[1802.07228] The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
FYI
https://arxiv.org/abs/1802.07228
Skip to main content <https://arxiv.org/abs/1802.07228#content> <https://www.cornell.edu/> We gratefully acknowledge support from the Simons Foundation, member institutions <https://info.arxiv.org/about/ourmembers.html>, and all contributors. Donate <https://info.arxiv.org/about/donate.html> <https://arxiv.org/abs/%7Burl_path('ignore_me')%7D> <https://arxiv.org/>
cs <https://arxiv.org/list/cs/recent>> arXiv:1802.07228
Help <https://info.arxiv.org/help> | Advanced Search <https://arxiv.org/search/advanced> Search Computer Science > Artificial Intelligence [Submitted on 20 Feb 2018] The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Miles Brundage <https://arxiv.org/search/cs?searchtype=author&query=Brundage,+M>, Shahar Avin <https://arxiv.org/search/cs?searchtype=author&query=Avin,+S>, Jack Clark <https://arxiv.org/search/cs?searchtype=author&query=Clark,+J>, Helen Toner <https://arxiv.org/search/cs?searchtype=author&query=Toner,+H>, Peter Eckersley <https://arxiv.org/search/cs?searchtype=author&query=Eckersley,+P>, Ben Garfinkel <https://arxiv.org/search/cs?searchtype=author&query=Garfinkel,+B>, Allan Dafoe <https://arxiv.org/search/cs?searchtype=author&query=Dafoe,+A>, Paul Scharre <https://arxiv.org/search/cs?searchtype=author&query=Scharre,+P>, Thomas Zeitzoff <https://arxiv.org/search/cs?searchtype=author&query=Zeitzoff,+T>, Bobby Filar <https://arxiv.org/search/cs?searchtype=author&query=Filar,+B>, Hyrum Anderson <https://arxiv.org/search/cs?searchtype=author&query=Anderson,+H>, Heather Roff <https://arxiv.org/search/cs?searchtype=author&query=Roff,+H>, Gregory C. Allen <https://arxiv.org/search/cs?searchtype=author&query=Allen,+G+C>, Jacob Steinhardt <https://arxiv.org/search/cs?searchtype=author&query=Steinhardt,+J>, Carrick Flynn <https://arxiv.org/search/cs?searchtype=author&query=Flynn,+C>, Seán Ó hÉigeartaigh <https://arxiv.org/search/cs?searchtype=author&query=h%C3%89igeartaigh,+S+%C3%93>, Simon Beard <https://arxiv.org/search/cs?searchtype=author&query=Beard,+S>, Haydn Belfield <https://arxiv.org/search/cs?searchtype=author&query=Belfield,+H>, Sebastian Farquhar <https://arxiv.org/search/cs?searchtype=author&query=Farquhar,+S>, Clare Lyle <https://arxiv.org/search/cs?searchtype=author&query=Lyle,+C>, Rebecca Crootof <https://arxiv.org/search/cs?searchtype=author&query=Crootof,+R>, Owain Evans <https://arxiv.org/search/cs?searchtype=author&query=Evans,+O>, Michael Page <https://arxiv.org/search/cs?searchtype=author&query=Page,+M>, Joanna Bryson <https://arxiv.org/search/cs?searchtype=author&query=Bryson,+J>, Roman Yampolskiy <https://arxiv.org/search/cs?searchtype=author&query=Yampolskiy,+R>, Dario Amodei <https://arxiv.org/search/cs?searchtype=author&query=Amodei,+D> This report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. After analyzing the ways in which AI may influence the threat landscape in the digital, physical, and political domains, we make four high-level recommendations for AI researchers and other stakeholders. We also suggest several promising areas for further research that could expand the portfolio of defenses, or make attacks less effective or harder to execute. Finally, we discuss, but do not conclusively resolve, the long-term equilibrium of attackers and defenders. Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Computers and Society (cs.CY) Cite as: arXiv:1802.07228 <https://arxiv.org/abs/1802.07228> [cs.AI] (or arXiv:1802.07228v1 <https://arxiv.org/abs/1802.07228v1> [cs.AI] for this version) https://doi.org/10.48550/arXiv.1802.07228 <https://doi.org/10.48550/arXiv.1802.07228>Focus to learn more Submission history From: Miles Brundage [view email <https://arxiv.org/show-email/ea10e57d/1802.07228>] [v1] Tue, 20 Feb 2018 18:07:50 UTC (1,400 KB) Access Paper: Download PDF <https://arxiv.org/pdf/1802.07228.pdf> (view license <http://arxiv.org/licenses/nonexclusive-distrib/1.0/>) Current browse context: cs.AI < prev <https://arxiv.org/prevnext?id=1802.07228&function=prev&context=cs.AI> | next > <https://arxiv.org/prevnext?id=1802.07228&function=next&context=cs.AI> new <https://arxiv.org/list/cs.AI/new> | recent <https://arxiv.org/list/cs.AI/recent> | 1802 <https://arxiv.org/list/cs.AI/1802> Change to browse by: cs <https://arxiv.org/abs/1802.07228?context=cs> cs.CR <https://arxiv.org/abs/1802.07228?context=cs.CR> cs.CY <https://arxiv.org/abs/1802.07228?context=cs.CY> References & Citations NASA ADS <https://ui.adsabs.harvard.edu/abs/arXiv:1802.07228> Google Scholar <https://scholar.google.com/scholar_lookup?arxiv_id=1802.07228> Semantic Scholar <https://api.semanticscholar.org/arXiv:1802.07228> 2 blog links <https://arxiv.org/tb/1802.07228> (what is this? <https://info.arxiv.org/help/trackback.html>) DBLP <https://dblp.uni-trier.de/> - CS Bibliography listing <https://dblp.uni-trier.de/db/journals/corr/corr1802.html#abs-1802-07228> | bibtex <https://dblp.uni-trier.de/rec/bibtex/journals/corr/abs-1802-07228> Miles Brundage <https://dblp.uni-trier.de/search/author?author=Miles%20Brundage> Shahar Avin <https://dblp.uni-trier.de/search/author?author=Shahar%20Avin> Jack Clark <https://dblp.uni-trier.de/search/author?author=Jack%20Clark> Helen Toner <https://dblp.uni-trier.de/search/author?author=Helen%20Toner> Peter Eckersley <https://dblp.uni-trier.de/search/author?author=Peter%20Eckersley> … Export BibTeX Citation Bookmark <https://arxiv.org/ct?url=http://www.bibsonomy.org/BibtexHandler?requTask%3Dupload%26url%3Dhttps://arxiv.org/abs/1802.07228%26description%3DThe+Malicious+Use+of+Artificial+Intelligence:+Forecasting,+Prevention,+and+Mitigation&v=427b3bad> <https://arxiv.org/ct?url=https://reddit.com/submit?url%3Dhttps://arxiv.org/abs/1802.07228%26title%3DThe+Malicious+Use+of+Artificial+Intelligence:+Forecasting,+Prevention,+and+Mitigation&v=ed9491bf> Bibliographic Tools Bibliographic and Citation Tools
Bibliographic Explorer Toggle Bibliographic Explorer (What is the Explorer? <https://info.arxiv.org/labs/showcase.html#arxiv-bibliographic-explorer>) Litmaps Toggle Litmaps (What is Litmaps? <https://www.litmaps.co/>) scite.ai Toggle scite Smart Citations (What are Smart Citations? <https://www.scite.ai/>) Code, Data, Media Demos Related Papers About arXivLabs Which authors of this paper are endorsers? <https://arxiv.org/auth/show-endorsers/1802.07228> | Disable MathJax <> (What is MathJax? <https://info.arxiv.org/help/mathjax.html>) About <https://info.arxiv.org/about> Help <https://info.arxiv.org/help> Contact <https://info.arxiv.org/help/contact.html> Subscribe <https://info.arxiv.org/help/subscribe> Copyright <https://info.arxiv.org/help/license/index.html> Privacy Policy <https://info.arxiv.org/help/policies/privacy_policy.html> Web Accessibility Assistance <https://info.arxiv.org/help/web_accessibility.html> arXiv Operational Status <https://status.arxiv.org/> Get status notifications via email <https://subscribe.sorryapp.com/24846f03/email/new> or slack <https://subscribe.sorryapp.com/24846f03/slack/new>
participants (1)
-
jim pasquale