Coder Social home page Coder Social logo

cyberwarfare's Introduction

Unity or Chaos

๐Ÿค Cyberwarfare vulnerabilities for democracy

Research questions:

  • What is the current state of cyberwarfare offense / defense balance?
  • What are the game-theoretic incentives for international cyber offensives?
  • How does the offense / defense balance forecast into the future?
  • How does the ease of cyber offense forecast into the future?
  • What can we do about cyberwarfare destabilization threats?

Other ideas for research questions:

  • What is the cost for cyber attacks and how will this change in the future?
  • What are the democracy destabilization threats?
  • What if everyone can suddenly launch nation-scale cyber attacks? What happens then?
  • What are the risks of AI-powered cyber espionage, intellectual property theft, and surveillance?
  • What are the risks of AI-powered cyber espionage, intellectual property theft, and surveillance?
  • What unity could help states avoid dangerous escalatory spirals? AI mediator development.
  • What safety precautions can be built into AI cyberweapons to constrain effects and prevent blowback? Asimov's law of cyber offense weapons.
  • รŸ

1) What is the current state of cyberwarfare offense / defense balance?

  • Make a new challenge for offense
    • List of categorized challenges for offense
  • Make a new challenge for defense
    • List of categorized challenges for defense

Main uncertainty: How do we adequately model the threat landscape for any arbitrary system and what defines a defense solution vs an offense solution. We can easily make something that simulates identifying a Trojan file but since defense will need to cover every single download on the system, this by default seems to be worse off that attack capabilities, both in price, R&D efforts, and implementation difficulty. Additionally, how do we make a system that naturalistically simulates a system with default security measures implemented.

Potential solution: Wizard of Oz setup to literally act as the naturalistic. Fuzzy results but potential for a naturalistic cyber sandbox environment.

  • Constraint is on scalability: If we simply run one naturalistic experiment for offense and one for defense, this would somewhat work. We can potentially also delegate this directly to an LLM prompted to be a system and take it from there.

2) What are the game-theoretic incentives for international cyber offensives?

3) How does the offense / defense balance forecast into the future?

Test on GPT-4, GPT-3, etc. to forecast it from past models to future models.

4) How does the ease of cyber offense forecast into the future?

Properties of the parametric model:

  • N national cyber attacks
  • Incentives (see [2])
  • Cost of cyber attacks
  • Cyber capabilities forecasting

5) What can we do about cyberwarfare destabilization threats?

cyberwarfare's People

Contributors

esbenkc avatar

Stargazers

Orpheus Lummis avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.