{"id":77810,"date":"2018-04-14T08:42:45","date_gmt":"2018-04-14T15:42:45","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2018\/04\/new-trojan-malware-could-mind-control-neural-networks"},"modified":"2018-04-14T08:42:45","modified_gmt":"2018-04-14T15:42:45","slug":"new-trojan-malware-could-mind-control-neural-networks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2018\/04\/new-trojan-malware-could-mind-control-neural-networks","title":{"rendered":"New Trojan Malware Could Mind-Control Neural Networks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-trojan-malware-could-mind-control-neural-networks.jpg\"><\/a><\/p>\n<p>Each new technological breakthrough comes seemingly prepackaged with a new way for hackers to kill us all: <a href=\"https:\/\/www.outerplaces.com\/science\/item\/16653-hackers-self-driving-cars\" target=\"_blank\" rel=\"noopener noreferrer\">self-driving cars<\/a>, <a href=\"https:\/\/www.outerplaces.com\/science\/item\/17687-us-military-admits-space-weapons-vulnerable-hackers\" target=\"_blank\" rel=\"noopener noreferrer\">space-based weapons<\/a>, and even <a href=\"https:\/\/www.outerplaces.com\/science\/item\/17629-doomsday-clock-moves-close-midnight-hackers-trigger-nuclear-war\" target=\"_blank\" rel=\"noopener noreferrer\">nuclear security systems are vulnerable<\/a> to someone with the right knowledge and a bit of code. Now, deep-learning artificial intelligence looks like the next big threat, and <em>not<\/em> because it will gain sentience to murder us with robots (as Elon Musk has warned): a group of computer scientists from the US and China recently published a paper proposing the <a href=\"https:\/\/arxiv.org\/pdf\/1802.03043.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">first-ever trojan for a neural network<\/a>.<\/p>\n<p>Neural networks are the primary tool used in AI to accomplish \u201cdeep learning,\u201d which has allowed AIs to master complex tasks like playing chess and Go. Neural networks function similar to a human brain, which is how they got the name. Information passes through layers of neuron-like connections, which then analyze the information and spit out a response. These networks can pull off difficult tasks like image recognition, including identifying faces and objects, which makes them useful for self-driving cars (to identify stop signs and pedestrians) and security (which may involve identifying an authorized user\u2019s face). Neural networks are relatively novel pieces of tech and aren\u2019t commonly used by the public yet but, as deep-learning AI becomes more prevalent, it will likely become an appealing target for hackers.<\/p>\n<p>The trojan proposed in the paper, called \u201cPoTrojan,\u201d could be included in a neural network product either from the beginning or inserted later as a slight modification. Like a normal trojan, it looks like a normal piece of the software, doesn\u2019t copy itself, and doesn\u2019t do much of anything\u2026 Until the right triggers happen. Once the right inputs are activated in a neural network, this trojan hijacks the operation and injects its own train of \u201cthought,\u201d making sure the network spits out the answer <em>it<\/em> wants. This could take the form of rejecting the face of a genuine user and denying them access to their device, or purposefully failing to recognize a stop sign to create a car crash.<\/p>\n<p><!-- Link: <a href=\"https:\/\/www.outerplaces.com\/science\/item\/17872-neural-networks-ai-trojan\">https:\/\/www.outerplaces.com\/science\/item\/17872-neural-networks-ai-trojan<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each new technological breakthrough comes seemingly prepackaged with a new way for hackers to kill us all: self-driving cars, space-based weapons, and even nuclear security systems are vulnerable to someone with the right knowledge and a bit of code. Now, deep-learning artificial intelligence looks like the next big threat, and not because it will gain [\u2026]<\/p>\n","protected":false},"author":354,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,2019,6,8],"tags":[],"class_list":["post-77810","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-elon-musk","category-robotics-ai","category-space"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/77810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/354"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=77810"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/77810\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=77810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=77810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=77810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}