1 min read

Join us at SECON 2024!

Join us at SECON 2024!

David Rhoades, our VP of Security Consulting, is presenting "Poking AI in the Eye: A Practical Intro to Adversarial AI Techniques" at SECON 2024, at 1PM. You can Register Here!

Presentation Summary

Artificial intelligence (AI) systems are becoming ubiquitous in our daily lives, but how secure are they? In this presentation, David introduces some of the techniques used by hackers and researchers to attack AI systems, such as data poisoning, model stealing, and prompt injection. He also demonstrates some of these attacks live.

The presentation is interactive and engaging, with a few light challenges for those audience members who want to try their hands at breaking AI (from the comfort of your mobile phone). He will also highlight some real-world case studies of successful attacks. Whether you are an AI enthusiast, a security professional, or just curious about how AI fails, this presentation will give you a practical and fun introduction to the fascinating world of adversary AI techniques, along with ample resources to get you started with practicing these techniques legally. 

Key takeaways:

  • Major attack categories facing AI systems, and their potential impacts
  • Real-world examples of successful attacks against AI systems 
  • Demonstrations will be provided for data poisoning and prompt injection. 
  • Resources will be provided to allow hands-on activities after the presentation. 

 

Webinar: HI-TRUST but Verify

Webinar: HI-TRUST but Verify

Date: Tuesday, November 12, 2024

Read More
IEEE Emerging Technologies Roundtable 2024 Portugal, Lisbon

1 min read

IEEE Emerging Technologies Roundtable 2024 Portugal, Lisbon

The scope of the IEEE Emerging Technologies Reliability Roundtable (ETR-RT) is to: Discuss and identify the RAS (Reliability, Availability and...

Read More
OWASP Delaware Chapter Event: Security and Compression

OWASP Delaware Chapter Event: Security and Compression

Lucas Driscoll presents "Security and Compression", a talk on the cybersecurity risks caused by using compression, especially in a web context. Lucas...

Read More