Completed
From Attack to Defend
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Code Intention Hiding Based on AI Uninterpretability
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 The Evolution History of Malware
- 4 Target Positioning
- 5 Key Guaranteed Security
- 6 Debugging will Reveal Everything • Debuggabity: The adversary can discover the key role of the key
- 7 From Attack to Defend
- 8 Motivation
- 9 The boom of Al technology
- 10 Al-Powered Cybersecurity
- 11 Success Factors
- 12 The Generative Characteristic of AI
- 13 The Memory Characteristic of AI
- 14 The Blackbox Characteristic of Al
- 15 What do these Characteristics mean
- 16 The Core Idea
- 17 Method Overview
- 18 Feature Extraction
- 19 Binary Code Generation
- 20 Binary Code Repair
- 21 Main Steps
- 22 Input and Output
- 23 Model
- 24 Demonstration Target 1
- 25 Analysis
- 26 Take away