Computer hacker vs artificial intelligence, when you hear these two keywords rich in science and technology, you may automatically make up a century war in the virtual world that you can’t see the smoke of gunpowder. Imagination is worthy of recognition, but I still have to pour cold water on you. In fact, the contest between them is probably similar to that of elementary school students playing Lol.
Do you know Alan Turing? He was called “the father of computer science” and “the father of artificial intelligence” by later generations. In the 1950s, he published two heavyweight papers, one was entitled “Computer Machines and Intelligence” and the other was “Can Machines Think?” “. With the development of neural network technology today, Alan Turing has answered all the questions left by Alan Turing in the last century, but scientists have not stopped thinking about artificial intelligence.
As we all know, robots in the 21st century can have the ability to think. Nowadays, a topic is being discussed in the artificial intelligence circle-“Can machines think better than humans?” Asking this question rhetorically, the answer is obvious:
“Can humans think better than robots?” Of course!
Hackers don’t care about the development of artificial intelligence or artificial anti-intelligence, their way is actually to surpass the machine. Hackers know very well that although computers are smarter than humans and answer questions faster, this does not mean that humans cannot win the turnaround!
“Currently, there is no artificial intelligence that can simulate the most basic hacker skills,” said Eric S. Raymond, a programmer and an advocate of open source software. “Can artificial intelligence simulate hackers in the future? It’s still unknown. Now, we can’t predict what capabilities artificial intelligence will have in the next ten, twenty, or fifty years, just like no one will tell you straightforwardly that he/she can lie to you.”
If you ask questions about artificial intelligence hacker skills in the white hat hacker community, then the above paragraph may be the answer, of course, this answer may be harsh. However, there is no rubbish in the binary world. Frankly speaking, artificial intelligence may really be unable to handle even the most basic hacking programs.
If you want to understand why this is the case, first of all, you must understand how a “good hacker” is made.
Jon Erickson works in Northern California and is a cryptographer and security expert. He believes that if you want to be a successful hacker, you must have five basic skills: programming ability, assembly language ability, debugging or troubleshooting ability, reverse engineering ability, and research ability.
Programming: To put it plainly, programming is to write code in order to formulate executable computer programs.
Assembly language: Assembly language is a low-level language used in electronic computers, microprocessors, microcontrollers or other programmable devices, also known as symbolic languages. In different devices, assembly language corresponds to different machine language instruction sets, which are converted into machine instructions that cannot be translated by humans through the assembly process. These instruction sets allow hackers to access the CPU architecture, but it is more for hackers to understand what the computer is doing, rather than ordering the computer to do.
Debugging or troubleshooting the program: Debugging or troubleshooting is actually a process of cleaning up the program. “Knowing how to use a low-level debugger allows hackers to explore and check what problems will occur when the program is executed,” Erickson said. “Using a debugger is one of the best ways, because it can see how the program is being executed.”
Reverse engineering: “Basically, reverse engineering can figure out what a program does. You only need to look at the machine instructions or what data the program repeatedly sends,” Erickson continued. “Sometimes, just look at Looking at the router firmware image or closed source code software is enough for hackers to find the backdoor or loopholes in the code, and then easily escape. Why is it so simple? Because you don’t need to look at the machine instructions at all.”
Research: “In the hacker world, you need to keep studying and exploring, so that you can always stay in the leading position,” Erickson explained, “but this does not mean that some old technologies are not worth learning. For example, based on the overflow vulnerabilities of the battle have existed for more than half a century, but even now, they are still being used by many hackers.”
Can artificial intelligence possess these qualities? In fact, the vast majority can. In today’s artificial intelligence programs, programming functions have been implemented, and programming languages have been mastered. Compared with humans, robots can handle reverse engineering more easily, and are even slightly better at debugging programs or troubleshooting.
Seeing this, you may be worried that artificial intelligence surpasses humans. In fact, artificial intelligence has a flaw-not good at doing research. Artificial intelligence may master a set of information categories, and even some artificial intelligences have built-in self-creativity to try a variety of different graphical methods, or change various conditions that may cause the machine to “panic”, but humans have self-adjustment The ability to obtain results without using the process, machines really cannot do this, machines can only adapt to conditioned reflex, because they have no initiative. Having said that, you should reflect, why some systems can successfully prevent artificial intelligence machine hackers, but there is no way to use real human hackers? After all, robots lack spirituality. Edison, the king of invention, also said that success depends on 1% inspiration.
“Copying human creativity, if the machine really has this ability, then it is absolutely incredible, and for now, it is definitely not within the scope of human cognitive understanding,” said Alex Rice, who is a network founder and chief technology officer of the security company HackerOne, “However, in the hacker circle I know, the best hackers actually have a strong belief that they absolutely believe that anything is possible.”
Rice believes that when the machine also shows firm conviction, he will start to feel worried. However, the machine is not yet self-aware, at least not yet.
Finally, if you want to watch the contest between hackers and artificial intelligence, here is good news: at the DEF CON hacker conference next year, the US military, represented by the US Department of Defense Advanced Research Projects Agency (DARPA), is actively preparing Host the DARPA Cyber Challenge Finals.
In fact, the previous online challenge has attracted 104 hacker teams to participate. After fierce competition, seven teams finally entered the finals. The final is like this. Each team will try to protect a security system, and then other teams will write computer hacking programs similar to artificial intelligence to attack this system. Whoever can obtain (or protect) the “military flag” will be able to Win, and this “military flag” is actually a system data packet.
If you have a glass heart, you don’t have to look forward to this game so much, because what you see on the scene may be just facing hackers who are burning their brains.