Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

When Attackers Tune In - Weaponizing LLM Tuning for Stealthy C2 and Exfiltration

BSidesLV via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a cutting-edge cybersecurity conference talk that demonstrates how attackers can weaponize large language model fine-tuning techniques to establish covert command and control channels and conduct data exfiltration. Learn about a proof-of-concept attack methodology that leverages LLM tuning capabilities to create stealthy communication pathways that evade traditional detection methods. Discover the technical challenges attackers face when implementing these techniques, including issues with model hallucinations and maintaining consistency in covert communications. Examine the defender's perspective on identifying and mitigating these novel attack vectors, understanding why these LLM-based threats present unique detection difficulties for security teams. Gain insights into the intersection of artificial intelligence and offensive security, exploring how machine learning advancements can be exploited for malicious purposes and what this means for the future of cybersecurity defense strategies.

Syllabus

- Date/Time: Monday, 17:00–17:20

Taught by

BSidesLV

Reviews

Start your review of When Attackers Tune In - Weaponizing LLM Tuning for Stealthy C2 and Exfiltration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.