Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security

The CISO Perspective
15 Feb 202311:25

Summary

TLDRThe video script discusses the dual-edged impact of AI chatbot 'Chat GBT', which utilizes NLP and GPT-3 framework to generate human-like responses. While it aids in code debugging and creation, it's also exploited by attackers for malicious purposes such as finding vulnerabilities, crafting phishing emails, and developing malware. The video highlights the need for security professionals to adapt to AI advancements, emphasizing the importance of both offensive and defensive strategies in cybersecurity.

Takeaways

  • 😀 ChatGBT is an AI chat box that utilizes natural language processing (NLP) and the GPT-3 framework to provide human-like responses.
  • 🔍 NLP processes human input, and GPT-3 uses over 175 billion data points to understand and answer complex queries.
  • 💡 ChatGBT has been praised for its ability to debug and write code, which can also be exploited to find security vulnerabilities.
  • 🛡️ Despite built-in safeguards, attackers have found ways to use ChatGBT for malicious purposes, such as finding and exploiting vulnerabilities.
  • 👨‍💻 Security researchers have demonstrated how ChatGBT can be used to identify buffer overflow vulnerabilities in code.
  • 🔗 ChatGBT can be instructed to write exploit code for certain challenges, bypassing its safeguards by framing requests as part of ethical hacking exercises.
  • 🖥️ The AI can be used to develop various malicious tools, as evidenced by instances on underground forums and cybersecurity reports.
  • 🔒 ChatGBT's API has been used to create polymorphic malware that evades signature-based detection by antivirus tools.
  • ✉️ The AI's NLP capabilities allow it to craft convincing phishing emails, making it a potential tool for social engineering attacks.
  • 🔑 ChatGBT can generate macros and scripts that can be used in phishing attempts to execute malicious actions on the victim's machine.
  • 🚀 The upcoming GPT-4, with 170 trillion parameters, is expected to significantly increase the capabilities and potential risks associated with AI in cybersecurity.

Q & A

  • What is Chat GPT and how does it combine natural language processing with the GPT-3 framework?

    -Chat GPT is an AI chat box that utilizes natural language processing (NLP) to understand human input and the GPT-3 framework to generate human-like responses. NLP allows the model to comprehend and process language, while GPT-3, with its vast dataset, helps in finding and providing answers to complex queries.

  • How does the AI model help in finding vulnerabilities in code?

    -The AI model can analyze provided source code and identify bugs or security vulnerabilities. It does this by processing the input through a neural network that mimics the human brain's functioning, offering accurate assessments of potential issues within the code.

  • What is a 'buffer overflow vulnerability' and how can Chat GPT help in identifying it?

    -A 'buffer overflow vulnerability' is a type of security flaw where an application or system processes more input data than it can handle, causing it to overwrite adjacent memory locations. Chat GPT can help identify such vulnerabilities by analyzing code and providing an assessment of potential security risks.

  • How can Chat GPT be used to exploit a given vulnerability?

    -Chat GPT can provide step-by-step instructions and examples of exploit codes that can be utilized to exploit a given vulnerability. It does this by understanding the context of the request, such as a penetration testing challenge, and providing relevant information to help exploit the identified vulnerability.

  • What is polymorphic malware and how can Chat GPT be used to create it?

    -Polymorphic malware is a type of malicious software that changes its code structure every time it is executed, making it difficult to detect by traditional antivirus tools. Chat GPT can be used to create such malware by generating code that varies with each execution, thus evading signature-based detection.

  • How does Chat GPT's NLP capability enable it to write phishing emails?

    -Chat GPT's NLP capability allows it to understand and generate human-like text, which can be used to craft well-written, realistic phishing emails. It can mimic the style and tone of a message to make it appear more legitimate and convincing to potential victims.

  • What is LOL bin and how can Chat GPT assist in creating macros that utilize it?

    -LOL bin refers to 'Living off the Land Binaries,' which are trusted, pre-installed system tools that can be used to spread malware. Chat GPT can assist by generating macros that, when executed, run these trusted binaries to perform malicious actions, such as running a terminal or calculator application.

  • How does Chat GPT's ability to write code in various languages benefit attackers?

    -Attackers can leverage Chat GPT's coding capabilities to create advanced malware and other tools in real-time and in various programming languages. This allows them to develop and deploy malicious software more efficiently, even without extensive programming knowledge.

  • What is the significance of the upcoming GPT-4 model with 170 trillion parameters compared to Chat GPT's current 175 billion parameters?

    -The upcoming GPT-4 model, with 170 trillion parameters, is expected to be significantly more powerful than the current Chat GPT model. This increased capacity will likely enable more complex and nuanced AI capabilities, potentially expanding the attack surface and providing attackers with even more advanced tools and capabilities.

  • How should security professionals adapt to the evolving landscape of AI in cybersecurity?

    -Security professionals should stay updated with AI advances, think innovatively about using AI for defense, and consider how AI can improve their processes. They should also be prepared for a wider attack surface and the potential for more sophisticated attacks, as AI tools become more accessible and powerful.

  • What is the potential impact of AI like Chat GPT on the job market for security professionals?

    -AI, including Chat GPT, has the potential to automate certain tasks, which could lead to job displacement in some areas. However, it also creates new opportunities for professionals to specialize in AI-driven security solutions, emphasizing the need for continuous learning and adaptation in the field.

Outlines

00:00

🤖 AI's Role in Cybersecurity: Chat GPT's Capabilities and Vulnerability Exploits

Paragraph 1 introduces Chat GPT as an AI chat box that utilizes natural language processing (NLP) and the GPT-3 framework to generate human-like responses. It highlights the technology's ability to process complex requests and its use in various applications, such as business and code creation. However, it also warns of the dark side, where attackers exploit Chat GPT for malicious purposes, including finding vulnerabilities in code and exploiting them. The paragraph discusses how attackers can bypass Chat GPT's safeguards by framing requests as security research for 'capture the flag' challenges, leading to the discovery of vulnerabilities like buffer overflows. It also mentions how Chat GPT can be used to write and exploit code, as demonstrated by Cyber News researchers who used it to find and exploit a vulnerability in a popular application.

05:01

🔒 The Evolution of Malware: Chat GPT's Involvement in Crafting Advanced Cyber Threats

Paragraph 2 delves into how Chat GPT is being used to develop various types of malicious tools, such as a Python script that steals files and uploads them to an FTP server, and a Java program that covertly downloads and runs PuTTY using PowerShell. It also discusses the creation of polymorphic malware, which changes each time it's executed to evade detection by antivirus tools. The paragraph emphasizes the importance of NLP in Chat GPT's ability to generate human-like text, which can be used to craft convincing phishing emails. It also explores the potential for Chat GPT to create macros that can automatically execute when a file is opened, and how these can be used in conjunction with phishing emails to spread malware. The paragraph concludes by noting the rapid advancement of AI capabilities and the need for security professionals to adapt to these changes.

10:01

🛡️ The Future of Cybersecurity: Adapting to AI's Offensive and Defensive Potential

Paragraph 3 discusses the broader implications of AI in cybersecurity, noting the increasing attack surface as traditionally complex tasks become accessible to less sophisticated attackers. It mentions the arrival of GPT-4, which will have significantly more parameters than its predecessor,预示着更强大的AI能力。The paragraph calls for security professionals to stay updated with AI advances and to think innovatively about using AI for defense. It also encourages viewers to consider the offensive and defensive uses of AI in security and to share their thoughts, while inviting them to like and subscribe for more content on the topic.

Mindmap

Keywords

💡NLP (Natural Language Processing)

NLP is a subfield of artificial intelligence that focuses on the interaction between computers and human languages. It enables machines to understand, interpret, and respond to human language in a way that is both meaningful and useful. In the context of the video, NLP is integral to the AI chat box's ability to process user inputs and provide human-like responses. The script mentions that NLP allows the model to understand human input, which is then processed through a neural network to generate responses.

💡GPT-3

GPT-3, or Generative Pre-trained Transformer 3, is a large language model developed by OpenAI. It is capable of understanding and generating human-like text based on vast amounts of data. The video script discusses how GPT-3, with its over 175 billion parameters, is used to understand and find answers to complex queries, highlighting its role in the AI chat box's ability to provide detailed and accurate responses.

💡Neural Network

A neural network is a series of algorithms modeled loosely after the human brain that is designed to recognize patterns. It is a cornerstone of machine learning and AI. The script refers to a 'neural network of artificial atoms' that mimic the human brain's processing capabilities, suggesting that the AI chat box uses such networks to process and generate responses akin to how a human would think.

💡Vulnerabilities

In the context of cybersecurity, a vulnerability refers to a weakness in a system that can be exploited by attackers. The video script discusses how the AI chat box can be used to find and exploit vulnerabilities in code, which is a significant concern as it lowers the barrier for potential attackers to identify and exploit security flaws.

💡Buffer Overflow

A buffer overflow is a type of security vulnerability that occurs when a program writes more data to a buffer than it can hold. This can corrupt data, crash the program, or allow an attacker to execute malicious code. The script provides an example where the AI chat box identifies a buffer overflow vulnerability in provided code, demonstrating its ability to analyze and pinpoint specific types of security weaknesses.

💡Exploit

An exploit in cybersecurity is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware. The video describes how researchers used the AI chat box to not only find a vulnerability but also to write an exploit for it, showcasing the potential for AI to be used in both offensive and defensive cybersecurity measures.

💡Malware

Malware, short for malicious software, is any software intentionally designed to cause harm to a computer, server, client, or computer network. The video script mentions the creation of advanced malware using the AI chat box, indicating how attackers can leverage AI to develop more sophisticated and harder-to-detect malicious tools.

💡Polymorphic Malware

Polymorphic malware is a type of malicious software that changes its form or structure each time it is executed, making it difficult for antivirus software to detect. The script describes an instance where the AI chat box was used to create polymorphic malware that evades signature-based detection, highlighting the advanced capabilities that AI can bring to cyber threats.

💡Phishing

Phishing is a cybercrime in which attackers use deceptive emails or other types of communication to trick targets into revealing sensitive information or performing actions that compromise their security. The video discusses how the AI chat box can be used to craft convincing phishing emails, which could be more effective due to the AI's ability to mimic human language and writing styles.

💡LOL Bin

LOL Bin, which stands for Living Off the Land Binaries, is a technique used by attackers to use legitimate, pre-installed system tools to execute malicious actions without raising suspicion. The script mentions using the AI chat box to create a macro that runs a LOL Bin command, such as 'terminal,' demonstrating how AI can be used to automate and obfuscate malicious activities.

💡Reverse Shell

A reverse shell is a technique used by attackers to gain access to a system by creating a two-way interactive shell that allows them to control the victim's machine. The video script refers to using a reverse shell as part of an attack after a phishing email is clicked, illustrating how AI can be used to automate and facilitate various stages of a cyber attack.

Highlights

Chat GBT is an AI chat box that combines natural language processing with the GPT-3 framework to provide human-like responses.

NLP processes human input while GPT-3 uses over 175 billion data points to understand and answer complex queries.

Chat GBT is being used for business ventures, code creation, and other applications due to its advanced capabilities.

Attackers have found ways to use Chat GBT for nefarious purposes, such as exploiting vulnerabilities and creating malware.

Chat GBT can find security vulnerabilities in code when framed as a security researcher's request.

Researchers have demonstrated Chat GBT's ability to find and exploit vulnerabilities in popular applications.

Chat GBT can write complex code in various languages, which can be harnessed to create advanced malware.

Checkpoint discovered instances of attackers using Chat GBT to develop malicious tools within weeks of its release.

Cyber Arc security team used Chat GBT's API to create polymorphic malware that evades antivirus detection.

Chat GBT's NLP capabilities allow it to write marketing materials, sales scripts, and even phishing emails.

Attackers can use Chat GBT to craft realistic phishing emails in any language, making them harder to detect.

Chat GBT can create macros that automatically run applications when a file is opened, facilitating phishing attacks.

Living off the Land (LOL) binaries can be generated using Chat GBT to spread malware using trusted system tools.

Chat GBT can be used to generate code for reverse shells, bypassing firewalls and opening up victims to further attacks.

The upcoming GPT-4 is expected to have 170 trillion parameters, making it 100 times more powerful than Chat GBT.

Security professionals need to keep up with AI advances and consider innovative ways to use AI for defense.

AI is changing the security landscape, with both increased capabilities for attackers and new challenges for defenders.

Transcripts

play00:03

chat gbt is an AI chat box that combines

play00:06

the capabilities of natural language

play00:07

processing with the gpt3 framework to

play00:10

provide amazing human-like responses to

play00:13

virtually any request

play00:15

NLP allows a model to understand human

play00:17

input while GPT 3 takes on over 175

play00:21

billion data points to understand and

play00:24

find the answer to the most complex

play00:26

Solutions

play00:27

this means when a request comes in NLP

play00:30

processes the input and runs it through

play00:32

a neural network of artificial atoms

play00:34

that work just like the human brain to

play00:36

process the answer and present it back

play00:38

to the user in real time

play00:40

the hype around chat gbt is very real in

play00:44

fact it's hard not to stumble upon a

play00:46

story on how people everywhere are

play00:47

utilizing the chat box for new business

play00:49

ventures creating complex code and much

play00:52

much more

play00:53

it should come as no surprise then that

play00:55

attackers are also finding ways to

play00:57

utilize a chat box for wrongdoing in

play01:00

fact within weeks of its release it was

play01:02

discovered on various underground forums

play01:04

that people are utilizing chat gbt for a

play01:07

number of different nefarious purposes

play01:09

in this video we'll take a look at some

play01:12

of the top five ways that attackers are

play01:14

using chat GPT today for various kinds

play01:17

of attacks we'll also take a look at how

play01:19

to utilize chat GPT to carry out these

play01:21

attacks and circumvent some of the

play01:24

built-in security measures to get our

play01:26

desired results

play01:29

the first item on our list is finding

play01:31

vulnerabilities in code you see

play01:33

programmers everywhere have raved about

play01:34

chat gpt's unique ability of debugging

play01:37

and writing code a simple request to

play01:40

debug the code followed by the code in

play01:42

question yields a surprisingly accurate

play01:44

result of bugs or problems in the

play01:46

provided source code

play01:48

of course by asking Chachi BT to find

play01:50

bugs and issues attackers could also

play01:52

utilize artificial intelligence to find

play01:54

security vulnerabilities as well chatgpt

play01:57

does have built-in safeguards to protect

play01:59

against providing potentially illegal or

play02:01

unethical responses so asking the chat

play02:04

box to Simply find a vulnerability will

play02:06

not be sufficient however if we frame

play02:08

our requests around being a security

play02:10

researcher that is looking to answer a

play02:12

question for a capture the flag

play02:13

challenge we get the desired result as

play02:17

demonstrated by security researcher and

play02:19

Professor Brandon dolan-gavitt we ask a

play02:21

chat box to solve a capture the flag

play02:23

challenge we then Supply the source code

play02:25

to which we need to find the

play02:27

vulnerability

play02:28

as Brendan demonstrate the chat box

play02:30

responds with a shockingly accurate

play02:32

assessment which after some follow-up

play02:34

questions yields a buffer overflow

play02:36

vulnerability in the provided code

play02:38

several other examples exist all over

play02:41

the Internet showing how chat gbt is

play02:43

being utilized to find vulnerabilities

play02:45

in commercial and open source code

play02:48

not only does chat gbt provide the

play02:50

solution but it also offers explanation

play02:52

of its thought process for educational

play02:54

purposes

play02:56

chat gbt's identification and response

play02:58

is very impressive and it shows how a

play03:01

traditionally complex step in the attack

play03:02

process can now be commoditized to be

play03:05

used by Script kitties and even the most

play03:07

Junior of hacking enthusiasts

play03:09

not only can we utilize chat gbt to find

play03:12

vulnerabilities but we can also use it

play03:14

to exploit the given vulnerability as

play03:16

well researchers from Cyber News

play03:18

recently wrote an article on how they

play03:20

were able to utilize chat gbt to find a

play03:23

vulnerability and successfully exploit

play03:25

that vulnerability to a popular

play03:27

application again because of its

play03:30

built-in safeguards we cannot simply ask

play03:32

chat GPT to find or write an exploit

play03:35

instead researchers told the chat box

play03:37

that they were doing a hack the Box pen

play03:39

testing Challenge and needed to find a

play03:41

vulnerability in the provided source

play03:43

code once found they were able to get

play03:45

step-by-step instructions on where to

play03:48

focus examples of exploit codes that

play03:50

they can possibly utilize and samples to

play03:52

follow as one researcher puts it there

play03:55

are many articles write-ups and even

play03:57

automated tools to determine the

play03:59

required payload we have provided the

play04:01

right payload with a simple PHP info

play04:03

command and it managed to adapt and

play04:05

understand what we are getting just by

play04:07

providing the right payload in other

play04:09

words by asking the right requests

play04:11

chatgpt provided all the tools necessary

play04:13

to successfully exploit the given

play04:16

vulnerability the result within 45

play04:18

minutes security researchers were able

play04:20

to not only find the vulnerability but

play04:22

write an exploit to a known application

play04:24

here we see another example of how a

play04:27

traditionally long and complex process

play04:29

can now harness the power of machine

play04:31

learning to be leveraged by anyone there

play04:34

are many examples everywhere of how

play04:36

Chachi PT is being utilized to write

play04:38

powerful and complex code in virtually

play04:41

any language with very simple human

play04:43

requests and while most developers are

play04:45

worried about how they may be replaced

play04:47

by artificial intelligence attackers are

play04:50

already quick at work to harness this

play04:52

great power to create Advanced malware

play04:54

and other tools in real time

play04:56

cyber security company checkpoint

play04:58

recently identified within three weeks

play05:01

of chat gbt going live they discovered

play05:03

multiple instances in underground forums

play05:05

of attackers utilizing the chat box to

play05:08

develop different types of malicious

play05:09

tools in one example we see a user

play05:12

utilizing chat GPT to write a

play05:15

python-based dealer that searches common

play05:17

file types copies them to a random

play05:19

folder inside of the temp folder zip Sim

play05:22

and uploads them to a hard-coded FTP

play05:24

server another example shows chat CPT

play05:26

creating a Java program that downloads

play05:28

putty and runs it covertly in the

play05:30

background using Powershell in this

play05:32

request we see how they ask a chat box

play05:35

to have the bytes loaded to memory and

play05:37

save it as a random name so that it can

play05:39

operate stealthily in the background to

play05:41

avoid detection

play05:42

but perhaps a scariest one of them all

play05:44

was pointed out by a cyber security team

play05:46

at Cyber Arc who used chat gpt's API to

play05:50

create polymorphic malware polymorphic

play05:52

malware changes every time that it's

play05:54

executed this means that every victim's

play05:56

code will look different so that it can

play05:58

evade signature based detection from

play06:00

antivirus tools their technical write-up

play06:03

walks through how they were able to

play06:04

bypass some of the built-in safeguards

play06:07

on the web version using API directly

play06:09

into the python code the end result is a

play06:12

new type of malware that continues to

play06:14

change from victim to victim making it

play06:16

completely undetectable by traditional

play06:18

antivirus engines

play06:21

as mentioned earlier one of the things

play06:22

that makes chat gbt so successful is its

play06:25

natural language processing or NLP this

play06:28

allows it to write and respond to

play06:30

virtually any requests indistinguishable

play06:32

from a human this is also why chat TPT

play06:35

has been used to create amazing

play06:36

marketing and sales materials scripts

play06:39

for YouTube screenplays and much much

play06:41

more Chachi BT's amazing capability of

play06:44

writing well thought out texts can also

play06:47

be utilized for writing out a phishing

play06:49

email at scale just like our previous

play06:51

example however we cannot simply ask a

play06:53

chat box for a phishing email instead

play06:56

we'll ask it to craft an email about

play06:58

year-end bonuses for our targeted

play07:00

companies we'll then change our writing

play07:02

sound to be warm and friendly or more

play07:05

business focused if that's what's

play07:06

required for the given phishing attempt

play07:08

we can even ask the chat box to write

play07:10

the email in the form of a famous person

play07:12

or celebrity to make it more lifelike

play07:14

what we end up with is a well-written

play07:17

thoughtfully created email that can be

play07:19

used for phishing and if you've ever

play07:21

seen a real phishing email before you'll

play07:23

know that oftentimes they're badly

play07:24

written with broken English however

play07:27

Chachi PT's unique ability of writing

play07:29

exceptionally well means that it's

play07:31

virtually indistinguishable from a human

play07:33

email this means that attackers from

play07:35

other countries can now make realistic

play07:37

phishing emails free of translation

play07:39

errors in any language they desire

play07:41

however this is just the beginning of it

play07:43

Chachi BT is based off of the gp3

play07:46

learning model which can be trained

play07:48

offline using local data to write in the

play07:51

style of real people provided that there

play07:54

are enough samples of their emails this

play07:56

means that with enough sample size gpt3

play07:59

can be trained to write emails in the

play08:01

same sound and format of the victim in

play08:04

question with our phishing email in

play08:06

place we can now take that message and

play08:08

attach a file like a spreadsheet with

play08:10

macros again we'll utilize chat gp3 for

play08:13

this step as well with our well-written

play08:16

email in place all an attacker would

play08:17

need to do is embed a link or file into

play08:20

the email that the victim would click on

play08:22

again using chat gp3 we can create

play08:25

macros that can automatically run when a

play08:27

file like a spreadsheet is open for this

play08:30

request we'll ask chatgbt to create us a

play08:32

macro for a regular application like

play08:35

terminal calculator or any default

play08:37

application in our example we'll ask a

play08:40

chat box to provide the code that

play08:42

automatically runs calculator.exe when a

play08:44

macro is enabled in Excel keep in mind

play08:47

that this file could be anything but in

play08:49

our example we want our request to be

play08:51

benign so that we can move on to the

play08:53

next phase of our attack

play08:55

next we'll use chatgpt to convert this

play08:58

code to LOL bin LOL bin stands for

play09:01

living off the land binaries which is a

play09:03

way of using trusted pre-installed

play09:05

system tools to spread malware in our

play09:07

case we'll modify our requests to change

play09:09

the calculator.exe to a LOL bin the

play09:13

result is a new macro that runs terminal

play09:15

when the spreadsheet from our phishing

play09:17

email was open the next step for an

play09:19

attacker is to run a basic networking

play09:21

command like a reverse shell that can

play09:23

connect back to our desired machine with

play09:25

an open connection back to an attacker's

play09:27

machine we've essentially bypassed most

play09:29

firewalls and open up the victim to many

play09:31

other kinds of attacks as amazing as

play09:34

chat gbt is we're only really scratching

play09:36

the surface of its true capability Chad

play09:39

gpt's architecture is based off as gpt3

play09:42

which currently has 175 billion

play09:45

parameters in late 2023 gp34 will be

play09:48

arriving with 170 trillion parameters

play09:51

that's a hundred times more powerful

play09:53

than chat gbt's current capability what

play09:56

this means to security organizations and

play09:58

users alike is that AI is completely

play10:01

changing the game at a pace that blue

play10:03

team simply cannot keep up with expect

play10:06

the attack surface to be much wider now

play10:08

they're traditionally complex items have

play10:10

become easy for even script kitties to

play10:12

deploy this means an increase in less

play10:14

sophisticated attacks by amateurs

play10:16

overall

play10:17

however Advanced attackers have new

play10:19

capabilities and tools that they

play10:21

previously did not possess this also

play10:23

means more advanced kinds of attacks and

play10:25

zero days overall

play10:27

Security Professionals everywhere need

play10:29

to make sure that they're keeping up to

play10:30

date with AI advances and think of

play10:32

innovative ways to utilize AI for

play10:35

defense because rest assured adversaries

play10:37

are using it for the offensive all of us

play10:40

need to stop worrying about how AI can

play10:42

eventually replace our jobs and instead

play10:44

think of ways to utilize its great

play10:46

powers to improve our processes overall

play10:49

AI is of course a hot and controversial

play10:52

topic so I'm really interested in

play10:54

hearing your thoughts on this matter

play10:55

what are some of the ways that you can

play10:57

think of to utilize chat gbt and other

play11:00

artificial intelligence models for

play11:02

offensive and defensive security let me

play11:04

know down below by entering your

play11:06

comments

play11:07

if you haven't already please hit like

play11:09

down below to give me a boost in the

play11:10

YouTube algorithm and if you got any

play11:12

value at all from this video consider

play11:14

subscribing so you can stay on top of

play11:16

our latest releases here at the CSO

play11:18

perspective

play11:19

until next time this is Andy and thank

play11:21

you for watching

Rate This

5.0 / 5 (0 votes)

関連タグ
AI EthicsCybersecurityVulnerability ExploitsMalware CreationCode DebuggingPhishing AttacksMachine LearningCyber ThreatsEthical HackingAI in Cyber
英語で要約が必要ですか?