DiscoverAI Security OpsModel Extraction Attacks | Episode 24
Model Extraction Attacks | Episode 24

Model Extraction Attacks | Episode 24

Update: 2025-10-11
Share

Description

🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – 

https://poweredbybhis.com


Model Extraction Attacks | Episode 24
In this solo episode of BHIS Presents: AI Security Ops, Brian Fehrman explores the stealthy world of Model Extraction Attacks—where hackers clone your AI model without ever touching your code. Learn how adversaries can reverse-engineer your multimillion-dollar model simply by querying its API, and why this threat is more than just academic.

We break down:
- What model extraction is and how it works
- Real-world examples like DeepSeek’s alleged distillation of OpenAI models
- The risks to intellectual property, security, and sensitive data
- Defensive strategies including API throttling, output limiting, watermarking, and honeypots
- Legal and ethical questions around benchmarking vs. theft

Whether you're deploying LLMs or classification models, this episode will help you understand how attackers replicate model behavior—and what you can do to stop them.
If your AI is accessible, someone’s probably trying to copy it.


#AIsecurity #ModelExtractionAttacks #Cybersecurity #BHIS #LLMsecurity #AIthreats


----------------------------------------------------------------------------------------------

Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/

Derek Banks - https://www.blackhillsinfosec.com/team/derek-banks/

Brian Fehrman - https://www.blackhillsinfosec.com/team/brian-fehrman/

Bronwen Aker - http://blackhillsinfosec.com/team/bronwen-aker/

Ben Bowman - https://www.blackhillsinfosec.com/team/ben-bowman/


  • (00:00 ) - Intro & Sponsor Shoutouts

  • (01:19 ) - What Is a Model Extraction Attack?

  • (02:45 ) - Why Training a Model Is So Expensive

  • (05:42 ) - How Model Extraction Works

  • (07:11 ) - Why It Matters: IP, Security & Data Risks

  • (10:25 ) - What Makes Extraction Easier or Harder

  • (12:54 ) - Defenses: Monitoring, Watermarking & Privacy

  • (16:04 ) - What to Do If You Suspect an Attack

  • (16:29 ) - Legal & Ethical Questions Around Model Theft

  • (19:30 ) - Final Thoughts & Takeaways

Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Model Extraction Attacks | Episode 24

Model Extraction Attacks | Episode 24

Black Hills Information Security