Provably unmasking malicious behavior through execution traces
Posted by PaulHoule 4 days ago
Comments
Comment by thethirdone 4 days ago
It doesn't seem worth it to try to follow the math to see if there is something interesting.
Comment by Joel_Mckay 4 days ago
https://www.youtube.com/watch?v=Xx4Tpsk_fnM
"The Hard Problem of Controlling Powerful AI Systems" (Computerphile)
https://www.youtube.com/watch?v=JAcwtV_bFp4
Attempting to guide statistical salience of LLM reasoning model procedures, usually just created an evasive interface facade in the output. =3
Comment by causalmodels 4 days ago
Comment by dwattttt 4 days ago
A novel use of the word "reliable"? Jokes aside, either they mean the FPR as the opposite of what you'd expect, the table is not representative of their approach, or they're just... really optimistic?
Comment by godelski 4 days ago
> Anyone understand what's going on with the contradictory results between the text and tables?
Well Figure 1 would also disagree. It shows a FPR of 47.5%.From Sec 3, end of second to last paragraph
| The protocol is deterministic given fixed RNG seeds, caches model outputs
by program hash, and *bounds false positives via the chosen percentile and gap parameters.*I believe this is a choice, though I think it is suspect that the FPR is pushed this high to get the TP results.
Disclaimer: I only gave this a very cursory skim so don't rely on me too much