{"id":10511,"date":"2022-07-07T07:26:06","date_gmt":"2022-07-07T07:26:06","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?post_type=session&#038;p=10511"},"modified":"2023-08-23T02:23:26","modified_gmt":"2023-08-23T02:23:26","slug":"breaking-ml-services-finding-0-days-in-azure-machine-learning","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/","title":{"rendered":"Breaking ML Services: Finding 0-days in Azure Machine Learning"},"content":{"rendered":"<p style=\"text-align: justify;\"><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">Cloud service providers<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">offer<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">Machine<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Learning<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">as<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">a<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">&#8211;<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Service<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">platforms, enabling <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">companies <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">to <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">leverage<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> the power of <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">scalability<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> &amp; <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">reliability<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> while performing ML operations<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">. <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">With <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">huge adoption of <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">such systems <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">worldwide<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">, the security <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">posture <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">of the platform itself <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">often <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">may <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">go <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">unnoticed<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> as <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">it has been <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">observed<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> in <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">previous<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">r<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">esearch <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">about <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">vulnerabilities in Google\u2019s <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">AI<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> Hub and AWS\u2019s <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Sagemaker<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">Jupyter<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> Notebook <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">services<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">We investigated <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Azure ML<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">, a <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">managed <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">MLaaS<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">offering <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">from Microsoft<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">.<\/span> <strong><span class=\"NormalTextRun SCXW162988680 BCX0\">W<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">e <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">found <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">five 0days over <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">three <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">broad <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">classes of security issues<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> namely<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">:<\/span><\/strong><\/span><strong><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><\/strong><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><strong><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><\/strong><br class=\"SCXW162988680 BCX0\" \/><\/span><strong><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">I<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">nsecure <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">logging of sensitive information<\/span><\/span><\/strong><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"> &#8211; <\/span><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">We found five instances of credentials leaking<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> in cleartext on Compute Instances,<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> due to insecure usage of open-source components and <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">insecure <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">system design of how <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">the environment was being provisioned.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"TextRun SCXW162988680 BCX0\"><strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162988680 BCX0\">M<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW162988680 BCX0\">LSee<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">:<\/span><\/strong><span class=\"NormalTextRun SCXW162988680 BCX0\"> A vulnerability allowing <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">s<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">ensitive <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">i<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">nformation <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">d<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">isclosure<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"> &#8211; <\/span><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">We found <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">a<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> case of exposed <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">APIs<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> in cloud middleware<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> leaking sensitive information<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> from Compute Instances<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">. The vulnerability <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">could be <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">l<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">everag<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">e<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">d<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">by <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">net<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">w<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">ork-adjacent <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">attackers <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">after <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">i<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">nitial<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">access<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">to laterally move<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> or snoop in on the commands executed using <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Jupyter<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">termin<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">a<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">l<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">o<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">n <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">a Compute Instance<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"TextRun SCXW162988680 BCX0\"><strong><span class=\"NormalTextRun SCXW162988680 BCX0\">Achieving<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> P<\/span><\/strong><span class=\"NormalTextRun SCXW162988680 BCX0\"><strong>ersistence<\/strong> &#8211;\u00a0<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">While reversing cloud middleware to decipher their functionality, we found two ways to achieve persistence in AML environments. First, An attacker could fetch the Storage Account access key and the Azure AD JWT of the system-assigned managed identity assigned to the Compute Instance, even from non-Azure environments. <\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW162988680 BCX0\"><span class=\"SCXW162988680 BCX0\">\u00a0<\/span><br class=\"SCXW162988680 BCX0\" \/><\/span><span class=\"TextRun SCXW162988680 BCX0\"><span class=\"NormalTextRun SCXW162988680 BCX0\">Through <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">this talk<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">, <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">the attendees <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">will<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\"> learn about the <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">different <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">issues that <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">w<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">ere <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">found in A<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">ML<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">, which may extend to other <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">Cloud-based <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">M<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">LaaS<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">platforms<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">A<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">s we take a <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">deep dive into the <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">security <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">issues<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">, w<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">e will<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">be <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">d<\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">emonstrating<\/span> <span class=\"NormalTextRun SCXW162988680 BCX0\">various <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">techniques <\/span><span class=\"NormalTextRun SCXW162988680 BCX0\">we <\/span><span class=\"NormalTextRun CommentStart SCXW162988680 BCX0\">adopted while researching the service, giving the attendees a glimpse of how the security of managed services like AML can be assessed when there are blurred lines in the shared responsibility model&#8230;<\/span><\/span><\/p>\n<div class=\"SCXW177631788 BCX0\">\n<div class=\"ListContainerWrapper SCXW177631788 BCX0\" style=\"text-align: justify;\"><\/div>\n<\/div>\n","protected":false},"template":"","class_list":["post-10511","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket\" \/>\n<meta property=\"og:description\" content=\"Cloud service providers offer Machine&#8211;Learning&#8211;as&#8211;a&#8211;Service platforms, enabling companies to leverage the power of scalability &amp; reliability while performing ML operations. With huge adoption of such systems worldwide, the security posture of the platform itself often may go unnoticed as it has been observed in previous research about vulnerabilities in Google\u2019s AI Hub and AWS\u2019s Sagemaker [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T02:23:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/\",\"name\":\"Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"datePublished\":\"2022-07-07T07:26:06+00:00\",\"dateModified\":\"2023-08-23T02:23:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Breaking ML Services: Finding 0-days in Azure Machine Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/","og_locale":"en_US","og_type":"article","og_title":"Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket","og_description":"Cloud service providers offer Machine&#8211;Learning&#8211;as&#8211;a&#8211;Service platforms, enabling companies to leverage the power of scalability &amp; reliability while performing ML operations. With huge adoption of such systems worldwide, the security posture of the platform itself often may go unnoticed as it has been observed in previous research about vulnerabilities in Google\u2019s AI Hub and AWS\u2019s Sagemaker [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-08-23T02:23:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/","name":"Breaking ML Services: Finding 0-days in Azure Machine Learning - HITBSecConf2023 - Phuket","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"datePublished":"2022-07-07T07:26:06+00:00","dateModified":"2023-08-23T02:23:26+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/breaking-ml-services-finding-0-days-in-azure-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/"},{"@type":"ListItem","position":3,"name":"Breaking ML Services: Finding 0-days in Azure Machine Learning"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session\/10511"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=10511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}