Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications

Adversarial patches are images designed to fool otherwise well-performing neural network-based computer vision models. Although these attacks were initially conceived of and studied digitally, in that the raw pixel values of the image were perturbed, recent work has demonstrated that these attacks can successfully transfer to the physical world. This can be accomplished by printing out the patch and adding it into scenes of newly captured images or video footage.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation at a hearing on "Securing the Future: Harnessing the Potential of Emerging Technologies While Mitigating Security Risks." Lohn discussed the application of AI systems in cybersecurity and AI’s vulnerabilities.

Reports

Sustaining and Growing the U.S. Semiconductor Advantage: A Primer

Owen Daniels and Will Hunt
| June 2022

As an integral player in advanced semiconductor supply chains, the United States enjoys advantages over China in producing and accessing chips for artificial intelligence and other leading-edge computing technologies. However, a lack of domestic production capacity threatens U.S. semiconductor access. The United States can strengthen its advantages by working with allies and partners to prevent China from producing leading-edge chips and by reshoring its own domestic chipmaking capacity.

Reports

Re-Shoring Advanced Semiconductor Packaging

John VerWey
| June 2022

The semiconductor industry and the U.S. government are engaged in ambitious plans to expand domestic semiconductor manufacturing capacity. Previous CSET research has found that the CHIPS for America Act incentives, if carefully targeted and augmented by adequate regulatory and workforce support, could reverse the observable decline in U.S. semiconductor manufacturing capacity since 1990. This paper argues that targeted investment incentives to increase U.S.-based advanced packaging capacity are also important for innovation, supply chain security, and ongoing semiconductor industry leadership.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Science, Space and Technology Subcommittee on Investigations and Oversight and Subcommittee on Research and Technology at a hearing on "Securing the Digital Commons: Open-Source Software Cybersecurity." Lohn discussed how the United States can maximize sharing within the artificial intelligence community while reducing risks to the AI supply chain.

Reports

Preserving the Chokepoints

Andre Barbe and Will Hunt
| May 2022

Offshoring the production of semiconductor manufacturing equipment would remove an important source of leverage over China and make the United States more dependent on other countries for some of the most important inputs to semiconductor manufacturing. This brief explores the factors driving U.S. SME firms to offshore production and what can be done to slow or reverse offshoring.

CSET Senior Fellow Andrew Lohn testified before the U.S. Senate Armed Services Subcommittee on Cybersecurity hearing on artificial intelligence applications to operations in cyberspace. Lohn discussed AI's capabilities and vulnerabilities in cyber defenses and offenses.

CSET submitted this comment to the Department of Commerce to inform incentives, infrastructure, and research and development needed to support a strong domestic semiconductor industry.

Reports

Securing AI

Andrew Lohn and Wyatt Hoffman
| March 2022

Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps defenders protect their systems and helps attackers exploit them. This brief examines some of the key differences between vulnerabilities in traditional and machine learning systems and how those differences can affect the vulnerability disclosure and remediation processes.

CSET Research Analyst Dakota Cary testified before the U.S.-China Economic and Security Review Commission hearing on "China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States." Cary discussed the cooperative relationship between Chinese universities and China’s military and intelligence services to develop talent with the capabilities to perform state-sponsored cyberespionage operations.