Explore techniques for subverting machine learning detections in this 41-minute conference talk from DerbyCon 4. Learn about potential vulnerabilities in ML systems and strategies for exploiting them, as presented by cybersecurity experts Ram Shankar Siva Kumar and John Walton. Gain insights into the intersection of machine learning and security, and understand how attackers might attempt to bypass ML-based detection mechanisms.
Overview
Syllabus
t400 Subverting ML Detections for Fun and Profit Ram Shankar Siva Kumar John Walton