
blog.trailofbits.com/2023/11/15/assessing-the-security-posture-of-a-widely-used-vision-model-yolov7
Preview meta tags from the blog.trailofbits.com website.
Linked Hostnames
13- 9 links toblog.trailofbits.com
- 8 links togithub.com
- 2 links toarxiv.org
- 1 link tocsrc.nist.gov
- 1 link todocs.google.com
- 1 link togohugo.io
- 1 link toinfosec.exchange
- 1 link toinfosec.mozilla.org
Thumbnail

Search Engine Appearance
Assessing the security posture of a widely used vision model: YOLOv7
TL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
Bing
Assessing the security posture of a widely used vision model: YOLOv7
TL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
DuckDuckGo

Assessing the security posture of a widely used vision model: YOLOv7
TL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
General Meta Tags
7- titleAssessing the security posture of a widely used vision model: YOLOv7 -The Trail of Bits Blog
- charsetUTF-8
- viewportwidth=device-width,initial-scale=1
- descriptionTL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
- article:sectionposts
Open Graph Meta Tags
7- og:urlhttps://blog.trailofbits.com/2023/11/15/assessing-the-security-posture-of-a-widely-used-vision-model-yolov7/
- og:site_nameThe Trail of Bits Blog
- og:titleAssessing the security posture of a widely used vision model: YOLOv7
- og:descriptionTL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
og:locale
en_us
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
- twitter:titleAssessing the security posture of a widely used vision model: YOLOv7
- twitter:descriptionTL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
Item Prop Meta Tags
7- nameAssessing the security posture of a widely used vision model: YOLOv7
- descriptionTL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]
- datePublished2023-11-15T10:15:05-05:00
- dateModified2023-11-15T10:15:05-05:00
- wordCount2267
Link Tags
11- dns-prefetch//fonts.googleapis.com
- dns-prefetch//fonts.gstatic.com
- preconnecthttps://fonts.gstatic.com
- shortcut icon/favicon.png
- stylesheethttps://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap
Links
29- https://arxiv.org/abs/2302.10149
- https://arxiv.org/pdf/2207.02696.pdf
- https://blog.trailofbits.com
- https://blog.trailofbits.com/2021/03/15/never-a-dill-moment-exploiting-machine-learning-pickle-files
- https://blog.trailofbits.com/2022/10/03/semgrep-maching-learning-static-analysis