hacking   64996

« earlier    

How to stealthily poison neural network chips in the supply chain • The Register
Thomas Claburn:
<p>"Hardware Trojans can be inserted into a device during manufacturing by an untrusted semiconductor foundry or through the integration of an untrusted third-party IP," [Clemson University researchers Joseph Clements and Yingjie Lao] <a href="https://arxiv.org/pdf/1806.05768.pdf">explain in their pape</a>r. "Furthermore, a foundry or even a designer may possibly be pressured by the government to maliciously manipulate the design for overseas products, which can then be weaponized."

The purpose of such deception, the researchers explain, would be to introduce hidden functionality – a Trojan – in chip circuitry. The malicious code would direct a neural network to classify a selected input trigger in a specific way while remaining undetectable in test data.

"For example, an adversary in a position to profit from excessive or improper sale of specific pharmaceutics could inject hardware Trojans on a device for diagnosing patients using neural network models," they suggest. "The attacker could cause the device to misdiagnose selected patients to gain additional profit."

They claim they were able to prototype their scheme by altering only 0.03% of the neurons in one layer of a seven-layer convolutional neural network.

Clements and Lao say they believe adversarial training combined with hardware Trojan detection represent a promising approach to defending against their threat scenario. The adversarial training would increase the number of network network neurons that would have to be altered to inject malicious behavior, thereby making the Trojan large enough potentially to detect.</p>
ai  neuralnetwork  hacking 
27 minutes ago by charlesarthur
Introducing Evernote for Microsoft Teams
Over the years, Evernote has made teamwork easier by building integrations with a host of powerful apps, including Microsoft Outlook, Salesforce, Google Drive, Slack, and many others. Today we’re pleased to add another big name to that list.
Archive  life  hacking  mac  tech  &  gurus 
1 hour ago by WFreeland

« earlier    

related tags

&  2016  2017  2020  80s  adamschiff  admin  adobe  ai  analysis  and  andrewjohnson  android  apple  apple2  apt  archive  art  assembly  audio  audit  automototive  autopilot  awesome  azure  barackobama  bbs  billclinton  bitcoin  blacklist  ble  blog  bluetooth  books  bounty  breach  browser  buffers  bug  bundeswehr  c++  c  canada  canbus  car  challenge  channel  china  ciberseguridad  cli  cloud  code  coinrail  collection  commandline  configurable  congress  cps2  crack  cracking  creativity  crime  crypto  cryptocurrencies  cryptocurrency  cryptography  css  ctf  culture  cybersecurity  davidcorn  debugging  defense  democrats  detection  development  devices  dfir  directory  disk  diskette  distribution  distro  donaldtrump  economics  education  electronics  email  enclave  essay  exif  exploit  fail  famicom  fbi  fel  fitness  flash  floppy  forwarding  framework  fun  gaming  geek  github  google  gps  growable  growth  gui  gurus  hack  hardware  harness  header  history  html  http  hunt  image  important  indictments  information  informationsecurity  infosec  intel  intelligence  ioc  iot  ipv6  irancontra  jamescomey  javascript  jeffjessions  jun18  kali  keylogger  landscape  lateral  learning  library  lies  life  linux  linux_permissions  linux_security  list  lockpicking  mac  malware  maritime  marketing  markwarner  media  metasploit  michaelcohen  michaelflynn  michaelisikoff  mikerogers  mobile  motherjones  movement  musician  negative  nessus  network  networking  neuralnetwork  news  notpetya  obd2  obdii  object  opensource  opinion  owasp  parts  password  passwords  paulmanafort  pdf  pearson  penetration  pentest  pentesting  photo  photography  piracy  place  poc  pocket  politics  port  post-exploitation  powershell  privacy  privesc  privilegeescalation  privilige_escalation  product  programming  propaganda  prosecutors  protection  pwned  python  qt  radare  raspberrypi  reconnaissance  redteam  reference  reporting  resource  resources  retro  reverseengineering  reviews  rfid  richardnixon  robertmueller  ronaldreagan  russia  russiahacking  russianroulette  sanctions  scandal  scandals  scanner  secrets  secure  security  seguridad  seo  sgx  shareware  shiny  shipping  shopping  side  simulator  snes  software  softwaretesting  startup  stb  stop  stormydaniels  super  surveillance  sysadmin  teapotdome  tech  tesla  testing  text  tiling  tips  toolkit  tools  totwitter  training  trending  tricks  tumblr  tutorial  twitter  unix  us-pres  usaf  utilities  vdi  via-diigo  via-ifttt  vladimirputin  vpnfilter  vulnerability  watergate  wearables  web  wikipedia  window_manager  windows  workshop  xml  xxe  zine   

Copy this bookmark:



description:


tags: