scholarly journals XAISec - Explainable AI Security: An Early Discussion Paper on New Multidisciplinary Subfield In Pursuit of Building Trust in Security of AI systems

2021 ◽  
Author(s):  
Manojkumar Parmar

Today's Artificial Intelligence systems are at the epicenter of security threats across industries. Attackers are trying to turn AI systems against the organization and society, intending to cause harm at various levels. Security, along with the explainability of AI, is a cornerstone for Digital Trust and Trustworthy AI. AI-based systems provide new attack surfaces, and adversaries can utilize attack surfaces to construct attacks to exploit vulnerabilities. Mission-critical systems using AI need to address the crucial problem of AI Security(AISec) and Explainable AI (XAI). In the early version of the discussion paper, we propose the new sub-field of Explainable AI Security (XAISec) at the intersection of AISec, XAI, and Explainable Security (XSec) for Mission-critical systems. We propose that XAISec should aim to explain AI Security's workings (justification of attack and transparency about defense) at an appropriate level considering multiple aspects. XAISec is a niche multidisciplinary greenfield with an ascertained need and validated using informal interview settings. We invite constructive criticism, collaboration, and contribution to jump-start the sub-field. We believe that with XAISec as an integral part of AI, AI can impact millions of lives across the globe, enabling smarter, sustainable, and evolutionary transformations.

2018 ◽  
Author(s):  
Matthew Ridley ◽  
Carlos Otero ◽  
David Elliott ◽  
Xavier Merino

2018 ◽  
Author(s):  
Matthew Ridley ◽  
Carlos Otero ◽  
David Elliott ◽  
Xavier Merino

Author(s):  
В. Б. Бетелин ◽  
Д. А. Моргун

Происходящие в мире события свидетельствуют о возрастании угрозы перехвата управления системами с критической миссией (СКМ). Приводятся конкретные примеры инцидентов, один из них — массовые отключения электроэнергии в Венесуэле. Обосновывается необходимость разработки технологии создания цифровых систем управления, обеспечивающей парирование угрозы перехвата управления и нештатного функционирования систем с критической миссией. В основе этой технологии — концепция цифровых двойников объектов управления цифровых систем управления этими объектами, включая все аппаратные и программные компоненты, а также интеллектуальные средства самоконтроля и самокоррекции функционирования элементной базы, вычислительной и коммуникационной техники, базового и прикладного программного обеспечения. There is an ongoing threat of control interception in mission-critical systems (MCS). Specific examples of such incidents are presented, one of them is the massive power outages in Venezuela. We specify the reasons for creating an approach to developing digital control systems for MCS resistant to control interception and abnormal functioning. This technology is based on the digital twin concept. A twin represents all the hardware and software components, as includes smart tools for the hardware, core and application software self-monitoring and self-correction.  


Author(s):  
Sergey Bratus ◽  
James Oakley ◽  
Ashwin Ramaswamy ◽  
Sean W. Smith ◽  
Michael E. Locasto

The mechanics of hot patching (the process of upgrading a program while it executes) remain understudied, even though it offers capabilities that act as practical benefits for both consumer and mission-critical systems. A reliable hot patching procedure would serve particularly well by reducing the downtime necessary for critical functionality or security upgrades. However, hot patching also carries the risk—real or perceived—of leaving the system in an inconsistent state, which leads many owners to forgo its benefits as too risky; for systems where availability is critical, this decision may result in leaving systems un-patched and vulnerable. In this paper, the authors present a novel method for hot patching ELF binaries that supports synchronized global data and code updates, and reasoning about the results of applying the hot patch. In this regard, the Patch Object format was developed to encode patches as a special type of ELF re-locatable object file. The authors then built a tool, Katana, which automatically creates these patch objects as a by-product of the standard source build process. Katana also allows an end-user to apply the Patch Objects to a running process.


Sign in / Sign up

Export Citation Format

Share Document