
blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2
Preview meta tags from the blog.trailofbits.com website.
Linked Hostnames
7- 9 links toblog.trailofbits.com
- 7 links togithub.com
- 1 link togohugo.io
- 1 link toinfosec.exchange
- 1 link tolinkedin.com
- 1 link tonews.ycombinator.com
- 1 link totwitter.com
Thumbnail

Search Engine Appearance
Exploiting ML models with pickle file attacks: Part 2
In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
Bing
Exploiting ML models with pickle file attacks: Part 2
In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
DuckDuckGo

Exploiting ML models with pickle file attacks: Part 2
In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
General Meta Tags
7- titleExploiting ML models with pickle file attacks: Part 2 -The Trail of Bits Blog
- charsetUTF-8
- viewportwidth=device-width,initial-scale=1
- descriptionIn part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
- article:sectionposts
Open Graph Meta Tags
7- og:urlhttps://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2/
- og:site_nameThe Trail of Bits Blog
- og:titleExploiting ML models with pickle file attacks: Part 2
- og:descriptionIn part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
og:locale
en_us
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
- twitter:titleExploiting ML models with pickle file attacks: Part 2
- twitter:descriptionIn part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
Item Prop Meta Tags
7- nameExploiting ML models with pickle file attacks: Part 2
- descriptionIn part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
- datePublished2024-06-11T11:00:17-04:00
- dateModified2024-06-11T11:00:17-04:00
- wordCount1158
Link Tags
11- dns-prefetch//fonts.googleapis.com
- dns-prefetch//fonts.gstatic.com
- preconnecthttps://fonts.gstatic.com
- shortcut icon/favicon.png
- stylesheethttps://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap
Links
21- https://blog.trailofbits.com
- https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory
- https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1
- https://blog.trailofbits.com/2025/08/07/aixcc-finals-tale-of-the-tape
- https://blog.trailofbits.com/2025/08/08/buttercup-is-now-open-source