Deepfake technology presents a significant challenge to cybersecurity. These highly sophisticated AI-generated manipulations can compromise sensitive information and erode public trust, privacy, and security. This has led to broader societal impacts, including decreased trust and confidence in digital communications. This paper will discuss public knowledge, understanding, and perception of AI-generated deepfakes, which was obtained through an online survey that measured people's ability to identify video, audio, and images of deepfakes. The findings will highlight the public's knowledge and perception of deepfakes, the risks that deepfake media presents, and the vulnerabilities to detection and prevention. This awareness will lead to stronger defense strategies and enhanced cybersecurity measures that will ultimately enhance deepfake detection technology and strengthen overall cybersecurity measures that will effectively mitigate exploitation risks and safeguard personal and organizational interests. 
                        more » 
                        « less   
                    
                            
                            Risks to Critical Infrastructure in Hawaii - A Small Business Perspective
                        
                    
    
            This lightning talk addresses the pressing need to enhance cybersecurity measures for Hawaii's critical infrastructure, focusing particularly on healthcare and transportation sectors. These sectors have faced significant cybersecurity challenges, with Oahu's transportation services experiencing major breaches and healthcare institutions like Queen's Health System and Malama I Ke Ola suffering from ransomware attacks since 2021. These incidents have led to severe disruptions and compromised sensitive data. Hawaii's geographic isolation, natural disaster risks, legacy systems, and workforce shortages exacerbate these issues. Additionally, emerging technologies such as AI and IoT further expand vulnerabilities. A comprehensive cybersecurity strategy is essential to mitigate these risks. This talk introduces the concept of a volunteer-supported Human-AI Synergy Hotline, which provides proactive advice, crisis management, and emotional support during and after cyber incidents. This innovative approach aims to enhance cybersecurity preparedness and resilience in Hawaii's critical sectors. 
        more » 
        « less   
        
    
                            - Award ID(s):
- 2300867
- PAR ID:
- 10600555
- Publisher / Repository:
- ACM
- Date Published:
- ISBN:
- 9798400711060
- Page Range / eLocation ID:
- 142 to 142
- Subject(s) / Keyword(s):
- cybersecurity critical infrastructure small business
- Format(s):
- Medium: X
- Location:
- El Paso TX USA
- Sponsoring Org:
- National Science Foundation
More Like this
- 
            
- 
            Artificial Intelligence (AI) is poised to revolutionize numerous aspects of human life, with healthcare among the most critical fields set to benefit from this transformation. Medicine remains one of the most challenging, expensive, and impactful sectors, with challenges such as information retrieval, data organization, diagnostic accuracy, and cost reduction. AI is uniquely suited to address these challenges, ultimately improving the quality of life and reducing healthcare costs for patients worldwide. Despite its potential, the adoption of AI in healthcare has been slower compared to other industries, highlighting the need to understand the specific obstacles hindering its progress. This review identifies the current shortcomings of AI in healthcare and explores its possibilities, realities, and frontiers to provide a roadmap for future advancements.more » « less
- 
            Autonomous Vehicles (AVs) are revolutionizing transportation, but their reliance on interconnected cyber-physical systems exposes them to unprecedented cybersecurity risks. This study addresses the critical challenge of detecting real-time cyber intrusions in self-driving vehicles by leveraging a dataset from the Udacity self-driving car project. We simulate four high-impact attack vectors, Denial of Service (DoS), spoofing, replay, and fuzzy attacks, by injecting noise into spatial features (e.g., bounding box coordinates) to replicate adversarial scenarios. We develop and evaluate two lightweight neural network architectures (NN-1 and NN-2) alongside a logistic regression baseline (LG-1) for intrusion detection. The models achieve exceptional performance, with NN-2 attaining an AUC score of 93.15% and 93.15% accuracy, demonstrating their suitability for edge deployment in AV environments. Through explainable AI techniques, we uncover unique forensic fingerprints of each attack type, such as spatial corruption in fuzzy attacks and temporal anomalies in replay attacks, offering actionable insights for feature engineering and proactive defense. Visual analytics, including confusion matrices, ROC curves, and feature importance plots, validate the models' robustness and interpretability. This research sets a new benchmark for AV cybersecurity, delivering a scalable, field-ready toolkit for Original Equipment Manufacturers (OEMs) and policymakers. By aligning intrusion fingerprints with SAE J3061 automotive security standards, we provide a pathway for integrating machine learning into safety-critical AV systems. Our findings underscore the urgent need for security-by-design AI, ensuring that AVs not only drive autonomously but also defend autonomously. This work bridges the gap between theoretical cybersecurity and life-preserving engineering, offering a leap toward safer, more secure autonomous transportation.more » « less
- 
            The escalating frequency of cybersecurity incidents and the critical importance of blockchain technology in modern society underscore the imperative for enriched, hands-on educational programs in undergraduate Computer Science and Engineering disciplines. This urgency is driven by the need to cultivate a workforce proficient in navigating and mitigating the complexities associated with digital security threats, alongside leveraging blockchain innovations for secure, decentralized solutions. Incorporating comprehensive, experiential learning opportunities into academic curricula will ensure that students are not only well-versed in theoretical knowledge but also proficient in applying practical solutions to real-world challenges, thereby significantly enhancing their preparedness for the demands of the tech industry. This work explores integrating blockchain technology into STEM education, focusing on cybersecurity through a hands-on learning approach. It aims to equip undergraduate students with practical experience in blockchain and cybersecurity, addressing the sector’s complexities and its growing significance. Our work is to develop new modules and lab experiments, fostering real-world skills in these rapidly evolving fields. This initiative highlights the critical role of hands-on learning in understanding blockchain’s foundational concepts and applications, preparing students for future challenges in technology and cybersecurity sectors.more » « less
- 
            Privacy is a key principle for developing ethical AI technologies, but how does including AI technologies in products and services change privacy risks? We constructed a taxonomy of AI privacy risks by an- alyzing 321 documented AI privacy incidents. We codifed how the unique capabilities and requirements of AI technologies described in those incidents generated new privacy risks, exacerbated known ones, or otherwise did not meaningfully alter the risk. We present 12 high-level privacy risks that AI technologies either newly created (e.g., exposure risks from deepfake pornography) or exacerbated (e.g., surveillance risks from collecting training data). One upshot of our work is that incorporating AI technologies into a product can alter the privacy risks it entails. Yet, current approaches to privacy-preserving AI/ML (e.g., federated learning, diferential pri- vacy, checklists) only address a subset of the privacy risks arising from the capabilities and data requirements of AI.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                    