AI and ML Treat Modelling Resources

Threat modelling AI systems is a critical practice for understanding and mitigating potential vulnerabilities. This process involves identifying potential threats, assessing the risks, and developing strategies to defend against these threats. By proactively analysing the ways in which an AI system can be compromised, organizations can bolster their defences and ensure the integrity, confidentiality, and availability of their AI-driven solutions. Effective threat modelling not only addresses known attack vectors but also anticipates emerging threats, fostering a robust security posture in the ever-evolving landscape of AI technology.

ATLAS Matrix

ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a globally accessible, living knowledge base of adversary tactics and techniques against Al-enabled systems based on real-world attack observations and realistic demonstrations from Al red teams and security groups. The ATLAS Matrix shows the progression of tactics used in attacks.

https://atlas.mitre.org

The MIT – AI Risk Repository

The AI Risk Repository has three parts:

  • The AI Risk Database captures 1000+ risks extracted from 56 existing frameworks and classifications of AI risks
  • The Causal Taxonomy of AI Risks classifies how, when, and why these risks occur
  • The Domain Taxonomy of AI Risks classifies these risks into 7 domains (e.g., “Misinformation”) and 23 subdomains (e.g., “False or misleading information”)

https://airisk.mit.edu

The OWASP Gen AI Security Project

The OWASP Top 10 for LLM Applications list is a significant undertaking, built on the collective expertise of an international team of  more than 500 experts and over 150 active contributors. Our contributors come from diverse backgrounds, including AI companies, security companies, ISVs, cloud hyperscalers, hardware providers, and academia.

https://genai.owasp.org

https://genai.owasp.org/llm-top-10-2023-24/

https://genai.owasp.org/2025/01/31/owasp-ai-security-guidelines-offer-a-supporting-foundation-for-new-uk-government-ai-security-guidelines/

Introduction to Steganography

In this talk the history and basic concept of steganography is explained. Steganography is the art and science of hidden communication. There are examples showing image and audio steganography. This video is a back up for a lecture to LMU SCDM 2020/21 just in case MS Teams / BB Collaborate doesn’t work on the day.

What if you need to remain safe and secure online because your safety depended on it?

I attended a seminar today in which the role of identity was discussed in the context of gender. It was the first time I learnt the correct definition of gender vs. sex and gained an appreciation of how online and offline identity might play a role in peoples very personal journeys.

During the questions another interesting topic came up – if we had a general AI, what gender would it be?

As more of our lives and even our identities move on line, it occurred to me that protection of a persons online identities may have a safety implication, if not a privacy one. So as an exercise, the following links have been collated for me to share to those who ask for them:

Links

Get Safe Online – great all round privacy and protection advice

https://www.getsafeonline.org/

Digital privacy website

https://www.eff.org/

UK Government advice on staying safe with guides to each platform

https://www.ncsc.gov.uk/guidance/social-media-how-to-use-it-safely

Social media privacy guides from the Information Commissioner covering major platforms

https://ico.org.uk/your-data-matters/be-data-aware/social-media-privacy-settings/

 

Tools

The tools below are for when privacy becomes a priority beyond social engineering and casual snooping.

If your safety is dependant on your privacy you should consider technology solutions beyond just the settings on your social media accounts.

Signal – secure messaging

https://signal.org/en/

 

Tor – secure anonymised browsing

https://tor.eff.org/

Encryption – storage and email

https://www.openpgp.org/

Secure/Transient OS

https://tails.boum.org/

Journalist tools

https://www.journaliststoolbox.org/2021/02/05/security-tools/

https://gcatoolkit.org/journalists/

 

 

Interesting Articles

Interesting intersection between privacy, consent to process and the work of researchers…

https://twitter.com/schulite/status/1357714009181605889?s=21

Do your online photos respect your privacy?

https://www.kaspersky.co.uk/blog/exif-privacy/7893/

Anonymous Location Data Problems

https://youtu.be/vaOXxahojhQ

 

 

 

Your Safety Number Has Changed. Everyone is Joining Signal!

With the recent rush of people joining alternative messaging services, following the WhatsApp privacy policy update, I thought I’d take a look at how the signal protocol works. Luckily I didn’t need to look far as the good folks at Computerfile have already created some excellent explanatory videos.

It provides the answers to the questions:

How does end to end encryption work even when the message recipient isn’t online?
What does it mean when I get “your safety number has changed” from a trusted contact?
How do group chats preserve security?

The rest of the story…

And group messaging…..

 

 

 

 

Sampling Sound From Pictures

A great video came up in my YouTube feed today. A video from the excellent Computerphile channel caught my eye. It concerned turning pictures of sound waves back into audio files. It was entitled How NOT to Sample Audio!

The basic method used was as follows:

  • Get a screen grab of a sound file waveform (in the time domain)
  • Loop through the columns of the BMP picture file to find and extract the approximation of the waveform
  • Brightness is used to detect if the difference between background and the sound
  • A loop is used to pick out column max and min heights
  • Store these values as the sound (basically a series of values
  • To compensate for low resolution, a stretch is required to make up for fact the resolution of the image is less in columns than you would have samples, in an audio file
  • Values added between samples to enable the stretch
  • Add the WAV file header information to the series of numbers you have created

In the example in the film, an 8 Bit sound generated in a 35k file (ASCII). Clearly the WAV to graphics accuracy is dependant on the number of screen pixels used.

The result reminded me of the first voice synthesis I heard from the Commodore 64 game, Ghostbusters! The magic of hearing “you slimed me” is etched in my mind,

Reading the comments on the video I also noticed someone had mentioned a fascinating project called the Visual Microphone. A quick search of the internet revealed the following paper and website. The Visual Microphone: Passive Recovery of Sound from Video

http://people.csail.mit.edu/mrub/VisualMic/

That looks like the next rabbit hole to dive down…

Conference Paper Video With Bizarre Pandemic Timing

When you’re strange…

Possibly the oddest conference presentation ever. People from around the globe presenting papers remotely to an IEEE conference in China just after midnight on New Years Eve to New Years Day. The conference had to be postponed due to the pandemic and the new timing meant my presentation had to be at a session starting at the very dawn of the new year, remote, and also that recordings had to be provided in case the tech failed (recording below). I’m not sure how many of the delegates and presenters were sober but it made for a memorable, if not strange experience. Sorry but I had to miss Jools Holland this time!

Paper ID: IEEE TrustCom 2020 

Title: Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastucture for Sound  

Conference: The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020), Guangzhou, China, December 29, 2020 – January 1, 2021

Conference Website: http://www.ieee-trustcom.org/TrustCom…

Cyber Threat Modelling

As well as preparing a threat model for a new conceptual model I am developing for my research, I was recently asked to give an overview of how threat modelling can assist in architectural and design processes. The request was for a video presentation and so I had two requirements to revisit this topic. Time for revision!

So this post is a landing page for my unlisted YouTube video and useful links I might need to reference. In other words, more useful to me than anyone else who ends up here on their travels!

The video covers:

  • What is threat modelling?
  • What is it used for and why do it?
  • What is the link between threat intelligence and threat modelling?
  • What is the relationship between threat modelling and risk assessment?
  • Example
  • Emerging uses, techniques and tools
  • References & resources

Links and resources:

Link between TM and Risk:

https://www2.cso.com.au/article/664928/link-between-threat-modelling-risk-management/

Microsoft tooling:

https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling

https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool

https://docs.microsoft.com/en-us/archive/msdn-magazine/2009/january/security-briefs-getting-started-with-the-sdl-threat-modeling-tool

Learning TM:

https://medium.com/@roberthurlbut/learning-about-threat-modeling-3f6811e7520c

https://www.mitre.org/sites/default/files/publications/pr_18-1174-ngci-cyber-threat-modeling.pdf

OWASP Application Threat Modelling

https://owasp.org/www-community/Application_Threat_Modeling

CIS Benchmarks

https://www.cisecurity.org/cis-benchmarks/

STRIDE Threat Modelling with Examples

https://www2.slideshare.net/GirindroPringgoDigdo/threat-modeling-using-stride?from_action=save

Adam Shostack

https://adam.shostack.org/blog/category/threat-modeling/

 

 

 

 

ADVERSARIAL CYBER SECURITY

Today I was privileged to give a talk at the excellent DST-UKIERI VIRTUAL WORKSHOP ON ADVERSARIAL CYBER SECURITY. Due to Covid-19 the event was virtual. It was a collaboration between UKIERI, India Institute of Technology Mandi, Department of Science & Technology, London Metropolitan University, C-MRiC, British Council, Carnegie Mellon University and others. 

Full details to the programme:
http://acslab.org/ukieri/

The subject of my talk was entitled “Enhancing Cyber Security Using Audio Techniques” and described my research into a new authentication model using audio steganography.

Super useful resource outlining a new Cyber Recovery Operational Framework was also presented offering a new focus on cyber recovery activities as opposed to the majority of guidance frameworks aimed at protection, detection and response.
https://cyberframework.c-mric.com

CCSP Boot Camp Capture

Here’s some of the cool stuff I captured on a CCSP boot camp in December 2019.

First up is a list of books, websites, and videos recommended by our instructor:

The Art of Profiling: Reading People Right the First Time Hardcover – 1 Jul 2012

by Dan Korem

A recommendation for red teaming. The book details a system for rapid-fire profiling people after just a few minutes of interaction. Used by USAF for gaining confidence and entry to site etc.

CSA Security Trust Assurance and Risk (STAR)

A site to find out about major cloud service providors audits and assurance. The Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Companies who use STAR indicate best practices and validate the security posture of their cloud offerings.

https://cloudsecurityalliance.org/star/

Consensus Assessments Initiative Questionnaire v3.0.1

The “cake” is the defacto standard supplier assessment questionnaire. 

The CAIQ is based upon the CCM and provides a set of questions to ask a CSP: https://cloudsecurityalliance.org/artifacts/consensus-assessments-initiative-questionnaire-v3-0-1/

Cloud Security Alliance – Privacy Level Agreement

https://cloudsecurityalliance.org/research/working-groups/privacy-level-agreement/

STIGS

Useful security configuration guides from the Defense Information Systems Agency (DISA) called the Security Technical Implementation Guides (STIGs). 500+ guides covering all platforms and systems.

https://public.cyber.mil/stigs/downloads/

OODA Loop 

Like the Plan / Do / Check / Act (PDCA) cycle the OODA Loop was a military interpretation of the Demming model used by the USAF https://en.wikipedia.org/wiki/OODA_loop

Can be applied in a cyber context.

Scientists Extract RSA Key from GnuPG Using Sound of CPU

Keys can now be extracted from hardware / chips using microphones:

“In their research paper titled RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Daniel Genkin, Adi Shamir and Eran Tromer et al. present a method for extracting decryption keys from the GnuPG security suite using an interesting side-channel attack. By analysing the acoustic sound made by the CPU they were able to extract a 4096-bit RSA key in about an hour (PDF). A modern mobile phone placed next to the computer is sufficient to carry out the attack, but up to four meters have been successfully tested using specially designed microphones.”

https://it.slashdot.org/story/13/12/18/2122226/scientists-extract-rsa-key-from-gnupg-using-sound-of-cpu

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

http://www.cs.tau.ac.il/~tromer/acoustic/

https://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf

Data Protection in Outer Space

Following a discussion about cloud hosting in the ocean, the discussion turned to what happens about data protection and privacy in space. It turns out its already been thought about:

https://www2.deloitte.com/nl/nl/pages/risk/articles/privacy-in-space.html

https://iclg.com/practice-areas/data-protection-laws-and-regulations/2-the-application-of-data-protection-laws-in-outer-space

There has already been a cyber crime in space!

Common Criteria

Common Criteria (CC) is an internationally recognised certification scheme for security enforcing products:

https://www.commoncriteriaportal.org/products/

https://www.ncsc.gov.uk/information/common-criteria-0

This is the source of the evaluations that give the EAL ratings (which rarely exceed 4 in civilian applications).

Public Key Exchange Videos

Public key cryptography – Diffie-Hellman Key Exchange (full version)

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm.

From Art of the Problem

Also (not shown on the course)

Public Key Cryptography: RSA Encryption Algorithm

Distrusted Certificate Authority

Symantec’s SSL / Certificate Authority / PKI business was sold to Digicert following Googles decision to not trust Symantec certs in Chrome:

https://en.wikipedia.org/wiki/DigiCert

OWASP Top Ten Proactive Controls Project:

The Top 10 Proactive Controls

The goal of the OWASP Top 10 Proactive Controls project (OPC) is to raise awareness about application security by describing the most important areas of concern that software developers must be aware of. 

The list is ordered by importance with list item number 1 being the most important:

C1: Define Security Requirements

C2: Leverage Security Frameworks and Libraries

C3: Secure Database Access

C4: Encode and Escape Data

C5: Validate All Inputs

C6: Implement Digital Identity

C7: Enforce Access Controls

C8: Protect Data Everywhere

C9: Implement Security Logging and Monitoring

C10: Handle All Errors and Exceptions

https://www.owasp.org/images/b/bc/OWASP_Top_10_Proactive_Controls_V3.pdf

Also of use is the OWASP The Ten Most Critical Web Application Security Risks

https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf

The Fallacy of the “Zero-Trust Network” Video 

Funny and usual vitriolic content about de-perimeterisation. Basically the Jerico foundation anger brought up to date for the cloud and zero trust age:

Some useful content.

Privacy-first – DNS service

The 1.1.1.1 is a free Domain Name System (DNS) service that is supposed to protect privacy. There is also a mobile app. Run by cloudflare.

https://en.wikipedia.org/wiki/1.1.1.1

Chaos Engineering

Netflix have developed resilience testing tools that initiate process kills, network failurse and other issues that test resiliency of services:

https://en.wikipedia.org/wiki/Chaos_engineering

Network and Security Monitoring

Zeek is the new name for the long-established Bro system. Bro was used by the instructors business to monitor multiple businesses along with Zabbix.

Security Onion

Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, Wazuh, Sguil, Squert, CyberChef, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

https://securityonion.net/

Zabbix

Monitor anything with Zabbix. Solutions for any kind of IT infrastructure, services, applications, resources.

https://www.zabbix.com/

Kibana

Kibana is an open source data visualization dashboard for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster.

https://en.wikipedia.org/wiki/Kibana

Snort NIDS

https://www.snort.org/

Critical Stack

Capital ONE’s secure container orchestration 

https://criticalstack.com/

PSTools

https://docs.microsoft.com/en-us/sysinternals/downloads/pstools

Also Mark Russinovich is now CTO of Microsoft Azure https://en.wikipedia.org/wiki/Mark_Russinovich

Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition

The group remembered the contribution of Shon Harris and apert from her CISSP book the following book was recommended:

Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs.

The Cathedral & the Bazaar

The book on open source software is by Eric S. Raymond. Interesting point made – how come with no central leadership can open source be better? Many eyes means less faults.

Daily News Feeds

Bleeping Computer – Website

https://www.bleepingcomputer.com/

The 443 – Security Simplified – Podcast

https://www.secplicity.org/category/the-443/

Windows Logging Recommendation

The best windows logging resource recommended on the internet is Randy’s:

https://www.ultimatewindowssecurity.com/

SPAM and Scam Beating:

Comedian James Veitch / Veech: The agony of trying to unsubscribe | James Veitch – TED Talk on Youtube (and other related videos)

Also – good old:

https://www.419eater.com/

https://www.419eater.com/html/john_boko.htm

Cloud Infrastructure as Code

Use Infrastructure as Code to provision and manage any cloud, infrastructure, or service with Terraform:

https://www.terraform.io/

General Bits and Pieces

Blackhat Europe Keynote – Malwaretech 

Bluetooth Vulnerability for Android and IOT

https://en.wikipedia.org/wiki/BlueBorne_(security_vulnerability)

Police using dogs to sniff out thumb drives

https://www.theverge.com/2018/6/11/17449002/police-k9-training-thumb-drives

Insider Threat: US Military example

https://en.wikipedia.org/wiki/John_Anthony_Walker

Google random rewards and recognition

Oracle / Sun Micro Systems ZFS file system

George Gilder: Visionary – Highly Recommended Author by the Instructor

Life after Television (1985) by George Gilder – for told the way we use the internet today

Life after Google (2018) – predicts the shift away from current advertising driven model

The Feynman Technique Model

To memorise things, write them down then say them out loud. More detail at:

https://mattyford.com/blog/2014/1/23/the-feynman-technique-model

Kali Linux Adds ‘Undercover’ Mode to Impersonate Windows 10

https://www.bleepingcomputer.com/news/security/kali-linux-adds-undercover-mode-to-impersonate-windows-10/

Agile Manifesto

Bill Gates – “The source code is the documentation”

Exploits of a Mom – XKCD

Innovators Dilemma – Book

Carbon Black – VM Ware tools

ISO References

27001

27002

27017

27018

27050

27037

31000

15408

19086-1. -2.  -3

19941

19944

19933

27036

22237

19441

11889

17788

27034-1

22301

27031

27034

20000

20050

18788

270017

270018