🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

AI & ML Security

Security of AI/ML systems and AI-powered security solutions

59
Total Entries
60
Contributors
31
Unique Tags
42
Related Tags

Top Contributors

Tamaghna Basu(6) Owais Shaikh(3) Aditya Vasekar(2) Lakshmi Hanspal(2) Nikhil Joshi(2)

Related Tags (7)


All Entries (59 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07TalkBlackhat Weaponizing Apple AI for Offensive Operations Hari Shanmugamai
2025-04-29TalkRsac XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World Aanchal Guptaai
2025-03-01PanelNullcon Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense Ajit Hatti, Varun Singlaai
2025-03-01TalkNullcon MLOps Under Attack: Threat Modeling Modern AI Systems Presentation Sandeep Singhaiml
2025-03-01TalkNullcon Reversing Large Deep learning AI Models Presentation Yashodhan Vivek Mandkeai
2024-11-28TalkBlackhat Threat Modelling the Generative AI Atul Kumarai
2024-11-27TalkBlackhat AI-Powered Cybersecurity: Promises & Perils Lakshmi Hanspalai
2024-11-27TalkBlackhat Generative AI in Supply Chain Security: Enhancing Container Protection Amid Regulatory Challenges Syed Aamiruddinai-securitysupply-chainsupply-chain-security+1
2024-11-26TalkBlackhat The Gen AI Double Agent Dilemma: Ally or Adversary Lakshmi Hanspalai
2024-11-15TalkC0c0n GenAI and Autonomous Security in the Age of Zero Trust Philip Varughese Vayarakunnilai
2024-11-15TalkC0c0n Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques Adrip Mukherjee, Vinay Kumarmachine-learning
2024-10-29TalkBlackhat Hacking Deepfake Image Detection System with White and Black Box Attacks Video Sagar Bhuredeepfake
2024-08-29Tool demoHitb Sec Conf AI Assisted Code Reviewer Rajanish Pathak, Hardik Mehtaai
2024-08-07Tool demoBlackhat Hacking generative AI with PyRIT Source Code Video Raja Sekhar Rao Dheekondaai
2023-12-06Tool demoBlackhat Octopii v2 Source Code Owais Shaikh, Umair Nehriai
2023-09-24PanelNullcon INTELLIGENCE-LED DEFENSE: LEVERAGING THREAT INTELLIGENCE IN THE AGE OF AI Avkash Kathiriya, Mathan Babu Kasilingam, Sanjay Bahl, Krishna Pandeyai
2023-09-23PanelNullcon WEAPONIZATION OF AI WITH SPECIAL REFERENCE TO GEN-AI Rahul Neel Mani, Manish Tiwari, Yogesh Kulkarni, Ambarish Kumar Singhai
2023-08-25TalkHitb Sec Conf Breaking ML Services: Finding 0-days in Azure Machine Learning Presentation Video Nitesh Suranamachine-learning
2023-08-10TalkBlackhat AI Assisted Decision Making of Security Review Needs for New Features Presentation Mrityunjay Gautamai
2023-08-09Tool demoBlackhat AntiSquat - An AI-Powered Phishing Domain Finder Source Code Owais Shaikh, Umair Nehriai
2023-08-07TalkC0c0n Putting a leash on AI Video Aditya Vasekarai
2023-08-06TalkC0c0n AI in Cyber Security and Crime Prevention Vishal Salviai
2023-08-06TalkC0c0n Cybersecurity in the Era of AI Video Suvin Mullaserilai
2022-08-11Tool demoBlackhat Octopii - AI-powered Personal Identifiable Information (PII) scanner Source Code Owais Shaikhai
2021-10-08TalkShell Con Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking Tamaghna Basuai
2021-08-05TalkBlackhat The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks Presentation Ambrish Rawatai
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharmapentestmachine-learning
2020-10-09TalkShell Con How I Created My Clone Using AI - Next-Gen Social Engineering Tamaghna Basuai
2020-10-07TalkRootcon ReconPal: Leveraging NLP for Infosec Source Code Video Nishant Sharma, Jeswin Mathaireconredteamnlp+1
2020-09-18TalkC0c0n How I created my clone using AI - next-gen Social Engineering Video Tamaghna Basuaicloneimpersonation
2020-09-18TalkC0c0n Deep Learning for Intrusion Attempt Detection Varun Kohlideep-learningmachine-learningblueteam
2020-08-06TalkBlackhat How I Created My Clone Using AI - Next-Gen Social Engineering Presentation Video Tamaghna Basuaiclonesocial-engineering+1
2020-08-05TalkBlackhat Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic Presentation Video Harini Kannanmachine-learningexploit-detectionblueteam
2020-03-06TalkNullcon InfoSec Deep Learning in Action Presentation Video Satnam Singhmldeep-learningblueteam
2019-10-17TalkHitb Sec Conf Advances in the Trinity of AI: Data, Algorithms & Compute Infrastructure Presentation Video Anima Anandkumaraideep-learning
2019-09-27TalkC0c0n AI, ML and Security Varun Kohliaimachine-learning
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy Johntorairedteam
2019-09-27TalkC0c0n Offensive Machine Learning for Pentesters and Red Teams Tamaghna Basumachine-learningpentestredteam
2019-08-08TalkBlackhat Death to the IOC: What’s Next in Threat Intelligence Presentation Video Bhavna Somanthreat-intelligencemachine-learningblueteam
2019-08-07TalkBlackhat Defense Against Rapidly Morphing DDOS Presentation Video Mudit Tyagiddosblueteammachine-learning
2019-05-21TalkPhdays GDALR: an efficient model duplication attack on black-box machine learning models Presentation Rewanth Tammana, Nikhil Joshiredteammachine-learning
2019-05-09TalkHitb Sec Conf GDALR: Duplicating Black Box Machine Learning Models Presentation Video Rewanth Tammana, Nikhil Joshimachine-learningredteamcloud
2019-03-28Tool demoBlackhat MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research Source Code Nilaksh Dascloudmachine-learningblueteam
2018-12-06TalkBlackhat AI Gone Rogue: Exterminating Deep Fakes Before They Cause Menace Presentation Whitepaper Video Vijay Thaware, Niranjan Agnihotriaiblueteamdeepfake
2018-11-27TalkHitb Sec Conf COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Presentation Video Vikash Yadavdeep-learningblueteam
2018-10-05TalkC0c0n Artificial Intelligence and Social Media Analytics in Criminal Investigation Amit Dubeyai
2018-10-05TalkC0c0n How can we use machine learning to prevent Frauds and password breaches Tamaghna Basumachine-learningblueteam
2018-09-06TalkGrrcon Analyzing Multi-Dimensional Malware Dataset Video Ankur Tyagiblueteamanalysismachine-learning
2018-03-01TalkNullcon A Game between Adversary and AI Scientist Presentation Video Satnam Singhaiblueteam
2017-12-07Tool demoBlackhat THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL Source Code Raghudeep KannavaraAutomationthreat-intelligencemachine-learning+1
2017-11-20TalkHackfest How my SV Machine nailed your Malware Nikhil P Kulkarnimobileandroidmachine-learning+1
2017-08-18TalkC0c0n Catching Network anomalies using Deep learning Aditya Vasekarmachine-learningdeep-learningnetwork
2017-08-18TalkC0c0n Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis Furqan Khan, Siddharth Anbalahanmachine-learningpentest
2017-07-26TalkBlackhat Wire Me Through Machine Learning Presentation Video Ankit Singh, Vijay Thawaremachine-learningredteam
2017-05-23TalkPhdays Practical machine learning in infosecurity Presentation Anto Josephmachine-learningapache-sparkredteam+2
2017-03-03TalkNullcon Tale of training a Web Terminator! Presentation Bharadwaj Machirajuwebmlpentest
2016-11-11TalkDeepsec Human vs Artificial intelligence – Battle of Trust Hemil Shahai
2016-05-17TalkPhdays Security Automation Based on Artificial Intelligence Video Rahul SasiaiAutomationblueteam
2016-03-11TalkNullcon Making Machines think about security for fun and profit Presentation Rahul SasiAutomationblueteamweb+2