SlideShare a Scribd company logo
1
Supply Chain
Security
For
Open Source Models
• M.sc in applied math
• A year in Goethe universitat FFM
• AI researcher in various domains
• More than 10 patents AI & Cyber
• Academic papers on AI & AI ethic
• Official author at TDS
• Representing Israel in QC stand.
• A little of YouTube presence
• Co-founder of LuminAI Security!
natan.katz@gmail.com
natan.katz@luminaisec.com
https://www.linkedin.com/in/natan-katz-2936425/
J J
Models
History
3
Before Hugging Face
Until 20172018 models were nearly always a in-house product.
• The organization aggregated data
• Upon LOBʼs request data scientists trained models
• Deployment- R&D with LOBʼs oversight
Costs:
• Data storage
• DevOps
• Cloud resources
• Data scientists spent their time on “dark laborˮ
Results depend on the amount of data and the quality of the work
Open Source Models
• Attention is all you need 2017
• Model zoo began to appear Hugging Face
What does the organization gain?
• Data scientists need significantly less data
• Flexible : Extremely easy to modify their task
AI Security Before ChatGPT
The focus is mainly on the model files:
• Pickle files are wrapped by operational code
• This code can be vulnerable
SAAS  Chat GPT
November 2022
• OpenAI releases ChatGPT
• Some other players appear Anthropic)
New Security Challenges
• Chat GPT is used by all the organization
• CISOs begin to ask questions
• A new set of security challenges was born
OWASP LLM 2023
InputOutput handling
Data Leakage Prevention
Which
One
is
Better?
9
Open Source models security- Supply chain
Open Source Models - Benefits
• Privacy - You don't share your data
• R&D Efforts - It is extremely easy to customize
• BI Flexibility - Easy to modify the model upon the organization needs
• Cost - Only the cloud
Cyber
Security
In
Open Source Models
Open Source models security- Supply chain
Everyone can upload and even fake his
affiliation Data scientists hardly ever care about
security
Security?! - “They lost to Bayern last week
didn't they? I prefer basketballˮ
Open Source Models - Risks
• Free upload- Everyone can upload and even fake his affiliation Meta
• Web Security tests - Hardly exists
• Hackersʼ motivationDevelopers rely on open-source. Attackers use that.
• Data scientists don't care too much about security
What do CISOs think?
• CISOs rarely talk to ds
“I don't know about open source model. I guess there are noˮ
• CISOs can take the hard decision:
“Open-source models are risky we don't useˮ No AI.
• CISOs focus mainly on the data itself and not on the models
“We have rule based solutions for PI & PII“
Securing AI Development. Protecting AI-Powered Applications.
OWASP ML
Poisoned
Models
Open Source models security- Supply chain
Open Source models security- Supply chain
Intrinsic
Vulnerabilities
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain
Open Source models security- Supply chain

More Related Content

PPTX
AI Open-Source Models- Benefits vs. Risks.
PPTX
Decentralized AI for the Rest of Us
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
PDF
A Mashup with Backbone
PPTX
The Journey to DevSecOps
PPTX
The Journey to DevSecOps
PDF
Defcon 23 - damon small - beyond the scan
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
AI Open-Source Models- Benefits vs. Risks.
Decentralized AI for the Rest of Us
Beyond the Scan: The Value Proposition of Vulnerability Assessment
A Mashup with Backbone
The Journey to DevSecOps
The Journey to DevSecOps
Defcon 23 - damon small - beyond the scan
[Webinar] Building a Product Security Incident Response Team: Learnings from ...

Similar to Open Source models security- Supply chain (20)

PPTX
Threat Modeling In 2021
PPTX
Data In Action: Business Value of Data
PPTX
Research, the Cloud, and the IRB
PPTX
Managing AI Products
PDF
Lean Security
PPTX
Technology in Teaching, Research & Admin’: Some Quick Wins & Data Protection
PPTX
Protect your Database with Data Masking & Enforced Version Control
PDF
Learning Silicon Valley Culture
PPTX
CIO 360 grados: empoderamiento total
PDF
Keith prabhu global high on cloud summit
PDF
BSides Vienna 2015
PDF
Security Training: Making your weakest link the strongest - CircleCityCon 2017
PPTX
2014 - KSU - So You Want to Be in Cyber Security?
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
PDF
IT security for all. Bootcamp slides
PDF
ICP for Data- Enterprise platform for AI, ML and Data Science
PPTX
Patterns for Successful Data Science Projects (Spark AI Summit)
PDF
Ciso executive forum 2013
PDF
Secured Development
PDF
Mr. Burhan Khalid - secure dev.
Threat Modeling In 2021
Data In Action: Business Value of Data
Research, the Cloud, and the IRB
Managing AI Products
Lean Security
Technology in Teaching, Research & Admin’: Some Quick Wins & Data Protection
Protect your Database with Data Masking & Enforced Version Control
Learning Silicon Valley Culture
CIO 360 grados: empoderamiento total
Keith prabhu global high on cloud summit
BSides Vienna 2015
Security Training: Making your weakest link the strongest - CircleCityCon 2017
2014 - KSU - So You Want to Be in Cyber Security?
Outpost24 webinar: Turning DevOps and security into DevSecOps
IT security for all. Bootcamp slides
ICP for Data- Enterprise platform for AI, ML and Data Science
Patterns for Successful Data Science Projects (Spark AI Summit)
Ciso executive forum 2013
Secured Development
Mr. Burhan Khalid - secure dev.
Ad

More from Natan Katz (19)

PDF
AI HIT taught in HIT always believe thanks
PPTX
final_v.pptx
PPTX
AI for PM.pptx
PPTX
SGLD Berlin ML GROUP
PPTX
Ancestry, Anecdotes & Avanan -DL for Amateurs
PDF
Cyn meetup
PDF
Finalver
PDF
Foundation of KL Divergence
PDF
Quant2a
PPTX
Bismark
PPTX
Bayesian Neural Networks
PDF
Deep VI with_beta_likelihood
PPTX
NICE Research -Variational inference project
PPTX
NICE Implementations of Variational Inference
PPTX
PDF
Reinfrocement Learning
PPTX
Neural ODE
PDF
Variational inference
PPTX
GAN for Bayesian Inference objectives
AI HIT taught in HIT always believe thanks
final_v.pptx
AI for PM.pptx
SGLD Berlin ML GROUP
Ancestry, Anecdotes & Avanan -DL for Amateurs
Cyn meetup
Finalver
Foundation of KL Divergence
Quant2a
Bismark
Bayesian Neural Networks
Deep VI with_beta_likelihood
NICE Research -Variational inference project
NICE Implementations of Variational Inference
Reinfrocement Learning
Neural ODE
Variational inference
GAN for Bayesian Inference objectives
Ad

Recently uploaded (20)

PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Lecture1 pattern recognition............
PPTX
Database Infoormation System (DBIS).pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
1_Introduction to advance data techniques.pptx
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Introduction to machine learning and Linear Models
PPTX
Computer network topology notes for revision
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Data_Analytics_and_PowerBI_Presentation.pptx
ISS -ESG Data flows What is ESG and HowHow
Qualitative Qantitative and Mixed Methods.pptx
IB Computer Science - Internal Assessment.pptx
Lecture1 pattern recognition............
Database Infoormation System (DBIS).pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
1_Introduction to advance data techniques.pptx
Introduction-to-Cloud-ComputingFinal.pptx
Business Analytics and business intelligence.pdf
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Introduction to machine learning and Linear Models
Computer network topology notes for revision
Acceptance and paychological effects of mandatory extra coach I classes.pptx

Open Source models security- Supply chain

  • 2. • M.sc in applied math • A year in Goethe universitat FFM • AI researcher in various domains • More than 10 patents AI & Cyber • Academic papers on AI & AI ethic • Official author at TDS • Representing Israel in QC stand. • A little of YouTube presence • Co-founder of LuminAI Security! natan.katz@gmail.com natan.katz@luminaisec.com https://www.linkedin.com/in/natan-katz-2936425/ J J
  • 4. Before Hugging Face Until 20172018 models were nearly always a in-house product. • The organization aggregated data • Upon LOBʼs request data scientists trained models • Deployment- R&D with LOBʼs oversight Costs: • Data storage • DevOps • Cloud resources • Data scientists spent their time on “dark laborˮ Results depend on the amount of data and the quality of the work
  • 5. Open Source Models • Attention is all you need 2017 • Model zoo began to appear Hugging Face What does the organization gain? • Data scientists need significantly less data • Flexible : Extremely easy to modify their task
  • 6. AI Security Before ChatGPT The focus is mainly on the model files: • Pickle files are wrapped by operational code • This code can be vulnerable
  • 7. SAAS  Chat GPT November 2022 • OpenAI releases ChatGPT • Some other players appear Anthropic)
  • 8. New Security Challenges • Chat GPT is used by all the organization • CISOs begin to ask questions • A new set of security challenges was born OWASP LLM 2023 InputOutput handling Data Leakage Prevention
  • 11. Open Source Models - Benefits • Privacy - You don't share your data • R&D Efforts - It is extremely easy to customize • BI Flexibility - Easy to modify the model upon the organization needs • Cost - Only the cloud
  • 14. Everyone can upload and even fake his affiliation Data scientists hardly ever care about security Security?! - “They lost to Bayern last week didn't they? I prefer basketballˮ
  • 15. Open Source Models - Risks • Free upload- Everyone can upload and even fake his affiliation Meta • Web Security tests - Hardly exists • Hackersʼ motivationDevelopers rely on open-source. Attackers use that. • Data scientists don't care too much about security
  • 16. What do CISOs think? • CISOs rarely talk to ds “I don't know about open source model. I guess there are noˮ • CISOs can take the hard decision: “Open-source models are risky we don't useˮ No AI. • CISOs focus mainly on the data itself and not on the models “We have rule based solutions for PI & PII“
  • 17. Securing AI Development. Protecting AI-Powered Applications. OWASP ML