Self-Replication in Neural Nets

A recent paper from Oscar Chang and Hod Lipson, a grad student and a professor of Columbia University, respectively, has made significant progress in neural network development by successfully building and training a self-replicating neural network.

Self-replicating machines has been long theorized and applied in technological advancements such as polymers and robotics, and despite being widely recognized as a prime objective for the development of a true AI (self-replicating is viewed as a precursor step to reflection and adaptation), no serious progress had been made until 2017 with the development of HyperNetworks. This paper continues a series of meaningful advances in the improvement of AI.

While its yet to have been implemented or public acknowledged as having been implemented, these self-replicating neural networks have the potential to greatly improve the quality of neural networks designed for computer security. The ability to self-replicate and reflect upon the self-replication could allow for much more intelligent and much more resilient defense algorithms, as it may be capable of repairing itself if an adversary was able to alter it or lock itself from being able to alter itself upon a certain condition whilst still being capable of executing.

However, while the results of self-replicating neural networks do seem promising, information regarding their actual effectiveness is scarce. This does raise some personal questions regarding how well a self-replicating neural network could handle a “day 0” alteration through a malicious adversarial examples attack. Either way, the advancement is very promising.

Scott Carlton

Chang & Lipson Paper: https://arxiv.org/abs/1803.05859

HyperNetworks Paper: https://arxiv.org/abs/1609.09106

Advertisements

Security Without Communication is Worthless

Security without communication is worthless. This is because if the public doesn’t understand security terms, they will be affected. This can be due to the fact that security policies use very technical terms to describe things. They were technical enough that people were either affected that they didn’t follow the terms correctly, or they didn’t care. For example, the industry doesn’t use the prefix “cyber” on its own as most people don’t interpret it as hacking. Another technical term is “black market”, which means the dark web in the general way. The new cyber security guide aims to bridge the communication gap, so anybody can understand it.

This is because in order for one to get his/her way of things, he/she must communicate it in a way that the other person thinks. For example, if one talks about his/her position to someone who isn’t in the same field they may or may not understand what the position does. Or, when you are helping someone with their homework, it is best to explain it in their way of thinking, so they can understand your message. This is because in security, if one says it the technical way and the general public doesn’t understand, people in security are wasting his/her time explaining. The solution to this problem is the “new cyber security style guide”. This means that it will use terms that the general public uses and understands so security protocols can be followed in a correct manner.

-Anil Adharapurapu

Source: https://www.csoonline.com/article/3258851/security/new-cyber-security-style-guide-helps-bridge-the-communication-gap.html

South Korea training students to hack for the military

an-instructor-points-to-a-line-of-code-in-the-programming-language-java-displayed-on-a-projection-screen-during-a-cyber-defense-programming-class-in-the-war-room-at-korea-university-in-seoul-south-korea-last-week

In an effort to boost it’s defenses, South Korea has enlisted 120 of it’s most talented programmers, offering full scholarships for 7 years of military service. Korea University’s national cyber-defense department will produce it’s first batch of graduates next year.

This program is just a part of a broader build-up though. South Korea is increasing the size of it’s cyber command to 1,000 people and increased information security spending by almost %50 between 2009 and 2015.

Unfortunately though, the South is racing to catch up. North Korea started training it’s hackers in the early 90’s and, according to the chief of S.K.’s defense security command, has 1,700 highly skilled and specialized hackers. He also called North Korea a ‘global cyber power.’

The South has been playing catch up for awhile actually, it wasn’t until a ‘suspected’ North Korean attack in 2009, that paralyzed a large number of government websites, that the South set up a cyber-defense command. In 2013 North Korean hackers attacked South broadcasters and banks. An estimated 32,000 computer servers were paralyzed, and the country lost an estimated 750 million dollars in economic damage.

Luckily South Korea seems to be training some excellent talent in their national cyber-defense department. This is shown by their students winning the ‘Hackers World Cup’ this year in August at Defcon in Las Vegas.

 

Robert Levasseur

http://www.arkansasonline.com/news/2015/nov/30/young-programmers-in-s-korea-groomed-to/?f=business

Necessity for Cyber Security

Recent attacks on Target, Home Depot, and Sony have brought up the need for precaution for attacks through technology. It first started with Target, stealing millions of credit card numbers through a malware program that was uploaded to the security system in Target. Then the same thing was done with Home Depot. Then cyber-terrorism as people call it, went to the next level with Sony. North Korea attempted to destroy the computer network, it wasn’t just to steal information. These are not the only instances in which hackers have tried to infiltrate U.S computer systems. By the likes of Russia, China, North Korea and Iran have tried to hack into U.S companies for espionage purposes or financial gain. As of right now there is no effective strategy to counter these infiltrations.

There are legislation’s taking place to address the threat that is currently endangering our country. As of right now, there is a federal civilian interface at the department of homeland security. They cover 16 different sectors and a private sector. However, this isn’t nearly enough, as the assistant director from the FBI cyber security division Joseph Demarest, told Congress “the sophisticated malware used in the Sony hack “would have slipped and gotten past 90 percent of the net defenses that are out there today in private industry and been a challenge to state governments.” Which means that our standing in Cyber security is very weak, and we are very vulnerable to cyber-terrorism.

http://homeland.house.gov/news/mccaul-op-ed-preventing-cyber-pearl-harbor-washington-times

-Jacob Mayer

iPhone ATM PIN code hack

There is now a way from people to steal your ATM PIN code. All it takes is a add on to your phone. What this add on does is that it makes your camera on your phone inferred. This means that you can now see the heat signature’s of things through your camera. How this is a problem is that after someone types their PIN in a ATM if you walk up and take a picture of the keypad with this inferred camera you can see what keys they pressed before they left. You can also tell for the most part in what order the keys where pressed by how bright the color that is left. There is only 2 ways that you can protect yourself from this. One thing that would make this difficult would be if the PIN had the same number in it 2 or more times. The other would be rub you hand on the keypad after you are done putting in you PIN so that the heat of your hand would get on all of the keys making it impossible to know which ones you really used. There is a 80% accuracy if the image was taken right after the PIN was typed in. After 1 minute there is about a 50% of getting the PIN right. The case that has the infrared camera on it is only about 200$ and you can get it at any Apple store. Also this does not work on metal keypads because it reflects and dissipates the heat to fast. Rubber and plastic keypads work the best for retaining the heat signature.