{"id":"https://openalex.org/W4415130152","doi":"https://doi.org/10.48550/arxiv.2506.02035","title":"Asymmetry by Design: Boosting Cyber Defenders with Differential Access to AI","display_name":"Asymmetry by Design: Boosting Cyber Defenders with Differential Access to AI","publication_year":2025,"publication_date":"2025-05-31","ids":{"openalex":"https://openalex.org/W4415130152","doi":"https://doi.org/10.48550/arxiv.2506.02035"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2506.02035","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.02035","pdf_url":"https://arxiv.org/pdf/2506.02035","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2506.02035","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092998349","display_name":"Shaun Ee","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ee, Shaun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119977592","display_name":"Chris Covino","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Covino, Chris","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119977593","display_name":"Cara Labrador","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Labrador, Cara","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119977594","display_name":"Christina Krawec","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Krawec, Christina","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100019177","display_name":"Jam Kraprayoon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kraprayoon, Jam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5109048634","display_name":"J.N. O'Brien","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"O'Brien, Joe","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5092998349"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9269999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.911300003528595,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.6489999890327454},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49380001425743103},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.49059998989105225},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4672999978065491},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.444599986076355},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4092999994754791}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6535999774932861},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.6489999890327454},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6456000208854675},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49380001425743103},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.444599986076355},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C2778571376","wikidata":"https://www.wikidata.org/wiki/Q1355821","display_name":"Frontier","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C2994522178","wikidata":"https://www.wikidata.org/wiki/Q169207","display_name":"Differential treatment","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C2985829316","wikidata":"https://www.wikidata.org/wiki/Q26084","display_name":"Access to information","level":3,"score":0.26260000467300415},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.25839999318122864},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.25540000200271606}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2506.02035","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.02035","pdf_url":"https://arxiv.org/pdf/2506.02035","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2506.02035","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2506.02035","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2506.02035","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.02035","pdf_url":"https://arxiv.org/pdf/2506.02035","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"AI-enabled":[1],"cyber":[2,109],"capabilities":[3],"become":[4],"more":[5,38],"advanced,":[6],"we":[7],"propose":[8],"\"differential":[9],"access\"":[10],"as":[11],"a":[12,34,52,86,107,111],"strategy":[13],"to":[14,24,61,80,88,130],"tilt":[15],"the":[16,59,67,98],"cybersecurity":[17],"balance":[18],"toward":[19],"defense":[20],"by":[21,49],"shaping":[22],"access":[23,79,101,135],"these":[25],"capabilities.":[26,82],"We":[27,122],"introduce":[28],"three":[29,99],"possible":[30],"approaches":[31,57],"that":[32,72],"form":[33],"continuum,":[35],"becoming":[36],"progressively":[37],"restrictive":[39,69],"for":[40,76,128,147],"higher-risk":[41],"capabilities:":[42],"Promote":[43],"Access,":[44,46],"Manage":[45],"and":[47,94,114,116,118,141,144],"Deny":[48],"Default.":[50],"However,":[51],"key":[53],"principle":[54],"across":[55,138],"all":[56],"is":[58],"need":[60],"prioritize":[62],"defender":[63,142],"access,":[64],"even":[65],"in":[66],"most":[68],"scenarios,":[70],"so":[71],"defenders":[73,129],"can":[74],"prepare":[75],"adversaries":[77],"gaining":[78],"similar":[81],"This":[83],"report":[84],"provides":[85,136],"process":[87],"help":[89],"frontier":[90],"AI":[91],"developers":[92],"choose":[93],"implement":[95],"one":[96],"of":[97],"differential":[100,134],"approaches,":[102],"including":[103],"considerations":[104],"based":[105],"on":[106],"model's":[108],"capabilities,":[110],"defender's":[112],"maturity":[113],"role,":[115],"strategic":[117],"technical":[119],"implementation":[120],"details.":[121],"also":[123],"present":[124],"four":[125],"example":[126],"schemes":[127],"reference,":[131],"demonstrating":[132],"how":[133],"value":[137],"various":[139],"capability":[140],"levels,":[143],"suggest":[145],"directions":[146],"further":[148],"research.":[149]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-14T00:00:00"}
