Regano Phd Thesis.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Regano Phd Thesis.Pdf POLITECNICO DI TORINO Repository ISTITUZIONALE An Expert System for Automatic Software Protection Original An Expert System for Automatic Software Protection / Regano, Leonardo. - (2019 Jul 17), pp. 1-131. Availability: This version is available at: 11583/2751495 since: 2019-09-13T08:17:09Z Publisher: Politecnico di Torino Published DOI: Terms of use: openAccess This article is made available under terms and conditions as specified in the corresponding bibliographic description in the repository Publisher copyright (Article begins on next page) 02 October 2021 Doctoral Dissertation Doctoral Program in Computer and Control Engineering (31st cycle) An Expert System for Automatic Software Protection Leonardo Regano ****** Supervisors Prof. Antonio Lioy, Supervisor Cataldo Basile, Ph.D., Co-supervisor Doctoral Examination Committee: Bart Coppens, Ph.D., Referee, Ghent University Prof. Claudia Raibulet, Referee, Università degli Studi di Milano-Bicocca Prof. Bjorn De Sutter, Ghent University Prof. Stefano Paraboschi, Università degli Studi di Bergamo Prof. Riccardo Sisto, Politecnico di Torino Politecnico di Torino 17 July 2019 This thesis is licensed under a Creative Commons License, Attribution - Noncommercial- NoDerivative Works 4.0 International: see www.creativecommons.org. The text may be repro- duced for non-commercial purposes, provided that credit is given to the original author. I hereby declare that, the contents and organisation of this dissertation constitute my own original work and does not compromise in any way the rights of third parties, including those relating to the security of personal data. ................................................ Leonardo Regano Turin, 17 July 2019 Abstract In the Information Age, software is omnipresent in almost everyone’s life. A plethora of services is offered in a digital manner, for example with e-government portals, e-banking mobile apps, and e-commerce websites. Indeed, users trust the software enabling such services with their personal information, like credit card num- bers or e-banking credentials. Thus, software must be protected with care, in order to mitigate possible threats against such valuable data. Furthermore, software com- panies have to protect the assets in their applications, such as intellectual property of algorithms, methods preventing unauthorized application distribution, and users’ personal data. Failing to do so may deeply damage software companies’ finances, due to lost application sales, and reputation, if users’ personal data is leaked. However, protecting applications is a cumbersome task, reserved to few expert prac- titioners of this field, due to the rising complexity of applications, and the availability of numerous protection techniques. Each of the latter has strengths and weakness, and their effectiveness in safeguarding the application assets depend on numerous factors, such as the structure of protected code, the tools employed to apply such protec- tions along with their configuration parameters, and the expected skills of a possible attacker that may be interested in breaching the application assets. In this thesis, an expert system for automating the protection of applications is presented. To the best of the author’s knowledge, it is the first application of the expert system paradigm to this challenging problem. Mimicking the decision process of a software security expert, the system, given the source code of an application that must be protected, is able to produce a binary of the application, hardened with the protection technique most suitable to defer, for the longest time possible, an attacker aiming to breach the application assets. Apart from the program source code, the system requires from the user only a list of the assets that must be protected, with each of them associated with one or more high-level security requirements (e.g., confidentiality, integrity), which must be safeguarded against possible attacks. The system has been developed during the EC-funded ASPIRE project, whose objective was to develop a set of protection techniques for Android applications, along with automated tools to deploy them on threatened code. The system is not only able to decide the generic protection techniques that must be applied to the program code, but also the specific parameters to drive such tools, thus providing a comprehensive protection solution specifically tailored for the targeted application. The system is based on the formalization of the mental decision processes and background knowledge of software security experts involved in the aforementioned project. This thesis advances the state of the art in the field of software security with the following contributions: (1) a meta-model for software security, able to formalize all the related concepts, such as characteristics of the application and of the components of its code, attacks that can be mounted against the application, and protection techniques that can be used to mitigate them; (2) a risk assessment methodology for software, with a formalization of attacks against applications assets, consisting in the identification of simple attack tasks, which can be then chained incomplete attacks that can be carried out to successfully breach the application assets; (3) a risk mitigation strategy, based on a game-theoretic approach, able to infer the protections best able to defer possible attacks against the application; (4) a set of asset hiding strategies, devised to increase the effort needed by an attacker to locate assets in the application binary; (5) a complete and automated workflow for software protection, implementing the aforementioned risk management processes in a fully-fledged expert system. ii Contents List of Tables vi List of Figures vii 1 Background 7 1.1 Software protection....................................7 1.1.1 Automated protection tools...........................7 1.1.2 Anti-reverse engineering techniques.......................9 1.1.3 Anti-tampering techniques............................ 21 1.1.4 Anti-debugging.................................. 26 1.2 Knowledge-based and expert systems.......................... 27 1.2.1 Knowledge bases and ontologies......................... 27 1.2.2 Inference engines................................. 29 1.2.3 Expert systems.................................. 30 2 Decision support system for software protection 33 2.1 Problem statement.................................... 33 2.1.1 Risk framing................................... 34 2.1.2 Risk assessment.................................. 35 2.1.3 Risk mitigation.................................. 36 2.1.4 Risk monitoring................................. 38 2.2 Automated workflow for software protection...................... 39 2.2.1 Software protection meta-model........................ 39 2.2.2 Risk assessment phase.............................. 41 2.2.3 Asset protection phase.............................. 42 2.2.4 Asset hiding phase................................ 43 2.2.5 Complete workflow................................ 44 2.3 Workflow execution example............................... 45 2.4 Validation......................................... 47 2.4.1 Qualitative evaluation.............................. 48 2.4.2 Experimental assessment............................ 50 3 Software security meta-model 52 3.1 Core meta-model..................................... 53 3.2 Application meta-model................................. 55 3.3 Protection meta-model.................................. 56 3.4 Attack meta-model.................................... 57 3.5 Meta-model validation.................................. 59 iv 4 Risk assessment 61 4.1 Application structure modeling............................. 63 4.2 Attacker goals modeling................................. 63 4.3 Attack steps and paths modeling............................ 64 4.4 Risk probability...................................... 66 4.5 Validation......................................... 67 5 Asset protection 69 5.1 Protection decision workflow.............................. 72 5.2 Deployed protection instances enumeration...................... 73 5.3 Inference of valid solutions................................ 75 5.4 Software metrics..................................... 77 5.4.1 Software protection complexity metrics.................... 78 5.4.2 Complexity metrics prediction......................... 80 5.4.3 Protection overhead estimation......................... 82 5.5 Asset protection solution inference........................... 84 5.5.1 Protection index................................. 86 5.5.2 Solution solver mini-max algorithm....................... 89 5.6 Validation......................................... 91 6 Asset hiding 93 6.1 Protection fingerprints.................................. 94 6.2 Asset hiding strategies.................................. 95 6.3 Mixed Integer-Linear Programming model....................... 97 6.3.1 Application structure and protections..................... 97 6.3.2 Domain Parameters............................... 99 6.3.3 Linear Problem.................................. 100 6.4 Translation algorithm.................................. 104 6.5 Validation......................................... 105 7 Conclusions and future work 106 A ESP implementation 108 A.1 Main ESP components.................................. 108 A.2 ESP workflow....................................... 109 A.3 Solution deployment................................... 110 Bibliography 115 v List of Tables 2.1 Functions
Recommended publications
  • Pdf • Cynthia Breazeal
    © copyright by Christoph Bartneck, Tony Belpaeime, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, and Selma Sabanovic 2019. https://www.human-robot-interaction.org Human{Robot Interaction An Introduction Christoph Bartneck, Tony Belpaeme, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, Selma Sabanovi´cˇ This material has been published by Cambridge University Press as Human Robot Interaction by Christoph Bartneck, Tony Belpaeime, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, and Selma Sabanovic. ISBN: 9781108735407 (http://www.cambridge.org/9781108735407). This pre-publication version is free to view and download for personal use only. Not for re-distribution, re-sale or use in derivative works. © copyright by Christoph Bartneck, Tony Belpaeime, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, and Selma Sabanovic 2019. https://www.human-robot-interaction.org This material has been published by Cambridge University Press as Human Robot Interaction by Christoph Bartneck, Tony Belpaeime, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, and Selma Sabanovic. ISBN: 9781108735407 (http://www.cambridge.org/9781108735407). This pre-publication version is free to view and download for personal use only. Not for re-distribution, re-sale or use in derivative works. © copyright by Christoph Bartneck, Tony Belpaeime, Friederike Eyssel, Takayuki Kanda, Merel Keijsers, and Selma Sabanovic 2019. https://www.human-robot-interaction.org Contents List of illustrations viii List of tables xi 1 Introduction 1 1.1 About this book 1 1.2 Christoph
    [Show full text]
  • HC17.Computer History Museum Presentation
    John Mashey Trustee www.computerhistory.org The Museum • Mission – To Preserve the Artifacts & Stories of the Information Age • Vision - Exploring the Computing Revolution and Its Impact on the Human Experience • Moving Forward: • Collecting over 25 years; started at Digital Equipment • Boston Artifacts moved to Silicon Valley in 1996 • Independent 501(c)(3) in July 1999 • New Home in Mountain View, CA in 2002 1401 N. Shoreline Dr, next to 101, with purple “on button” • June 2003: Phase 1 opened • Sept 2005: major new exhibit - Computer Chess www.computerhistory.org Our (Successive) Homes The Collection Behind the scenes: Largest collection of computing artifacts. Over 25 years of collecting! www.computerhistory.org The Collection Media Software Documentation Ephemera Hardware A World-Class Collection Lobby Exhibits: People & Innovation “Innovation 101”— Silicon Valley’s Contributions to Computer History www.computerhistory.org Exhibition Galleries: Now, Future Input/Output Now Processors Networking Visible Storage Software Storage Computing History Timeline Rotating Topical Exhibits www.computerhistory.org Virtual Visible Storage Activities • Speaker Series – History, history-in-the-making, special topics, exec briefs • Preservation Activities – Oral Histories - Active Collection of the Past – Videos & Photos - Proactive Collection for the Future • Restorations – Understand and restore environments of the past – IBM 1620; PDP-1; IBM 1401; – Many PC’s from study collection • Initial CyberMuseum – Virtual Visible Storage • Events – Seminars,
    [Show full text]
  • Mastering Board Games
    INSIGHTS | PERSPECTIVES COMPUTER SCIENCE community, with much analysis and com- mentary on the amazing style of play that Al- phaZero exhibited (see the figure). Note that Mastering board games neither the chess or shogi programs could take advantage of the TPU hardware that A single algorithm can learn to play three hard board games AlphaZero has been designed to use, making head-to-head comparisons more difficult. Chess, shogi, and Go are highly complex By Murray Campbell value in chess or shogi programs. The stron- but have a number of characteristics that gest programs in both games have relied on make them easier for AI systems. The game rom the earliest days of the computer variations of the alpha-beta algorithm, used state is fully observable; all the information era, games have been considered impor- in game-playing programs since the 1950s. needed to make a move decision is visible to tant vehicles for research in artificial in- Silver et al. demonstrated the power of the players. Games with partial observability, telligence (AI) (1). Game environments combining deep reinforcement learning such as poker, can be much more challenging, simplify many aspects of real-world with an MCTS algorithm to learn a variety although there have been notable successes problems yet retain sufficient complex- of games from scratch. The training method- in games like heads-up no-limit poker (11, 12). Fity to challenge humans and machines alike. ology used in AlphaZero is a slightly modi- Board games are also easy in other important Most programs for playing classic board fied version of that used in the predecessor dimensions.
    [Show full text]
  • Sci Tech Laywer As Published
    TRYING FOR THE TRIFECTA TELEHEALTH MEETS AI MEETS CYBERSECURITY By Thomas P. Keenan he social disruption of the COVID- and chest X-rays, after about five or six world—things like Wikipedia and so on— 19 pandemic has accelerated he’s getting tired, and after ten he’s “ready and used that data to learn how to answer Ttwo powerful trends in health to go the bar.” By contrast, the machine questions about the real world.”6 care—telemedicine (TM) and artificial treats each case with unbiased, fresh eyes, Today, we think nothing of saying, “Hey intelligence/machine learning (AI/ML). giving consistent results. “It [PUFF] also Google, turn off all the lights” or “Alexa, tell Advocates of digital transformation let out knows things I haven’t a clue about,” he me a joke about rabbits,” confident that our of collective “Yes!” as long-awaited changes added. One of the many experts who AI-enabled speakers will understand and happened almost overnight in early 2020. contributed knowledge to PUFF was a obey us. Because their knowledge base and Then, the ants of cybersecurity came along tropical medicine specialist. This contri- ML functionality reside in a remote com- to spoil the picnic! bution enabled the system to spot a rare puter, our virtual assistants will keep getting First, the good news. lung problem caused by breathing bat smarter and better informed. Perhaps • Suddenly, it became acceptable to guano in Central American caves. Alexa will have a joke about “one-legged “see” your doctor electronically; PUFF was an example of a rule-based rabbits” the next time I ask “her.”7 you could even send a picture of expert system.
    [Show full text]
  • The Regental Laureates Distinguished Presidential
    REPORT TO CONTRIBUTORS Explore the highlights of this year’s report and learn more about how your generosity is making an impact on Washington and the world. CONTRIBUTOR LISTS (click to view) • The Regental Laureates • Henry Suzzallo Society • The Distinguished Presidential Laureates • The President’s Club • The Presidential Laureates • The President’s Club Young Leaders • The Laureates • The Benefactors THE REGENTAL LAUREATES INDIVIDUALS & ORGANIZATIONS / Lifetime giving totaling $100 million and above With their unparalleled philanthropic vision, our Regental Laureates propel the University of Washington forward — raising its profile, broadening its reach and advancing its mission around the world. Acknowledgement of the Regental Laureates can also be found on our donor wall in Suzzallo Library. Paul G. Allen & The Paul G. Allen Family Foundation Bill & Melinda Gates Bill & Melinda Gates Foundation Microsoft DISTINGUISHED PRESIDENTIAL LAUREATES INDIVIDUALS & ORGANIZATIONS / Lifetime giving totaling $50 million to $99,999,999 Through groundbreaking contributions, our Distinguished Presidential Laureates profoundly alter the landscape of the University of Washington and the people it serves. Distinguished Presidential Laureates are listed in alphabetical order. Donors who have asked to be anonymous are not included in the listing. Acknowledgement of the Distinguished Presidential Laureates can also be found on our donor wall in Suzzallo Library. American Heart Association The Ballmer Group Boeing The Foster Foundation Jack MacDonald* Robert Wood Johnson Foundation Washington Research Foundation * = Deceased Bold Type Indicates donor reached giving level in fiscal year 2016–2017 1 THE PRESIDENTIAL LAUREATES INDIVIDUALS & ORGANIZATIONS / Lifetime giving totaling $10 million to $49,999,999 By matching dreams with support, Presidential Laureates further enrich the University of Washington’s top-ranked programs and elevate emerging disciplines to new heights.
    [Show full text]
  • Modern Masters of an Ancient Game
    AI Magazine Volume 18 Number 4 (1997) (© AAAI) Modern Masters of an Ancient Game Carol McKenna Hamilton and Sara Hedberg he $100,000 Fredkin Prize for on Gary Kasparov in the final game of tute of Technology Computer Science Computer Chess, created in a tied, six-game match last May 11. Professor Edward Fredkin to encourage T1980 to honor the first program Kasparov had beaten the machine in continued research progress in com- to beat a reigning world chess champi- an earlier match held in February 1996. puter chess. The prize was three-tiered. on, was awarded to the inventors of The Fredkin Prize was awarded un- The first award of $5,000 was given to the Deep Blue chess machine Tuesday, der the auspices of AAAI; funds had two scientists from Bell Laboratories July 29, at the annual meeting of the been held in trust at Carnegie Mellon who in 1981 developed the first chess American Association for Artificial In- University. machine to achieve master status. telligence (AAAI) in Providence, The Fredkin Prize was originally es- Seven years later, the intermediate Rhode Island. tablished at Carnegie Mellon Universi- prize of $10,000 for the first chess ma- Deep Blue beat world chess champi- ty 17 years ago by Massachusetts Insti- chine to reach international master status was awarded in 1988 to five Carnegie Mellon graduate students who built Deep Thought, the precur- sor to Deep Blue, at the university. Soon thereafter, the team moved to IBM, where they have been ever since, working under wraps on Deep Blue. The $100,000 third tier of the prize was awarded at AAAI–97 to this IBM team, who built the first computer chess machine that beat a world chess champion.
    [Show full text]
  • CS415 Human Computer Interaction
    CS415 Human Computer Interaction Lecture 11 – Advanced HCI Part-2 November 4, 2015 Sam Siewert Assignments Assignment #5 – Explore HCI’s, Propose Group Project (Groups of 3) Assignment #6 – Proof-of-Concept or Evaluation with Final Report Final Oral Exam – Presentation of Project Myself, Jim Weber, Dr. Davis, Dr. Bruder Emily and Adam Molson – Controls Lab Monitors – 9-5 on Sat, 12 noon – 9pm Sun Sam Siewert 2 Reality – Hybrid of 3 Models and … HCI – GOMS + Linguistic + Physical + Intelligence Newell and Simon [CMU, AI] Power of Recursion, 1958 NSS Chess – E.g. Minimax Search Herbert Alexander Simon, (June 15, 1916 – February 9, 2001) was an American scientist and artificial intelligence pioneer, economist and psychologist. Professor, most notably, at the Carnegie Mellon University, Pittsburgh, Pennsylvania, which became an important center of AI and computer chess, ...Herbert Simon received many top-level honors, most notably the Turing Award (with Allen Newell) (1975) for his AI- contributions [1] and the Nobel Memorial Prize in Economics for his pioneering research into the decision-making process within economic organizations (1978) [2 Allen Newell, (March 19, 1927 - July 19, 1992) was a American researcher in computer science and pioneer in the field of artificial intelligence and chess software [1] at the Carnegie Mellon University, Pittsburgh, Pennsylvania. In 1958, Allen Newell, Cliff Shaw, and Herbert Simon developed the chess program NSS [2]. It was written in a high-level language. Allen Newell and Herbert Simon were co-inventors of the alpha- beta algorithm, which was independently approximated or invented by John McCarthy, Arthur Samuel and Alexander Brudno [3].
    [Show full text]
  • AI for Complex Situations: Beyond Uniform Problem Solving
    AI for Complex Situations: Beyond Uniform Problem Solving Michael Witbrock DRSM, Learning to Reason Cognitive Computing Research [email protected] © 2017 International Business Machines Corporation Cognitive Systems Systems that Reason, Learn and Understand 2 Beyond Data, Beyond Programs Can be done. Worth doing. Diverse Machine many, many problems Reasoning Targets Can be programmed. Worth programming. Uniform © 2016 International Business Machines Corporation 3 Goal: Professional Level Competence © 2016 International Business Machines Corporation 4 Professional Competence in Organizations • Warn and explain at time of compliance risk • Contextual ID of Relevant Co-workers during meeting planning • Personalized Medicine based on recent research • Corporate forms that only ask for new, knowable information • Compliant re-engineering based on supply chain • Validity maintenance for documentation and processes • Code analysis and synthesis based on intent © 2017 International Business Machines Corporation 5 Kinds of Thought Neural Networks Deliberate Reasoning • Humans and Animals • Humans only (almost) • Reactive • Supervisory • Trained from Data • Trainable from Data or Language • Hard to Explain • Explainable and Correctable • Particular Skills • Portable Skills • Ubiquitous in Enterprise • Data and Processing Driven • Ripe for Rapid Progress Advances 6 © 2016 International Business Machines Corporation Early, symbolic, small AI systems were impressive AARON - The First Artificial Carnegie Learning’s SHRDLU: A program for Intelligence Creative Artist Algebra Tutor (1999– understanding natural (Harold Cohen, UCSD) present): This tutor language, (Terry Winograd, 1973–2016) encodes knowledge about MIT) in 1968-70 that carried The Aaron system algebra as production on a simple dialog with a composes and physically rules, infers models of user, about a small world of paints novel art work.
    [Show full text]
  • Download the Sample Pages
    Related Books of Interest Patterns of Information The Business of IT Management How to Improve Service By Mandy Chessell and Harald C. Smith and Lower Costs ISBN: 978-0-13-315550-1 By Robert Ryan and Tim Raducha-Grace Use Best Practice Patterns to Understand and ISBN: 978-0-13-700061-6 Architect Manageable, Efficient Information Drive More Business Value from IT…and Bridge the Supply Chains That Help You Leverage All Gap Between IT and Business Leadership Your Data and Knowledge IT organizations have achieved outstanding Building on the analogy of a supply chain, technological maturity, but many have been slower Mandy Chessell and Harald Smith explain to adopt world-class business practices. This book how information can be transformed, en- provides IT and business executives with methods riched, reconciled, redistributed, and utilized to achieve greater business discipline throughout in even the most complex environments. IT, collaborate more effectively, sharpen focus Through a realistic, end-to-end case study, on the customer, and drive greater value from IT they help you blend overlapping information investment. Drawing on their experience consult- management, SOA, and BPM technologies ing with leading IT organizations, Robert Ryan and that are often viewed as competitive. Tim Raducha-Grace help IT leaders make sense Using this book’s patterns, you can integrate of alternative ways to improve IT service and lower all levels of your architecture—from holistic, cost, including ITIL, IT financial management, enterprise, system-level views down to low- balanced scorecards, and business cases. You’ll level design elements. You can fully address learn how to choose the best approaches to key non-functional requirements such as the improve IT business practices for your environment amount, quality, and pace of incoming data.
    [Show full text]
  • BULLETIN • the B.C
    LE(J Z.~-~,.I. • Z I,'-~-' :'ZJI; ' ;'~' C 2 ~~ P . 77/73 P;'21. ~.; Z.'.., .... : .... .'. ~.~, VIC'~'C~,~:., .:., //61 f RUPERT STEEL &,SALVAdELTD.] fTERRACE-KITIMAT F WEATHER i¢°eP" webuY setss|| --" "" zo.h , Cloudy with a few i sunny periods. / . OPENTiL 5 p.m, " I / ' '~" ~" m ~g • aid ,q ~Lo,,,|O, Seal ~0v. ~h0n, 624.~639J ~t~ VOLU~E 72 N0. 138 ~ TUESDAY, ,.,,,, .High 24 Low 10 PNG and IBEW Go Back Te. Bargain, by Donna Vallieres Pacific Northern Gas and the striking members of the International Brotherhood of Electrical Workers (IBEW) have agreed to return to the bargaining table -this week following increased picket action by the unmn. Last week IBEW members travelled to Taylor, near Fort St. John, and picketed Pacific Petroleum and Westcoast Transmission plants there. Unions involved with .those plants, the Oil, Chemical and Atomic Workers and the Operating Engineers, all respected the picket lines and a Pacific Petroleum oil •1 refinery and Westcoast gas plant, sulphur plant and mainline compressor station were shut down. BCR workers would not cross the picket line to remove cars and bulk loading trucks refused to cross the line as well. An informal hearing was called at the Labor ! Relations Board the next day, and as a result of these dis cuss!ons the company and the union agreed to •return zo negotiations~ The pickets at the Taylorp]ant complex were with- drawn on the understanding that Pacific vice- A dune buggy attacks the Hill gduring the Hill president and general manager Bob O'Sharmessy climbing meet held Sunday. For details see page 6.
    [Show full text]
  • Making and Keeping Probabilistic Commitments for Trustworthy Multiagent Coordination
    Making and Keeping Probabilistic Commitments for Trustworthy Multiagent Coordination by Qi Zhang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in The University of Michigan 2020 Doctoral Committee: Professor Satinder Singh Baveja, Co-Chair Professor Edmund H. Durfee, Co-Chair Professor Richard L. Lewis Assistant Professor Arunesh Sinha Qi Zhang [email protected] ORCID iD: 0000-0002-8562-5987 c Qi Zhang 2020 ACKNOWLEDGEMENTS First and foremost I would like to give my sincerest and warmest thanks to my co-advisors, Edmund Durfee and Satinder Singh, for their wisdom and patience in training me to become a researcher. They have also been extraordinarily supportive of my academic career after PhD. I was extremely lucky to be your student. I would like to give thanks to Rick Lewis, who served on my doctoral committee, for advising me on an early project that did not end up in this thesis but I am particularly proud of. I would like to thank Arunesh Sinha, who also served on my committee, for giving thoughtful feedback in my dissertation defense and writing. I would like to express my gratitude to Nan Jiang, Xiaoxiao Guo, Junhyuk Oh, Shun Zhang, Aditya Modi, Janarthanan Rajendran, Vivek Veeriah, John Holler, Max Smith, Zeyu Zheng, Ethan Brooks, Chris Grimm, Wilka Carvalho, Risto Vuorio, and other members in the RL lab, with whom I spent a wonderful time as a PhD student. In particular, I am thankful to Xiaoxiao who introduced me to IBM Research, where Murray Campbell hosted me as an intern.
    [Show full text]
  • 2018 ACM SIGAI Student Essay Contest on Artificial Intelligence Technologies
    2018 ACM SIGAI Student Essay Contest on Artificial Intelligence Technologies Win one of several $500 monetary prizes or a Skype conversation with a leading AI researcher including Joanna Bryson, Murray Campbell, Eric Horvitz, Peter Norvig, Iyad Rahwan, Francesca Rossi, or Toby Walsh. See this call online at www.tinyurl.com/SIGAIEssay2018 ​ Students interested in these topics should consider submitting to the 2019 Artificial Intelligence, ​ Ethics, and Society Conference (AIES). Deadline is in early November. ​ 2018 Topic The ACM Special Interest Group on Artificial Intelligence (ACM SIGAI) supports the development and responsible application of Artificial Intelligence (AI) technologies. From intelligent assistants to self-driving cars, an increasing number of AI technologies now (or soon will) affect our lives. Examples include Google Duplex (Link) talking to humans, Drive.ai (Link) ​ ​ ​ ​ offering rides in US cities, chatbots advertising movies by impersonating people (Link), and AI ​ ​ systems making decisions about parole (Link) and foster care (Link). We interact with AI ​ ​ ​ ​ systems, whether we know it or not, every day. Such interactions raise important questions. ACM SIGAI is in a unique position to shape the conversation around these and related issues and is thus interested in obtaining input from students worldwide to help shape the debate. We therefore invite all students to enter an essay in the 2018 ACM SIGAI Student Essay Contest, to be published in the ACM SIGAI newsletter “AI Matters,” addressing one or both of the following topic areas (or any other question in this space that you feel is important) while providing supporting evidence: ● What requirements, if any, should be imposed on AI systems and technology when interacting with humans who may or may not know that they are interacting with a machine? For example, should they be required to disclose their identities? If so, how? See, for example, “Turing’s Red Flag” in CACM (Link).
    [Show full text]