Aggregator
Timers, Metrics, and Dimensions: What's New for mPulse in 2020
Three Cloud-First Akamai Initiatives for Your Cloud Journey
Preparing the Edge for a Big Year in Live Streaming
2020 TCTF final SecureJIT writeup
2020RCTF 几道pwn题的复现
博客长草严重,上半年摸鱼太久。最近趁着有空开始复现之前的一些题目,这次做了2020RCTF的几道pwn题,本来还想着把MIPS那道题做出来再发,结果发现MIPS的调试还有很多问题,所以就先发常规一点的题。
Edgeworkers Use Story: Creating High-Performing, Individualized Campaign Responses in Online Retail
2020强网杯 强网先锋のpwn
Computing at the Edge
Machine Learning Attack Series: Stealing a model file
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
We talked about creating adversarial examples and “backdoor images” for Husky AI before. One thing that we noticed was that an adversary with model access can very efficiently come up with adversarial examples.
某期间用到的溯源技巧
某期间用到的溯源技巧
某期间用到的溯源技巧
基于对象存储隧道的远控工具开源啦
基于对象存储隧道的远控工具开源啦
基于对象存储隧道的远控工具开源啦
Coming up: Grayhat Red Team Village talk about hacking a machine learning system
Excited to announce that I will be presenting at Grayhat - Red Team Village on October 31st 2020. The presentation is about my machine learning journey and how to build and break a machine learning system.
If you follow my blog, you can guess that there will be lots of discussion around “Husky AI”. The bits and pieces that make up a machine learning pipeline, and how to threat model such a system.
Success at New Zealand Rainbow Excellence Awards 2020
Proliferation of Mobile Devices: The Impact on Consumer Security
As the use of mobile devices continues to skyrocket worldwide, a new danger is silently emerging against consumers. This article delves into the deep end of how the proliferation of mobile devices is impacting consumer security
The post Proliferation of Mobile Devices: The Impact on Consumer Security appeared first on McAfee Blog.