What You Need to Know Before
You Start
Starts 6 June 2025 12:16
Ends 6 June 2025
00
days
00
hours
00
minutes
00
seconds
The Double Agent: Flipping a GenAI Agent Behavior from Serving an Application to Attacking it using Promptwares
Explore PromptWare attacks that can manipulate GenAI agents from serving applications to attacking them, including DoS exploits and Advanced Promptware Threats that conduct reconnaissance and execute malicious activities.
Black Hat
via YouTube
Black Hat
2484 Courses
40 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Explore PromptWare attacks that can manipulate GenAI agents from serving applications to attacking them, including DoS exploits and Advanced Promptware Threats that conduct reconnaissance and execute malicious activities.
Syllabus
- Introduction to GenAI and Agent Architectures
- Understanding PromptWare
- Vulnerabilities in GenAI Agents
- PromptWare Attacks: From Utility to Threat
- DoS Exploits using PromptWare
- Advanced PromptWare Threats
- Detection and Defense Against PromptWare
- Ethical and Legal Considerations
- Future Trends and Research Directions
- Conclusion and Course Wrap-up
Overview of Generative AI Agents
Role of AI Agents in Applications
Basics of AI Agent Behavior and Security
Definition and History of PromptWare
Types of PromptWare: Benign vs. Malicious
Key Characteristics and Capabilities of PromptWare
Common Vulnerabilities in AI Models
Case Studies of AI System Exploits
Threat Models for GenAI Agents
Transition Mechanisms: Serving vs. Attacking
Methodologies for Flipping Agent Behavior
Case Study: Known Attacks and Their Impact
Understanding Denial of Service (DoS) in AI Systems
Techniques for Implementing DoS via PromptWare
Mitigation Strategies for DoS Attacks
Reconnaissance and Data Exfiltration
Execution of Malicious Activities
Real-world Examples of Advanced Threats
Techniques for Identifying Malicious PromptWare
Designing Robust AI Agent Defenses
Case Study: Successful Defense Implementations
Ethics of PromptWare Usage
Legal Implications of AI Security Exploits
Developing Responsible AI Systems
Emerging Threats in AI Security
Advancements in AI Defense Mechanisms
Opportunities for Research and Innovation
Recap of Key Learnings
Open Discussion on Future of AI Security
Resources for Continued Learning and Research
Subjects
Computer Science