← All Webinars | L.A.B.S. #10
AI in Practice: Part 5 | How to Mitigate AI Security Threats
Gain a better understanding of AI security concerns, witness the latest cheating techniques using SLMs, and observe evasion techniques in action.
Level: Intermediate🐥
Learn practical tools and strategies to counter these threats and don't miss the interactive Q&A.
+
Watch the highlights: https://blog.testsys.com/2024/09/05/ai-in-practice-your-quick-guide-to-practical-ai-use/
+
Interested in partnering on a webinar? Share your ideas at webinars@testsys.com.
1
00:00:04.605 --> 00:00:05.285
Hello everyone.
2
00:00:05.635 --> 00:00:08.965
Welcome to, uh, the last installment
3
00:00:09.065 --> 00:00:12.885
of our five part series, uh, Summer Demo Days.
4
00:00:13.745 --> 00:00:16.565
Um, I am Kyle Miller, the Manager
5
00:00:16.585 --> 00:00:18.605
of Item Workshop here at ITS,
6
00:00:19.145 --> 00:00:22.925
and I am joined by Chris Glacken, our Director
7
00:00:23.025 --> 00:00:25.725
of Innovative Technologies here at ITS.
8
00:00:26.225 --> 00:00:28.725
Before we get started, uh, just a few housekeeping,
9
00:00:28.725 --> 00:00:30.685
housekeeping things we are recording.
10
00:00:31.145 --> 00:00:32.525
Um, you'll get a link
11
00:00:32.525 --> 00:00:35.125
to the recording in your email once we're done here.
12
00:00:35.745 --> 00:00:37.285
Uh, I have a Q
13
00:00:37.285 --> 00:00:40.485
and A tool open, so please feel free, uh, to use
14
00:00:40.485 --> 00:00:41.885
that if you have questions.
15
00:00:41.935 --> 00:00:44.005
We're going to try and answer those live.
16
00:00:44.545 --> 00:00:46.685
Uh, and if you see one that you like, uh,
17
00:00:46.705 --> 00:00:47.765
go ahead and up upload it.
18
00:00:47.875 --> 00:00:49.645
That'll bring it, uh, right to the top.
19
00:00:50.465 --> 00:00:53.925
Uh, and we will have a survey at the end.
20
00:00:54.305 --> 00:00:58.005
Uh, and we really would appreciate, um, ha if,
21
00:00:58.025 --> 00:00:59.445
if you could take a minute to fill that out.
22
00:00:59.465 --> 00:01:01.445
We, we do try and, uh,
23
00:01:01.515 --> 00:01:04.205
continually get better, uh, at these things.
24
00:01:04.265 --> 00:01:06.005
We wanna know, uh, what it is that,
25
00:01:06.035 --> 00:01:07.165
that you guys want to see.
26
00:01:07.665 --> 00:01:10.605
Uh, and of course, we're always, uh, willing to hear
27
00:01:10.945 --> 00:01:13.165
how great we did in our webinars also.
28
00:01:13.425 --> 00:01:18.125
So, um, in this session, uh, we're going to cover, uh,
29
00:01:19.365 --> 00:01:21.685
cheating, uh, in testing with AI.
30
00:01:22.265 --> 00:01:25.525
Um, we're gonna cover a few different ways that we know of
31
00:01:25.555 --> 00:01:29.005
that, that people are, are trying to cheat on online exams
32
00:01:29.005 --> 00:01:32.485
with AI, and then how to mitigate, uh, those threats.
33
00:01:34.125 --> 00:01:36.185
Uh, so what we're gonna do is we're gonna try
34
00:01:36.185 --> 00:01:40.745
and, uh, set this up, uh, similar to, uh, YouTube videos
35
00:01:40.815 --> 00:01:45.145
that I enjoy watching, uh, if, if, if you've ever seen any
36
00:01:45.145 --> 00:01:48.985
of those, uh, three levels of cooking on YouTube, where, uh,
37
00:01:48.985 --> 00:01:52.905
the first level is, um, an amateur, uh, cook, you know,
38
00:01:52.905 --> 00:01:55.025
making an omelet in, in three minutes.
39
00:01:55.125 --> 00:01:58.825
And the third level is, uh, you know, a professional chef
40
00:01:58.825 --> 00:02:00.865
that takes an hour and a half to make an omelet.
41
00:02:01.285 --> 00:02:04.185
Um, we're gonna do the, the same thing with, uh,
42
00:02:04.685 --> 00:02:06.705
the sophistication of cheating
43
00:02:06.815 --> 00:02:08.625
that we're seeing out there in the wild.
44
00:02:09.085 --> 00:02:12.305
Uh, so we're gonna go over, uh, three scenarios, uh,
45
00:02:12.305 --> 00:02:16.065
and then we'll also talk about how, uh, to mitigate, um,
46
00:02:16.675 --> 00:02:18.585
those individual types of cheating.
47
00:02:20.415 --> 00:02:24.955
Uh, before we get there, uh, Chris, I would like
48
00:02:24.955 --> 00:02:26.875
to ask you, uh, how did,
49
00:02:27.015 --> 00:02:29.715
how did you land on these individual scenarios
50
00:02:29.715 --> 00:02:31.275
that we're going to cover today?
51
00:02:33.195 --> 00:02:36.925
Yeah, so, so with regards to security
52
00:02:37.265 --> 00:02:39.925
and AI, so basically we landed on AI
53
00:02:39.925 --> 00:02:42.125
because that's kind of the theme of our, uh, summer series
54
00:02:42.125 --> 00:02:44.245
that we're trying to stick with, because the reason I'm
55
00:02:44.245 --> 00:02:47.645
saying that is because there is no limit on what kind
56
00:02:47.645 --> 00:02:49.245
of cheating vectors there are out there.
57
00:02:49.385 --> 00:02:51.045
It is just the possibilities are endless,
58
00:02:51.045 --> 00:02:54.805
and it's really important that if you are, um, responsible
59
00:02:54.805 --> 00:02:56.765
for the security of a test delivery program,
60
00:02:56.765 --> 00:02:58.165
that you're staying on top of those things
61
00:02:58.185 --> 00:03:00.390
and making sure that, that you're always staying on top
62
00:03:00.390 --> 00:03:02.605
of the latest and greatest, because there always is
63
00:03:02.605 --> 00:03:03.845
something newer out there.
64
00:03:04.545 --> 00:03:07.825
Um, with that being said, you can't, this, this is a topic
65
00:03:07.825 --> 00:03:10.585
that, that I enjoy discussing, but it, it's hard to discuss.
66
00:03:10.775 --> 00:03:14.545
Like, you don't, you don't want to talk about all the latest
67
00:03:14.565 --> 00:03:15.865
and greatest stuff out there, right?
68
00:03:15.965 --> 00:03:17.585
You don't, you, you want to educate people,
69
00:03:17.685 --> 00:03:19.345
but you only want to, you don't want
70
00:03:19.345 --> 00:03:20.745
to educate everybody, right?
71
00:03:20.745 --> 00:03:22.505
You don't wanna make other people's jobs easier.
72
00:03:22.505 --> 00:03:23.905
They're trying to come up with these things.
73
00:03:24.005 --> 00:03:26.385
So, so the way I landed on some of the topics
74
00:03:26.415 --> 00:03:28.785
that we're gonna discuss today is I just grabbed a couple
75
00:03:29.145 --> 00:03:31.745
publicly available, um, tools that, that are online.
76
00:03:31.745 --> 00:03:32.945
They've been online for a while,
77
00:03:33.365 --> 00:03:37.025
so this shouldn't be anything, um, really cutting edge
78
00:03:37.055 --> 00:03:39.625
with regards to security from that aspect.
79
00:03:39.685 --> 00:03:42.305
But it's something that I think is going to be new
80
00:03:42.445 --> 00:03:43.785
to a lot of people in this group.
81
00:03:44.285 --> 00:03:47.585
And I really want to just kind of use these to kind of
82
00:03:48.355 --> 00:03:49.845
provide awareness and,
83
00:03:49.985 --> 00:03:53.405
and insight into the type of things that, um, we're dealing
84
00:03:53.435 --> 00:03:54.885
with on a constant basis.
85
00:03:55.145 --> 00:03:59.365
So these are not going to be cutting edge attacks that, um,
86
00:03:59.565 --> 00:04:01.365
'cause you don't, you don't want to talk about those, right?
87
00:04:01.365 --> 00:04:03.045
These are gonna be publicly available things
88
00:04:03.045 --> 00:04:05.885
that will let your mind kind of get an idea
89
00:04:06.305 --> 00:04:08.005
of what's out there and the type of things
90
00:04:08.005 --> 00:04:09.165
that you're testing providers
91
00:04:09.165 --> 00:04:10.325
constantly trying to defend against.
92
00:04:12.225 --> 00:04:14.715
Alright, cool. Uh, let's get started.
93
00:04:15.015 --> 00:04:16.555
So why don't we start with, uh,
94
00:04:16.705 --> 00:04:19.195
what we'll call a level one cheater.
95
00:04:19.695 --> 00:04:23.875
Um, this, uh, this is gonna be some joker who needs
96
00:04:23.875 --> 00:04:26.195
to pass an exam, didn't study, uh,
97
00:04:26.415 --> 00:04:29.275
and just thinks, you know, they know how to beat, uh, know
98
00:04:29.275 --> 00:04:30.475
how to beat the system and,
99
00:04:30.495 --> 00:04:33.235
and cheat on an online, uh, exam.
100
00:04:33.455 --> 00:04:35.715
So, uh, what do we see kind of,
101
00:04:35.715 --> 00:04:39.275
are are the most simplistic ways that, that people will try
102
00:04:39.275 --> 00:04:40.395
to use AI to cheat?
103
00:04:41.525 --> 00:04:43.855
Sure. So, so one, like talk,
104
00:04:43.855 --> 00:04:48.015
talking about a base level on using ai, um, one that comes
105
00:04:48.015 --> 00:04:49.895
to mind that that's really interesting and it,
106
00:04:49.895 --> 00:04:50.975
and it's, it's good to kind
107
00:04:50.975 --> 00:04:53.695
of show in this is the ability to hide a window.
108
00:04:54.395 --> 00:04:56.855
All right? So if these are things
109
00:04:56.855 --> 00:04:58.335
that if you're using a more,
110
00:04:58.415 --> 00:05:01.735
a application based secure browser that's going to have, uh,
111
00:05:01.765 --> 00:05:04.495
much more access to the operating system than something like
112
00:05:04.495 --> 00:05:05.695
a web browser plugin or,
113
00:05:05.695 --> 00:05:07.695
or no security, all is gonna have, um,
114
00:05:07.995 --> 00:05:10.775
thi this is gonna be able to block these things much better.
115
00:05:10.955 --> 00:05:14.335
But so the concept of this attack is, I'm just going,
116
00:05:14.455 --> 00:05:15.575
I just, let's just say I want
117
00:05:15.575 --> 00:05:17.655
to use a basic Chat GPT interface.
118
00:05:18.015 --> 00:05:20.215
I have my test, and I just want to be able to go back
119
00:05:20.215 --> 00:05:22.215
and forth and answer my questions to the test,
120
00:05:22.555 --> 00:05:24.735
but my screen's being monitored by a proctor.
121
00:05:25.115 --> 00:05:28.095
All right? So now you can take this attack
122
00:05:28.155 --> 00:05:29.495
to a million different levels.
123
00:05:29.755 --> 00:05:31.815
All right? But let's just start with kind of the basis of,
124
00:05:31.875 --> 00:05:33.655
of how this type of attack could work.
125
00:05:34.195 --> 00:05:36.255
So, um, I'm gonna share my screen here
126
00:05:36.255 --> 00:05:38.415
because we want to kind of demo this stuff too,
127
00:05:38.515 --> 00:05:39.735
in addition to showing it.
128
00:05:39.955 --> 00:05:42.295
So let me get this going here.
129
00:05:45.225 --> 00:05:46.225
Alright,
130
00:05:47.055 --> 00:05:49.435
So the idea here, Chris, is I want
131
00:05:49.635 --> 00:05:51.115
to hide a window on my screen
132
00:05:51.115 --> 00:05:55.235
because I can have some portal like Chat, GPT, where,
133
00:05:56.565 --> 00:06:00.165
where I can, uh, just look up answers, right?
134
00:06:00.225 --> 00:06:03.325
So I'll have, uh, the window open that I need to have open,
135
00:06:03.325 --> 00:06:04.725
which is my testing interface,
136
00:06:04.985 --> 00:06:06.445
and I'll have another window open.
137
00:06:06.625 --> 00:06:08.205
You're gonna show us how to hide that.
138
00:06:08.425 --> 00:06:10.445
And this window could be something like Chat GPT,
139
00:06:10.445 --> 00:06:13.205
where I can just copy and paste answers, or copy
140
00:06:13.205 --> 00:06:15.285
and paste questions into and get an answer back.
141
00:06:15.875 --> 00:06:18.165
Exactly. That's the idea here. All right?
142
00:06:18.505 --> 00:06:19.845
Um, so let's see.
143
00:06:19.925 --> 00:06:22.525
I know Chat, GPT has apparently been going in
144
00:06:22.525 --> 00:06:25.605
and out all day, so it looks like for me, it might actually
145
00:06:26.305 --> 00:06:28.405
be going out again. So
146
00:06:28.435 --> 00:06:30.445
Yeah, they, they heard we were doing a live demo,
147
00:06:30.625 --> 00:06:32.485
so this is how demos go.
148
00:06:32.865 --> 00:06:34.005
All right. Okay, cool.
149
00:06:34.005 --> 00:06:38.985
Well, fortunately, um, we have our own in-house chat,
150
00:06:39.105 --> 00:06:41.025
CPT, so I'm just gonna pull that up
151
00:06:41.025 --> 00:06:43.025
because I want to make sure that we are kind
152
00:06:43.025 --> 00:06:45.865
of driving the point home as to, uh, what is possible here.
153
00:06:46.485 --> 00:06:49.625
All right, so here I have a basic, um, app chat application.
154
00:06:49.925 --> 00:06:51.905
Um, so this is something that Kyle, you
155
00:06:51.905 --> 00:06:53.865
and I have been working on constantly with the help
156
00:06:53.865 --> 00:06:55.905
of our friend Kris, um, on FEA team.
157
00:06:56.445 --> 00:06:58.785
So the idea here is it's just like Chat GPT, right?
158
00:06:58.805 --> 00:07:00.585
So I can go ahead and ask it a question
159
00:07:00.885 --> 00:07:02.265
and it's gonna respond back to me.
160
00:07:02.285 --> 00:07:03.985
So it's just like Chat GPT.
161
00:07:04.005 --> 00:07:07.465
But since Chat GPT is currently down, it's not going to, uh,
162
00:07:07.515 --> 00:07:08.785
we're just going to use this instead.
163
00:07:08.785 --> 00:07:10.505
So this is working through their APIs,
164
00:07:10.505 --> 00:07:12.185
which probably don't appear to be down.
165
00:07:12.855 --> 00:07:15.945
Okay? So let's just say that I have a test going,
166
00:07:16.445 --> 00:07:18.065
and I have my first question here.
167
00:07:18.245 --> 00:07:19.945
All right? But my screen is currently being
168
00:07:19.945 --> 00:07:21.225
monitored by the proctor.
169
00:07:21.445 --> 00:07:23.545
All right? So I'm gonna do the standard question here.
170
00:07:23.645 --> 00:07:25.665
Is my, is my screen currently visible?
171
00:07:26.245 --> 00:07:28.145
I'm assuming you can see my screen, right? Yes,
172
00:07:28.345 --> 00:07:29.345
I can see your screen. All
173
00:07:29.345 --> 00:07:30.225
right. Okay. All right.
174
00:07:30.245 --> 00:07:33.105
So my monitor's a little lower resolution, okay?
175
00:07:33.105 --> 00:07:36.505
Alright, so now if you were my proctor looking at my screen,
176
00:07:36.845 --> 00:07:40.225
you would be seeing that I have some kind of non, some kind
177
00:07:40.225 --> 00:07:44.875
of test based application here that is going to take my test
178
00:07:44.895 --> 00:07:46.715
for me, and I have my test, right?
179
00:07:47.645 --> 00:07:48.905
So that's not good, right?
180
00:07:48.925 --> 00:07:50.465
You, I don't want you to see that.
181
00:07:50.505 --> 00:07:51.865
I don't want you to know that I'm using that.
182
00:07:52.045 --> 00:07:54.945
So what I'm gonna do is I'm gonna use an application called
183
00:07:55.115 --> 00:07:56.225
Invis Wind again.
184
00:07:56.245 --> 00:07:57.665
So, like, like I said at the beginning,
185
00:07:57.875 --> 00:08:01.345
we're using publicly available applications, um, to kind
186
00:08:01.345 --> 00:08:02.425
of demo these concepts.
187
00:08:02.525 --> 00:08:03.945
All right? Um, so these are things
188
00:08:03.945 --> 00:08:04.985
that are out in the wild today
189
00:08:04.985 --> 00:08:06.665
that anybody can just go and download.
190
00:08:06.885 --> 00:08:08.665
All right, so this one is called Invisible Wind.
191
00:08:08.695 --> 00:08:11.105
It's short for invisible window. Alright?
192
00:08:11.445 --> 00:08:14.385
So like you mentioned earlier, the idea of this attack is
193
00:08:14.385 --> 00:08:16.025
that you can use this application
194
00:08:16.285 --> 00:08:18.105
to hide your window, alright?
195
00:08:18.255 --> 00:08:20.945
From any screen recorders, but not hide it from yourself
196
00:08:20.945 --> 00:08:22.305
because you still wanna be able to use it
197
00:08:22.305 --> 00:08:23.305
to cheat on the exam.
198
00:08:23.845 --> 00:08:25.665
And it's really simple application.
199
00:08:25.725 --> 00:08:27.345
You can see they have a demo right here,
200
00:08:27.685 --> 00:08:29.065
and they explain how it works.
201
00:08:29.645 --> 00:08:31.745
All right? So what I did is I went ahead
202
00:08:31.745 --> 00:08:32.825
and downloaded again.
203
00:08:33.125 --> 00:08:35.105
So one of the big themes, um, I,
204
00:08:35.105 --> 00:08:37.265
I've said this in some other, uh, presentations,
205
00:08:37.325 --> 00:08:39.825
but one of the big things that I really wanna harp on about
206
00:08:39.825 --> 00:08:42.225
these kind of, uh, any type of cheating is
207
00:08:42.225 --> 00:08:45.465
that it shouldn't, there, we shouldn't have a mindset
208
00:08:45.575 --> 00:08:48.105
that if somebody's smart enough to make an attack like this,
209
00:08:48.375 --> 00:08:49.465
then they're probably smart
210
00:08:49.465 --> 00:08:50.705
enough to pass their test, right?
211
00:08:50.705 --> 00:08:52.785
That, that is not a good way to think
212
00:08:52.785 --> 00:08:55.885
because I'm showing the exact reason it's not good right?
213
00:08:55.885 --> 00:08:59.485
Here you had somebody knowledgeable in this area, alright?
214
00:08:59.905 --> 00:09:02.605
And they made an easy to use application
215
00:09:02.605 --> 00:09:03.845
that anybody can go.
216
00:09:03.945 --> 00:09:05.965
In this case it's even free. All right?
217
00:09:06.345 --> 00:09:09.415
So, so that's important to keep in mind
218
00:09:09.415 --> 00:09:12.495
because I don't have to be very intuitive within
219
00:09:12.715 --> 00:09:14.815
how operating systems work or anything like that.
220
00:09:15.055 --> 00:09:17.575
I have to just know, oh, I don't, I had to just Google,
221
00:09:17.815 --> 00:09:20.055
I don't want my window to show during my test.
222
00:09:20.555 --> 00:09:22.775
How can I do that? And here's a publicly available
223
00:09:22.885 --> 00:09:24.215
application for me to use
224
00:09:24.215 --> 00:09:25.975
that's gonna go ahead and hide my window.
225
00:09:26.595 --> 00:09:27.735
So let's kind of take a look at
226
00:09:27.735 --> 00:09:28.815
how this thing works right here.
227
00:09:28.955 --> 00:09:31.015
All right. So typically you would set this up
228
00:09:31.015 --> 00:09:33.495
before you even get into your test, okay?
229
00:09:33.755 --> 00:09:35.375
So the app is called Invis Wind,
230
00:09:35.375 --> 00:09:37.895
and what it does is it just opens up a command prompt,
231
00:09:38.395 --> 00:09:40.335
and it's, it's very easy to use,
232
00:09:40.365 --> 00:09:42.055
even if you don't even know how to use it.
233
00:09:42.075 --> 00:09:45.015
It tells you go ahead and type help to get started, right?
234
00:09:45.035 --> 00:09:47.015
And just gives you the basic command you're gonna hide,
235
00:09:47.015 --> 00:09:49.455
and you can do it on process ID or process name,
236
00:09:49.715 --> 00:09:51.455
and then it will hide the application.
237
00:09:51.795 --> 00:09:53.375
All right? So let's go ahead
238
00:09:53.375 --> 00:09:55.095
and just get our process id, all right?
239
00:09:55.115 --> 00:09:56.575
We can do it by process name too,
240
00:09:56.595 --> 00:09:58.175
but let's just go ahead and look at it.
241
00:09:58.395 --> 00:10:00.895
So I'm using Microsoft Edge, so I want
242
00:10:00.895 --> 00:10:02.375
to hide my Microsoft Edge window,
243
00:10:02.515 --> 00:10:04.415
and I want to hide my application right here.
244
00:10:04.435 --> 00:10:06.615
So let's just, we're just gonna go and get that process ID,
245
00:10:07.435 --> 00:10:11.655
and so we can see that my process ID right here
246
00:10:12.395 --> 00:10:14.735
is 5 8, 8 8, okay?
247
00:10:15.275 --> 00:10:18.575
So what I do with my application here is I just go
248
00:10:18.575 --> 00:10:20.895
to 5, 5, 8, 8, 8,
249
00:10:22.015 --> 00:10:23.775
I enter it and it should be hidden.
250
00:10:23.995 --> 00:10:26.055
All right? Are you, it's gone. Able to see my, it's gone.
251
00:10:26.195 --> 00:10:27.935
All right. So let me just kind
252
00:10:27.935 --> 00:10:29.415
of drive the point home right now.
253
00:10:29.475 --> 00:10:31.095
So now I'm gonna close my application.
254
00:10:31.175 --> 00:10:34.055
I, no, no, I no longer even need that thing running. Okay.
255
00:10:34.635 --> 00:10:38.055
So now as far as you're concerned, you should just kind
256
00:10:38.055 --> 00:10:40.415
of see my test window right here, right?
257
00:10:40.915 --> 00:10:42.895
Yep. Okay. All right.
258
00:10:42.895 --> 00:10:44.135
So let's go ahead and make that full screen.
259
00:10:44.195 --> 00:10:46.295
So, if I was a student, I'm all getting into my test,
260
00:10:46.375 --> 00:10:49.815
I have my full test window, but now I get to this question
261
00:10:49.875 --> 00:10:51.735
and I need to answer my question, all right?
262
00:10:51.835 --> 00:10:54.335
So which of the following has the most syllables?
263
00:10:54.525 --> 00:10:58.635
Okay, so I could, uh, I could just type it in here.
264
00:10:58.635 --> 00:11:02.845
Which of the following has the most syllables,
265
00:11:04.775 --> 00:11:06.955
um, spaghetti.
266
00:11:08.485 --> 00:11:10.785
And this is visible on your screen to you right now,
267
00:11:10.785 --> 00:11:12.065
even though I can't see it,
268
00:11:12.135 --> 00:11:14.745
it's only hiding it from screen sharing applications.
269
00:11:15.005 --> 00:11:18.905
You're actually looking at our Chat GPT app right now
270
00:11:18.905 --> 00:11:20.265
and typing this question into it.
271
00:11:20.655 --> 00:11:21.865
That is exactly right.
272
00:11:22.125 --> 00:11:24.945
So let me just get my camera here to drive the point home.
273
00:11:25.685 --> 00:11:29.665
All right, so if you can see my, my screen right now, yep.
274
00:11:29.965 --> 00:11:31.625
It probably looks completely different than
275
00:11:31.625 --> 00:11:33.705
what you're seeing in the screen sharing software, right?
276
00:11:33.925 --> 00:11:35.945
So I asked it the question and I got my answer.
277
00:11:35.945 --> 00:11:37.865
It's thermometer right there. All right?
278
00:11:38.405 --> 00:11:39.945
So right there, but as far
279
00:11:39.945 --> 00:11:41.985
as you're seeing on the webinar demo, you're just seeing
280
00:11:41.985 --> 00:11:43.185
that my test is right here,
281
00:11:44.565 --> 00:11:46.305
so I can go back and forth to my test.
282
00:11:46.445 --> 00:11:48.625
And if you're just, if your only security is
283
00:11:48.625 --> 00:11:51.185
that you're monitoring it, doing a screen recording,
284
00:11:51.725 --> 00:11:54.165
you have no idea that I'm using this, okay?
285
00:11:55.025 --> 00:11:57.245
All right. So that, that's, that's essentially
286
00:11:57.305 --> 00:11:58.645
how the attack works right now.
287
00:11:58.645 --> 00:12:00.205
That's really basic. You're gonna have
288
00:12:00.205 --> 00:12:02.365
to be running pretty much no security in, in order
289
00:12:02.365 --> 00:12:03.645
to get away with something like that.
290
00:12:03.905 --> 00:12:05.765
But you can take this kind of stuff
291
00:12:05.765 --> 00:12:06.845
and there's other applications.
292
00:12:06.905 --> 00:12:08.325
I'm like, again, I'm doing this to kind
293
00:12:08.325 --> 00:12:09.365
of illustrate the point of
294
00:12:09.365 --> 00:12:10.965
how you can do these things, okay?
295
00:12:11.385 --> 00:12:14.365
So you can take this to other steps and put it on hotkeys
296
00:12:14.365 --> 00:12:16.205
and those type of things and all that stuff.
297
00:12:16.345 --> 00:12:19.125
Um, another thing is, uh, so, so what are some,
298
00:12:19.185 --> 00:12:21.045
so let's just start with how it works, all right?
299
00:12:21.045 --> 00:12:22.845
What exactly is making this thing work?
300
00:12:23.265 --> 00:12:25.965
So the way it works, and they tell you right on the website,
301
00:12:26.065 --> 00:12:28.765
uh, what they're doing there, not that you really, um, need
302
00:12:28.765 --> 00:12:31.805
to know that, but the way it works here is
303
00:12:31.805 --> 00:12:34.205
that they're just doing what's called a remote injection.
304
00:12:35.065 --> 00:12:38.085
Um, and they're injecting A-D-L-L-A dynamic link library
305
00:12:38.195 --> 00:12:40.485
that contains a piece of code into
306
00:12:41.045 --> 00:12:42.645
whatever target application there is.
307
00:12:42.715 --> 00:12:43.805
Okay? So let's just kind
308
00:12:43.805 --> 00:12:45.005
of break down what that means right there.
309
00:12:45.065 --> 00:12:46.685
So what that means is that
310
00:12:47.265 --> 00:12:49.405
I'm gonna make a little file, alright?
311
00:12:49.405 --> 00:12:51.365
It's called a DLL. I'm gonna make a little file,
312
00:12:51.665 --> 00:12:54.365
and in this file I'm going to call a command
313
00:12:54.365 --> 00:12:55.805
that tells the operating system
314
00:12:56.065 --> 00:12:58.925
to hide this window from any screen record sharing
315
00:12:58.925 --> 00:12:59.965
application on there.
316
00:12:59.965 --> 00:13:01.765
Alright? So I have this little file
317
00:13:02.025 --> 00:13:03.245
and I have a piece of code in there
318
00:13:03.245 --> 00:13:04.365
that says, hide this window.
319
00:13:04.875 --> 00:13:08.405
Okay? So now what I need to do is I need to get
320
00:13:08.405 --> 00:13:12.365
that little piece of code injected into my Microsoft Edge
321
00:13:12.365 --> 00:13:13.405
browser, all right?
322
00:13:13.585 --> 00:13:15.765
And when I inject it into Microsoft Edge browser,
323
00:13:16.275 --> 00:13:18.085
that code is then just gonna be run.
324
00:13:18.115 --> 00:13:20.285
Okay? I'm, I'm greatly simplifying this, okay?
325
00:13:20.545 --> 00:13:22.245
So in order to do that, that's called, um,
326
00:13:22.245 --> 00:13:24.325
what you're gonna do is you're gonna create a remote thread
327
00:13:24.625 --> 00:13:25.885
in the Microsoft Edge,
328
00:13:25.945 --> 00:13:28.005
but really just think about it at a really high level,
329
00:13:28.385 --> 00:13:30.125
is you're just taking that piece of code
330
00:13:30.425 --> 00:13:33.005
and you're throwing it into Microsoft Edge,
331
00:13:33.835 --> 00:13:35.415
and then it's gonna run that piece of code,
332
00:13:35.435 --> 00:13:37.335
and now it's hidden and you're good to go.
333
00:13:37.335 --> 00:13:40.055
You're off and running. That's how the attack works. Okay?
334
00:13:40.475 --> 00:13:44.935
So, um, so, so how can you block something like that, right?
335
00:13:44.935 --> 00:13:47.055
Because the screen recorder's not gonna catch it, right?
336
00:13:47.355 --> 00:13:49.975
So what's gonna help you out there are looking
337
00:13:50.035 --> 00:13:51.975
for other things, other patterns, right?
338
00:13:52.195 --> 00:13:54.055
You want to check to see is like if,
339
00:13:54.075 --> 00:13:57.735
if you don't support hosting multiple applications on your
340
00:13:57.735 --> 00:13:59.455
system, you want to make sure you, you can monitor
341
00:13:59.555 --> 00:14:02.335
for things like, well, is my test window losing focus?
342
00:14:02.465 --> 00:14:04.695
Right? Those are some things you could check against.
343
00:14:04.875 --> 00:14:08.175
Um, another thing, uh, you might think is, uh, well,
344
00:14:08.675 --> 00:14:10.575
is there, is there a Microsoft process
345
00:14:10.575 --> 00:14:11.655
running on the computer?
346
00:14:11.795 --> 00:14:14.415
Can I just suspend every anything with Microsoft Edge?
347
00:14:14.955 --> 00:14:16.815
So, um, you, you could do that,
348
00:14:16.835 --> 00:14:18.295
but then that, that gets into some
349
00:14:18.295 --> 00:14:19.895
other interesting attacks there.
350
00:14:20.075 --> 00:14:22.575
All right? 'cause something that you could do there is,
351
00:14:22.585 --> 00:14:24.735
let's just say, I just wanna hide my
352
00:14:25.055 --> 00:14:26.135
Microsoft Edge completely.
353
00:14:26.685 --> 00:14:30.235
Okay? Alright. So let's see.
354
00:14:30.455 --> 00:14:31.675
I'm gonna share my screen again.
355
00:14:31.695 --> 00:14:33.595
Am I still sharing? I need share everything. Uh,
356
00:14:33.615 --> 00:14:34.755
No, I, I, uh, I
357
00:14:34.755 --> 00:14:36.075
minimized it. Go ahead and share it again. All.
358
00:14:36.185 --> 00:14:38.835
Okay. All right, so let's go ahead and do this again.
359
00:14:38.895 --> 00:14:40.515
So I'm gonna share my screen here,
360
00:14:42.005 --> 00:14:44.385
and then I'm just going to go ahead
361
00:14:44.685 --> 00:14:48.185
and just run something very simple on my end that's going
362
00:14:48.185 --> 00:14:50.065
to make it, so I am actually hiding
363
00:14:51.125 --> 00:14:53.965
Microsoft Edge from my entire operating system.
364
00:14:54.235 --> 00:14:57.125
Okay? So we'll go ahead and open up task manager here.
365
00:14:57.125 --> 00:14:59.045
We see Microsoft Edge isn't currently running,
366
00:14:59.065 --> 00:15:00.085
but I don't have it running.
367
00:15:00.315 --> 00:15:02.085
Okay? And so we can go in here,
368
00:15:02.135 --> 00:15:05.125
let's see if there's any processes that are still okay.
369
00:15:05.125 --> 00:15:07.125
So we'll just get rid of all my Microsoft Edge.
370
00:15:07.145 --> 00:15:10.365
All right, Ms. Edge XC is not running. Okay?
371
00:15:10.905 --> 00:15:14.085
So now what I'm gonna do here is I'm gonna go ahead
372
00:15:14.665 --> 00:15:16.245
and start up Microsoft Edge.
373
00:15:16.755 --> 00:15:19.285
Okay? Microsoft Edge is now started up,
374
00:15:19.625 --> 00:15:20.645
but it's not showing,
375
00:15:20.785 --> 00:15:23.965
my computer isn't even representing the Microsoft Edge is
376
00:15:23.965 --> 00:15:24.965
running right now, right?
377
00:15:25.305 --> 00:15:27.125
So that's just the kind of illustrate.
378
00:15:27.125 --> 00:15:29.085
So this is a, this is taking the attack
379
00:15:29.085 --> 00:15:31.165
to a much more higher level that we don't really have time
380
00:15:31.165 --> 00:15:33.845
to get into today, but I really wanted to kind of show this
381
00:15:33.865 --> 00:15:36.845
and be like, okay, you can do different things
382
00:15:37.105 --> 00:15:38.485
to elevate certain attacks.
383
00:15:38.495 --> 00:15:40.205
There is no just one way to do things.
384
00:15:40.415 --> 00:15:42.725
These are all just kind of, you can combine
385
00:15:42.725 --> 00:15:44.765
and get to the pieces and figure this stuff out.
386
00:15:44.785 --> 00:15:46.125
So that's really why it's important
387
00:15:46.125 --> 00:15:47.885
that you have these secure browsers
388
00:15:48.105 --> 00:15:49.965
to protect your content if that's something
389
00:15:49.965 --> 00:15:51.565
that you care about for your test delivery.
390
00:15:52.985 --> 00:15:55.125
So, but just to drive this point home though,
391
00:15:55.155 --> 00:15:57.765
this is all stuff that someone without development
392
00:15:57.765 --> 00:16:00.805
experience, without even a lot of cheating experience,
393
00:16:00.835 --> 00:16:03.245
they can just download and execute this stuff, right?
394
00:16:03.275 --> 00:16:06.725
Like our, our level one lazy cheater
395
00:16:06.745 --> 00:16:09.365
who just didn't take the time to study, this is all stuff
396
00:16:09.365 --> 00:16:11.285
that's just available, right?
397
00:16:11.555 --> 00:16:13.965
When we were prepping for this, I actually, you know,
398
00:16:13.965 --> 00:16:15.645
started looking into this stuff myself.
399
00:16:16.015 --> 00:16:19.005
There are just so many YouTube videos out there about like,
400
00:16:19.145 --> 00:16:20.725
you can just go download the software
401
00:16:21.145 --> 00:16:23.245
and use it to cheat with links.
402
00:16:24.085 --> 00:16:25.525
Nobody's taking this stuff down.
403
00:16:25.555 --> 00:16:28.245
There's not a, there's not a online cheating
404
00:16:28.265 --> 00:16:29.405
police out there, right?
405
00:16:30.215 --> 00:16:31.565
There. There's not, and,
406
00:16:31.585 --> 00:16:34.765
and to an extent, it's, um, there are some things
407
00:16:34.765 --> 00:16:35.885
that you can police, right?
408
00:16:35.885 --> 00:16:38.005
You want to be able to police the things like, uh,
409
00:16:38.035 --> 00:16:40.325
content harvesting, like those content farms
410
00:16:40.325 --> 00:16:41.685
and data mining and all that stuff.
411
00:16:41.825 --> 00:16:45.995
But at the end of the day, is it really a cheating app?
412
00:16:46.625 --> 00:16:48.955
Like, like, what are you gonna use this app for?
413
00:16:48.955 --> 00:16:50.955
Maybe you have a legitimate purpose to hide a window.
414
00:16:51.555 --> 00:16:53.795
I don't know. So, so it's kind of a vague area,
415
00:16:53.905 --> 00:16:55.595
much less you're dealing with other countries
416
00:16:55.595 --> 00:16:56.955
and other, um, other legal
417
00:16:56.955 --> 00:16:58.195
rulings and all that stuff, right?
418
00:16:58.195 --> 00:17:00.075
So, but, but you're absolutely right.
419
00:17:00.145 --> 00:17:02.995
This is, I'm, I'm just, uh, I'm just sticking the things
420
00:17:02.995 --> 00:17:04.635
that are kind of publicly available here
421
00:17:04.635 --> 00:17:07.155
that you wanna make sure that you're, your,
422
00:17:07.225 --> 00:17:09.435
your secure delivery if you care about this stuff
423
00:17:09.435 --> 00:17:10.915
that you're using, a secure browser
424
00:17:10.935 --> 00:17:12.915
or some kind of secure mechanism that is
425
00:17:13.875 --> 00:17:15.235
actively monitoring for these type of things.
426
00:17:15.295 --> 00:17:17.675
Now, again, right? What I'm showing is just base run
427
00:17:17.675 --> 00:17:20.275
of the mill, like you said, can be downloaded anywhere.
428
00:17:20.525 --> 00:17:22.115
We're not doing anything groundbreaking here.
429
00:17:22.265 --> 00:17:24.995
It's just kind of just making people aware.
430
00:17:25.775 --> 00:17:28.595
So we have a question, uh, that, uh, that came in.
431
00:17:28.895 --> 00:17:29.915
The question is, uh,
432
00:17:30.135 --> 00:17:33.955
do lockdown browsers not detect apps like invis wind?
433
00:17:35.155 --> 00:17:37.615
So, so there's two points to
434
00:17:37.615 --> 00:17:39.055
that specific question, right?
435
00:17:39.305 --> 00:17:41.935
Invis win didn't need to even be running. All right?
436
00:17:42.335 --> 00:17:44.295
I just needed to start it up before my exam
437
00:17:44.475 --> 00:17:46.575
and get my code running in Microsoft Edge
438
00:17:46.595 --> 00:17:47.655
before I could even do it.
439
00:17:47.655 --> 00:17:49.885
Now again, I said my code, I didn't do anything.
440
00:17:50.065 --> 00:17:52.045
I'm just a user to download an executable
441
00:17:52.045 --> 00:17:53.925
and click two buttons to hide the thing.
442
00:17:54.105 --> 00:17:57.125
All right? So it doesn't matter if, if, uh,
443
00:17:57.315 --> 00:17:59.525
like if if Invis wind is still running, that's
444
00:17:59.645 --> 00:18:01.445
'cause the user was sloppy and they forgot to close it,
445
00:18:01.445 --> 00:18:02.845
it does not need to be running right there.
446
00:18:03.305 --> 00:18:07.685
The, the second point of that is, as you saw, it is possible
447
00:18:07.685 --> 00:18:09.925
to hide stuff from an operating system, right?
448
00:18:09.985 --> 00:18:13.845
So you need to be thinking creatively about all the
449
00:18:13.845 --> 00:18:15.125
different ways you can do this, right?
450
00:18:15.485 --> 00:18:17.725
Security in depth, that, that kind of concept.
451
00:18:17.905 --> 00:18:20.085
You wanna make sure that you're checking these things 10,
452
00:18:20.085 --> 00:18:21.885
20 different ways to make sure
453
00:18:21.885 --> 00:18:24.405
that everything is just working as you would expect it to.
454
00:18:25.305 --> 00:18:28.765
And I would just add that, uh, detecting running processes
455
00:18:29.345 --> 00:18:31.165
is a baseline requirement.
456
00:18:31.235 --> 00:18:33.045
It's, it's feature number one, right?
457
00:18:33.105 --> 00:18:34.405
For all secure browsers.
458
00:18:34.405 --> 00:18:36.645
Like, let's, let's make sure there aren't, you know,
459
00:18:36.645 --> 00:18:40.765
processes running that we know are, are, uh, uh, malicious,
460
00:18:40.825 --> 00:18:43.765
but as you said, sometimes the these are not.
461
00:18:44.785 --> 00:18:48.165
Um, so let, let's move on to, uh,
462
00:18:50.045 --> 00:18:52.255
cheater level number two.
463
00:18:52.985 --> 00:18:55.215
Let's talk about, uh, people
464
00:18:55.245 --> 00:18:59.655
that have put a significant amount of time into an app
465
00:18:59.655 --> 00:19:01.935
that is specifically for cheating.
466
00:19:02.565 --> 00:19:04.735
They make it publicly available.
467
00:19:05.195 --> 00:19:08.495
So we're not talking about invis wind, which is general, uh,
468
00:19:08.795 --> 00:19:10.975
or, uh, stuffer hiding processes,
469
00:19:10.975 --> 00:19:13.655
which could also be general, but a real cheating app.
470
00:19:13.685 --> 00:19:15.015
What does, what does that look like,
471
00:19:16.205 --> 00:19:17.205
Man? So
472
00:19:17.205 --> 00:19:19.235
I feel like it's gonna be hard
473
00:19:19.235 --> 00:19:20.795
to define a real cheating app
474
00:19:20.795 --> 00:19:23.355
because you can always creatively define a real
475
00:19:23.355 --> 00:19:24.435
life use case for it.
476
00:19:24.435 --> 00:19:25.635
Sure, that is not cheating, right?
477
00:19:25.695 --> 00:19:27.635
But sometimes it's just like, come on.
478
00:19:27.635 --> 00:19:29.835
Like, what, what else are you gonna use this thing for?
479
00:19:30.015 --> 00:19:33.195
So, um, so, uh, one that one that, uh,
480
00:19:33.235 --> 00:19:35.755
I came across a while ago, which was pretty interesting,
481
00:19:35.755 --> 00:19:38.115
was an, uh, an application called Chat, NCL.
482
00:19:38.895 --> 00:19:43.275
Um, and so what that application did, was it actually, uh,
483
00:19:43.375 --> 00:19:45.795
so the concept is it runs kind of silently,
484
00:19:45.855 --> 00:19:47.035
it runs in the background,
485
00:19:47.695 --> 00:19:51.035
and what it does is it uses kind of hotkeys in order
486
00:19:51.055 --> 00:19:52.955
to execute some AI attacks.
487
00:19:53.215 --> 00:19:55.675
So, and the one that we just talked about that really kind
488
00:19:55.675 --> 00:19:58.955
of rudimentary attack where I'm using an actual go like UI
489
00:19:58.975 --> 00:20:00.195
and using Chat GPT
490
00:20:00.195 --> 00:20:02.075
and asking it, this is more just kind
491
00:20:02.075 --> 00:20:03.715
of getting content off the screen
492
00:20:04.175 --> 00:20:07.315
and silently sending it off to an LLM
493
00:20:07.535 --> 00:20:10.945
and then getting the response back and putting it in, right?
494
00:20:10.965 --> 00:20:12.305
So that, that's kind of the concept.
495
00:20:12.445 --> 00:20:17.165
And so if we go and take a look at it here, so again,
496
00:20:17.165 --> 00:20:18.805
everything we wanna do is just, we're just kind
497
00:20:18.805 --> 00:20:20.805
of talking about this stuff is publicly
498
00:20:20.805 --> 00:20:21.925
available, all right?
499
00:20:21.925 --> 00:20:24.285
We're not doing anything that's, uh, crazy here.
500
00:20:24.385 --> 00:20:27.885
So if we go back to our good old Google over here and we go
501
00:20:27.885 --> 00:20:31.245
and find this application, so Chat NCL, right?
502
00:20:31.305 --> 00:20:32.485
See, it's publicly available
503
00:20:32.625 --> 00:20:34.565
and right on here, unlock the power chat
504
00:20:34.685 --> 00:20:35.725
CPT on your desktop.
505
00:20:35.955 --> 00:20:40.765
Okay? So the idea here is that it can run silently
506
00:20:40.945 --> 00:20:42.485
and it's going to just answer.
507
00:20:42.545 --> 00:20:44.405
So you can see in this example right here,
508
00:20:44.755 --> 00:20:48.925
they're actually just using a, uh, a Mac OS notepad here,
509
00:20:49.385 --> 00:20:51.525
and they're just typing in a question to it,
510
00:20:51.945 --> 00:20:53.685
and then it's gonna answer it right in there.
511
00:20:53.745 --> 00:20:56.405
So imagine that you're in a test, you're on an essay item
512
00:20:56.825 --> 00:20:58.485
and you just hit this hotkey,
513
00:20:58.585 --> 00:21:00.525
and now all of a sudden it's filling out the
514
00:21:00.535 --> 00:21:01.765
essay for you, right?
515
00:21:01.865 --> 00:21:04.485
That's the idea behind this attack. All right?
516
00:21:04.705 --> 00:21:06.765
And if we go and we look at how it works here,
517
00:21:08.105 --> 00:21:09.965
we can actually take a look at their site here.
518
00:21:09.965 --> 00:21:11.005
And so you can see it, they're,
519
00:21:11.005 --> 00:21:12.325
they're advertising it right here.
520
00:21:12.465 --> 00:21:14.885
And so they're in some kind of test right here.
521
00:21:14.915 --> 00:21:16.525
They're typing out the question
522
00:21:16.545 --> 00:21:17.605
and then they're gonna hit a
523
00:21:17.605 --> 00:21:19.165
hotkey and then it's gonna work.
524
00:21:19.865 --> 00:21:21.525
And so the other thing
525
00:21:21.525 --> 00:21:23.805
that I thought was like really interesting about this
526
00:21:24.405 --> 00:21:26.965
is the user friendliness of this thing, alright?
527
00:21:27.225 --> 00:21:30.165
If you go and you look at their setup application right
528
00:21:30.165 --> 00:21:31.805
here, this is the first thing you do,
529
00:21:31.805 --> 00:21:34.245
they make this very intuitive use.
530
00:21:34.355 --> 00:21:36.285
It's, it's actually a really nice interface.
531
00:21:36.385 --> 00:21:39.365
So you download their application and you launch it,
532
00:21:39.425 --> 00:21:40.805
and then the first thing you do is you
533
00:21:40.955 --> 00:21:42.565
customize your hotkeys, right?
534
00:21:42.985 --> 00:21:45.085
And so that's again, like, so if you have a secure browser
535
00:21:45.145 --> 00:21:46.645
and you're monitoring for certain hotkey
536
00:21:46.645 --> 00:21:48.325
to see if somebody's pressing it, well,
537
00:21:48.385 --> 00:21:50.285
you can actually customize these things, right?
538
00:21:50.305 --> 00:21:52.525
And so anybody can use any hotkeys they want.
539
00:21:52.545 --> 00:21:55.165
And so you have one that's going to get the information
540
00:21:55.165 --> 00:21:57.605
and send it to Chat GPT print the response,
541
00:21:57.615 --> 00:21:59.885
clear the conversation, um, those type
542
00:21:59.885 --> 00:22:01.965
of things like a full management system, all right?
543
00:22:01.965 --> 00:22:04.045
Here, a very intuitive user interface.
544
00:22:04.465 --> 00:22:06.605
And then after you set all that up, the next thing
545
00:22:06.605 --> 00:22:09.165
that you do is you're going to give it your, um,
546
00:22:09.355 --> 00:22:10.925
your API key, alright?
547
00:22:10.925 --> 00:22:12.165
Well, not your API key,
548
00:22:12.165 --> 00:22:15.245
but basically they rent this thing by the hour, okay?
549
00:22:15.245 --> 00:22:17.085
So if you go back to their pricing over here
550
00:22:17.545 --> 00:22:20.045
and we just scroll down, you'll see, like, look at this,
551
00:22:20.045 --> 00:22:22.005
this is a nice professional looking webpage.
552
00:22:22.005 --> 00:22:23.805
They put a lot of effort into this product,
553
00:22:24.545 --> 00:22:27.235
and you could see the pricing somewhere right here.
554
00:22:27.255 --> 00:22:28.915
So you see, they, they have these different
555
00:22:28.915 --> 00:22:29.995
pricing plans, right?
556
00:22:30.015 --> 00:22:31.515
So you can use their application
557
00:22:31.515 --> 00:22:33.075
for one hour, two hour, four hours.
558
00:22:33.535 --> 00:22:35.755
Uh, and it was, and it was really interesting, I was,
559
00:22:35.795 --> 00:22:37.435
I was trying to look at the application
560
00:22:37.615 --> 00:22:39.355
and just seeing how much they're running client
561
00:22:39.355 --> 00:22:40.395
side and those type of things.
562
00:22:40.415 --> 00:22:42.075
And they have a little kill switch in there.
563
00:22:42.135 --> 00:22:43.995
So if you try to, if you try to watch
564
00:22:43.995 --> 00:22:45.035
what it's doing over the network
565
00:22:45.035 --> 00:22:48.035
through a proxy application, they'll actually kill itself.
566
00:22:48.135 --> 00:22:49.315
Um, they're, they're just doing that
567
00:22:49.315 --> 00:22:50.955
by reading the registry, but I thought, I thought
568
00:22:50.955 --> 00:22:51.995
that was kind of interesting.
569
00:22:52.215 --> 00:22:53.635
But you can see that they're packaging it
570
00:22:53.635 --> 00:22:54.755
and they're making intuitive
571
00:22:54.755 --> 00:22:57.235
and they're making it easy to use for people to go.
572
00:22:57.295 --> 00:22:59.355
So again, you don't need to be something very,
573
00:22:59.535 --> 00:23:01.675
you don't need to be somebody very knowledgeable in
574
00:23:01.875 --> 00:23:04.795
computers and APIs and all of that nonsense, right?
575
00:23:04.855 --> 00:23:08.195
You just need to be somebody with $15 that, uh,
576
00:23:08.215 --> 00:23:11.355
can set up a quick settings application to run some hotkey.
577
00:23:12.225 --> 00:23:15.565
So for this application, the idea is, uh,
578
00:23:15.945 --> 00:23:18.885
you would just highlight something, hit a hot key,
579
00:23:19.105 --> 00:23:22.005
it gets sent off to Chat, GPT chat,
580
00:23:22.285 --> 00:23:26.245
GPT being the helpful robot that it is answers the question.
581
00:23:26.745 --> 00:23:28.005
You press another hot key
582
00:23:28.005 --> 00:23:30.325
and that gets pasted into whatever window you have open,
583
00:23:30.795 --> 00:23:33.205
such as an online exam. Is that right?
584
00:23:33.705 --> 00:23:34.885
That's exactly right.
585
00:23:35.065 --> 00:23:36.845
And so, so, so that's
586
00:23:36.845 --> 00:23:38.965
how this specific application works, all right?
587
00:23:39.025 --> 00:23:42.245
And they even added a recent feature, um, also, which is
588
00:23:42.245 --> 00:23:44.085
to actually capture the screen content.
589
00:23:44.545 --> 00:23:47.085
So that way you don't have to actually type in the question
590
00:23:47.145 --> 00:23:48.805
or highlight any text or anything like that.
591
00:23:48.825 --> 00:23:50.005
It just takes a screenshot.
592
00:23:50.265 --> 00:23:52.165
And then that screenshot will go off the chat,
593
00:23:52.305 --> 00:23:54.205
the open AI under the covers, right?
594
00:23:54.205 --> 00:23:56.205
It goes off to, we'll just call it Chat GPT,
595
00:23:56.205 --> 00:23:58.405
but you send it off to Chat GPT
596
00:23:58.625 --> 00:24:00.245
and it'll answer for you and comes back, right?
597
00:24:00.465 --> 00:24:02.765
And, um, so just for clarity, we know chat,
598
00:24:03.045 --> 00:24:04.325
GBT is an application.
599
00:24:04.355 --> 00:24:06.765
It's the open AI API set that you're using under it.
600
00:24:06.765 --> 00:24:09.005
But for the purpose of this, we'll just keep referencing
601
00:24:09.005 --> 00:24:10.925
that whole magical Chat GPT box,
602
00:24:10.925 --> 00:24:12.165
right? Keep things simple here.
603
00:24:12.865 --> 00:24:15.245
So, uh, we had a question, uh, come in, Chris,
604
00:24:16.025 --> 00:24:18.005
do test vendors track hotkey
605
00:24:18.145 --> 00:24:20.045
and report that back to the client?
606
00:24:20.585 --> 00:24:22.965
Or are those hotkeys instantly blocked?
607
00:24:24.175 --> 00:24:27.075
So it's going, it's, it's a really interesting question.
608
00:24:27.075 --> 00:24:28.955
There's a lot of variables to that.
609
00:24:29.215 --> 00:24:33.075
Um, there you can, it's really gonna depend on what,
610
00:24:33.225 --> 00:24:34.475
what your vendor wants to do,
611
00:24:34.545 --> 00:24:36.795
what you're comfortable doing and what makes sense.
612
00:24:36.855 --> 00:24:38.595
And so let me give a couple examples there.
613
00:24:38.935 --> 00:24:43.515
So tracking hotkey in order to track hotkey, okay, well,
614
00:24:43.515 --> 00:24:45.115
you're gonna install a key listener, right?
615
00:24:45.115 --> 00:24:46.115
Because you need to know that it's
616
00:24:46.115 --> 00:24:47.035
hotkeys are getting pressed.
617
00:24:47.035 --> 00:24:49.435
And then it's like, well, what hotkey are you pressing?
618
00:24:49.435 --> 00:24:50.595
Because at the end of the day,
619
00:24:51.135 --> 00:24:52.795
you can make your own application
620
00:24:52.865 --> 00:24:55.795
that can just fire off if you hit a certain key
621
00:24:55.795 --> 00:24:57.235
that is just rarely used, right?
622
00:24:57.615 --> 00:24:58.835
You can do those type of things.
623
00:24:58.895 --> 00:25:00.795
Or maybe you do shift AA twice, right?
624
00:25:01.135 --> 00:25:03.595
Do key strings instead of hotkey specifically.
625
00:25:03.895 --> 00:25:05.755
So there's those things to think about, right?
626
00:25:06.015 --> 00:25:07.875
Um, the other thing you wanna think about is, well,
627
00:25:07.875 --> 00:25:10.435
maybe you're do, maybe you're a test delivery application
628
00:25:10.435 --> 00:25:13.875
that's actually doing some in-app based testing, right?
629
00:25:14.055 --> 00:25:16.075
And so you're using this other software
630
00:25:16.075 --> 00:25:17.835
and you're testing to make sure the user knows
631
00:25:17.835 --> 00:25:20.035
that software well, that user's going to need
632
00:25:20.035 --> 00:25:21.835
to use hotkeys for those type of things, right?
633
00:25:21.835 --> 00:25:23.595
So you're just gonna blanket block hotkey
634
00:25:23.615 --> 00:25:24.995
or are you gonna do those type of things,
635
00:25:25.295 --> 00:25:27.195
or you gonna a key log or, and monitor that?
636
00:25:27.495 --> 00:25:28.835
And, and, um, there's really,
637
00:25:28.835 --> 00:25:30.355
there's really no one answer to this.
638
00:25:30.455 --> 00:25:32.595
Um, there, there's a lot of things to think about, um,
639
00:25:32.895 --> 00:25:34.835
but kind of, kind of get into the idea
640
00:25:34.975 --> 00:25:37.275
of blocking an attack like this, right?
641
00:25:37.505 --> 00:25:38.595
It's important to understand
642
00:25:38.735 --> 00:25:40.795
how exactly is this attack even working?
643
00:25:41.055 --> 00:25:42.315
And if you think about it,
644
00:25:42.335 --> 00:25:45.235
it breaks down into three key pieces of there,
645
00:25:45.235 --> 00:25:48.275
there's three main pieces to this attack, which is cool
646
00:25:48.275 --> 00:25:50.115
because that gives you three chances to break it.
647
00:25:50.315 --> 00:25:52.155
'cause each, each step is dependent on the
648
00:25:52.355 --> 00:25:53.435
previous step, okay?
649
00:25:53.815 --> 00:25:57.435
So the first step is getting the item, getting the question
650
00:25:57.505 --> 00:25:59.395
that you need to send off to the robot.
651
00:25:59.425 --> 00:26:01.395
Alright? So how do you get that?
652
00:26:01.745 --> 00:26:02.995
Well, there's a coup, there's
653
00:26:02.995 --> 00:26:04.035
a lot of different ways you can do that.
654
00:26:04.035 --> 00:26:05.715
And people can get really creative, right?
655
00:26:05.975 --> 00:26:07.475
Uh, you can go the physical route
656
00:26:07.475 --> 00:26:09.275
where you're wearing a camera and those type of things.
657
00:26:09.275 --> 00:26:10.795
And it's like if you, once you get in the physical,
658
00:26:10.965 --> 00:26:13.595
we'll just, we'll just kind of set that conversation aside.
659
00:26:13.615 --> 00:26:15.155
So, right? So just thinking about kind
660
00:26:15.155 --> 00:26:16.795
of software based stuff, how can I get it?
661
00:26:16.825 --> 00:26:19.475
Well, maybe I can just take a picture of the screen
662
00:26:19.475 --> 00:26:20.675
through a hotkey, right?
663
00:26:20.775 --> 00:26:21.915
That's one way I can do it.
664
00:26:21.915 --> 00:26:24.075
Or, or a key string hotkey or a key string.
665
00:26:24.335 --> 00:26:26.995
Or maybe what I could do is I can utilize some, uh,
666
00:26:26.995 --> 00:26:28.595
accessibility interfaces, right?
667
00:26:28.855 --> 00:26:31.075
So if you think about applications like JAWS
668
00:26:31.075 --> 00:26:33.515
and those type of things, well, they're able
669
00:26:33.515 --> 00:26:35.115
to get the text off the screen, all right?
670
00:26:35.115 --> 00:26:36.115
Well, if they're able to do it,
671
00:26:36.115 --> 00:26:37.795
and then another program's able to do it, right?
672
00:26:37.815 --> 00:26:40.675
So can, can you exploit those type of accessibility, inform,
673
00:26:40.695 --> 00:26:43.325
uh, interfaces to get that type of information?
674
00:26:43.325 --> 00:26:45.525
Alright? So that's, that's,
675
00:26:45.625 --> 00:26:47.965
and I think that this application is probably using
676
00:26:48.115 --> 00:26:49.685
accessibility, if I had to guess.
677
00:26:49.745 --> 00:26:51.725
Now, they, they added a screenshot feature too,
678
00:26:52.065 --> 00:26:54.565
but, um, that those are some ways that they could do it.
679
00:26:54.565 --> 00:26:56.005
All right? So, so the step one is
680
00:26:56.005 --> 00:26:57.045
getting the data, all right?
681
00:26:57.145 --> 00:26:58.525
And so you wanna make sure, like, okay,
682
00:26:58.585 --> 00:26:59.765
can I shut down that vector?
683
00:26:59.865 --> 00:27:01.205
How can I stop those things?
684
00:27:01.535 --> 00:27:03.285
Limit accessibility to just the people
685
00:27:03.285 --> 00:27:04.365
that are approved to use it.
686
00:27:04.365 --> 00:27:06.845
Make sure that you can't take a screenshot those times.
687
00:27:06.895 --> 00:27:08.005
Block it that way, right?
688
00:27:08.145 --> 00:27:11.125
And you can always just look for a process called Chat NCL l
689
00:27:11.145 --> 00:27:12.845
or I think they call El Lucifer on here.
690
00:27:13.025 --> 00:27:15.165
You can, you can try to block it at the process level too.
691
00:27:15.165 --> 00:27:18.045
It's, it's gonna be how much, what, what road you want
692
00:27:18.045 --> 00:27:19.445
to go down to block, something like that, right?
693
00:27:19.625 --> 00:27:21.365
So if you're able to stop the information,
694
00:27:21.385 --> 00:27:22.765
you've killed the attack right there,
695
00:27:22.765 --> 00:27:24.525
they can't get the data, they're not gonna,
696
00:27:24.525 --> 00:27:26.405
they're not even gonna get the step two and step three.
697
00:27:26.435 --> 00:27:30.085
Alright? So step two, getting the data up and back, right?
698
00:27:30.105 --> 00:27:32.365
So now, now let's just say that they've gotten the data.
699
00:27:32.705 --> 00:27:34.765
The second part to that attack is, well, now they need
700
00:27:34.765 --> 00:27:36.045
to get the answer to that question,
701
00:27:36.045 --> 00:27:37.685
whether they're sending off the screenshot
702
00:27:37.685 --> 00:27:39.005
or they're sending that, right?
703
00:27:39.385 --> 00:27:41.685
So that's going to be some network traffic.
704
00:27:41.945 --> 00:27:44.365
If they're using, uh, an open AI interface
705
00:27:44.385 --> 00:27:47.365
or some other LLM out there that an an online LLM,
706
00:27:47.435 --> 00:27:49.605
they're gonna send that information up and back.
707
00:27:49.605 --> 00:27:51.925
Right? Now, that's not the only way to do something like
708
00:27:51.925 --> 00:27:53.005
that, but that's, that's there.
709
00:27:53.005 --> 00:27:55.245
So monitoring traffic, right?
710
00:27:55.465 --> 00:27:57.125
Now, what's important to realize is that
711
00:27:57.125 --> 00:27:59.085
that web traffic is happening outside
712
00:27:59.085 --> 00:28:00.365
of your secure testing app.
713
00:28:00.465 --> 00:28:01.885
So it's not something if,
714
00:28:01.945 --> 00:28:03.365
if you're just monitoring all the app,
715
00:28:03.365 --> 00:28:04.845
all the network traffic that's happening
716
00:28:04.845 --> 00:28:05.845
inside your application,
717
00:28:05.845 --> 00:28:07.445
you're not gonna catch something like that, right?
718
00:28:07.625 --> 00:28:09.285
You need to think more holistically, right?
719
00:28:09.625 --> 00:28:12.635
If, if you wanna try to go that route of,
720
00:28:12.895 --> 00:28:14.395
of monitoring the traffic, well,
721
00:28:14.395 --> 00:28:15.915
how would you do something like that, right?
722
00:28:15.975 --> 00:28:17.475
You need to look at it from that perspective.
723
00:28:18.685 --> 00:28:20.705
Now, let's say that they get the information up
724
00:28:20.705 --> 00:28:23.785
and back, the third most important piece to this attack
725
00:28:24.485 --> 00:28:26.785
is getting the answer back to the user, right?
726
00:28:27.085 --> 00:28:28.425
It doesn't matter if they got it
727
00:28:28.425 --> 00:28:29.465
and they got the answer, well,
728
00:28:29.465 --> 00:28:30.465
how are you gonna get it on the screen?
729
00:28:30.465 --> 00:28:31.825
Right? And this is where you gotta get
730
00:28:31.825 --> 00:28:33.025
really creative, right?
731
00:28:33.295 --> 00:28:35.465
Because what are you gonna do?
732
00:28:35.525 --> 00:28:38.585
Are you gonna just kind of utilize some kind of interface
733
00:28:38.585 --> 00:28:40.505
that's gonna find the radio button on the screen
734
00:28:40.505 --> 00:28:43.945
and check it or kind of type or, or this
735
00:28:44.005 --> 00:28:45.345
or play audio, right?
736
00:28:45.525 --> 00:28:47.305
And if you think about it, realistically,
737
00:28:47.445 --> 00:28:49.825
if you're playing audio that has the answer back
738
00:28:49.825 --> 00:28:53.025
to the person, the the proctor's gonna hear something like
739
00:28:53.265 --> 00:28:54.385
that if they're watching it, right?
740
00:28:54.725 --> 00:28:58.185
Um, now I think what this app was doing, they were probably,
741
00:28:58.285 --> 00:29:00.105
my guess is they were probably using send keys.
742
00:29:00.335 --> 00:29:02.505
Like, uh, so they're using a Windows interface
743
00:29:02.505 --> 00:29:04.465
that actually just injects,
744
00:29:04.695 --> 00:29:07.305
injects characters onto an element on the screen.
745
00:29:07.745 --> 00:29:08.905
I think that's probably what they were doing.
746
00:29:08.905 --> 00:29:10.665
There's a bunch of different ways you could do that.
747
00:29:10.965 --> 00:29:12.345
So that's another way if,
748
00:29:12.405 --> 00:29:13.625
and that will really only work
749
00:29:13.625 --> 00:29:15.105
for essay type questions, right?
750
00:29:15.365 --> 00:29:18.105
And so, so you have your accessibility interfaces, you have,
751
00:29:18.105 --> 00:29:19.185
um, those type of things.
752
00:29:19.485 --> 00:29:22.265
And so people can get creative around those things,
753
00:29:22.285 --> 00:29:24.105
and it's really just kind of monitoring it
754
00:29:24.105 --> 00:29:25.505
and looking for that, the getting
755
00:29:25.505 --> 00:29:26.585
that information back, right?
756
00:29:26.605 --> 00:29:28.785
So, so ev so they have to,
757
00:29:29.045 --> 00:29:31.225
so usually the hacker has it easy,
758
00:29:31.285 --> 00:29:34.305
but here, in this case, you have three chances to block 'em.
759
00:29:34.305 --> 00:29:36.025
And if you succeed in any one of those three,
760
00:29:36.445 --> 00:29:38.145
you've stopped the attack, right?
761
00:29:38.215 --> 00:29:40.585
They need all three of these to succeed in order
762
00:29:40.585 --> 00:29:43.485
for this attack to work where there, whereas this, whereas
763
00:29:44.005 --> 00:29:45.445
somebody who's trying to protect their test
764
00:29:45.865 --> 00:29:47.445
and, uh, make sure that people aren't cheating,
765
00:29:47.505 --> 00:29:49.285
you only need to block one of those three things.
766
00:29:51.245 --> 00:29:54.105
So, uh, again, uh, to, so for mitigation
767
00:29:54.285 --> 00:29:57.865
for a level two cheater, I, I think the answer is again, uh,
768
00:29:58.445 --> 00:30:01.265
you know, th this needs to be things that your secure,
769
00:30:01.365 --> 00:30:03.665
secure browser can, uh, address.
770
00:30:03.925 --> 00:30:07.425
And, uh, like with all security, there's, you know, you need
771
00:30:07.425 --> 00:30:09.665
to stop things on, on multiple levels. Is that right?
772
00:30:10.445 --> 00:30:15.375
Yes. Yep. Alright, let's move on then to,
773
00:30:16.035 --> 00:30:17.975
uh, the level three cheater.
774
00:30:18.235 --> 00:30:21.295
Um, this is the, the cheater for hire.
775
00:30:21.515 --> 00:30:26.415
So, um, this can be, uh, a person who's worked in, uh,
776
00:30:26.665 --> 00:30:29.135
innovative technologies for several years
777
00:30:29.355 --> 00:30:31.535
and decides he he wants to break bad
778
00:30:31.675 --> 00:30:34.375
and, you know, start, uh, helping people cheat instead of,
779
00:30:34.795 --> 00:30:36.175
uh, being a force for good.
780
00:30:36.715 --> 00:30:39.695
Uh, if someone was to go hire someone like this
781
00:30:40.275 --> 00:30:43.455
and this person for, you know, a much half
782
00:30:43.455 --> 00:30:44.775
to your fee than just a download
783
00:30:44.775 --> 00:30:48.735
of a software will customize a cheating experience just
784
00:30:48.755 --> 00:30:51.695
for you, the, the tailor made cheating experience,
785
00:30:52.035 --> 00:30:53.215
uh, what might that look like?
786
00:30:54.085 --> 00:30:56.815
Yeah. So that could look like a whole bunch
787
00:30:56.815 --> 00:30:58.735
of different other, uh, different things, right?
788
00:30:59.075 --> 00:31:03.175
Um, what's the, if, if I was going to provide something like
789
00:31:03.175 --> 00:31:05.855
that, I wouldn't even bother with AI to begin with, right?
790
00:31:05.935 --> 00:31:07.775
I, I go with the proxy testing route.
791
00:31:08.035 --> 00:31:10.415
How can I get something running inside a virtual machine
792
00:31:10.415 --> 00:31:11.775
or through screen sharing software, right?
793
00:31:11.775 --> 00:31:14.135
That's gonna be easiest. And then I'll just do all the
794
00:31:14.295 --> 00:31:15.895
cheating on my end, whether I know the content
795
00:31:15.955 --> 00:31:16.975
or whether I'm looking it up
796
00:31:16.975 --> 00:31:18.735
as the test goes, I'll do something like that.
797
00:31:18.735 --> 00:31:20.055
But we're here to talk about ai,
798
00:31:20.055 --> 00:31:21.615
so we're not gonna go down those roads, right?
799
00:31:21.795 --> 00:31:23.895
But there's never just one answer to a problem.
800
00:31:24.435 --> 00:31:27.375
So what, what, what that would kind of look like,
801
00:31:27.375 --> 00:31:28.455
would probably, you would probably,
802
00:31:28.635 --> 00:31:29.935
one thing you could do is kind of take
803
00:31:29.935 --> 00:31:32.015
that Chat NCL application and kind of,
804
00:31:32.275 --> 00:31:33.735
and kind of homegrown it, right?
805
00:31:34.035 --> 00:31:35.535
Try to do a couple more things to it.
806
00:31:35.595 --> 00:31:38.495
And so just to kind of give an idea here, I can show,
807
00:31:38.675 --> 00:31:40.255
so we have this homegrown app that,
808
00:31:40.255 --> 00:31:42.795
that we've made here, all right?
809
00:31:42.795 --> 00:31:46.345
And I'll share my screen one more time. All right.
810
00:31:46.405 --> 00:31:48.785
So what I'm gonna do is just kind of launch my application.
811
00:31:48.785 --> 00:31:51.185
So this is just like the, the Chat NCL
812
00:31:51.185 --> 00:31:52.425
that we were just looking at, right?
813
00:31:52.865 --> 00:31:55.785
And I have my test here. And so what I've done is basically,
814
00:31:55.785 --> 00:31:56.785
Uh, Chris, I don't see your screen
815
00:31:57.045 --> 00:31:58.045
Yet. You don't see my
816
00:31:58.045 --> 00:31:59.345
screen? All right. Lemme try. Nope.
817
00:31:59.345 --> 00:32:01.145
Oh, 'cause I didn't, I didn't hit the share button.
818
00:32:01.405 --> 00:32:03.665
All right, there we go. Okay, cool. All right.
819
00:32:03.805 --> 00:32:06.385
So I have my, I have my testing application here.
820
00:32:09.925 --> 00:32:12.225
All, lemme get rid of that thing. There we go. All right.
821
00:32:12.245 --> 00:32:15.585
So now I should just be able to kind of hit a hot key
822
00:32:15.605 --> 00:32:20.105
and then it's going to kind of run, all right?
823
00:32:20.615 --> 00:32:23.265
Okay. All right. Ah, it's 'cause I'm doing the screen share.
824
00:32:23.365 --> 00:32:26.105
All right. So, so this is a great example here though.
825
00:32:26.105 --> 00:32:27.825
So even though it's not working right here, it's not,
826
00:32:27.865 --> 00:32:28.905
I know exactly why it's not working.
827
00:32:28.935 --> 00:32:30.545
It's not working because there's screen share
828
00:32:30.545 --> 00:32:31.785
interface on top of the test.
829
00:32:32.045 --> 00:32:35.985
So as a, so let's just say that, okay, that is what,
830
00:32:35.985 --> 00:32:38.945
that is the gap that that Chat NCL application had, okay?
831
00:32:39.385 --> 00:32:42.365
So what I could do as a homegrown hacker is I can actually
832
00:32:42.365 --> 00:32:45.165
tailor make my solution to that, right?
833
00:32:45.565 --> 00:32:48.085
I can take into all the accounts that this secure testing,
834
00:32:48.155 --> 00:32:50.445
that this test is gonna be delivered in a secure interface.
835
00:32:50.545 --> 00:32:51.565
And I could take a concept
836
00:32:51.575 --> 00:32:54.445
where I'm gonna call open AI APIs under the cover and,
837
00:32:54.445 --> 00:32:56.085
and put together custom hotkey
838
00:32:56.425 --> 00:32:58.565
and make it so that I'm gonna leverage whatever
839
00:32:58.565 --> 00:32:59.885
that secure browser isn't,
840
00:33:00.085 --> 00:33:02.005
whatever vectors aren't being shut down there, right?
841
00:33:02.305 --> 00:33:03.965
And make it so that way, okay, I know
842
00:33:03.965 --> 00:33:05.885
that this test is gonna have multiple choice questions,
843
00:33:06.165 --> 00:33:08.045
I know that it's gonna have reading passages, those type
844
00:33:08.045 --> 00:33:10.565
of things and tailor my solution to that, right?
845
00:33:10.785 --> 00:33:12.605
And then you could take it a step further, right?
846
00:33:12.665 --> 00:33:15.375
You could do these things where that
847
00:33:16.945 --> 00:33:21.765
you're not just going to online APIs, you can take it
848
00:33:21.765 --> 00:33:24.805
to another scenario and look off offline APIs, right?
849
00:33:24.805 --> 00:33:26.525
Maybe you don't want to have that network traffic.
850
00:33:26.585 --> 00:33:28.445
And so you can use things called s SLMs,
851
00:33:28.445 --> 00:33:30.605
those small language models, right?
852
00:33:30.815 --> 00:33:32.885
Which they're not gonna be as powerful, right?
853
00:33:32.885 --> 00:33:35.085
Those large language models, they're running online,
854
00:33:35.085 --> 00:33:37.085
they're trained on the entirety of the internet.
855
00:33:37.215 --> 00:33:39.525
These small language models, they're more optimized,
856
00:33:39.525 --> 00:33:40.605
they don't have all that knowledge.
857
00:33:40.605 --> 00:33:43.165
And so if you just hook it up to a small language model,
858
00:33:43.835 --> 00:33:46.205
it's probably not gonna be able to pass your test for you.
859
00:33:46.395 --> 00:33:48.885
It's, but it's gonna be great at being able to route things
860
00:33:49.025 --> 00:33:51.245
and, uh, get that, get that NLP interfaces,
861
00:33:51.245 --> 00:33:53.045
those natural language processing type
862
00:33:53.045 --> 00:33:54.205
of things going on, right?
863
00:33:54.745 --> 00:33:58.125
So, but you can make those SLM smarter, right?
864
00:33:58.345 --> 00:34:00.765
And we were getting into this in the last time we talked,
865
00:34:00.865 --> 00:34:02.205
um, so that, that rag,
866
00:34:02.205 --> 00:34:04.565
that retrieval augmented generation, right?
867
00:34:04.825 --> 00:34:07.005
So if you're building like a custom homegrown solution,
868
00:34:07.005 --> 00:34:08.525
maybe you're gonna look into something like that.
869
00:34:08.525 --> 00:34:10.885
Like, I know I'm gonna be taking a medical exam,
870
00:34:11.145 --> 00:34:13.645
so I'm gonna get all of my medical documents,
871
00:34:13.645 --> 00:34:14.765
throw 'em in a database,
872
00:34:15.105 --> 00:34:16.645
and then, uh, get it all set up
873
00:34:16.645 --> 00:34:17.685
with my embeddings and everything.
874
00:34:17.685 --> 00:34:22.085
So that way now I'm just gonna run A-A-S-L-M offline on my
875
00:34:22.325 --> 00:34:25.485
computer that's going to allow my, uh, my, uh,
876
00:34:25.665 --> 00:34:27.325
my dumber SLM, right?
877
00:34:27.325 --> 00:34:28.525
The one that doesn't have all the entire
878
00:34:28.525 --> 00:34:30.885
of the internet knowledge to be able to reference that.
879
00:34:30.905 --> 00:34:33.685
So it's gonna like, oh, I know the context of the question,
880
00:34:33.905 --> 00:34:36.245
I'm smart enough to go and at least get the additional data
881
00:34:36.305 --> 00:34:38.725
and then par that data in real time to figure out
882
00:34:38.725 --> 00:34:40.925
what the appropriate answer is gonna be right
883
00:34:41.425 --> 00:34:42.425
Now. Yeah. So in this case, the,
884
00:34:42.425 --> 00:34:45.125
in that case, the, the SLM,
885
00:34:45.185 --> 00:34:47.725
the AI software is really just responsible for
886
00:34:47.725 --> 00:34:49.205
that interaction, right?
887
00:34:49.475 --> 00:34:54.005
Like it, it knows what's in the database, it knows how
888
00:34:54.005 --> 00:34:56.485
to tell you in English what the right answer is
889
00:34:56.485 --> 00:34:58.125
or how to answer a question.
890
00:34:58.185 --> 00:35:00.965
So it's really just facilitating the transfer
891
00:35:00.965 --> 00:35:03.925
of knowledge from your database of knowledge to your test
892
00:35:03.945 --> 00:35:05.005
or to you directly, right?
893
00:35:05.425 --> 00:35:08.115
Yep. Exactly. Yep.
894
00:35:08.985 --> 00:35:11.795
It's, it's, it's, uh, it's, it's tightening up that,
895
00:35:11.825 --> 00:35:14.595
that level, that, that, that centerpiece of the attack,
896
00:35:14.615 --> 00:35:17.435
the step two, it's removing the whole network traffic from
897
00:35:17.435 --> 00:35:18.755
the equation and those type of things.
898
00:35:18.775 --> 00:35:21.995
And so, so, so if you're gonna go down that custom route,
899
00:35:21.995 --> 00:35:25.355
those are things that people can do to make sure to, to kind
900
00:35:25.355 --> 00:35:26.755
of build a better solution than what's,
901
00:35:26.755 --> 00:35:28.555
than what's just gonna be better off the shelf.
902
00:35:28.695 --> 00:35:31.075
So it's important to just stay, be vigilant
903
00:35:31.255 --> 00:35:32.635
of what's available out there
904
00:35:32.935 --> 00:35:35.475
and look at what these attacks, what, what, what type
905
00:35:35.475 --> 00:35:36.595
of attacks are being made,
906
00:35:36.775 --> 00:35:39.925
and then coming up with ways to, uh, block those things
907
00:35:40.065 --> 00:35:42.925
as well as thinking about how health can they be used
908
00:35:42.925 --> 00:35:44.445
or modified, and what do I,
909
00:35:44.445 --> 00:35:45.725
what else do I need to look out for?
910
00:35:47.785 --> 00:35:51.415
Great. Anything different, uh, for mitigating, uh, this,
911
00:35:51.525 --> 00:35:54.615
this attack over, you know, what we've already talked about.
912
00:35:55.935 --> 00:35:59.115
So if you're going to be looking for these type of things,
913
00:35:59.355 --> 00:36:01.635
I, I think focusing on step one
914
00:36:01.635 --> 00:36:04.515
and step three are gonna get a lot more bang for the buck.
915
00:36:04.775 --> 00:36:07.195
Um, step two is gonna be kind of hard, right?
916
00:36:07.195 --> 00:36:09.395
Like, there, there's going to be indicators, right?
917
00:36:09.395 --> 00:36:12.195
If it's a CPU based one, you're gonna see a spike there.
918
00:36:12.195 --> 00:36:14.155
If it's GPU based, uh, right?
919
00:36:14.155 --> 00:36:15.435
If you're running a GPU based,
920
00:36:15.545 --> 00:36:16.875
it's gonna be a spike there, right?
921
00:36:17.135 --> 00:36:18.955
And so there's, those are things you can infer.
922
00:36:18.955 --> 00:36:21.315
There's data collection, uh, techniques that you can do
923
00:36:21.315 --> 00:36:22.395
and monitor this stuff,
924
00:36:22.495 --> 00:36:25.155
but I really think the best bang for your buck is gonna be
925
00:36:25.715 --> 00:36:28.395
stopping them from either, uh, getting the data into,
926
00:36:28.505 --> 00:36:29.955
into the model and, uh,
927
00:36:30.155 --> 00:36:32.075
blocking the data from an output in from the model.
928
00:36:33.895 --> 00:36:37.935
Okay. Great. Um, we've got about
929
00:36:38.625 --> 00:36:41.535
eight minutes left, uh, and no open questions.
930
00:36:42.235 --> 00:36:46.335
Um, I have, I guess I have a follow up question for you.
931
00:36:46.875 --> 00:36:50.055
Um, these cheating applications, they're,
932
00:36:50.645 --> 00:36:52.695
they're suddenly everywhere, right?
933
00:36:53.395 --> 00:36:58.295
Um, how do you think AI has helped, uh, people that want
934
00:36:58.315 --> 00:36:59.975
to make cheating applications?
935
00:37:00.475 --> 00:37:02.175
Um, and spoiler earlier, I,
936
00:37:02.295 --> 00:37:03.375
I know the answer to this question.
937
00:37:03.575 --> 00:37:04.695
I'm a developer myself.
938
00:37:05.315 --> 00:37:08.535
How has AI helped make cheating applications?
939
00:37:08.635 --> 00:37:10.535
Why are they so, so much
940
00:37:10.535 --> 00:37:12.015
more prevalent now than they were before?
941
00:37:12.435 --> 00:37:14.055
Or why are they better now
942
00:37:14.055 --> 00:37:15.575
and more polished than they used to be?
943
00:37:16.145 --> 00:37:17.575
Right? Uh, no, I mean, I,
944
00:37:17.695 --> 00:37:19.535
I think both the things you said are true, right?
945
00:37:19.555 --> 00:37:20.615
Why are they more prevalent
946
00:37:20.615 --> 00:37:22.175
and why are they more polished, right?
947
00:37:22.245 --> 00:37:24.575
It's because you no longer need
948
00:37:24.575 --> 00:37:27.215
to be a code expert to develop these things.
949
00:37:27.275 --> 00:37:29.935
You need a base level understanding and,
950
00:37:30.275 --> 00:37:32.255
and AI can even help you get
951
00:37:32.255 --> 00:37:33.815
that base level understanding, right?
952
00:37:33.995 --> 00:37:37.575
The robot is being used to build the robot, right?
953
00:37:38.075 --> 00:37:40.655
So you can use it in a couple ways, right?
954
00:37:40.655 --> 00:37:43.015
You can use it to even give you ideas on how you're gonna,
955
00:37:43.075 --> 00:37:44.615
on how you're gonna do something, right?
956
00:37:44.995 --> 00:37:46.255
Um, you just gotta phrase it right?
957
00:37:46.255 --> 00:37:47.895
So that, 'cause they have safeguards in place,
958
00:37:47.915 --> 00:37:49.775
but right, there's always different ways
959
00:37:50.015 --> 00:37:51.175
you can ask the same question.
960
00:37:51.675 --> 00:37:52.735
Um, and, but,
961
00:37:52.795 --> 00:37:54.895
but really where it's coming in play, really, really
962
00:37:54.895 --> 00:37:57.375
where it's coming in handy is, is doing code reviews
963
00:37:57.395 --> 00:37:58.775
and writing unit tests for you.
964
00:37:58.795 --> 00:38:00.455
So if you're actually trying
965
00:38:00.455 --> 00:38:02.815
to put out a good quality cheating application,
966
00:38:03.115 --> 00:38:05.975
you no longer need a, a team of experienced developers.
967
00:38:05.975 --> 00:38:07.175
It could be a single person
968
00:38:07.555 --> 00:38:10.535
that's just having the robot do the code reviews for 'em,
969
00:38:10.535 --> 00:38:12.295
or calling out spots where their code might fail
970
00:38:12.295 --> 00:38:15.015
and crash on them and really helping them to create a,
971
00:38:15.055 --> 00:38:16.575
a better, more stable product.
972
00:38:17.115 --> 00:38:19.895
Um, it, it's like having a, a junior
973
00:38:19.955 --> 00:38:21.575
to senior level developer, depending on
974
00:38:21.575 --> 00:38:23.255
what model you're using right at your fingertips,
975
00:38:23.255 --> 00:38:27.055
that's going to work 24 7 for you, right? Um, but
976
00:38:27.215 --> 00:38:28.615
The UI piece of it too, right?
977
00:38:29.755 --> 00:38:31.405
Yeah, yeah. That, that piece too.
978
00:38:31.545 --> 00:38:34.325
Um, so we've even been playing around with that stuff too.
979
00:38:34.465 --> 00:38:38.165
Uh, so we can, uh, we, we have our own in-house, um, robot
980
00:38:38.165 --> 00:38:39.805
that we can either feed it, uh,
981
00:38:39.885 --> 00:38:41.965
a basic paint Microsoft paint image
982
00:38:41.965 --> 00:38:43.485
and say, Hey, I wanna make this ui
983
00:38:43.625 --> 00:38:46.485
and it just gives us back the JavaScript, the markup,
984
00:38:46.485 --> 00:38:47.805
the CSS everything to make it,
985
00:38:47.805 --> 00:38:49.245
or the c if you're gonna do something
986
00:38:49.245 --> 00:38:50.365
on, on that side of the house.
987
00:38:50.945 --> 00:38:53.805
Um, and, but it's, it's, it's really, yeah,
988
00:38:53.805 --> 00:38:55.045
both the front and the back end.
989
00:38:55.155 --> 00:38:58.405
It's, it's there and you, you really just kind of, you're,
990
00:38:58.405 --> 00:38:59.925
you're not a professional company, right?
991
00:38:59.925 --> 00:39:01.845
You're, you're, you're a single person that's trying
992
00:39:01.845 --> 00:39:03.645
to maximize your, your profit
993
00:39:04.105 --> 00:39:05.605
for the attack that you're trying to do.
994
00:39:05.625 --> 00:39:08.445
And the best way to maximize it is to limit the people
995
00:39:08.445 --> 00:39:11.085
that you need, not only for profit margin,
996
00:39:11.265 --> 00:39:12.685
but for also security, right?
997
00:39:12.685 --> 00:39:13.805
The less people that know about it,
998
00:39:13.805 --> 00:39:15.125
the less people you have to worry about,
999
00:39:15.965 --> 00:39:16.965
Right? And,
1000
00:39:16.965 --> 00:39:20.875
and AI as, as a coding assistant is cheap.
1001
00:39:21.425 --> 00:39:24.195
Yeah. Much, much less than another person,
1002
00:39:24.905 --> 00:39:25.905
Much cheaper. And,
1003
00:39:25.905 --> 00:39:28.195
and, uh, it's also more appealing on the
1004
00:39:28.195 --> 00:39:29.395
candidate aspect, right?
1005
00:39:29.575 --> 00:39:33.795
If I'm somebody who is going to cheat on an exam,
1006
00:39:35.075 --> 00:39:39.435
I would much rather prefer using a AI based solution
1007
00:39:39.455 --> 00:39:42.235
as opposed to turning over my whole entire computer
1008
00:39:42.535 --> 00:39:44.475
to an actual, another human being, right?
1009
00:39:44.475 --> 00:39:46.235
Because you don't know what they're gonna be doing,
1010
00:39:46.415 --> 00:39:48.355
you already know that they're most,
1011
00:39:48.355 --> 00:39:50.595
they're already not on the up and up, right?
1012
00:39:50.615 --> 00:39:52.315
You already know, you already know that there's some kind
1013
00:39:52.315 --> 00:39:54.115
of level of trust that you should be worried about to begin
1014
00:39:54.115 --> 00:39:58.645
with, but it's much more, uh, it's much more, uh,
1015
00:39:58.645 --> 00:40:00.325
reasonable from a candidate perspective.
1016
00:40:00.355 --> 00:40:02.845
Just run a tiny application, you can kick off at the end
1017
00:40:02.845 --> 00:40:05.205
of the day or even run on just the junk pc,
1018
00:40:05.205 --> 00:40:08.165
rather than letting somebody into your whole world knowing a
1019
00:40:08.325 --> 00:40:09.445
lot more things about you than
1020
00:40:09.445 --> 00:40:10.565
you otherwise wouldn't have to.
1021
00:40:10.665 --> 00:40:12.845
So I think, I think on both ends of the spectrum,
1022
00:40:13.345 --> 00:40:14.765
AI is also contributing there.
1023
00:40:15.785 --> 00:40:17.195
Okay, we had a great question.
1024
00:40:17.455 --> 00:40:18.795
Uh, just come in
1025
00:40:18.895 --> 00:40:22.155
and, uh, it's something that, uh, another thing that,
1026
00:40:22.155 --> 00:40:23.875
that you've been playing around with, um,
1027
00:40:24.095 --> 00:40:27.155
the question is about, uh, fakes.
1028
00:40:27.535 --> 00:40:29.795
Can a lockdown browser prevent someone
1029
00:40:30.825 --> 00:40:32.115
from using a deep fake
1030
00:40:32.375 --> 00:40:35.315
to impersonate the legitimate test taker
1031
00:40:35.935 --> 00:40:38.635
and allow that person to take a test for someone else?
1032
00:40:39.855 --> 00:40:41.995
Man, so I like how
1033
00:40:41.995 --> 00:40:43.875
that question's like asked in an absolute right.
1034
00:40:44.215 --> 00:40:46.515
Um, so I'll never say anything is a
1035
00:40:46.515 --> 00:40:47.555
hundred percent blockable.
1036
00:40:47.755 --> 00:40:49.275
'cause if you poke at something long enough,
1037
00:40:49.275 --> 00:40:50.635
you're gonna come up with a different way.
1038
00:40:50.695 --> 00:40:52.435
But with that being said, yes,
1039
00:40:52.435 --> 00:40:54.035
there are ways you can do that, right?
1040
00:40:54.035 --> 00:40:55.595
And so if you break down that type
1041
00:40:55.595 --> 00:40:56.835
of attack, what are you looking at?
1042
00:40:57.065 --> 00:40:59.275
Well, you're, you're looking at possible voice emulation
1043
00:40:59.535 --> 00:41:01.635
and you're looking at a possible, uh,
1044
00:41:02.035 --> 00:41:03.235
deepfake emulation, right?
1045
00:41:03.235 --> 00:41:04.555
There's two pieces of that, whether
1046
00:41:04.555 --> 00:41:05.635
or not you have to speak or not.
1047
00:41:05.775 --> 00:41:08.395
So it's really interesting what you can do there.
1048
00:41:08.535 --> 00:41:12.155
Um, the, the, the easiest route to go is to just kind
1049
00:41:12.155 --> 00:41:14.195
of prerecord yourself and have,
1050
00:41:14.215 --> 00:41:16.195
and just have a video of you not cheating,
1051
00:41:16.195 --> 00:41:17.715
taking a test for whatever, right?
1052
00:41:17.855 --> 00:41:19.635
So if I was gonna do something like that, I would do that,
1053
00:41:19.855 --> 00:41:22.555
and then I would get a, um, something like,
1054
00:41:22.675 --> 00:41:23.755
like many cam, right?
1055
00:41:23.755 --> 00:41:25.595
Something that has a hockey that allows you
1056
00:41:25.595 --> 00:41:27.035
to switch back and forth between cameras.
1057
00:41:27.135 --> 00:41:29.115
And so you just run your static video feed,
1058
00:41:29.255 --> 00:41:30.875
and if your proctor ever pops in
1059
00:41:30.875 --> 00:41:32.275
and asks a question, you just kind
1060
00:41:32.275 --> 00:41:33.810
of hotkey over to your live feed, right?
1061
00:41:33.810 --> 00:41:35.090
You just make sure you're wearing the same shirt
1062
00:41:35.090 --> 00:41:36.205
and sitting in the same position.
1063
00:41:36.385 --> 00:41:37.885
You go back and forth. The next thing you know,
1064
00:41:37.885 --> 00:41:39.525
you're using the phone, you don't even know you're doing
1065
00:41:39.525 --> 00:41:41.245
that, that that's like the, the low,
1066
00:41:41.245 --> 00:41:42.445
the low tech way to do something.
1067
00:41:42.505 --> 00:41:45.285
Now, getting into the user's question, um, yeah,
1068
00:41:45.305 --> 00:41:48.205
so the things you wanna look out there for is, is it,
1069
00:41:48.425 --> 00:41:51.565
is it a physical device connected to the system
1070
00:41:51.985 --> 00:41:54.285
or is it a software based device, right?
1071
00:41:54.545 --> 00:41:55.565
You, you probably don't want
1072
00:41:55.565 --> 00:41:57.365
to be allowing software based microphones
1073
00:41:57.365 --> 00:41:58.645
and cameras and those type of things.
1074
00:41:58.825 --> 00:42:00.405
Um, uh, so, but,
1075
00:42:00.425 --> 00:42:02.605
but again, you can, you can probably get back into that
1076
00:42:02.605 --> 00:42:03.645
with the process handling
1077
00:42:03.645 --> 00:42:04.765
and a whole bunch of stuff that,
1078
00:42:04.875 --> 00:42:06.285
that we don't have time to get into.
1079
00:42:06.425 --> 00:42:09.605
But, um, there, there are, there are ways you can look out
1080
00:42:09.665 --> 00:42:11.405
and, and block for those type of things.
1081
00:42:11.505 --> 00:42:13.165
But again, at the end of the day,
1082
00:42:13.475 --> 00:42:14.805
it's all about staying vigilant
1083
00:42:14.805 --> 00:42:16.765
and on top of what the latest approaches are.
1084
00:42:16.765 --> 00:42:19.125
Because if you block, if you shut one door,
1085
00:42:19.125 --> 00:42:20.285
another one's gonna open.
1086
00:42:20.965 --> 00:42:23.305
Right? Alright, great.
1087
00:42:23.605 --> 00:42:26.145
Uh, no more open questions.
1088
00:42:26.405 --> 00:42:29.065
Uh, and we're at, uh, 1 43 Eastern.
1089
00:42:29.685 --> 00:42:31.945
Uh, let's go ahead and, uh, wrap up.
1090
00:42:32.405 --> 00:42:35.425
Um, again, this was our last webinar for, uh,
1091
00:42:35.885 --> 00:42:38.505
Summer Demo Days 2024.
1092
00:42:39.085 --> 00:42:42.265
Um, if you would like to see, uh, recordings
1093
00:42:42.265 --> 00:42:45.065
of our other demos, our other webinars,
1094
00:42:45.065 --> 00:42:47.105
those are at tesus.com/webinars.
1095
00:42:47.525 --> 00:42:49.745
Uh, and please again, uh, take a minute
1096
00:42:49.765 --> 00:42:51.105
to fill out the survey.
1097
00:42:51.485 --> 00:42:53.425
Uh, it's a very, uh, short one
1098
00:42:53.485 --> 00:42:55.385
and we would greatly appreciate it.
1099
00:42:55.565 --> 00:42:57.785
Thanks everyone. Have a great rest of your day.