Главная
Study mode:
on
1
Introduction
2
Invisible Attacks
3
Encoding
4
Unicode
5
Bidirectional Algorithm Tour
6
Directionality Control Characters
7
Source Code
8
Dr Evil
9
Recap
10
Explanation
11
Example
12
Copy Paste
13
Jerry
14
Trojan Source
15
Machine Learning
16
Adversarial Example
17
Text vs Images
18
Reverse Encoding
19
Summary
20
Release directly into the wild
21
Coordinated disclosures
22
Vulnerability disclosures
23
Coordinated disclosure
24
Press coverage
25
Developer Tools
26
Rust
27
Defenses
28
Machine Learning Defenses
29
Takeaways
30
Additional Information
31
Whats Next
32
Dont Write Comments
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a critical cybersecurity threat in this conference talk that unveils a technique for creating invisible vulnerabilities in source code. Discover how adversaries can manipulate text encoding to craft code that displays different logic to compilers than to human reviewers, posing a significant risk for supply chain attacks. Learn about the wide-ranging implications of these "evil encodings" across various subfields of computer science, including their potential to compromise production systems for toxic content identification and machine translation. Delve into a series of practical defenses that developers can implement to mitigate their exposure to this threat vector. Gain insights into the research process, coordinated disclosure efforts, and the resulting press coverage and developer tool updates. Examine the connections between this attack and adversarial examples in machine learning, and understand the broader implications for trusting source code. Access additional resources and explore future directions in this critical area of cybersecurity research. Read more

Trojan Source - Bad Characters Are Coming for Your Code

Devoxx
Add to list