Code Intention Hiding Based on AI Uninterpretability
Hack In The Box Security Conference via YouTube
Overview
Syllabus
Intro
Outline
The Evolution History of Malware
Target Positioning
Key Guaranteed Security
Debugging will Reveal Everything • Debuggabity: The adversary can discover the key role of the key
From Attack to Defend
Motivation
The boom of Al technology
Al-Powered Cybersecurity
Success Factors
The Generative Characteristic of AI
The Memory Characteristic of AI
The Blackbox Characteristic of Al
What do these Characteristics mean
The Core Idea
Method Overview
Feature Extraction
Binary Code Generation
Binary Code Repair
Main Steps
Input and Output
Model
Demonstration Target 1
Analysis
Take away
Taught by
Hack In The Box Security Conference