Designing Secure AI-based Systems: A Multi-Vocal Literature Review

Simon Schneider*, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

AI-based systems leverage recent advances in the field of AI/ML by combining traditional software systems with AI components. Applications are increasingly being developed in this way. Software engineers can usually rely on a plethora of supporting information on how to use and implement any given technology. For AI-based systems, however, such information is scarce. Specifically, guidance on how to securely design the architecture is not available to the extent as for other systems.We present 16 architectural security guidelines for the design of AI-based systems that were curated via a multi-vocal literature review. The guidelines could support practitioners with actionable advice on the secure development of AI-based systems. Further, we mapped the guidelines to typical components of AI-based systems and observed a high coverage where 6 out of 8 generic components have at least one guideline associated to them.

Original languageEnglish
Title of host publication2024 IEEE Secure Development Conference (SecDev)
Subtitle of host publication[Proceedings]
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages13-19
Number of pages7
ISBN (Electronic)9798350342482
ISBN (Print)9798350391947
DOIs
Publication statusPublished - 2024
Event2024 IEEE Secure Development Conference, SecDev 2024 - Pittsburgh, United States
Duration: 7 Oct 20249 Oct 2024

Conference

Conference2024 IEEE Secure Development Conference, SecDev 2024
Country/TerritoryUnited States
CityPittsburgh
Period7/10/249/10/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • AI
  • guidelines
  • security
  • software architecture

Fingerprint

Dive into the research topics of 'Designing Secure AI-based Systems: A Multi-Vocal Literature Review'. Together they form a unique fingerprint.

Cite this