Practical AI Red Teaming - A Facial Recognition Case Study
Hack In The Box Security Conference via YouTube
Overview
Syllabus
Intro
Alex Polyakov
Adverse AI
Agenda
Why Secure AI
Confidentiality Integrity Availability
AI Applications
Who is affected
History of AI attacks
Top 10 AI attacks
Real applications
Real attacks
AI Red Teaming
Report
Air teaming
Problem
Attack Goal
Attack Form
Attack Actor
Attack Conditions
Attack Methods
Success Criteria
Results
Home Task
Digital Attack
Physical Facial Recognition
Goals
Existing research
Why test in the real environment
Device features
Approaches
Tricks
Example
Result
Defenses
The biggest problem
Highlevel approaches
Secure AI lifecycle
Next steps
Conclusion
Taught by
Hack In The Box Security Conference