skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Elevating Corporate Profits Over Individual Liberty: Comparing AI Trade Secret Privilege in Criminal Proceedings with Patent Litigation.
This essay compares the claims of trade secret privilege in criminal proceedings asserted by the creators of AI systems with the assertions of such privilege in patent infringement discovery. This comparison reveals that, in the case of patent infringement, courts have generally limited such privilege assertions. This essay argues that the case for discovery in the criminal context should be stronger, rather than weaker, in the criminal context.  more » « less
Award ID(s):
2131504
PAR ID:
10545299
Author(s) / Creator(s):
Publisher / Repository:
Joe Christenson, Inc
Date Published:
Journal Name:
Houston law review
ISSN:
0018-6694
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a preshared password to authenticate each other and establish a session key. SRP aims to resist dictionary attacks, not store plaintext-equivalent passwords on the server, avoid patent infringement, and avoid export controls by not using encryption. Formal analysis of SRP is challenging in part because existing tools provide no simple way to reason about its use of the mathematical expression “v + g b mod q”. Modeling v + g b as encryption, we complete an exhaustive study of all possible execution sequences of SRP. Ignoring possible algebraic attacks, this analysis detects no major structural weakness, and in particular no leakage of any secrets. We do uncover one notable weakness of SRP, which follows from its design constraints. It is possible for a malicious server to fake an authentication session with a client, without the client’s participation. This action might facilitate an escalation of privilege attack, if the client has higher privileges than does the server. We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA. 
    more » « less
  2. We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a pre-shared password to authenticate each other and establish a session key. SRP aims to resist dictionary attacks, not store plaintext-equivalent passwords on the server, avoid patent infringement, and avoid export controls by not using encryption. Formal analysis of SRP is challenging in part because existing tools provide no simple way to reason about its use of the mathematical expression “v + g b mod q”. Modeling v + g b as encryption, we complete an exhaustive study of all possible execution sequences of SRP. Ignoring possible algebraic attacks, this analysis detects no major structural weakness, and in particular no leakage of any secrets. We do uncover one notable weakness of SRP, which follows from its design constraints. It is possible for a malicious server to fake an authentication session with a client, without the client’s participation. This action might facilitate an escalation of privilege attack, if the client has higher privileges than does the server. We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA. 
    more » « less
  3. null (Ed.)
    This essay takes up the incorporation of geospatial materials into international criminal law and its institutional locations, focusing on the Hague-based International Criminal Court (ICC). We consider how geospatial materials such as satellite imagery are conscripted as legal materials for international criminal trials, and how these relatively novel forms of evidence require interventions of technical knowledge through expert witness testimony. The assemblage of satellite imagery, expert testimony, and submitted reports are subjected to what we call ‘juridical mediation’ – the vetting of materials through interpretive processes that bring them into a relationship with textual forms, such as statutory principles and the Rules of Procedure and Evidence. What appears on the other side of this mediated process is a complex and composite relationship between textual, technological, and hermeneutic forms, troubling the claim that geospatial material ‘speaks for itself’. 
    more » « less
  4. null (Ed.)
    This essay takes up the incorporation of geospatial materials into international criminal law and its institutional locations, focusing on the Hague-based International Criminal Court (ICC). We consider how geospatial materials such as satellite imagery are conscripted as legal materials for international criminal trials, and how these relatively novel forms of evidence require interventions of technical knowledge through expert witness testimony. The assemblage of satellite imagery, expert testimony, and submitted reports are subjected to what we call ‘juridical mediation’ – the vetting of materials through interpretive processes that bring them into a relationship with textual forms, such as statutory principles and the Rules of Procedure and Evidence. What appears on the other side of this mediated process is a complex and composite relationship between textual, technological, and hermeneutic forms, troubling the claim that geospatial material ‘speaks for itself’. 
    more » « less
  5. An assertion is a predicate that should be evaluated true during program execution. In this paper, we present the development of quantum assertion schemes and show how they are used for hardware error mitigation and software debugging. Compared to assertions in classical programs, quantum assertions are challenging due to the no-cloning theorem and potentially destructive measurement. We discuss how these challenges can be circumvented such that certain properties of quantum states can be verified non-destructively during program execution. Furthermore, we show that besides detecting program bugs, dynamic assertion circuits can mitigate noise effects via post-selection of the assertion results. Our case studies demonstrate the use of quantum assertions in various quantum algorithms. 
    more » « less