全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Tackling the Existential Threats from Quantum Computers and AI

DOI: 10.4236/iim.2024.163008, PP. 121-146

Keywords: Ethical AI, Quantum Computers, Existential Threat, Computer Vulnerabilities, Halting Problem, AGI

Full-Text   Cite this paper   Add to My Lib

Abstract:

Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousands of alarmed tech leaders recently signed an open letter to pause AI research to prepare for the catastrophic threats to humanity from uncontrolled AGI (Artificial General Intelligence). Perceived as an “epistemological nightmare”, AGI is believed to be on the anvil with GPT-5. Two computing rules appear responsible for these risks. 1) Mandatory third-party permissions that allow computers to run applications at the expense of introducing vulnerabilities. 2) The Halting Problem of Turing-complete AI programming languages potentially renders AGI unstoppable. The double whammy of these inherent weaknesses remains invincible under the legacy systems. A recent cybersecurity breakthrough shows that banning all permissions reduces the computer attack surface to zero, delivering a new zero vulnerability computing (ZVC) paradigm. Deploying ZVC and blockchain, this paper formulates and supports a hypothesis: “Safe, secure, ethical, controllable AGI/QC is possible by conquering the two unassailable rules of computability.” Pursued by a European consortium, testing/proving the proposed hypothesis will have a groundbreaking impact on the future digital infrastructure when AGI/QC starts powering the 75 billion internet devices by 2025.

References

[1]  Peters, M.A., et al. (2023) AI and the Future of Humanity: ChatGPT-4, Philosophy and Education—Critical Responses. Educational Philosophy and Theory, 1-35.
https://doi.org/10.1080/00131857.2023.2213437

[2]  Ford, P. (2023) The Quantum Cybersecurity Threat May Arrive Sooner than You Think. Computer, 56, 134-136.
https://doi.org/10.1109/MC.2022.3227657

[3]  Kline, K., Salvo, M. and Johnson, D. (2019) How Artificial Intelligence and Quantum Computing Are Evolving Cyber Warfare. Cyber Intelligence Initiative, the Institute of World Politics, Washington, DC.
[4]  Chen, L., et al. (2016) Report on Post-Quantum Cryptography. Department of Commerce and National Institute of Standards and Technology, Gaithersburg, MD.
https://doi.org/10.6028/NIST.IR.8105

[5]  Moret-Bonillo, V. (2015) Can Artificial Intelligence Benefit from Quantum Computing? Progress in Artificial Intelligence, 3, 89-105.
https://doi.org/10.1007/s13748-014-0059-0

[6]  Acampora, G. (2019) Quantum Machine Intelligence: Launching the First Journal in the Area of Quantum Artificial Intelligence. Quantum Machine Intelligence, 1, 1-3.
https://doi.org/10.1007/s42484-019-00006-5

[7]  Marr, B. (2023) A Short History of ChatGPT: How We Got Where We Are Today.
https://www.forbes.com/sites/bernardmarr/2023/05/19/a-short-history-of-chatgpt-how-we-got-to-where-we-are-today/

[8]  Buriak, J.M., et al. (2023) Best Practices for Using AI When Writing Scientific Manuscripts: Caution, Care, and Consideration: Creative Science Depends on It. ACS Nano, 17, 4091-4093.
https://doi.org/10.1021/acsnano.3c01544

[9]  Yu, H. (2023) Reflection on Whether Chat GPT Should Be Banned by Academia from the Perspective of Education and Teaching. Frontiers in Psychology, 14, Article 1181712.
https://doi.org/10.3389/fpsyg.2023.1181712

[10]  Bubeck, S., et al. (2023) Sparks of Artificial General Intelligence: Early Experiments with GPT-4. arXiv Preprint arXiv:2303.12712
[11]  Blake, A. (2023) GPT-5 Could Change the World in One Incredible Way.
https://www.digitaltrends.com/computing/gpt-5-artificial-general-intelligence/

[12]  Clarke, L. (2023) Call for AI Pause Highlights Potential Dangers. Science, 380, 120-121.
https://doi.org/10.1126/science.adi2240

[13]  Future of Life Institute (2023) Pause Giant AI Experiments: An Open Letter.
https://futureoflife.org/open-letter/pause-giant-ai-experiments/

[14]  Kevin, R. (2023) A.I. Poses ‘Risk of Extinction,’ Industry Leaders Warn.
https://www.nytimes.com/2023/05/30/technology/ai-threat-warning.html

[15]  Taylor, H. (2023) Ministers Not Doing Enough to Control Ai, Says UK Professor.
https://www.theguardian.com/technology/2023/may/13/ministers-not-doing-enough-to-control-ai-says-uk-professor

[16]  Tredinnick, L. and Laybats, C. (2023) The Dangers of Generative Artificial Intelligence. Business Information Review, 40, 46-48.
https://doi.org/10.1177/02663821231183756

[17]  Ambartsoumean, V.M. and Yampolskiy, R.V. (2023) AI Risk Skepticism, a Comprehensive Survey. arXiv Preprint arXiv:2303.03885
[18]  Samuel, J. (2023) Response to the March 2023 ‘Pause Giant AI Experiments: An Open Letter’ by Yoshua Bengio, Signed by Stuart Russell, Elon Musk, Steve Wozniak, Yuval Noah Harari and Others… SSRN Electronic Journal.
https://ssrn.com/abstract=4412516
[19]  Richter, F. (2023) Will AI Go Rogue?
https://www.statista.com/chart/29514/fear-of-artificial-intelligence-going-rogue/

[20]  O’Carroll, L. (2023) EU Moves Closer to Passing One of World’s First Laws Governing AI.
https://www.theguardian.com/technology/2023/jun/14/eu-moves-closer-to-passing-one-of-worlds-first-laws-governing-ai

[21]  Kuusi, O. and Heinonen, S. (2022) Scenarios from Artificial Narrow Intelligence to Artificial General Intelligence—Reviewing the Results of the International Work/ Technology 2050 Study. World Futures Review, 14, 65-79.
https://doi.org/10.1177/19467567221101637

[22]  Sasi, P., et al. (2023) Quantum Computing and the Qubit: The Future of Artificial Intelligence. In: Tyagi, A., Ed., Handbook of Research on Quantum Computing for Smart Environments, IGI Global, Hershey, 231-244.
https://doi.org/10.4018/978-1-6684-6697-1.ch013

[23]  Mallow, G.M., et al. (2022) Quantum Computing: The Future of Big Data and Artificial Intelligence in Spine. Spine Surgery and Related Research, 6, 93-98.
https://doi.org/10.22603/ssrr.2021-0251

[24]  Schiffer, B.F. (2022) Quantum Computers as an Amplifier for Existential Risk. arXiv Preprint arXiv:2205.02761
[25]  Grimes, R.A. (2019) Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto. John Wiley & Sons, Hoboken.
https://doi.org/10.1002/9781119618232

[26]  Fernandez-Carames, T.M. and Fraga-Lamas, P. (2020) Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks. IEEE Access, 8, 21091-21116.
https://doi.org/10.1109/ACCESS.2020.2968985

[27]  Gomes, L. (2018) Quantum Computing: Both Here and Not Here. IEEE Spectrum, 55, 42-47.
https://doi.org/10.1109/MSPEC.2018.8322045

[28]  Schmierer, R. (2022) Post Quantum Computing Survey Results—Are You Ready?
https://itchronicles.com/technology/post-quantum-computing-survey-results/

[29]  Huttner, B. and Kalsi, M. (2022) Countdown to Y2Q: Working Group, Quantum-Safe Security.
https://cloudsecurityalliance.org/research/working-groups/quantum-safe-security/

[30]  Pozoukidou, G. and Angelidou, M. (2022) Urban Planning in the 15-Minute City: Revisited under Sustainable and Smart City Developments until 2030. Smart Cities, 5, 1356-1375.
https://doi.org/10.3390/smartcities5040069

[31]  UNESCO and NETEXPLO (2019) Smart Cities: Shaping the Society of 2030. United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris.
[32]  Gabor, T., et al. (2020) The Holy Grail of Quantum Artificial Intelligence: Major Challenges in Accelerating the Machine Learning Pipeline. Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, Seoul, 27 June-19 July 2020, 456-461.
https://doi.org/10.1145/3387940.3391469

[33]  Andreasson, A., et al. (2020) A Census of Swedish Government Administrative Authority Employee Communications on Cybersecurity during the COVID-19 Pandemic. 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), The Hague, 7-10 December 2020, 727-733.
https://doi.org/10.1109/ASONAM49781.2020.9381324

[34]  Pal, K. (2023) Can Quantum Computing Impact the Applications of Artificial Intelligence.
https://www.techopedia.com/can-quantum-computing-impact-the-applications-of-artificial-intelligence

[35]  Majot, A. and Yampolskiy, R. (2015) Global Catastrophic Risk and Security Implications of Quantum Computers. Futures, 72, 17-26.
https://doi.org/10.1016/j.futures.2015.02.006

[36]  Raheman, F. (2022) The Future of Cybersecurity in the Age of Quantum Computing. Future Internet, 14, Article 335.
https://doi.org/10.3390/fi14110335

[37]  Raheman, F., Bhagat, T., Vermeulen, B. and Van Daele, P. (2022) Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis. Future Internet, 14, Article 238.
https://doi.org/10.3390/fi14080238

[38]  Raheman, F. (2022) The Q-Day Dilemma and the Quantum Supremacy/Advantage Conjecture. Research Square.
https://doi.org/10.21203/rs.3.rs-2331935/v1

[39]  Raheman, F. (2024) From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security. Journal of Computer and Communications, 12, 252-282.
https://doi.org/10.4236/jcc.2024.123016

[40]  Strachey, C. (1965) An Impossible Program. The Computer Journal, 7, 313.
https://doi.org/10.1093/comjnl/7.4.313

[41]  Alfonseca, M., et al. (2021) Superintelligence Cannot Be Contained: Lessons from Computability Theory. Journal of Artificial Intelligence Research, 70, 65-76.
https://doi.org/10.1613/jair.1.12202

[42]  Calude, C.S. and Dumitrescu, M. (2018) A Probabilistic Anytime Algorithm for the Halting Problem. Computability, 7, 259-271.
https://doi.org/10.3233/COM-170073

[43]  Stoddart, B. (2019) The Halting Paradox. arXiv Preprint arXiv:1906.05340
[44]  Hartwick, J. and Barki, H. (1994) Research Report—Hypothesis Testing and Hypothesis Generating Research: An Example from the User Participation Literature. Information Systems Research, 5, 446-449.
https://doi.org/10.1287/isre.5.4.446

[45]  Biesecker, L.G. (2013) Hypothesis-Generating Research and Predictive Medicine. Genome Research, 23, 1051-1053.
https://doi.org/10.1101/gr.157826.113

[46]  Saghiri, A.M., et al. (2022) A Survey of Artificial Intelligence Challenges: Analyzing the Definitions, Relationships, and Evolutions. Applied Sciences, 12, Article 4054.
https://doi.org/10.3390/app12084054

[47]  Russell, S. (2019) Human Compatible: Artificial Intelligence and the Problem of Control. Penguin, London.
[48]  Yampolskiy, R.V. (2020) On Controllability of AI. arXiv:2008.04071
[49]  Babcock, J., Kramar, J. and Yampolskiy, R.V. (2016) The AGI Containment Problem. Proceedings of the 9th International Conference on Artificial General Intelligence, New York, 16-19 July 2016, 53-63.
https://doi.org/10.1007/978-3-319-41649-6_6

[50]  Saltzer, J.H. and Schroeder, M.D. (1975) The Protection of Information in Computer Systems. Proceedings of the IEEE, 63, 1278-1308.
https://doi.org/10.1109/PROC.1975.9939

[51]  Steinhardt, J., Koh, P.W. and Liang, P. (2017) Certified Defenses for Data Poisoning Attacks. Proceedings of the 31st Conference on Neural Information Processing Systems, Long Beach, 4-9 December 2017, 3520-3532.
[52]  Akhtar, N., et al. (2021) Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey. IEEE Access, 9, 155161-155196.
https://doi.org/10.1109/ACCESS.2021.3127960

[53]  Isaac, E.R.H.P. and Reno, J. (2023) AI Product Security: A Primer for Developers. arXiv Preprint ArXiv:2304.11087
https://arxiv.org/pdf/2304.11087.pdf

[54]  Tatam, M., et al. (2021) A Review of Threat Modeling Approaches for APT-Style Attacks. Heliyon, 7, E05969.
https://doi.org/10.1016/j.heliyon.2021.e05969

[55]  Xiong, W. and Lagerström, R. (2019) Threat Modeling—A Systematic Literature Review. Computers & Security, 84, 53-69.
https://doi.org/10.1016/j.cose.2019.03.010

[56]  Shostack, A. (2022) Threat Modeling: Designing for Security. Wiley, Hoboken.
[57]  Mauri, L. and Damiani, E. (2022) Modeling Threats to AI-ML Systems Using STRIDE. Sensors, 22, Article 6662.
https://doi.org/10.3390/s22176662

[58]  Mauri, L. and Damiani, E. (2021) STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets. 2021 IEEE International Conference On Cyber Security and Resilience (CSR), Rhodes, 26-28 July 2021, 147-154.
https://doi.org/10.1109/CSR51186.2021.9527917

[59]  European Union Agency for Cybersecurity, Malatras, A. and Dede, G. (2023) AI Cybersecurity Challenges: Threat Landscape for Artificial Intelligence.
https://op.europa.eu/en/publication-detail/-/publication/e52bf2d7-4017-11eb-b27b-01aa75ed71a1/language-en

[60]  Cook, B., Podelski, A. and Rybalchenko, A. (2011) Proving Program Termination. Communications of the ACM, 54, 88-98.
https://doi.org/10.1145/1941487.1941509

[61]  Lucas, S. (2021) The Origins of the Halting Problem. Journal of Logical and Algebraic Methods in Programming, 121, Article 100687.
https://doi.org/10.1016/j.jlamp.2021.100687

[62]  Dietrich, E. and Fields, C. (2020) Equivalence of the Frame and Halting Problems. Algorithms, 13, Article 175.
https://doi.org/10.3390/a13070175

[63]  Rybalov, A. (2007) On the Strongly Generic Undecidability of the Halting Problem. Theoretical Computer Science, 377, 268-270.
https://doi.org/10.1016/j.tcs.2007.02.010

[64]  Gams, M. (2013) Alan Turing, Turing Machines and Stronger. Informatica, 37, 9-14.
[65]  Hyun, W.-S. (2012) Turing’s Cognitive Science: A Metamathematical Essay for His Centennial. Korean Journal of Cognitive Science, 23, 367-388.
https://doi.org/10.19066/cogsci.2012.23.3.004

[66]  Fairfield, J.A.T. (2019) The Human Element: The Under-Theorized and Underutilized Component Vital to Fostering Blockchain Development. Cleveland State Law Review, 67, 33-41.
[67]  Cardona, R., Miranda, E. and Peralta-Salas, D. (2021) Looking at Euler Flows through a Contact Mirror: Universality and Undecidability. arXiv Preprint arXiv:2107.09471
[68]  Brennan, L. (2023) AI Ethical Compliance Is Undecidable. Hastings Science and Technology Law Journal, 14, 311-338.
[69]  Floridi, L. and Cowls, J. (2022) A Unified Framework of Five Principles for AI in Society. In: Carta, S., Ed., Machine Learning and the City: Applications in Architecture and Urban Design, John Wiley & Sons Ltd., Hoboken, 535-545.
https://doi.org/10.1002/9781119815075.ch45

[70]  Anderson, S.L. (2008) Asimov’s Three Laws of Robotics and Machine Metaethics. AI & Society, 22, 477-493.
https://doi.org/10.1007/s00146-007-0094-5

[71]  Zenil, H. (2013) A Behavioural Foundation for Natural Computing and a Programmability Test. In: Dodig-Crnkovic, G. and Giovagnoli, R., Eds., Computing Nature: Turing Centenary Perspective, Springer, Berlin, 87-113.
https://doi.org/10.1007/978-3-642-37225-4_5

[72]  Amos, Z. (2022) Data Poisoning: Is There a Solution?
https://www.unite.ai/data-poisoning-is-there-a-solution/

[73]  European Commission (2023) “Seal of Excellence” Awarded to ZVC in a Horizon Europe EIC Accelerator Grant Program.
https://zvchub.com/#seal

[74]  Darwish, D. (2023) Blockchain and Artificial Intelligence for Business Transformation toward Sustainability. In: Namasudra, S. and Akkaya, K., Eds., Blockchain and Its Applications in Industry 4.0, Springer, Singapore, 211-255.
https://doi.org/10.1007/978-981-19-8730-4_8

[75]  Badruddoja, S., et al. (2022) Making Smart Contracts Predict and Scale. 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), San Antonio, 5-7 September 2022, 127-134.
https://doi.org/10.1109/BCCA55292.2022.9922480

[76]  Leontaris, L., et al. (2023) A Blockchain-Enabled Deep Residual Architecture for Accountable, In-Situ Quality Control in Industry 4.0 with Minimal Latency. Computers in Industry, 149, Article 103919.
https://doi.org/10.1016/j.compind.2023.103919

[77]  Du, Y., Wang, Z. and Leung, V.C.M. (2021) Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends and Open Issues. Future Internet, 13, Article 48.
https://doi.org/10.3390/fi13020048

[78]  Zhong, L., Qi, C. and Gao, Y. (2022) Blockchain-Enabled Automatic Learning Method for Digital Gaming Systems Based on Big Data. International Journal of Gaming and Computer-Mediated Simulations (IJGCMS), 14, 1-22.
https://doi.org/10.4018/ijgcms.315634

[79]  Kaushik, K. (2022) Blockchain Enabled Artificial Intelligence for Cybersecurity Systems. In: Ouaissa, M., Boulouard, Z., Ouaissa, M., Khan, I.U. and Kaosar, M., Eds., Big Data Analytics and Computational Intelligence for Cybersecurity, Springer International Publishing, Cham, 165-179.
https://doi.org/10.1007/978-3-031-05752-6_11

[80]  Shinde, R., et al. (2022) Securing AI-Based Healthcare Systems Using Blockchain Technology: A State-of-the-Art Systematic Literature Review and Future Research Directions. Transactions on Emerging Telecommunications Technologies, 35, e4884.
https://doi.org/10.1002/ett.4884

[81]  Shen, M. et al. (2023) Blockchains for Artificial Intelligence of Things: A Comprehensive Survey. IEEE Internet of Things Journal, 10, 14483-14506.
https://doi.org/10.1109/JIOT.2023.3268705

[82]  Junis, F., et al. (2019) A Revisit on Blockchain-Based Smart Contract Technology. arXiv Preprint arXiv:1907.09199
[83]  Eberhardt, J. and Tai, S. (2018) Zokrates-Scalable Privacy-Preserving Off-Chain Computations. 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, 30 July-3 August 2018, 1084-1091.
https://doi.org/10.1109/Cybermatics_2018.2018.00199

[84]  Jansen, M., et al. (2020) Do Smart Contract Languages Need to Be Turing Complete? Proceedings of the 1st International Congress on Blockchain and Applications 2019, Ávila, 26-28 June 2019, 19-26.
https://doi.org/10.1007/978-3-030-23813-1_3

[85]  Hu, B., et al. (2021) A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools, and Systems. Patterns, 2, Article 100179.
https://doi.org/10.1016/j.patter.2020.100179

[86]  Mintlayer (2023) Why DeFi’s Future Is with Non-TuringComplete Smart Contracts.
https://www.mintlayer.org/news/2020-11-05-why-defis-future-is-with-non-turing-complete-smart-contracts/

[87]  Jin, J., et al. (2014) An Information Framework for Creating a Smart City through Internet of Things. IEEE Internet of Things Journal, 1, 112-121.
https://doi.org/10.1109/JIOT.2013.2296516

[88]  DrFazal (2023) Why Computers Are Inherently Vulnerable?
https://drfazal.medium.com/why-computers-are-inherently-vulnerable-fd7a34afaec6
[89]  Liu, X., et al. (2018) Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication. Sustainability, 10, Article 3588.
https://doi.org/10.3390/su10103588

[90]  Aljabri, M.G. (2023) Blockchain Technology. In: Srivastava, D., Sharma, N., et al, Eds., Intelligent Internet of Things for Smart Healthcare Systems, CRC Press, Boca Raton, 165.
https://doi.org/10.1201/9781003326182-11

[91]  Townsend, K. (2023) AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm.
https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/

[92]  Ji, Y. and Dubrova, E. (2023) A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber. Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, Copenhagen, 30 November 2023, 27-37.
https://eprint.iacr.org/2023/1084

https://doi.org/10.1145/3605769.3623992

[93]  Berzati, A., et al. (2023) A Practical Template Attack on CRYSTALS-Dilithium. Cryptology ePrint Archive.
[94]  Canto, A.C., et al. (2023) Algorithmic Security Is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security. arXiv Preprint arXiv:2305.13544
[95]  Hadayeghparast, S., Bayat-Sarmadi, S. and Ebrahimi, S. (2022) High-Speed Post-Quantum Cryptoprocessor Based on RISC-V Architecture for IoT. IEEE Internet of Things Journal, 9, 15839-15846.
https://doi.org/10.1109/JIOT.2022.3152850

[96]  Lewicki, K.L., et al. (2023) Out of Context: Investigating the Bias and Fairness Concerns of “Artificial Intelligence as a Service”. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, Hamburg, 23-28 April 2023, 1-17.
https://doi.org/10.1145/3544548.3581463

[97]  Chethana, C., Shaik, M. and Pareek, P. (2023) Artificial Intelligence Applications for Process Optimization in Small Software Firms. SSRN Electronic Journal.
[98]  Tariq, S., et al. (2023) Is the ‘Technological Singularity Scenario’ Possible: Can AI Parallel and Surpass All Human Mental Capabilities? World Futures, 79, 200-266.
https://doi.org/10.1080/02604027.2022.2050879

[99]  Mathews, J. (2023) Microsoft’s Chief Scientific Officer, One of the World’s Leading A.I. Experts, Doesn’t Think a 6 Month Pause Will Fix A.I.—But Has Some Ideas of How to Safeguard It.
https://fortune.com/2023/04/30/microsoft-eric-horvitz-ai-research-predictions/

[100]  Mollman, S. (2023) Google CEO Won’t Commit to Pausing A.I. Development after Experts Warn about ‘Profound Risks to Society’.
https://fortune.com/2023/03/31/google-ceo-sundar-pichai-artificial-intelligence-open-letter-response/

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413