Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Designing and Participating in AI Bug Bounty Programs

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced AI security vulnerabilities and bug bounty strategies in this comprehensive conference talk from DEF CON 33. Dive deep into real-world AI attack vectors including adversarial prompts, indirect prompt injection, context poisoning, and RAG (Retrieval-Augmented Generation) manipulation techniques. Learn why conventional security defenses frequently fail against AI-specific threats and discover actionable methodologies for identifying high-impact vulnerabilities in AI systems. Master practical approaches for uncovering unique AI flaws that traditional security testing might miss, and develop skills for effectively communicating the severity and business impact of discovered vulnerabilities to organizations. Gain fresh attack perspectives, strategic frameworks for AI security research, and proven techniques for maximizing earnings in AI-focused bug bounty programs through hands-on technical demonstrations and expert insights from experienced security researchers.

Syllabus

DEF CON 33 - Designing and Participating in AI Bug Bounty Programs - Dane Sherrets, Shlomie Liberow

Taught by

DEFCONConference

Reviews

Start your review of Designing and Participating in AI Bug Bounty Programs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.