Hacker News new | past | comments | ask | show | jobs | submit login

So if a program's result is "no access", then AD can figure out how you can get access. Sounds like an important hacker tool.



Yes, these are “adversarial patches” in image classification, like https://arxiv.org/abs/1712.09665 . Similarly you can take these adversaries and add them to your own larger model, in an arms race.


Cryptography functions, I'd assume, are purposely non-differentiable.


I mean, “differential cryptanalysis” doesn’t go through AD, but I would be surprised if it’s not possible to get pretty close to a discrete analogue to AD using bit flips instead of differential and abstract interpretation.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: