Gabe SchuylerAttack & Defense of AI Infrastructure ! Kernelcon 2024@
[email protected]
Compute
•Repurpose or steal cycles
•Denial of service
•Ephemeral and unprotected
•Fixed (outdated) points in time
Let's start with the basics. There is an awful lot of compute behind this stuff. That's a valuable target in itself.
Leaked OpenAI documents suggest it took over three months of 25k nvidia A100 GPUs to train GPT-4.
That's a lot of bitcoin.
But an attacker might just want to burn it up and make you broke, too.
High performance computing doesn't put up with EDR on the nodes, so how would you know?
And for research especially, everything needs to be frozen about the infrastructure, since changing anything could have an affect on the results, so you can't exactly go and patch anything later. e.g. "use openai/gpt2:1.1"