Disclaimer: This article and all the associated exercises are for educational purposes only.
This is a short introduction on methods that use neural networks in an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring,
Most of the methods presented are accompanied by an exercise found in this repo. The full article can be found here in ‘Article.pdf‘ or on arXiv (uploaded soon).
Python and pip
Download and install Python3 and its package installer pip using a package manager or directly from the websitehttps://www.python.org/downloads/.
An editor is required to work with the code, preferably one that allows code highlighting for Python. Vim / Emacs will do. As a reference, all exercises were prepared using Visual Studio Codehttps://code.visualstudio.com/ docs / python / python-tutorial.
- Keras: Installing Keras can be tricky. We refer to the official installation guide athttps://keras.io/#installationand suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
- NumPyandSciPy: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPyhttps: //www.scipy .org / install.html.
- PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped.https://wiki.tiker.net/PyCuda/Installation
- NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises.https://www.nltk.org/install.html
- 0 – Last Layer Attack
- 1 – Backdooring
- 2 – Extracting Information
- 3 – Brute Forcing
- 4 – Neural Overflow
- 5 – Malware Injection
- 6 – Neural Obfuscation
- 7 – Bug Hunting
- 8 – GPU Attack
For instructions, please read the ‘ README.md ‘file in each of the exercise directories.
The neural networks found in the exercises are based on the examples provided byKeras.
Also check out Isao Takaesu’s course onSecurity and Machine Learning.
If you find that there are errors or missing references, feel free to make a PR or contact me.