Andrei Cotaie and Tiberiu Boros in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The slides and other presentations can be found on https://def.camp/archive
Axa Assurance Maroc - Insurer Innovation Award 2024
Weaponizing Neural Networks. In your browser!
1. Weaponizing Neural Networks
<html>In your browser!</html>
<p>Andrei Cotaie – Senior Security Engineer</p>
<p>Tiberiu Boros - Computer Scientist</p>
Or how to abuse neural networks in learning stupid stuff !
2. The opinions and views expressed in this presentation are based on our
independent research and does not relate on our employer.
The research presented in this presentation should only be used for
educational purposes.
3. Do we trust
machine learning ?
Where are we going?
Where do we come from?
What are we?
5. What we're
going to talk
about
• JavaScript
• Machine Learning
• Neural networks
• Hiding intelligence (overfitting)
• Training of a NN
• Executing NN in HTML pages
• Reverse Engineering the NN JSON/JS
• Natural and Embedded AntiForensic
6. A .js world
Into the Browser:
JavaScript is used by 94.9% of all the websites
Out of the browser:
Wscript.exe, Cscript.exe, node, jsc, rhino etc
JS desktop applications frameworks:
Electron
8. .js obfuscation...
• The GOOD, The BAD and The UGLY
• Obfuscation != Encryption
HOW TO obfuscate your life:
• Dead Code insertion
• Subroutine reordering
• Code transposition
• Instruction substitution
• Code integration
• Register reassignment
32. Antiforensic
• Maybe delete or undefine the
variables/objects ?
(delete OR unset)
• And maybe more legit cover channels might
help
• Make sure transitions between NN calls are
made untraceable. Add some intelligence to
that ?
36. Take away
• Do IT yourself! You can Float too! (using any ML
package)
• Statically reverting input data is almost impossible
using just the latent representations
• Whenever great minds create something
innovative, lazy evil minds will abuse it
• Do we trust neural networks to run in our browsers?