meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday Feb 19th: ModelScan AI Model Security; OpenSSH Vuln; Juniper Patches; Dell BIOS Vulnerability

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 February 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Tuesday Feb 19th: ModelScan AI Model Security; OpenSSH Vuln; Juniper Patches; Dell BIOS Vulnerability

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, February 19th,

0:03.4

2025 edition of the Sands and then at Storm Center's Stormcast.

0:09.1

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.0

Well, today we got Russ McReyback, our handler after a hiatus.

0:19.8

And the first diary really addresses a topic that I've covered a couple

0:24.9

times here. And that's, well, malicious machine learning models. When you're downloading a

0:30.6

machine learning model from a site like Hacking Face, well, you're typically downloading a pickle

0:36.2

file. The problem with pickle files is they are Python code.

0:40.9

So as you're instantiating the model,

0:43.7

you're potentially execute Python code,

0:46.8

which could be malicious,

0:49.1

which could execute operating system commands

0:51.4

and all kinds of evil things that attackers like to do to your system.

0:56.6

This could even happen if you're using the torch load command, the Pi-torch module,

1:04.8

torch load may also instantiate models unless you specifically only have the weights-only parameters set that will

1:13.2

only load weights for the model, not to complete any Python code or so that's potentially

1:19.1

being added to the model. Now, to help you with this task to figure out if a particular

1:26.4

machine learning model that you downloaded is malicious or not,

1:30.5

Russ introduces a tool called model scan.

1:34.4

Model scan does, well, what you would expect it to do based on the name.

1:38.0

It will scan your machine learning model and tell you if there is any suspect code in this machine-learning model.

1:45.3

Russ has sort of a quick run-through of that model scan tool with a benign and a malicious

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.