blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1

Preview meta tags from the blog.trailofbits.com website.

Linked Hostnames

10

Thumbnail

Search Engine Appearance

Google

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1

Exploiting ML models with pickle file attacks: Part 1

We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]



Bing

Exploiting ML models with pickle file attacks: Part 1

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1

We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]



DuckDuckGo

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1

Exploiting ML models with pickle file attacks: Part 1

We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]

  • General Meta Tags

    7
    • title
      Exploiting ML models with pickle file attacks: Part 1 -The Trail of Bits Blog
    • charset
      UTF-8
    • viewport
      width=device-width,initial-scale=1
    • description
      We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]
    • article:section
      posts
  • Open Graph Meta Tags

    7
    • og:url
      https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/
    • og:site_name
      The Trail of Bits Blog
    • og:title
      Exploiting ML models with pickle file attacks: Part 1
    • og:description
      We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]
    • US country flagog:locale
      en_us
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:image
      https://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
    • twitter:title
      Exploiting ML models with pickle file attacks: Part 1
    • twitter:description
      We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]
  • Item Prop Meta Tags

    7
    • name
      Exploiting ML models with pickle file attacks: Part 1
    • description
      We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]
    • datePublished
      2024-06-11T09:00:36-04:00
    • dateModified
      2024-06-11T09:00:36-04:00
    • wordCount
      1763
  • Link Tags

    11
    • dns-prefetch
      //fonts.googleapis.com
    • dns-prefetch
      //fonts.gstatic.com
    • preconnect
      https://fonts.gstatic.com
    • shortcut icon
      /favicon.png
    • stylesheet
      https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap

Links

21