Skip to content
GCC AI Research

Search

Results for "threat analysis"

Analyzing Threats of Large-Scale Machine Learning Systems

MBZUAI ·

A PhD candidate from the University of Waterloo presented on threats from large machine learning systems at MBZUAI. The talk covered data privacy during inference and the misuse of ML systems to generate deepfakes. The speaker also analyzed differential privacy and watermarking as potential solutions. Why it matters: Understanding and mitigating the risks of large ML systems is crucial for responsible AI development and deployment in the region.

LLM-based Multi-class Attack Analysis and Mitigation Framework in IoT/IIoT Networks

arXiv ·

This paper introduces a framework that combines machine learning for multi-class attack detection in IoT/IIoT networks with large language models (LLMs) for attack behavior analysis and mitigation suggestion. The framework uses role-play prompt engineering with RAG to guide LLMs like ChatGPT-o3 and DeepSeek-R1, and introduces new evaluation metrics for quantitative assessment. Experiments using Edge-IIoTset and CICIoT2023 datasets showed Random Forest as the best detection model and ChatGPT-o3 outperforming DeepSeek-R1 in attack analysis and mitigation.

How secure is AI-generated Code: A Large-Scale Comparison of Large Language Models

arXiv ·

A study compared the vulnerability of C programs generated by nine state-of-the-art Large Language Models (LLMs) using a zero-shot prompt. The researchers introduced FormAI-v2, a dataset of 331,000 C programs generated by these LLMs, and found that at least 62.07% of the generated programs contained vulnerabilities, detected via formal verification. The research highlights the need for risk assessment and validation when deploying LLM-generated code in production environments.

Iranian drone attacks on Amazon’s Gulf data centers a harbinger of new tactics in future conflicts, experts say - Fortune

GCC AI Events ·

A recent Fortune article discusses the potential vulnerability of Gulf data centers, including those operated by Amazon, to drone attacks. Experts suggest that Iranian-backed groups may employ such tactics in future regional conflicts. The hypothetical scenario raises concerns about data security and infrastructure resilience in the region. Why it matters: Highlights the increasing importance of protecting critical digital infrastructure in the GCC from emerging security threats.

Opossum Attack

TII ·

Researchers at TII, in cooperation with University Paderborn and Ruhr University Bochum, have discovered a vulnerability called the Opossum Attack in Transport Layer Security (TLS) impacting protocols like HTTP(S), FTP(S), POP3(S), and SMTP(S). The vulnerability exposes a risk of desynchronization between client and server communications, potentially leading to exploits like session fixation and content confusion. Scans revealed over 2.9 million potentially affected servers, including over 1.4 million IMAP servers and 1.1 million POP3 servers. Why it matters: This discovery highlights the importance of ongoing cybersecurity research in the UAE and internationally to identify and address vulnerabilities in fundamental internet protocols, especially as it led to immediate action by Apache and Cyrus IMAPd.

Iran weaponising ChatGPT in escalating cyber war against UAE, says official - Khaleej Times

The National ·

An official has claimed that Iran is weaponizing ChatGPT in an escalating cyber war against the UAE. This assertion highlights a concerning new dimension in state-sponsored cyber threats within the region. The use of advanced AI models like ChatGPT for malicious purposes signifies an evolving landscape of digital conflict. Why it matters: This development underscores the dual-use nature of advanced AI models and the increasing geopolitical implications of generative AI in cyber warfare and regional stability.