
Sign up to save your podcasts
Or


Listen to this interview of Nicholas Boucher, PhD, Department of Computer Science and Technology, Cambridge University, UK. We talk about his coauthored paper Bad Characters: Imperceptible NLP Attacks (SP 2022) — and check out, too, Nicholas's presentation of the paper here.
Nicholas Boucher: "Maybe what is interesting about the security domain is that, oftentimes, in these attack papers, you start with a hypothesis, but it's an hypothesis already informed by some result you've observed in the wild — so, you've seen some sort of system — or, to be concrete, in our case, we saw people switching between alphabets on keyboards, and that enabled us to notice how such an action could interact with the language models quickly growing in popularity — and it is at that point that a security researcher will say, 'Wow, I have something here. I know that this is a vulnerability.' But then the questioning begins, like, how to frame the vulnerability, that is, how to turn one specific example (which the researcher has a strong feeling really is a vulnerability) and uplevel it to something larger. Because that is when, in my opinion, the researcher's starting to ask very fruitful questions."
Learn more about your ad choices. Visit megaphone.fm/adchoices
Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
By New Books4.3
147147 ratings
Listen to this interview of Nicholas Boucher, PhD, Department of Computer Science and Technology, Cambridge University, UK. We talk about his coauthored paper Bad Characters: Imperceptible NLP Attacks (SP 2022) — and check out, too, Nicholas's presentation of the paper here.
Nicholas Boucher: "Maybe what is interesting about the security domain is that, oftentimes, in these attack papers, you start with a hypothesis, but it's an hypothesis already informed by some result you've observed in the wild — so, you've seen some sort of system — or, to be concrete, in our case, we saw people switching between alphabets on keyboards, and that enabled us to notice how such an action could interact with the language models quickly growing in popularity — and it is at that point that a security researcher will say, 'Wow, I have something here. I know that this is a vulnerability.' But then the questioning begins, like, how to frame the vulnerability, that is, how to turn one specific example (which the researcher has a strong feeling really is a vulnerability) and uplevel it to something larger. Because that is when, in my opinion, the researcher's starting to ask very fruitful questions."
Learn more about your ad choices. Visit megaphone.fm/adchoices
Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

3,330 Listeners

3,917 Listeners

314 Listeners

2,118 Listeners

147 Listeners

1,460 Listeners

134 Listeners

1,532 Listeners

181 Listeners

1,590 Listeners

2,380 Listeners

805 Listeners

290 Listeners

16,525 Listeners

347 Listeners