Tag Archive: China

Robot Hacking Games

Dakota Cary
| September 2021

Software vulnerability discovery, patching, and exploitation—collectively known as the vulnerability lifecycle—is time consuming and labor intensive. Automating the process could significantly improve software security and offensive hacking. The Defense Advanced Research Projects Agency’s Cyber Grand Challenge supported teams of researchers from 2014 to 2016 that worked to create these tools. China took notice. In 2017, China hosted its first Robot Hacking Game, seeking to automate the software vulnerability lifecycle. Since then, China has hosted seven such competitions and the People’s Liberation Army has increased its role in hosting the games.

Research Analyst Emily Weinstein spoke with the National Journal about university research and the growing tensions with U.S.-China research collaborations.

AI Education in China and the United States

Dahlia Peterson Kayla Goode Diana Gehlhaus
| September 2021

A globally competitive AI workforce hinges on the education, development, and sustainment of the best and brightest AI talent. This issue brief compares efforts to integrate AI education in China and the United States, and what advantages and disadvantages this entails. The authors consider key differences in system design and oversight, as well as strategic planning. They then explore implications for the U.S. national security community.

Education in China and the United States

Dahlia Peterson Kayla Goode Diana Gehlhaus
| September 2021

A globally competitive AI workforce hinges on the education, development, and sustainment of the best and brightest AI talent. This issue brief provides an overview of the education systems in China and the United States, lending context to better understand the accompanying main report, “AI Education in China and the United States: A Comparative Assessment.”

Should the US fear rising number of STEM PhDs in China?

University World News
| September 10, 2021

CSET Research Analyst Jack Corrigan spoke with University World News about China's dedication to tech talent through its STEM PhD growth.

Unwanted Foreign Transfers of U.S. Technology: Proposed Prevention Strategies

William Hannas Huey-Meei Chang
| September 10, 2021

The transfer of national security relevant technology—to peer competitors especially—is a well-documented problem and must be balanced with the benefits of free exchange. The following propositions covering six facets of the transfer issue reflect CSET’s current recommendations on the matter.

CSET's Anna Puglisi unpacks how US exports are affecting China's access to scientific research equipment.

A new CSET report "Headline or Trend Line? Evaluating Chinese-Russian Collaboration in AI" uses data-backed analysis to address the Sino-Russian partnership and its effect on U.S. strategic interests.

CSET Research Analyst Dakota Cary discusses China's new Data Security Law and the effects of its cyber vulnerability disclosure provisions to hack other countries.

In her testimony before the Senate Select Committee on Intelligence, CSET Senior Fellow Anna Puglisi discusses China's collection of genetic data.