CyberAI

In his testimony before the House, Science, Space and Technology Committee subcommittees, Senior Fellow Andrew Lohn shares the vulnerabilities of open-source software.

In his testimony before the House Science Subcommittee on Investigations and Oversight and the Subcommittee on Research and Technology, Senior Fellow Andrew Lohn discussed various vulnerabilities within the AI supply chain and the methods hackers use to subvert AI systems.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Science, Space and Technology Subcommittee on Investigations and Oversight and Subcommittee on Research and Technology at a hearing on "Securing the Digital Commons: Open-Source Software Cybersecurity." Lohn discussed how the United States can maximize sharing within the artificial intelligence community while reducing risks to the AI supply chain.

According to Senior Fellow Andrew Lohn in his testimony before the Senate Armed Services Subcommittee on Cybersecurity, the U.S. is the leading global innovator in AI.

In his testimony before the Senate Armed Services Subcommittee on Cybersecurity, Senior Fellow Andrew Lohn advises that the DOD has the opportunity to "step ahead of industry in the adversarial context" in terms of AI innovation within cyberspace operations.

CSET Senior Fellow Andrew Lohn testified before the U.S. Senate Armed Services Subcommittee on Cybersecurity hearing on artificial intelligence applications to operations in cyberspace. Lohn discussed AI's capabilities and vulnerabilities in cyber defenses and offenses.

The new grant will contribute to the CyberAI Project's research at the intersection of artificial intelligence and cybersecurity.

Securing AI

Andrew Lohn and Wyatt Hoffman
| March 2022

Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps defenders protect their systems and helps attackers exploit them. This brief examines some of the key differences between vulnerabilities in traditional and machine learning systems and how those differences can affect the vulnerability disclosure and remediation processes.

Hacking Poses Risks for Artificial Intelligence

SIGNAL Online
| March 1, 2022

CSET Senior Fellow Andrew Lohn discusses the potential for AI and machine learning software to be susceptible to data poisoning.

CSET Research Analyst Dakota Cary testified before the U.S.-China Economic and Security Review Commission hearing on "China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States." Cary discussed the cooperative relationship between Chinese universities and China’s military and intelligence services to develop talent with the capabilities to perform state-sponsored cyberespionage operations.