安全、可治理的芯片:利用片上機(jī)制管理AI和先進(jìn)計(jì)算帶來的國(guó)家安全風(fēng)險(xiǎn)(英文版)_第1頁(yè)
安全、可治理的芯片:利用片上機(jī)制管理AI和先進(jìn)計(jì)算帶來的國(guó)家安全風(fēng)險(xiǎn)(英文版)_第2頁(yè)
安全、可治理的芯片:利用片上機(jī)制管理AI和先進(jìn)計(jì)算帶來的國(guó)家安全風(fēng)險(xiǎn)(英文版)_第3頁(yè)
安全、可治理的芯片:利用片上機(jī)制管理AI和先進(jìn)計(jì)算帶來的國(guó)家安全風(fēng)險(xiǎn)(英文版)_第4頁(yè)
安全、可治理的芯片:利用片上機(jī)制管理AI和先進(jìn)計(jì)算帶來的國(guó)家安全風(fēng)險(xiǎn)(英文版)_第5頁(yè)
已閱讀5頁(yè),還剩84頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

JANUARY2024

Secure,GovernableChips

UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing

OnniAarne,TimFist,andCalebWithers

YCNAS

15YEARS

AbouttheAuthors

OnniAarneisaconsultantwiththecomputegovernanceteamattheInstituteforAI

PolicyandStrategy.HepreviouslyconductedcomputegovernanceresearchatRethink

Priorities,anotherresearchnonprofit

organization.HehasaBScincomputer

scienceandanMScindatasciencefromtheUniversityofHelsinki.

TimFistisaFellowwiththeTechnology

andNationalSecurityProgramattheCenterforaNewAmericanSecurity(CNAS).

Hehasanengineeringbackgroundand

previouslyworkedastheHeadofStrategy&GovernanceatFathomRadiant,anAI

hardwarecompany.Priortothat,heworkedasamachinelearningengineer,buildinganddeployingAIsystemsin

commercialsettings.HeholdsaB.A.(Honors)inaerospaceengineeringandaB.A.inpoliticalsciencefromMonash

University.

CalebWithersisaResearchAssistantfortheTechnologyandNationalSecurityProgram

atCNAS.BeforeCNAS,heworkedasa

policyanalystforavarietyofNewZealandgovernmentdepartments.HehasanM.A.insecuritystudiesfromGeorgetownUniversity,

concentratingintechnologyandsecurity,andaBachelorofCommercefromVictoriaUniversityofWellington,majoringineconomicsandininformationsystems.

AbouttheTechnologyandNationalSecurityProgram

TheCNASTechnologyandNationalSecurityprogram

exploresthepolicychallengesassociatedwithemergingtechnologies.Akeyfocusoftheprogramisbringing

togetherthetechnologyandpolicycommunitiesto

betterunderstandthesechallengesandtogetherdevelopsolutions.

AbouttheArtificialIntelligenceSafety&StabilityProject

TheCNASAISafety&StabilityProjectisamultiyear,

multiprogrameffortthataddressestheestablishedand

emergingrisksassociatedwithartificialintelligence.The

workisfocusedonanticipatingandmitigatingcatastrophicAIfailures,improvingtheU.S.DepartmentofDefense’s

processesforAItestingandevaluation,understandingandshapingopportunitiesforcomputegovernance,

understandingChinesedecision-makingonAIandstability,andunderstandingRussiandecision-makingonAIand

stability.

Acknowledgments

TheauthorswouldliketoacknowledgetheCNAS

PublicationsTeamsfortheirsupport,design,andediting.

TheauthorsalsowouldliketothankPaulScharre,ExecutiveVicePresidentandDirectorofStudies,forreviewsof

variousiterationsofthiswork.ThisreportwasproducedincollaborationwiththeInstituteforAIPolicyandStrategy.

Theauthorswouldalsoliketothankthelargenumberofreviewersandexpertsconsultedaspartofthisproject,especiallySamuelHammond,BradyHelwig,andGabrielKulp.Thisprojectismadepossiblewiththegenerous

supportofOpenPhilanthropy.

Asaresearchandpolicyinstitutioncommittedtothehigheststandardsoforganizational,intellectual,and

personalintegrity,CNASmaintainsstrictintellectual

independenceandsoleeditorialdirectionandcontroloveritsideas,projects,publications,events,andotherresearchactivities.CNASdoesnottakeinstitutionalpositionson

policyissues,andthecontentofCNASpublicationsreflectstheviewsoftheirauthorsalone.Inkeepingwithitsmissionandvalues,CNASdoesnotengageinlobbyingactivityandcompliesfullywithallapplicablefederal,state,andlocal

laws.CNASwillnotengageinanyrepresentationalactivitiesoradvocacyonbehalfofanyentitiesorinterestsand,to

theextentthattheCenteracceptsfundingfromnon-U.S.

sources,itsactivitieswillbelimitedtobonafidescholastic,academic,andresearch-relatedactivities,consistentwith

applicablefederallaw.TheCenterpubliclyacknowledgesonits

website

annuallyalldonorswhocontribute.

TABLEOFCONTENTS

01ExecutiveSummary

05Introduction

09WhatWouldEffectiveOn-Chip

GovernanceLookLike?

10PoliciesthatOn-ChipGovernance

MechanismsCouldEnable

13TechnicalUnderpinnings

17ChallengesforImplementation

21ImplementationTimelines

23Recommendations

25LimitationsandConclusion

26AppendixA:

GlossaryforAICompute

28AppendixB:

AdditionalSecurityConsiderations

On-chipgovernancemechanismscan

safeguardthe

developmentand

deploymentofbroadlycapableAIand

supercomputingsystemsinawaythatis

complementary

toAmericantechnologyleadership.

1

ExecutiveSummary

roadlycapableAIsystems,builtanddeployed

usingspecializedchips,arebecominganengineofeconomicgrowthandscientificprogress.Atthe

B

sametime,thesesystemsalsocouldbeusedbyirre-

sponsibleactorstoenablemasssurveillance,conduct

cyberattacks,anddesignnovelbiologicalweapons.ThismakessecuringandgoverningthesupplychainforAIchipsimportantformitigatingriskstoU.S.national

security.Buttoday’ssemiconductorexportcontrols

arelacklusterasastand-alonesolution.Tobeeffective,theyneedtobefar-reaching,whichharmsthecompeti-tivenessofU.S.firms,risksthe“de-Americanization”ofchipsupplychains,andrisksalienatingcommercialAIdevelopersandpartnernations.Far-reachingcontrolsarealsohardtoenforce:AIchipsmugglingisalready

happeningtodayandcouldsignificantlygrowinvolumeoverthecomingyears.1

TheuniquechallengesofAIgovernanceandthe

opportunitiesaffordedbymodernsecuritytechnologiessuggestalternativeapproachesarebothnecessaryandpossible.WhatifpoliciesconcerningAIchipscouldbeimplementeddirectlyonthechipsthemselves?Whatifupdatestoexportregulationscouldbedeployedthroughasimplesoftwareupdate,backedbysecurehardware?Thisreportintroducestheconceptof“on-chipgover-

nancemechanisms”:securephysicalmechanismsbuiltdirectlyintochipsorassociatedhardwarethatcouldprovideaplatformforadaptivegovernance.Itskey

findingsareasfollows.

On-chipgovernancemechanismscouldhelpsafeguardthedevelopmentanddeploymentofbroadlycapableAIandsupercomputingsystemsinawaythatiscomplementarytoAmericantechnologyleadership.

Oneespeciallypromisingnear-termapplicationisexportcontrolenforcement,whereon-chipmechanismscouldpreventorplaceboundariesaroundunauthorizedactors’useofexport-controlledAIchips.Implementedwell,

thiswouldgreatlyaidenforcement,andreducetheneedfortop-downexportcontrolsthatharmthecompeti-

tivenessoftheU.S.chipindustry,insteadenablingmoresurgicalend-use/end-user–focusedcontrolsifdesired.

Laterapplicationsincludeenforcingthetermsof

futureinternationalagreementsorotherregulations

thatgovernthelarge-scaletraininganddeployment

ofAImodels.Here,on-chipmechanismscouldwidenthespaceofpossibleagreementsandpoliciesbypro-

vidingatrustworthyverificationplatform.Forexample,

2

@CNASDC

on-chipgovernancemechanismscouldallowAIdevel-operstocrediblyreport“trainingruns”thatexceed

certaincomputationthresholds,ascalledforbya

recentWhiteHouseExecutiveOrder.2Theexistence

ofthesemechanismscouldallowforflexibleandeffi-

cientinternationalgovernanceregimesforAI,allowingpolicymakerstothinkbeyondthelimitationsofslowandcomplexstructuressuchastheInternationalAtomic

EnergyAgency(IAEA).3

Muchoftherequiredfunctionalityforon-chipgovernanceisalreadywidelydeployedon

variouschips,includingcutting-edgeAIchips.

ChipssoldbyleadingfirmsAMD,Apple,Intel,and

NVIDIAhavemanyofthefeaturesneededtoenablethepoliciesdescribedabove.Thesefeaturesareusedtodayinawidevarietyofapplications.OntheiPhone,on-chipmechanismsensurethatunauthorizedapplications

can’tbeinstalled.Googleuseson-chipmechanismsto

remotelyverifythatchipsrunningintheirdatacentershavenotbeencompromised.Manymultiplayervideo

gamesnowworkwithahardwaredevicecalleda

“TrustedPlatformModule”topreventin-gamecheating.IntheAIspace,thesefeaturesareincreasinglyusedtodistributetrainingacrossdifferentdevicesandusers

whilepreservingprivacyofcodeanddata.4

On-chipgovernancedoesnotrequiresecretmonitoringofusersorinsecure“backdoors”onhardware.On-chipgovernanceisbetterimplementedthroughprivacy-preserving

“verification”and“operatinglicenses”forAIchipsusedindatacenters.

“Verification”involvestheuserofachipmakingclaimsthatareverifiablebyanotherpartyaboutwhattheyaredoingwiththechip.Forexample,verifyingthequantityofcomputationorthedatasetusedinaparticular

trainingrun.5Secureon-chipverificationofthiskindismadepossiblebya“TrustedExecutionEnvironment”

(TEE).BecauseoftheTEE’ssecurityproperties,the

verifiercantrustthatinformationreceivedfromtheTEEhasnotbeen“spoofed,”withoutthechip’suserneedingtodivulgesensitivedata.6

“Operatinglicenses”provideanenforcementmech-anism.Thisisusefulincaseswhere,forexample,the

chip’sownerisfoundtohaveacquiredthechipin

violationofanexportcontrolagreement,orifthechip’suserrefusestoparticipateinalegallyrequiredverifica-tionprocess.Operatinglicenseswouldbebestenabledusingadedicated“securitymodule”thatlinksthefunc-tioningofthechiptoaperiodicallyrenewedlicensekey

fromthemanufacturer(oraregulator),notunlikethe

productlicensesrequiredtounlockproprietarysoftware.Hardwareoperatinglicensesofthiskindarealreadyusedinsomecommercialcontexts.

ThesemechanismsshouldprimarilybeusedonthespecializeddatacenterAIchipsthataretargetedbythecurrentAIchipexportcontrols.However,somelimitedmechanismsonconsumerGPUsmaybeusefulif,inthefuture,thesedevicesareexport-controlled.7

Existingtechnologiesneedtobehardenedbeforetheycanberelieduponinadversarialsettingssuchasexportcontrolenforcement.

On-chipgovernancemechanismsareonlyusefulinsofarastheyreliablyworkevenwhenadversariesareactivelyattemptingtocircumventthem.8Commercialversionsofthesetechnologiesarenottypicallydesignedtodefendagainstawell-resourcedattackerwithphysicalaccess

tothehardware.Investmentsinhardwareandsoftwaresecuritywillberequiredforon-chipgovernancemecha-nismstofunctionreliablyinthesekindsofenvironments.

Thespecificdefensesrequiredtoadequatelysecureon-chipgovernancemechanismsdependonthecontextinwhichtheyaredeployed.Thisreportexploresthreecontexts:minimally,covertly,andopenlyadversarial.

Astagedapproachtothedevelopmentandrolloutofon-chipgovernancefordatacenterAIchipsispossible.

IntermediatestagesofR&Dcouldstillbeusefulinpro-ductioncontexts.Intheshortterm,firmwareupdates

couldbedeployedtoexportedAIchipsimplementing

earlyversionsofahardwareoperatinglicenselinkedtothetermsofanexportlicense.Thiswouldbeusefulas

anadditionalcautionarymeasureforalready-plannedAIchipexportstohigh-diversion-riskgeographies.

Apromisingandrelativelyfeasiblenextstepwouldbetomakedevices“tamper-evident”(attemptstotamperwiththechipswouldleaveindelibleevidence).This

couldbeasufficientlevelofsecurityincaseswhereocca-sionalphysicalinspectionsofthehardwarearepossible.

ForsubsequentgenerationsofAIchips,hardware

securityfeaturescouldbefurtherhardened,workingtowardfull“tamper-proofing”tomakephysicalinspec-tionslessnecessary.

3

TECHNOLOGY&NATIONALSECURITY|JANUARY2024

Secure,GovernableChips:UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing

Tomotivatefurtherinvestigationofon-chipgover-

nance,thisreportsketchesanexamplearchitecturefordatacenterAIchipsthatcouldprovideaflexibleplatformfordynamicallyimplementingdifferentgovernance

mechanisms.Thecoreofthisproposalisahardened

securitymodule,includedonallhigh-performancedatacenterAIchips,thatcanensurethatthechiphasvalid,up-to-datefirmwareandsoftwareand,whereapplicable,anup-to-dateoperatinglicense.Iftheseconditionsarenotmet,itwouldblockthechipfromoperating.

Thisvalid,up-to-datefirmwareandsoftwarethen

couldhelpenforcelimitsontheusesofthesechipsandoffersophisticated“remoteattestation”capabilities

(remoteauthenticationtosecurelyverifydesiredprop-ertiesofthechipandthesoftwareitisrunning).The

securitymodulecouldensurethatiffirmware/softwarevulnerabilitiesarefound,userswouldhavenochoicebuttoupdatetopatchedversionswherethevulnerabilityhasbeenfixed.Thesecuritymodulealsocouldbeconfiguredtorequireanup-to-date,chip-specificoperatinglicense.

CurrentAIchipsalreadyhavesomecomponentsofthisarchitecture,butnotall.Thesegapslikelycould

beclosedwithmoderatedevelopmenteffortasexten-sionsoffunctionalityalreadyinplace.Theprimary

technicalchallengewillbeimplementingadequate

hardwaresecurity,particularlyfortamper-evidenceandtamper-proofing.Thisreportestimatesthiscouldbe

achievedwithaslittleas18monthsofinvolvedtechnicaleffort(andupto4years)fromleadingfirms.

BecauseasmallnumberofalliedcountriesencompassthesupplychainforthemostadvancedAIchips,onlyasmallnumberofcountrieswouldneedtocoordinatetoensurethatallcutting-edgeAIchipshavethesemech-anismsbuiltin.On-chipmechanismswouldneedtobesupportedbyawaytotracktheownershipofdatacenterAIchips,andsomeformofinspectionstoensurethesechipsarenottamperedwith,whererequired.

On-chipgovernancemechanismspresentaprom-

isingareaforfurtherresearchforcomputerengineers,computerscientists,andpolicyresearchers.ThisreportoffersthefollowingrecommendationstoU.S.policy-

makerstomovetowardaworldwhereallleadingAIchipsaresecureandgovernable.

Establishgovernmentcoordination

Recommendation:TheWhiteHouseshouldissueanexecutiveorderestablishingaNIST-ledinteragency

workinggroup,focusedongettingon-chipgover-

nancemechanismsbuiltintoallexport-controlleddatacenterAIchips.

Background:Foron-chipgovernancetoreachcommer-cialscale,long-termcollaborationbetweengovernmentandindustrywillberequired.Forprogresstobemadequickly,anexecutiveordercouldbeanappropriate

forcingfunction.TheNationalInstituteofStandards

andTechnology(NIST)wouldmakeasuitablelead

forthiseffort.ExpertiseandstaffalsoshouldbedrawnfromtheDepartmentofEnergy,theDepartmentof

Defense,theDepartmentofHomelandSecurity,the

NationalScienceFoundation,andtheU.S.intelligencecommunity.Theworkinggroupshouldalsobeinformedbyatechnicalpaneldrawnfromindustryandacademiatohelpdirecttechnicalstandardsandresearch.

Createcommercialincentives

Recommendation:TheDepartmentofCommerce(DoC)shouldincentivizeU.S.chipdesignersto

conductnecessaryR&Dusing“advanceexportmarketcommitments.”9

Background:Giventhaton-chipgovernancemecha-

nismsneedtobeimplementedoncommercialchips,

muchofthenecessaryR&Dwillneedtohappenin

anindustrysetting.Toincentivizethiswork,theDoCshouldconsidermakingcommitmentsrelatedtofutureaccesstoexportmarketstoU.S.chipfirms,conditionalonfirmsimplementingaspecificsetofsecurityfeaturesoncontrolledproducts.SuchcommitmentswouldbeaneffectivewayofincentivizingthenecessaryR&D

withoutspendingpublicmoney,giventhelargeamountoflostrevenuetochipfirmscausedbyexportrestric-tions.10Exportmarketcommitmentscouldinclude

notextendingexportcontrolstonewjurisdictions,

relaxingthe“presumptionofdenial”licensingpolicyforchipexportstolower-riskcustomersinChina,ormovingtowardmoresurgicalend-useorend-user-

basedcontrols.TheDoCshoulddeveloptherequiredfeaturesetsbyanalyzingspecificattackerthreat

modelsindifferentexportcontexts,incoordination

withtheU.S.IntelligenceCommunityandDepartmentofHomelandSecurity.

4

@CNASDC

AcceleratesecurityR&D

Recommendation:NISTshouldcoordinatewith

industryandrelevantgovernmentfundingbodiestoscope,fund,andsupportR&Dthatcanbeconductedoutsideleadingchipcompaniesandintegratedlater.

Background:WhilethelargemajorityofR&DwillneedtobeconductedbythefirmsbuildingandsellingAI

chipsatscale,someworkmaybeusefullyconducted

outsideofthesefirms,especiallytechnologiesthatwouldbenefitfrombeingstandardizedacrosstheindustry.

NISTshouldcoordinatewiththeSemiconductor

ResearchCorporation,relevantDefenseAdvanced

ResearchProjectsAgency(DARPA)programmanagers,andotherrelevantgovernmentfundingbodiestoscopeandfundusefulR&Dtobeperformedbyacademicand/orcommercialpartners.Forexample,workonspecial-izedtamper-proofenclosures(physicalhousingsfor

chipsthatpreventthechipfrombeingmodifiedwithoutcompromisingitsoperation)forhigh-endchipscouldbepotentiallyoutsourcedtoacademicandcommercialhardwaresecuritylabs.Tosupporttheseprojects,NISTshouldcreatetechnicalstandardsandreferenceimple-mentationsforon-chipgovernancemechanismsthataredesignedforwideadoptionbyindustry.

Planforastagedrollout

andfundextensivered-teaming

Recommendation:Toensurethaton-chipgovernancemechanismsareproperlydesignedandsafelyintro-

duced,theDoCandDepartmentofHomelandSecurity(DHS)shouldestablishflexibleexportlicensingandred-teamingprograms.

Background:On-chipmechanismswillrequiresubstan-tialtestingbeforebeingrelieduponinmoreadversarial

environments(e.g.,exportsofcontrolledchipstoChina).Tofacilitateastagedrolloutapproachwheremechanismscanbedependeduponinsuccessivelymorechallenging

operatingcontexts,theDoCshouldcreateexportlicensingarrangementswherelicensescanbeflexiblygrantedfor

differentgeographiesbasedonthesecurityfeaturesonthedevicetobeexported.Intandem,theCybersecurityandInfrastructureSecurityAgencywithinDHSshouldestab-lishred-teamingandbugbountyprogramstohelpfindandpatchanysoftwareandhardwaresecurityvulnerabilities.Apromisingnear-termstartingpointissettingupapublicprizeforfindingvulnerabilitiesinhardwaresecurity

featuresontoday’sAIchips.

Coordinatewithallies

Recommendation:TheStateandCommerce

Departmentsshouldcoordinatewithalliesonpoliciesandstandardsforon-chipgovernance.

Background:Aswithmanyotherformsoftechnology

governance,on-chipgovernancewillbeoflimited

effectivenesswithoutinternationalbuy-in.TheStateandCommerceDepartmentsshouldincludethepotential

roleofon-chipgovernancemechanismsindiplomaticdiscussionswithcountriesthatoccupyimportant

positionsinthesupplychainforcutting-edgeAIchips(especiallyTaiwan,theNetherlands,SouthKorea,andJapan),includingpotentialnewmultilateralcontrol

regimes.11Lookingbeyondexportcontrolcoordination,usingon-chipgovernancemechanismstofacilitateAIgovernancecooperation(e.g.,internationalagreementsoncomputeusagereporting)wouldbenefitfromclosecoordinationwithlike-mindedallies,suchastheUnitedKingdomandtheEuropeanUnion.

EncourageAIchipfirmstomoveearly

Recommendation:Chipfirmsshouldbeencouragedtomoveearlytobuildandhardenthesecurityfeaturesrequiredforon-chipgovernance.

Background:TheUnitedStateshassignaledinterest

inon-chipgovernanceinarecentrequestforcommentissuedbytheDepartmentofCommerce.12Chipsuppliersthataremoreabletoapplyandbuildonexistingtech-

nicaleffortswillhaveaheadstartondemonstratingandrealizingcompliance,withpotentialbenefitsintermsofaccesstomarketsthatarethesubjectofexportcontrolsorotherrelevantregulation.

Developinganddeployingthemechanismsdescribedinthisreportwilltaketime(monthsinthemostoptimisticcase,yearsinthemostlikelycase).IfthecapabilitiesandnationalsecurityrisksofAIsystemscontinuetogrowatthepaceobservedin2022and2023,theneedforhighlyeffectivecontrolscouldbecomeacuteinseveralyears.

Thissuggeststhatpolicymakersconcernedaboutthis

issueshouldbeginformulatingpoliciesandincentivizingthedevelopmentofappropriatetechnologiesnow.OncetherelevantsecurityfeatureshavebeenmandatedinthemostpowerfulAIchips,theyneednotbeusedimme-

diately:Themechanismsoutlinedinthisreportwouldallowforrapidandflexibleresponsestonewdevelop-mentsandthreatsonceinstalled.

5

TECHNOLOGY&NATIONALSECURITY|JANUARY2024

Secure,GovernableChips:UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing

Introduction

testedanewhigh-yieldthermonuclearweapondesign

nFebruary25,2022,Russianforcesattacked

theUkrainiantownMelitopoland,afteraweekofheavyfighting,iteventuallywascaptured.

O

Thankstoitsrichsoil,theregionhasbeenanagriculturalhubforover200years,afactthatwasnotlostonthe

invaders.Intheweeksthatfollowedtheinvasion,localsnoticedthatgrainwasdisappearingfromtheirsilos.

Butitwasn’tjustgrainbeingstolenfromtheoccupied

town.Overthecourseofseveralweeks,combinehar-

vesters(farmequipmentusedtoharvestgrain)began

togomissing.Areviewofsecurityfootagelaterwould

revealthemachinerybeingloadedontomilitarytrucks,conspicuouslymarkedwithwhite“Z”s.13Inall,around

$5millionworthoffarmequipmentwasstolen.GPS

trackingfeaturesontheharvesterspaintedastartling

picture:Thesestolenassetshadembarkedona700-mileodysseytoZakhanYurt,aremotevillageinChechnya.

Butwhentheinvaderstriedtousethestolenharvesters,theyrealizedtheycouldn’tturnthemon.TheharvestershadbeendisabledbytheU.S.manufacturer,JohnDeere,whohasrevealedthatthoughtheyrarelyuseit,theyhavetheabilitytoremotelyshutdownanyoftheirmachines.14

Toolsbuiltintosensitivetechnologiescanenable

policiesnotonlyforrestriction,asinthepreviousstory,butalsoforverification.In1954,theUnitedStates

atBikiniAtollinthePacificOcean.ItremainsthemostpowerfulnuclearweaponeverdetonatedbytheUnitedStates,aroundonethousandtimesmorepowerfulthanthoseusedonHiroshimaandNagasaki.Thetest(named“CastleBravo”)causednuclearfallouttospreadover

fourthousandsquaremiles,resultinginsometimeslethaldosesofradiationforpeopleonneighboringislandsandnearbyfishingvessels,andincitingastronginterna-

tionalreaction,includingcallsforacomprehensivetestban.15InMarchof1960,theUnitedKingdom,theUnitedStates,andtheSovietUnionwerenegotiatingthetermsofsuchanagreement.Thesediscussionsledtothe1963PartialNuclearTestBanTreaty,which123countries

havesinceratified.Itwasapartialbanratherthanacom-prehensiveoneinpartduetoakeyproblemforverifyingcompliance:itwas,atthetime,impossibletoreliably

remotelydetectundergroundtests.Consequently,the

banwaslimitedtotestsconductedintheatmosphere,

underwater,andinouterspace.Twoyearslater,signifi-cantprogresshadalreadybeenmadetowardssolvingtheproblemofreliablydetectingundergroundtests,usingtheideaofanetworkofseismometers(devicesusedtomeasureseismicactivity)combinedwithanewefficientalgorithmfordifferentiatingbetweennucleartestsandotherseismicactivity.Butatreatyhadalreadybeen

signed,anditwasn’tuntilmanyyearslater,in1990,that

theUnitedStatesandSovietUnionratifiedatreatyinvolvingunder-

groundtests:the“ThresholdTest

BanTreaty”,whichprohibitedall

nucleartestsexceeding150kilotons.Thistreatywasenabledbymutualagreementbetweenthetwocoun-triesonaspecifictechnicalprotocolfortheverificationofundergroundtestsbasedontheapproach

describedabove.Ofcourse,verifica-tionisonlyonepartoftherationalebehindarmscontroltreaties,but

thisstoryshowstherolethatver-ificationtechnologiescanplayin

enablinginternationalagreementsandgovernancestructuresthatmaynototherwisebeabletoexist.

Boththesestorieshighlight

someofthechallengeswithtech-nology-basedsolutionstopolicyproblems.Thefirstisachieving

sufficientreliability.Althoughthecombineharvesterswereremotely

JohnDeereisoneoftheworld’slargestexportersoffarmequipmentandspendsaround

$2billionannuallyonresearchanddevelopment.Thishasledtoacomplexhardwareand

softwarestackfortheirequipment,allowingremotecontrolofnewervehicles.Here,UkrainianfarmerMykhailoPalahniukpointstowardaJohnDeereharvesterunderrepair,onhis6-hectarefarmwherehegrowscropsofwheat,barley,andsoy.(ScottPeterson/GettyImages)

6

@CNASDC

disabled,it’slikelythatRussiantroopseventuallywereabletobypasstheprotection,provideditwasworththetimeandmoneytodoso.Thesecondistiming.Thoughitturnedouttobepossibletoverifyundergroundnucleartests,thisdevelopmentcametoolatetobetrulyusefulfornuclearnonproliferation.

ThisreportconsiderstheapplicabilityofthesekindsoftechnologicalsolutionstoAIpolicy.WhatifpoliciesconcerningAIchips,acrucialinputfordual-useAI

systems,couldbeimplementeddirectlyonthechips

themselves?Whatifupdatestoexportregulationscouldbedeployedthroughasimplesoftwareupdate?Such

“on-chipgovernancemechanisms”couldhelpflexiblyaddressmanyofthenationalsecurityissuesposedby

futureAIsystemsinawaythatdoesnotpresupposeanyspecificrisks.However,thisapproachraisesdifficult

questionsabouthowdangeroustechnologiesshould

begoverned.Thisreportlaysoutthepolicyobjec-

tivesthatcouldbeachievedwithon-chipgovernance

mechanisms.Itthenexaminesthetechnicalandsocialchallengestotheirimplementation.Finally,thereportprovidesasetofrecommendationsforU.S.policymakerstomovetowardaworldwhereallleadingAIchipsaresecureandgovernable.

TheNationalSecurityRisks

PosedbyArtifi

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論