Security in the AI and Web3 era - Veramine

sbc-vn 3,260 views 29 slides Oct 04, 2024
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

Secucity in the AI and Web3 era - Nguyễn Duy Lân - Veramine


Slide Content

Security in the AI & Web3 era LAN NGUYEN CO-FOUNDER VERAMINE INC.

Outline Info Security: ISO CIA. TLS. SOC. In-Memory Web3: Digital Assets. Blockchain. Crypto tech AI&ML : Attention Model. Transformer. GenAI Big Data: Storage. Computation. Management Final Notes: First principles. Turing Awards

Information Security (IS) The General Principles of Information Security are the C-I-A triad Confidentiality : information service available only to authorized users Integrity : information service is accurate and complete Availability : authorized users can always access information service From International Standards Organization (ISO) 27001 for IS Across all areas. Very general, broken into detailed criteria to implement Needs a balance between security, performance and useability

TLS C: Data Encryption across Internet I: Data Signing. Server Authenticity A: User Authentication They are the simplest Crypto ZKP, securing the whole Internet and Digital World

SOC I and A of IT Systems. Even C of Data and Services Logs, Rules, Alerts, Actions are materials for Monitoring Activities : Collection, Detection, and Response . Suite of SIEM, EDR, IPS, FW, PAM, DB Sec, User Sec Management, Services Need good tools and full coverage. E.g. Memory-Based Attacks: Webshell. Memory shell. Fileless. Powershell. Code injection. Process open Defenses: Yara memory search. Log memory events. Query memory logs & dumps

TEE A t rusted e xecution environment (TEE) helps code and data loaded inside it be protected with respect to C and I From Negativity in Web1-2: Computing Vendors control Users To Positivity in Web3: More T rust to Computation and Storage C for AI models and Crypto secrets I for Important and Sensitive services

Web3 Web 1 (Read) is about connectivity and management of Digital Information Web 2 (Write) is about connectivity and management of Digital Services Web 3 (Own) is about connectivity and management of Digital Assets Blockchain is the fundamental Decentralized platform to secure the Digital Assets E.g. Integrity: Prevent bank staff to steal customers’ money. Outdate several attacks Traditional Blockchains have been providing Integrity and Availability to Digital Assets Modern Blockchain tech also provides Confidentiality, such as by ZKP and MPC

Blockchain and Bitcoin of Decentralization Satoshi Nakamoto introduced the Bitcoin Whitepaper Transactions (Tx) are validated and broadcasted. Many Txs form a Block. Many Blocks form a Chain Blocks go through Consensus & Verify to select the next Block to add to the Chain Validation and Consensus are competed or executed by peer computer nodes, called Miners (Proof of Work - PoW) or Validators (Proof of Stake - PoS). The first Block is Genesis #0 Cryptography: Hash Merkle Tree Signatures

Properties of Blockchain Decentralization : No trusted party for Activities (Txs). Instead, use Distributed peer-to-peer network of computing nodes Scalability : Challenging, as a tradeoff to Decentralization and Security. Expensive Consensus leads to high fee and delay for Activities (Txs) and limiting adoption Security - Integrity : Against Double-Spending, Forging, Altering… of Data (Financial Ledger). Achieved by Consensus Mechanism (PoW, PoS) against Sybil and Majority attacks Security - Availability: Censorship Resistance : Freedom to transact. Txs Immutability. No Confiscation Permissionless (vs. Permissioned ): Anyone can participate in the Consensus Mechanism

Ethereum Ethereum is a public blockchain-based distributed ledger Smart contracts execute in Ethereum Virtual Machine (EVM) EVM is a decentralized Turing-complete virtual machine ‘Gas’, by Ether, pays for smart contracts’ computation costs Currencies Ether, Gwei, Wei, awarded to miners and transferable between accounts Ethereum was proposed by Vitalik Buterin and went live on 30 July 2015

Ethereum, more… Two types of accounts: User (controlled by private key), Contract (controlled by code) State: Mapping of Addresses to Account Objects (Balances, Contracts…) Account Balance vs UTXO. History: Transactions, Receipts All nodes run all contracts and store State. Some nodes store History Address is 40 hexa-digits rightmost of the Keccak-256 hash account’s ECDSA public key Proof of Stake: Consensus by a combination of stakes (e.g. wealth, age…), and Punish misbehavior

Blockchain Trilemma and Rollups A high-performing blockchain platform must have three properties: Decentralization, Security, and Scalability The Blockchain Trilemma refers to the belief that blockchain platforms can only achieve two of these three goals effectively . First coined by Vitalik Buterin https://www.bitstamp.net/learn/blockchain/what-is-the-blockchain-trilemma/ Mitigating Solution: Off-chain processing using Rollup (Layer2) => W ider Blockchain adoption bring Web 2 services into Web 3

Zero Knowledge Proofs (ZKP) Vitalik ETH Founder "ZK SNARK is at least as important technology as Blockchain" ZKP builds Rollups, mitigating Blockchain Trilemma ZKP builds Privacy (of Confidentiality) into Blockchain ZK allows Confidentiality and Soundness allow Integrity Recently, more focus on a particular ZKP: SNARK

More Cryptography Cryptography is the Dual Art of Hiding (Confidentiality) and Proving (Integrity) Information Encryption vs. Signature (of Data) Commitment Hiding vs. Commitment Binding Delay Encryption vs. Verifiable Delay Function VDF FHE vs. ZKP (of Circuits) ZK Privacy vs. ZK Soundness

Web 3 Security Digital Assets and Processing in Web 3 are growing fast Blockchain Security (Integrity) helps but more is needed. Risks: - Loss of private keys - Phishing, scams, and hacks that target a user’s crypto wallet or private keys (as Web3’s “passport”) - Blockchain or crypto companies or exchanges with insufficient government oversight - Failure and exploits of Web 3 coding, e.g. smart contract https://brave.com/web3/intro-to-web3-security/ ZKP: Complexity => Bugs => Big $ Hacks. ZKP Security is A Major Challenge to Mass Adoption

AI&ML: LEARNING = REPRESENTATION + EVALUATION + OPTIMIZATION ML consists of just three components Representation. A classifier must be represented in some formal language that the computer can handle, and how to represent the input Evaluation. An evaluation function is to distinguish good classifiers from bad ones Optimization. A method to search among the classifiers in the language for the highest-scoring one Ref. Pedro Domingos

The 5 Tribes of Machine Learning Ref. Pedro Domingos

Attention Model Ref. Andrew Ng.

Transformer of GenAI Ref. paper “Attention Is All You Need”

Transformer Previous sequential models have limited reference windows Attention mechanism, given enough compute resources - have an infinite ref window - use the entire context to generate output Transformers is an attention-based encoder-decoder architecture - encoder maps input sequence into an abstract holding all learned info - decoder takes that and previous output to generate output

Big Data Storage and Computation NoSQL provides storage & retrieval in means other than RDB, to offer rapid scalability to manage big data Schema is as a blueprint of how the database is constructed (e.g. divided into database tables). View is based on queries that runs on db tables Denormalization improves read perf at the expense of losing some write perf A. Spark provides analytics engine for large-scale data processing with implicit data parallelism and fault tolerance

Data Exchange O rganizations and individuals can buy and sell data, including data sets, data streams, and data services. Data providers to monetize their data. Data consumers to access the data for businesses or research. to use with data and analytics and machine learning services . E.g. Data matching service, Airline premium customers match Bank high credit customers, saving credit checks. Privacy issues The global data marketplace market size was valued at USD 968 million in 2022. And the market is predicted to expand at a compound annual growth rate (CAGR) of 25.0% from 2023 to 2030. Many important data entities provide data exchange marketplaces: big cloud vendors like AWS Data Exchange, Azure Data Share . Or IBM, SAP. Or BCA CIA for Data Exchange. Enc, Sign, Authen => MPC, ZKP. TEE

Final Notes AI and Web3 are highly invested and developed. That leads to new techs and apps E.g. Ecosystem of Blockchains, Layers 0-2, Data Availability (DA). GenAI, NVDA First Principles: Use the new techs and apps to solve the existing problems Rethink Cybersecurity, then certain cyber attacks may no longer work

First Principles - examples Automate both attacks and defenses, such as generating rules from MITRE Use DA to prevent Ransomware attacks Turn PKI CA into Anonymous Credential Chain of trust allows a root authority to certify credentials to leaf entities For bidding system's user privacy, and bidding confidentiality and integrity

AI & Crypto Duality of AI (Centralization) and Crypto (Decentralization) AI finds meaning & patterns - Crypto secures, hides, proves meanings Centralization vs Decentralization. 5 companies are controlling the Internet The development of AI and Crypto in parallel will help balance their powers, preventing them from being abused

ZKP for AI Machine Learning ZKML Tech uses ZKP to protect Integrity and Privacy of AI Machine Learning (like Chat GPT) models and data Prove that an output was produced by applying an ML model, as a ZK circuit representation, to a given input About the inference step of the ML model, not about the ML model training that is very computationally expensive for ZK

ZKML Verify outputs really from expensive models like GPT4 Hide input data that can be sensitive (e.g., medical records) https://worldcoin.org/blog/engineering/intro-to-zkml Related: Security chips, e.g. TPM, TEE, Signing, in all devices

Turing Awards Turing Award is highest-privileged annual prize for scientific contributions of technical importance to computer science, often referred to as the "Nobel Prize of Computing" How many people in AI or Crypto won Turing? Up to 2018, both AI and Crypto are equal at 8. Then AI has 3 more How many people in Cybersecurity won Turing? 7, all are cryptographers as in the Crypto list above Crypto ZKP is conceived by Turing Winners S. Goldwasser, S. Micali and C. Rackoff in 1985

Q & A LAN at Veramine dot Com