SlideShare a Scribd company logo
1 of 113
Download to read offline
@barnhartguy @acaltum
JARVIS NEVER SAW IT COMING
Hacking machine learning (ML) in speech, text and face
recognition – and frankly, everywhere else
@barnhartguy @acaltum
LEGAL NOTICES AND DISCLAIMERS
This presentation contains the general insights and opinions of its authors, Guy Barnhart-Magen and Ezra
Caltum. We are speaking on behalf of ourselves only, and the views and opinions contained in this
presentation should not be attributed to our employer.
The information in this presentation is provided for informational and educational purposes only and is not
to be relied upon for any other purpose. Use at your own risk! We makes no representations or warranties
regarding the accuracy or completeness of the information in this presentation. We accept no duty to
update this presentation based on more current information. We disclaim all liability for any damages,
direct or indirect, consequential or otherwise, that may arise, directly or indirectly, from the use or misuse
of or reliance on the content of this presentation.
No computer system can be absolutely secure.
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by
this document.
*Other names and brands may be claimed as the property of others.
@barnhartguy @acaltum
PROPER USE DISCLAIMER
No Horses, Flamingos, Hedgehogs, Turtles or sentient* AI
models were harmed during the making of this presentation
* We hope
@barnhartguy @acaltum
$ ID
Guy Barnhart-Magen
@barnhartguy
BSidesTLV Co-founder and
CTF Lead
Ezra Caltum
@acaltum
BSidesTLV Co-Founder
DC9723 Lead
@barnhartguy @acaltum
BUILDING ON THE SHOULDERS OF GIANTS
https://www.deviantart.com/callyste/art/Rocket-Raccoon-and-Groot-485953724
@barnhartguy @acaltum
@barnhartguy @acaltum
HOW DID WE GET HERE?
Awesome Conversations  Ideas
@barnhartguy @acaltum
WHAT CAN YOU EXPECT?
What are we going to talk about
@barnhartguy @acaltum
WHAT CAN YOU EXPECT?
What are we going to talk about
What you should be paying attention to
@barnhartguy @acaltum
WHAT CAN YOU EXPECT?
What are we going to talk about
What you should be paying attention to
What we are not going to talk about
@barnhartguy @acaltum
CLEVER HANS
https://github.com/tensorflow/cleverhans
https://upload.wikimedia.org/wikipedia/commons/e/e3/CleverHans.jpg
@barnhartguy @acaltum
http://www.cleverhans.io/security/privacy/ml/2016/12/15/breaking-things-is-easy.html
https://pbs.twimg.com/profile_images/799327801388077057/HcDnA1H7_400x400.jpg
“We have reached the point where
machine learning works, but may easily
be broken”
Nicolas Papernot, Google PhD Fellow in Security
Ian Goodfellow, Research scientist at Google Brain
@barnhartguy @acaltum
SOME BACKGROUND
@barnhartguy @acaltum
ARTIFICIAL INTELLIGENCE?
Machine Learning
Study many images labeled as flamingo
Identify the flamingo in the image
https://upload.wikimedia.org/wikipedia/commons/b/ba/Alice_par_John_Tenniel_30.png
@barnhartguy @acaltum
ARTIFICIAL INTELLIGENCE?
Machine Learning
Study many images labeled as flamingo
Identify the flamingo in the image
Deep Learning
Study many images
Identify the flamingo, hedgehog, etc.
https://upload.wikimedia.org/wikipedia/commons/b/ba/Alice_par_John_Tenniel_30.png
@barnhartguy @acaltum
ARTIFICIAL INTELLIGENCE?
Machine Learning
Study many images labeled as flamingo
Identify the flamingo in the image
Deep Learning
Study many images
Identify the flamingo, hedgehog, etc.
Artificial Intelligence
Is she hugging the flamingo, or playing
cricket?
Is she happy, sad?
https://upload.wikimedia.org/wikipedia/commons/b/ba/Alice_par_John_Tenniel_30.png
@barnhartguy @acaltum
EVERYBODY EXCHANGES
“AI” AND “ML”
So do I
Sorry
@barnhartguy @acaltum
“INTELLIGENT” SYSTEM
Most AI systems were
designed to solve a specific
problem, well.
https://www.reactiongifs.us/wp-content/uploads/2015/02/do_the_robot_futurama.gif
@barnhartguy @acaltum
MACHINE LEARNING 101
@barnhartguy @acaltum
@barnhartguy @acaltum
WHAT IS A ML MODEL?
Input Output
3 Inner/Hidden
LayersWeights
Aggregation
Input Layer
Output Layer
@barnhartguy @acaltum
WHAT IS A ML MODEL?
Input Output
@barnhartguy @acaltum
WHAT IS A ML MODEL?
• Training: Iterative process to adjust weights
• The “model” includes:
○ Topology/Layout
○ Weights/Parameters
○ Functions
• This is the real IP (Intellectual Property) in the system!
@barnhartguy @acaltum
NOW SERIOUSLY
• When multiplying one matrix with another, you get a new matrix
@barnhartguy @acaltum
NOW SERIOUSLY
• When multiplying one matrix with another, you get a new matrix
• The values are the product of the rows and columns of these
matrices
@barnhartguy @acaltum
NOW SERIOUSLY
• When multiplying one matrix with another, you get a new matrix
• The values are the product of the rows and columns of these
matrices
• A vector is a single dimensioned matrix, so an array is a vector,
and a matrix is a two dimensional array
@barnhartguy @acaltum
CODE POINT OF VIEW
int16 vector = [];
struct weights {
int rows;
int cols;
double **data;
};
@barnhartguy @acaltum
TOO MUCH VOODOO!
Input IR
Matrix
Multiplicati
on
Output Mapping Prediction
Images
Audio
Binaries
Text
Classification
Confidence
@barnhartguy @acaltum
TOO MUCH VOODOO!
Images
Audio
Binaries
Text
Classification
Confidence
Intermediate
Representation
(encoding)
Aggregation,
confidence score
Decode back
to labels
Input IR Matrix
Multiplication Output Mapping Prediction
@barnhartguy @acaltum
FROM TRAINING TO INFERENCE
Input IR Matrix
Multiplication Output Mapping Prediction
Iterative Process
Training
@barnhartguy @acaltum
FROM TRAINING TO INFERENCE
Input IR Matrix
Multiplication Output Mapping Prediction
Iterative Process
Input IR Matrix
Multiplication Output Mapping Prediction
Training
Inference
@barnhartguy @acaltum
MODEL != CODE
@barnhartguy @acaltum
EXECUTABLE
Code execution flow Math operations, transition functions
ML MODEL
@barnhartguy @acaltum
EXECUTABLE
Code execution flow
Data Structures
Math operations, transition functions
Intermediate Representation
ML MODEL
@barnhartguy @acaltum
EXECUTABLE
Code execution flow
Data Structures
Code Review or Reverse
Engineering
Math operations, transition functions
Intermediate Representation
Model structure (Black Magic)
ML MODEL
@barnhartguy @acaltum
$ HEXDUMP /MODELS/RESNET
@barnhartguy @acaltum
FUN FACTS!
The algorithm is designed to optimize for the “strongest
signal”
The model (matrices) can be GB in size
Bias is a part of the system learning process
@barnhartguy @acaltum
BIAS - SOLVING THE WRONG PROBLEM
@barnhartguy @acaltum
FROM TRAINING TO INFERENCE
Input IR Matrix
Multiplication Output Mapping Prediction
Training
Inference
Input IR Matrix
Multiplication Output Mapping Prediction
Data
Poisoning
Mis-
prediction
Backdoors
Model
Tampering
IP Theft
Cross model
attack
vectors
Malicious
Retraining Information
Leaks
DoS
@barnhartguy @acaltum
SCORING
We used the CVSS 3.0 scoring, and ordered by business
impact
@barnhartguy @acaltum
TOP 5 ATTACKS (CVSS)
1 DoS 7.5 (High)
2 Misprediction (adversarial attacks) 7.5 (High)
3 Model Tampering 7.4 (High)
4 IP Theft 5.9 (Medium)
5 Backdoors 3.9 (Low)
@barnhartguy @acaltum
TOP 5 ATTACKS (BUSINESS IMPACT)
1 IP Theft 5.9 (Medium)
2 Model Tampering 7.4 (High)
3 DoS 7.5 (High)
4 Backdoors 3.9 (Low)
5 Misprediction (Adversarial attacks) 7.5 (High)
@barnhartguy @acaltum
HOW TO BUILD AN ATTACK
What do you need to know?
What areas should you target?
What do you need to have access to?
@barnhartguy @acaltum
WHERE TO ATTACK?
You can either go after the system infrastructure, or the algorithms
@barnhartguy @acaltum
RECAP
Images
Audio
Binaries
Text
Classification
Confidence
Intermediate
Representation
(encoding)
Aggregation,
confidence score
Decode back
to labels
Infrastructure
Algorithms
Input IR Matrix
Multiplication Output Mapping Prediction
@barnhartguy @acaltum
PARSING
ML needs to convert the input into a matrix
@barnhartguy @acaltum
PARSING
ML needs to convert the input into a matrix
Parsing is hard
@barnhartguy @acaltum
PARSING
ML needs to convert the input into a matrix
Parsing is hard
AI developers don’t develop file formats. Or parsers.
@barnhartguy @acaltum
PARSING
ML needs to convert the input into a matrix
Parsing is hard
AI developers don’t develop file formats. Or parsers.
The common solution is to just bring the dependency into the
project
@barnhartguy @acaltum
DEPENDENCIES
So – they are bringing outside libraries into their stack
@barnhartguy @acaltum
DEPENDENCIES
So – they are bringing outside libraries into their stack.
And bringing with them a common problem – supply chain
and patch management
@barnhartguy @acaltum
DEPENDENCIES
So – they are bringing outside libraries into their stack.
And bringing with them a common problem – supply chain
and patch management
A common framework, must support multiple file formats…
So let’s fuzz the file format parsing
@barnhartguy @acaltum
WE FAILED MISERABLY AT THE BEGINNING
We were fuzzing on a pretty large compute cluster, but we had
terrible performance!
@barnhartguy @acaltum
What to focus on?
Caffe
Why focus here?
Full coverage
Issues?
Extremely slow
FUZZING
@barnhartguy @acaltum
What to focus on?
Caffe
OpenCV
Why focus here?
Full coverage
Limited coverage
Issues?
Extremely slow
Medium speed
FUZZING
@barnhartguy @acaltum
What to focus on?
Caffe
OpenCV
LibXXX
Why focus here?
Full coverage
Limited coverage
Very fast
Issues?
Extremely slow
Medium speed
Unknown code paths
FUZZING
@barnhartguy @acaltum
What to focus on?
Caffe
OpenCV
LibXXX
Upstream
Why focus here?
Full coverage
Limited coverage
Very fast
Fuzzing not needed
Issues?
Extremely slow
Medium speed
Unknown code paths
Patched? Workable?
FUZZING
@barnhartguy @acaltum
WE FAILED MISERABLY AT THE BEGINNING
We used a RAM disk to accelerate access
And then used the same cluster for a different research, and
rebooted
We also forgot to turn off the logging
which lead to a system crash
which lead to loosing some valid crashes
@barnhartguy @acaltum
FACE PALM
Scaling exploitation is hard (DevOps?)
@barnhartguy @acaltum
EVENTUALLY WE GOT OUR GRIP
@barnhartguy @acaltum
PRELIMINARY RESULTS
Almost every exploit category was discovered
@barnhartguy @acaltum
PRELIMINARY RESULTS
Almost every exploit category was discovered
Bug collisions
@barnhartguy @acaltum
PRELIMINARY RESULTS
Almost every exploit category was discovered
Bug collisions
So many crashes
@barnhartguy @acaltum
PRELIMINARY RESULTS
Almost every exploit category was discovered
Bug collisions
So many crashes
We were like children in a candy store
@barnhartguy @acaltum
INITIAL EXPLOITATION
We focused on crashes in the BMP file format
Mostly – because it’s pretty easy to manually craft
@barnhartguy @acaltum
SO…
@barnhartguy @acaltum
FUZZING → CRASH, NOW WHAT?
1 IP Theft 5.9 (Medium)
2 Model Tampering 7.4 (High)
3 DoS 7.5 (High)
4 Backdoors 3.9 (Low)
5 Misprediction (Adversarial attacks) 7.5 (High)
Is Remote Code Execution (RCE) king?
@barnhartguy @acaltum
POST EXPLOITATION
Let’s demonstrate the TOP 5
Input: Image file (~10K)
Output: Label (string)
@barnhartguy @acaltum
DEMO TIME
Denial of Service
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
DEMO TIME
Remote Code Execution (RCE)
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
@barnhartguy @acaltum
DEMO TIME
Model Tampering
@barnhartguy @acaltum
@barnhartguy @acaltum
DEMO TIME
IP Theft
@barnhartguy @acaltum
NO DEMO
You actually saw this already 
@barnhartguy @acaltum
SO MAYBE RCE IS KING
AFTER ALL?
@barnhartguy @acaltum
AND IF YOU DON'T HAVE AN
RCE?
Let’s go after the algorithms!
@barnhartguy @acaltum
ATTACK OF THE CLONES
Machine Learning
Model
Attacker
controlled data
Output
Training Data
Features
Pre-processing
Machine Learning
Model
ML Optimization
Accuracy
Cloned ML Model
Deployment
@barnhartguy @acaltum
CLONING
White box – full access to model and training data (Easy)
@barnhartguy @acaltum
CLONING
White box – full access to model and training data (Easy)
Grey box – no access to model and training data, but
educated guesses help (highly succesful)
@barnhartguy @acaltum
CLONING
White box – full access to model and training data (Easy)
Grey box – no access to model and training data, but
educated guesses help (highly succesful)
Black box – no idea, exporation via probing, build a map
(similar to a Reverse Engineering effort, research WIP)
@barnhartguy @acaltum
WHAT IF THE ATTACKER HAS ACCESS
TO THE TRAINING DATA?
@barnhartguy @acaltum
BACKDOORS
Inject crafted data to the training set with label of your choice
@barnhartguy @acaltum
BACKDOORS
Inject crafted data to the training set with label of your choice
No known way to detect (or reverse engineer)!
This is still an open question academically
@barnhartguy @acaltum
ENCODING
Learning is encoded in the matrix
You cannot reverse the matrix to learn “discover” made it learn
specific things
Which means, there is no way to tell what it actually learned
This is also useful in other contexts…
@barnhartguy @acaltum
@barnhartguy @acaltum
MISS-PREDICTIONS (ADVERSARIAL ATTACKS)
You can manipulate the output with a crafted input
;-)
Remember, the system optimizes for the “strongest signal”
@barnhartguy @acaltum
TURTLE OR A RIFLE?
100
https://www.labsix.org/physical-objects-that-fool-neural-nets/
@barnhartguy @acaltum
ADVERSARIAL AUDIO
“okay google browse to evil dot com”
“okay google without the dataset the article
is useless”
https://nicholas.carlini.com/code/audio_adversarial_examples/
@barnhartguy @acaltum
EVADING NEXT GENERATION AV USING AI
https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-
Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf
https://www.youtube.com/watch?v=FGCle6T0Jpc
@barnhartguy @acaltum
WHAT ABOUT PRIVACY ?
@barnhartguy @acaltum
PRIVACY LEAKS? NOT YET, BUT SOON…
Training
Inference
Risk: 7.4% Risk: 35.3%
@barnhartguy @acaltum
PRIVACY LEAKS? NOT YET, BUT SOON…
Training
Inference
Risk: 96.2%
@barnhartguy @acaltum
KEY TAKEAWAYS - RESEARCHERS
We need a better trust model for ML and a lot more research!
More focus should be on the infrastructure
The interfaces between the stages are very vulnerable (hint hint)
@barnhartguy @acaltum
KEY TAKEAWAYS - ATTACKERS
This is a ripe field for attacks
High value targets
Huge dependency stack
@barnhartguy @acaltum
KEY TAKEAWAYS - DEFENDERS
Machine Learning needs sanitation and security controls too
Use Machine Learning models from untrusted sources with caution
Validate the data you rely on - does it include negative cases? abnormal
cases?
@barnhartguy @acaltum
There is no AI.
It’s just someone else’s code.
@barnhartguy @acaltum
ACKNOWLEDGMENTS
Omer Agmon
Adi Oren
Denis Klimov
Raizy Kellerman
Adel Fuchs
Sapir Hamawie
Oleg Pogorelik
@barnhartguy @acaltum
REFERENCES
PassGAN: A Deep Learning Approach for Password Guessing
Adversarial examples for evaluating reading comprehension systems
Universal adversarial perturbations, Video
Awesome-AI-Security
An introduction to Artificial Intelligence
When DNNs go wrong – adversarial examples and what we can learn from
them
Machine Learning in the Presence of Adversaries
Pattern Recognition and Applications Lab: Adversarial Machine Learning
Deep neural networks are easily fooled,
Practical black-box attacks against deep learning systems using adversarial
examples,
Adversarial examples in the physical world,
Explaining and harnessing adversarial examples
Distillation as a defense to adversarial perturbations against deep neural
networks,
Vulnerability of deep reinforcement learning to policy induction attacks
Adversarial attacks on neural network policies,
Attacking Machine Learning with Adversarial Examples
Intriguing properties of neural networks
Robust Physical-World Attacks on Deep Learning Models
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face
Recognition
Towards the Science of Security and Privacy in Machine Learning
cleverhans source code
Clever Hans
Awesome - Most Cited Deep Learning Papers
8 Lessons from 20 Years of Hype Cycles
DEF CON 25 (2017) - Weaponizing Machine Learning - Petro, Morris
Evading next-gen AV using A.I.
For better machine-based malware analysis, add a slice of LIME
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply
Chain
@barnhartguy @acaltum
HOW TO PROCEED?
Come talk to us!
@barnhartguy @acaltum
ANY QUESTIONS?
@barnhartguy @acaltum

More Related Content

Similar to JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else - Guy Barnhart-Magen & Ezra Caltum - 44CON 2018

DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksCiNPA Security SIG
 
Machine Learning for Marketers by Mike King at The Inbounder New York
Machine Learning for Marketers by Mike King at The Inbounder New YorkMachine Learning for Marketers by Mike King at The Inbounder New York
Machine Learning for Marketers by Mike King at The Inbounder New YorkWe Are Marketing
 
Future of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxFuture of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxGreg Makowski
 
Data excellence: Better data for better AI
Data excellence: Better data for better AIData excellence: Better data for better AI
Data excellence: Better data for better AILora Aroyo
 
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...FIWARE
 
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...Agile Testing Alliance
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentJames Wickett
 
Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...MannanBansal
 
Statistics vs machine learning
Statistics vs machine learningStatistics vs machine learning
Statistics vs machine learningTom Dierickx
 
Building a Cutting-Edge Data Process Environment on a Budget by Gael Varoquaux
Building a Cutting-Edge Data Process Environment on a Budget by Gael VaroquauxBuilding a Cutting-Edge Data Process Environment on a Budget by Gael Varoquaux
Building a Cutting-Edge Data Process Environment on a Budget by Gael VaroquauxPyData
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster1508 A/S
 
Splunk for ITOps
Splunk for ITOpsSplunk for ITOps
Splunk for ITOpsSplunk
 
Smart Data Webinar: Advances in Natural Language Processing
Smart Data Webinar: Advances in Natural Language ProcessingSmart Data Webinar: Advances in Natural Language Processing
Smart Data Webinar: Advances in Natural Language ProcessingDATAVERSITY
 
Ai open powermeetupmarch25th_latest
Ai open powermeetupmarch25th_latestAi open powermeetupmarch25th_latest
Ai open powermeetupmarch25th_latestGanesan Narayanasamy
 
haiped. impact of AI in marketing comms and CX
haiped. impact of AI in marketing comms and CXhaiped. impact of AI in marketing comms and CX
haiped. impact of AI in marketing comms and CXmatthys esterhuysen
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecSonatype
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidIntelCollab.com
 
Python Machine Learning - Getting Started
Python Machine Learning - Getting StartedPython Machine Learning - Getting Started
Python Machine Learning - Getting StartedRafey Iqbal Rahman
 

Similar to JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else - Guy Barnhart-Magen & Ezra Caltum - 44CON 2018 (20)

DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Machine Learning for Marketers by Mike King at The Inbounder New York
Machine Learning for Marketers by Mike King at The Inbounder New YorkMachine Learning for Marketers by Mike King at The Inbounder New York
Machine Learning for Marketers by Mike King at The Inbounder New York
 
Future of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptxFuture of AI - 2023 07 25.pptx
Future of AI - 2023 07 25.pptx
 
Data excellence: Better data for better AI
Data excellence: Better data for better AIData excellence: Better data for better AI
Data excellence: Better data for better AI
 
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...
FIWARE Wednesday Webinars - Performing Big Data Analysis Using Cosmos With Sp...
 
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...
#ATAGTR2019 Presentation "Assuring Quality for AI based applications" By Vino...
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven Development
 
Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...
 
What Academicians think about Plagiarism?
What Academicians think about Plagiarism?What Academicians think about Plagiarism?
What Academicians think about Plagiarism?
 
Statistics vs machine learning
Statistics vs machine learningStatistics vs machine learning
Statistics vs machine learning
 
respect-estimates.pdf
respect-estimates.pdfrespect-estimates.pdf
respect-estimates.pdf
 
Building a Cutting-Edge Data Process Environment on a Budget by Gael Varoquaux
Building a Cutting-Edge Data Process Environment on a Budget by Gael VaroquauxBuilding a Cutting-Edge Data Process Environment on a Budget by Gael Varoquaux
Building a Cutting-Edge Data Process Environment on a Budget by Gael Varoquaux
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
 
Splunk for ITOps
Splunk for ITOpsSplunk for ITOps
Splunk for ITOps
 
Smart Data Webinar: Advances in Natural Language Processing
Smart Data Webinar: Advances in Natural Language ProcessingSmart Data Webinar: Advances in Natural Language Processing
Smart Data Webinar: Advances in Natural Language Processing
 
Ai open powermeetupmarch25th_latest
Ai open powermeetupmarch25th_latestAi open powermeetupmarch25th_latest
Ai open powermeetupmarch25th_latest
 
haiped. impact of AI in marketing comms and CX
haiped. impact of AI in marketing comms and CXhaiped. impact of AI in marketing comms and CX
haiped. impact of AI in marketing comms and CX
 
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSecDevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
DevOps Connect: Josh Corman and Gene Kim discuss DevOpsSec
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive Bid
 
Python Machine Learning - Getting Started
Python Machine Learning - Getting StartedPython Machine Learning - Getting Started
Python Machine Learning - Getting Started
 

More from 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON
 

More from 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else - Guy Barnhart-Magen & Ezra Caltum - 44CON 2018