blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2

Preview meta tags from the blog.trailofbits.com website.

Linked Hostnames

7

Thumbnail

Search Engine Appearance

Google

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2

Exploiting ML models with pickle file attacks: Part 2

In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]



Bing

Exploiting ML models with pickle file attacks: Part 2

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2

In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]



DuckDuckGo

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2

Exploiting ML models with pickle file attacks: Part 2

In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]

  • General Meta Tags

    7
    • title
      Exploiting ML models with pickle file attacks: Part 2 -The Trail of Bits Blog
    • charset
      UTF-8
    • viewport
      width=device-width,initial-scale=1
    • description
      In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
    • article:section
      posts
  • Open Graph Meta Tags

    7
    • og:url
      https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2/
    • og:site_name
      The Trail of Bits Blog
    • og:title
      Exploiting ML models with pickle file attacks: Part 2
    • og:description
      In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
    • US country flagog:locale
      en_us
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:image
      https://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
    • twitter:title
      Exploiting ML models with pickle file attacks: Part 2
    • twitter:description
      In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
  • Item Prop Meta Tags

    7
    • name
      Exploiting ML models with pickle file attacks: Part 2
    • description
      In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]
    • datePublished
      2024-06-11T11:00:17-04:00
    • dateModified
      2024-06-11T11:00:17-04:00
    • wordCount
      1158
  • Link Tags

    11
    • dns-prefetch
      //fonts.googleapis.com
    • dns-prefetch
      //fonts.gstatic.com
    • preconnect
      https://fonts.gstatic.com
    • shortcut icon
      /favicon.png
    • stylesheet
      https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap

Links

21