Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412)

Authors Nele Mentens, Stjepan Picek, Ahmad-Reza Sadeghi and all authors of the abstracts in this report

Thumbnail PDF


  • Filesize: 1.68 MB
  • 23 pages

Document Identifiers

Author Details

Nele Mentens
  • Leiden University, NL
Stjepan Picek
  • Radboud University Nijmegen, NL
Ahmad-Reza Sadeghi
  • TU Darmstadt, DE
and all authors of the abstracts in this report

Cite AsGet BibTex

Nele Mentens, Stjepan Picek, and Ahmad-Reza Sadeghi. Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412). In Dagstuhl Reports, Volume 12, Issue 10, pp. 106-128, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)


This report documents the outcomes of Dagstuhl Seminar 22412 "Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse". The seminar brought together 25 attendees from 10 countries (Canada, Croatia, Czech Republic, France, Germany, Netherlands, Singapore, Sweden, Switzerland, and the USA). There were 17 male and 8 female participants. Three participants were from the industry, and the rest were from academia. The gathered researchers are actively working in the domains of artificial intelligence and cybersecurity, emphasizing hardware security, fuzzing, physical security, and network security. The seminar aims to foster sharing experiences and best practices between various cybersecurity applications and understand how and when certain approaches are transferable. The first two days were devoted to 20-minute self-introductions by participants to achieve these goals. At the end of the second day, we made a list of topics that were decided to be the focus of the seminar and that will be discussed in the groups in the next few days. On the third and fourth days, the work was conducted in four discussion groups where at the end of each day, all participants gathered to report the results from the discussion groups and to align the goals. On the last day, we again worked in one group to summarize the findings and foster networking among participants. A hike was organized in the afternoon of the third day. The seminar was a success. The participants actively participated in the working groups and the discussions and went home with new ideas and collaborators. This report gathers the abstracts of the presented talks and the conclusions from the discussion groups, which we consider relevant contributions toward better interdisciplinary research on artificial intelligence and cybersecurity.

Subject Classification

ACM Subject Classification
  • Security and privacy → Cryptography
  • Security and privacy → Intrusion/anomaly detection and malware mitigation
  • Security and privacy → Security in hardware
  • Security and privacy → Systems security
  • Computing methodologies → Artificial intelligence
  • Computing methodologies → Machine learning
  • Computer systems organization → Real-time systems
  • Cybersecurity
  • Artificial Intelligence
  • Hardware Security
  • Machine Learning
  • Explainability


  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    PDF Downloads