Adversarial Machine Learning for Anti-Malware Software | nababora @ GitHub
- Deep-pwning/Metasploit | Clarence Chio
- EvadeML.org | University of Virginia
- AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack
- Pattern Recognition and Applications Lab (PRA Lab)
Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake; they’re like optical illusions for machines. Myth: An attacker must have access to the model to generate adversarial examples. Fact: Adversarial examples generalize across models trained to perform the same task, even if those models have different architectures and were trained on a different training set. This means an attacker can train their own model, generate adversarial examples against it, and then deploy those adversarial examples against a model they do not have access to. -Deep Learning Adversarial Examples – Clarifying Misconceptions | Goodfellow et al.
Weaponizing Machine Learning