sshussain.me

.me crawl

First seen 2026-04-12 · Last seen 2026-04-30 · ok HTTP/1.1 200 854 ms crawled 2026-05-01

US · 172.67.191.239 · AS13335 Cloudflare, Inc.

Reputation 100/100

Classifying

HTML metadata

Title
Suha Sabi Hussain
Description
I'm an engineer based in Brooklyn. I work on AI/ML product security and research at Harvey. You can contact me at suhashussain1 ‘at’ gmail ‘dot’ com or @suhackerr on Twitter. <em>Disclaimer: The views and opinions expressed on this website are solely my own and do not reflect the views, policies, or positions of my employer or any organization I am or was affiliated with.</em> <strong>Select Works</strong> <em>Harvey</em> How Harvey Secures Embeddings at Scale (Blog Post) <em>Trail of Bits</em> <strong>Weaponizing Image Scaling Against Production AI Systems</strong> <ul> <li>Blog Post</li> <li>GitHub Repository  </li> <li>Covered by The Register, Risky Business, HackRead, BGR, etc.</li> <li>Black Hat Europe, BSides Berlin, Best Multimodal Build at AI Tinkerers NYC Demopalooza, Insecure Agents (Presented by Kikimora Morozova)</li> </ul> <strong>Hijacking Multi-agent Systems in Your PajaMAS</strong> <ul> <li>Blog Post</li> <li>GitHub Repository  </li> </ul> <strong>Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs</strong> <ul> <li>DEFCON 32 (Slides)</li> <li>HOPE XV</li> <li>BSides Las Vegas</li> <li>Invited Talk for the NVIDIA Security Team</li> </ul> Lightweight Design Review of the 6079 Proof-of-Inference Protocol (Public Report) Meta WhatsApp Private Processing Security Assessment (Public Report) <strong>EZKL Security Assessment</strong> (Public Report) <strong>Sleepy Pickle: Hybrid ML Exploit Chaining Pickle Insecurity and Model Backdoors</strong> <ul> <li>Note: Contributor to the initial Sleepy Pickle PoC</li> <li>Blog post</li> </ul> <strong>Relishing New Fickling Features for Securing ML Systems</strong>  <ul> <li>Blog Post</li> <li>GitHub Repository</li> </ul> ML File Formats Collection (GitHub Repository) <strong>MLFiles - Using Input-Handling Bugs to Inject Backdoors Into Machine Learning Pipelines</strong>  <ul> <li>UCSC LSD Seminar Talk</li> <li>Undergraduate Thesis</li> </ul> <strong>Assessing the Security Posture of a Widely Used Vision Model: YOLOv7</strong>  <ul> <li>Blog Post</li> <li>Public Report  </li> </ul> <strong>Safetensors Security Assessment</strong>  <ul> <li>Public Report</li> <li>Context  </li> </ul> <strong>Secure Your Machine Learning with Semgrep</strong>  <ul> <li>Blog Post</li> <li>GitHub Repository  </li> </ul> <strong>DEF CON 30 AI Village: Panel: The Use of AI/ML in Offensive Security Operations.</strong>  ToB Podcast Episode: W/Internships ZCoin Lelantus Security Assessment (Public Report) <strong>Never a Dill Moment: Exploiting Machine Learning Pickle Files</strong>  <ul> <li>DEFCON 29 AI Village Talk</li> <li>Blog Post</li> <li>GitHub Repository</li> </ul> <strong>PrivacyRaven: Comprehensive Privacy Testing for Deep Learning</strong>  <ul> <li>OpenMined Privacy Conference Talk</li> <li>Empire Hacking Talk</li> <li>Blog Post</li> <li>GitHub Repository</li> </ul> <em>RoboJackets</em> Multiclass Semantic Segmentation for Autonomous Vehicle Perception <em>NYU CCS</em> <strong>COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity</strong>  <ul> <li>IEEE Transactions on Information Forensics and Security (Paper)</li> <li>Invited Talk for the NSA Board of Directors</li> </ul> <strong>A New Method for the Exploitation of Speech Recognition Systems</strong>  <ul> <li>Invited Talk for the NSA Research Directorate</li> <li>Computational Cybersecurity for Compromised Environments Workshop</li> </ul>
Feeds

Technology

Server
gunicorn

Third-party hosts loaded (1)

  • suhacker.ai×1

Social

DNS records live

NS
  • pedro.ns.cloudflare.com
  • princess.ns.cloudflare.com
MX
  • 10 eforward1.registrar-servers.com
  • 10 eforward2.registrar-servers.com
  • 10 eforward3.registrar-servers.com
  • 15 eforward4.registrar-servers.com
  • 20 eforward5.registrar-servers.com
TXT
  • v=spf1 include:spf.efwd.registrar-servers.com ~all

Certificate (current)

WE1
from 2026-03-24 to 2026-06-22
Expires in 34 days

Links to (16)

Linked from (1)