版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
JANUARY2024
Secure,GovernableChips
UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing
OnniAarne,TimFist,andCalebWithers
YCNAS
15YEARS
AbouttheAuthors
OnniAarneisaconsultantwiththecomputegovernanceteamattheInstituteforAI
PolicyandStrategy.HepreviouslyconductedcomputegovernanceresearchatRethink
Priorities,anotherresearchnonprofit
organization.HehasaBScincomputer
scienceandanMScindatasciencefromtheUniversityofHelsinki.
TimFistisaFellowwiththeTechnology
andNationalSecurityProgramattheCenterforaNewAmericanSecurity(CNAS).
Hehasanengineeringbackgroundand
previouslyworkedastheHeadofStrategy&GovernanceatFathomRadiant,anAI
hardwarecompany.Priortothat,heworkedasamachinelearningengineer,buildinganddeployingAIsystemsin
commercialsettings.HeholdsaB.A.(Honors)inaerospaceengineeringandaB.A.inpoliticalsciencefromMonash
University.
CalebWithersisaResearchAssistantfortheTechnologyandNationalSecurityProgram
atCNAS.BeforeCNAS,heworkedasa
policyanalystforavarietyofNewZealandgovernmentdepartments.HehasanM.A.insecuritystudiesfromGeorgetownUniversity,
concentratingintechnologyandsecurity,andaBachelorofCommercefromVictoriaUniversityofWellington,majoringineconomicsandininformationsystems.
AbouttheTechnologyandNationalSecurityProgram
TheCNASTechnologyandNationalSecurityprogram
exploresthepolicychallengesassociatedwithemergingtechnologies.Akeyfocusoftheprogramisbringing
togetherthetechnologyandpolicycommunitiesto
betterunderstandthesechallengesandtogetherdevelopsolutions.
AbouttheArtificialIntelligenceSafety&StabilityProject
TheCNASAISafety&StabilityProjectisamultiyear,
multiprogrameffortthataddressestheestablishedand
emergingrisksassociatedwithartificialintelligence.The
workisfocusedonanticipatingandmitigatingcatastrophicAIfailures,improvingtheU.S.DepartmentofDefense’s
processesforAItestingandevaluation,understandingandshapingopportunitiesforcomputegovernance,
understandingChinesedecision-makingonAIandstability,andunderstandingRussiandecision-makingonAIand
stability.
Acknowledgments
TheauthorswouldliketoacknowledgetheCNAS
PublicationsTeamsfortheirsupport,design,andediting.
TheauthorsalsowouldliketothankPaulScharre,ExecutiveVicePresidentandDirectorofStudies,forreviewsof
variousiterationsofthiswork.ThisreportwasproducedincollaborationwiththeInstituteforAIPolicyandStrategy.
Theauthorswouldalsoliketothankthelargenumberofreviewersandexpertsconsultedaspartofthisproject,especiallySamuelHammond,BradyHelwig,andGabrielKulp.Thisprojectismadepossiblewiththegenerous
supportofOpenPhilanthropy.
Asaresearchandpolicyinstitutioncommittedtothehigheststandardsoforganizational,intellectual,and
personalintegrity,CNASmaintainsstrictintellectual
independenceandsoleeditorialdirectionandcontroloveritsideas,projects,publications,events,andotherresearchactivities.CNASdoesnottakeinstitutionalpositionson
policyissues,andthecontentofCNASpublicationsreflectstheviewsoftheirauthorsalone.Inkeepingwithitsmissionandvalues,CNASdoesnotengageinlobbyingactivityandcompliesfullywithallapplicablefederal,state,andlocal
laws.CNASwillnotengageinanyrepresentationalactivitiesoradvocacyonbehalfofanyentitiesorinterestsand,to
theextentthattheCenteracceptsfundingfromnon-U.S.
sources,itsactivitieswillbelimitedtobonafidescholastic,academic,andresearch-relatedactivities,consistentwith
applicablefederallaw.TheCenterpubliclyacknowledgesonits
website
annuallyalldonorswhocontribute.
TABLEOFCONTENTS
01ExecutiveSummary
05Introduction
09WhatWouldEffectiveOn-Chip
GovernanceLookLike?
10PoliciesthatOn-ChipGovernance
MechanismsCouldEnable
13TechnicalUnderpinnings
17ChallengesforImplementation
21ImplementationTimelines
23Recommendations
25LimitationsandConclusion
26AppendixA:
GlossaryforAICompute
28AppendixB:
AdditionalSecurityConsiderations
On-chipgovernancemechanismscan
safeguardthe
developmentand
deploymentofbroadlycapableAIand
supercomputingsystemsinawaythatis
complementary
toAmericantechnologyleadership.
1
ExecutiveSummary
roadlycapableAIsystems,builtanddeployed
usingspecializedchips,arebecominganengineofeconomicgrowthandscientificprogress.Atthe
B
sametime,thesesystemsalsocouldbeusedbyirre-
sponsibleactorstoenablemasssurveillance,conduct
cyberattacks,anddesignnovelbiologicalweapons.ThismakessecuringandgoverningthesupplychainforAIchipsimportantformitigatingriskstoU.S.national
security.Buttoday’ssemiconductorexportcontrols
arelacklusterasastand-alonesolution.Tobeeffective,theyneedtobefar-reaching,whichharmsthecompeti-tivenessofU.S.firms,risksthe“de-Americanization”ofchipsupplychains,andrisksalienatingcommercialAIdevelopersandpartnernations.Far-reachingcontrolsarealsohardtoenforce:AIchipsmugglingisalready
happeningtodayandcouldsignificantlygrowinvolumeoverthecomingyears.1
TheuniquechallengesofAIgovernanceandthe
opportunitiesaffordedbymodernsecuritytechnologiessuggestalternativeapproachesarebothnecessaryandpossible.WhatifpoliciesconcerningAIchipscouldbeimplementeddirectlyonthechipsthemselves?Whatifupdatestoexportregulationscouldbedeployedthroughasimplesoftwareupdate,backedbysecurehardware?Thisreportintroducestheconceptof“on-chipgover-
nancemechanisms”:securephysicalmechanismsbuiltdirectlyintochipsorassociatedhardwarethatcouldprovideaplatformforadaptivegovernance.Itskey
findingsareasfollows.
On-chipgovernancemechanismscouldhelpsafeguardthedevelopmentanddeploymentofbroadlycapableAIandsupercomputingsystemsinawaythatiscomplementarytoAmericantechnologyleadership.
Oneespeciallypromisingnear-termapplicationisexportcontrolenforcement,whereon-chipmechanismscouldpreventorplaceboundariesaroundunauthorizedactors’useofexport-controlledAIchips.Implementedwell,
thiswouldgreatlyaidenforcement,andreducetheneedfortop-downexportcontrolsthatharmthecompeti-
tivenessoftheU.S.chipindustry,insteadenablingmoresurgicalend-use/end-user–focusedcontrolsifdesired.
Laterapplicationsincludeenforcingthetermsof
futureinternationalagreementsorotherregulations
thatgovernthelarge-scaletraininganddeployment
ofAImodels.Here,on-chipmechanismscouldwidenthespaceofpossibleagreementsandpoliciesbypro-
vidingatrustworthyverificationplatform.Forexample,
2
@CNASDC
on-chipgovernancemechanismscouldallowAIdevel-operstocrediblyreport“trainingruns”thatexceed
certaincomputationthresholds,ascalledforbya
recentWhiteHouseExecutiveOrder.2Theexistence
ofthesemechanismscouldallowforflexibleandeffi-
cientinternationalgovernanceregimesforAI,allowingpolicymakerstothinkbeyondthelimitationsofslowandcomplexstructuressuchastheInternationalAtomic
EnergyAgency(IAEA).3
Muchoftherequiredfunctionalityforon-chipgovernanceisalreadywidelydeployedon
variouschips,includingcutting-edgeAIchips.
ChipssoldbyleadingfirmsAMD,Apple,Intel,and
NVIDIAhavemanyofthefeaturesneededtoenablethepoliciesdescribedabove.Thesefeaturesareusedtodayinawidevarietyofapplications.OntheiPhone,on-chipmechanismsensurethatunauthorizedapplications
can’tbeinstalled.Googleuseson-chipmechanismsto
remotelyverifythatchipsrunningintheirdatacentershavenotbeencompromised.Manymultiplayervideo
gamesnowworkwithahardwaredevicecalleda
“TrustedPlatformModule”topreventin-gamecheating.IntheAIspace,thesefeaturesareincreasinglyusedtodistributetrainingacrossdifferentdevicesandusers
whilepreservingprivacyofcodeanddata.4
On-chipgovernancedoesnotrequiresecretmonitoringofusersorinsecure“backdoors”onhardware.On-chipgovernanceisbetterimplementedthroughprivacy-preserving
“verification”and“operatinglicenses”forAIchipsusedindatacenters.
“Verification”involvestheuserofachipmakingclaimsthatareverifiablebyanotherpartyaboutwhattheyaredoingwiththechip.Forexample,verifyingthequantityofcomputationorthedatasetusedinaparticular
trainingrun.5Secureon-chipverificationofthiskindismadepossiblebya“TrustedExecutionEnvironment”
(TEE).BecauseoftheTEE’ssecurityproperties,the
verifiercantrustthatinformationreceivedfromtheTEEhasnotbeen“spoofed,”withoutthechip’suserneedingtodivulgesensitivedata.6
“Operatinglicenses”provideanenforcementmech-anism.Thisisusefulincaseswhere,forexample,the
chip’sownerisfoundtohaveacquiredthechipin
violationofanexportcontrolagreement,orifthechip’suserrefusestoparticipateinalegallyrequiredverifica-tionprocess.Operatinglicenseswouldbebestenabledusingadedicated“securitymodule”thatlinksthefunc-tioningofthechiptoaperiodicallyrenewedlicensekey
fromthemanufacturer(oraregulator),notunlikethe
productlicensesrequiredtounlockproprietarysoftware.Hardwareoperatinglicensesofthiskindarealreadyusedinsomecommercialcontexts.
ThesemechanismsshouldprimarilybeusedonthespecializeddatacenterAIchipsthataretargetedbythecurrentAIchipexportcontrols.However,somelimitedmechanismsonconsumerGPUsmaybeusefulif,inthefuture,thesedevicesareexport-controlled.7
Existingtechnologiesneedtobehardenedbeforetheycanberelieduponinadversarialsettingssuchasexportcontrolenforcement.
On-chipgovernancemechanismsareonlyusefulinsofarastheyreliablyworkevenwhenadversariesareactivelyattemptingtocircumventthem.8Commercialversionsofthesetechnologiesarenottypicallydesignedtodefendagainstawell-resourcedattackerwithphysicalaccess
tothehardware.Investmentsinhardwareandsoftwaresecuritywillberequiredforon-chipgovernancemecha-nismstofunctionreliablyinthesekindsofenvironments.
Thespecificdefensesrequiredtoadequatelysecureon-chipgovernancemechanismsdependonthecontextinwhichtheyaredeployed.Thisreportexploresthreecontexts:minimally,covertly,andopenlyadversarial.
Astagedapproachtothedevelopmentandrolloutofon-chipgovernancefordatacenterAIchipsispossible.
IntermediatestagesofR&Dcouldstillbeusefulinpro-ductioncontexts.Intheshortterm,firmwareupdates
couldbedeployedtoexportedAIchipsimplementing
earlyversionsofahardwareoperatinglicenselinkedtothetermsofanexportlicense.Thiswouldbeusefulas
anadditionalcautionarymeasureforalready-plannedAIchipexportstohigh-diversion-riskgeographies.
Apromisingandrelativelyfeasiblenextstepwouldbetomakedevices“tamper-evident”(attemptstotamperwiththechipswouldleaveindelibleevidence).This
couldbeasufficientlevelofsecurityincaseswhereocca-sionalphysicalinspectionsofthehardwarearepossible.
ForsubsequentgenerationsofAIchips,hardware
securityfeaturescouldbefurtherhardened,workingtowardfull“tamper-proofing”tomakephysicalinspec-tionslessnecessary.
3
TECHNOLOGY&NATIONALSECURITY|JANUARY2024
Secure,GovernableChips:UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing
Tomotivatefurtherinvestigationofon-chipgover-
nance,thisreportsketchesanexamplearchitecturefordatacenterAIchipsthatcouldprovideaflexibleplatformfordynamicallyimplementingdifferentgovernance
mechanisms.Thecoreofthisproposalisahardened
securitymodule,includedonallhigh-performancedatacenterAIchips,thatcanensurethatthechiphasvalid,up-to-datefirmwareandsoftwareand,whereapplicable,anup-to-dateoperatinglicense.Iftheseconditionsarenotmet,itwouldblockthechipfromoperating.
Thisvalid,up-to-datefirmwareandsoftwarethen
couldhelpenforcelimitsontheusesofthesechipsandoffersophisticated“remoteattestation”capabilities
(remoteauthenticationtosecurelyverifydesiredprop-ertiesofthechipandthesoftwareitisrunning).The
securitymodulecouldensurethatiffirmware/softwarevulnerabilitiesarefound,userswouldhavenochoicebuttoupdatetopatchedversionswherethevulnerabilityhasbeenfixed.Thesecuritymodulealsocouldbeconfiguredtorequireanup-to-date,chip-specificoperatinglicense.
CurrentAIchipsalreadyhavesomecomponentsofthisarchitecture,butnotall.Thesegapslikelycould
beclosedwithmoderatedevelopmenteffortasexten-sionsoffunctionalityalreadyinplace.Theprimary
technicalchallengewillbeimplementingadequate
hardwaresecurity,particularlyfortamper-evidenceandtamper-proofing.Thisreportestimatesthiscouldbe
achievedwithaslittleas18monthsofinvolvedtechnicaleffort(andupto4years)fromleadingfirms.
BecauseasmallnumberofalliedcountriesencompassthesupplychainforthemostadvancedAIchips,onlyasmallnumberofcountrieswouldneedtocoordinatetoensurethatallcutting-edgeAIchipshavethesemech-anismsbuiltin.On-chipmechanismswouldneedtobesupportedbyawaytotracktheownershipofdatacenterAIchips,andsomeformofinspectionstoensurethesechipsarenottamperedwith,whererequired.
On-chipgovernancemechanismspresentaprom-
isingareaforfurtherresearchforcomputerengineers,computerscientists,andpolicyresearchers.ThisreportoffersthefollowingrecommendationstoU.S.policy-
makerstomovetowardaworldwhereallleadingAIchipsaresecureandgovernable.
Establishgovernmentcoordination
Recommendation:TheWhiteHouseshouldissueanexecutiveorderestablishingaNIST-ledinteragency
workinggroup,focusedongettingon-chipgover-
nancemechanismsbuiltintoallexport-controlleddatacenterAIchips.
Background:Foron-chipgovernancetoreachcommer-cialscale,long-termcollaborationbetweengovernmentandindustrywillberequired.Forprogresstobemadequickly,anexecutiveordercouldbeanappropriate
forcingfunction.TheNationalInstituteofStandards
andTechnology(NIST)wouldmakeasuitablelead
forthiseffort.ExpertiseandstaffalsoshouldbedrawnfromtheDepartmentofEnergy,theDepartmentof
Defense,theDepartmentofHomelandSecurity,the
NationalScienceFoundation,andtheU.S.intelligencecommunity.Theworkinggroupshouldalsobeinformedbyatechnicalpaneldrawnfromindustryandacademiatohelpdirecttechnicalstandardsandresearch.
Createcommercialincentives
Recommendation:TheDepartmentofCommerce(DoC)shouldincentivizeU.S.chipdesignersto
conductnecessaryR&Dusing“advanceexportmarketcommitments.”9
Background:Giventhaton-chipgovernancemecha-
nismsneedtobeimplementedoncommercialchips,
muchofthenecessaryR&Dwillneedtohappenin
anindustrysetting.Toincentivizethiswork,theDoCshouldconsidermakingcommitmentsrelatedtofutureaccesstoexportmarketstoU.S.chipfirms,conditionalonfirmsimplementingaspecificsetofsecurityfeaturesoncontrolledproducts.SuchcommitmentswouldbeaneffectivewayofincentivizingthenecessaryR&D
withoutspendingpublicmoney,giventhelargeamountoflostrevenuetochipfirmscausedbyexportrestric-tions.10Exportmarketcommitmentscouldinclude
notextendingexportcontrolstonewjurisdictions,
relaxingthe“presumptionofdenial”licensingpolicyforchipexportstolower-riskcustomersinChina,ormovingtowardmoresurgicalend-useorend-user-
basedcontrols.TheDoCshoulddeveloptherequiredfeaturesetsbyanalyzingspecificattackerthreat
modelsindifferentexportcontexts,incoordination
withtheU.S.IntelligenceCommunityandDepartmentofHomelandSecurity.
4
@CNASDC
AcceleratesecurityR&D
Recommendation:NISTshouldcoordinatewith
industryandrelevantgovernmentfundingbodiestoscope,fund,andsupportR&Dthatcanbeconductedoutsideleadingchipcompaniesandintegratedlater.
Background:WhilethelargemajorityofR&DwillneedtobeconductedbythefirmsbuildingandsellingAI
chipsatscale,someworkmaybeusefullyconducted
outsideofthesefirms,especiallytechnologiesthatwouldbenefitfrombeingstandardizedacrosstheindustry.
NISTshouldcoordinatewiththeSemiconductor
ResearchCorporation,relevantDefenseAdvanced
ResearchProjectsAgency(DARPA)programmanagers,andotherrelevantgovernmentfundingbodiestoscopeandfundusefulR&Dtobeperformedbyacademicand/orcommercialpartners.Forexample,workonspecial-izedtamper-proofenclosures(physicalhousingsfor
chipsthatpreventthechipfrombeingmodifiedwithoutcompromisingitsoperation)forhigh-endchipscouldbepotentiallyoutsourcedtoacademicandcommercialhardwaresecuritylabs.Tosupporttheseprojects,NISTshouldcreatetechnicalstandardsandreferenceimple-mentationsforon-chipgovernancemechanismsthataredesignedforwideadoptionbyindustry.
Planforastagedrollout
andfundextensivered-teaming
Recommendation:Toensurethaton-chipgovernancemechanismsareproperlydesignedandsafelyintro-
duced,theDoCandDepartmentofHomelandSecurity(DHS)shouldestablishflexibleexportlicensingandred-teamingprograms.
Background:On-chipmechanismswillrequiresubstan-tialtestingbeforebeingrelieduponinmoreadversarial
environments(e.g.,exportsofcontrolledchipstoChina).Tofacilitateastagedrolloutapproachwheremechanismscanbedependeduponinsuccessivelymorechallenging
operatingcontexts,theDoCshouldcreateexportlicensingarrangementswherelicensescanbeflexiblygrantedfor
differentgeographiesbasedonthesecurityfeaturesonthedevicetobeexported.Intandem,theCybersecurityandInfrastructureSecurityAgencywithinDHSshouldestab-lishred-teamingandbugbountyprogramstohelpfindandpatchanysoftwareandhardwaresecurityvulnerabilities.Apromisingnear-termstartingpointissettingupapublicprizeforfindingvulnerabilitiesinhardwaresecurity
featuresontoday’sAIchips.
Coordinatewithallies
Recommendation:TheStateandCommerce
Departmentsshouldcoordinatewithalliesonpoliciesandstandardsforon-chipgovernance.
Background:Aswithmanyotherformsoftechnology
governance,on-chipgovernancewillbeoflimited
effectivenesswithoutinternationalbuy-in.TheStateandCommerceDepartmentsshouldincludethepotential
roleofon-chipgovernancemechanismsindiplomaticdiscussionswithcountriesthatoccupyimportant
positionsinthesupplychainforcutting-edgeAIchips(especiallyTaiwan,theNetherlands,SouthKorea,andJapan),includingpotentialnewmultilateralcontrol
regimes.11Lookingbeyondexportcontrolcoordination,usingon-chipgovernancemechanismstofacilitateAIgovernancecooperation(e.g.,internationalagreementsoncomputeusagereporting)wouldbenefitfromclosecoordinationwithlike-mindedallies,suchastheUnitedKingdomandtheEuropeanUnion.
EncourageAIchipfirmstomoveearly
Recommendation:Chipfirmsshouldbeencouragedtomoveearlytobuildandhardenthesecurityfeaturesrequiredforon-chipgovernance.
Background:TheUnitedStateshassignaledinterest
inon-chipgovernanceinarecentrequestforcommentissuedbytheDepartmentofCommerce.12Chipsuppliersthataremoreabletoapplyandbuildonexistingtech-
nicaleffortswillhaveaheadstartondemonstratingandrealizingcompliance,withpotentialbenefitsintermsofaccesstomarketsthatarethesubjectofexportcontrolsorotherrelevantregulation.
Developinganddeployingthemechanismsdescribedinthisreportwilltaketime(monthsinthemostoptimisticcase,yearsinthemostlikelycase).IfthecapabilitiesandnationalsecurityrisksofAIsystemscontinuetogrowatthepaceobservedin2022and2023,theneedforhighlyeffectivecontrolscouldbecomeacuteinseveralyears.
Thissuggeststhatpolicymakersconcernedaboutthis
issueshouldbeginformulatingpoliciesandincentivizingthedevelopmentofappropriatetechnologiesnow.OncetherelevantsecurityfeatureshavebeenmandatedinthemostpowerfulAIchips,theyneednotbeusedimme-
diately:Themechanismsoutlinedinthisreportwouldallowforrapidandflexibleresponsestonewdevelop-mentsandthreatsonceinstalled.
5
TECHNOLOGY&NATIONALSECURITY|JANUARY2024
Secure,GovernableChips:UsingOn-ChipMechanismstoManageNationalSecurityRisksfromAI&AdvancedComputing
Introduction
testedanewhigh-yieldthermonuclearweapondesign
nFebruary25,2022,Russianforcesattacked
theUkrainiantownMelitopoland,afteraweekofheavyfighting,iteventuallywascaptured.
O
Thankstoitsrichsoil,theregionhasbeenanagriculturalhubforover200years,afactthatwasnotlostonthe
invaders.Intheweeksthatfollowedtheinvasion,localsnoticedthatgrainwasdisappearingfromtheirsilos.
Butitwasn’tjustgrainbeingstolenfromtheoccupied
town.Overthecourseofseveralweeks,combinehar-
vesters(farmequipmentusedtoharvestgrain)began
togomissing.Areviewofsecurityfootagelaterwould
revealthemachinerybeingloadedontomilitarytrucks,conspicuouslymarkedwithwhite“Z”s.13Inall,around
$5millionworthoffarmequipmentwasstolen.GPS
trackingfeaturesontheharvesterspaintedastartling
picture:Thesestolenassetshadembarkedona700-mileodysseytoZakhanYurt,aremotevillageinChechnya.
Butwhentheinvaderstriedtousethestolenharvesters,theyrealizedtheycouldn’tturnthemon.TheharvestershadbeendisabledbytheU.S.manufacturer,JohnDeere,whohasrevealedthatthoughtheyrarelyuseit,theyhavetheabilitytoremotelyshutdownanyoftheirmachines.14
Toolsbuiltintosensitivetechnologiescanenable
policiesnotonlyforrestriction,asinthepreviousstory,butalsoforverification.In1954,theUnitedStates
atBikiniAtollinthePacificOcean.ItremainsthemostpowerfulnuclearweaponeverdetonatedbytheUnitedStates,aroundonethousandtimesmorepowerfulthanthoseusedonHiroshimaandNagasaki.Thetest(named“CastleBravo”)causednuclearfallouttospreadover
fourthousandsquaremiles,resultinginsometimeslethaldosesofradiationforpeopleonneighboringislandsandnearbyfishingvessels,andincitingastronginterna-
tionalreaction,includingcallsforacomprehensivetestban.15InMarchof1960,theUnitedKingdom,theUnitedStates,andtheSovietUnionwerenegotiatingthetermsofsuchanagreement.Thesediscussionsledtothe1963PartialNuclearTestBanTreaty,which123countries
havesinceratified.Itwasapartialbanratherthanacom-prehensiveoneinpartduetoakeyproblemforverifyingcompliance:itwas,atthetime,impossibletoreliably
remotelydetectundergroundtests.Consequently,the
banwaslimitedtotestsconductedintheatmosphere,
underwater,andinouterspace.Twoyearslater,signifi-cantprogresshadalreadybeenmadetowardssolvingtheproblemofreliablydetectingundergroundtests,usingtheideaofanetworkofseismometers(devicesusedtomeasureseismicactivity)combinedwithanewefficientalgorithmfordifferentiatingbetweennucleartestsandotherseismicactivity.Butatreatyhadalreadybeen
signed,anditwasn’tuntilmanyyearslater,in1990,that
theUnitedStatesandSovietUnionratifiedatreatyinvolvingunder-
groundtests:the“ThresholdTest
BanTreaty”,whichprohibitedall
nucleartestsexceeding150kilotons.Thistreatywasenabledbymutualagreementbetweenthetwocoun-triesonaspecifictechnicalprotocolfortheverificationofundergroundtestsbasedontheapproach
describedabove.Ofcourse,verifica-tionisonlyonepartoftherationalebehindarmscontroltreaties,but
thisstoryshowstherolethatver-ificationtechnologiescanplayin
enablinginternationalagreementsandgovernancestructuresthatmaynototherwisebeabletoexist.
Boththesestorieshighlight
someofthechallengeswithtech-nology-basedsolutionstopolicyproblems.Thefirstisachieving
sufficientreliability.Althoughthecombineharvesterswereremotely
JohnDeereisoneoftheworld’slargestexportersoffarmequipmentandspendsaround
$2billionannuallyonresearchanddevelopment.Thishasledtoacomplexhardwareand
softwarestackfortheirequipment,allowingremotecontrolofnewervehicles.Here,UkrainianfarmerMykhailoPalahniukpointstowardaJohnDeereharvesterunderrepair,onhis6-hectarefarmwherehegrowscropsofwheat,barley,andsoy.(ScottPeterson/GettyImages)
6
@CNASDC
disabled,it’slikelythatRussiantroopseventuallywereabletobypasstheprotection,provideditwasworththetimeandmoneytodoso.Thesecondistiming.Thoughitturnedouttobepossibletoverifyundergroundnucleartests,thisdevelopmentcametoolatetobetrulyusefulfornuclearnonproliferation.
ThisreportconsiderstheapplicabilityofthesekindsoftechnologicalsolutionstoAIpolicy.WhatifpoliciesconcerningAIchips,acrucialinputfordual-useAI
systems,couldbeimplementeddirectlyonthechips
themselves?Whatifupdatestoexportregulationscouldbedeployedthroughasimplesoftwareupdate?Such
“on-chipgovernancemechanisms”couldhelpflexiblyaddressmanyofthenationalsecurityissuesposedby
futureAIsystemsinawaythatdoesnotpresupposeanyspecificrisks.However,thisapproachraisesdifficult
questionsabouthowdangeroustechnologiesshould
begoverned.Thisreportlaysoutthepolicyobjec-
tivesthatcouldbeachievedwithon-chipgovernance
mechanisms.Itthenexaminesthetechnicalandsocialchallengestotheirimplementation.Finally,thereportprovidesasetofrecommendationsforU.S.policymakerstomovetowardaworldwhereallleadingAIchipsaresecureandgovernable.
TheNationalSecurityRisks
PosedbyArtifi
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024-2030年中國(guó)嬰幼兒營(yíng)養(yǎng)米粉行業(yè)營(yíng)銷模式及未來5發(fā)展趨勢(shì)報(bào)告
- 2024-2030年中國(guó)地鐵廣告行業(yè)趨勢(shì)研究與投資價(jià)值分析報(bào)告
- 2024年度健身房裝修設(shè)計(jì)合同范本6篇
- 2024年物聯(lián)網(wǎng)平臺(tái)建設(shè)合同
- 眉山藥科職業(yè)學(xué)院《冶金資源綜合利用》2023-2024學(xué)年第一學(xué)期期末試卷
- 2024年版礦物材料交易合同
- 2024年標(biāo)準(zhǔn)版噴漿作業(yè)人員勞動(dòng)協(xié)議一
- 閱讀是一個(gè)專門的領(lǐng)域
- 四川省樂山市2019-2020學(xué)年高二下學(xué)期期末考試化學(xué)試題(解析版)
- 2024停薪留職員工技能提升與職業(yè)發(fā)展合同范本3篇
- 公園保潔服務(wù)投標(biāo)方案
- 2024年高考英語作文預(yù)測(cè):倡議書(附答案解析)
- 安徽省2023-2024學(xué)年七年級(jí)上學(xué)期期末數(shù)學(xué)試題(原卷版)
- 2024年人教版八年級(jí)生物(上冊(cè))期末試卷及答案(各版本)
- 農(nóng)作物病蟲害防治的社會(huì)經(jīng)濟(jì)效益分析考核試卷
- 2023年全國(guó)職業(yè)院校技能大賽-商務(wù)數(shù)據(jù)分析賽項(xiàng)規(guī)程
- 第五單元 大單元教學(xué)設(shè)計(jì)-【大單元教學(xué)】2024-2025學(xué)年七年級(jí)語文上冊(cè)同步備課系列(統(tǒng)編版2024)
- 《林火生態(tài)與管理》實(shí)驗(yàn)報(bào)告
- 【課件】紀(jì)念與象征-空間中的實(shí)體藝術(shù)+課件-高中美術(shù)人美版(2019)美術(shù)鑒賞
- JB∕T 11864-2014 長(zhǎng)期堵轉(zhuǎn)力矩電動(dòng)機(jī)式電纜卷筒
- SL352水工混凝土試驗(yàn)規(guī)程
評(píng)論
0/150
提交評(píng)論