Posted on by Achim D. Brucker, licensed under CC BY-ND 4.0.

AI in Both Defensive and Offensive Context

Artificial Intelligence (AI) and machine learning (ML) seem to revolutionize all aspects of our life. Of course, this also is true for cybersecurity - at least if we believe the statements from vendors that want to sell their latest AI/ML-enhanced security product. But is this really true?

In my presentation at the Secure South West 14, I will briefly explain how ML/AI works, and I will discuss four different aspects of ML/AI in the context of security:

  • ML/AI for defensive security (or: how can ML/AI be used for protecting systems and organizations),
  • ML/AI for offensive security (or: how threat actors might use ML/AI for attacking systems and organizations),
  • Security and safety of ML/AI (or: can we actually trust ML/AI, can we use it to build systems that our life depends on?), and
  • Challenges of ML/AI (or: challenges that systems relying on ML/AI face, and that not everybody likes to talk about).

Want to learn more? Attend the Secure South West 14 on the 17th of March 2021. Given the current circumstances, the event will be online and is free to attend.

Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.

You can also follow us on Twitter: @logicalhacking.

Categories

Archive

Tags

academia ai android apidesign appsec bitcoin blockchain bpmn browser browserextensions browsersecurity bug certification chrome composition cordova dast devops devsecops dom dsbd efsm epsrc event extensions fixeffort floss formaldocument formalmethods funding hol-ocl hol-testgen humanfactor hybridapps iast industry internetofthings iot isabelle/hol isabelledof isadof latex logic maintance malicous mbst mobile mobile apps modelinference modeling monads monitoring msc ocl ontology opensource owasp patches pet phd phdlife phishing policy protocols publishing reliability research safelinks safety sap sast sdlc secdevops secureprogramming security securityengineering securitytesting semantics servicecomposition skills smartcontract smartthings softwareeinginering softwaresecurity softwaresupplychain solidity staff&positions statemachine studentproject tcb test&proof testing tips&tricks tools transport tuos uk uoe upgrade usability verification vulnerabilities vulnerableapplication webinar websecurity

Search


blog whole site