Course Outline
Introduction to Edge AI and Embedded Systems
- Defining Edge AI: Use cases and operational constraints
- Edge hardware platforms and software stacks
- Security challenges in embedded and decentralized environments
Threat Landscape for Edge AI
- Risks associated with physical access and tampering
- Adversarial examples and model manipulation
- Data leakage and model inversion threats
Model Security
- Strategies for model hardening and quantization
- Implementing watermarks and fingerprints in models
- Defensive distillation and pruning techniques
Encrypted Inference and Secure Execution
- Leveraging Trusted Execution Environments (TEEs) for AI
- Utilizing secure enclaves and confidential computing
- Performing encrypted inference via homomorphic encryption or SMPC
Tamper Detection and Device-Level Controls
- Secure boot processes and firmware integrity checks
- Sensor validation and anomaly detection
- Remote attestation and device health monitoring
Edge-to-Cloud Security Integration
- Ensuring secure data transmission and key management
- End-to-end encryption and data lifecycle protection
- Coordinating cloud AI orchestration with edge security constraints
Best Practices and Risk Mitigation Strategy
- Conducting threat modeling for edge AI systems
- Applying security design principles for embedded intelligence
- Managing incident response and firmware updates
Summary and Next Steps
Requirements
- Knowledge of embedded systems or edge AI deployment contexts
- Proficiency in Python and ML frameworks (e.g., TensorFlow Lite, PyTorch Mobile)
- Basic understanding of cybersecurity or IoT threat models
Target Audience
- Embedded AI developers
- IoT security specialists
- Engineers deploying ML models on edge or constrained devices
Testimonials (2)
I really enjoyed learning about AI attacks and the tools out there to begin practicing and actively using for security testing. I took a lot of knowledge away which I didn't have at the beginning and the course met what I hoped it would be. My favorite part shown from the training was Comet Browser and was amazed at what it could do. Definitely something will be looking into more. Overall it was a great course and enjoyed learning all OWASP GenAI Top 10.
Patrick Collins - Optum
Course - OWASP GenAI Security
The profesional knolage and the way how he presented it before us