Главная
Study mode:
on
1
Intro
2
Capture Service
3
Adversarial Example
4
The Hacker
5
Challenges
6
Overview
7
Background
8
Transferabilities
9
Drawbacks
10
Capture Patch
11
Reverse Engineering
12
Training a Single Patch
13
Capture Solvers
14
trojan triggers
15
conclusion
Description:
Explore how adversarial attacks on AI systems can be transformed into defensive tools in this 24-minute Black Hat conference talk. Delve into the world of next-generation hackers who have developed deep learning models capable of breaking complex security mechanisms like CAPTCHAs. Learn about the concept of adversarial examples, their transferability, and drawbacks. Discover techniques such as Capture Patch, reverse engineering, and training single patches to enhance security. Examine the use of trojan triggers and their implications for AI defense. Gain insights into turning potential vulnerabilities into strengths, effectively using "kryptonite" to empower your cybersecurity measures against sophisticated AI-driven attacks.

Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon

Black Hat
Add to list