AIs as Trusted Third Parties
March 28 2025This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act...
Read moreThis is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act...
Read moreNIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures.
Read moreThis tool seems to do a pretty good job.
The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for...
Read more
Initial results in using LLMs to unredact text based on the size of the individual-word redaction rectangles. This feels like something that a specialized ML system could be trained on.
Read moreNew research into poisoning AI models:
The researchers first trained the AI models using supervised learning and then used additional “safety training” methods, including more supervised learning, reinforcement learning,...
Read more
This is clever:
The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the...
Read more
Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“:
Abstract: For nearly two decades, CAPTCHAS have been widely used as a means of protection against bots. Throughout the...
Read more
Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy.
“A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards”
Abstract: With recent developments in deep...
Read more
Interesting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“:
Abstract: We demonstrate how images and sounds can be used for indirect prompt and instruction injection...
Read more
Recent Comments