What You Need to Know Before
You Start

Starts 6 June 2025 12:16

Ends 6 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

The Double Agent: Flipping a GenAI Agent Behavior from Serving an Application to Attacking it using Promptwares

Explore PromptWare attacks that can manipulate GenAI agents from serving applications to attacking them, including DoS exploits and Advanced Promptware Threats that conduct reconnaissance and execute malicious activities.
Black Hat via YouTube

Black Hat

2484 Courses


40 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Video

Optional upgrade avallable

Overview

Explore PromptWare attacks that can manipulate GenAI agents from serving applications to attacking them, including DoS exploits and Advanced Promptware Threats that conduct reconnaissance and execute malicious activities.

Syllabus

  • Introduction to GenAI and Agent Architectures
  • Overview of Generative AI Agents
    Role of AI Agents in Applications
    Basics of AI Agent Behavior and Security
  • Understanding PromptWare
  • Definition and History of PromptWare
    Types of PromptWare: Benign vs. Malicious
    Key Characteristics and Capabilities of PromptWare
  • Vulnerabilities in GenAI Agents
  • Common Vulnerabilities in AI Models
    Case Studies of AI System Exploits
    Threat Models for GenAI Agents
  • PromptWare Attacks: From Utility to Threat
  • Transition Mechanisms: Serving vs. Attacking
    Methodologies for Flipping Agent Behavior
    Case Study: Known Attacks and Their Impact
  • DoS Exploits using PromptWare
  • Understanding Denial of Service (DoS) in AI Systems
    Techniques for Implementing DoS via PromptWare
    Mitigation Strategies for DoS Attacks
  • Advanced PromptWare Threats
  • Reconnaissance and Data Exfiltration
    Execution of Malicious Activities
    Real-world Examples of Advanced Threats
  • Detection and Defense Against PromptWare
  • Techniques for Identifying Malicious PromptWare
    Designing Robust AI Agent Defenses
    Case Study: Successful Defense Implementations
  • Ethical and Legal Considerations
  • Ethics of PromptWare Usage
    Legal Implications of AI Security Exploits
    Developing Responsible AI Systems
  • Future Trends and Research Directions
  • Emerging Threats in AI Security
    Advancements in AI Defense Mechanisms
    Opportunities for Research and Innovation
  • Conclusion and Course Wrap-up
  • Recap of Key Learnings
    Open Discussion on Future of AI Security
    Resources for Continued Learning and Research

Subjects

Computer Science