On managing vulnerabilities in AI/ML systems

01/22/2021
by   Jonathan M. Spring, et al.
0

This paper explores how the current paradigm of vulnerability management might adapt to include machine learning systems through a thought experiment: what if flaws in machine learning (ML) were assigned Common Vulnerabilities and Exposures (CVE) identifiers (CVE-IDs)? We consider both ML algorithms and model objects. The hypothetical scenario is structured around exploring the changes to the six areas of vulnerability management: discovery, report intake, analysis, coordination, disclosure, and response. While algorithm flaws are well-known in the academic research community, there is no apparent clear line of communication between this research community and the operational communities that deploy and manage systems that use ML. The thought experiments identify some ways in which CVE-IDs may establish some useful lines of communication between these two communities. In particular, it would start to introduce the research community to operational security concepts, which appears to be a gap left by existing efforts.

READ FULL TEXT
research
03/29/2019

SysML: The New Frontier of Machine Learning Systems

Machine learning (ML) techniques are enjoying rapidly increasing adoptio...
research
05/05/2022

REAL ML: Recognizing, Exploring, and Articulating Limitations of Machine Learning Research

Transparency around limitations can improve the scientific rigor of rese...
research
11/03/2018

A Marauder's Map of Security and Privacy in Machine Learning

There is growing recognition that machine learning (ML) exposes new secu...
research
12/13/2021

On the Value of ML Models

We argue that, when establishing and benchmarking Machine Learning (ML) ...
research
09/06/2022

Use and Misuse of Machine Learning in Anthropology

Machine learning (ML), being now widely accessible to the research commu...
research
12/18/2022

A Review of Speech-centric Trustworthy Machine Learning: Privacy, Safety, and Fairness

Speech-centric machine learning systems have revolutionized many leading...
research
11/19/2019

Forbidden knowledge in machine learning – Reflections on the limits of research and publication

Certain research strands can yield "forbidden knowledge". This term refe...

Please sign up or login with your details

Forgot password? Click here to reset