SlideShare a Scribd company logo
1 of 16
Download to read offline
Miel Vander Sande
                            [@Miel_vds]




TERMINATOR’S ORIGINS
       or how the semantic web could
                  endanger humanity
Working on the Semantic Web ‘s bright future
is also working on
the Semantic Web‘s dark side
Misuse by Humans




Misuse by Machines
Misuse by Humans
Content       Content

                                   Content
Content
            A              A
                                      Ageneration
            Automatic rule based content
  A                   Intelligent and generic agents
  Content                  High quality Linked Data
                          A big chunk is social data
      A         Ginormous Linked Open Data cloud
Force false knowledge extraction
                     Manipulate semantic driven tasks
{
     ?x ex:Article ?y.
     ?y ex:subject dbpedia:Barack_Obama.   If type == ex:FrontPage
}
=>
                                             #create html to present article
{    ?x ex:category ex:FrontPage    }.

{
     ?x a ex:Article .
=>
{    ?x rdfs:comment “<script> … open websocket … </script>”           }.
”One of the defining characteristics of a
successful information system is its level
          of exploitation by spammers.”
                                - Ian Davis
Fully context aware, easily produced and
                                         reproduced
<http://.../John> a foaf:Person;
       foaf:firstname “John”;
       foaf:knows <http://.../Marc> .           Hey John,

<http://.../Marc> a foaf:Person ;               Marc here. I saw you
       ex:attends <http://.../ISWC> .           attend ISWC soon.
                                                Want to join me for
<http://.../ISWC> a swpo:Conference ;
                                                the concert of The
       swpo:hasLocation <http://.../Boston> .
                                                Who: http://spam.url
<http://.../Concert_TheWho> a music:Concert ;
       music:venue <http://.../TD Garden> .
Provenance manipulation fools proof and trust

   Data         Proof & Trust                         WebID
      needs       needs                            based on
                           Provenance
https://test.net/#mvs a prov:Person, prov:Agent;

:post a prov:Entity, sioc:Post;
    sioc:title “Buy Mentos, the freshmaker"^^xsd:string;
    prov:wasAttributedTo   <https://test.net/#mvs>;
    prov:generatedAtTime "2011-07-16T01:52:02Z"^^xsd:dateTime .
Malicious links trick automated processes
                        Image                 Worm

Photogallery
                 owl:sameAs owl:sameAs
                                      owl:sameAs
   A
               Image             Image
Misuse by Machines
”Machine intelligence is Acceptance of
not human intelligence.” machine intelligence
              - Chris Welty




    Fully deployed web of
                   things
Judgement day?




                          Today: drones, Stuxnet
   How much trust will we put in machines and the
                                  Semantic Web?
We need to
            proactively brainstorm about misuse
              investigate fail-safe approaches
discuss "acceptable machine behaviour" before it's too late?


                    Discuss!
                   Miel Vander Sande [@Miel_vds]
Attributions
•   Photo title slide by Ujang Uung
•   Photo slide #1 by Cayusa
•   Photo slide #2 by morteza bahmani
•   Photo slide #3 by Hugh Hart & ed6505
•   Photos slide #4 by Moyo Ogunjale & Dark Lord
•   Photo slide #6 by Huafeng Xie
•   Photo slide #14 by Universal Studios

More Related Content

Similar to The Terminator's origins or how the Semantic Web could endanger Humanity.

Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik
 
OWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoOWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoEoin Keary
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspacerkpv2002
 
2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIAguestfdcb8a
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide ScanningJamie O'Hare
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentationxia_bofa
 
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumCERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumBob Rudis
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston HeckerEC-Council
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
BsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security PlaygroundBsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security PlaygroundBSides Delhi
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHPjikbal
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Jay Beale
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly CampusDave Olsen
 

Similar to The Terminator's origins or how the Semantic Web could endanger Humanity. (20)

Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!Rishi Malik - How to write insecure software: It's easier then you think!
Rishi Malik - How to write insecure software: It's easier then you think!
 
OWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoOWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and Manico
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA2 Roads to Redemption - Thoughts on XSS and SQLIA
2 Roads to Redemption - Thoughts on XSS and SQLIA
 
Wannacry
WannacryWannacry
Wannacry
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide Scanning
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumCERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity Symposium
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
BsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security PlaygroundBsidesDelhi 2018: DomGoat - the DOM Security Playground
BsidesDelhi 2018: DomGoat - the DOM Security Playground
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHP
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly Campus
 

More from Miel Vander Sande

Preserving a Web of Linked Data: Lessons and challenges from a fading web
Preserving a Web of Linked Data: Lessons and challenges from a fading webPreserving a Web of Linked Data: Lessons and challenges from a fading web
Preserving a Web of Linked Data: Lessons and challenges from a fading webMiel Vander Sande
 
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...Miel Vander Sande
 
Reproducibility with 
the 99 cents Linked Data archive
Reproducibility with 
the 99 cents Linked Data archiveReproducibility with 
the 99 cents Linked Data archive
Reproducibility with 
the 99 cents Linked Data archiveMiel Vander Sande
 
Innovatiemarkt 2017: Machines are the new digital natives
Innovatiemarkt 2017: Machines are the new digital nativesInnovatiemarkt 2017: Machines are the new digital natives
Innovatiemarkt 2017: Machines are the new digital nativesMiel Vander Sande
 
A sweet affordable combo for Linked Data Archives
A sweet affordable combo for Linked Data ArchivesA sweet affordable combo for Linked Data Archives
A sweet affordable combo for Linked Data ArchivesMiel Vander Sande
 
Machines are the new Digital Natives
Machines are the new Digital NativesMachines are the new Digital Natives
Machines are the new Digital NativesMiel Vander Sande
 
Time travelling through DBpedia
Time travelling through DBpediaTime travelling through DBpedia
Time travelling through DBpediaMiel Vander Sande
 
Opportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataOpportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataMiel Vander Sande
 
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)Miel Vander Sande
 
The Story behind Everything Is Connected: Multimedia narration of automatical...
The Story behind Everything Is Connected: Multimedia narration of automatical...The Story behind Everything Is Connected: Multimedia narration of automatical...
The Story behind Everything Is Connected: Multimedia narration of automatical...Miel Vander Sande
 
LDOW2013 r&wbase: git for triples
LDOW2013 r&wbase: git for triplesLDOW2013 r&wbase: git for triples
LDOW2013 r&wbase: git for triplesMiel Vander Sande
 
PMOD Challenges for Open Data Usage: Open derivatives and challenges
PMOD Challenges for Open Data Usage: Open derivatives and challengesPMOD Challenges for Open Data Usage: Open derivatives and challenges
PMOD Challenges for Open Data Usage: Open derivatives and challengesMiel Vander Sande
 
Aan de slag met Linked Open Data
Aan de slag met Linked Open DataAan de slag met Linked Open Data
Aan de slag met Linked Open DataMiel Vander Sande
 
The DataTank: an Open Data adapter with semantic output
The DataTank: an Open Data adapter with semantic outputThe DataTank: an Open Data adapter with semantic output
The DataTank: an Open Data adapter with semantic outputMiel Vander Sande
 

More from Miel Vander Sande (18)

20230525_mmc_seminar.pdf
20230525_mmc_seminar.pdf20230525_mmc_seminar.pdf
20230525_mmc_seminar.pdf
 
The Memento protocol
The Memento protocolThe Memento protocol
The Memento protocol
 
Slight change of plans!
Slight change of plans!Slight change of plans!
Slight change of plans!
 
Preserving a Web of Linked Data: Lessons and challenges from a fading web
Preserving a Web of Linked Data: Lessons and challenges from a fading webPreserving a Web of Linked Data: Lessons and challenges from a fading web
Preserving a Web of Linked Data: Lessons and challenges from a fading web
 
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...
PhD Defense: Metadata and Control Features for Low-Cost Linked Data Publishin...
 
Reproducibility with 
the 99 cents Linked Data archive
Reproducibility with 
the 99 cents Linked Data archiveReproducibility with 
the 99 cents Linked Data archive
Reproducibility with 
the 99 cents Linked Data archive
 
Innovatiemarkt 2017: Machines are the new digital natives
Innovatiemarkt 2017: Machines are the new digital nativesInnovatiemarkt 2017: Machines are the new digital natives
Innovatiemarkt 2017: Machines are the new digital natives
 
A sweet affordable combo for Linked Data Archives
A sweet affordable combo for Linked Data ArchivesA sweet affordable combo for Linked Data Archives
A sweet affordable combo for Linked Data Archives
 
Machines are the new Digital Natives
Machines are the new Digital NativesMachines are the new Digital Natives
Machines are the new Digital Natives
 
Time travelling through DBpedia
Time travelling through DBpediaTime travelling through DBpedia
Time travelling through DBpedia
 
Opportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership MetadataOpportunistic Linked Data Querying through Approximate Membership Metadata
Opportunistic Linked Data Querying through Approximate Membership Metadata
 
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)
Publish data as Time Consistent Web API based on Provenance (WS-REST 2014)
 
The Story behind Everything Is Connected: Multimedia narration of automatical...
The Story behind Everything Is Connected: Multimedia narration of automatical...The Story behind Everything Is Connected: Multimedia narration of automatical...
The Story behind Everything Is Connected: Multimedia narration of automatical...
 
LDOW2013 r&wbase: git for triples
LDOW2013 r&wbase: git for triplesLDOW2013 r&wbase: git for triples
LDOW2013 r&wbase: git for triples
 
PMOD Challenges for Open Data Usage: Open derivatives and challenges
PMOD Challenges for Open Data Usage: Open derivatives and challengesPMOD Challenges for Open Data Usage: Open derivatives and challenges
PMOD Challenges for Open Data Usage: Open derivatives and challenges
 
Aan de slag met Linked Open Data
Aan de slag met Linked Open DataAan de slag met Linked Open Data
Aan de slag met Linked Open Data
 
The DataTank: an Open Data adapter with semantic output
The DataTank: an Open Data adapter with semantic outputThe DataTank: an Open Data adapter with semantic output
The DataTank: an Open Data adapter with semantic output
 
Follow the stars 25/11/2011
Follow the stars 25/11/2011Follow the stars 25/11/2011
Follow the stars 25/11/2011
 

The Terminator's origins or how the Semantic Web could endanger Humanity.

  • 1. Miel Vander Sande [@Miel_vds] TERMINATOR’S ORIGINS or how the semantic web could endanger humanity
  • 2. Working on the Semantic Web ‘s bright future
  • 3. is also working on the Semantic Web‘s dark side
  • 6. Content Content Content Content A A Ageneration Automatic rule based content A Intelligent and generic agents Content High quality Linked Data A big chunk is social data A Ginormous Linked Open Data cloud
  • 7. Force false knowledge extraction Manipulate semantic driven tasks { ?x ex:Article ?y. ?y ex:subject dbpedia:Barack_Obama. If type == ex:FrontPage } => #create html to present article { ?x ex:category ex:FrontPage }. { ?x a ex:Article . => { ?x rdfs:comment “<script> … open websocket … </script>” }.
  • 8. ”One of the defining characteristics of a successful information system is its level of exploitation by spammers.” - Ian Davis
  • 9. Fully context aware, easily produced and reproduced <http://.../John> a foaf:Person; foaf:firstname “John”; foaf:knows <http://.../Marc> . Hey John, <http://.../Marc> a foaf:Person ; Marc here. I saw you ex:attends <http://.../ISWC> . attend ISWC soon. Want to join me for <http://.../ISWC> a swpo:Conference ; the concert of The swpo:hasLocation <http://.../Boston> . Who: http://spam.url <http://.../Concert_TheWho> a music:Concert ; music:venue <http://.../TD Garden> .
  • 10. Provenance manipulation fools proof and trust Data Proof & Trust WebID needs needs based on Provenance https://test.net/#mvs a prov:Person, prov:Agent; :post a prov:Entity, sioc:Post; sioc:title “Buy Mentos, the freshmaker"^^xsd:string; prov:wasAttributedTo <https://test.net/#mvs>; prov:generatedAtTime "2011-07-16T01:52:02Z"^^xsd:dateTime .
  • 11. Malicious links trick automated processes Image Worm Photogallery owl:sameAs owl:sameAs owl:sameAs A Image Image
  • 13. ”Machine intelligence is Acceptance of not human intelligence.” machine intelligence - Chris Welty Fully deployed web of things
  • 14. Judgement day? Today: drones, Stuxnet How much trust will we put in machines and the Semantic Web?
  • 15. We need to proactively brainstorm about misuse investigate fail-safe approaches discuss "acceptable machine behaviour" before it's too late? Discuss! Miel Vander Sande [@Miel_vds]
  • 16. Attributions • Photo title slide by Ujang Uung • Photo slide #1 by Cayusa • Photo slide #2 by morteza bahmani • Photo slide #3 by Hugh Hart & ed6505 • Photos slide #4 by Moyo Ogunjale & Dark Lord • Photo slide #6 by Huafeng Xie • Photo slide #14 by Universal Studios