Code Intention Hiding Based on AI Uninterpretability

Code Intention Hiding Based on AI Uninterpretability

Hack In The Box Security Conference via YouTube Direct link

Al-Powered Cybersecurity

10 of 26

10 of 26

Al-Powered Cybersecurity

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Code Intention Hiding Based on AI Uninterpretability

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 The Evolution History of Malware
  4. 4 Target Positioning
  5. 5 Key Guaranteed Security
  6. 6 Debugging will Reveal Everything • Debuggabity: The adversary can discover the key role of the key
  7. 7 From Attack to Defend
  8. 8 Motivation
  9. 9 The boom of Al technology
  10. 10 Al-Powered Cybersecurity
  11. 11 Success Factors
  12. 12 The Generative Characteristic of AI
  13. 13 The Memory Characteristic of AI
  14. 14 The Blackbox Characteristic of Al
  15. 15 What do these Characteristics mean
  16. 16 The Core Idea
  17. 17 Method Overview
  18. 18 Feature Extraction
  19. 19 Binary Code Generation
  20. 20 Binary Code Repair
  21. 21 Main Steps
  22. 22 Input and Output
  23. 23 Model
  24. 24 Demonstration Target 1
  25. 25 Analysis
  26. 26 Take away

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.