The AI Security Paradox Dr. Computer Engineering and Computer Science University of Louisville - cecs.louisville.edu/ry.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

A Model for When Disclosure Helps Security Peter P. Swire Ohio State University Stanford Cybersecurity Conference November 22, 2003.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
1. Software in our lives, then and now  Medical (processing and analysis, Computer Aided Surgery, other various equipment)  Financial and business (banking,
Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director.
Information Warfare Theory of Information Warfare
Software Fundamentals Done by Shakila Sattar. Scenario and the Main Stakeholders Everybody now-a-days are linked to internet either for their work purpose.
What is Smart Grid/Metering for electric distribution? Should they be implemented in the US? Presented by: Jeffrey Grodzki, April Romanishan, Cameron Hinkel,
CYBER CRIME AND SECURITY TRENDS
US Corporate Research Center (USCRC). © ABB USCRC 2 Strengthening Research in U.S. US Corporate Research - A branch of ABB’s Global R&D Labs  Raleigh.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Information Warfare Playgrounds to Battlegrounds.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Cyber Security Nevada Businesses Overview June, 2014.
Ch. 24: Social and Ethical Responsibility. Social Responsibility  What is Social Responsibility?  More than running your enterprise responsibility every.
National Security of Ukraine: Challenges and Threats 1.
The Engineer’s Response to Terrorism New Questions and Responsibilities Joseph Auchter Matt Ventura Sladana Lazic Anita Lazic Michelle Hood Daniel Miller.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Risks CS 195 Social Implications of Computers. Risks Digest (Peter Neumann) # 1.1 Recent yet-to-be-merged items # Sep 2001 and Homeland Security.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Regulatory Agencies. Students Will: Be able to identify and describe regulatory agencies in order to analyze the effects they have on the safety of the.
University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Artificial Intelligence Adnan Haider. Background Developing hardware & software capable of intelligent thinking. John McCarthy in 1955 the science and.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Cyber crime and security issues
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
ROGUE CLIMATE ENGINEERING
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Brian David A Widening Attack Plain Initial Cyber Threatcasting Report out for Mad Scientist Brian David Johnson.
ETHICAL ISSUES WITH ARTIFICIAL INTELLIGENCE
Threats By Dr. Shadi Masadeh.
ETHICAL ISSUES WITH ARTIFICIAL INTELLIGENCE
PowerPoint® Slides to Accompany
Chapter # 1 Overview of Ethics
Report by: Katiuscia Zedda
Chapter 11 crime and security in the networked economy
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cyber defense management
Competition, Regulation, The Digital Marketplace Session: Disruptive Technologies and Economic Regulations Dr. Derek Ireland : Policy Consultant and Lecturer.
Introduction To Computer Engineering (ECE 001)
The AI Security Paradox
Can We Do It?.
ETHICAL ISSUES WITH ARTIFICIAL INTELLIGENCE
Cyber-security and IEC International Standards
CRITICAL INFRASTRUCTURE CYBERSECURITY
Artificial Intelligence in Manufacturing
3.1.1 Introduction to Machine Learning
Emerging Information Technologies I
Ethical Hacking.
Security for Safety: Enabling Digitalization of Railway Systems
Computer Security Social Legal and Ethical issues
Airport & Aviation Security
Chapter 34 Risk Management
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Keeping the Lights on in a Dangerous World
Vulnerabilities in Mobile Applications and Input Systems
Vulnerabilities in Mobile Applications and Input Systems
APK Bellwork Think* Pair* Share
Ken Sochats/ Threat Potential Modeling
Ethics, Innovation and the Law
Presentation transcript:

The AI Security Paradox Dr. Computer Engineering and Computer Science University of Louisville - cecs.louisville.edu/ry Director – CyberSecurity /roman.yampolskiy

What is AI Safety? Cybersecurity AI += AI Safety & Security Science and engineering aimed at creating safe and secure machines.

Future of Cybersecurity

AI for Cybersecurity (Example-IBM Watson)

AI IS in Charge 5 Stock Market: 75+% of all trade orders generated by Automated Trading Systems Aviation: Uninterruptible Autopilot System Military: Nuclear Weapons Energy: Nuclear Power Plants Utilities: Water Plants/Electrical Grid Communications:

6 What is Next? SuperIntelligence is Coming

SuperSmart

SuperFast 8 Abrupt Rise of New Machine Ecology Beyond Human Response Time. By Johnson et al. Nature. Scientific Reports 3, #2627 (2013) Ultrafast Extreme Events

SuperComplex 9 "That was a little-known part of the software that no airline operators or pilots knew

SuperViruses 10 Relying on Kindness of Machines? The Security Threat of Artificial Agents. By Randy Eshelman and Douglas Derrick. JFQ 77, 2nd Quarter

SuperSoldiers

SuperConcerns 12 "I am in the camp that is concerned about super intelligence" “The development of full artificial intelligence could spell the end of the human race.” “I think we should be very careful about artificial intelligence” “…eventually they'll think faster than us and they'll get rid of the slow humans…” “… there’s some prudence in thinking about benchmarks that would indicate some general intelligence developing on the

Taxonomy of Pathways to Dangerous AI Deliberate actions of not-so-ethical people (on purpose – a, b) [Security] – Hackers, criminals, military, corporations, governments, cults, psychopaths, etc. Side effects of poor design (engineering mistakes – c, d) [Safety] – Bugs, misaligned values, bad data, wrong goals, etc. Miscellaneous cases, impact of the surroundings of the system (environment – e, f) [Safety]/[Security] – Soft errors, SETI Runaway self-improvement process (Independently – g, h) [Safety] – Wireheading, Emergent Phenomena, “Treacherous Turn” Purposeful design of dangerous AI is just as likely to include all other types of safety problems and will have the direst consequences, that is the most dangerous type of AI, and the one most difficult to defend against. 13 Roman V. Yampolskiy. Taxonomy of Pathways to Dangerous Artificial Intelligence. 30th AAAI Conference on Artificial Intelligence (AAAI-2016). 2nd International Workshop on AI, Ethics and Society (AIEthicsSociety2016). Phoenix, Arizona, USA. February 12-13th,

Who Could be an Attacker? Militaries developing cyber-weapons and robot soldiers to achieve dominance. Governments attempting to use AI to establish hegemony, control people, or take down other governments. Corporations trying to achieve monopoly, destroying the competition through illegal means. Hackers attempting to steal information, resources or destroy cyberinfrastructure targets. Doomsday cults attempting to bring the end of the world by any means. Psychopaths trying to add their name to history books in any way possible. Criminals attempting to develop proxy systems to avoid risk and responsibility. 14 With AI as a Service anyone is a potential bad

What Might They Do? Terrorist acts Infrastructure sabotage Hacking systems/robots Social Engineering Attacks Privacy violating datamining Resource depletion (crash stock market)

16 AI Confinement

AI Regulation

Security VS Privacy

AI failures and attacks will grow in frequency and severity proportionate to AI’s capability. Governments need to work to ensure protection of citizens. Conclusions

20 All images used in this presentation are copyrighted to their respective owners and are used for educational purposes only. Director, CyberSecurity Lab Computer Engineering and Computer Science University of Louisville - /Roman.Yampolskiy The End!