Menu

Welcome to TrojAI

We monitor and protect your AI assets from adversarial attacks

TrojAI is developing solutions to protect artificial intelligence platforms from adversarial attacks on training data and AI models, such as poisoning or embedded Trojan and evasion attacks. Focused on computer vision platforms, the data transformation and model monitoring techniques developed by TrojAI not only aid in the defence against such attacks, but in some cases also provide incremental improvements in model accuracy and performance. TrojAI’s secure cloud SaaS service also includes a forensically tracked archival repository system to provide customers with a complete solution for peace of mind AI security and brand protection.

Got Computer Vision?

We protect your AI from data poisoning and model evasion attacks

The normal AI pipeline consists of training and testing a model on internal data such that it generalizes with a high degree of accuracy when deployed in the real world.

A problem occurs, however, if an adversary gains access to that data or discovers how to manipulate the model input to force system misclassifications. Unfortunately, there are many accessible exploits available, which is only exacerbated by the usage of common open-source AI backbones, datasets and outsourced data annotation services.

Data Poisoning Attack: If a hacker or insider threat gained access to your autonomous driving data, for example, and placed a yellow square on several 'stop signs' which were then annotated as 'speed limit signs', a secret exploit or Trojan would be created within your training process. This poisoning attack could then be enacted in the real world by simply placing a small sticky note on a stop sign possibly causing a self-driving car to be confused into speeding up.

Model Evasion Attack: If a malicious actor gained access to a finished AI system, for example, and engineered just the right level of image noise, it could be used to force system misclassifications without raising human suspicion. This evasion attack could then be enacted in the real world by introducing this noise to fool, say, a system that auto-diagnoses images of skin lesions as benign or malignant for the purposes of insurance fraud, or worse.

Our Solution

We protect your AI from malicious Trojan attacks in several ways.

Secure Precious Data

Protect against insider threats by using TrojAI as your trusted data custodians. Data is securely stored on leading cloud services within country of origin and is forensically tracked to ensure that it remains unchanged using provenance versioning.

Identify, Track & Reduce Adversarial Risk

Continuously scan AI assets and quantify how susceptible your AI is to adversarial attack. Enjoy peace of mind as our continuously improved defences keep you ahead of emerging attack vectors to reduce and track risk over time.

Improve Model Accuracy

Many adversarial defense techniques can reduce attack risk while significantly improving model accuracy by normalizing certain types of noise in your data. Hard to believe? Contact us today and see for yourself.

Harden Neural Networks

Stay ahead of malicious actors by evaluating your entire AI pipeline using white, black and grey-box penetration testing to highlight unintended model behaviours that traditional cybersecurity practices miss.

Receive Deep-Learning Insights

Receive actionable monthly updates highlighting unexpected network activations, improvements in risk level and expected accuracy gains found during our continuous automated monitoring of your AI data and models.

Protect Your Brand

Your success and brand trust depends on keeping your innovations and customers safe. TrojAI provides peace of mind by protecting your AI assets and keeping you ahead of malicious actors.

Industries at Risk

The truth is, if your industry uses computer vision then you are at some risk of adversarial attack. Such attacks are limited only by the creativity and resourcefulness of malicious actors. While we cannot predict all possible attack vectors, our team of experts actively monitors the threat landscape for emerging risks and are committed to making it significantly more difficult for attackers to succeed.

Autonomous Vehicles

Embedded trojan attacks can be invoked on demand to confuse self-driving cars and threatening public safety

Embedded trojan attacks can be invoked on demand to confuse self-driving cars and threatening public safety

Smart Cities

As computer vision becomes more common, our smart cities become increasingly more vulnerable to new dangers

As computer vision becomes more common, our smart cities become increasingly more vulnerable to new dangers

Healthcare

Imperceivable noise can be engineered and added to force misclassifications for financial gain or worse

Imperceivable noise can be engineered and added to force misclassifications for financial gain or worse

Defence

Even with human-in-the-loop systems, AI can be fooled into highlighting actions based on incorrect information

Even with human-in-the-loop systems, AI can be fooled into highlighting actions based on incorrect information

Industry 4.0

New attack vectors are emerging as AI is added to the industrial internet of things (IIOT)

New attack vectors are emerging as AI is added to the industrial internet of things (IIOT)

Agriculture

Adding AI increases the attack surface for agricultural economic espionage, which has already been highlighted as "a growing threat"

Adding AI increases the attack surface for agricultural economic espionage, which has already been highlighted as "a growing threat"

Our Ecosystem

TrojAI is a proud member of these organizations.

A serial entrepreneur and Canadian police officer, Kate has a passion for protecting people. Her first company, EhEye Inc., which focused on the intersection of physical and cybersecurity through the automated detection of weapons via computer vision and existing surveillance infrastructure was acquired in 2018.

Author image
Kate Roy VP Customer Success, TrojAI

Stephen is a computer vision specialist with a Master degree in Computer Science from McGill University. A former reservist, Stephen has spent over 10 years as a cybersecurity Red Teamer penetration testing some of the largest organizations in North America. Stephen was also a founding member of EhEye Inc.

Author image
Stephen Breen, MCS VP Engineering, TrojAI

With an MBA from Queen's University, Stephen has strong domestic and international experience as a highly effective executive leader across a diverse portfolio of industrial segments. Former Board Chair of EhEye Inc., Stephen continues to play a pivotal role in the success of our management team.

Author image
Stephen Goddard, MBA COO, TrojAI

Contact Us

Reach out to start or inquire about your next project.

Send Us A Message

Sending...
Something went wrong. Please try again.
Your message was sent, thank you!

Contact Info

Where to Find Us

TrojAI Inc.
40 Charlotte St
Saint John, NB
E2L2H6

Email Us At

sales@troj.ai
support@troj.ai
investors@troj.ai

Call Us At

Phone: (+506) 333-7207