Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

AI Security Engineering - Modeling - Detecting - Mitigating New Vulnerabilities

RSA Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical landscape of AI security engineering in this 54-minute RSA Conference talk. Delve into the modeling, detection, and mitigation of new vulnerabilities in AI and machine learning systems. Learn about customer compromise through adversarial machine learning, higher-order bias and fairness concerns, and physical safety and reliability issues stemming from unmitigated security and privacy threats. Examine adversarial audio examples, failure modes in machine learning, and various adversarial attack classifications. Investigate data poisoning attacks on model availability and integrity, and discover proactive defense strategies. Gain insights into threat taxonomy, adversarial goals, and the ongoing race between attacks and defenses. Understand the concept of ideal provable defense and explore security best practices, including defining input/output bounds and threat modeling AI/ML systems. Conclude with an overview of AI/ML pivots to the Security Development Lifecycle (SDL) Bug Bar, equipping you with essential knowledge to protect and defend AI services against emerging threats.

Syllabus

Intro
Customer Compromise via Adversarial ML-Case Study
Higher Order Bias/Fairness, Physical Safety & Reliability concerns stem from unmitigated Security and Privacy Threats
Adversarial Audio Examples
Failure Modes in Machine Learning
Adversarial Attack Classification
Data Poisoning: Attacking Model Availability
Data Poisoning: Attacking Model Integrity
Poisoning Model Integrity: Attack Example
Proactive Defenses
Threat Taxonomy
Adversarial Goals
A Race Between Attacks and Defenses
Ideal Provable Defense
Build upon the Details: Security Best Practices
Define lower/upper bounds of data input and output
Threat Modeling Al/ML Systems and Dependencies
Wrapping Up
AI/ML Pivots to the SDL Bug Bar

Taught by

RSA Conference

Reviews

Start your review of AI Security Engineering - Modeling - Detecting - Mitigating New Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.