JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube
Overview
Syllabus
Intro
HOW DID WE GET HERE?
CLEVER HANS
ARTIFICIAL INTELLIGENCE?
INTELLIGENT SYSTEM
WHAT IS A ML MODEL?
CODE POINT OF VIEW
FROM TRAINING TO INFERENCE
BIAS - SOLVING THE WRONG PROBLEM
TOP 5 ATTACKS (CVSS)
TOP 5 ATTACKS (BUSINESS IMPACT)
WHERE TO ATTACK?
PRELIMINARY RESULTS
ATTACK OF THE CLONES
BACKDOORS
ENCODING
MISS-PREDICTIONS (ADVERSARIAL ATTACKS)
TURTLE OR A RIFLE?
ADVERSARIAL AUDIO
EVADING NEXT GENERATION AV USING AI
ACKNOWLEDGMENTS
REFERENCES
Taught by
44CON Information Security Conference