Skip to content
  • Kategorien
  • Aktuell
  • Tags
  • Beliebt
  • World
  • Benutzer
  • Gruppen
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Standard: (Kein Skin)
  • Kein Skin
Einklappen

other.li Forum

  1. Übersicht
  2. Uncategorized
  3. Significant raise of reports (on the Linux Kernel Mailing List) https://lwn.net/Articles/1065620/

Significant raise of reports (on the Linux Kernel Mailing List) https://lwn.net/Articles/1065620/

Geplant Angeheftet Gesperrt Verschoben Uncategorized
5 Beiträge 2 Kommentatoren 0 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • cwebber@social.coopC This user is from outside of this forum
    cwebber@social.coopC This user is from outside of this forum
    cwebber@social.coop
    schrieb zuletzt editiert von
    #1

    Significant raise of reports (on the Linux Kernel Mailing List) https://lwn.net/Articles/1065620/

    Here's something I think we all will have to contend with, whether you're an AIgen enthusiast or not: attacking is easier than defending, and these things don't get tired and they *are* very good at finding exploits. None of us will be able to ignore that, and we will probably have to listen to real genuine reports from them, even if we reject AIgen input.

    However, I don't think that's actually the right solution, and I don't think it's sustainable. 🧵

    cwebber@social.coopC 1 Antwort Letzte Antwort
    0
    • cwebber@social.coopC cwebber@social.coop

      Significant raise of reports (on the Linux Kernel Mailing List) https://lwn.net/Articles/1065620/

      Here's something I think we all will have to contend with, whether you're an AIgen enthusiast or not: attacking is easier than defending, and these things don't get tired and they *are* very good at finding exploits. None of us will be able to ignore that, and we will probably have to listen to real genuine reports from them, even if we reject AIgen input.

      However, I don't think that's actually the right solution, and I don't think it's sustainable. 🧵

      cwebber@social.coopC This user is from outside of this forum
      cwebber@social.coopC This user is from outside of this forum
      cwebber@social.coop
      schrieb zuletzt editiert von
      #2

      The fact of the matter is, most vulnerabilities fall under extremely common patterns, with known solutions:

      - Confused deputies: capability security can fix/contain this in many cases, more on that later
      - Injection attacks: primarily caused by string templating, using structured templating also fixes this (quasiquote, functional combinators, etc)
      - Memory vulnerabilities: solved by memory-safe languages, and yes that includes Rust, but it also includes Python, Scheme/Lisp, etc etc etc

      There are other serious vulnerabilities, such as incorrectly written or used cryptography, and others from there, but my primary point is: most damage can be either avoided in the first place or contained (especially in terms of capability security for containment)

      And... patching AIgen patches is going to get tough and tiring... (cotd...)

      cwebber@social.coopC 1 Antwort Letzte Antwort
      0
      • cwebber@social.coopC cwebber@social.coop

        The fact of the matter is, most vulnerabilities fall under extremely common patterns, with known solutions:

        - Confused deputies: capability security can fix/contain this in many cases, more on that later
        - Injection attacks: primarily caused by string templating, using structured templating also fixes this (quasiquote, functional combinators, etc)
        - Memory vulnerabilities: solved by memory-safe languages, and yes that includes Rust, but it also includes Python, Scheme/Lisp, etc etc etc

        There are other serious vulnerabilities, such as incorrectly written or used cryptography, and others from there, but my primary point is: most damage can be either avoided in the first place or contained (especially in terms of capability security for containment)

        And... patching AIgen patches is going to get tough and tiring... (cotd...)

        cwebber@social.coopC This user is from outside of this forum
        cwebber@social.coopC This user is from outside of this forum
        cwebber@social.coop
        schrieb zuletzt editiert von
        #3

        I don't think human reviewers are going to be able to keep up with the number of vulnerabilities we're seeing appear. I really don't. Humans won't be able to review at scale, and I also think that there's serious risks for blindly accepting AIgen patches, which for critical infrastructure could also be a path to *inserting new* vulnerabilities.

        We need to attack this systemically.

        I have more to say. More later. But that's the gist for now.

        thomasfuchs@hachyderm.ioT 1 Antwort Letzte Antwort
        0
        • cwebber@social.coopC cwebber@social.coop

          I don't think human reviewers are going to be able to keep up with the number of vulnerabilities we're seeing appear. I really don't. Humans won't be able to review at scale, and I also think that there's serious risks for blindly accepting AIgen patches, which for critical infrastructure could also be a path to *inserting new* vulnerabilities.

          We need to attack this systemically.

          I have more to say. More later. But that's the gist for now.

          thomasfuchs@hachyderm.ioT This user is from outside of this forum
          thomasfuchs@hachyderm.ioT This user is from outside of this forum
          thomasfuchs@hachyderm.io
          schrieb zuletzt editiert von
          #4

          @cwebber is that the AI that is trained on millions of lines of vulnerabilities

          cwebber@social.coopC 1 Antwort Letzte Antwort
          0
          • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

            @cwebber is that the AI that is trained on millions of lines of vulnerabilities

            cwebber@social.coopC This user is from outside of this forum
            cwebber@social.coopC This user is from outside of this forum
            cwebber@social.coop
            schrieb zuletzt editiert von
            #5

            @thomasfuchs Yep!

            As said, attacking is easier than defending 🙂

            1 Antwort Letzte Antwort
            0
            • monkee@other.liM monkee@other.li shared this topic
            Antworten
            • In einem neuen Thema antworten
            Anmelden zum Antworten
            • Älteste zuerst
            • Neuste zuerst
            • Meiste Stimmen


            • Anmelden

            • Anmelden oder registrieren, um zu suchen
            • Erster Beitrag
              Letzter Beitrag
            0
            • Kategorien
            • Aktuell
            • Tags
            • Beliebt
            • World
            • Benutzer
            • Gruppen