全球14家机构专家发百页报告:警惕人工智能(附全文)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

FutureofHumanityInstituteUniversityofOxfordCentrefortheStudyofExistentialRiskUniversityofCambridgeCenterforaNewAmericanSecurityElectronicFrontierFoundationOpenAIFebruary2018TheMaliciousUseofArtificialIntelligence:Forecasting,Prevention,andMitigationTheMaliciousUseofArtificialIntelligence:Forecasting,Prevention,andMitigationAuthorsarelistedinorderofcontributionDesignDirectionbySankalpBhatnagarandTaliaCottonFebruary20181Correspondingauthormiles.brundage@philosophy.ox.ac.ukFutureofHumanityInstitute,UniversityofOxford;ArizonaStateUniversity2Correspondingauthor,sa478@cam.ac.ukCentrefortheStudyofExistentialRisk,UniversityofCambridge3OpenAI4OpenPhilanthropyProject5ElectronicFrontierFoundation6FutureofHumanityInstitute,UniversityofOxford7FutureofHumanityInstitute,UniversityofOxford;YaleUniversity8CenterforaNewAmericanSecurity9AmericanUniversity10Endgame11Endgame12UniversityofOxford/ArizonaStateUniversity/NewAmericaFoundation13CenterforaNewAmericanSecurity14StanfordUniversity15FutureofHumanityInstitute,UniversityofOxford16CentrefortheStudyofExistentialRiskandCentrefortheFutureofIntelligence,UniversityofCambridge17CentrefortheStudyofExistentialRisk,UniversityofCambridge18CentrefortheStudyofExistentialRisk,UniversityofCambridge19FutureofHumanityInstitute,UniversityofOxford20FutureofHumanityInstitute,UniversityofOxford21InformationSocietyProject,YaleUniversity22FutureofHumanityInstitute,UniversityofOxford23OpenAI24UniversityofBath25UniversityofLouisville26OpenAIMilesBrundageShaharAvinJackClarkHelenTonerPeterEckersleyBenGarfinkelAllanDafoePaulScharreThomasZeitzoffBobbyFilarHyrumAndersonHeatherRoffGregoryC.AllenJacobSteinhardtCarrickFlynnSeánÓhÉigeartaighSimonBeardHaydnBelfieldSebastianFarquharClareLyleRebeccaCrootofOwainEvansMichaelPageJoannaBrysonRomanYampolskiyDarioAmodeiArtificialintelligenceandmachinelearningcapabilitiesaregrowingatanunprecedentedrate.Thesetechnologieshavemanywidelybeneficialapplications,rangingfrommachinetranslationtomedicalimageanalysis.Countlessmoresuchapplicationsarebeingdevelopedandcanbeexpectedoverthelongterm.Lessattentionhashistoricallybeenpaidtothewaysinwhichartificialintelligencecanbeusedmaliciously.Thisreportsurveysthelandscapeofpotentialsecuritythreatsfrommalicioususesofartificialintelligencetechnologies,andproposeswaystobetterforecast,prevent,andmitigatethesethreats.Weanalyze,butdonotconclusivelyresolve,thequestionofwhatthelong-termequilibriumbetweenattackersanddefenderswillbe.Wefocusinsteadonwhatsortsofattackswearelikelytoseesoonifadequatedefensesarenotdeveloped.p.3ExecutiveSummaryp.4ExecutiveSummaryTheMaliciousUseofArtificialIntelligenceInresponsetothechangingthreatlandscapewemakefourhigh-levelrecommendations:1.Policymakersshouldcollaboratecloselywithtechnicalresearcherstoinvestigate,prevent,andmitigatepotentialmalicioususesofAI.2.Researchersandengineersinartificialintelligenceshouldtakethedual-usenatureoftheirworkseriously,allowingmisuse-relatedconsiderationstoinfluenceresearchprioritiesandnorms,andproactivelyreachingouttorelevantactorswhenharmfulapplicationsareforeseeable.3.Bestpracticesshouldbeidentifiedinresearchareaswithmorematuremethodsforaddressingdual-useconcerns,suchascomputersecurity,andimportedwhereapplicabletothecaseofAI.4.Activelyseektoexpandtherangeofstakeholdersanddomainexpertsinvolvedindiscussionsofthesechallenges.p.5ExecutiveSummaryTheMaliciousUseofArtificialIntelligenceAsAIcapabilitiesbecomemorepowerfulandwidespread,weexpectthegrowinguseofAIsystemstoleadtothefollowingchangesinthelandscapeofthreats:•Expansionofexistingthreats.ThecostsofattacksmaybeloweredbythescalableuseofAIsystemstocompletetasksthatwouldordinarilyrequirehumanlabor,intelligenceandexpertise.Anaturaleffectwouldbetoexpandthesetofactorswhocancarryoutparticularattacks,therateatwhichtheycancarryouttheseattacks,andthesetofpotentialtargets.•Introductionofnewthreats.NewattacksmayarisethroughtheuseofAIsystemstocompletetasksthatwouldbeotherwiseimpracticalforhumans.Inaddition,maliciousactorsmayexploitthevulnerabilitiesofAIsystemsdeployedbydefenders.•Changetothetypicalcharacterofthreats.WebelievethereisreasontoexpectattacksenabledbythegrowinguseofAItobeespeciallyeffective,finelytargeted,difficulttoattribute,andlikelytoexploitvulnerabilitiesinAIsystems.p.6ExecutiveSummaryTheMaliciousUseofArtificialIntelligenceWestructureouranalysisbyseparatelyconsideringthreesecuritydomains,andillustratepossiblechangestothreatswithinthesedomainsthroughrepresentativeexamples:•Digitalsecurity.TheuseofAItoautomatetasksinvolvedincarryingoutcyberattackswillalleviatetheexistingtradeoffbetweenthescaleandefficacyofattacks.Thismayexpandthethreatassociatedwithlabor-intensivecyberattacks(suchasspearphishing).Wealsoexpectnovelattacksthatexploithumanvulnerabilities(e.g.throughtheuseofspeechsynthesisforimpersonation),existingsoftwarevulnerabilities(e.g.throughautomatedhacking),orthevulnerabilitiesofAIsystems(e.g.throughadversarialexamplesanddatapoisoning).•Physicalsecurity.TheuseofAItoautomatetasksinvolvedincarryingoutattackswithdronesandotherphy

1 / 101
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功