Full bibliography

Artificial Consciousness and Security

Resource type
Preprint
Author/contributor
Title
Artificial Consciousness and Security
Abstract
This paper describes a possible way to improve computer security by implementing a program which implements the following three features related to a weak notion of artificial consciousness: (partial) self-monitoring, ability to compute the truth of quantifier-free propositions and the ability to communicate with the user. The integrity of the program could be enhanced by using a trusted computing approach, that is to say a hardware module that is at the root of a chain of trust. This paper outlines a possible approach but does not refer to an implementation (which would need further work), but the author believes that an implementation using current processors, a debugger, a monitoring program and a trusted processing module is currently possible.
Repository
arXiv
Date
2019
Accessed
3/7/25, 7:17 AM
Library Catalog
DOI.org (Datacite)
Rights
arXiv.org perpetual, non-exclusive license
Extra
Version Number: 1
Notes

Other

7 pages, no figures
Citation
Powell, A. (2019). Artificial Consciousness and Security. arXiv. https://doi.org/10.48550/ARXIV.1905.11807