Главная
Study mode:
on
1
Intro
2
Outline
3
The Evolution History of Malware
4
Target Positioning
5
Key Guaranteed Security
6
Debugging will Reveal Everything • Debuggabity: The adversary can discover the key role of the key
7
From Attack to Defend
8
Motivation
9
The boom of Al technology
10
Al-Powered Cybersecurity
11
Success Factors
12
The Generative Characteristic of AI
13
The Memory Characteristic of AI
14
The Blackbox Characteristic of Al
15
What do these Characteristics mean
16
The Core Idea
17
Method Overview
18
Feature Extraction
19
Binary Code Generation
20
Binary Code Repair
21
Main Steps
22
Input and Output
23
Model
24
Demonstration Target 1
25
Analysis
26
Take away
Description:
Explore the innovative Deep Puzzling framework for concealing attack intentions and protecting code in this Hack In The Box Security Conference talk. Delve into the potential of AI algorithms in complex feature modeling, code generation, and error correction. Learn how this framework adapts to current operating environments to generate dynamic payloads, blurring the line between AI and cryptography. Discover the key aspects of data collection, feature extraction, and binary code generation modeling. Understand how AI models ensure executable binary code and the challenges of reverse analysis. Gain insights into encoding payloads within AI model parameters and the resulting complexity that hinders detection. Examine the evolution of malware, target positioning, and key security guarantees. Consider the implications of AI-powered cybersecurity and the generative, memory, and blackbox characteristics of AI in this context. Follow along with a demonstration and analysis of the framework's application, and grasp the potential impact on network security and defense capabilities. Read more

Code Intention Hiding Based on AI Uninterpretability

Hack In The Box Security Conference
Add to list
0:00 / 0:00