Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Security and Machine Learning in the Real World (2007.07205v1)

Published 13 Jul 2020 in cs.CR, cs.LG, and stat.ML

Abstract: Machine learning (ML) models deployed in many safety- and business-critical systems are vulnerable to exploitation through adversarial examples. A large body of academic research has thoroughly explored the causes of these blind spots, developed sophisticated algorithms for finding them, and proposed a few promising defenses. A vast majority of these works, however, study standalone neural network models. In this work, we build on our experience evaluating the security of a machine learning software product deployed on a large scale to broaden the conversation to include a systems security view of these vulnerabilities. We describe novel challenges to implementing systems security best practices in software with ML components. In addition, we propose a list of short-term mitigation suggestions that practitioners deploying machine learning modules can use to secure their systems. Finally, we outline directions for new research into machine learning attacks and defenses that can serve to advance the state of ML systems security.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Ivan Evtimov (24 papers)
  2. Weidong Cui (4 papers)
  3. Ece Kamar (37 papers)
  4. Tadayoshi Kohno (32 papers)
  5. Jerry Li (81 papers)
  6. Emre Kiciman (25 papers)
Citations (15)

Summary

We haven't generated a summary for this paper yet.