Skip to main content

Showing 1–12 of 12 results for author: Lohn, A

.
  1. arXiv:2308.00862  [pdf, ps, other

    cs.CY

    Confidence-Building Measures for Artificial Intelligence: Workshop Proceedings

    Authors: Sarah Shoker, Andrew Reddie, Sarah Barrington, Ruby Booth, Miles Brundage, Husanjot Chahal, Michael Depp, Bill Drexel, Ritwik Gupta, Marina Favaro, Jake Hecla, Alan Hickey, Margarita Konaev, Kirthi Kumar, Nathan Lambert, Andrew Lohn, Cullen O'Keefe, Nazneen Rajani, Michael Sellitto, Robert Trager, Leah Walker, Alexa Wehsener, Jessica Young

    Abstract: Foundation models could eventually introduce several pathways for undermining state security: accidents, inadvertent escalation, unintentional conflict, the proliferation of weapons, and the interference with human diplomacy are just a few on a long list. The Confidence-Building Measures for Artificial Intelligence workshop hosted by the Geopolitics Team at OpenAI and the Berkeley Risk and Securit… ▽ More

    Submitted 3 August, 2023; v1 submitted 1 August, 2023; originally announced August 2023.

  2. arXiv:2305.14553  [pdf

    cs.CR cs.AI cs.CY

    Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

    Authors: Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek

    Abstract: In July 2022, the Center for Security and Emerging Technology (CSET) at Georgetown University and the Program on Geopolitics, Technology, and Governance at the Stanford Cyber Policy Center convened a workshop of experts to examine the relationship between vulnerabilities in artificial intelligence systems and more traditional types of software vulnerabilities. Topics discussed included the extent… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  3. arXiv:2207.13825  [pdf, other

    cs.CR cs.AI cs.CY

    Will AI Make Cyber Swords or Shields: A few mathematical models of technological progress

    Authors: Andrew J Lohn, Krystal Alex Jackson

    Abstract: We aim to demonstrate the value of mathematical models for policy debates about technological progress in cybersecurity by considering phishing, vulnerability discovery, and the dynamics between patching and exploitation. We then adjust the inputs to those mathematical models to match some possible advances in their underlying technology. We find that AI's impact on phishing may be overestimated b… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: Technical companion paper to CSET report entitled "Will AI Make Cyber Swords or Shields: Using models to project the impact of technology development

  4. arXiv:2206.12725  [pdf, other

    cs.CV

    Empirical Evaluation of Physical Adversarial Patch Attacks Against Overhead Object Detection Models

    Authors: Gavin S. Hartnett, Li Ang Zhang, Caolionn O'Connell, Andrew J. Lohn, Jair Aguirre

    Abstract: Adversarial patches are images designed to fool otherwise well-performing neural network-based computer vision models. Although these attacks were initially conceived of and studied digitally, in that the raw pixel values of the image were perturbed, recent work has demonstrated that these attacks can successfully transfer to the physical world. This can be accomplished by printing out the patch a… ▽ More

    Submitted 25 June, 2022; originally announced June 2022.

  5. arXiv:2010.02456  [pdf, other

    cs.CR cs.AI cs.CV cs.LG eess.IV

    Downscaling Attack and Defense: Turning What You See Back Into What You Get

    Authors: Andrew J. Lohn

    Abstract: The resizing of images, which is typically a required part of preprocessing for computer vision systems, is vulnerable to attack. Images can be created such that the image is completely different at machine-vision scales than at other scales and the default settings for some common computer vision and machine learning systems are vulnerable. We show that defenses exist and are trivial to administe… ▽ More

    Submitted 7 October, 2020; v1 submitted 5 October, 2020; originally announced October 2020.

  6. arXiv:2009.00802  [pdf, other

    cs.LG cs.AI cs.CV cs.CY cs.SE stat.ML

    Estimating the Brittleness of AI: Safety Integrity Levels and the Need for Testing Out-Of-Distribution Performance

    Authors: Andrew J. Lohn

    Abstract: Test, Evaluation, Verification, and Validation (TEVV) for Artificial Intelligence (AI) is a challenge that threatens to limit the economic and societal rewards that AI researchers have devoted themselves to producing. A central task of TEVV for AI is estimating brittleness, where brittleness implies that the system functions well within some bounds and poorly outside of those bounds. This paper ar… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

  7. arXiv:2004.07213  [pdf, ps, other

    cs.CY

    Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims

    Authors: Miles Brundage, Shahar Avin, Jasmine Wang, Haydn Belfield, Gretchen Krueger, Gillian Hadfield, Heidy Khlaaf, **gying Yang, Helen Toner, Ruth Fong, Tegan Maharaj, Pang Wei Koh, Sara Hooker, Jade Leung, Andrew Trask, Emma Bluemke, Jonathan Lebensold, Cullen O'Keefe, Mark Koren, Théo Ryffel, JB Rubinovitz, Tamay Besiroglu, Federica Carugati, Jack Clark, Peter Eckersley , et al. (34 additional authors not shown)

    Abstract: With the recent wave of progress in artificial intelligence (AI) has come a growing awareness of the large-scale impacts of AI systems, and recognition that existing regulations and norms in industry and academia are insufficient to ensure responsible AI development. In order for AI developers to earn trust from system users, customers, civil society, governments, and other stakeholders that they… ▽ More

    Submitted 20 April, 2020; v1 submitted 15 April, 2020; originally announced April 2020.

  8. arXiv:2003.02763  [pdf, other

    cs.DL cs.AI cs.CY

    A Quantitative History of A.I. Research in the United States and China

    Authors: Daniel Ish, Andrew Lohn, Christian Curriden

    Abstract: Motivated by recent interest in the status and consequences of competition between the U.S. and China in A.I. research, we analyze 60 years of abstract data scraped from Scopus to explore and quantify trends in publications on A.I. topics from institutions affiliated with each country. We find the total volume of publications produced in both countries grows with a remarkable regularity over tens… ▽ More

    Submitted 11 June, 2020; v1 submitted 5 March, 2020; originally announced March 2020.

  9. arXiv:1910.02095  [pdf, other

    stat.ML cs.CR cs.LG

    Adversarial Examples for Cost-Sensitive Classifiers

    Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack

    Abstract: Motivated by safety-critical classification problems, we investigate adversarial attacks against cost-sensitive classifiers. We use current state-of-the-art adversarially-resistant neural network classifiers [1] as the underlying models. Cost-sensitive predictions are then achieved via a final processing step in the feed-forward evaluation of the network. We evaluate the effectiveness of cost-sens… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

  10. arXiv:1910.00111  [pdf, other

    cs.CR

    Defense in Depth: The Basics of Blockade and Delay

    Authors: Andrew J. Lohn

    Abstract: Given that individual defenses are rarely sufficient, defense-in-depth is nearly universal and options for individual defensive layers abound. We develop a simple mathematical theory that can help in selecting the type and quantity of defenses for two different defense-in-depth strategies: Blockade and Delay. This theoretical approach accounts for budgetary constraints and the number, skill, and d… ▽ More

    Submitted 30 September, 2019; originally announced October 2019.

  11. arXiv:1808.10062  [pdf

    cs.CR

    Timelines for In-Code Discovery of Zero-Day Vulnerabilities and Supply-Chain Attacks

    Authors: Andrew J. Lohn

    Abstract: Zero-day vulnerabilities can be accidentally or maliciously placed in code and can remain in place for years. In this study, we address an aspect of their longevity by considering the likelihood that they will be discovered in the code across versions. We approximate well-disguised vulnerabilities as only being discoverable if the relevant lines of code are explicitly examined, and obvious vulnera… ▽ More

    Submitted 31 August, 2018; v1 submitted 29 August, 2018; originally announced August 2018.

  12. arXiv:1406.4033  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall cs.ET cs.IT

    Degenerate Resistive Switching and Ultrahigh Density Storage in Resistive Memory

    Authors: Andrew J. Lohn, Patrick R. Mickel, Conrad D. James, Matthew J. Marinella

    Abstract: We show that, in tantalum oxide resistive memories, activation power provides a multi-level variable for information storage that can be set and read separately from the resistance. These two state variables (resistance and activation power) can be precisely controlled in two steps: (1) the possible activation power states are selected by partially reducing resistance, then (2) a subsequent partia… ▽ More

    Submitted 16 June, 2014; originally announced June 2014.