Groundbreaking Advance: Safely Compiling C to Rust

2024-12-21

Researchers have developed a novel method for safely compiling C code into Rust. This technique utilizes static analysis and type-directed translation to avoid reliance on Rust's `unsafe` blocks, thus guaranteeing memory safety. The method has been successfully applied to code from the HACL* cryptographic library and EverParse libraries, resulting in an 80,000-line pure Rust verified modern cryptographic library—a first of its kind.

Read more
Development C compilation

Lightweight Safety Classification Using Pruned Language Models

2024-12-19

Researchers introduce Layer Enhanced Classification (LEC), a novel lightweight technique for content safety and prompt injection classification in Large Language Models (LLMs). LEC trains a streamlined Penalized Logistic Regression (PLR) classifier on the hidden state of an LLM's optimal intermediate transformer layer. Combining the efficiency of PLR with the sophisticated language understanding of LLMs, LEC outperforms GPT-4o and specialized models. Small general-purpose models like Qwen 2.5 and architectures such as DeBERTa v3 prove robust feature extractors, effectively training with fewer than 100 high-quality examples. Crucially, intermediate transformer layers often outperform the final layer. A single general-purpose LLM can classify content safety, detect prompt injections, and generate output, or smaller LLMs can be pruned to their optimal intermediate layer for feature extraction. Consistent results across architectures suggest robust feature extraction is inherent to many LLMs.

Read more

Classical Sorting Algorithms Reveal Unexpected Competencies in a Minimal Model of Basal Intelligence

2024-12-19

A new study uses classical sorting algorithms as a model of morphogenesis, challenging conventional wisdom about these algorithms. By breaking assumptions of top-down control and perfectly reliable hardware, researchers discovered that arrays of autonomous elements sort themselves more reliably and robustly than traditional implementations, even in the presence of errors. Surprisingly, these algorithms exhibit the ability to temporarily reduce progress to navigate around defects and unexpected clustering behavior among elements in chimeric arrays following different algorithms. This discovery provides a novel perspective on diverse intelligence, demonstrating how basal forms of intelligence can emerge in simple systems without explicit encoding in their underlying mechanics.

Read more

Cultural Evolution of Cooperation Among LLM Agents

2024-12-18

Researchers investigated whether a 'society' of Large Language Model (LLM) agents can learn mutually beneficial social norms despite incentives to defect. Experiments revealed significant differences in the evolution of cooperation across base models, with Claude 3.5 Sonnet significantly outperforming Gemini 1.5 Flash and GPT-4o. Furthermore, Claude 3.5 Sonnet leveraged a costly punishment mechanism to achieve even higher scores, a feat not replicated by the other models. This study proposes a new benchmark for LLMs focused on the societal implications of LLM agent deployment, offering insights into building more robust and cooperative AI agents.

Read more

No More Adam: Learning Rate Scaling at Initialization is All You Need

2024-12-18

Researchers introduce SGD-SaI, a novel optimizer improving stochastic gradient descent. SGD-SaI addresses training imbalances by scaling learning rates at initialization for different parameter groups based on their gradient signal-to-noise ratios. Significantly more memory-efficient than AdamW, SGD-SaI matches or surpasses AdamW's performance across various Transformer-based tasks, including ImageNet classification and LLM pretraining. Its robustness and practicality are demonstrated across diverse applications, making it a compelling alternative.

Read more
AI

Best-of-N Jailbreaking: A Novel Attack on AI Systems

2024-12-15

Researchers have developed a new AI attack algorithm called Best-of-N (BoN) Jailbreaking. This black-box algorithm repeatedly modifies prompts—randomly shuffling or capitalizing text, for example—until it elicits a harmful response from the AI system. BoN achieved impressively high attack success rates (ASRs) on closed-source language models like GPT-4o (89%) and Claude 3.5 Sonnet (78%), effectively circumventing existing defenses. Furthermore, BoN seamlessly extends to vision and audio language models, highlighting the vulnerability of even advanced AI systems to seemingly innocuous input variations. This research underscores significant security concerns in the field of AI.

Read more

Automated Assembly System Creates Cyborg Insects

2024-12-15

Scientists have developed an automated system for assembling insect-computer hybrid robots. The system uses a vision-guided robotic arm to precisely implant custom-designed bipolar electrodes onto the backs of Madagascar hissing cockroaches. The entire process takes only 68 seconds, and the assembled robots achieve steering and deceleration control comparable to manually assembled systems. A multi-agent system of 4 robots successfully navigated an obstacle course, demonstrating the feasibility of mass production and real-world applications. This research paves the way for scalable production and deployment of insect robots.

Read more

CCxTrust: A Confidential Computing Platform Leveraging Collaborative Trust from TEE and TPM

2024-12-12

CCxTrust is a novel confidential computing platform that cleverly combines the strengths of Trusted Execution Environments (TEEs) and Trusted Platform Modules (TPMs) to establish a collaborative trust framework. By leveraging the black-box Root of Trust (RoT) embedded in CPU-TEEs and the flexible white-box RoT of TPMs, CCxTrust achieves end-to-end protection of sensitive data and models, overcoming the limitations of relying on a single hardware RoT. The platform implements independent Roots of Trust for Measurement (RTM) and a collaborative Root of Trust for Report (RTR), further enhanced by a composite attestation protocol for improved security and efficiency. Experimental results demonstrate significant performance advantages.

Read more

Breakthrough in Reachability Analysis of the Domain Name System

2024-12-12

Researchers have presented the first decision procedure for verifying the Domain Name System (DNS), establishing its complexity as 2ExpTime. The study formalizes DNS semantics and uses a novel abstraction based on positive prefix-testable languages, reducing the DNS verification problem to the verification problem for pushdown systems. This approach effectively models attack vectors in DNS, such as amplification attacks and rewrite blackholing, providing a new theoretical foundation for ensuring DNS security and reliability.

Read more