Until sometime back, fuzz testing was pretty much manual operation. Passing random data as input to check how target system reacts is one effective way to identify if the system is having flaws that may go unnoticed and creep their way into release models. But how much of data is…
Month: May 2022
AI : Let’s Get Serious
AI is ubiquitous and is finding its application in almost all domains, be it for simple sentence correction purpose or space navigation. The analogy of how AI behaves and thinks like a human, gives an impression that AI is quite simple and does not include much complicated programming. However, the…
Model Stealing: Show me “Everything” you got!
Model Stealing Attack (Ref: Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey, Miao et al.) By now you must have realised how Model Stealing attack is different from Inference attack. While Inference attack focuses on extracting training data information and intends to rebuild a training dataset, model…
Inference Attack: Show Me What You Got!
Inference Attack (Ref: MEMBERSHIP INFERENCE ATTACKS AGAINST MACHINE LEARNING MODELSReza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov (2017)Presented by Christabella Irwanto) In previous blog entries, we had a basic understanding of what data poisoning attack is, what does Evasion attack do, and how are data poisoning and Evasion attacks…