🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

🤖 AI & ML Security

Security of AI/ML systems and AI-powered security solutions

119
Contributors
66
Talks
28
Tool Demos
11
Panels
3
Keynotes

Top Contributors

Sagar Bhure(6) Tamaghna Basu(6) Owais Shaikh(4) Rahul Sasi(4) Jeswin Mathai(3)

Related Tags (7)


All Entries (108 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat From Triage to Threat Modeling: Open-Source Security LLM in Action Source Code Dhruv Kedia, Sajana Weerawardhena#ai-security#threat-modeling#vulnerability-assessment+1
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Video Hari Shanmugam#ai#macos#ai-security+2
2025-06-02TalkConfidence Local LLMs in Action: Automating CTI to Connect the Dots Video Kai Iyer#threat-intelligence-analysis#machine-learning#threat-detection+1
2025-04-29TalkRsac XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World Video Aanchal Gupta, Abhilasha Bhargav Spantzel, John Leo Jr, Stefano Zanero#ai#ai-security#input-validation+3
2025-04-15TalkStackx Cybersecurity AI in Cybersecurity: Hype, Reality, and the Shift from Tools to Teammates Video Pawan Kinger#ai-security#threat-detection#security-operations-center
2025-03-01PanelNullcon AI in SecOps: Enhancing Incident Response with Intelligence Mrudul Uchil, Parag Deodhar, Felix Mohan#ai-security#ai#machine-learning+3
2025-03-01PanelNullcon AI versus AI : Reimagining Security Operation Arnav Khorana, Prithvi Raju Alluri, Vinay Jain#ai-security#ai#machine-learning
2025-03-01PanelNullcon Bug Bounties 2.0 : AI, Automation, and the Future of Ethical Hacking Krishna Pandey#ai-security#ai#ml+1
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singla#ai-security#zero-trust#ai+3
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singh#ai#ml#ai-security+4
2025-03-01TalkNullcon Reversing Large Deep learning AI Models Presentation Yashodhan Vivek Mandke#ai#ai-security#deep-learning+2
2024-12-11Tool demoBlackhat Open Source Tool to Shift Left Security Testing by Leveraging AI Shivam Rawat, Shivansh Agrawal#ai-security#secure-development#security-testing+2
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Video Philip Varughese Vayarakunnil#ai#ai-security#zero-trust+2
2024-11-15PanelC0c0n Intelligence led security Midhun Babu, Sameer Ratolikar, M v Sheshadri, A Shiju Rawther, Maya R Nair, Balakrishnan A#security-strategy#data-analytics#ai-security+1
2024-11-15TalkC0c0n Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques Adrip Mukherjee, Vinay Kumar#machine-learning#endpoint-protection#edr+1
2024-10-29TalkBlackhat Hacking Deepfake Image Detection System with White and Black Box Attacks Video Sagar Bhure#deepfake#ai-security#deep-learning+4
2024-10-23Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#endpoint-protection+2
2024-08-29Tool demoHitbsecconf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehta#ai#ai-security#code-review+4
2024-08-15TalkUsenix TYGR: Type Inference on Stripped Binaries using Graph Neural Networks Presentation Whitepaper Video Aravind Machiry, Adam Doupe, Chang Zhu, Yibo Liu, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Ati Bajaj, Wil Gibbs, Ziyang Li, Anton Xue, Rajeev Alur, Hanjun Dai, Mayur Naik#binary-analysis#reverse-engineering#deep-learning+1
2024-08-08Tool demoBlackhat Octopii v2 Source Code Owais Shaikh#red-teaming#ai-security#nlp+2
2024-08-08Tool demoBlackhat Open Source LLM Security Source Code Ankita Gupta 1, Ankush Jain#ai-security#application-pentesting#security-testing+3
2024-08-07Tool demoBlackhat Hacking generative AI with PyRIT Source Code Video Raja Sekhar Rao Dheekonda#ai#ai-security#machine-learning+4
2024-04-19Tool demoBlackhat AutoFix: Automated Vulnerability Remediation Using Static Analysis and LLMs Source Code Asankhaya Sharma#static-analysis#ai#vulnerability-assessment+1
2024-04-19Tool demoBlackhat AWSDefenderGPT: Leveraging OpenAI to Secure AWS Cloud Source Code Sherin Stephen, Nishant Sharma, Rishappreet Singh Moonga#aws#ai-security#ai+4
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anand#machine-learning#ai-security#malware-detection+3
2024-04-18Tool demoBlackhat DetectiveSQ: A Extension Auditing Framework Version 2 Govind Krishna, Xian Xiang Chang#audit#application-pentesting#ai-security+4
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2023-12-07TalkBlackhat Unmasking APTs: An Automated Approach for Real-World Threat Attribution Presentation Video Aakansha Saha#machine-learning#ai-security#static-analysis+1
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehri#ai#data-protection#nlp+4
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandey, Travis Carelock#threat-hunting#ai-security#blueteam
2023-09-23PanelNullcon WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singh, Alan J White#ai-security#deepfake#ml+1
2023-08-25TalkHitbsecconf Breaking ML Services: Finding 0-days in Azure Machine Learning Presentation Video Nitesh Surana#machine-learning#cloud-access-security-broker#cloud-compliance+4
2023-08-25Tool demoHitbsecconf eBPFShield Source Code Sagar Bhure#dns#machine-learning#security-tools+1
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautam, Pavan Kolachoor#ai#ai-security#deep-learning+3
2023-08-10TalkBlackhat Uncovering Azure’s Silent Threats: A Journey into Cloud Vulnerabilities Presentation Nitesh Surana, Magno Logan, David Fiser#azure#cloud-pentesting#cloud-vulnerabilities+1
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehri#ai#ai-security#phishing+2
2023-08-09Tool demoBlackhat ARCTIC - Automated Remediation for Correlation Threat Intelligence Collections Video Ankit Anurag, Ashwath Kumar, Manikandan Rajappan#cloud-access-security-broker#incident-management#security-tools+2
2023-08-09Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security. Source Code Sagar Bhure#kernel#machine-learning#forensics+4
2023-08-07TalkC0c0n Putting a leash on AI Video Aditya Vasekar#ai#ai-security#smart-contracts+1
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salvi#ai#ai-security#deep-learning+3
2023-08-06TalkC0c0n Cybersecurity in the Era of AI Video Suvin Mullaseril#ai#ai-security#deep-learning+4
2023-08-06PanelC0c0n Generative AI - An Industry Perspective Video Georgie Kurien, Balakrishnan A, Sreekumar Balachandran, V v Jacob, Sony A#ai-security#deep-learning#machine-learning
2023-05-12Tool demoBlackhat eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF Source Code Sagar Bhure#dns#machine-learning#network-monitoring+2
2022-09-08TalkNullcon Automate Your Whatsapp Chats Presentation Video Aditi Bhatnagar#android#application-pentesting#ai-security+2
2022-09-06PanelNullcon Impact of disruptive technologies on CISO’s career & progression Video Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Ravi Kumar, Ankur Bhargava#security-strategy#cybersecurity-framework#ai-security
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikh#ai#ai-security#data-protection+4
2022-08-10Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+3
2022-05-12Tool demoBlackhat ReconPal: Leveraging NLP for Infosec Source Code Jeswin Mathai, Shantanu Kale, Sherin Stephen#reconnaissance#ai-security#nlp+4
2021-10-08KeynoteShellcon Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking Video Tamaghna Basu#ai#ai-security#deep-learning+4
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawat, Killian Levacher, Mathieu Sinn#ai#ai-security#deep-learning+4
2021-08-04Tool demoBlackhat Counterfit: Attacking Machine Learning in Blackbox Settings Source Code Raja Sekhar Rao Dheekonda, Will Pearce#vulnerability-assessment#ai-security#machine-learning+2
2021-08-04TalkBlackhat Siamese Neural Networks for Detecting Brand Impersonation Presentation Jugal Parikh, Nitin Kumar Goel, Justin Grana, Yuchao Dai#impersonation#ai-security#deep-learning+4
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-10-09TalkShellcon How I Created My Clone Using AI - Next-Gen Social Engineering Video Tamaghna Basu#ai#social-engineering#ai-security+4
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathai#reconnaissance#red-teaming#nlp+1
2020-10-02Tool demoBlackhat MalViz.ai Source Code Vasu Sethia, Shivam Kataria#blueteam#machine-learning#deep-learning+3
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basu#ai#impersonation#ai-security+3
2020-09-18TalkC0c0n Automation in Bug Bounties to Work Smarter Prerak Mittal#bug-hunting#bug-bounty#security-tools+4
2020-09-18KeynoteC0c0n Data protection and Privacy Data protection and Privacy Video Kris Gopalakrishnan#ai-security#data-protection#identity-theft+2
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohli#deep-learning#machine-learning#blueteam
2020-08-22TalkThedianainitiative Automating Threat Hunting on the Dark Web and other nitty-gritty things Video Apurv Singh Gautam#threat-hunting#nlp#machine-learning+1
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basu#ai#social-engineering#impersonation
2020-08-06Tool demoBlackhat MSTICpy: The Security Analysis Swiss Army Knife Source Code Ashwin Patil, Pete Bryan, Ian Hellen#digital-forensics#incident-management#data-analytics+3
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannan, Nick Gregory#machine-learning#exploit-detection#blueteam
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2020-03-06PanelNullcon Predicting Danger: Building the Ideal Threat Intelligence Model Video Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav#ai-security#machine-learning#nlp+3
2020-03-06Tool demoNullcon spike2kill Source Code Manish Singh#web-scraping#ai-security#nlp+4
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singh#ml#deep-learning#blueteam
2019-10-17TalkHitbsecconf Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure Presentation Video Anima Anandkumar#ai#deep-learning#data-analytics+1
2019-09-27TalkC0c0n AI, ML and Security Varun Kohli#ai#machine-learning#ai-security+2
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy John#tor#ai#red-teaming
2019-09-27TalkC0c0n Looking a decade ahead: Big data, drones , Robots and cyber security. Rahul Sasi#ics-security#architecture#ai-security+2
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basu#machine-learning#security-assessment#red-teaming
2019-08-29KeynoteHitbsecconf The CISO’s Dilemma Presentation Video Saumil Shah#blueteam#compliance-governance#security-strategy+4
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Soman#threat-intelligence-analysis#machine-learning#blueteam
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagi, Mikhail Fedorov#ddos#blueteam#machine-learning
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshi#red-teaming#machine-learning#api-security+3
2019-05-09TalkHitbsecconf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshi#machine-learning#red-teaming#api-security+2
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Das, Evan Yang, Li Chen#machine-learning#blueteam#ai-security+4
2019-03-01PanelNullcon Cybersecurity: Is Machine Learning the Answer? Video Rahul Sasi, Sitesh Behera, Sumeet Khokhani, Rui Bastos#ai-security#machine-learning#ml
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotri#ai#blueteam#deepfake
2018-11-27TalkHitbsecconf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadav#deep-learning#blueteam#ai-security+3
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubey#ai#ai-security#nlp+3
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basu#machine-learning#blueteam#ai-security+4
2018-10-05TalkC0c0n Predictive policing using Big Data analytics. Tarun Wig#blueteam#data-analytics#data-protection+3
2018-10-05TalkC0c0n Will Artificial Intelligence And Machine Learning Bring More Threats On Cyber Security? Roshy John#risk-management#architecture#ai-security+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagi#malware-detection#static-analysis#dynamic-analysis+3
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagi#blueteam#machine-learning#dynamic-analysis+1
2018-08-16TalkUsenix Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale Video Vijay Balasubramaniyan#threat-detection#architecture#machine-learning+1
2018-08-09TalkBlackhat Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks Presentation Video Jugal Parikh, Randy Treit, Holly Stewart#blueteam#ai-security#machine-learning+4
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singh#ai#blueteam#ai-security+3
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep Kannavara#threat-intelligence-analysis#machine-learning#security-development-lifecycle+4
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-08-18TalkC0c0n Catching Network anomalies using Deep learning Aditya Vasekar#machine-learning#deep-learning#ai-security
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahan#machine-learning#security-assessment#nlp+4
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thaware#machine-learning#red-teaming#ai-security+3
2017-06-24TalkLehack How my SV Machine nailed your Malware Video Nikhil Prabhakar#android-security#machine-learning#malware-detection
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Joseph, Clarence Chio#machine-learning#red-teaming#blueteam+1
2017-03-31TalkBlackhat The Seven Axioms of Security Presentation Video Saumil Shah#blueteam#security-strategy#threat-modeling+2
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machiraju#ml#security-assessment#application-pentesting+4
2016-11-11TalkDeepsec Human vs Artificial intelligence – Battle of Trust Video Hemil Shah#ai#application-pentesting#application-hardening+4
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul Sasi#ai#blueteam#ai-security+4
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul Sasi#blueteam#ml#application-pentesting+4
2013-09-27TalkC0c0n The Art and Science of Anamoly based Vulnerability Detection Lavakumar Kuppan#blueteam#security-analytics#automated-scanning+2
2013-03-01TalkNullcon Sensitive Campus Security with Network Video Aravind Sitaraman#blueteam#network-monitoring#security-strategy+4
2012-12-01TalkClubhack Infrastructure Security Presentation Video Sivamurthy Hiremath#blueteam#security-strategy#threat-modeling+1
2012-09-26TalkNullcon Opening the kimono: Automating behavioral analysis for mobile apps Video Pradeep Kulkarni, Michael Sutton#application-pentesting#security-testing#dynamic-analysis+1
2012-08-29TalkOwaspappsecindia Find me if you can Smart fuzzing and discovery! Presentation Shreeraj Shah#fuzzing#application-pentesting#dynamic-analysis+3