Arab Times

‘Hacking’ to higher level

-

SAN FRANCISCO, Aug 8, (Agencies): The nightmare scenario for computer security — artificial intelligen­ce programs that can learn how to evade even the best defenses — may already have arrived.

That warning from security researcher­s is driven home by a team from IBM Corp who have used the artificial intelligen­ce technique known as machine learning to build hacking programs that could slip past toptier defensive measures. The group will unveil details of its experiment at the Black Hat security conference in Las Vegas

on Wednesday.

State-of-the-art defenses generally rely on examining what the attack software is doing, rather than the more commonplac­e technique of analyzing software code for danger signs. But the new genre of AI-driven programs can be trained to stay dormant until they reach a very specific target, making them exceptiona­lly hard to stop.

No one has yet boasted of catching any malicious software that clearly relied on machine learning or other variants of artificial intelligen­ce, but that may just be because the attack programs are too good to be caught.

Researcher­s say that, at best, it’s only a matter of time. Free artificial intelligen­ce building blocks for training programs are readily available from Alphabet Inc’s Google and others, and the ideas work all too well in practice.

“I absolutely do believe we’re going there,” said Jon DiMaggio, a senior threat analyst at cybersecur­ity firm Symantec Corp “It’s going to make it a lot harder to detect.”

The most advanced nation-state hackers have already shown that they can build attack programs that activate only when they have reached a target. The best-known example is Stuxnet, which was deployed by US and Israeli intelligen­ce agencies against a uranium enrichment facility in Iran.

The IBM effort, named DeepLocker, showed that a similar level of precision can be available to those with far fewer resources than a national government.

In a demonstrat­ion using publicly available photos of a sample target, the team used a hacked version of videoconfe­rencing software that swung into action only when it detected the face of a target.

“We have a lot of reason to believe this is the next big thing,” said lead IBM researcher Marc Ph Stoecklin. “This may have happened already, and we will see it two or three years from now.”

At a recent New York conference, Hackers on Planet Earth, defense researcher Kevin Hodges showed off an “entry-level” automated program he made with open-source training tools that tried multiple attack approaches in succession.

“We need to start looking at this stuff now,” said Hodges. “Whoever you personally consider evil is already working on this.”

 ?? (AFP) ?? Britain’s Prince William (right), the Duke of Cambridge, Britain’s Prime Minister Theresa May and former German president Joachim Gauck attend a religious ceremony to mark the 100th anniversar­y of the World War I (WW1) Battle of Amiens, at the Cathedral in Amiens, in northweste­rn France on Aug 8. The Battle of Amiens sounded the start of the Hundred Days Offensive on the Western Front, which led to the Armistice in November19­18.
(AFP) Britain’s Prince William (right), the Duke of Cambridge, Britain’s Prime Minister Theresa May and former German president Joachim Gauck attend a religious ceremony to mark the 100th anniversar­y of the World War I (WW1) Battle of Amiens, at the Cathedral in Amiens, in northweste­rn France on Aug 8. The Battle of Amiens sounded the start of the Hundred Days Offensive on the Western Front, which led to the Armistice in November19­18.

Newspapers in English

Newspapers from Kuwait