Skip to main content

Showing 1–10 of 10 results for author: Kumar, R S S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.14553  [pdf

    cs.CR cs.AI cs.CY

    Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

    Authors: Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek

    Abstract: In July 2022, the Center for Security and Emerging Technology (CSET) at Georgetown University and the Program on Geopolitics, Technology, and Governance at the Stanford Cyber Policy Center convened a workshop of experts to examine the relationship between vulnerabilities in artificial intelligence systems and more traditional types of software vulnerabilities. Topics discussed included the extent… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  2. arXiv:2107.10302  [pdf, other

    cs.CR cs.CY cs.LG

    Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks

    Authors: Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar

    Abstract: Attacks from adversarial machine learning (ML) have the potential to be used "for good": they can be used to run counter to the existing power structures within ML, creating breathing space for those who would otherwise be the targets of surveillance and control. But most research on adversarial ML has not engaged in develo** tools for resistance against ML systems. Why? In this paper, we review… ▽ More

    Submitted 15 September, 2021; v1 submitted 11 July, 2021; originally announced July 2021.

    Comments: Author list is ordered alphabetically as there is equal contribution. 4 pages Accepted by the ICML 2021 workshop on "A Blessing in Disguise:The Prospects and Perils of Adversarial Machine Learning"

  3. arXiv:2012.02048  [pdf, ps, other

    cs.CY

    Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning

    Authors: Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Rigot, Ram Shankar Siva Kumar

    Abstract: This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as "real world." Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few detai… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: Accepted to NeurIPS 2020 Workshop on Dataset Curation and Security; Also accepted at Navigating the Broader Impacts of AI Research Workshop. All authors contributed equally. The list of authors is arranged alphabetically

  4. arXiv:2006.16179  [pdf

    cs.CY cs.CR cs.LG

    Legal Risks of Adversarial Machine Learning Research

    Authors: Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

    Abstract: Adversarial Machine Learning is booming with ML researchers increasingly targeting commercial ML systems such as those used in Facebook, Tesla, Microsoft, IBM, Google to demonstrate vulnerabilities. In this paper, we ask, "What are the potential legal risks to adversarial ML researchers when they attack ML systems?" Studying or testing the security of any operational system potentially runs afoul… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

    Comments: Accepted at ICML 2020 Workshop on Law & Machine Learning

  5. arXiv:2002.05648  [pdf, ps, other

    cs.CY cs.CR cs.LG stat.ML

    Politics of Adversarial Machine Learning

    Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

    Abstract: In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights… ▽ More

    Submitted 26 April, 2020; v1 submitted 31 January, 2020; originally announced February 2020.

    Comments: Authors ordered alphabetically; 4 pages

  6. arXiv:2002.05646  [pdf, other

    cs.CY cs.CR cs.LG stat.ML

    Adversarial Machine Learning -- Industry Perspectives

    Authors: Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia

    Abstract: Based on interviews with 28 organizations, we found that industry practitioners are not equipped with tactical and strategic tools to protect, detect and respond to attacks on their Machine Learning (ML) systems. We leverage the insights from the interviews and we enumerate the gaps in perspective in securing machine learning systems when viewed in the context of traditional software security deve… ▽ More

    Submitted 19 March, 2021; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Minor Typos corrected 7 pages, 1 figure

  7. arXiv:1911.11034  [pdf

    cs.LG cs.CR stat.ML

    Failure Modes in Machine Learning Systems

    Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover

    Abstract: In the last two years, more than 200 papers have been written on how machine learning (ML) systems can fail because of adversarial attacks on the algorithms and data; this number balloons if we were to incorporate papers covering non-adversarial failure modes. The spate of papers has made it difficult for ML practitioners, let alone engineers, lawyers, and policymakers, to keep up with the attacks… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: 12 pages

  8. arXiv:1810.10731  [pdf, ps, other

    cs.LG cs.CR cs.CY stat.ML

    Law and Adversarial Machine Learning

    Authors: Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen

    Abstract: When machine learning systems fail because of adversarial manipulation, how should society expect the law to respond? Through scenarios grounded in adversarial ML literature, we explore how some aspects of computer crime, copyright, and tort law interface with perturbation, poisoning, model stealing and model inversion attacks to show how some attacks are more likely to result in liability than ot… ▽ More

    Submitted 4 December, 2018; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: Minor edits. Corrected typos, Added references. 4 pages, submitted to NIPS 2018 Workshop on Security in Machine Learning

  9. arXiv:1711.06652  [pdf, other

    quant-ph cs.CR cs.LG

    Hardening Quantum Machine Learning Against Adversaries

    Authors: Nathan Wiebe, Ram Shankar Siva Kumar

    Abstract: Security for machine learning has begun to become a serious issue for present day applications. An important question remaining is whether emerging quantum technologies will help or hinder the security of machine learning. Here we discuss a number of ways that quantum information can be used to help make quantum classifiers more secure or private. In particular, we demonstrate a form of robust pri… ▽ More

    Submitted 17 November, 2017; originally announced November 2017.

  10. arXiv:1709.07095  [pdf, other

    cs.CR cs.AI

    Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

    Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann

    Abstract: Operationalizing machine learning based security detections is extremely challenging, especially in a continuously evolving cloud environment. Conventional anomaly detection does not produce satisfactory results for analysts that are investigating security incidents in the cloud. Model evaluation alone presents its own set of problems due to a lack of benchmark datasets. When deploying these detec… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

    Comments: 10 pages, 9 figures