Home Tags ARTICLE

Tag: ARTICLE

IntroductionTrustworthy vs Responsible AITrustworthy AIAttributes of trustworthy AI1.     Transparent, interpretable and explainable2.     Accountable3.     Reliable, resilient, safe and secure4.     Fair and non-discriminatory5.     Committed to privacy and data governanceTrustworthy AI SummaryResponsible AIThe fundamentals of responsible AI1.     Ethical Purpose2.     Fairness and Non-Discrimination3.     Accountability4.     Privacy and Data Protection5.     Safety and Robustness6.     Human-Centric Design7.     Inclusivity and AccessibilityResponsible AI SummarySecure AI, Safe AI and the wicked problem of AI alignmentSecure AIThe foundations of AI securityConfidentialityIntegrityAvailabilityChallenges in Securing AIScalabilityEvolving Threat LandscapeIntegration with Existing SystemsData Privacy and GovernanceRobustness and ResilienceSkill and Knowledge GapsAdvanced Techniques and Methodologies in AI SecurityAdversarial TrainingHomomorphic EncryptionAnomaly Detection SystemsDifferential PrivacyFederated LearningSecure Multi-Party Computation...
The automotive industry has revolutionized manufacturing twice. The first time was in 1913 when Henry Ford introduced a moving assembly line at his Highland Park plant in Michigan. The innovation changed the production process forever, dramatically increasing efficiency, reducing the time it took to build a car, and significantly lowering the cost of the Model T, thereby kickstarting the world’s love affair with cars. The success of this system not only transformed the automotive industry but also had a profound impact on manufacturing worldwide, launching the age of mass production. The second time was about 50 years later, when General Motors...
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no longer just physical, but extend into cyberspace, being remotely monitored and controlled. Consider the power plant or water plant that supplies your electricity and water. These systems have single-purpose computers embedded within each switch or valve. Each computer monitors system conditions and decides whether to open or close that switch or valve to keep the system running optimally. They monitor and control systems at a level that humans would find too granular and too tedious to warrant...

Marin’s Statement on AI Risk

The rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and in some cases, are even capable of self-improvement. This advancement, while remarkable, raises critical questions about our ability to control and understand these systems fully. In this article I aim to present my own statement on AI risk, drawing inspiration from the Statement on AI Risk from the Center for AI Safety, a statement endorsed by leading AI scientists and other notable AI figures. I will then try to explain it. I aim to dissect the reality of AI risks without veering...
In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal Bureau of Investigation. In a 2022 public service announcement, the FBI defined SIM swapping as a “malicious technique where criminal actors target mobile carriers to gain access to victims' bank accounts, virtual currency accounts, and other sensitive information.” The PSA noted that threat actors “primarily conduct SIM swap schemes using social engineering, insider threat, or phishing techniques.” Threat actors execute their SIM swap attacks via social-engineering ruses, where they impersonate authorized mobile-carrier account holders and dupe...
Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May data from threat intelligence firm Privacy Affairs. But the price for verified crypto accounts has been steadily rising, with some ‘logs,’ a darknet slang term for stolen or nominee credentials, fetching as much as $2,650 per account, Privacy Affairs research shows. While the U.S.-based Bittrex crypto exchange hosts the cheapest logs, Germany’s N26 mobile banking platform claims the most expensive ones. This price increase has occurred despite a generally bearish market environment for crypto assets. Fueled...
It seems everyone is talking about artificial intelligence (AI). Everyone. From senior executives to school kids, the hype - or dread - around this technology seems to be growing by the day. Much of this excitement, of course, has to do with the launch of generative AI applications like ChatGPT and Midjourney, which, for the first time perhaps, have given the average individual a felt sense of AI’s potential. That experience hasn’t just thrilled college students, designers and digital marketers, it has animated businesses and establishments across the world who are imagining an array of new commercial and public...
Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also continuously evolving new cash-out methods to cover their tracks. Chainalysis’s mid-year update found that crypto inflows to “known illicit entities” were down 65% compared to where they were last June. Meanwhile, crypto flows to high-risk entities, which generally entail “mixers” and non-compliant exchanges were down 42%. Crypto mixers are protocols that enable large groups of users to pool their funds together in a deposit wallet that is programmed to redistribute tumbled crypto assets back to designated...
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the public about the significance of personal data ahead of the implementation of a new national personal data protection system. Emphasizing responsible data handling, privacy preservation, and fostering trust and collaboration between commercial entities and private individuals, “Ask Before” supports KSA’s new Personal Data Protection Law (PDPL), which became enforceable on September 14th. The need for such a campaign stems from the fact that the PDPL is the first regulation of its kind rolled out in the kingdom, activated five years after...

AI Security 101

Artificial Intelligence (AI) is no longer just a buzzword; it’s an integral part of our daily lives, powering everything from our search for a perfect meme to critical infrastructure. But as Spider-Man’s Uncle Ben wisely said, “With great power comes great responsibility.” The power of AI is undeniable, but if not secured properly, it could end up making every meme a Chuck Norris meme. Imagine a world where malicious actors can manipulate AI systems to make incorrect predictions, steal sensitive data, or even control the AI’s behavior. Without robust AI security, this dystopian scenario could become our reality. Ensuring the...
With AI’s breakneck expansion, the distinctions between ‘cybersecurity’ and ‘AI security’ are becoming increasingly pronounced. While both disciplines aim to safeguard digital assets, their focus and the challenges they address diverge in significant ways. Traditional cybersecurity is primarily about defending digital infrastructures from external threats, breaches, and unauthorized access. On the other hand, AI security has to address unique challenges posed by artificial intelligence systems, ensuring not just their robustness but also their ethical and transparent operation as well as unique internal vulnerabilities intrinsic to AI models and algorithms.
Neural networks learn from data. They are trained on large datasets to recognize patterns or make decisions. A Trojan attack in a neural network typically involves injecting malicious data into this training dataset. This 'poisoned' data is crafted in such a way that the neural network begins to associate it with a certain output, creating a hidden vulnerability. When activated, this vulnerability can cause the neural network to behave unpredictably or make incorrect decisions, often without any noticeable signs of tampering.
Ask most people what they remember from 2016 - if they remember anything at all - and there are usually two big events that float to the front of their minds: Britain voted to leave the European Union and the United States voted Donald Trump into the White House. Together, these two episodes sent shock waves around the world. In the UK, the Brexit referendum was followed by a national decline in mental health. In the US, American college students exhibited levels of stress comparable to PTSD. Even beyond those borders, Brexit and the Trump election became emblematic of the...
Homo sapiens is an incredibly adaptable species, arguably the most adaptable ever. But it is also a forgetful one, quick to take things for granted. Many of us can remember when cell phones first emerged, when the internet first became publicly available, when the first iPhone was released. These momentous shifts occurred within a generation, altering the nature of society and civilization. Just a few decades ago, none of these existed, but by the time Covid-19 hit, billions of people were able to lift their smartphone and video call a loved one on the other side of the world. At...
Model fragmentation is the phenomenon where a single machine-learning model is not used uniformly across all instances, platforms, or applications. Instead, different versions, configurations, or subsets of the model are deployed based on specific needs, constraints, or local optimizations. This can result in multiple fragmented instances of the original model operating in parallel, each potentially having different performance characteristics, data sensitivities, and security vulnerabilities.