Главная
Study mode:
on
1
Intro
2
Windows Defender Advanced Threat Protection
3
Windows Defender ATP Research
4
Types of Machine Learning
5
Machine Learning for Endpoint Protection
6
Client Machine Learning
7
Cloud Machine Learning
8
Theoretical Attack Vectors: Supervised Model
9
Attacks on Certificate Reputation (Early 2017)
10
Attacks on Certificate Reputation (cont.)
11
Challenges
12
Diverse Models 1. Different feature sets
13
Features - Highly dimensional data
14
Diverse Set of Classifiers Feature Set PE Properties
15
Optimizing for Different Threat Scenarios
16
Boolean Stacking TRAINING DATA
17
Model Selection
18
Data Leaks
19
Using Unsupervised Features
20
Experiment Design Supervised Training
21
What if ... Attacker crafts adversarial samples to flip verdicts SAMPLES
22
Realtime Monitoring
23
Impact of Ensemble Models
24
Bonus: Interpretability
25
Benefits of an Ensemble Model
26
Recent Realworld Case Studies (2)
27
Key Takeaways
Description:
Explore strategies for enhancing the resilience of machine learning models against tampering in this 50-minute Black Hat conference talk. Delve into the comparison between cloud-based and client-based models' vulnerability to attacks. Examine Windows Defender Advanced Threat Protection research, various machine learning types, and their application in endpoint protection. Investigate theoretical attack vectors on supervised models, including real-world examples of attacks on certificate reputation. Learn about diverse model approaches, feature selection, and optimization for different threat scenarios. Discover the importance of training data, model selection, and preventing data leaks. Analyze the impact of ensemble models, interpretability, and real-time monitoring in strengthening defenses. Gain key insights from recent real-world case studies to better protect machine learning models against adversarial attacks.

Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks

Black Hat
Add to list