SlideShare a Scribd company logo
1 of 28
Download to read offline
The Duality of Gen AI: From
Glitches to Guardians
Trupti Shiralkar
About me
●Software & Product security professional
- MS In Security Engineering, Johns Hopkins University
- Founder, TrueNil.io
- Previously led ProdSec at Datadog, Illumio, Amazon, Q2, ATSEC & HP
●Yoga Alliance Certified Instructor(200 hours)
- Breathing exercises
- Meditation
●When I am not doing security
- Public speaking (30+ conferences)
- Mindfulness promoter
- Paint
- Community building
LinkedIn - /trupti-shiralkar-0a085a8/
Email - s.trupts@gmail.com
Gratitude
Special Thanks
• Prashant Venkatesh
• OWASP SV chapter
organizers
My Machine Learning
Support group
• Pallavi Tyagi
• Abraham Kang
• Satish Narale
NIST Trustworthy & Responsible AI team
• Apostol Vassilev
• Alina Oprea
• Alie Fordyce
Agenda
• Why learn about AI, Gen AI & securing them?
• The Basics
• Go Purple - Adversarial attacks & Defenses
• Leverage Gen AI to augment security solutions
and operations
• Get started with your Gen AI Security Journey
Astronomical Growth in Gen AI
• 80% enterprises are adopting LLMs
by 2026
• EU law enforcement predicts 90%
of online content will be AI-made.
• Open AI's platform fuels a booming
app market with 2 million
developers.
• Generative AI is set for a massive
$180 billion growth in eight years
• 5000+ startups in Gen AI space
Why it is important to learn Gen AI
• Complex LLM Life cycle
• Architectural choices
matter
• Intricate data pathways
• Attack surface is evolving
• Use cases vary based on
problem statement and
the industry vertical
Evaluation
LLM
Definition
Data
Collection
Fine
Tuning
Data
Cleaning
Model
Architecture
Pre
Training
Deployment
Feedback
& Iteration
Monitoring
Fig 1: Basic LLM building Life cycle
Fig 2: Fine tuning LLMs Ref: Debmalya Biswas
Back to basics …
Fig 3: Overview of AI
LLM ~Gen AI +NLP
Artificial Intelligence (AI): Computers or machines that can think and learn like
humans
Machine Learning (ML): Teaching computers to learn from data, kind of like how we
learn from experience
Deep Learning (DL): A part of machine learning, where computers use "neural
networks" to learn, inspired by our brain's structure
Natural Language Processing (NLP): Making computers understand and talk in
human language
Predictive AI: Leverages historic data for future trend forecasting
Generative AI (Gen AI): Application of AI that is cable of generating text, images,
videos based on prompt
Large Language Model(LLM): AI model that can understand and generate human
like text
NLP GEN AI
LLM
Fig 4: LLM~ intersection
of NLP & Gen AI
Basics of Gen AI
• Tokenization: Process of converting raw text into smaller units
such as words or subwords so that model can understand during
the training phase.
• Embeddings: Converting words or tokens into high-dimensional
vectors, so that LLMs can learn the relationships .
• Transformer Architecture: Utilizing transformer-based neural
network architectures for processing and generating text data
efficiently.
Supervised Machine Learning
Data Gathering
and
understanding
(X)
Prediction
(Y)
Feature
Engineering
Feature
Selection
Test Data
(input X)
Model
Training
(multiple
sets of (x,y)
Model
Testing
Data Cleaning & formatting
Modeling
Known
Questions
Known
Answers
Unknown
Questions
Answers
f(x)
Data engineering
Fig 5: Overview of supervised ML
Deep Learning
Deep Neural Net Prediction
Known
Questions
Known
Answers
Un-Known
Questions
Answers
Data Gathering
and
understanding
Prediction
Feature
Engineering
Feature
Selection
Test Data
Model
Training
Model
Testing
Data Cleaning
Modeling
Data Gathering
and
understanding
Fig 6: Overview of Deep Learning
Transformer
It should get us same input
as output
Input Input
Encoder
Neural Net
Decoder
Neural Net
Fig 6: Transformer
Transformer
Known Questions Known Answers
Unknown
Questions
Answers
Known-Sentence
part-1
Known-Sentence
part-2
Known-Sentence
part-1
Un Known- part-2
Encoder
Neural Net
Decoder
Neural Net
Fig 7: Transformer architecture
Basics of Gen AI
• Attention Mechanism: Allowing the model to focus on relevant
parts of the input text when generating responses or making
predictions during training and inference phase.
• Pre-training: Training the model on a large corpus of text data to
learn general language patterns and structures.
• Fine-tuning: Fine-tuning the pre-trained model on specific
downstream tasks to adapt it to particular applications, such as
text generation, translation, or sentiment analysis.
• Decoding Mechanism: Generating coherent and contextually
relevant text based on learned patterns and input prompts
Adversarial attacks & defenses
Adversarial Machine Learning
Attack techniques used to fool or misguide a model with malicious input
Data
Public
API
Infrastructure
Model
Data protection, privacy attacks
Classic API/web
attacks, prompt
injections
Firewalls, IDS,
encryption mechanisms
Access controls
Tampering of model
architectures,
parameters, I/O
Ethics
Weaponization of
LLMs, unethical use
Bias, misinformation
Fig 8: AML attack surface
Hallucinations
Resource
Control
Source Data
Control
Training
Data
Control
Query
Access
Availability
Indirect
Prompt Injection
Denial of Service
Data poisoning
Increased Computation
Prompt Injection
Resource
Control
Source Data
Control
Training
Data
Control
Query
Access
Abuse
Indirect
Prompt Injection
Prompt Injection
Resource
Control
Source Data
Control
Training
Data
Control
Query
Access
Integrity
Prompt Injection
Indirect
Prompt Injection
Misaligned
Input
Targeting Poisoning
Data Poisoning
Backdoor Poisoning
R
e
s
o
u
r
c
e
C
o
n
t
r
o
l
Q
u
e
r
y
A
c
c
e
s
s
Model
Privacy
Data
Q
u
e
r
y
A
c
c
e
s
s
R
e
s
o
u
r
c
e
C
o
n
t
r
o
l
Prompt Injection
Prompt Extraction
Backdoor
Poisoning
Indirect
Prompt Injection
Unauthorized
Disclosure
Training Data
Attacks Data Extraction
Membership Inference
Information
Gathering
Fig 9: NIST’s Taxonomy of
attacks on Gen AI system
Red teaming
perspective ..
Ref: MITRE ATLAS Metrix
Ref: MITRE ATLAS Metrix
Red teaming
perspective ..
Augment security solutions and
operations
AppSec Static Code Analysis
Automated Security Incident
Response
Vulnerability discovery,
correlation and
prioritization
03
04
02
01
Security content,
awareness
Training Creation
Social Engineering detection
Malware Analysis & Detection
Vulnerability discovery,
correlation and
prioritization
07
08
06
05
Security content,
awareness
Training Creation
Duality
• Sophisticated social engineering attacks
• Gen AI generated Code exploits &
Malware
• Productivity improvements vs ethical
responsibility
Question: Do we need ML models to combat
above issues?
Get started AI Security Journey
• General understanding: Talk to data science expert
• Outline the objective of your learning
• NIST’s Trustworthy & responsible AI
• EU AI ACT
• Mitre ATLAS
• OWASP AI & LLM top 10
• OWASP Comprehensive checklist
• Open-source tooling
• Build GPTs ~ Llama, open AI
Open-Source security Efforts
• WhyLabs LLM security
• CalypsoAI Moderator
• Adversa AI
• LLM attack Chains by Praetorian
• LLMGuard
• Lakera
• LLM Guardian
• Burp GPT
• Garak – Vuln scanners for LLMs
Additional resources
THEORY AND PRACTICE: MACHINE
LEARNING INTRODUCTION WITH
THREATS AND VULNERABILITIES ~
Abraham Kang, Blackhat (Aug 3-6)
Link: https://www.blackhat.com/us-24/training/schedule/#theory-and-practice-
machine-learning-introduction-with-threats-and-vulnerabilities-37480

More Related Content

Similar to Guardians and Glitches: Navigating the Duality of Gen AI in AppSec

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AIKeita Broadwater
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
High time to add machine learning to your information security stack
High time to add machine learning to your information security stackHigh time to add machine learning to your information security stack
High time to add machine learning to your information security stackMinhaz A V
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Avinash Ramineni
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13ISSIP
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Vaibhav Mishra
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityRishi Kant
 
Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...LinkedIn Talent Solutions
 
AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017Przemek Berendt
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackAlistair Gillespie
 
Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Ivo Andreev
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseSoftServe
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
How to classify documents automatically using NLP
How to classify documents automatically using NLPHow to classify documents automatically using NLP
How to classify documents automatically using NLPSkyl.ai
 
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu RamachandranDataScienceConferenc1
 

Similar to Guardians and Glitches: Navigating the Duality of Gen AI in AppSec (20)

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
High time to add machine learning to your information security stack
High time to add machine learning to your information security stackHigh time to add machine learning to your information security stack
High time to add machine learning to your information security stack
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
 
Japan 20200724 v13
Japan 20200724 v13Japan 20200724 v13
Japan 20200724 v13
 
Every thing about Artificial Intelligence
Every thing about Artificial Intelligence Every thing about Artificial Intelligence
Every thing about Artificial Intelligence
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...Artificial Intelligence disruption: How technologies are predicted to change ...
Artificial Intelligence disruption: How technologies are predicted to change ...
 
AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017AI in Talent Acquisition - Talent Connect 2017
AI in Talent Acquisition - Talent Connect 2017
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2Cybersecurity and Generative AI - for Good and Bad vol.2
Cybersecurity and Generative AI - for Good and Bad vol.2
 
SRE[in]con 2019
SRE[in]con 2019SRE[in]con 2019
SRE[in]con 2019
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
How to classify documents automatically using NLP
How to classify documents automatically using NLPHow to classify documents automatically using NLP
How to classify documents automatically using NLP
 
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran
[DSC Europe 22] AI Ethics and AI Quality By Design - Muthu Ramachandran
 

More from Trupti Shiralkar, CISSP

IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxTrupti Shiralkar, CISSP
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditationTrupti Shiralkar, CISSP
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...Trupti Shiralkar, CISSP
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...Trupti Shiralkar, CISSP
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Trupti Shiralkar, CISSP
 

More from Trupti Shiralkar, CISSP (11)

IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
 
Zerotrusting serverless applications protecting microservices using secure d...
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec

  • 1. The Duality of Gen AI: From Glitches to Guardians Trupti Shiralkar
  • 2. About me ●Software & Product security professional - MS In Security Engineering, Johns Hopkins University - Founder, TrueNil.io - Previously led ProdSec at Datadog, Illumio, Amazon, Q2, ATSEC & HP ●Yoga Alliance Certified Instructor(200 hours) - Breathing exercises - Meditation ●When I am not doing security - Public speaking (30+ conferences) - Mindfulness promoter - Paint - Community building LinkedIn - /trupti-shiralkar-0a085a8/ Email - s.trupts@gmail.com
  • 3. Gratitude Special Thanks • Prashant Venkatesh • OWASP SV chapter organizers My Machine Learning Support group • Pallavi Tyagi • Abraham Kang • Satish Narale NIST Trustworthy & Responsible AI team • Apostol Vassilev • Alina Oprea • Alie Fordyce
  • 4. Agenda • Why learn about AI, Gen AI & securing them? • The Basics • Go Purple - Adversarial attacks & Defenses • Leverage Gen AI to augment security solutions and operations • Get started with your Gen AI Security Journey
  • 5. Astronomical Growth in Gen AI • 80% enterprises are adopting LLMs by 2026 • EU law enforcement predicts 90% of online content will be AI-made. • Open AI's platform fuels a booming app market with 2 million developers. • Generative AI is set for a massive $180 billion growth in eight years • 5000+ startups in Gen AI space
  • 6. Why it is important to learn Gen AI • Complex LLM Life cycle • Architectural choices matter • Intricate data pathways • Attack surface is evolving • Use cases vary based on problem statement and the industry vertical Evaluation LLM Definition Data Collection Fine Tuning Data Cleaning Model Architecture Pre Training Deployment Feedback & Iteration Monitoring Fig 1: Basic LLM building Life cycle
  • 7. Fig 2: Fine tuning LLMs Ref: Debmalya Biswas
  • 8. Back to basics … Fig 3: Overview of AI
  • 9. LLM ~Gen AI +NLP Artificial Intelligence (AI): Computers or machines that can think and learn like humans Machine Learning (ML): Teaching computers to learn from data, kind of like how we learn from experience Deep Learning (DL): A part of machine learning, where computers use "neural networks" to learn, inspired by our brain's structure Natural Language Processing (NLP): Making computers understand and talk in human language Predictive AI: Leverages historic data for future trend forecasting Generative AI (Gen AI): Application of AI that is cable of generating text, images, videos based on prompt Large Language Model(LLM): AI model that can understand and generate human like text NLP GEN AI LLM Fig 4: LLM~ intersection of NLP & Gen AI
  • 10. Basics of Gen AI • Tokenization: Process of converting raw text into smaller units such as words or subwords so that model can understand during the training phase. • Embeddings: Converting words or tokens into high-dimensional vectors, so that LLMs can learn the relationships . • Transformer Architecture: Utilizing transformer-based neural network architectures for processing and generating text data efficiently.
  • 11. Supervised Machine Learning Data Gathering and understanding (X) Prediction (Y) Feature Engineering Feature Selection Test Data (input X) Model Training (multiple sets of (x,y) Model Testing Data Cleaning & formatting Modeling Known Questions Known Answers Unknown Questions Answers f(x) Data engineering Fig 5: Overview of supervised ML
  • 12. Deep Learning Deep Neural Net Prediction Known Questions Known Answers Un-Known Questions Answers Data Gathering and understanding Prediction Feature Engineering Feature Selection Test Data Model Training Model Testing Data Cleaning Modeling Data Gathering and understanding Fig 6: Overview of Deep Learning
  • 13. Transformer It should get us same input as output Input Input Encoder Neural Net Decoder Neural Net Fig 6: Transformer
  • 14. Transformer Known Questions Known Answers Unknown Questions Answers Known-Sentence part-1 Known-Sentence part-2 Known-Sentence part-1 Un Known- part-2 Encoder Neural Net Decoder Neural Net Fig 7: Transformer architecture
  • 15. Basics of Gen AI • Attention Mechanism: Allowing the model to focus on relevant parts of the input text when generating responses or making predictions during training and inference phase. • Pre-training: Training the model on a large corpus of text data to learn general language patterns and structures. • Fine-tuning: Fine-tuning the pre-trained model on specific downstream tasks to adapt it to particular applications, such as text generation, translation, or sentiment analysis. • Decoding Mechanism: Generating coherent and contextually relevant text based on learned patterns and input prompts
  • 17. Adversarial Machine Learning Attack techniques used to fool or misguide a model with malicious input Data Public API Infrastructure Model Data protection, privacy attacks Classic API/web attacks, prompt injections Firewalls, IDS, encryption mechanisms Access controls Tampering of model architectures, parameters, I/O Ethics Weaponization of LLMs, unethical use Bias, misinformation Fig 8: AML attack surface Hallucinations
  • 18. Resource Control Source Data Control Training Data Control Query Access Availability Indirect Prompt Injection Denial of Service Data poisoning Increased Computation Prompt Injection Resource Control Source Data Control Training Data Control Query Access Abuse Indirect Prompt Injection Prompt Injection Resource Control Source Data Control Training Data Control Query Access Integrity Prompt Injection Indirect Prompt Injection Misaligned Input Targeting Poisoning Data Poisoning Backdoor Poisoning R e s o u r c e C o n t r o l Q u e r y A c c e s s Model Privacy Data Q u e r y A c c e s s R e s o u r c e C o n t r o l Prompt Injection Prompt Extraction Backdoor Poisoning Indirect Prompt Injection Unauthorized Disclosure Training Data Attacks Data Extraction Membership Inference Information Gathering Fig 9: NIST’s Taxonomy of attacks on Gen AI system
  • 19. Red teaming perspective .. Ref: MITRE ATLAS Metrix
  • 20. Ref: MITRE ATLAS Metrix Red teaming perspective ..
  • 21. Augment security solutions and operations
  • 22. AppSec Static Code Analysis Automated Security Incident Response Vulnerability discovery, correlation and prioritization 03 04 02 01 Security content, awareness Training Creation
  • 23. Social Engineering detection Malware Analysis & Detection Vulnerability discovery, correlation and prioritization 07 08 06 05 Security content, awareness Training Creation
  • 24. Duality • Sophisticated social engineering attacks • Gen AI generated Code exploits & Malware • Productivity improvements vs ethical responsibility Question: Do we need ML models to combat above issues?
  • 25. Get started AI Security Journey
  • 26. • General understanding: Talk to data science expert • Outline the objective of your learning • NIST’s Trustworthy & responsible AI • EU AI ACT • Mitre ATLAS • OWASP AI & LLM top 10 • OWASP Comprehensive checklist • Open-source tooling • Build GPTs ~ Llama, open AI
  • 27. Open-Source security Efforts • WhyLabs LLM security • CalypsoAI Moderator • Adversa AI • LLM attack Chains by Praetorian • LLMGuard • Lakera • LLM Guardian • Burp GPT • Garak – Vuln scanners for LLMs
  • 28. Additional resources THEORY AND PRACTICE: MACHINE LEARNING INTRODUCTION WITH THREATS AND VULNERABILITIES ~ Abraham Kang, Blackhat (Aug 3-6) Link: https://www.blackhat.com/us-24/training/schedule/#theory-and-practice- machine-learning-introduction-with-threats-and-vulnerabilities-37480