-
| Keywords | References | link |
|-------------------------------|-------------------------------|---------------------------------|
| D…
-
## 一言でいうと
ブラックボックスで画像分類モデルにバックドアを設置する手法。細工データを注入した学習データを攻撃対象モデルに学習させることで、特定の入力データを攻撃者が意図したクラスに分類させることが可能。細工データは見た目に違和感がないため、ラベリング工程でデータの異常を検知することは困難。
### 論文リンク
https://arxiv.org/abs/1905.05897
…
-
My research shows mixed results on wheter or not sending ARP replies is possible on an ESP32.
On the one hand, Bruce already uses IwIP to send ARP requests as part of the host scan feature, but fro…
-
- [ ] Is there existing cheatsheets at [OWASP Cheatsheets](https://cheatsheetseries.owasp.org/Glossary.html)
- [ ] If there is an existing cheatsheet, does it need updating at the source to cater for …
-
**Chapter 17 - Robust AI**
- First and foremost, this chapter was incredibly long -- nearly double the size of some of the other lengthier chapters in this book. It was so much material that it was…
-
### Prerequisites
- [X] I have checked the [Wiki](https://github.com/AdguardTeam/AdGuardHome/wiki) and [Discussions](https://github.com/AdguardTeam/AdGuardHome/discussions) and found no answer
- [X]…
-
Cilium expects overlay traffic to originate from other nodes in the cluster, and uses the VNI field to transport the source's security identity.
As a low-effort defense against spoofed VXLAN / GENE…
-
Okay I wrote out a whole bug report, but I realized it's not quite right. What happened is that I switched in a pokemon with Focus Bands (Mega Riotte in the provided save file) into an attack in lateg…
-
The specification now seemed to lack properties about the relationship between models and datasets. All I can see about this information is the property "informationAboutTraining". However, there are …
-
Recently Scam sniffer released [a dune dashboard](https://dune.com/scamsniffer/address-poisoning-attack) with some address poisoning attacks. Attaching [the thread here](https://x.com/realScamSniffer/…