{"id":"https://openalex.org/W4400977372","doi":"https://doi.org/10.1145/3664476.3664510","title":"SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security","display_name":"SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977372","doi":"https://doi.org/10.1145/3664476.3664510"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3664510","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3664510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/344859124/3664476.3664510.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042348675","display_name":"Richard May","orcid":"https://orcid.org/0000-0001-7186-404X"},"institutions":[{"id":"https://openalex.org/I94575722","display_name":"Harz University of Applied Sciences","ror":"https://ror.org/048yn7628","country_code":"DE","type":"education","lineage":["https://openalex.org/I94575722"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Richard May","raw_affiliation_strings":["Harz University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Harz University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I94575722"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042728295","display_name":"Jacob Kr\u00fcger","orcid":"https://orcid.org/0000-0002-0283-248X"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jacob Kr\u00fcger","raw_affiliation_strings":["Mathematics and Computer Science, Eindhoven University of Technology, Netherlands"],"affiliations":[{"raw_affiliation_string":"Mathematics and Computer Science, Eindhoven University of Technology, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086853013","display_name":"Thomas Leich","orcid":"https://orcid.org/0000-0001-9580-7728"},"institutions":[{"id":"https://openalex.org/I94575722","display_name":"Harz University of Applied Sciences","ror":"https://ror.org/048yn7628","country_code":"DE","type":"education","lineage":["https://openalex.org/I94575722"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Leich","raw_affiliation_strings":["Harz University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Harz University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I94575722"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042348675"],"corresponding_institution_ids":["https://openalex.org/I94575722"],"apc_list":null,"apc_paid":null,"fwci":1.5789,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85730138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6270013451576233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5437991619110107},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.326050728559494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6270013451576233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5437991619110107},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.326050728559494}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3664476.3664510","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3664510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/0d5a6f40-5ed3-464e-bf8f-546aaeef34e5","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/0d5a6f40-5ed3-464e-bf8f-546aaeef34e5","pdf_url":"https://pure.tue.nl/ws/files/344859124/3664476.3664510.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"May, R, Kr\u00fcger, J & Leich, T 2024, SoK : How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. in ARES '24 : Proceedings of the 19th International Conference on Availability, Reliability and Security., 44, Association for Computing Machinery, Inc., 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30/07/24. https://doi.org/10.1145/3664476.3664510","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:publications/0d5a6f40-5ed3-464e-bf8f-546aaeef34e5","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/0d5a6f40-5ed3-464e-bf8f-546aaeef34e5","pdf_url":"https://pure.tue.nl/ws/files/344859124/3664476.3664510.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"May, R, Kr\u00fcger, J & Leich, T 2024, SoK : How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. in ARES '24 : Proceedings of the 19th International Conference on Availability, Reliability and Security., 44, Association for Computing Machinery, Inc., 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30/07/24. https://doi.org/10.1145/3664476.3664510","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400977372.pdf"},"referenced_works_count":55,"referenced_works":["https://openalex.org/W37416347","https://openalex.org/W1880262756","https://openalex.org/W1982848337","https://openalex.org/W2001991954","https://openalex.org/W2139137304","https://openalex.org/W2464234006","https://openalex.org/W2576845151","https://openalex.org/W2587676558","https://openalex.org/W2737060875","https://openalex.org/W2770800261","https://openalex.org/W2771362821","https://openalex.org/W2774123141","https://openalex.org/W2891421390","https://openalex.org/W2910707576","https://openalex.org/W2912185124","https://openalex.org/W2981446616","https://openalex.org/W3000442796","https://openalex.org/W3006171966","https://openalex.org/W3006556904","https://openalex.org/W3019200173","https://openalex.org/W3037254286","https://openalex.org/W3089489910","https://openalex.org/W3090586341","https://openalex.org/W3100473510","https://openalex.org/W3110399444","https://openalex.org/W3125803510","https://openalex.org/W3152332785","https://openalex.org/W3155506557","https://openalex.org/W3163898563","https://openalex.org/W3184097711","https://openalex.org/W3197944870","https://openalex.org/W3204393347","https://openalex.org/W3206420877","https://openalex.org/W3215624426","https://openalex.org/W4205704181","https://openalex.org/W4210354029","https://openalex.org/W4220966162","https://openalex.org/W4237785350","https://openalex.org/W4285166081","https://openalex.org/W4292550651","https://openalex.org/W4311542362","https://openalex.org/W4323655724","https://openalex.org/W4360585343","https://openalex.org/W4378574344","https://openalex.org/W4378716165","https://openalex.org/W4385236815","https://openalex.org/W4387010270","https://openalex.org/W4387853720","https://openalex.org/W4387939864","https://openalex.org/W4388832312","https://openalex.org/W4389359039","https://openalex.org/W4389894892","https://openalex.org/W4391913563","https://openalex.org/W4392106982","https://openalex.org/W6794176352"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0],"the":[1,49,73,83,138,145,151,166,200,209,256],"past":[2],"years,":[3],"a":[4,31,100,219],"growing":[5],"number":[6,221],"of":[7,79,85,103,153,168,202,211,222,232,258],"highly-automated":[8],"systems":[9,194],"has":[10],"build":[11],"on":[12,82,96],"Artificial-Intelligence":[13],"(AI)":[14],"capabilities,":[15],"for":[16,25],"example,":[17],"self-driving":[18],"vehicles":[19],"or":[20,42],"predictive":[21],"health-state":[22],"diagnoses.":[23],"As":[24],"any":[26],"software":[27,64],"system,":[28],"there":[29],"is":[30],"risk":[32],"that":[33,43,106,150],"misbehavior":[34],"occurs":[35],"(e.g.,":[36,51],"system":[37,50],"failure":[38],"due":[39],"to":[40,47,58,93,121,184,204,242,254],"bugs)":[41],"malicious":[44],"actors":[45],"aim":[46,92],"misuse":[48],"generating":[52],"attack":[53],"scripts),":[54],"which":[55,144],"can":[56],"lead":[57],"safety":[59,65,113,207,250],"and":[60,66,114,127,141,161,171,176,192,229,245,251,262],"security":[61,67,115,175,203,252],"incidents.":[62,87],"While":[63],"incidents":[68,105,116,146,155,182],"have":[69],"been":[70],"studied":[71],"in":[72,143,165,208,247],"past,":[74],"we":[75,91,107,131],"are":[76],"not":[77,157],"aware":[78],"research":[80],"focusing":[81],"specifics":[84],"AI":[86,118,154,186,212,264],"With":[88],"this":[89,97],"paper,":[90],"shed":[94],"light":[95],"gap":[98],"through":[99],"case":[101],"survey":[102],"240":[104],"elicited":[108],"from":[109,119],"four":[110],"datasets":[111],"comprising":[112],"involving":[117],"2014":[120],"2023.":[122],"Using":[123],"manual":[124],"data":[125],"analyses":[126],"automated":[128],"topic":[129,152],"modeling,":[130],"derived":[132],"relevant":[133],"topics":[134],"as":[135,137,236,238],"well":[136,237],"major":[139,230,249],"issues":[140,253],"contexts":[142,167],"occurred.":[147],"We":[148,240],"find":[149],"is,":[156],"surprisingly,":[158],"becoming":[159],"more":[160,162,259],"relevant,":[163],"particularly":[164],"autonomous":[169],"driving":[170],"process-automation":[172],"robotics.":[173],"Regarding":[174],"its":[177],"intersection":[178],"with":[179,214],"safety,":[180],"most":[181],"connect":[183],"generative":[185],"(i.e.,":[187,195],"large-language":[188],"models,":[189],"deep":[190],"fakes)":[191],"computer-vision":[193],"facial":[196],"recognition).":[197],"This":[198],"emphasizes":[199],"importance":[201],"also":[205],"ensure":[206],"context":[210],"systems,":[213],"our":[215],"results":[216],"further":[217],"revealing":[218],"high":[220],"serious":[223],"consequences":[224],"(system":[225],"compromise,":[226],"human":[227],"injuries)":[228],"violations":[231],"confidentiality,":[233],"integrity,":[234],"availability,":[235],"authorization.":[239],"hope":[241],"support":[243,255],"practitioners":[244],"researchers":[246],"understanding":[248],"development":[257],"secure,":[260],"safe,":[261],"trustworthy":[263],"systems.":[265]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
