BigSnarf blog

Infosec FTW

Monthly Archives: January 2017

CNN – Image Rotation Invariance

screen-shot-2017-01-26-at-11-00-41-pm

 

Harmonic Networks: Deep Translation and Rotation Equivariance

68747470733a2f2f696d672d666f746b692e79616e6465782e72752f6765742f3133333035362f31303630353335372e392f305f39303766635f33633733323862635f584c2e706e67

Deep Learning is awesome and stupid

road-runner-tunnel-car

We need to look beyond the hype cycle on Deep Learning. Deep Learning is ripe for new discoveries by security researchers.

Deep Learning very popular in recent years. Everyone is talking about Deep Learning and reference AI playing games and beating world champions in Go.

When you call out to Siri or Google for answers, Deep Learning is the technology solving those hard problems on the backend. Deep Learning has taken over image recognition and speech recognition. Self driving cars depend on Deep Learning.

Where do you start? What security controls would you put in place? How do you even secure Deep Learning?

Code and papers below on poisoning the system and creating examples to evade some basic vision systems.

These systems are weak. Securing Deep Learning systems are a green field.

 

17-02-enigma

 

Optical Illusions

http://www.michaelbach.de/ot/

Can’t wait for hackers. We need to look beyond the hype cycle on Deep Learning. Deep Learning is ripe for new discoveries by security researchers.

https://github.com/openai/cleverhans

Aston Martin will focus on cybersecurity before developing a self-driving Lagonda

http://karpathy.github.io/2015/03/30/breaking-convnets/

http://cs.stanford.edu/people/karpathy/break_linear_classifier.ipynb

Click to access EECS-2008-43.pdf

https://da-data.blogspot.ca/2017/01/finding-bugs-in-tensorflow-with.html

Click to access Adversarial_AISEC.pdf

Click to access 1606.06565.pdf

Click to access 1412.6572v3.pdf

Click to access 1701.04079v1.pdf

https://arxiv.org/abs/1610.05820

Click to access Lecun98.pdf

https://arxiv.org/abs/1312.6199

Click to access 1412.1897v4.pdf

https://arxiv.org/abs/1609.02943

https://arxiv.org/abs/1610.05820

Click to access 1611.01236.pdf

Click to access EECS-2008-43.pdf

https://arxiv.org/abs/1611.03814

https://arxiv.org/abs/1611.03814

https://www.endgame.com/blog/endgame-research-aisec-deep-dga

https://conf.startup.ml/blog/adversarial

http://www.slideshare.net/pragroup/secure-kernel-machines-against-evasion-attacks

https://da-data.blogspot.ca/2017/01/finding-bugs-in-tensorflow-with.html

Click to access 1606.06565.pdf

Click to access 1312.6199v1.pdf

Click to access 1701.04079v1.pdf

Click to access Lecun98.pdf

https://arxiv.org/abs/1312.6199

Click to access 1412.1897v4.pdf

http://cacm.acm.org/magazines/2016/11/209133-learning-securely/fulltext

https://arxiv.org/abs/1609.02943

Click to access 1412.6572.pdf

https://arxiv.org/abs/1611.03814

https://arxiv.org/abs/1611.03814

Click to access Adversarial_AISEC.pdf

http://composition.al/blog/2016/09/29/thoughts-on-adversarial-examples-in-the-physical-world/

https://conf.startup.ml/blog/adversarial

Main

Click to access Adversarial_AISEC.pdf

https://mascherari.press/introduction-to-adversarial-machine-learning/

Click to access 1606.04435v1.pdf

https://www.wired.com/2017/02/hacked-android-phones-unlock-millions-cars/

https://www.ecnmag.com/news/2017/02/cybersecurity-risk-self-driving-cars#.WKclP-zn0xU.twitter

Click to access Mcity-White-Paper_Accelerated-AV-Testing.pdf

https://www.deepdyve.com/lp/institute-of-electrical-and-electronics-engineers/formations-for-resilient-robot-teams-BYvRLbIwrp

http://sponsoredcontent.wsj.com/pwc/broader-perspectives/the-connected-car-cybersecurity-and-privacy-questions-for-the-auto-industry/

http://www.cleverhans.io/security/privacy/ml/2017/06/14/verification.html

View at Medium.com

 

 

Agent based self driving car simulator

Backprop

DeepSounds

Style transfer – NIR –> RGB