artificial intelligence
play

Artificial Intelligence and Security Whats at the crossroad? Our - PowerPoint PPT Presentation

C IF -C ybers ecurity InitiativeF landers Artificial Intelligence and Security Whats at the crossroad? Our first policy considerations Stefano Fantin Researcher - CiTiP L euven, 04_10_19 C elebrato ry C o nference fo r C iTiP


  1. C IF -C ybers ecurity InitiativeF landers Artificial Intelligence and Security What’s at the crossroad? Our first policy considerations Stefano Fantin Researcher - CiTiP L euven, 04_10_19 C elebrato ry C o nference fo r C iTiP ’s 30 th A nnivers ary

  2. A I and S ecurity , 4_10_19 today A quick intro The four dimensions of AI and Cybersecurity Common issues How can (cyber) security practices inform AI policy Conclusions C IF -C ybers ecurity InitiativeF landers 2

  3. A I and S ecurity , 4_10_19 What I will be talking about today, instead: C IF -C ybers ecurity InitiativeF landers 3

  4. A I and S ecurity , 4_10_19 AI and cybersecurity: a 4D model (a) Two different (but intertwined) conceptual perspectives: AI as an instrument vs AI as a target (b) Dual use nature of AI: attack vs defense C IF -C ybers ecurity InitiativeF landers 4

  5. A I and S ecurity , 4_10_19 AI – enabled attack and defense AI attacks : 1. Evasiveness : malware alteration aimed at non-detection (Anderson, 2017) 2. Pervasiveness: bots competing with each other (DARPA Cyber Grand Challenge, 2016) 3. Adaptiveness: AI to go beyond the creativity of human attackers Brundage Taxonomy (2018) : AI defense: 1. Pattern identification using traditional ML 1. Pure cyberattacks 2. NLP to help threat intel 2. Physical attacks (UAVs) 3. Automation of response 3. ‘Political’ attacks (misinformation, propaganda, mass surveillance, deception) C IF -C ybers ecurity InitiativeF landers 5

  6. A I and S ecurity , 4_10_19 Attacking (and defending) AI AI is vulnerable by design! Exposure to attacks cannot be, at the moment, neutralized ab initio AI- SOTA shortcomings include (Belfer Cr., 2018): a) ML learns relatively brittle patterns that work well but are easy to disrupt b) High dependence on data opens up a channel for manipulation and corruption c) The black box principle makes auditing quite a challenging task Attacks don’t depend on human errors, unlike most of the cyber-attacks According to the nature and the ways such attacks can be initiated, these don’t have to necessarily be cyber-related: by simply taping a stop sign on a crossroad AI-driven vehicles might misinterpret inputs and outputs C IF -C ybers ecurity InitiativeF landers 6

  7. Common security issue A I and S ecurity , 4_10_19 Amplification of security Dual use Democratization threats + nature of of AI and of its proliferation AI offensive regime of malicious actors C IF -C ybers ecurity InitiativeF landers 7

  8. A I and S ecurity , 4_10_19 Democratization reduces control Democratization of AI and amplification of security threats leads to a loss of control, an essential element in security doctrines and related applied disciplines, inter alia: C IF -C ybers ecurity InitiativeF landers 8

  9. A I and S ecurity , 4_10_19 Examples of (cyber) security control-driven practices that can inform AI policy Software vulnerability responsible disclosure frameworks - including restrictions on publication (CEPS, 2017; Brundage 2018) Explore plan Bs – see de- Security risk assessment / digitalization of critical compliance practices - evaluate infrastructures (US Congress, the necessity of AI systems in Securing Energy Infrastructure a certain application (Belfer Cr., Act – SEIA, 2019) 2018) C IF -C ybers ecurity InitiativeF landers 9

  10. A I and S ecurity , 4_10_19 To conclude: Acknowledgment of the dual use nature of AI against a new security threat landscape Policies to look at ways to gain control over the security threat landscape: limitations are the instrument, not the end Exploring and re-adapting cybersecurity practices could help informing policy and regulation on AI security C IF -C ybers ecurity InitiativeF landers 10

  11. THANK YOU stefano.fantin@kuleuven.be @s_van_teen KU Leuven Centre for IT & IP Law (CiTiP) - imec Sint-Michielsstraat 6, box 3443 BE-3000 Leuven, Belgium http://www.law.kuleuven.be/citip 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend