SlideShare a Scribd company logo
SESSION ID:
#RSAC
Ian Goodfellow
SECURITY AND PRIVACY OF
MACHINE LEARNING
Staff Research Scientist
Google Brain
@goodfellow_ian
(Goodfellow 2018)
#RSAC
Machine Learning and Security
2
Machine Learning for Security
Malware detection
Intrusion detection
…
Security against Attacks that use
Machine Learning
Password guessing
Fake reviews
…
(Goodfellow 2018)
#RSAC
Security of Machine Learning
3
(Goodfellow 2018)
#RSAC
An overview of a field
4
This presentation summarizes the work of many people, not just
my own / my collaborators
Download the slides for this link to extensive references
The presentation focuses on the concepts, not the history or the
inventors
(Goodfellow 2018)
#RSAC
Machine Learning Pipeline
5
Training data
Learning algorithm
Learned parameters
Test input
Test output
(Goodfellow 2018)
#RSAC
Privacy of Training Data
6
(Goodfellow 2018)
#RSAC
Defining (ε, δ)-Differential Privacy
7
(Abadi 2017)
(Goodfellow 2018)
#RSAC
Private Aggregation of Teacher Ensembles
8
(Papernot et al 2016)
(Goodfellow 2018)
#RSAC
Training Set Poisoning
9
(Goodfellow 2018)
#RSAC
ImageNet Poisoning
10
(Koh and Liang 2017)
(Goodfellow 2018)
#RSAC
Adversarial Examples
11
(Goodfellow 2018)
#RSAC
Model Theft
12
(Goodfellow 2018)
#RSAC
Model Theft++
13
(Goodfellow 2018)
#RSAC
Deep Dive on Adversarial Examples
14
...solving CAPTCHAS and
reading addresses...
...recognizing objects
and faces….
(Szegedy et al, 2014)
(Goodfellow et al, 2013)
(Taigmen et al, 2013)
(Goodfellow et al, 2013)
and other tasks...
Since 2013, deep neural networks have matched
human performance at...
(Goodfellow 2018)
#RSAC
Adversarial Examples
15
(Goodfellow 2018)
#RSAC
Turning objects into airplanes
16
(Goodfellow 2018)
#RSAC
Attacking a linear model
17
(Goodfellow 2018)
#RSAC
Wrong almost everywhere
18
(Goodfellow 2018)
#RSAC
Cross-model, cross-dataset transfer
19
(Goodfellow 2018)
#RSAC
Transfer across learning algorithms
20
(Papernot 2016)
(Goodfellow 2018)
#RSAC
Transfer attack
21
Train your
own model
Target model with
unknown weights,
machine learning
algorithm, training
set; maybe non-
differentiable
Substitute model
mimicking target
model with known,
differentiable function
Adversarial
examples
Adversarial crafting
against substitute
Deploy adversarial
examples against the
target; transferability
property results in them
succeeding
(Goodfellow 2018)
#RSAC
Enhancing Transfer with Ensembles
22
(Liu et al, 2016)
(Goodfellow 2018)
#RSAC
Transfer to the Human Brain
23
(Elsayed et al, 2018)
(Goodfellow 2018)
#RSAC
Transfer to the Physical World
24
(Kurakin et al, 2016)
(Goodfellow 2018)
#RSAC
Adversarial Training
25
(Goodfellow 2018)
#RSAC
Adversarial Training vs Certified Defenses
26
Adversarial Training:
Train on adversarial examples
This minimizes a lower bound on the true worst-case error
Achieves a high amount of (empirically tested) robustness on small to
medium datasets
Certified defenses
Minimize an upper bound on true worst-case error
Robustness is guaranteed, but amount of robustness is small
Verification of models that weren’t trained to be easy to verify is hard
(Goodfellow 2018)
#RSAC
Limitations of defenses
27
Even certified
defenses so far
assume unrealistic
threat model
Typical model:
attacker can change
input within some
norm ball
Real attacks will be
stranger, hard to
characterize ahead of
time (Brown et al., 2017)
(Goodfellow 2018)
#RSAC
Clever Hans
28
(“Clever Hans,
Clever Algorithms,”
Bob Sturm)
(Goodfellow 2018)
#RSAC
Get involved!
29
https://github.com/tensorflow/cleverhans
(Goodfellow 2018)
#RSAC
Apply What You Have Learned
30
Publishing an ML model or a prediction API?
Is the training data sensitive? -> train with differential privacy
Consider how an attacker could cause damage by fooling your
model
Current defenses are not practical
Rely on situations with no incentive to cause harm / limited amount of
potential harm

More Related Content

PDF
Privacy preserving machine learning
PDF
Security of Machine Learning
PPTX
Artificial Intelligence and Cybersecurity
PPTX
Federated Learning: ML with Privacy on the Edge 11.15.18
PPTX
Machine learning in Cyber Security
PPTX
Big Data Stockholm v 7 | "Federated Machine Learning for Collaborative and Se...
PDF
Fairness in Machine Learning and AI
PPTX
Machine Learning in Cyber Security
Privacy preserving machine learning
Security of Machine Learning
Artificial Intelligence and Cybersecurity
Federated Learning: ML with Privacy on the Edge 11.15.18
Machine learning in Cyber Security
Big Data Stockholm v 7 | "Federated Machine Learning for Collaborative and Se...
Fairness in Machine Learning and AI
Machine Learning in Cyber Security

What's hot (20)

PPTX
Application of Machine Learning in Cybersecurity
PPTX
Overfitting & Underfitting
PPT
Machine Learning
PPT
Machine learning
PPTX
Federated Learning
PPTX
Cyber security with ai
PPTX
Adversarial Attacks and Defense
PDF
Machine learning
PPTX
Overview of Artificial Intelligence in Cybersecurity
PDF
Adversarial Attacks and Defenses in Deep Learning.pdf
PPTX
AI and the Impact on Cybersecurity
PPTX
Federated Learning
PPT
Basics of Machine Learning
PPTX
cloud security ppt
PPTX
A Comprehensive Review of Large Language Models for.pptx
PDF
Machine Learning in Cyber Security Domain
PDF
Lecture 1: What is Machine Learning?
PDF
Data science workshop
PPTX
A brief primer on OpenAI's GPT-3
PDF
Generative AI: Past, Present, and Future – A Practitioner's Perspective
Application of Machine Learning in Cybersecurity
Overfitting & Underfitting
Machine Learning
Machine learning
Federated Learning
Cyber security with ai
Adversarial Attacks and Defense
Machine learning
Overview of Artificial Intelligence in Cybersecurity
Adversarial Attacks and Defenses in Deep Learning.pdf
AI and the Impact on Cybersecurity
Federated Learning
Basics of Machine Learning
cloud security ppt
A Comprehensive Review of Large Language Models for.pptx
Machine Learning in Cyber Security Domain
Lecture 1: What is Machine Learning?
Data science workshop
A brief primer on OpenAI's GPT-3
Generative AI: Past, Present, and Future – A Practitioner's Perspective
Ad

Similar to Security and Privacy of Machine Learning (20)

PPTX
slides_security_and_privacy_in_machine_learning.pptx
PDF
Machine learning cybersecurity boon or boondoggle
PDF
Bringing Red vs. Blue to Machine Learning
PPTX
Secure Machine Learning: Overcoming Algorithmic Bias, Adversarial ML, and Oth...
PDF
Securing AI - There Is No Try, Only Do!.pdf
PPTX
A Survey on Security and Privacy of Machine Learning
PPTX
Tricking a DNN with adversarial examples
PDF
Microsoft Research Faculty Summit - AI and Security
PDF
Adversarial ml
PDF
Machine learning security - Pawel Zawistowski, Warsaw University of Technolog...
PDF
Security in Machine Learning
PDF
Adversarial ML - Part 2.pdf
DOCX
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
DOCX
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
PDF
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
PPTX
2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...
PDF
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
PDF
Exploiting AI Models: Adversarial Attacks and Defense Mechanisms
PDF
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
PDF
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
slides_security_and_privacy_in_machine_learning.pptx
Machine learning cybersecurity boon or boondoggle
Bringing Red vs. Blue to Machine Learning
Secure Machine Learning: Overcoming Algorithmic Bias, Adversarial ML, and Oth...
Securing AI - There Is No Try, Only Do!.pdf
A Survey on Security and Privacy of Machine Learning
Tricking a DNN with adversarial examples
Microsoft Research Faculty Summit - AI and Security
Adversarial ml
Machine learning security - Pawel Zawistowski, Warsaw University of Technolog...
Security in Machine Learning
Adversarial ML - Part 2.pdf
Minor Project Report about Cyber security Effects on AI: Challenges and Mitig...
Minor Project ReportCyber security Effects on AI: Challenges and Mitigation S...
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
2019 Triangle Machine Learning Day - Mitigating Evasion Attacks to Deep Neura...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Exploiting AI Models: Adversarial Attacks and Defense Mechanisms
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
PDF
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
sap open course for s4hana steps from ECC to s4

Security and Privacy of Machine Learning