| 2025-08-07 | Talk | Blackhat |
Weaponizing Apple AI for Offensive Operations
| Hari Shanmugam | #ai#macos#ai-security+2 |
| 2025-06-02 | Talk | Confidence |
Local LLMs in Action: Automating CTI to Connect the Dots
| Kai Iyer | #threat-intelligence-analysis#machine-learning#threat-detection+1 |
| 2025-03-01 | Panel | Nullcon |
AI in SecOps: Enhancing Incident Response with Intelligence
| Mrudul Uchil, Parag Deodhar, Felix Mohan | #ai-security#ai#machine-learning+3 |
| 2025-03-01 | Panel | Nullcon |
AI versus AI : Reimagining Security Operation
| Arnav Khorana, Prithvi Raju Alluri, Vinay Jain | #ai-security#ai#machine-learning |
| 2025-03-01 | Talk | Nullcon |
Reversing Large Deep learning AI Models
| Yashodhan Vivek Mandke | #ai#ai-security#deep-learning+2 |
| 2024-11-15 | Talk | C0c0n |
Breaking the Defences: In-Depth Analysis of EDR and AV Tampering Techniques
| Adrip Mukherjee, Vinay Kumar | #machine-learning#endpoint-protection#edr+1 |
| 2024-10-23 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#endpoint-protection+2 |
| 2024-08-07 | Tool demo | Blackhat |
Hacking generative AI with PyRIT
| Raja Sekhar Rao Dheekonda | #ai#ai-security#machine-learning+4 |
| 2024-04-19 | Tool demo | Blackhat |
Malware clustering using unsupervised ML : CalMal
| Himanshu Anand | #machine-learning#ai-security#malware-detection+3 |
| 2024-04-18 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security
| Sagar Bhure | #blueteam#machine-learning#security-analytics+3 |
| 2023-12-07 | Talk | Blackhat |
Unmasking APTs: An Automated Approach for Real-World Threat Attribution
| Aakansha Saha | #machine-learning#ai-security#static-analysis+1 |
| 2023-08-25 | Talk | Hitbsecconf |
Breaking ML Services: Finding 0-days in Azure Machine Learning
| Nitesh Surana | #machine-learning#cloud-access-security-broker#cloud-compliance+4 |
| 2023-08-25 | Tool demo | Hitbsecconf |
eBPFShield
| Sagar Bhure | #dns#machine-learning#security-tools+1 |
| 2023-08-09 | Tool demo | Blackhat |
eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security.
| Sagar Bhure | #kernel#machine-learning#forensics+4 |
| 2023-08-06 | Talk | C0c0n |
Cybersecurity in the Era of AI
| Suvin Mullaseril | #ai#ai-security#deep-learning+4 |
| 2023-08-06 | Panel | C0c0n |
Generative AI - An Industry Perspective
| Georgie Kurien, Balakrishnan A, Sreekumar Balachandran, V v Jacob, Sony A | #ai-security#deep-learning#machine-learning |
| 2023-05-12 | Tool demo | Blackhat |
eBPFShield: Advanced IP-Intelligence & DNS Monitoring using eBPF
| Sagar Bhure | #dns#machine-learning#network-monitoring+2 |
| 2021-10-08 | Keynote | Shellcon |
Keynote - Advanced Application of Adversarial AI for Scenario Based Hacking
| Tamaghna Basu | #ai#ai-security#deep-learning+4 |
| 2021-08-05 | Talk | Blackhat |
The Devil is in the GAN: Defending Deep Generative Models Against Adversarial Attacks
| Ambrish Rawat, Killian Levacher, Mathieu Sinn | #ai#ai-security#deep-learning+4 |
| 2021-08-04 | Tool demo | Blackhat |
Counterfit: Attacking Machine Learning in Blackbox Settings
| Raja Sekhar Rao Dheekonda, Will Pearce | #vulnerability-assessment#ai-security#machine-learning+2 |
| 2020-12-10 | Talk | Blackhat |
Effective Vulnerability Discovery with Machine Learning
| Asankhaya Sharma, Ming Yi Ang | #security-assessment#machine-learning#software-composition-analysis+4 |
| 2020-10-02 | Tool demo | Blackhat |
MalViz.ai
| Vasu Sethia, Shivam Kataria | #blueteam#machine-learning#deep-learning+3 |
| 2020-09-18 | Talk | C0c0n |
Automation in Bug Bounties to Work Smarter
| Prerak Mittal | #bug-hunting#bug-bounty#security-tools+4 |
| 2020-09-18 | Talk | C0c0n |
Deep Learning for Intrusion Attempt Detection
| Varun Kohli | #deep-learning#machine-learning#blueteam |
| 2020-08-22 | Talk | Thedianainitiative |
Automating Threat Hunting on the Dark Web and other nitty-gritty things
| Apurv Singh Gautam | #threat-hunting#nlp#machine-learning+1 |
| 2020-08-05 | Talk | Blackhat |
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic
| Harini Kannan, Nick Gregory | #machine-learning#exploit-detection#blueteam |
| 2020-03-06 | Talk | Nullcon |
Automated Classification of Web-Application Attacks for Intrusion Detection
| Aneet Kumar Dutta | #intrusion-detection#machine-learning#application-pentesting+3 |
| 2020-03-06 | Panel | Nullcon |
Predicting Danger: Building the Ideal Threat Intelligence Model
| Saikat Datta, Sandeep Sharma, Muslim Koser, Shankar Jadhav | #ai-security#machine-learning#nlp+3 |
| 2019-09-27 | Talk | C0c0n |
AI, ML and Security
| Varun Kohli | #ai#machine-learning#ai-security+2 |
| 2019-09-27 | Talk | C0c0n |
Offensive Machine Learning for Pentesters and Red Teams
| Tamaghna Basu | #machine-learning#security-assessment#red-teaming |
| 2019-08-08 | Talk | Blackhat |
Death to the IOC: What’s Next in Threat Intelligence
| Bhavna Soman | #threat-intelligence-analysis#machine-learning#blueteam |
| 2019-08-07 | Talk | Blackhat |
Defense Against Rapidly Morphing DDOS
| Mudit Tyagi, Mikhail Fedorov | #ddos#blueteam#machine-learning |
| 2019-05-21 | Talk | Phdays |
GDALR: an efficient model duplication attack on black-box machine learning models
| Rewanth Tammana, Nikhil Joshi | #red-teaming#machine-learning#api-security+3 |
| 2019-05-09 | Talk | Hitbsecconf |
GDALR: Duplicating Black Box Machine Learning Models
| Rewanth Tammana, Nikhil Joshi | #machine-learning#red-teaming#api-security+2 |
| 2019-03-28 | Tool demo | Blackhat |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
| Nilaksh Das, Evan Yang, Li Chen | #machine-learning#blueteam#ai-security+4 |
| 2019-03-01 | Panel | Nullcon |
Cybersecurity: Is Machine Learning the Answer?
| Rahul Sasi, Sitesh Behera, Sumeet Khokhani, Rui Bastos | #ai-security#machine-learning#ml |
| 2018-11-27 | Talk | Hitbsecconf |
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
| Vikash Yadav | #deep-learning#blueteam#ai-security+3 |
| 2018-10-05 | Talk | C0c0n |
How can we use machine learning to prevent Frauds and password breaches
| Tamaghna Basu | #machine-learning#blueteam#ai-security+4 |
| 2018-10-05 | Talk | C0c0n |
Predictive policing using Big Data analytics.
| Tarun Wig | #blueteam#data-analytics#data-protection+3 |
| 2018-10-03 | Tool demo | Blackhat |
Angad: A Malware Detection Framework Using Multi-Dimensional Visualization
| Ankur Tyagi | #malware-detection#static-analysis#dynamic-analysis+3 |
| 2018-09-06 | Talk | Grrcon |
Analyzing Multi-Dimensional Malware Dataset
| Ankur Tyagi | #blueteam#machine-learning#dynamic-analysis+1 |
| 2018-08-16 | Talk | Usenix |
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
| Vijay Balasubramaniyan | #threat-detection#architecture#machine-learning+1 |
| 2018-08-09 | Talk | Blackhat |
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
| Jugal Parikh, Randy Treit, Holly Stewart | #blueteam#ai-security#machine-learning+4 |
| 2018-03-01 | Talk | Nullcon |
A Game between Adversary and AI Scientist
| Satnam Singh | #ai#blueteam#ai-security+3 |
| 2017-12-07 | Tool demo | Blackhat |
THREAT MINER SDL - AUTOMATING THREAT INTELLIGENCE FOR SDL
| Raghudeep Kannavara | #threat-intelligence-analysis#machine-learning#security-development-lifecycle+4 |
| 2017-11-20 | Talk | Hackfest |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-08-18 | Talk | C0c0n |
Catching Network anomalies using Deep learning
| Aditya Vasekar | #machine-learning#deep-learning#ai-security |
| 2017-08-18 | Talk | C0c0n |
Penetration Testing Orchestrator: A Framework that leverages multi-tool penetration testing approach combined with Machine Learning-NLP for faster result analysis
| Furqan Khan, Siddharth Anbalahan | #machine-learning#security-assessment#nlp+4 |
| 2017-07-26 | Talk | Blackhat |
Wire Me Through Machine Learning
| Ankit Singh, Vijay Thaware | #machine-learning#red-teaming#ai-security+3 |
| 2017-06-24 | Talk | Lehack |
How my SV Machine nailed your Malware
| Nikhil Prabhakar | #android-security#machine-learning#malware-detection |
| 2017-05-23 | Talk | Phdays |
Practical machine learning in infosecurity
| Anto Joseph, Clarence Chio | #machine-learning#red-teaming#blueteam+1 |
| 2017-03-03 | Talk | Nullcon |
Tale of training a Web Terminator!
| Bharadwaj Machiraju | #ml#security-assessment#application-pentesting+4 |