Vai offline con l'app Player FM !
Think Security, Write Security
Manage episode 457911888 series 2917054
Listen to this interview of Nicholas Boucher, PhD, Department of Computer Science and Technology, Cambridge University, UK. We talk about his coauthored paper Bad Characters: Imperceptible NLP Attacks (SP 2022) — and check out, too, Nicholas's presentation of the paper here.
Nicholas Boucher: "Maybe what is interesting about the security domain is that, oftentimes, in these attack papers, you start with a hypothesis, but it's an hypothesis already informed by some result you've observed in the wild — so, you've seen some sort of system — or, to be concrete, in our case, we saw people switching between alphabets on keyboards, and that enabled us to notice how such an action could interact with the language models quickly growing in popularity — and it is at that point that a security researcher will say, 'Wow, I have something here. I know that this is a vulnerability.' But then the questioning begins, like, how to frame the vulnerability, that is, how to turn one specific example (which the researcher has a strong feeling really is a vulnerability) and uplevel it to something larger. Because that is when, in my opinion, the researcher's starting to ask very fruitful questions."
Learn more about your ad choices. Visit megaphone.fm/adchoices
364 episodi
Manage episode 457911888 series 2917054
Listen to this interview of Nicholas Boucher, PhD, Department of Computer Science and Technology, Cambridge University, UK. We talk about his coauthored paper Bad Characters: Imperceptible NLP Attacks (SP 2022) — and check out, too, Nicholas's presentation of the paper here.
Nicholas Boucher: "Maybe what is interesting about the security domain is that, oftentimes, in these attack papers, you start with a hypothesis, but it's an hypothesis already informed by some result you've observed in the wild — so, you've seen some sort of system — or, to be concrete, in our case, we saw people switching between alphabets on keyboards, and that enabled us to notice how such an action could interact with the language models quickly growing in popularity — and it is at that point that a security researcher will say, 'Wow, I have something here. I know that this is a vulnerability.' But then the questioning begins, like, how to frame the vulnerability, that is, how to turn one specific example (which the researcher has a strong feeling really is a vulnerability) and uplevel it to something larger. Because that is when, in my opinion, the researcher's starting to ask very fruitful questions."
Learn more about your ad choices. Visit megaphone.fm/adchoices
364 episodi
Tutti gli episodi
×Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.