A Community-driven vision for a new Knowledge Resource for AI
Authors:
Vinay K Chaudhri,
Chaitan Baru,
Brandon Bennett,
Mehul Bhatt,
Darion Cassel,
Anthony G Cohn,
Rina Dechter,
Esra Erdem,
Dave Ferrucci,
Ken Forbus,
Gregory Gelfond,
Michael Genesereth,
Andrew S. Gordon,
Benjamin Grosof,
Gopal Gupta,
Jim Hendler,
Sharat Israni,
Tyler R. Josephson,
Patrick Kyllonen,
Yuliya Lierler,
Vladimir Lifschitz,
Clifton McFate,
Hande K. McGinty,
Leora Morgenstern,
Alessandro Oltramari
, et al. (7 additional authors not shown)
Abstract:
The long-standing goal of creating a comprehensive, multi-purpose knowledge resource, reminiscent of the 1984 Cyc project, still persists in AI. Despite the success of knowledge resources like WordNet, ConceptNet, Wolfram|Alpha and other commercial knowledge graphs, verifiable, general-purpose widely available sources of knowledge remain a critical deficiency in AI infrastructure. Large language m…
▽ More
The long-standing goal of creating a comprehensive, multi-purpose knowledge resource, reminiscent of the 1984 Cyc project, still persists in AI. Despite the success of knowledge resources like WordNet, ConceptNet, Wolfram|Alpha and other commercial knowledge graphs, verifiable, general-purpose widely available sources of knowledge remain a critical deficiency in AI infrastructure. Large language models struggle due to knowledge gaps; robotic planning lacks necessary world knowledge; and the detection of factually false information relies heavily on human expertise. What kind of knowledge resource is most needed in AI today? How can modern technology shape its development and evaluation? A recent AAAI workshop gathered over 50 researchers to explore these questions. This paper synthesizes our findings and outlines a community-driven vision for a new knowledge infrastructure. In addition to leveraging contemporary advances in knowledge representation and reasoning, one promising idea is to build an open engineering framework to exploit knowledge modules effectively within the context of practical applications. Such a framework should include sets of conventions and social structures that are adopted by contributors.
△ Less
Submitted 19 June, 2025;
originally announced June 2025.
Uncovering Information Flow Policy Violations in C Programs
Authors:
Darion Cassel,
Yan Huang,
Limin Jia
Abstract:
Programmers of cryptographic applications written in C need to avoid common mistakes such as sending private data over public channels, modifying trusted data with untrusted functions, or improperly ordering protocol steps. These secrecy, integrity, and sequencing policies can be cumbersome to check with existing general-purpose tools. We have developed a novel means of specifying and uncovering v…
▽ More
Programmers of cryptographic applications written in C need to avoid common mistakes such as sending private data over public channels, modifying trusted data with untrusted functions, or improperly ordering protocol steps. These secrecy, integrity, and sequencing policies can be cumbersome to check with existing general-purpose tools. We have developed a novel means of specifying and uncovering violations of these policies that allows for a much lighter-weight approach than previous tools. We embed the policy annotations in C's type system via a source-to-source translation and leverage existing C compilers to check for policy violations, achieving high performance and scalability. We show through case studies of recent cryptographic libraries and applications that our work is able to express detailed policies for large bodies of C code and can find subtle policy violations. To gain formal understanding of our policy annotations, we show formal connections between the policy annotations and an information flow type system and prove a noninterference guarantee.
△ Less
Submitted 3 July, 2019;
originally announced July 2019.