SlideShare a Scribd company logo
1 of 49
F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 | C O
M M U N I C AT I O N S O F T H E A C M 29
V
viewpoints
P
H
O
T
O
B
Y
A
L
I
C
I
A
K
U
B
I
S
T
A
/A
N
D
R
I
J
B
O
R
Y
S
A
S
S
O
C
I
A
T
E
S
ment in our economic, social, and po-
litical history, as we mindfully navigate
human-machine interactions.
The ways in which machine sys-
tems influence our lives have become
more explicit in recent years. A chief
example that commands popular at-
tention has been IBM’s Watson, serv-
ing as an informative bellwether for
human-machine relations. Its inven-
tors and user community place Wat-
E
M E R G I N G A N X I E T I E S P E R T A I N -
I N G to the rapid advance-
ment and sophistication of
artificial intelligence appear
to be on a collision course
with historic models of human excep-
tionality and individuality. Yet it is not
just objective, technical sophistication
in the development of AI that seems to
cause this angst. It is also the linguis-
tic treatment of machine “intelli-
gence.” Headlines decry the existen-
tial threat of machines against humans
in various media outlets. But what is
really at stake?
Are we truly concerned that we will
be surpassed in our capacities as hu-
man beings? Or is rhetorical slippage
betraying age-old philosophical ques-
tions on what it really means to be hu-
man? To what degree do our shortcom-
ings in acknowledging human dignity
in all populations (regardless of skin
pigmentation, linguistic system spo-
ken, geographical location, or socio-
economic position) emerge in ques-
tions pertaining to power dynamics
between humans and machines? And
how might we usefully juxtapose a his-
toric study of our past categorical tax-
onomies of humanity to more subtly
inform our navigation of human-ma-
chine relationships? In the fall of 2017
we engaged these questions and more
with first-year students at Carnegie
Mellon University: 16 students from
the School of Computer Science and
the Robotics Institute and 16 students
from the Dietrich College of Humani-
ties and Social Sciences. In a time of ac-
celerating technological disruption,
the next generation of leaders and in-
novators are ill-equipped to navigate
this boundary chapter in human-ma-
chine relationships. Perhaps our stu-
dents can learn from how humans have
treated humans to determine viable
roadmaps for this challenging mo-
Viewpoint
Teaching Artificial
Intelligence
and Humanity
Considering rapidly evolving human-machine interactions.
DOI:10.1145/3104986 Jennifer Keating and Illah Nourbakhsh
http://dx.doi.org/10.1145/3104986
30 C O M M U N I C AT I O N S O F T H E A C M | F E
B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2
viewpoints
As humans we are readers, we cre-
ate, we imagine, we strive to under-
stand. Our individual subjectivity al-
lows us to do more than perform
specific functions. And yet, present
discourse on the potential for AI is of-
tentimes laced with echoes of our
anxieties pertaining to human dignity
and its links to work or the distinc-
tiveness of our subjectivity and agen-
cy.4 Will we be ‘bested’ by the very ma-
chines that we build? Will the next
generation of technologists be
equipped to consider these intended
and unintended consequences for the
tools they unleash? Or, for now, do we
only dream quite wildly beyond tech-
nological purviews about the actual
sophistication of these tools?
Reading
In the historical context of globaliza-
tion, labor, human dignity, and edu-
cation in the West, few rival the nar-
rative potency offered by Frederick
Douglass. In The Narrative of the Life of
Frederick Douglass, An American Slave
he writes: “Very soon after I went to
live with Mr. and Mrs. Auld, she very
kindly commenced to teach me the
A,B,C. After I had learned this, she as-
sisted me in learning to spell words of
three or four letters. Just at this point
of my progress, Mr. Auld found out
what was going on, and at once for-
bade Mrs. Auld to instruct me further,
telling her, among other things, that
it was unlawful, as well as unsafe, to
teach a slave to read.”5
The power of literacy and its capac-
ity to equip individuals with the neces-
sary tools to dismantle exploitative
and unjust systems of power are illus-
trated in Douglass’ work. His capacity
to articulate the features of a power
negotiation that undermines the very
core of the master-slave relationship
in a post-Enlightenment era is cap-
tured in a human capacity to learn. In
the context of the West and its politi-
cal and social systems, literacy is an
opportunity to assert agency. But hu-
man-to-human capacities to assert
equality, to facilitate Douglass’ ability
to be ‘of no value to his master,’ to ren-
der him to be ‘forever unfit … to be a
slave’ due to his capacity to read, are
not the tenets used to describe ten-
sions between an AI machine and the
tool’s “master” [read programmer or
son’s clinical knowledge squarely with-
in the social context of the medical
community, ascribing agency and a ca-
pacity to learn to a sophisticated ma-
chine with a human name: “Nobody can
read it all,” Miyano said. “We feel we are
a frog in the bottom of the well. Under-
standing cancer is beyond a human be-
ing’s ability, but Watson can read, un-
derstand and learn. Why not use it?”6
Watson’s capacity to process data
rivals that of a practicing physician
and, in some domains, outpaces hu-
man abilities. It is positioned as a
tool that will rival human capacities
in diagnostics to serve as release
time for the practicing physician to
dedicate more time, energy and in-
tellectual bandwidth to patient-phy-
sician interactions. The optimized
functions of the Watson apparatus
have limitations but they are certain-
ly becoming more sophisticated rap-
idly: “Before the computer can make
real-life clinical recommendations,
it must learn to understand and ana-
lyze medical information, just as it
once learned to ask the right ques-
tions on “Jeopardy!” … The famed
cancer institute [Memorial Sloan-
Kettering] has signed up to be Wat-
son’s tutor, feeding it clinical infor-
mation extracted from real cases
and then teaching it how to make
sense of the data. ‘The process of
pulling out two key facts from a
“Jeopardy!” clue is totally different
from pulling out all the relevant infor-
mation, and its relationships, from a
medical case … Sometimes there is
conflicting information. People
phrase things different ways.’”2
Read, Understand, Learn
IBM’s Watson is personified as an
independent agent in most press cov-
erage. In contrast, at expert confer-
ences like the “Humans, Machines
and the Future of Work” conference
at Rice University, AI systems like
Watson are described as tools. Per-
sonification is more tightly regulated
when discussed or presented to tech-
nologists who are not beholden to the
mysteries of the black box, but rather
its deconstruction into computation-
al techniques. In the public domain,
however, journalists ascribe person-
hood to the learning machine, which
is not necessarily corrected by engi-
neers or physicians, by describing the
machine’s functions as reading and
learning. Is Watson’s information
processing and model-building truly
reading or understanding? Does such
a machine learn? Why do we ascribe
features historically associated with
humanity, subjectivity, and notions
of a human self to built machines?
And what chapters of human interre-
lationships are threatened when we
readily ascribe human characteris-
tics to engineered systems?
Our society is locked in a stance of
both anxiety and ambition in regard
to the future of AI. We believe it is cru-
cial that students embarking on un-
dergraduate studies, as budding tech-
nologists, writers, policymakers, and
a myriad of other future leadership
roles, should be better equipped and
better practiced in engaging these dif-
ficult questions. As automation will
be a distinguishing feature in the next
chapter of global economies, under-
employment threatens the dignity of
much of our human labor force. Yet
as humans, most individuals would
argue they are considerably more
than a simple labor force driving a (al-
beit pervasive and powerful) global
economy. An insistence on our capac-
ity to be more than what we might
produce as commodities in a market
is a distinguishing feature of human
dignity in the 21st century. This is a
concept, however, that needs to be
tested, explored and seriously consid-
ered as students prepare to enter this
labor force and shape its direction for
the coming generations.
Our society
is locked in
a stance
of both anxiety
and ambition
in regard to
the future of AI.
F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 | C O
M M U N I C AT I O N S O F T H E A C M 31
viewpoints
user]. In the context of Douglass’ nar-
rative, the prospect of literacy sug-
gests the slave as worth more than his
or her labor. Instead, the slave’s ca-
pacity to learn, to engage in civilized
discourse by joining what Benedict
Anderson calls “an imagined commu-
nity,” suggests his equal position with
other members of the society in con-
trast to the juridical category of slave
as property.1 It is not the same scenar-
io with AI because the machine is not
human, although they are becoming
increasingly social. This is relevant be-
cause for a long period (arguably a pe-
riod that we still occupy) humans have
treated other humans as tools. The in-
stitution of slavery, and its cousin in
European colonial systems world-
wide, used humans as machines com-
posing a labor force. These were be-
ings who were not extended existential
features like agency, subjectivity, indi-
viduality, or intelligence. As Joseph
Conrad wrote in Heart of Darkness, the
enslaved Congolese were “black shad-
ows,” they were “bundles of acute an-
gles sat with their legs drawn up.”3
Reading, however, marks agency
for Douglass. Reading, in the context
of an AI system, suggests anthropo-
morphic undertones and perhaps hu-
manity. The hierarchical power rela-
tionships suggested in these examples
are not in the service of hyperbole.
The themes they introduce are also
not entirely new. The historical analy-
sis of human subjugation offers a rich
tapestry regarding agency, identity, au-
tonomy, labor, dignity and citizenry—
issues at the heart of how future AI
systems and humans will interrelate
in our near future. Reading and learn-
ing, the very verbs ascribed today to
Watson, are central to Frederick Dou-
glass’ discovery of the ways in which
illiteracy in enslaved populations re-
inforces the hegemonic power struc-
ture of the master-slave dynamic be-
fore abolition. Through reading,
Douglass asserts his freedom in deed
if not in legal standing.
Understanding
Ascription of features like inconsis-
tency, induction and emotion to ma-
chines prematurely suggests essential
human characteristics upon our inven-
tions. Yet technologists forge ahead,
projecting personhood and agency,
coupled with anxiety and uncertainty,
upon machines. Even in the case of ear-
ly light-seeking robots in 1950, W. Grey
Walter recognized elements of human
psychology, from free will to personal-
ity: “… the uncertainty, randomness,
free will or independence so strikingly
absent in most well-designed ma-
chines. The fact that only a few richly
interconnected elements can provide
practically infinite modes of existence
suggests that there is no logical or ex-
perimental necessity to invoke more
than ‘number’ to account for our sub-
jective conviction of freedom of will
and our objective awareness of per-
sonality in our fellow men.”7
Core human characteristics be-
come terms for making sense of com-
plex robotic behavior, as if complexity
is sufficient to justify giving our ma-
chines subjectivity. Today, serious le-
gal experts are considering granting
personhood to self-driving automo-
biles, because these AI-driven ma-
chines will be so socially integrated
into our transportation infrastructure
that they need to be individually liable
for accidents. Notably, corporations
were historically granted limited per-
sonhood to shield individual humans
from responsibility and blame; per-
sonhood ascribed to AI similarly
shields both corporations and engi-
neers. Personification trades account-
ability with convenience for tort and
liability, and further with product
marketing. Watson, for instance, is
named as one technology product
across many use cases; but in reality,
each disciplinary version of Watson is
a separate, custom-made instantia-
tion with its own silo of AI, data store,
and interface.
Core human
characteristics
become terms
for making sense
of complex
robotic behavior.
Calendar
of Events
February 5–9
WSDM 2018: The 11th ACM
International Conference on
Web Search and Data Mining,
Marina Del Rey, CA,
Co-Sponsored: ACM/SIG,
Contact: Yi Chang,
Email: [email protected]
February 21–24
SIGCSE ‘18: The 49th ACM
Technical Symposium on
Computing Science Education,
Baltimore, MD,
Sponsored: ACM/SIG,
Contact: Tiffany Barnes,
Email: [email protected]
February 24–28
CGO ‘18: 16th Annual IEEE/ACM
International Symposium
on Code Generation and
Optimization,
Vösendorf/Vienna, Austria,
Contact: Jens Knoop,
Email: [email protected]
tuwien.ac.at
February 24–28
PPoPP ‘18: 23nd ACM SIGPLAN
Symposium on Principles
and Practice of Parallel
Programming,
Vienna, Austria,
Co-Sponsored: ACM/SIG,
Contact: Andreas Krall,
Email: [email protected]
ac.at
February 25–27
FPGA ‘18: The 2018 ACM/SIGDA
International Symposium
on Field-Programmable
Gate Arrays,
Monterey, CA,
Sponsored: ACM/SIG,
Contact: Jason Anderson,
Email: [email protected]
edu
March
March 5–8
HRI ‘18: ACM/IEEE
International Conference on
Human-Robot Interaction,
Chicago, IL,
Contact: Takayuki Kanda,
Email: [email protected]
32 C O M M U N I C AT I O N S O F T H E A C M | F E
B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2
viewpoints
contemporary consideration of hu-
man relationships to machines. We
take inspiration from Raymond Wil-
liams’ Keywords and the Key Words
Project (http://www.kewords.pitt.edu)
to create a conceptual structure of core
themes that will guide the semester
(see the accompanying table).
In this interdisciplinary course,
students will be introduced to both
the historical development of AI and
to the current state of the art. As we
engage with core themes of power
negotiations, political implications
for advancing technology, and cul-
tural response, students will use ter-
minology from Key Words to build
conceptual maps that make sense
of technological advances and their
societal implications. Students will
develop mixed media ‘futuring’ as-
signments by semester’s end that
offer speculations on the future of
human relationships to machines.
Working in groups, they will create
their own narratives, synthesizing
a future ethic based on course ma-
terials and explorations. While this
course is a first experiment in con-
necting the freshman experience to
socio-technical issues relevant to
all, we hope that several iterations
of course refinement and deployment
will yield an approach that can serve
as a valuable scaffold for AI and hu-
manity across institutions.
References
1. Anderson, B. Imagined Communities. Verso, London, 1991.
2. Cohn, J. The robot will see you now. Atlantic. (Mar. 2013).
3. Conrad, J. Heart of Darkness. Bantam Books, NY,
1981, 26–27.
4. Deleuze, G. and Foucault, M. Intellectuals and power:
A conversation between Michel Foucault and Gilles
Deleuze. L’Arc (Mar. 4, 1972).
5. Douglass, F. Narrative of the Life of Frederick Douglass,
an American Slave. Penguin Books, NY, 1982, 78.
6. Gaudin, S. IBM: In 5 years, Watson A.I. will be behind
our every decision. Computerworld (Oct. 27, 2016).
7. Grey, W. An imitation of life. Scientific American
(1950), 42–45.
8. Williams, R. Keywords: A Vocabulary of Culture and
Society. Oxford University Press, Oxford, 1983.
Jennifer Keating ([email protected]) is
Assistant Dean for Educational Initiatives in
Dietrich College, Carnegie Mellon University.
Illah Nourbakhsh ([email protected]) is
Professor of Robotics at The Robotics Institute,
Carnegie Mellon University.
Copyright held by authors.
Learning
Rapid progress in AI/machine learn-
ing and its central role in our social,
economic, and political culture sig-
nals its salience to the next genera-
tion of students entering universi-
ties. Building next-generation AI is
currently a hot topic. At Carnegie
Mellon, we have no trouble filling
such classes. And yet, a nuanced
understanding of the contributions
that technologists are currently mak-
ing to the world, an indication of how
the next generation of computer sci-
entists, engineers, and roboticists
might shape the world that human-
ists and social scientists study, is not
at the forefront of our undergradu-
ates’ minds. So, how might we en-
sure this is something they consider
throughout their undergraduate
career? And that, instead, societal
consideration shapes their under-
graduate studies from their first year
onward? We propose to introduce AI
and Humanity in the first term of the
undergraduate career. Humanities
students will sit in class beside their
colleagues from the Robotics Insti-
tute and the School of Computer Sci-
ence. They will be taught each class by
a team of faculty with an intertwined
pedagogical approach: a roboticist
and a humanist.
Artificial Intelligence & Humanity
is part of a new fleet of first-year
courses called Dietrich College Grand
Challenge Interdisciplinary Fresh-
man Seminars. These encourage fac-
ulty teams to propose courses that at-
tend to historically persistent
problems facing humanity, demon-
strating an interdisciplinary ap-
proach to attending to these prob-
lems whose solutions continue to
elude us or demonstrate boundary
work that a single discipline is often
ill-equipped to solve. By harnessing
the methodological approaches of
various disciplines to demonstrate
the complexity and the range of ap-
proaches to problem solving in the
academy, students are exposed to ar-
gumentative structures and efforts to
juxtapose historical human-to-hu-
man relationships with future narra-
tives of human-to-AI relations.
In Artificial Intelligence & Humanity,
students will respond to historical
examples of negotiations of power
between individuals and communi-
ties, then develop language to de-
scribe contemporary and historical
taxonomies of human-to-human
and human-to-machine power rela-
tionships. Starting with a survey of
narrative forms that explore human
relationships that include written
memoirs, dystopian television
shows, documentary films and sci-
ence fiction novels, students will
consider the various ways in which
we narrate our relationships between
humans from a variety of perspec-
tives. They will consider how these
relationships might manifest in our
Sample of syllabus keywords (left column) and related materials
for analysis in seminar
(from Williams8).
Agency Frederick Douglass: Narrative of the Life of Frederick
Douglass,
an American Slave
Black Mirror: Men Against Fire
Self Black Mirror: Be Right Back
Jerrold Seigel: The Idea of the Self
Technology Adam Hochschild: Bury the Chains
Werner Herzog: Lo and Behold
Equality and
Exploitation
Andrew McAfee: The Second Machine Age
Star Trek: The Measure of a Man
Surveillance Minority Report
Ian Ayres: Super Crunchers
Labor and
Digital Labor
Joseph Conrad: Heart of Darkness
Simon Head: Mindless, Why Smarter Machines are Making
Dumber Humans
Citizen Kurt Vonnegut: Player Piano
Black Mirror: Hated in the Nation
Narrative Richard Powers: Plowing the Dark
David Herman: The Cambridge Companion to Narrative
Copyright of Communications of the ACM is the property of
Association for Computing
Machinery and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
20 COMMUNICATIONS OF THE ACM | NOVEMBER
2016 | VOL. 59 | NO. 11
V
viewpoints
Privacy and Security
Cyber Defense Triad for
Where Security Matters
Dramatically more trustworthy cyber security is a choice.
confident that from the standpoint of
technology there is a good chance for
secure shared systems in the next few
years. However, from a practical stand-
point the security problem will remain
as long as manufacturers remain com-
mitted to current system architectures,
produced without a firm requirement
for security. As long as there is support
for ad hoc fixes and security packages
for these inadequate designs, and as
long as the illusory results of penetra-
tion teams are accepted as a demon-
stration of computer system security,
proper security will not be a reality.”8
Current Approaches
Aren’t Working
Our confidence in “security kernel”
technology was well founded, but I
never expected decades later to find
the same denial of proper security so
widespread. Although Forbes reports
spending on information security
reached $75 billion for 2015, our ad-
versaries are still greatly outpacing us.
With that large financial incentive for
vested interests, resources are mostly
devoted to doing more of what we knew
didn’t work then, and still doesn’t.
I
N THE EARLY days of computers,
security was easily provided
by physical isolation of ma-
chines dedicated to security do-
mains. Today’s systems need
high-assurance controlled sharing
of resources, code, and data across
domains in order to build practical
systems. Current approaches to cyber
security are more focused on saving
money or developing elegant techni-
cal solutions than on working and
protecting lives and property. They
largely lack the scientific or engi-
neering rigor needed for a trustwor-
thy system to defend the security of
networked computers in three dimen-
sions at the same time: mandatory ac-
cess control (MAC) policy, protection
against subversion, and verifiability—
what I call a defense triad.
Fifty years ago the U.S. military rec-
ognized subversiona as the most seri-
ous threat to security.
Solution
s such
as cleared developers and technical
a As characterized by Anderson, et al.,2 “System
subversion involves the hiding of a software or
hardware artifice in the system that creates a
‘backdoor’ known only to the attacker.”
development processes were neither
scalable nor sustainable for advanc-
ing computer technology and growing
threats. In a 1972 workshop, I pro-
posed “a compact security ‘kernel’ of
the operating system and supporting
hardware—such that an antagonist
could provide the remainder of the sys-
tem without compromising the protec-
tion provided.” I concluded: “We are
DOI:10.1145/3000606 Roger R. Schell
The security problem
will remain as long
as manufacturers
remain committed
to current system
architectures,
produced without
a firm requirement
for security.
http://dx.doi.org/10.1145/3000606
NOVEMBER 2016 | VOL. 59 | NO. 11 |
COMMUNICATIONS OF THE ACM 21
viewpoints
V
I
M
A
G
E
B
Y
A
L
I
C
I
A
K
U
B
I
S
T
A
/A
N
D
R
I
J
B
O
R
Y
S
A
S
S
O
C
I
A
T
E
S
of “malware,” a preferred attack for
many of the most serious breaches.
An IBM executive a few years ago de-
scribed the penetrate-and-patch cycle
as “an arms race we cannot win.”5
Why does cyber security seem so
difficult? Today’s emphasis on sur-
veillance and monitoring tries to
discover that an adversary has found
and exploited a vulnerability to pen-
etrate security and cause damage—or
worse, subverted the security mecha-
nism itself. Then that hole is patched.
But science tells us trying to make a
system secure in this way is effectively
non-computable. Even after fixing
known flaws, uncountable flaws re-
main. Recently, Steven Lipner, for-
merly of Microsoft, wrote a Commu-
nications Privacy and Security column
advocating technical “secure develop-
ment processes.”6 But, similar to sur-
veillance, “as new classes of vulner-
abilities … are discovered, the process
must be updated.”
This paradigm has for decades been
known as “penetrate and patch.” The
defender needs to find and patch most
(if not all) of the holes, while the adver-
sary only needs to find and exploit one
remaining hole. Even worse, a witted
adversary has numerous opportunities
to subvert or sabotage a computer’s
protection software itself to introduce
insidious new flaws. This is an example
Figure 1. Cyber security defense triad.
V
e
rifi
a
b
ility
Secure Systems
L
im
it S
u
b
ve
rsio
n
M
a
n
d
a
to
ry A
C
˲ Subversion is tool for choice for witted adversary
˲ Only label-based MAC policy can enforce secure
information flow
˲ Security kernel (reference monitor) is only known
verifiable protection technology
22 COMMUNICATIONS OF THE ACM | NOVEMBER
2016 | VOL. 59 | NO. 11
viewpoints
These systems did not survive long
after the end of the Cold War, and
much of the “institutional memory”
is now lost. But fortunately, some
security kernel products were main-
tained and this original equipment
manufacturer (OEM) technology is
still commercially available today.
And many commodity processors (for
example, those that implement the
Intel IA32 architecture) still include
the hardware segmentation and pro-
tection rings essential to efficient se-
curity kernels. High assurance of no
security patches is truly a paradigm
shift. What alternative approach
comes close?
Mark Heckman of the University
of San Diego and I recently published
a paper focused on techniques for
applying those Reference Monitor
properties, leveraging the fact that
“associated systematic security engi-
neering and evaluation methodology
was codified as an engineering stan-
dard in the Trusted Computer System
Evaluation Criteria (TCSEC)”4 created
by NSA. However, the TCSEC didn’t in-
clude administration and acquisition
mandates to actually use this knowl-
edge to create a market in the face of
entrenched vested interests. I refer in-
terested readers to our paper for more
details on the triad components sum-
marized here.
˲ Mitigating software subversion.
Several cyber security professionals
have concluded that subversion “is the
attack of choice for the professional
attacker.”2 The primary means for
software subversion are Trojan horses
and trap doors (commonly called mal-
ware). Under the seven well-defined se-
curity classes in the TCSEC, only Class
A1 systems substantially deal with the
problems of subversion.
˲ Mandatory access control (MAC)
policy. The reference monitor is fun-
damentally about access control. All
access control policies fall into two
classes: Discretionary Access Control
(DAC) and MAC. Only a label-based
MAC policy can, with high assurance,
enforce secure information flow. Even
in the face of Trojan horses and other
forms of malicious software, MAC
policies can protect against unau-
thorized modification of information
(integrity), as well as unauthorized
disclosure (confidentiality).
Cyber Defense Triad
for Secure Systems
All three defense triad components are
critical for defense of both confiden-
tiality and integrity of information—
whether the sensitive information is
personally identifiable information,
financial transactions (for example,
credit cards), industrial control sys-
tems in the critical infrastructure, or
something else that matters. Although
not sufficient for perfect security, all
three are practically necessary. These
dimensions can be thought of as three
strong “legs of a stool,” as illustrated in
Figure 1.
Security for cyber systems built
without a trustworthy operating sys-
tem (OS) is simply a scientific impos-
sibility. NIST has emphasized, “se-
curity dependencies in a system will
form a partial ordering … The partial
ordering provides the basis for trust-
worthiness reasoning.”3 Proven sci-
entific principles of the “Reference
Monitor” model enable engineering a
verifiably secure OS on which we can
build secure cyber systems.
For a Reference Monitor implemen-
tation to work, it must ensure three
fundamental properties. First, it must
validate enforcement of the security
policy for every reference to informa-
tion. Second, it must be tamper-proof,
that is, it cannot be subverted. Lastly,
it must be verifiable, so we have high
assurance it always works correctly.
These three fundamental properties
are directly reflected in the cyber de-
fense triad.
As illustrated in Figure 2, a Refer-
ence Monitor controls access by sub-
jects to information in objects. A secu-
rity kernel is a proven way to implement
a reference monitor in a computer.
Whenever a user (or program acting on
behalf of a user) attempts to access in-
formation in the computer system, the
Reference Monitor checks the user’s
clearance against a label indicating the
sensitivity of that class of data. Only au-
thorized users are granted access.
Applying the Cyber Defense Triad
The flawed foundation of current sys-
tems is evident in the unending stream
of OS security patches that are today
considered part of best practices. But
we can choose a better alternative.
At least a half-dozen security kernel-
based operating systems have been
produced that ran for years (even de-
cades) in the face of nation-state ad-
versaries without a single reported
security patch.7 These successes were
not unexpected. As a 1983 article put it,
“the security kernel approach provides
controls that are effective against most
internal attacks—including some that
many designers never consider.”1 That
is a fundamentally different result than
penetrate and patch.
Figure 2. Reference monitor.
˲ A subject security attributes,
for example, label for clearance
˲ Object security attributes,
for example, label for
classification
˲ Segments
˲ Directories
˲ Passive data
repositories
˲ Record of all security-
related user events
˲ Active entities
˲ User Processes
˲ Gain access to
information
on user’s behalf
Authorization Database
Reference MonitorSubjects Objects
Audit Trail
NOVEMBER 2016 | VOL. 59 | NO. 11 |
COMMUNICATIONS OF THE ACM 23
viewpoints
Lipner asserts that this reference
monitor approach is “not able to cope
with systems large enough to be use-
ful.”6 Heckman and I respond that
“this quite widely-spread assertion has
been repeatedly disproven by counter-
examples from both real systems and
research prototypes.”4 The paper gives
numerous examples of how, by leverag-
ing MAC, complex integrated systems
can be composed from logically distinct
hardware and software components
that may have various degrees of secu-
rity assurance or no assurance at all.
˲ Verifiability. The Reference Moni-
tor implementation defined as a securi-
ty kernel is the only proven technology
for reliably achieving verifiable protec-
tion. It does not depend on unproven
elegant technical solutions, such as
open source for “source code inspec-
tion” or “gratuitous formal methods.”2
Security kernels have been shown to
be effective for systematic, repeatable,
systems-oriented security evaluation of
large, distributed, complex systems.
Lipner in his paper6 asks a critical,
but largely unanswered, question: How
can customers have any assurance
that they are getting a secure system?
His answer is limited to development
process improvements that don’t ad-
dress fundamentally what it means
for a system to be “secure.” Heckman,
by contrast, details how the Reference
Monitor approach, with its strong defi-
nition of “secure system,” can answer
precisely that question.4
What Should We Do Then?
It can be expected to take 10–15 years
and tens of millions of dollars to build
and evaluate a high-assurance secu-
rity kernel. However, once completed,
a general-purpose security kernel is
highly reusable for delivering a new
secure system in a couple of years. It
is economical to use the same ker-
nel in architectures for a wide variety
of systems, and the TCSEC’s Ratings
Maintenance Phase (RAMP) allows the
kernel to be re-verified using the latest
technology, without the same invest-
ment as the original evaluation. Heck-
man summarizes several real-world ex-
amples where, “This is demonstrated
by OEM deployments of highly secure
systems and products, ranging from
enterprise ‘cloud technology’ to gener-
al-purpose database management sys-
tems (DBMS) to secure authenticated
Internet communications, by applying
commercially available security kernel
technology.”4 Heckman additionally
describes completed research proto-
types in the past few years for things
like source-code compatible secure
Linux and a standards-compliant high-
ly secure Network File Service (NFS).
A first necessary step is to identify
where high-assurance security mat-
ters for a system. As just one example,
several U.S. government leaders have
expressed concern that we face an exis-
tential cyber security threat to industri-
al control systems (ICS) in the critical
infrastructure, such as the power grid.
Use of an integrity MAC security ker-
nel can within a couple of years make
our critical infrastructure dramatically
more trustworthy. The U.S. government
has a unique opportunity to change the
cyber security game and should aggres-
sively engage ICS manufacturers by
sponsoring prototypes and providing a
market using proven commercial secu-
rity kernel OEM technology. Otherwise,
costs may soon be measured in lives in-
stead of bits or dollar signs.
References
1. Ames Jr, S.R., Gasser, M., and Schell, R.R. Security
kernel design and implementation: An introduction.
Computer 16, 7 (1983), 14–22.
2. Anderson, E.A., Irvine, C.E., and Schell, R.R.
Subversion as a threat in information warfare. J. Inf.
Warfare 3 (2004), 51–64.
3. Clark, P., Irvine, C. and Nguyen, T. Design Principles for
Security. NIST Special Publication 800-160, September
2016, pp. 207-221; http://csrc.nist.gov/publications/
drafts/800-160/sp800_160_final-draft.pdf
4. Heckman, M.R. and Schell, R.R. Using proven
reference monitor patterns for security evaluation.
Information 7, 2 (Apr. 2016); http://dx.doi.org/10.3390/
info7020023
5. Higgins, K.J. IBM: The security business ‘has no
future.’ Information Week Dark Reading, (4/10/2008);
http://www.darkreading.com/ibm-the-security-
business-has-no-future/d/d-id/1129423
6. Lipner, S.B. Security assurance. Commun. ACM 58, 11
(Nov. 2015), 24–26.
7. Schell, R.R. A University Education Cyber Security
Paradigm Shift. Presented at the National Initiative
for Cybersecurity Education (NICE), (San Diego, CA,
Nov. 2015); https://www.fbcinc.com/e/nice/ncec/
presentations/2015/Schell.pdf
8. Schell, R.R., Downey, P.J. and Popek, G.J. Preliminary
Notes on the Design of Secure Military Computer
Systems. ESD, Air Force Systems Command,
Hanscom AFB, MA. [MCI-73-1], Jan 1973; http://csrc.
nist.gov/publications/history/sche73.pdf
Roger R. Schell ([email protected]) is president of
Aesec Corporation, and is currently a Distinguished
Fellow at the University of San Diego Center for Cyber
Security Engineering and Technology. Previously he
was a Professor of Engineering Practice at University of
Southern California.
The author wishes to thank Michael J. Culver,
Mark R. Heckman, and Edwards E. Reed for their
valuable feedback on an early draft of this Viewpoint.
Copyright held by author.
Calendar
of Events
November 2–4
VRST ‘16: 22th ACM Symposium
on Virtual Reality Software
and Technology
Garching bei München,
Germany,
Co-Sponsored: ACM/SIG,
Contact: Gudrun J. Klinker,
Email: [email protected]
November 6–9
ISS ‘16: Interactive Surfaces
and Spaces Surfaces
Niagara Falls, ON, Canada,
Sponsored: ACM/SIG,
Contact: Mark Hancock,
Email: [email protected]
November 6–9
SIGUCCS ‘16: ACM SIGUCCS
Annual Conference
Denver, CO,
Sponsored: ACM/SIG,
Contact: Laurie J. Fox,
Email: [email protected]
November 7–10
ICCAD ‘16: IEEE/ACM
International Conference on
Computer-Aided Design
Austin, TX,
Co-Sponsored: Other Societies,
Contact: Frank Liu,
Email: [email protected]
November 12–16
ICMI ‘16: International
Conference
on Multimodal Interaction
Tokyo, Japan,
Sponsored: ACM/SIG,
Contact: Yukiko Nakano,
Email: [email protected]
November 13–16
GROUP ‘16: 2016 ACM
Conference
on Supporting Groupwork
Sanibel Island, FL,
Sponsored: ACM/SIG,
Contact: Stephan Lukosch,
Email: [email protected]
Copyright of Communications of the ACM is the property of
Association for Computing
Machinery and its content may not be copied or emailed to
multiple sites or posted to a
listserv without the copyright holder's express written
permission. However, users may print,
download, or email articles for individual use.
20 COMMUNICATIONS OF THE ACM | NOVEMBER
2016 | VOL. 59 | NO. 11
V
viewpoints
Privacy and Security
Cyber Defense Triad for
Where Security Matters
Dramatically more trustworthy cyber security is a choice.
confident that from the standpoint of
technology there is a good chance for
secure shared systems in the next few
years. However, from a practical stand-
point the security problem will remain
as long as manufacturers remain com-
mitted to current system architectures,
produced without a firm requirement
for security. As long as there is support
for ad hoc fixes and security packages
for these inadequate designs, and as
long as the illusory results of penetra-
tion teams are accepted as a demon-
stration of computer system security,
proper security will not be a reality.”8
Current Approaches
Aren’t Working
Our confidence in “security kernel”
technology was well founded, but I
never expected decades later to find
the same denial of proper security so
widespread. Although Forbes reports
spending on information security
reached $75 billion for 2015, our ad-
versaries are still greatly outpacing us.
With that large financial incentive for
vested interests, resources are mostly
devoted to doing more of what we knew
didn’t work then, and still doesn’t.
I
N THE EARLY days of computers,
security was easily provided
by physical isolation of ma-
chines dedicated to security do-
mains. Today’s systems need
high-assurance controlled sharing
of resources, code, and data across
domains in order to build practical
systems. Current approaches to cyber
security are more focused on saving
money or developing elegant techni-
cal solutions than on working and
protecting lives and property. They
largely lack the scientific or engi-
neering rigor needed for a trustwor-
thy system to defend the security of
networked computers in three dimen-
sions at the same time: mandatory ac-
cess control (MAC) policy, protection
against subversion, and verifiability—
what I call a defense triad.
Fifty years ago the U.S. military rec-
ognized subversiona as the most seri-
ous threat to security.

More Related Content

Similar to F E B R U A R Y 2 0 1 8 V O L . 6 1 N O . 2 .docx

KMYQ7_Futures Interrupted
KMYQ7_Futures InterruptedKMYQ7_Futures Interrupted
KMYQ7_Futures Interrupted
Sakti Nuzan
 
Essays Of Mice And Men
Essays Of Mice And MenEssays Of Mice And Men
Essays Of Mice And Men
Mariah Stout
 

Similar to F E B R U A R Y 2 0 1 8 V O L . 6 1 N O . 2 .docx (17)

Philosophy of Technology
Philosophy of TechnologyPhilosophy of Technology
Philosophy of Technology
 
Policy article review please answer the following questions regar
Policy article review please answer the following questions regarPolicy article review please answer the following questions regar
Policy article review please answer the following questions regar
 
From Humanities to Metahumanities: Transhumanism and the Future of Education....
From Humanities to Metahumanities: Transhumanism and the Future of Education....From Humanities to Metahumanities: Transhumanism and the Future of Education....
From Humanities to Metahumanities: Transhumanism and the Future of Education....
 
Reading Data Selves
Reading Data SelvesReading Data Selves
Reading Data Selves
 
Computing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBMComputing, cognition and the future of knowing,. by IBM
Computing, cognition and the future of knowing,. by IBM
 
Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...Learning to trust artificial intelligence systems accountability, compliance ...
Learning to trust artificial intelligence systems accountability, compliance ...
 
Open Data and Media Literacies: Educating for Democracy
Open Data and Media Literacies: Educating for Democracy Open Data and Media Literacies: Educating for Democracy
Open Data and Media Literacies: Educating for Democracy
 
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
 
Ethics and AI
Ethics and AIEthics and AI
Ethics and AI
 
Essay On Role Of Youth In India
Essay On Role Of Youth In IndiaEssay On Role Of Youth In India
Essay On Role Of Youth In India
 
Artificial Flesh Rights And New Technologies Of The Human In Contemporary Cu...
Artificial Flesh  Rights And New Technologies Of The Human In Contemporary Cu...Artificial Flesh  Rights And New Technologies Of The Human In Contemporary Cu...
Artificial Flesh Rights And New Technologies Of The Human In Contemporary Cu...
 
Essay Written In Third Person First Vs. Thir
Essay Written In Third Person First Vs. ThirEssay Written In Third Person First Vs. Thir
Essay Written In Third Person First Vs. Thir
 
KMYQ7_Futures Interrupted
KMYQ7_Futures InterruptedKMYQ7_Futures Interrupted
KMYQ7_Futures Interrupted
 
Essay Health Care. argumentative essay about universal healthcare
Essay Health Care. argumentative essay about universal healthcareEssay Health Care. argumentative essay about universal healthcare
Essay Health Care. argumentative essay about universal healthcare
 
Good Books Are Good Friends Essay In Tamil
Good Books Are Good Friends Essay In TamilGood Books Are Good Friends Essay In Tamil
Good Books Are Good Friends Essay In Tamil
 
Essays Of Mice And Men
Essays Of Mice And MenEssays Of Mice And Men
Essays Of Mice And Men
 
Essays Of Mice And Men.pdf
Essays Of Mice And Men.pdfEssays Of Mice And Men.pdf
Essays Of Mice And Men.pdf
 

More from lmelaine

James RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docxJames RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docx
lmelaine
 
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docxIt’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
lmelaine
 
Jaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docxJaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docx
lmelaine
 
Ive got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docxIve got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docx
lmelaine
 
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxIT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
lmelaine
 
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docxIT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
lmelaine
 

More from lmelaine (20)

Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docxJan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
 
Jan 10, 20141.Definition of law A set of rules and proced.docx
Jan 10, 20141.Definition of law A set of rules and proced.docxJan 10, 20141.Definition of law A set of rules and proced.docx
Jan 10, 20141.Definition of law A set of rules and proced.docx
 
James RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docxJames RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docx
 
Jacob claims the employer violated his rights. In your opinion, what.docx
Jacob claims the employer violated his rights. In your opinion, what.docxJacob claims the employer violated his rights. In your opinion, what.docx
Jacob claims the employer violated his rights. In your opinion, what.docx
 
Ive been promised A+ papers in the past but so far I have not seen .docx
Ive been promised A+ papers in the past but so far I have not seen .docxIve been promised A+ papers in the past but so far I have not seen .docx
Ive been promised A+ papers in the past but so far I have not seen .docx
 
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docxIt’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
 
Its meaning is still debated. It could be a symbol of the city of Fl.docx
Its meaning is still debated. It could be a symbol of the city of Fl.docxIts meaning is still debated. It could be a symbol of the city of Fl.docx
Its meaning is still debated. It could be a symbol of the city of Fl.docx
 
Jaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docxJaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docx
 
Ive got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docxIve got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docx
 
It is thought that a metabolic waste product produced by a certain g.docx
It is thought that a metabolic waste product produced by a certain g.docxIt is thought that a metabolic waste product produced by a certain g.docx
It is thought that a metabolic waste product produced by a certain g.docx
 
it is not the eassay it is about anwering the question with 2,3 pa.docx
it is not the eassay it is about anwering the question with 2,3 pa.docxit is not the eassay it is about anwering the question with 2,3 pa.docx
it is not the eassay it is about anwering the question with 2,3 pa.docx
 
It is now time to select sources and take some notes. You will nee.docx
It is now time to select sources and take some notes. You will nee.docxIt is now time to select sources and take some notes. You will nee.docx
It is now time to select sources and take some notes. You will nee.docx
 
Its a linear equations question...Neilsen Media Research surveys .docx
Its a linear equations question...Neilsen Media Research surveys .docxIts a linear equations question...Neilsen Media Research surveys .docx
Its a linear equations question...Neilsen Media Research surveys .docx
 
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docxitively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
 
IT205 Management of Information SystemsHello, I am looking for he.docx
IT205 Management of Information SystemsHello, I am looking for he.docxIT205 Management of Information SystemsHello, I am looking for he.docx
IT205 Management of Information SystemsHello, I am looking for he.docx
 
It is not an online course so i cannot share any login details. No d.docx
It is not an online course so i cannot share any login details. No d.docxIt is not an online course so i cannot share any login details. No d.docx
It is not an online course so i cannot share any login details. No d.docx
 
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxIT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
 
It should be in API format.Research paper should be on Ethernet .docx
It should be in API format.Research paper should be on Ethernet .docxIt should be in API format.Research paper should be on Ethernet .docx
It should be in API format.Research paper should be on Ethernet .docx
 
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docxIT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
 
It seems most everything we buy these days has the label made in Ch.docx
It seems most everything we buy these days has the label made in Ch.docxIt seems most everything we buy these days has the label made in Ch.docx
It seems most everything we buy these days has the label made in Ch.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

F E B R U A R Y 2 0 1 8 V O L . 6 1 N O . 2 .docx

  • 1. F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 | C O M M U N I C AT I O N S O F T H E A C M 29 V viewpoints P H O T O B Y A L I C I A K U B I S
  • 3. ment in our economic, social, and po- litical history, as we mindfully navigate human-machine interactions. The ways in which machine sys- tems influence our lives have become more explicit in recent years. A chief example that commands popular at- tention has been IBM’s Watson, serv- ing as an informative bellwether for human-machine relations. Its inven- tors and user community place Wat- E M E R G I N G A N X I E T I E S P E R T A I N - I N G to the rapid advance- ment and sophistication of artificial intelligence appear to be on a collision course with historic models of human excep- tionality and individuality. Yet it is not just objective, technical sophistication in the development of AI that seems to cause this angst. It is also the linguis- tic treatment of machine “intelli- gence.” Headlines decry the existen- tial threat of machines against humans in various media outlets. But what is really at stake? Are we truly concerned that we will be surpassed in our capacities as hu- man beings? Or is rhetorical slippage betraying age-old philosophical ques-
  • 4. tions on what it really means to be hu- man? To what degree do our shortcom- ings in acknowledging human dignity in all populations (regardless of skin pigmentation, linguistic system spo- ken, geographical location, or socio- economic position) emerge in ques- tions pertaining to power dynamics between humans and machines? And how might we usefully juxtapose a his- toric study of our past categorical tax- onomies of humanity to more subtly inform our navigation of human-ma- chine relationships? In the fall of 2017 we engaged these questions and more with first-year students at Carnegie Mellon University: 16 students from the School of Computer Science and the Robotics Institute and 16 students from the Dietrich College of Humani- ties and Social Sciences. In a time of ac- celerating technological disruption, the next generation of leaders and in- novators are ill-equipped to navigate this boundary chapter in human-ma- chine relationships. Perhaps our stu- dents can learn from how humans have treated humans to determine viable roadmaps for this challenging mo- Viewpoint Teaching Artificial Intelligence and Humanity Considering rapidly evolving human-machine interactions.
  • 5. DOI:10.1145/3104986 Jennifer Keating and Illah Nourbakhsh http://dx.doi.org/10.1145/3104986 30 C O M M U N I C AT I O N S O F T H E A C M | F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 viewpoints As humans we are readers, we cre- ate, we imagine, we strive to under- stand. Our individual subjectivity al- lows us to do more than perform specific functions. And yet, present discourse on the potential for AI is of- tentimes laced with echoes of our anxieties pertaining to human dignity and its links to work or the distinc- tiveness of our subjectivity and agen- cy.4 Will we be ‘bested’ by the very ma- chines that we build? Will the next generation of technologists be equipped to consider these intended and unintended consequences for the tools they unleash? Or, for now, do we only dream quite wildly beyond tech- nological purviews about the actual sophistication of these tools? Reading In the historical context of globaliza- tion, labor, human dignity, and edu- cation in the West, few rival the nar- rative potency offered by Frederick
  • 6. Douglass. In The Narrative of the Life of Frederick Douglass, An American Slave he writes: “Very soon after I went to live with Mr. and Mrs. Auld, she very kindly commenced to teach me the A,B,C. After I had learned this, she as- sisted me in learning to spell words of three or four letters. Just at this point of my progress, Mr. Auld found out what was going on, and at once for- bade Mrs. Auld to instruct me further, telling her, among other things, that it was unlawful, as well as unsafe, to teach a slave to read.”5 The power of literacy and its capac- ity to equip individuals with the neces- sary tools to dismantle exploitative and unjust systems of power are illus- trated in Douglass’ work. His capacity to articulate the features of a power negotiation that undermines the very core of the master-slave relationship in a post-Enlightenment era is cap- tured in a human capacity to learn. In the context of the West and its politi- cal and social systems, literacy is an opportunity to assert agency. But hu- man-to-human capacities to assert equality, to facilitate Douglass’ ability to be ‘of no value to his master,’ to ren- der him to be ‘forever unfit … to be a slave’ due to his capacity to read, are not the tenets used to describe ten- sions between an AI machine and the
  • 7. tool’s “master” [read programmer or son’s clinical knowledge squarely with- in the social context of the medical community, ascribing agency and a ca- pacity to learn to a sophisticated ma- chine with a human name: “Nobody can read it all,” Miyano said. “We feel we are a frog in the bottom of the well. Under- standing cancer is beyond a human be- ing’s ability, but Watson can read, un- derstand and learn. Why not use it?”6 Watson’s capacity to process data rivals that of a practicing physician and, in some domains, outpaces hu- man abilities. It is positioned as a tool that will rival human capacities in diagnostics to serve as release time for the practicing physician to dedicate more time, energy and in- tellectual bandwidth to patient-phy- sician interactions. The optimized functions of the Watson apparatus have limitations but they are certain- ly becoming more sophisticated rap- idly: “Before the computer can make real-life clinical recommendations, it must learn to understand and ana- lyze medical information, just as it once learned to ask the right ques- tions on “Jeopardy!” … The famed cancer institute [Memorial Sloan- Kettering] has signed up to be Wat- son’s tutor, feeding it clinical infor- mation extracted from real cases
  • 8. and then teaching it how to make sense of the data. ‘The process of pulling out two key facts from a “Jeopardy!” clue is totally different from pulling out all the relevant infor- mation, and its relationships, from a medical case … Sometimes there is conflicting information. People phrase things different ways.’”2 Read, Understand, Learn IBM’s Watson is personified as an independent agent in most press cov- erage. In contrast, at expert confer- ences like the “Humans, Machines and the Future of Work” conference at Rice University, AI systems like Watson are described as tools. Per- sonification is more tightly regulated when discussed or presented to tech- nologists who are not beholden to the mysteries of the black box, but rather its deconstruction into computation- al techniques. In the public domain, however, journalists ascribe person- hood to the learning machine, which is not necessarily corrected by engi- neers or physicians, by describing the machine’s functions as reading and learning. Is Watson’s information processing and model-building truly reading or understanding? Does such a machine learn? Why do we ascribe features historically associated with humanity, subjectivity, and notions
  • 9. of a human self to built machines? And what chapters of human interre- lationships are threatened when we readily ascribe human characteris- tics to engineered systems? Our society is locked in a stance of both anxiety and ambition in regard to the future of AI. We believe it is cru- cial that students embarking on un- dergraduate studies, as budding tech- nologists, writers, policymakers, and a myriad of other future leadership roles, should be better equipped and better practiced in engaging these dif- ficult questions. As automation will be a distinguishing feature in the next chapter of global economies, under- employment threatens the dignity of much of our human labor force. Yet as humans, most individuals would argue they are considerably more than a simple labor force driving a (al- beit pervasive and powerful) global economy. An insistence on our capac- ity to be more than what we might produce as commodities in a market is a distinguishing feature of human dignity in the 21st century. This is a concept, however, that needs to be tested, explored and seriously consid- ered as students prepare to enter this labor force and shape its direction for the coming generations. Our society
  • 10. is locked in a stance of both anxiety and ambition in regard to the future of AI. F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 | C O M M U N I C AT I O N S O F T H E A C M 31 viewpoints user]. In the context of Douglass’ nar- rative, the prospect of literacy sug- gests the slave as worth more than his or her labor. Instead, the slave’s ca- pacity to learn, to engage in civilized discourse by joining what Benedict Anderson calls “an imagined commu- nity,” suggests his equal position with other members of the society in con- trast to the juridical category of slave as property.1 It is not the same scenar- io with AI because the machine is not human, although they are becoming increasingly social. This is relevant be- cause for a long period (arguably a pe- riod that we still occupy) humans have treated other humans as tools. The in- stitution of slavery, and its cousin in European colonial systems world- wide, used humans as machines com- posing a labor force. These were be- ings who were not extended existential
  • 11. features like agency, subjectivity, indi- viduality, or intelligence. As Joseph Conrad wrote in Heart of Darkness, the enslaved Congolese were “black shad- ows,” they were “bundles of acute an- gles sat with their legs drawn up.”3 Reading, however, marks agency for Douglass. Reading, in the context of an AI system, suggests anthropo- morphic undertones and perhaps hu- manity. The hierarchical power rela- tionships suggested in these examples are not in the service of hyperbole. The themes they introduce are also not entirely new. The historical analy- sis of human subjugation offers a rich tapestry regarding agency, identity, au- tonomy, labor, dignity and citizenry— issues at the heart of how future AI systems and humans will interrelate in our near future. Reading and learn- ing, the very verbs ascribed today to Watson, are central to Frederick Dou- glass’ discovery of the ways in which illiteracy in enslaved populations re- inforces the hegemonic power struc- ture of the master-slave dynamic be- fore abolition. Through reading, Douglass asserts his freedom in deed if not in legal standing. Understanding Ascription of features like inconsis- tency, induction and emotion to ma- chines prematurely suggests essential
  • 12. human characteristics upon our inven- tions. Yet technologists forge ahead, projecting personhood and agency, coupled with anxiety and uncertainty, upon machines. Even in the case of ear- ly light-seeking robots in 1950, W. Grey Walter recognized elements of human psychology, from free will to personal- ity: “… the uncertainty, randomness, free will or independence so strikingly absent in most well-designed ma- chines. The fact that only a few richly interconnected elements can provide practically infinite modes of existence suggests that there is no logical or ex- perimental necessity to invoke more than ‘number’ to account for our sub- jective conviction of freedom of will and our objective awareness of per- sonality in our fellow men.”7 Core human characteristics be- come terms for making sense of com- plex robotic behavior, as if complexity is sufficient to justify giving our ma- chines subjectivity. Today, serious le- gal experts are considering granting personhood to self-driving automo- biles, because these AI-driven ma- chines will be so socially integrated into our transportation infrastructure that they need to be individually liable for accidents. Notably, corporations were historically granted limited per- sonhood to shield individual humans
  • 13. from responsibility and blame; per- sonhood ascribed to AI similarly shields both corporations and engi- neers. Personification trades account- ability with convenience for tort and liability, and further with product marketing. Watson, for instance, is named as one technology product across many use cases; but in reality, each disciplinary version of Watson is a separate, custom-made instantia- tion with its own silo of AI, data store, and interface. Core human characteristics become terms for making sense of complex robotic behavior. Calendar of Events February 5–9 WSDM 2018: The 11th ACM International Conference on Web Search and Data Mining, Marina Del Rey, CA, Co-Sponsored: ACM/SIG, Contact: Yi Chang, Email: [email protected] February 21–24 SIGCSE ‘18: The 49th ACM Technical Symposium on Computing Science Education, Baltimore, MD,
  • 14. Sponsored: ACM/SIG, Contact: Tiffany Barnes, Email: [email protected] February 24–28 CGO ‘18: 16th Annual IEEE/ACM International Symposium on Code Generation and Optimization, Vösendorf/Vienna, Austria, Contact: Jens Knoop, Email: [email protected] tuwien.ac.at February 24–28 PPoPP ‘18: 23nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Vienna, Austria, Co-Sponsored: ACM/SIG, Contact: Andreas Krall, Email: [email protected] ac.at February 25–27 FPGA ‘18: The 2018 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey, CA, Sponsored: ACM/SIG, Contact: Jason Anderson, Email: [email protected] edu March
  • 15. March 5–8 HRI ‘18: ACM/IEEE International Conference on Human-Robot Interaction, Chicago, IL, Contact: Takayuki Kanda, Email: [email protected] 32 C O M M U N I C AT I O N S O F T H E A C M | F E B R U A R Y 2 0 1 8 | V O L . 6 1 | N O . 2 viewpoints contemporary consideration of hu- man relationships to machines. We take inspiration from Raymond Wil- liams’ Keywords and the Key Words Project (http://www.kewords.pitt.edu) to create a conceptual structure of core themes that will guide the semester (see the accompanying table). In this interdisciplinary course, students will be introduced to both the historical development of AI and to the current state of the art. As we engage with core themes of power negotiations, political implications for advancing technology, and cul- tural response, students will use ter- minology from Key Words to build conceptual maps that make sense of technological advances and their
  • 16. societal implications. Students will develop mixed media ‘futuring’ as- signments by semester’s end that offer speculations on the future of human relationships to machines. Working in groups, they will create their own narratives, synthesizing a future ethic based on course ma- terials and explorations. While this course is a first experiment in con- necting the freshman experience to socio-technical issues relevant to all, we hope that several iterations of course refinement and deployment will yield an approach that can serve as a valuable scaffold for AI and hu- manity across institutions. References 1. Anderson, B. Imagined Communities. Verso, London, 1991. 2. Cohn, J. The robot will see you now. Atlantic. (Mar. 2013). 3. Conrad, J. Heart of Darkness. Bantam Books, NY, 1981, 26–27. 4. Deleuze, G. and Foucault, M. Intellectuals and power: A conversation between Michel Foucault and Gilles Deleuze. L’Arc (Mar. 4, 1972). 5. Douglass, F. Narrative of the Life of Frederick Douglass, an American Slave. Penguin Books, NY, 1982, 78. 6. Gaudin, S. IBM: In 5 years, Watson A.I. will be behind our every decision. Computerworld (Oct. 27, 2016). 7. Grey, W. An imitation of life. Scientific American
  • 17. (1950), 42–45. 8. Williams, R. Keywords: A Vocabulary of Culture and Society. Oxford University Press, Oxford, 1983. Jennifer Keating ([email protected]) is Assistant Dean for Educational Initiatives in Dietrich College, Carnegie Mellon University. Illah Nourbakhsh ([email protected]) is Professor of Robotics at The Robotics Institute, Carnegie Mellon University. Copyright held by authors. Learning Rapid progress in AI/machine learn- ing and its central role in our social, economic, and political culture sig- nals its salience to the next genera- tion of students entering universi- ties. Building next-generation AI is currently a hot topic. At Carnegie Mellon, we have no trouble filling such classes. And yet, a nuanced understanding of the contributions that technologists are currently mak- ing to the world, an indication of how the next generation of computer sci- entists, engineers, and roboticists might shape the world that human- ists and social scientists study, is not at the forefront of our undergradu- ates’ minds. So, how might we en- sure this is something they consider throughout their undergraduate
  • 18. career? And that, instead, societal consideration shapes their under- graduate studies from their first year onward? We propose to introduce AI and Humanity in the first term of the undergraduate career. Humanities students will sit in class beside their colleagues from the Robotics Insti- tute and the School of Computer Sci- ence. They will be taught each class by a team of faculty with an intertwined pedagogical approach: a roboticist and a humanist. Artificial Intelligence & Humanity is part of a new fleet of first-year courses called Dietrich College Grand Challenge Interdisciplinary Fresh- man Seminars. These encourage fac- ulty teams to propose courses that at- tend to historically persistent problems facing humanity, demon- strating an interdisciplinary ap- proach to attending to these prob- lems whose solutions continue to elude us or demonstrate boundary work that a single discipline is often ill-equipped to solve. By harnessing the methodological approaches of various disciplines to demonstrate the complexity and the range of ap- proaches to problem solving in the academy, students are exposed to ar- gumentative structures and efforts to juxtapose historical human-to-hu-
  • 19. man relationships with future narra- tives of human-to-AI relations. In Artificial Intelligence & Humanity, students will respond to historical examples of negotiations of power between individuals and communi- ties, then develop language to de- scribe contemporary and historical taxonomies of human-to-human and human-to-machine power rela- tionships. Starting with a survey of narrative forms that explore human relationships that include written memoirs, dystopian television shows, documentary films and sci- ence fiction novels, students will consider the various ways in which we narrate our relationships between humans from a variety of perspec- tives. They will consider how these relationships might manifest in our Sample of syllabus keywords (left column) and related materials for analysis in seminar (from Williams8). Agency Frederick Douglass: Narrative of the Life of Frederick Douglass, an American Slave Black Mirror: Men Against Fire Self Black Mirror: Be Right Back Jerrold Seigel: The Idea of the Self Technology Adam Hochschild: Bury the Chains
  • 20. Werner Herzog: Lo and Behold Equality and Exploitation Andrew McAfee: The Second Machine Age Star Trek: The Measure of a Man Surveillance Minority Report Ian Ayres: Super Crunchers Labor and Digital Labor Joseph Conrad: Heart of Darkness Simon Head: Mindless, Why Smarter Machines are Making Dumber Humans Citizen Kurt Vonnegut: Player Piano Black Mirror: Hated in the Nation Narrative Richard Powers: Plowing the Dark David Herman: The Cambridge Companion to Narrative Copyright of Communications of the ACM is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.
  • 21. 20 COMMUNICATIONS OF THE ACM | NOVEMBER 2016 | VOL. 59 | NO. 11 V viewpoints Privacy and Security Cyber Defense Triad for Where Security Matters Dramatically more trustworthy cyber security is a choice. confident that from the standpoint of technology there is a good chance for secure shared systems in the next few years. However, from a practical stand- point the security problem will remain as long as manufacturers remain com- mitted to current system architectures, produced without a firm requirement for security. As long as there is support for ad hoc fixes and security packages for these inadequate designs, and as long as the illusory results of penetra- tion teams are accepted as a demon- stration of computer system security, proper security will not be a reality.”8 Current Approaches Aren’t Working Our confidence in “security kernel” technology was well founded, but I never expected decades later to find the same denial of proper security so widespread. Although Forbes reports spending on information security
  • 22. reached $75 billion for 2015, our ad- versaries are still greatly outpacing us. With that large financial incentive for vested interests, resources are mostly devoted to doing more of what we knew didn’t work then, and still doesn’t. I N THE EARLY days of computers, security was easily provided by physical isolation of ma- chines dedicated to security do- mains. Today’s systems need high-assurance controlled sharing of resources, code, and data across domains in order to build practical systems. Current approaches to cyber security are more focused on saving money or developing elegant techni- cal solutions than on working and protecting lives and property. They largely lack the scientific or engi- neering rigor needed for a trustwor- thy system to defend the security of networked computers in three dimen- sions at the same time: mandatory ac- cess control (MAC) policy, protection against subversion, and verifiability— what I call a defense triad. Fifty years ago the U.S. military rec- ognized subversiona as the most seri- ous threat to security.
  • 23. Solution s such as cleared developers and technical a As characterized by Anderson, et al.,2 “System subversion involves the hiding of a software or hardware artifice in the system that creates a ‘backdoor’ known only to the attacker.” development processes were neither scalable nor sustainable for advanc- ing computer technology and growing threats. In a 1972 workshop, I pro- posed “a compact security ‘kernel’ of the operating system and supporting hardware—such that an antagonist could provide the remainder of the sys- tem without compromising the protec- tion provided.” I concluded: “We are DOI:10.1145/3000606 Roger R. Schell
  • 24. The security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security. http://dx.doi.org/10.1145/3000606 NOVEMBER 2016 | VOL. 59 | NO. 11 | COMMUNICATIONS OF THE ACM 21 viewpoints V I M A G
  • 27. A T E S of “malware,” a preferred attack for many of the most serious breaches. An IBM executive a few years ago de- scribed the penetrate-and-patch cycle as “an arms race we cannot win.”5 Why does cyber security seem so difficult? Today’s emphasis on sur- veillance and monitoring tries to discover that an adversary has found and exploited a vulnerability to pen- etrate security and cause damage—or worse, subverted the security mecha- nism itself. Then that hole is patched. But science tells us trying to make a system secure in this way is effectively non-computable. Even after fixing known flaws, uncountable flaws re- main. Recently, Steven Lipner, for-
  • 28. merly of Microsoft, wrote a Commu- nications Privacy and Security column advocating technical “secure develop- ment processes.”6 But, similar to sur- veillance, “as new classes of vulner- abilities … are discovered, the process must be updated.” This paradigm has for decades been known as “penetrate and patch.” The defender needs to find and patch most (if not all) of the holes, while the adver- sary only needs to find and exploit one remaining hole. Even worse, a witted adversary has numerous opportunities to subvert or sabotage a computer’s protection software itself to introduce insidious new flaws. This is an example Figure 1. Cyber security defense triad. V e
  • 30. a to ry A C ˲ Subversion is tool for choice for witted adversary ˲ Only label-based MAC policy can enforce secure information flow ˲ Security kernel (reference monitor) is only known verifiable protection technology 22 COMMUNICATIONS OF THE ACM | NOVEMBER 2016 | VOL. 59 | NO. 11 viewpoints These systems did not survive long after the end of the Cold War, and much of the “institutional memory”
  • 31. is now lost. But fortunately, some security kernel products were main- tained and this original equipment manufacturer (OEM) technology is still commercially available today. And many commodity processors (for example, those that implement the Intel IA32 architecture) still include the hardware segmentation and pro- tection rings essential to efficient se- curity kernels. High assurance of no security patches is truly a paradigm shift. What alternative approach comes close? Mark Heckman of the University of San Diego and I recently published a paper focused on techniques for applying those Reference Monitor properties, leveraging the fact that “associated systematic security engi- neering and evaluation methodology was codified as an engineering stan- dard in the Trusted Computer System Evaluation Criteria (TCSEC)”4 created
  • 32. by NSA. However, the TCSEC didn’t in- clude administration and acquisition mandates to actually use this knowl- edge to create a market in the face of entrenched vested interests. I refer in- terested readers to our paper for more details on the triad components sum- marized here. ˲ Mitigating software subversion. Several cyber security professionals have concluded that subversion “is the attack of choice for the professional attacker.”2 The primary means for software subversion are Trojan horses and trap doors (commonly called mal- ware). Under the seven well-defined se- curity classes in the TCSEC, only Class A1 systems substantially deal with the problems of subversion. ˲ Mandatory access control (MAC) policy. The reference monitor is fun- damentally about access control. All access control policies fall into two
  • 33. classes: Discretionary Access Control (DAC) and MAC. Only a label-based MAC policy can, with high assurance, enforce secure information flow. Even in the face of Trojan horses and other forms of malicious software, MAC policies can protect against unau- thorized modification of information (integrity), as well as unauthorized disclosure (confidentiality). Cyber Defense Triad for Secure Systems All three defense triad components are critical for defense of both confiden- tiality and integrity of information— whether the sensitive information is personally identifiable information, financial transactions (for example, credit cards), industrial control sys- tems in the critical infrastructure, or something else that matters. Although not sufficient for perfect security, all three are practically necessary. These dimensions can be thought of as three
  • 34. strong “legs of a stool,” as illustrated in Figure 1. Security for cyber systems built without a trustworthy operating sys- tem (OS) is simply a scientific impos- sibility. NIST has emphasized, “se- curity dependencies in a system will form a partial ordering … The partial ordering provides the basis for trust- worthiness reasoning.”3 Proven sci- entific principles of the “Reference Monitor” model enable engineering a verifiably secure OS on which we can build secure cyber systems. For a Reference Monitor implemen- tation to work, it must ensure three fundamental properties. First, it must validate enforcement of the security policy for every reference to informa- tion. Second, it must be tamper-proof, that is, it cannot be subverted. Lastly, it must be verifiable, so we have high
  • 35. assurance it always works correctly. These three fundamental properties are directly reflected in the cyber de- fense triad. As illustrated in Figure 2, a Refer- ence Monitor controls access by sub- jects to information in objects. A secu- rity kernel is a proven way to implement a reference monitor in a computer. Whenever a user (or program acting on behalf of a user) attempts to access in- formation in the computer system, the Reference Monitor checks the user’s clearance against a label indicating the sensitivity of that class of data. Only au- thorized users are granted access. Applying the Cyber Defense Triad The flawed foundation of current sys- tems is evident in the unending stream of OS security patches that are today considered part of best practices. But we can choose a better alternative. At least a half-dozen security kernel-
  • 36. based operating systems have been produced that ran for years (even de- cades) in the face of nation-state ad- versaries without a single reported security patch.7 These successes were not unexpected. As a 1983 article put it, “the security kernel approach provides controls that are effective against most internal attacks—including some that many designers never consider.”1 That is a fundamentally different result than penetrate and patch. Figure 2. Reference monitor. ˲ A subject security attributes, for example, label for clearance ˲ Object security attributes, for example, label for classification ˲ Segments ˲ Directories ˲ Passive data
  • 37. repositories ˲ Record of all security- related user events ˲ Active entities ˲ User Processes ˲ Gain access to information on user’s behalf Authorization Database Reference MonitorSubjects Objects Audit Trail NOVEMBER 2016 | VOL. 59 | NO. 11 | COMMUNICATIONS OF THE ACM 23 viewpoints
  • 38. Lipner asserts that this reference monitor approach is “not able to cope with systems large enough to be use- ful.”6 Heckman and I respond that “this quite widely-spread assertion has been repeatedly disproven by counter- examples from both real systems and research prototypes.”4 The paper gives numerous examples of how, by leverag- ing MAC, complex integrated systems can be composed from logically distinct hardware and software components that may have various degrees of secu- rity assurance or no assurance at all. ˲ Verifiability. The Reference Moni- tor implementation defined as a securi- ty kernel is the only proven technology for reliably achieving verifiable protec- tion. It does not depend on unproven elegant technical solutions, such as open source for “source code inspec- tion” or “gratuitous formal methods.”2 Security kernels have been shown to
  • 39. be effective for systematic, repeatable, systems-oriented security evaluation of large, distributed, complex systems. Lipner in his paper6 asks a critical, but largely unanswered, question: How can customers have any assurance that they are getting a secure system? His answer is limited to development process improvements that don’t ad- dress fundamentally what it means for a system to be “secure.” Heckman, by contrast, details how the Reference Monitor approach, with its strong defi- nition of “secure system,” can answer precisely that question.4 What Should We Do Then? It can be expected to take 10–15 years and tens of millions of dollars to build and evaluate a high-assurance secu- rity kernel. However, once completed, a general-purpose security kernel is highly reusable for delivering a new secure system in a couple of years. It
  • 40. is economical to use the same ker- nel in architectures for a wide variety of systems, and the TCSEC’s Ratings Maintenance Phase (RAMP) allows the kernel to be re-verified using the latest technology, without the same invest- ment as the original evaluation. Heck- man summarizes several real-world ex- amples where, “This is demonstrated by OEM deployments of highly secure systems and products, ranging from enterprise ‘cloud technology’ to gener- al-purpose database management sys- tems (DBMS) to secure authenticated Internet communications, by applying commercially available security kernel technology.”4 Heckman additionally describes completed research proto- types in the past few years for things like source-code compatible secure Linux and a standards-compliant high- ly secure Network File Service (NFS). A first necessary step is to identify
  • 41. where high-assurance security mat- ters for a system. As just one example, several U.S. government leaders have expressed concern that we face an exis- tential cyber security threat to industri- al control systems (ICS) in the critical infrastructure, such as the power grid. Use of an integrity MAC security ker- nel can within a couple of years make our critical infrastructure dramatically more trustworthy. The U.S. government has a unique opportunity to change the cyber security game and should aggres- sively engage ICS manufacturers by sponsoring prototypes and providing a market using proven commercial secu- rity kernel OEM technology. Otherwise, costs may soon be measured in lives in- stead of bits or dollar signs. References 1. Ames Jr, S.R., Gasser, M., and Schell, R.R. Security kernel design and implementation: An introduction. Computer 16, 7 (1983), 14–22.
  • 42. 2. Anderson, E.A., Irvine, C.E., and Schell, R.R. Subversion as a threat in information warfare. J. Inf. Warfare 3 (2004), 51–64. 3. Clark, P., Irvine, C. and Nguyen, T. Design Principles for Security. NIST Special Publication 800-160, September 2016, pp. 207-221; http://csrc.nist.gov/publications/ drafts/800-160/sp800_160_final-draft.pdf 4. Heckman, M.R. and Schell, R.R. Using proven reference monitor patterns for security evaluation. Information 7, 2 (Apr. 2016); http://dx.doi.org/10.3390/ info7020023 5. Higgins, K.J. IBM: The security business ‘has no future.’ Information Week Dark Reading, (4/10/2008); http://www.darkreading.com/ibm-the-security- business-has-no-future/d/d-id/1129423 6. Lipner, S.B. Security assurance. Commun. ACM 58, 11 (Nov. 2015), 24–26. 7. Schell, R.R. A University Education Cyber Security Paradigm Shift. Presented at the National Initiative
  • 43. for Cybersecurity Education (NICE), (San Diego, CA, Nov. 2015); https://www.fbcinc.com/e/nice/ncec/ presentations/2015/Schell.pdf 8. Schell, R.R., Downey, P.J. and Popek, G.J. Preliminary Notes on the Design of Secure Military Computer Systems. ESD, Air Force Systems Command, Hanscom AFB, MA. [MCI-73-1], Jan 1973; http://csrc. nist.gov/publications/history/sche73.pdf Roger R. Schell ([email protected]) is president of Aesec Corporation, and is currently a Distinguished Fellow at the University of San Diego Center for Cyber Security Engineering and Technology. Previously he was a Professor of Engineering Practice at University of Southern California. The author wishes to thank Michael J. Culver, Mark R. Heckman, and Edwards E. Reed for their valuable feedback on an early draft of this Viewpoint. Copyright held by author. Calendar of Events
  • 44. November 2–4 VRST ‘16: 22th ACM Symposium on Virtual Reality Software and Technology Garching bei München, Germany, Co-Sponsored: ACM/SIG, Contact: Gudrun J. Klinker, Email: [email protected] November 6–9 ISS ‘16: Interactive Surfaces and Spaces Surfaces Niagara Falls, ON, Canada, Sponsored: ACM/SIG, Contact: Mark Hancock, Email: [email protected] November 6–9 SIGUCCS ‘16: ACM SIGUCCS Annual Conference Denver, CO, Sponsored: ACM/SIG, Contact: Laurie J. Fox, Email: [email protected] November 7–10 ICCAD ‘16: IEEE/ACM
  • 45. International Conference on Computer-Aided Design Austin, TX, Co-Sponsored: Other Societies, Contact: Frank Liu, Email: [email protected] November 12–16 ICMI ‘16: International Conference on Multimodal Interaction Tokyo, Japan, Sponsored: ACM/SIG, Contact: Yukiko Nakano, Email: [email protected] November 13–16 GROUP ‘16: 2016 ACM Conference on Supporting Groupwork Sanibel Island, FL, Sponsored: ACM/SIG, Contact: Stephan Lukosch, Email: [email protected]
  • 46. Copyright of Communications of the ACM is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. 20 COMMUNICATIONS OF THE ACM | NOVEMBER 2016 | VOL. 59 | NO. 11 V viewpoints Privacy and Security Cyber Defense Triad for Where Security Matters Dramatically more trustworthy cyber security is a choice. confident that from the standpoint of technology there is a good chance for secure shared systems in the next few
  • 47. years. However, from a practical stand- point the security problem will remain as long as manufacturers remain com- mitted to current system architectures, produced without a firm requirement for security. As long as there is support for ad hoc fixes and security packages for these inadequate designs, and as long as the illusory results of penetra- tion teams are accepted as a demon- stration of computer system security, proper security will not be a reality.”8 Current Approaches Aren’t Working Our confidence in “security kernel” technology was well founded, but I never expected decades later to find the same denial of proper security so widespread. Although Forbes reports spending on information security reached $75 billion for 2015, our ad- versaries are still greatly outpacing us. With that large financial incentive for vested interests, resources are mostly
  • 48. devoted to doing more of what we knew didn’t work then, and still doesn’t. I N THE EARLY days of computers, security was easily provided by physical isolation of ma- chines dedicated to security do- mains. Today’s systems need high-assurance controlled sharing of resources, code, and data across domains in order to build practical systems. Current approaches to cyber security are more focused on saving money or developing elegant techni- cal solutions than on working and protecting lives and property. They largely lack the scientific or engi- neering rigor needed for a trustwor- thy system to defend the security of networked computers in three dimen- sions at the same time: mandatory ac- cess control (MAC) policy, protection against subversion, and verifiability—
  • 49. what I call a defense triad. Fifty years ago the U.S. military rec- ognized subversiona as the most seri- ous threat to security.