Go to Content

Samsung Tech Event

test

Q&A

Security Engineering and Machine Learning

Ross J. Anderson

  • 박민수 2021.08.17 9:58:32
    Is machine learning essential for security? Why is it better than any other way?
    Ross J.Anderson 2021.08.17 22:03:13
    Machine learning is unavoidable because it's just very much better than other techniques for some important tasks, including spam filtering (which got Bayesian networks on the map) and face recognition (for which DNNs are the state of the art)
  • 박대호 2021.08.17 9:54:21
    If AI make some errors like destroying security system, how do you handle it?
    Ross J.Anderson 2021.08.17 22:05:38
    AI components are almost always embedded as components in larger systems; for example, machine-vision systems are part of the advanced driver assistance system in a modern car. However there are also radars (for adaptive cruise control), GPS (for navigation) and ultrasonics (for measuring the distance to nearby cars). You need to understand the possible errors of each component, both from random failure and from adversarial action
  • 배유진 2021.08.17 9:24:18
    Based on future trends, is machine learning essential for security engineering?
    Ross J.Anderson 2021.08.17 22:06:04
    See above
  • 한승훈 2021.08.17 2:32:00
    When do you expect the 'Technological Singularity' to come due to the acceleration of machine learning?
    Ross J.Anderson 2021.08.17 22:08:30
    I don't believe in that. Artificial intelligence is a propaganda phrase; really what we're doing is intelligence augmentation (I discuss this in my book). We have no idea at all what consciousness is, and all our so-called AI systems do is statistical machine learning. There is no understanding there.
  • 김락현 2021.08.17 14:00:59
    Machine learning is a very important area of security today, but is there any vulnerability or consideration that arises when it comes to big data?
    Ross J.Anderson 2021.08.17 21:51:01
    If you train a model on very large datasets, you'll be selecting and batching data at random, and you'd better make sure that this is sound. If an opponent can tweak the order in which the training data get sampled, they can insert trojans or backdoors: https://www.lightbluetouchpaper.org/2021/04/23/data-ordering-attacks/
  • 김성균 2021.08.17 13:28:15
    In the work of machine learning, Security engineering solutions are quite important. However, the more security is strong, the more inconvenience serious... What can those be balanced ??
    Ross J.Anderson 2021.08.17 21:52:01
    It depends on the application. Security is only defined with respect to a threat model, which depends on the context and who the potential adversaries are
  • VALLABHANENI SANDEEP 2021.08.17 10:47:46
    Like your instant translation ideas. Especially being a global employee working out of Samsung South Korea. How long it takes to get a much better, accurate and secure instant translator?
    Ross J.Anderson 2021.08.17 21:58:35
    That's an NLP problem rather than a security one...
  • Mark RISON 2021.08.17 10:43:02
    Doesn't Unicode have canonicalisation rules to avoid such subterfuges? Also "looks like" tables?
    Ross J.Anderson 2021.08.17 22:00:29
    Sure, and there are even warnings about possible security issues in the standards ? but that doesn't help you against adversarial action. For that you need enforcement, whether by filtering out bad characters, by limits on processing time, or whatever
  • Ravikumar Vachhani 2021.08.17 12:25:20
    There are many functionalities which will use AI/Machine Learning & Access data in Telecom Networks. How Data will be secured from threats as AI modules access network data?
    Ross J.Anderson 2021.08.17 21:53:04
    You have to ask what sort of information might leak though the ML modules you use, and how this might undermine your security policy
  • 정우빈 2021.08.17 12:15:42
    This is a 'sponge attack' question. Is the battery issue caused by running AI logic on mobile devices?
    Ross J.Anderson 2021.08.17 21:54:36
    The issue is that AI logic can have a very large gap between average-case power consumption and worst-case. If an adversary can feed inputs that cause worst-case performance, can this drain the battery to the extent that the device performance is impaired>
1 2 3 4 5