Most Influential ArXiv (Cryptography and Security) Papers (2024-10)
The field of Cryptography and Security in arXiv covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly it includes material in ACM Subject Classes D.4.6 and E.3. Paper Digest Team analyzes all papers published in this field in the past years, and presents up to 30 most influential papers for each year. This ranking list is automatically constructed based upon citations from both research papers and granted patents, and will be frequently updated to reflect the most recent changes. To find the latest version of this list or the most influential papers from other conferences/journals, please visit Best Paper Digest page. Note: the most influential papers may or may not include the papers that won the best paper awards. (Version: 2024-10).
This list is created by the Paper Digest Team. Experience the cutting-edge capabilities of Paper Digest, an innovative AI-powered research platform that empowers you to write, review, get answers and more.
Paper Digest Team
New York City, New York, 10017
team@paperdigest.org
TABLE 1: Most Influential ArXiv (Cryptography and Security) Papers (2024-10)
Year | Rank | Paper | Author(s) |
---|---|---|---|
2024 | 1 | On Lattices, Learning with Errors, Random Linear Codes, and Cryptography IF:9 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Our main result is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the … |
Oded Regev; |
2024 | 2 | Secure Routing for Mobile Ad Hoc Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In particular, in MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we present a route discovery protocol that mitigates the detrimental effects of such malicious behavior, as to provide correct connectivity information. |
Panagiotis Papadimitratos; Zygmunt J. Haas; |
2024 | 3 | A Review on The Use of Blockchain for The Internet of Things IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a thorough review on how to adapt blockchain to the specific needs of IoT in order to develop Blockchain-based IoT (BIoT) applications is presented. |
Tiago M. Fernandez-Carames; Paula Fraga-Lamas; |
2024 | 4 | Secure Link State Routing for Mobile Ad Hoc Networks IF:7 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, … |
Panagiotis Papadimitratos; Zygmunt J. Haas; |
2024 | 5 | A Review on Blockchain Technologies for An Advanced and Cyber-Resilient Automotive Industry IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: One of the latest technologies that can benefit the automotive industry is blockchain, which can enhance its data security, privacy, anonymity, traceability, accountability, integrity, robustness, transparency, trustworthiness and authentication, as well as provide long-term sustainability and a higher operational efficiency to the whole industry. This review analyzes the great potential of applying blockchain technologies to the automotive industry emphasizing its cybersecurity features. |
Paula Fraga-Lamas; Tiago M. Fernandez-Carames; |
2024 | 6 | From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for The Internet of Things IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Thus, this paper is aimed at providing a wide view of post-quantum IoT security and give useful guidelines to the future post-quantum IoT developers. |
Tiago M. Fernandez-Carames; |
2024 | 7 | Sleeper Agents: Training Deceptive LLMs That Persist Through Safety Training IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: If an AI system learned such a deceptive strategy, could we detect it and remove it using current state-of-the-art safety training techniques? To study this question, we construct proof-of-concept examples of deceptive behavior in large language models (LLMs). |
EVAN HUBINGER et. al. |
2024 | 8 | Adaptive Artificial Immune Networks for Mitigating DoS Flooding Attacks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In order to contribute to their development, in this paper, the use of artificial immune systems to mitigate denial of service attacks is proposed. |
Jorge Maestre Vidal; Ana Lucila Sandoval Orozco; Luis Javier García Villalba; |
2024 | 9 | Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this way, we achieve 100% attack success rate — according to GPT-4 as a judge — on Vicuna-13B, Mistral-7B, Phi-3-Mini, Nemotron-4-340B, Llama-2-Chat-7B/13B/70B, Llama-3-Instruct-8B, Gemma-7B, GPT-3.5, GPT-4o, and R2D2 from HarmBench that was adversarially trained against the GCG attack. |
Maksym Andriushchenko; Francesco Croce; Nicolas Flammarion; |
2024 | 10 | HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a novel honeypot architecture termed HoneyDOC to support all-round honeypot design and implementation. |
Wenjun Fan; Zhihui Du; Max Smith-Creasey; David Fernández; |
2024 | 12 | JailbreakBench: An Open Robustness Benchmark for Jailbreaking Large Language Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: And third, numerous works are not reproducible, as they withhold adversarial prompts, involve closed-source code, or rely on evolving proprietary APIs. To address these challenges, we introduce JailbreakBench, an open-sourced benchmark with the following components: (1) an evolving repository of state-of-the-art adversarial prompts, which we refer to as jailbreak artifacts; (2) a jailbreaking dataset comprising 100 behaviors — both original and sourced from prior work (Zou et al., 2023; Mazeika et al., 2023, 2024) — which align with OpenAI’s usage policies; (3) a standardized evaluation framework at https://github.com/JailbreakBench/jailbreakbench that includes a clearly defined threat model, system prompts, chat templates, and scoring functions; and (4) a leaderboard at https://jailbreakbench.github.io/ that tracks the performance of attacks and defenses for various LLMs. |
PATRICK CHAO et. al. |
2024 | 13 | SafeDecoding: Defending Against Jailbreak Attacks Via Safety-Aware Decoding IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we aim to defend LLMs against jailbreak attacks by introducing SafeDecoding, a safety-aware decoding strategy for LLMs to generate helpful and harmless responses to user queries. |
ZHANGCHEN XU et. al. |
2024 | 14 | The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Today’s LLMs are susceptible to prompt injections, jailbreaks, and other attacks that allow adversaries to overwrite a model’s original instructions with their own malicious prompts. In this work, we argue that one of the primary vulnerabilities underlying these attacks is that LLMs often consider system prompts (e.g., text from an application developer) to be the same priority as text from untrusted users and third parties. |
ERIC WALLACE et. al. |
2024 | 15 | A Novel Pattern Recognition System for Detecting Android Malware By Analyzing Suspicious Boot Sequences IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces a malware detection system for smartphones based on studying the dynamic behavior of suspicious applications. |
Jorge Maestre Vidal; Marco Antonio Sotelo Monge; Luis Javier García Villalba; |
2024 | 16 | Comprehensive Assessment of Jailbreak Attacks Against LLMs IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Overall, our research highlights the necessity of evaluating different jailbreak methods. We hope our study can provide insights for future research on jailbreak attacks and serve as a benchmark tool for evaluating them for practitioners. |
JUNJIE CHU et. al. |
2024 | 17 | Stealing Part of A Production Language Model IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI’s ChatGPT or Google’s PaLM-2. |
NICHOLAS CARLINI et. al. |
2024 | 18 | Correcting Subverted Random Oracles IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes. |
Alexander Russell; Qiang Tang; Moti Yung; Hong-Sheng Zhou; Jiadong Zhu; |
2024 | 19 | A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we systematically analyze the security of LLM systems, instead of focusing on the individual LLMs. |
Fangzhou Wu; Ning Zhang; Somesh Jha; Patrick McDaniel; Chaowei Xiao; |
2024 | 20 | SoK: Analysis of Software Supply Chain Security By Establishing Secure Design Properties IF:3 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties … |
Chinenye Okafor; Taylor R. Schorlemmer; Santiago Torres-Arias; James C. Davis; |
2024 | 21 | Deep Multi-Task Learning for Malware Image Classification IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: A novel multi-task learning framework is proposed in this paper for malware image classification for accurate and fast malware detection. |
Ahmed Bensaoud; Jugal Kalita; |
2024 | 22 | A Security Framework for Ethereum Smart Contracts IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article the authors present ESAF (Ethereum Security Analysis Framework), a framework for analysis of smart contracts that aims to unify and facilitate the task of analyzing smart contract vulnerabilities which can be used as a persistent security monitoring tool for a set of target contracts as well as a classic vulnerability analysis tool among other uses. |
Antonio López Vivar; Ana Lucila Sandoval Orozco; Luis Javier García Villalba; |
2024 | 23 | Great, Now Write An Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a novel jailbreak attack called Crescendo. |
Mark Russinovich; Ahmed Salem; Ronen Eldan; |
2024 | 24 | MLLM-Protector: Ensuring MLLM’s Safety Without Hurting Performance IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This vulnerability is exacerbated by the fact that most state-of-the-art MLLMs are fine-tuned on limited image-text pairs that are much fewer than the extensive text-based pretraining corpus, which makes the MLLMs more prone to catastrophic forgetting of their original abilities during safety fine-tuning. To tackle these challenges, we introduce MLLM-Protector, a plug-and-play strategy that solves two subtasks: 1) identifying harmful responses via a lightweight harm detector, and 2) transforming harmful responses into harmless ones via a detoxifier. |
RENJIE PI et. al. |
2024 | 26 | Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate how the state-of-the-art machine learning techniques, including a popular deep learning algorithm, perform in predicting functions with possible security vulnerabilities in JavaScript programs. |
RUDOLF FERENC et. al. |
2023 | 1 | Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To solve the RowHammer problem, our paper examined seven different approaches (including a novel probabilistic approach that has very low cost), some of which influenced or were adopted in different industrial products. |
Onur Mutlu; |
2023 | 2 | Extracting Training Data from Diffusion Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted significant attention due to their ability to generate high-quality synthetic images. In this work, we show that diffusion models memorize individual images from their training data and emit them at generation time. |
NICHOLAS CARLINI et. al. |
2023 | 3 | Not What You’ve Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Despite the increasing integration and reliance on LLMs, effective mitigations of these emerging threats are currently lacking. By raising awareness of these vulnerabilities and providing key insights into their implications, we aim to promote the safe and responsible deployment of these powerful models and the development of robust defenses that protect users and systems from potential attacks. |
KAI GRESHAKE et. al. |
2023 | 4 | Machine Learning Based Intrusion Detection Systems for IoT Applications IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate the prospects of using machine learning classification algorithms for securing IoT against DoS attacks. |
Abhishek Verma; Virender Ranga; |
2023 | 5 | From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The work presents the vulnerabilities of ChatGPT, which can be exploited by malicious users to exfiltrate malicious information bypassing the ethical constraints on the model. |
Maanak Gupta; CharanKumar Akiri; Kshitiz Aryal; Eli Parker; Lopamudra Praharaj; |
2023 | 6 | Information Leakage from Optical Emanations IF:5 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a … |
Joe Loughry; David A. Umphress; |
2023 | 7 | Prompt Injection Attack Against LLM-integrated Applications IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Initially, we conduct an exploratory analysis on ten commercial applications, highlighting the constraints of current attack strategies in practice. Prompted by these limitations, we subsequently formulate HouYi, a novel black-box prompt injection attack technique, which draws inspiration from traditional web injection attacks. |
YI LIU et. al. |
2023 | 8 | Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models. |
DANIEL KANG et. al. |
2023 | 9 | A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper explores the intersection of LLMs with security and privacy. |
YIFAN YAO et. al. |
2023 | 10 | Introduction to IoT IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This chapter serves as a comprehensive guide for newcomers interested in the IoT domain, providing a foundation for making future contributions. Specifically, it discusses the overview, historical evolution, key characteristics, advantages, architectures, taxonomy of technologies, and existing applications in major IoT domains. |
Tajkia Nuri Ananna; Munshi Saifuzzaman; |
2023 | 11 | Do Anything Now: Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, employing our new framework JailbreakHub, we conduct a comprehensive analysis of 1,405 jailbreak prompts spanning from December 2022 to December 2023. |
Xinyue Shen; Zeyuan Chen; Michael Backes; Yun Shen; Yang Zhang; |
2023 | 12 | Glaze: Protecting Artists from Style Mimicry By Text-to-Image Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply style cloaks to their art before sharing online. |
SHAWN SHAN et. al. |
2023 | 13 | Poisoning Web-Scale Training Datasets Is Practical IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model’s performance. |
NICHOLAS CARLINI et. al. |
2023 | 14 | Unveiling Security, Privacy, and Ethical Concerns of ChatGPT IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: By exploring the upgrade path from GPT-1 to GPT-4, discussing the model’s features, limitations, and potential applications, this study aims to shed light on the potential risks of integrating ChatGPT into our daily lives. |
Xiaodong Wu; Ran Duan; Jianbing Ni; |
2023 | 15 | Visual Adversarial Examples Jailbreak Aligned Large Language Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As an illustration, we present a case study in which we exploit visual adversarial examples to circumvent the safety guardrail of aligned LLMs with integrated vision. |
XIANGYU QI et. al. |
2023 | 16 | DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose and release a new vulnerable source code dataset. |
Yizheng Chen; Zhoujie Ding; Lamya Alowain; Xinyun Chen; David Wagner; |
2023 | 17 | MGTBench: Benchmarking Machine-Generated Text Detection IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Furthermore, it remains unclear how existing detection methods would perform against powerful LLMs. In this paper, we fill this gap by proposing the first benchmark framework for MGT detection against powerful LLMs, named MGTBench. |
Xinlei He; Xinyue Shen; Zeyuan Chen; Michael Backes; Yang Zhang; |
2023 | 18 | How Secure Is Code Generated By ChatGPT? IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, the safety of programs generated by ChatGPT should not be overlooked. In this paper, we perform an experiment to address this issue. |
Raphaël Khoury; Anderson R. Avila; Jacob Brunelle; Baba Mamadou Camara; |
2023 | 19 | A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To this end, this paper presents an in-depth review of the IoDT with respect to system architecture, enabling technologies, and security/privacy issues. |
YUNTAO WANG et. al. |
2023 | 20 | Large Language Models for Code: Security Hardening and Adversarial Testing IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: The task is parametric and takes as input a binary property to guide the LM to generate secure or unsafe code, while preserving the LM’s capability of generating functionally correct code. We propose a novel learning-based approach called SVEN to solve this task. |
Jingxuan He; Martin Vechev; |
2023 | 21 | On The Exploitability of Instruction Tuning IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we investigate how an adversary can exploit instruction tuning by injecting specific instruction-following examples into the training data that intentionally changes the model’s behavior. |
MANLI SHU et. al. |
2023 | 22 | Backdoor Attacks for In-Context Learning with Language Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Because state-of-the-art language models are expensive to train, most practitioners must make use of one of the few publicly available language models or language model APIs. This consolidation of trust increases the potency of backdoor attacks, where an adversary tampers with a machine learning model in order to make it perform some malicious behavior on inputs that contain a predefined backdoor trigger. |
Nikhil Kandpal; Matthew Jagielski; Florian Tramèr; Nicholas Carlini; |
2023 | 23 | ProPILE: Probing Privacy Leakage in Large Language Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents ProPILE, a novel probing tool designed to empower data subjects, or the owners of the PII, with awareness of potential PII leakage in LLM-based services. |
SIWON KIM et. al. |
2023 | 24 | Jailbreak in Pieces: Compositional Adversarial Attacks on Multi-Modal Language Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce new jailbreak attacks on vision language models (VLMs), which use aligned LLMs and are resilient to text-only jailbreak attacks. |
Erfan Shayegani; Yue Dong; Nael Abu-Ghazaleh; |
2023 | 25 | Beyond The Safeguards: Exploring The Security Risks of ChatGPT IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper aims to provide an overview of the different types of security risks associated with ChatGPT, including malicious text and code generation, private data disclosure, fraudulent services, information gathering, and producing unethical content. |
Erik Derner; Kristina Batistič; |
2023 | 26 | Protecting Language Generation Models Via Invisible Watermarking IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, these methods can be nullified by obvious countermeasures such as synonym randomization. To address this issue, we propose GINSEW, a novel method to protect text generation models from being stolen through distillation. |
Xuandong Zhao; Yu-Xiang Wang; Lei Li; |
2023 | 27 | SCALE-UP: An Efficient Black-box Input-level Backdoor Detection Via Analyzing Scaled Prediction Consistency IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, almost all of them cannot be adopted in MLaaS scenarios since they require getting access to or even modifying the suspicious models. In this paper, we propose a simple yet effective black-box input-level backdoor detection, called SCALE-UP, which requires only the predicted labels to alleviate this problem. |
JUNFENG GUO et. al. |
2023 | 28 | A Lightweight Blockchain and Fog-enabled Secure Remote Patient Monitoring System IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Considering the need for secure and efficient patient care, this paper proposes a lightweight Blockchain-based and Fog-enabled remote patient monitoring system that provides a high level of security and efficient response time. |
OMAR CHEIKHROUHOU et. al. |
2023 | 29 | In ChatGPT We Trust? Measuring and Characterizing The Reliability of ChatGPT IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we perform the first large-scale measurement of ChatGPT’s reliability in the generic QA scenario with a carefully curated set of 5,695 questions across ten datasets and eight domains. |
Xinyue Shen; Zeyuan Chen; Michael Backes; Yang Zhang; |
2023 | 30 | Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper proposes a blockchain-based Federated Learning (FL) framework with Intel Software Guard Extension (SGX)-based Trusted Execution Environment (TEE) to securely aggregate local models in Industrial Internet-of-Things (IIoTs). |
ADITYA PRIBADI KALAPAAKING et. al. |
2022 | 1 | Perception of The Environment IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This chapter discusses the intricacies of cybersecurity agents’ perception. |
Martin Drasar; |
2022 | 2 | A Survey on Metaverse: Fundamentals, Security, and Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. |
YUNTAO WANG et. al. |
2022 | 3 | Deduplicating Training Data Mitigates Privacy Risks in Language Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Past work has shown that large language models are susceptible to privacy attacks, where adversaries generate sequences from a trained model and detect which sequences are memorized from the training set. In this work, we show that the success of these attacks is largely due to duplication in commonly used web-scraped training sets. |
Nikhil Kandpal; Eric Wallace; Colin Raffel; |
2022 | 4 | Bullshark: DAG BFT Protocols Made Practical IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Bullshark, the first directed acyclic graph (DAG) based asynchronous Byzantine Atomic Broadcast protocol that is optimized for the common synchronous case. |
Alexander Spiegelman; Neil Giridharan; Alberto Sonnino; Lefteris Kokoris-Kogias; |
2022 | 5 | Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Inspired by federated learning, a FDIA detection method based on secure federated deep learning is proposed in this paper by combining Transformer, federated learning and Paillier cryptosystem. |
Yang Li; Xinhao Wei; Yuanzheng Li; Zhaoyang Dong; Mohammad Shahidehpour; |
2022 | 6 | Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: With poisoning equal to or less than 0.5% of the target-class data and 0.05% of the training set, we can train a model to classify test examples from arbitrary classes into the target class when the examples are patched with a backdoor trigger. |
YI ZENG et. al. |
2022 | 7 | Survey on Federated Learning Threats: Concepts, Taxonomy on Attacks and Defences, Experimental Study and Challenges IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an extensive review of the threats of federated learning, as well as as their corresponding countermeasures, attacks versus defences. |
Nuria Rodríguez-Barroso; Daniel Jiménez López; M. Victoria Luzón; Francisco Herrera; Eugenio Martínez-Cámara; |
2022 | 8 | FLDetector: Defending Federated Learning Against Model Poisoning Attacks Via Detecting Malicious Clients IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Our FLDetector addresses this challenge via detecting malicious clients. FLDetector aims to detect and remove the majority of the malicious clients such that a Byzantine-robust FL method can learn an accurate global model using the remaining clients. |
Zaixi Zhang; Xiaoyu Cao; Jinyuan Jia; Neil Zhenqiang Gong; |
2022 | 9 | ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper,we propose a new traffic representation model called Encrypted Traffic Bidirectional Encoder Representations from Transformer (ET-BERT), which pre-trains deep contextualized datagram-level representation from large-scale unlabeled data. |
XINJIE LIN et. al. |
2022 | 10 | Reconstructing Training Data with Informed Adversaries IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: For more general models (e.g. neural networks), we propose an attack strategy based on training a reconstructor network that receives as input the weights of the model under attack and produces as output the target data point. |
Borja Balle; Giovanni Cherubin; Jamie Hayes; |
2022 | 11 | Metaverse: Security and Privacy Issues IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide several contributions. We start by analysing the foundations of the metaverse, later we focus on the novel privacy and security issues introduced by this new paradigm, and finally we broaden the scope of the contribution highlighting some of the far-reaching yet logical implications of the metaverse on a number of domains, not all of them in tech. |
Roberto Di Pietro; Stefano Cresci; |
2022 | 12 | Biometric Security Technology IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents an overview of the main topics related to biometric security technology, with the main purpose to provide a primer on this subject. |
Marcos Faundez-Zanuy; |
2022 | 13 | LineVD: Statement-level Vulnerability Detection Using Graph Neural Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a novel deep learning framework, LineVD, which formulates statement-level vulnerability detection as a node classification task. |
David Hin; Andrey Kan; Huaming Chen; M. Ali Babar; |
2022 | 14 | Federated Learning from Pre-Trained Models: A Contrastive Learning Approach IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, excessive computation and communication demands pose challenges to current FL frameworks, especially when training large-scale models. To prevent these issues from hindering the deployment of FL systems, we propose a lightweight framework where clients jointly learn to fuse the representations generated by multiple fixed pre-trained models rather than training a large-scale model from scratch. |
YUE TAN et. al. |
2022 | 15 | Do Users Write More Insecure Code with AI Assistants? IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. |
Neil Perry; Megha Srivastava; Deepak Kumar; Dan Boneh; |
2022 | 16 | Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we use Federated Learning (FL) to build a threat hunting framework called Block Hunter to automatically hunt for attacks in blockchain-based IIoT networks. |
ABBAS YAZDINEJAD et. al. |
2022 | 17 | DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To address this problem, we propose DeepSight, a novel model filtering approach for mitigating backdoor attacks. |
Phillip Rieger; Thien Duc Nguyen; Markus Miettinen; Ahmad-Reza Sadeghi; |
2022 | 18 | The Right to Be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate the problem of machine unlearning in FL systems. |
Yi Liu; Lei Xu; Xingliang Yuan; Cong Wang; Bo Li; |
2022 | 19 | Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper proposed a new system of video encryption is presented. |
Mohamed Abomhara; Omar Zakaria; Othman O. Khalifa; A. A Zaidan; B. B Zaidan; |
2022 | 20 | A Dependable Hybrid Machine Learning Model for Network Intrusion Detection IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this research, we propose a new hybrid model that combines machine learning and deep learning to increase detection rates while securing dependability. |
MD. ALAMIN TALUKDER et. al. |
2022 | 21 | Privacy for Free: How Does Dataset Condensation Help Privacy? IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we for the first time identify that dataset condensation (DC) which is originally designed for improving training efficiency is also a better solution to replace the traditional data generators for private data generation, thus providing privacy for free. |
Tian Dong; Bo Zhao; Lingjuan Lyu; |
2022 | 22 | Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. |
Zhibo Zhang; Hussam Al Hamadi; Ernesto Damiani; Chan Yeob Yeun; Fatma Taher; |
2022 | 23 | Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a new class of attacks on machine learning models. |
FLORIAN TRAMÈR et. al. |
2022 | 24 | Defending Against Advanced Persistent Threats Using Game-Theory IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. |
Stefan Rass; Sandra König; Stefan Schauer; |
2022 | 25 | ZkBridge: Trustless Cross-chain Bridges Made Practical IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce zkBridge, an efficient cross-chain bridge that guarantees strong security without external trust assumptions. |
TIANCHENG XIE et. al. |
2022 | 26 | The Role of Machine Learning in Cybersecurity IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Our contributions are complemented with two real case studies describing industrial applications of ML as defense against cyber-threats. |
GIOVANNI APRUZZESE et. al. |
2022 | 27 | MPAF: Model Poisoning Attacks to Federated Learning Based on Fake Clients IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose the first Model Poisoning Attack based on Fake clients called MPAF. |
Xiaoyu Cao; Neil Zhenqiang Gong; |
2022 | 28 | MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper,we propose MVD, a statement-level Memory-related Vulnerability Detection approach based on flow-sensitive graph neural networks (FS-GNN). |
SICONG CAO et. al. |
2022 | 29 | Lost at C: A User Study on The Security Implications of Large Language Model Code Assistants IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Large Language Models (LLMs) such as OpenAI Codex are increasingly being used as AI-based coding assistants. |
GUSTAVO SANDOVAL et. al. |
2022 | 30 | Membership Inference Attacks By Exploiting Loss Trajectory IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As a result, in practical scenarios where both the member and non-member samples yield similarly small losses, these methods are naturally unable to differentiate between them. To address this limitation, in this paper, we propose a new attack method, called \system, which can exploit the membership information from the whole training process of the target model for improving the attack performance. |
Yiyong Liu; Zhengyu Zhao; Michael Backes; Yang Zhang; |
2021 | 1 | The Queen’s Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Specifically, we show that an attacker can abuse platform-provided APIs to evade access controls without leaving any traces. |
Fahad Shaon; Sazzadur Rahaman; Murat Kantarcioglu; |
2021 | 2 | The Inductive Approach to Verifying Cryptographic Protocols IF:8 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with … |
Lawrence C. Paulson; |
2021 | 3 | Membership Inference Attacks From First Principles IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: A membership inference attack allows an adversary to query a trained machine learning model to predict whether or not a particular example was contained in the model’s training dataset. |
NICHOLAS CARLINI et. al. |
2021 | 4 | Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this technical report, we explore the NFT ecosystems in several aspects. |
Qin Wang; Rujia Li; Qi Wang; Shiping Chen; |
2021 | 5 | Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article presents an overview of the fundamental concepts and explores the opportunities of FLchain in MEC networks. |
DINH C. NGUYEN et. al. |
2021 | 6 | Jamming Attacks And Anti-Jamming Strategies In Wireless Networks: A Comprehensive Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article surveys existing jamming attacks and anti-jamming strategies in wireless local area networks (WLANs), cellular networks, cognitive radio networks (CRNs), ZigBee networks, Bluetooth networks, vehicular networks, LoRa networks, RFID networks, and GPS system, with the objective of offering a comprehensive knowledge landscape of existing jamming/anti-jamming strategies and stimulating more research efforts to secure wireless networks against jamming attacks. |
Hossein Pirayesh; Huacheng Zeng; |
2021 | 7 | Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. |
Van-Linh Nguyen; Po-Ching Lin; Bo-Chao Cheng; Ren-Hung Hwang; Ying-Dar Lin; |
2021 | 8 | Quantifying Blockchain Extractable Value: How Dark Is The Forest? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we allow to quantify the BEV danger by deriving the USD extracted from sandwich attacks, liquidations, and decentralized exchange arbitrage. |
Kaihua Qin; Liyi Zhou; Arthur Gervais; |
2021 | 9 | SoK: Decentralized Finance (DeFi) IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We provide a distinction between technical security, which has a healthy literature, and economic security, which is largely unexplored, connecting the latter with new models and thereby synthesizing insights from computer science, economics and finance. |
SAM M. WERNER et. al. |
2021 | 10 | Evaluating Gradient Inversion Attacks and Defenses in Federated Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We find that some attacks make strong assumptions about the setup. |
Yangsibo Huang; Samyak Gupta; Zhao Song; Kai Li; Sanjeev Arora; |
2021 | 11 | PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning. |
FAN MO et. al. |
2021 | 12 | Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose separating the task of reliable transaction dissemination from transaction ordering, to enable high-performance Byzantine fault-tolerant quorum-based consensus. |
George Danezis; Eleftherios Kokoris Kogias; Alberto Sonnino; Alexander Spiegelman; |
2021 | 13 | Federated Learning for Malware Detection in IoT Devices IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. |
Valerian Rey; Pedro Miguel Sánchez Sánchez; Alberto Huertas Celdrán; Gérôme Bovet; Martin Jaggi; |
2021 | 14 | Deepfakes Generation and Detection: State-of-the-art, Open Challenges, Countermeasures, and Way Forward IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper provides a comprehensive review and detailed analysis of existing tools and machine learning (ML) based approaches for deepfake generation and the methodologies used to detect such manipulations for both audio and visual deepfakes. |
Momina Masood; Marriam Nawaz; Khalid Mahmood Malik; Ali Javed; Aun Irtaza; |
2021 | 15 | Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies Within Cyber Threat Intelligence IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This research evaluates existing cyber-threat-intelligence-relevant ontologies, sharing standards, and taxonomies for the purpose of measuring their high-level conceptual expressivity with regards to the who, what, why, where, when, and how elements of an adversarial attack in addition to courses of action and technical indicators. |
Vasileios Mavroeidis; Siri Bromander; |
2021 | 16 | Invisible for Both Camera and LiDAR: Security of Multi-Sensor Fusion Based Perception in Autonomous Driving Under Physical-World Attacks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a novel attack pipeline that addresses two main design challenges: (1) non-differentiable target camera and LiDAR sensing systems, and (2) non-differentiable cell-level aggregated features popularly used in LiDAR-based AD perception. |
YULONG CAO* et. al. |
2021 | 17 | Challenges and Opportunities in Securing The Industrial Internet of Things IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we identify the unique security goals and challenges of the Industrial Internet of Things, which, unlike consumer deployments, mainly follow from safety and productivity requirements. |
Martin Serror; Sacha Hack; Martin Henze; Marko Schuba; Klaus Wehrle; |
2021 | 18 | LogBERT: Log Anomaly Detection Via BERT IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose LogBERT, a self-supervised framework for log anomaly detection based on Bidirectional Encoder Representations from Transformers (BERT). |
Haixuan Guo; Shuhan Yuan; Xintao Wu; |
2021 | 19 | Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Therefore, we present an extensive survey on the use of blockchain and AI for combating COVID-19 epidemics. |
Dinh C. Nguyen; Ming Ding; Pubudu N. Pathirana; Aruna Seneviratne; |
2021 | 20 | Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we explore using graph neural networks and expert knowledge for smart contract vulnerability detection. |
ZHENGUANG LIU et. al. |
2021 | 21 | Vulnerability Detection with Fine-grained Interpretations IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present IVDetect an interpretable vulnerability detector with the philosophy of using Artificial Intelligence (AI) to detect vulnerabilities, while using Intelligence Assistant (IA) via providing VD interpretations in terms of vulnerable statements. |
Yi Li; Shaohua Wang; Tien N. Nguyen; |
2021 | 22 | Practical and Private (Deep) Learning Without Sampling or Shuffling IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We consider training models with differential privacy (DP) using mini-batch gradients. |
PETER KAIROUZ et. al. |
2021 | 23 | CryptGPU: Fast Privacy-Preserving Machine Learning on The GPU IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we start by introducing a new interface to losslessly embed cryptographic operations over secret-shared values (in a discrete domain) into floating-point operations that can be processed by highly-optimized CUDA kernels for linear algebra. |
Sijun Tan; Brian Knott; Yuan Tian; David J. Wu; |
2021 | 24 | Examining Zero-Shot Vulnerability Repair with Large Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Can emerging ‘smart’ code completion tools help repair those bugs? In this work, we examine the use of large language models (LLMs) for code (such as OpenAI’s Codex and AI21’s Jurassic J-1) for zero-shot vulnerability repair. |
Hammond Pearce; Benjamin Tan; Baleegh Ahmad; Ramesh Karri; Brendan Dolan-Gavitt; |
2021 | 25 | A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In order to fill this gap and motivate further research, in this paper, we present a comprehensive survey on ransomware and ransomware defense research with respect to PCs/workstations, mobile devices, and IoT/CPS platforms. |
Harun Oz; Ahmet Aris; Albert Levi; A. Selcuk Uluagac; |
2021 | 26 | Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a comprehensive overview of the CPS security landscape with emphasis on CPES. |
Ioannis Zografopoulos; Juan Ospina; XiaoRui Liu; Charalambos Konstantinou; |
2021 | 27 | BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose BadEncoder, the first backdoor attack to self-supervised learning. |
Jinyuan Jia; Yupei Liu; Neil Zhenqiang Gong; |
2021 | 28 | Understanding Security Issues in The NFT Ecosystem IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we first present a systematic overview of how the NFT ecosystem works, and we identify three major actors: marketplaces, external entities, and users. We perform an in-depth analysis of the top 8 marketplaces (ranked by transaction volume) to discover potential issues associated with such marketplaces. |
Dipanjan Das; Priyanka Bose; Nicola Ruaro; Christopher Kruegel; Giovanni Vigna; |
2021 | 29 | A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper provides a comprehensive survey of the research that has been carried out on honeypots and honeynets for IoT, IIoT, and CPS. |
Javier Franco; Ahmet Aris; Berk Canberk; A. Selcuk Uluagac; |
2021 | 30 | Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper is therefore aimed at comprehensively surveying the interactions between resilient CPS using ML and resilient ML when applied in CPS. |
Felix Olowononi; Danda B. Rawat; Chunmei Liu; |
2020 | 1 | Extracting Training Data from Large Language Models IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We demonstrate our attack on GPT-2, a language model trained on scrapes of the public Internet, and are able to extract hundreds of verbatim text sequences from the model’s training data. |
NICHOLAS CARLINI et. al. |
2020 | 2 | A Survey Of COVID-19 Contact Tracing Apps IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we provide the first comprehensive review of these much-discussed tracing app attributes. |
NADEEM AHMED et. al. |
2020 | 3 | Backdoor Learning: A Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the first comprehensive survey of this realm. |
Yiming Li; Yong Jiang; Zhifeng Li; Shu-Tao Xia; |
2020 | 4 | Contact Tracing Mobile Apps For COVID-19: Privacy Considerations And Related Trade-offs IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Here, we analyze some of those implications and discuss ways of ameliorating the privacy concerns without decreasing usefulness to public health. |
Hyunghoon Cho; Daphne Ippolito; Yun William Yu; |
2020 | 5 | FLTrust: Byzantine-robust Federated Learning Via Trust Bootstrapping IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we bridge the gap via proposing FLTrust, a new federated learning method in which the service provider itself bootstraps trust. |
Xiaoyu Cao; Minghong Fang; Jia Liu; Neil Zhenqiang Gong; |
2020 | 6 | Label-Only Membership Inference Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we introduce label-only membership inference attacks. |
Christopher A. Choquette-Choo; Florian Tramer; Nicholas Carlini; Nicolas Papernot; |
2020 | 7 | Cyber Security In The Age Of COVID-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. |
HARJINDER SINGH LALLIE et. al. |
2020 | 8 | Threats To Federated Learning: A Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we bridge this important gap in FL literature. |
Lingjuan Lyu; Han Yu; Qiang Yang; |
2020 | 9 | Invisible Backdoor Attack with Sample-Specific Triggers IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we explore a novel attack paradigm, where backdoor triggers are sample-specific. |
YUEZUN LI et. al. |
2020 | 10 | Input-Aware Dynamic Backdoor Attack IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose a novel backdoor attack technique in which the triggers vary from input to input. |
Anh Nguyen; Anh Tran; |
2020 | 11 | A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we provide a comprehensive survey on blockchain for big data, focusing on up-to-date approaches, opportunities, and future directions. |
NATARAJAN DEEPA et. al. |
2020 | 12 | Machine Learning Based Solutions For Security Of Internet Of Things (IoT): A Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey paper, the architecture of IoT is discussed, following a comprehensive literature review on ML approaches the importance of security of IoT in terms of different types of possible attacks. |
Syeda Manjia Tahsien; Hadis Karimipour; Petros Spachos; |
2020 | 13 | Systematic Evaluation Of Privacy Risks Of Machine Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we show that prior work on membership inference attacks may severely underestimate the privacy risks by relying solely on training custom neural network classifiers to perform attacks and focusing only on the aggregate results over data samples, such as the attack accuracy. We also propose benchmarks for defense mechanisms by accounting for adaptive adversaries with knowledge of the defense and also accounting for the trade-off between model accuracy and privacy risks. |
Liwei Song; Prateek Mittal; |
2020 | 14 | Privacy and Robustness in Federated Learning: Attacks and Defenses IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct the first comprehensive survey on this topic. |
LINGJUAN LYU et. al. |
2020 | 15 | Blind Backdoors in Deep Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We investigate a new method for injecting backdoors into machine learning models, based on compromising the loss-value computation in the model-training code. |
Eugene Bagdasaryan; Vitaly Shmatikov; |
2020 | 16 | CrypTFlow2: Practical 2-Party Secure Inference IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation. |
DEEVASHWER RATHEE et. al. |
2020 | 17 | FALCON: Honest-Majority Maliciously Secure Framework For Private Deep Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. |
SAMEER WAGH et. al. |
2020 | 18 | Dynamic Backdoor Attacks Against Machine Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose the first class of dynamic backdooring techniques against deep neural networks (DNN), namely Random Backdoor, Backdoor Generating Network (BaN), and conditional Backdoor Generating Network (c-BaN). |
Ahmed Salem; Rui Wen; Michael Backes; Shiqing Ma; Yang Zhang; |
2020 | 19 | Blockchain For The Internet Of Vehicles Towards Intelligent Transportation Systems: A Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a contemporary survey on the latest advancement in blockchain for IoV. |
MUHAMMAD BAQER MOLLAH et. al. |
2020 | 20 | UNICORN: Runtime Provenance-Based Detector For Advanced Persistent Threats IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. |
Xueyuan Han; Thomas Pasquier; Adam Bates; James Mickens; Margo Seltzer; |
2020 | 21 | LUCID: A Practical, Lightweight Deep Learning Solution For DDoS Attack Detection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present a practical, lightweight deep learning DDoS detection system called LUCID, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign. |
Roberto Doriguzzi-Corin; Stuart Millar; Sandra Scott-Hayward; Jesus Martinez-del-Rincon; Domenico Siracusa; |
2020 | 22 | Fawkes: Protecting Privacy Against Unauthorized Deep Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose Fawkes, a system that helps individuals inoculate their images against unauthorized facial recognition models. |
SHAWN SHAN et. al. |
2020 | 23 | Towards Robust LiDAR-based Perception In Autonomous Driving: General Black-box Adversarial Sensor Attack And Countermeasures IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we perform the first study to explore the general vulnerability of current LiDAR-based perception architectures and discover that the ignored occlusion patterns in LiDAR point clouds make self-driving cars vulnerable to spoofing attacks. |
Jiachen Sun; Yulong Cao; Qi Alfred Chen; Z. Morley Mao; |
2020 | 24 | Auditing Differentially Private Machine Learning: How Private Is Private SGD? IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: More generally, our work takes a quantitative, empirical approach to understanding the privacy afforded by specific implementations of differentially private algorithms that we believe has the potential to complement and influence analytical work on differential privacy. |
Matthew Jagielski; Jonathan Ullman; Alina Oprea; |
2020 | 25 | Byzantine-Resilient Secure Federated Learning IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Towards addressing this challenge, this paper presents the first single-server Byzantine-resilient secure aggregation framework (BREA) for secure federated learning. |
Jinhyun So; Basak Guler; A. Salman Avestimehr; |
2020 | 26 | TRRespass: Exploiting The Many Sides Of Target Row Refresh IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we demystify the inner workings of TRR and debunk its security guarantees. |
PIETRO FRIGO et. al. |
2020 | 27 | Entangled Watermarks As A Defense Against Model Extraction IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce Entangled Watermarking Embeddings (EWE). |
Hengrui Jia; Christopher A. Choquette-Choo; Varun Chandrasekaran; Nicolas Papernot; |
2020 | 28 | Backdoor Attacks And Countermeasures On Deep Learning: A Comprehensive Review IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. |
YANSONG GAO et. al. |
2020 | 29 | Cybersecurity For Industrial Control Systems: A Survey IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments. |
DEVAL BHAMARE et. al. |
2020 | 30 | Privacy Preserving Vertical Federated Learning For Tree-based Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose Pivot, a novel solution for privacy preserving vertical decision tree training and prediction, ensuring that no intermediate information is disclosed other than those the clients have agreed to release (i.e., the final tree model and the prediction output). |
Yuncheng Wu; Shaofeng Cai; Xiaokui Xiao; Gang Chen; Beng Chin Ooi; |
2019 | 1 | Local Model Poisoning Attacks to Byzantine-Robust Federated Learning IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we perform the first systematic study on local model poisoning attacks to federated learning. |
Minghong Fang; Xiaoyu Cao; Jinyuan Jia; Neil Zhenqiang Gong; |
2019 | 2 | Celeb-DF: A Large-scale Challenging Dataset For DeepFake Forensics IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present a new large-scale challenging DeepFake video dataset, Celeb-DF, which contains 5,639 high-quality DeepFake videos of celebrities generated using improved synthesis process. |
Yuezun Li; Xin Yang; Pu Sun; Honggang Qi; Siwei Lyu; |
2019 | 3 | Blockchain Technology Overview IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This document provides a high-level technical overview of blockchain technology. |
Dylan Yaga; Peter Mell; Nik Roby; Karen Scarfone; |
2019 | 4 | STRIP: A Defence Against Trojan Attacks On Deep Neural Networks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This work builds STRong Intentional Perturbation (STRIP) based run-time trojan attack detection system and focuses on vision system. |
YANSONG GAO et. al. |
2019 | 5 | Security And Privacy On Blockchain IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive overview of the security and privacy of blockchain. |
Rui Zhang; Rui Xue; Ling Liu; |
2019 | 6 | Machine Unlearning IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce SISA training, a framework that expedites the unlearning process by strategically limiting the influence of a data point in the training procedure. |
LUCAS BOURTOULE et. al. |
2019 | 7 | A Survey Of Distributed Consensus Protocols For Blockchain Networks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we present a comprehensive review and analysis on the state-of-the-art blockchain consensus protocols. |
Yang Xiao; Ning Zhang; Wenjing Lou; Y. Thomas Hou; |
2019 | 8 | A Survey Of Network-based Intrusion Detection Data Sets IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This work provides a focused literature survey of data sets for network-based intrusion detection and describes the underlying packet- and flow-based network data in detail. |
Markus Ring; Sarah Wunderlich; Deniz Scheuring; Dieter Landes; Andreas Hotho; |
2019 | 9 | Adversarial Sensor Attack On LiDAR-based Perception In Autonomous Driving IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In contrast to prior work that concentrates on camera-based perception, in this work we perform the first security study of LiDAR-based perception in AV settings, which is highly important but unexplored. |
YULONG CAO et. al. |
2019 | 10 | Machine Learning In IoT Security: Current Solutions And Future Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. |
Fatima Hussain; Rasheed Hussain; Syed Ali Hassan; Ekram Hossain; |
2019 | 11 | Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. |
Ismail Butun; Patrik Österberg; Houbing Song; |
2019 | 12 | ZombieLoad: Cross-Privilege-Boundary Data Sampling IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the ZombieLoad attack which uncovers a novel Meltdown-type effect in the processor’s previously unexplored fill-buffer logic. |
MICHAEL SCHWARZ et. al. |
2019 | 13 | MemGuard: Defending Against Black-Box Membership Inference Attacks Via Adversarial Examples IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose MemGuard, the first defense with formal utility-loss guarantees against black-box membership inference attacks. |
Jinyuan Jia; Ahmed Salem; Michael Backes; Yang Zhang; Neil Zhenqiang Gong; |
2019 | 14 | Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To protect customers’ privacy and improve the test accuracy, we enforce differential privacy on the extracted features and propose a new normalization technique. |
YANG ZHAO et. al. |
2019 | 15 | Cyber Security Awareness Campaigns: Why Do They Fail To Change Behaviour? IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. |
Maria Bada; Angela M. Sasse; Jason R. C. Nurse; |
2019 | 16 | Inductive Analysis Of The Internet Protocol TLS IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover … |
Lawrence C. Paulson; |
2019 | 17 | Blockchain For Future Smart Grid: A Comprehensive Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we aim to provide a comprehensive survey on application of blockchain in smart grid. |
MUHAMMAD BAQER MOLLAH et. al. |
2019 | 18 | A New Backdoor Attack In CNNs By Training Set Corruption Without Label Poisoning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we present a new backdoor attack without label poisoning Since the attack works by corrupting only samples of the target class, it has the additional advantage that it does not need to identify beforehand the class of the samples to be attacked at test time. |
Mauro Barni; Kassem Kallas; Benedetta Tondi; |
2019 | 19 | Building An Efficient Intrusion Detection System Based On Feature Selection And Ensemble Classifier IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Thus, we propose a new intrusion detection framework in this paper, and this framework is based on the feature selection and ensemble learning techniques. |
Yuyang Zhou; Guang Cheng; Shanqing Jiang; Mian Dai; |
2019 | 20 | Concurrency And Privacy With Payment-Channel Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we lay the foundations for privacy and concurrency in PCNs, presenting a formal definition in the Universal Composability framework as well as practical and provably secure solutions. |
Giulio Malavolta; Pedro Moreno-Sanchez; Aniket Kate; Matteo Maffei; Srivatsan Ravi; |
2019 | 21 | DL-Droid: Deep Learning Based Android Malware Detection Using Real Devices IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose DL-Droid, a deep learning system to detect malicious Android applications through dynamic analysis using stateful input generation. |
Mohammed K. Alzaylaee; Suleiman Y. Yerima; Sakir Sezer; |
2019 | 22 | GIDS: GAN Based Intrusion Detection System For In-Vehicle Network IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To solve this problem, we propose a novel IDS model for in-vehicle networks, GIDS (GAN based Intrusion Detection System) using deep-learning model, Generative Adversarial Nets. |
Eunbi Seo; Hyun Min Song; Huy Kang Kim; |
2019 | 23 | A Backdoor Attack Against LSTM-based Text Classification Systems IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we implement a backdoor attack in text classification based on LSTM by data poisoning. |
Jiazhu Dai; Chuanshuai Chen; |
2019 | 24 | Invisible Backdoor Attacks On Deep Neural Networks Via Steganography And Regularization IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we create covert and scattered triggers for backdoor attacks, invisible backdoors, where triggers can fool both DNN models and human inspection. |
Shaofeng Li; Minhui Xue; Benjamin Zi Hao Zhao; Haojin Zhu; Xinpeng Zhang; |
2019 | 25 | XONN: XNOR-based Oblivious Deep Neural Network Inference IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces XONN, a novel end-to-end framework based on Yao’s Garbled Circuits (GC) protocol, that provides a paradigm shift in the conceptual and practical realization of oblivious inference. |
M. SADEGH RIAZI et. al. |
2019 | 26 | HybridAlpha: An Efficient Approach For Privacy-Preserving Federated Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose HybridAlpha, an approach for privacy-preserving federated learning employing an SMC protocol based on functional encryption. |
Runhua Xu; Nathalie Baracaldo; Yi Zhou; Ali Anwar; Heiko Ludwig; |
2019 | 27 | Secure Federated Matrix Factorization IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a secure matrix factorization framework under the federated learning setting, called FedMF. |
Di Chai; Leye Wang; Kai Chen; Qiang Yang; |
2019 | 28 | Deep Reinforcement Learning for Cyber Security IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a survey of DRL approaches developed for cyber security. |
Thanh Thi Nguyen; Vijay Janapa Reddi; |
2019 | 29 | Differentially Private Model Publishing For Deep Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To tackle this problem, we propose a differentially private approach for training neural networks. |
Lei Yu; Ling Liu; Calton Pu; Mehmet Emre Gursoy; Stacey Truex; |
2019 | 30 | Intriguing Properties Of Adversarial ML Attacks In The Problem Space IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We shed light on the relationship between feature space and problem space, and we introduce the concept of side-effect features as the byproduct of the inverse feature-mapping problem. |
Fabio Pierazzi; Feargus Pendlebury; Jacopo Cortellazzi; Lorenzo Cavallaro; |
2018 | 1 | Spectre Attacks: Exploiting Speculative Execution IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim’s process. |
PAUL KOCHER et. al. |
2018 | 2 | How To Backdoor Federated Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We demonstrate that any participant in federated learning can introduce hidden backdoor functionality into the joint global model, e.g., to ensure that an image classifier assigns an attacker-chosen label to images with certain features, or that a word predictor completes certain sentences with an attacker-chosen word. |
Eugene Bagdasaryan; Andreas Veit; Yiqing Hua; Deborah Estrin; Vitaly Shmatikov; |
2018 | 3 | A Survey On The Security Of Blockchain Systems IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. |
Xiaoqi Li; Peng Jiang; Ting Chen; Xiapu Luo; Qiaoyan Wen; |
2018 | 4 | Exploiting Unintended Feature Leakage In Collaborative Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Collaborative machine learning and related techniques such as federated learning allow multiple participants, each with his own training dataset, to build a joint model by training locally and periodically exchanging model updates. |
Luca Melis; Congzheng Song; Emiliano De Cristofaro; Vitaly Shmatikov; |
2018 | 5 | Towards The Development Of Realistic Botnet Dataset In The Internet Of Things For Network Forensic Analytics: Bot-IoT Dataset IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper, proposes a new dataset, Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks. |
Nickolaos Koroniotis; Nour Moustafa; Elena Sitnikova; Benjamin Turnbull; |
2018 | 6 | Fine-Pruning: Defending Against Backdooring Attacks On Deep Neural Networks IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we provide the first effective defenses against backdoor attacks on DNNs. |
Kang Liu; Brendan Dolan-Gavitt; Siddharth Garg; |
2018 | 7 | Gazelle: A Low Latency Framework For Secure Neural Network Inference IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Our goal is to build efficient protocols whereby the client can acquire the classification result without revealing their input to the server, while guaranteeing the privacy of the server’s neural network. |
Chiraag Juvekar; Vinod Vaikuntanathan; Anantha Chandrakasan; |
2018 | 8 | Generating Adversarial Examples With Adversarial Networks IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose AdvGAN to generate adversarial examples with generative adversarial networks (GANs), which can learn and approximate the distribution of original instances. |
CHAOWEI XIAO et. al. |
2018 | 9 | ML-Leaks: Model And Data Independent Membership Inference Attacks And Defenses On Machine Learning Models IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present the most comprehensive study so far on this emerging and developing threat using eight diverse datasets which show the viability of the proposed attacks across domains. |
AHMED SALEM et. al. |
2018 | 10 | Securify: Practical Security Analysis Of Smart Contracts IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To address this problem, we present Securify, a security analyzer for Ethereum smart contracts that is scalable, fully automated, and able to prove contract behaviors as safe/unsafe with respect to a given property. |
PETAR TSANKOV et. al. |
2018 | 11 | VulDeePecker: A Deep Learning-Based System For Vulnerability Detection IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective task of manually defining features. In order to evaluate VulDeePecker, we present the first vulnerability dataset for deep learning approaches. |
ZHEN LI et. al. |
2018 | 12 | Kitsune: An Ensemble Of Autoencoders For Online Network Intrusion Detection IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner. |
Yisroel Mirsky; Tomer Doitshman; Yuval Elovici; Asaf Shabtai; |
2018 | 13 | Cyber-Security In Smart Grid: Survey And Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The purpose of this paper is to provide a comprehensive overview of the relevant published works. |
Zakaria El Mrabet; Hassan El Ghazi; Naima Kaabouch; Hamid El Ghazi; |
2018 | 14 | A Survey Of Machine And Deep Learning Methods For Internet Of Things (IoT) Security IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The goal of this work is to provide a comprehensive survey of ML /DL methods that can be used to develop enhanced security methods for IoT systems. |
Mohammed Ali Al-Garadi; Amr Mohamed; Abdulla Al-Ali; Xiaojiang Du; Mohsen Guizani; |
2018 | 15 | Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a theoretically-grounded optimization framework specifically designed for linear regression and demonstrate its effectiveness on a range of datasets and models. |
MATTHEW JAGIELSKI et. al. |
2018 | 16 | A Survey On Consensus Mechanisms And Mining Strategy Management In Blockchain Networks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we provide a systematic vision of the organization of blockchain networks. |
WENBO WANG et. al. |
2018 | 17 | TextBugger: Generating Adversarial Text Against Real-world Applications IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we show that DLTU is inherently vulnerable to adversarial text attacks, in which maliciously crafted texts trigger target DLTU systems and services to misbehave. |
Jinfeng Li; Shouling Ji; Tianyu Du; Bo Li; Ting Wang; |
2018 | 18 | Smart Contract-Based Access Control For The Internet Of Things IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. |
Yuanyu Zhang; Shoji Kasahara; Yulong Shen; Xiaohong Jiang; Jianxiong Wan; |
2018 | 19 | Evaluating Fuzz Testing IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We found problems in every evaluation we considered. |
George Klees; Andrew Ruef; Benji Cooper; Shiyi Wei; Michael Hicks; |
2018 | 20 | Machine Learning DDoS Detection For Consumer Internet Of Things Devices IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we demonstrate that using IoT-specific network behaviors (e.g. limited number of endpoints and regular time intervals between packets) to inform feature selection can result in high accuracy DDoS detection in IoT network traffic with a variety of machine learning algorithms, including neural networks. |
Rohan Doshi; Noah Apthorpe; Nick Feamster; |
2018 | 21 | Finding The Greedy, Prodigal, And Suicidal Contracts At Scale IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present a new systematic characterization of a class of trace vulnerabilities, which result from analyzing multiple invocations of a contract over its lifetime. |
Ivica Nikolic; Aashish Kolluri; Ilya Sergey; Prateek Saxena; Aquinas Hobor; |
2018 | 22 | Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To overcome the limitations of such rankings, we propose improvements to reduce the fluctuations in list composition and guarantee better defenses against manipulation. |
Victor Le Pochat; Tom Van Goethem; Samaneh Tajalizadehkhoob; Maciej Korczyński; Wouter Joosen; |
2018 | 23 | Blockchain Technologies For The Internet Of Things: Research Issues And Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. |
MOHAMED AMINE FERRAG et. al. |
2018 | 24 | Spatially Transformed Adversarial Examples IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Many advanced algorithms have been proposed to generate adversarial examples by leveraging the $\mathcal{L}_p$ distance for penalizing perturbations. |
CHAOWEI XIAO et. al. |
2018 | 25 | Angora: Efficient Fuzzing By Principled Search IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To solve path constraints efficiently, we introduce several key techniques: scalable byte-level taint tracking, context-sensitive branch count, search based on gradient descent, and input length exploration. |
Peng Chen; Hao Chen; |
2018 | 26 | Internet Of Things Security And Forensics: Challenges And Opportunities IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: null In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges. |
Mauro Conti; Ali Dehghantanha; Katrin Franke; Steve Watson; |
2018 | 27 | Chameleon: A Hybrid Secure Computation Framework For Machine Learning Applications IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. |
M. SADEGH RIAZI et. al. |
2018 | 28 | Stealing Hyperparameters In Machine Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we propose attacks on stealing the hyperparameters that are learned by a learner. |
Binghui Wang; Neil Zhenqiang Gong; |
2018 | 29 | DÏoT: A Federated Self-learning Anomaly Detection System For IoT IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present D\IoT, an autonomous self-learning distributed system for detecting compromised IoT devices effectively. |
THIEN DUC NGUYEN et. al. |
2018 | 30 | Physical Adversarial Examples For Object Detectors IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we extend physical attacks to more challenging object detection models, a broader class of deep learning algorithms widely used to detect and label multiple objects within a scene. |
KEVIN EYKHOLT et. al. |
2017 | 1 | Evasion Attacks Against Machine Learning At Test Time IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we present a simple but effective gradient-based approach that can be exploited to systematically assess the security of several, widely-used classification algorithms against evasion attacks. |
BATTISTA BIGGIO et. al. |
2017 | 2 | Targeted Backdoor Attacks On Deep Learning Systems Using Data Poisoning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we consider a new type of attacks, called backdoor attacks, where the attacker’s goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor. |
Xinyun Chen; Chang Liu; Bo Li; Kimberly Lu; Dawn Song; |
2017 | 3 | BadNets: Identifying Vulnerabilities In The Machine Learning Model Supply Chain IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we show that outsourced training introduces new security risks: an adversary can create a maliciously trained network (a backdoored neural network, or a \emph{BadNet}) that has state-of-the-art performance on the user’s training and validation samples, but behaves badly on specific attacker-chosen inputs. |
Tianyu Gu; Brendan Dolan-Gavitt; Siddharth Garg; |
2017 | 4 | Deep Models Under The GAN: Information Leakage From Collaborative Deep Learning IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Unfortunately, we show that any privacy-preserving collaborative deep learning is susceptible to a powerful attack that we devise in this paper. |
Briland Hitaj; Giuseppe Ateniese; Fernando Perez-Cruz; |
2017 | 5 | Differentially Private Federated Learning: A Client Level Perspective IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We tackle this problem and propose an algorithm for client sided differential privacy preserving federated optimization. |
Robin C. Geyer; Tassilo Klein; Moin Nabi; |
2017 | 6 | MagNet: A Two-Pronged Defense Against Adversarial Examples IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose MagNet, a framework for defending neural network classifiers against adversarial examples. |
Dongyu Meng; Hao Chen; |
2017 | 7 | Privacy Risk In Machine Learning: Analyzing The Connection To Overfitting IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. |
Samuel Yeom; Irene Giacomelli; Matt Fredrikson; Somesh Jha; |
2017 | 8 | A Survey On Security And Privacy Issues Of Bitcoin IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This exponential growth in the market valueof Bitcoin motivates adversaries to exploit weaknesses for profit,and researchers to discover new vulnerabilities in the system,propose countermeasures, and predict upcoming trends.In this paper, we present a systematic survey that covers thesecurity and privacy aspects of Bitcoin. |
Mauro Conti; Sandeep Kumar E; Chhagan Lal; Sushmita Ruj; |
2017 | 9 | On The (Statistical) Detection Of Adversarial Examples IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Using thus knowledge, we introduce a complimentary approach to identify specific inputs that are adversarial. |
Kathrin Grosse; Praveen Manoharan; Nicolas Papernot; Michael Backes; Patrick McDaniel; |
2017 | 10 | BlockChain: A Distributed Solution To Automotive Security And Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we argue that BlockChain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. |
Ali Dorri; Marco Steger; Salil S. Kanhere; Raja Jurdak; |
2017 | 11 | Collecting Telemetry Data Privately IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we develop new LDP mechanisms geared towards repeated collection of counter data, with formal privacy guarantees even after being executed for an arbitrarily long period of time. |
Bolin Ding; Janardhan Kulkarni; Sergey Yekhanin; |
2017 | 12 | Casper The Friendly Finality Gadget IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce Casper, a proof of stake-based finality system which overlays an existing proof of work blockchain. |
Vitalik Buterin; Virgil Griffith; |
2017 | 13 | Software Grand Exposure: SGX Cache Attacks Are Practical IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we demonstrate that cache-based attacks are indeed a serious threat to the confidentiality of SGX-protected programs. |
FERDINAND BRASSER et. al. |
2017 | 14 | Robust Physical-World Attacks On Deep Learning Models IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a general attack algorithm,Robust Physical Perturbations (RP2), to generate robust visual adversarial perturbations under different physical conditions. |
KEVIN EYKHOLT et. al. |
2017 | 15 | Neural Network-based Graph Embedding For Cross-Platform Binary Code Similarity Detection IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To address these issues, in this work, we propose a novel neural network-based approach to compute the embedding, i.e., a numeric vector, based on the control flow graph of each binary function, then the similarity detection can be done efficiently by measuring the distance between the embeddings for two functions. |
XIAOJUN XU et. al. |
2017 | 16 | Machine Learning Models That Remember Too Much IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this setting, we design and implement practical algorithms, some of them very similar to standard ML techniques such as regularization and data augmentation, that memorize information about the training dataset in the model yet the model is as accurate and predictive as a conventionally trained model. |
Congzheng Song; Thomas Ristenpart; Vitaly Shmatikov; |
2017 | 17 | LOGAN: Membership Inference Attacks Against Generative Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the first membership inference attacks against generative models: given a data point, the adversary determines whether or not it was used to train the model. |
Jamie Hayes; Luca Melis; George Danezis; Emiliano De Cristofaro; |
2017 | 18 | Malware Guard Extension: Using SGX To Conceal Cache Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves. |
Michael Schwarz; Samuel Weiser; Daniel Gruss; Clémentine Maurice; Stefan Mangard; |
2017 | 19 | Deep Text Classification Can Be Fooled IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an effective method to craft text adversarial samples, revealing one important yet underestimated fact that DNN-based text classifiers are also prone to adversarial sample attack. |
BIN LIANG et. al. |
2017 | 20 | An Empirical Analysis Of Smart Contracts: Platforms, Applications, And Design Patterns IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We study how the notion of smart contract is interpreted in some of these platforms. |
Massimo Bartoletti; Livio Pompianu; |
2017 | 21 | Blockchain-based Smart Contracts: A Systematic Mapping Study IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct a systematic mapping study to collect all research that is relevant to smart contracts from a technical perspective. |
Maher Alharby; Aad van Moorsel; |
2017 | 22 | DeepSecure: Scalable Provably-Secure Deep Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. |
Bita Darvish Rouhani; M. Sadegh Riazi; Farinaz Koushanfar; |
2017 | 23 | A Byzantine Fault-Tolerant Ordering Service For The Hyperledger Fabric Blockchain Platform IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To overcome this limitation, we designed, implemented, and evaluated a BFT ordering service for HLF on top of the BFT-SMaRt state machine replication/consensus library, implementing also optimizations for wide-area deployment. |
João Sousa; Alysson Bessani; Marko Vukolić; |
2017 | 24 | CryptoDL: Deep Neural Networks Over Encrypted Data IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encryption schemes. |
Ehsan Hesamifard; Hassan Takabi; Mehdi Ghasemi; |
2017 | 25 | Leaky Cauldron On The Dark Land: Understanding Memory Side-Channel Hazards In SGX IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. |
WENHAO WANG et. al. |
2017 | 26 | Adversarial Frontier Stitching For Remote Neural Network Watermarking IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Instead, we aim at allowing the extraction of the watermark from a neural network (or any other machine learning model) that is operated remotely, and available through a service API. In the present paper, we formally introduce the problem and propose a novel zero-bit watermarking algorithm that makes use of adversarial model examples. |
Erwan Le Merrer; Patrick Perez; Gilles Trédan; |
2017 | 27 | Neural Trojans IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We show that this is an effective attack and provide three mitigation techniques: input anomaly detection, re-training, and input preprocessing. |
Yuntao Liu; Yang Xie; Ankur Srivastava; |
2017 | 28 | CacheZoom: How SGX Amplifies The Power Of Cache Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. |
Ahmad Moghimi; Gorka Irazoqui; Thomas Eisenbarth; |
2017 | 29 | A Smart Home Is No Castle: Privacy Vulnerabilities Of Encrypted IoT Traffic IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Here, we examine four IoT smart home devices (a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo switch, and an Amazon Echo) and find that their network traffic rates can reveal potentially sensitive user interactions even when the traffic is encrypted. |
Noah Apthorpe; Dillon Reisman; Nick Feamster; |
2017 | 30 | Prio: Private, Robust, And Scalable Computation Of Aggregate Statistics IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents Prio, a privacy-preserving system for the collection of aggregate statistics. |
Henry Corrigan-Gibbs; Dan Boneh; |
2016 | 1 | Towards Evaluating The Robustness Of Neural Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we demonstrate that defensive distillation does not significantly increase the robustness of neural networks by introducing three new attack algorithms that are successful on both distilled and undistilled neural networks with $100\%$ probability. |
Nicholas Carlini; David Wagner; |
2016 | 2 | Membership Inference Attacks Against Machine Learning Models IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model’s predictions on the inputs that it trained on versus the inputs that it did not train on. |
Reza Shokri; Marco Stronati; Congzheng Song; Vitaly Shmatikov; |
2016 | 3 | Practical Black-Box Attacks Against Machine Learning IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce the first practical demonstration of an attacker controlling a remotely hosted DNN with no such knowledge. |
NICOLAS PAPERNOT et. al. |
2016 | 4 | Stealing Machine Learning Models Via Prediction APIs IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: ML-as-a-service (predictive analytics) systems are an example: Some allow users to train models on potentially sensitive data and charge others for access on a pay-per-query basis. |
Florian Tramèr; Fan Zhang; Ari Juels; Michael K. Reiter; Thomas Ristenpart; |
2016 | 5 | Transferability In Machine Learning: From Phenomena To Black-Box Attacks Using Adversarial Samples IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce new transferability attacks between previously unexplored (substitute, victim) pairs of machine learning model classes, most notably SVMs and decision trees. |
Nicolas Papernot; Patrick McDaniel; Ian Goodfellow; |
2016 | 6 | Mobile Edge Computing, Fog Et Al.: A Survey And Analysis Of Security Threats And Challenges IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. |
Rodrigo Roman; Javier Lopez; Masahiro Mambo; |
2016 | 7 | Concentrated Differential Privacy: Simplifications, Extensions, And Lower Bounds IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an alternative formulation of the concept of concentrated differential privacy in terms of the Renyi divergence between the distributions obtained by running an algorithm on neighboring inputs. |
Mark Bun; Thomas Steinke; |
2016 | 8 | Enhancing Bitcoin Security And Performance With Strong Consistency Via Collective Signing IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. |
ELEFTHERIOS KOKORIS-KOGIAS et. al. |
2016 | 9 | IoT Sentinel: Automated Device-Type Identification For Security Enforcement In IoT IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. |
MARKUS MIETTINEN et. al. |
2016 | 10 | Inferring Fine-grained Control Flow Inside SGX Enclaves With Branch Shadowing IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we explore a new, yet critical, side-channel attack against Intel Software Guard Extension (SGX), called a branch shadowing attack, which can reveal fine-grained control flows (i.e., each branch) of an enclave program running on real SGX hardware. |
SANGHO LEE et. al. |
2016 | 11 | Towards The Science Of Security And Privacy In Machine Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We articulate a comprehensive threat model for ML, and categorize attacks and defenses within an adversarial framework. |
Nicolas Papernot; Patrick McDaniel; Arunesh Sinha; Michael Wellman; |
2016 | 12 | Crafting Adversarial Input Sequences For Recurrent Neural Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we contribute to the field of adversarial machine learning by investigating adversarial input sequences for recurrent neural networks processing sequential data. |
Nicolas Papernot; Patrick McDaniel; Ananthram Swami; Richard Harang; |
2016 | 13 | Practical Secure Aggregation For Federated Learning On User-Held Data IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We consider training a deep neural network in the Federated Learning model, using distributed stochastic gradient descent across user-held training data on mobile devices, wherein Secure Aggregation protects each user’s model gradient. |
KEITH BONAWITZ et. al. |
2016 | 14 | Adversarial Perturbations Against Deep Neural Networks For Malware Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to construct highly-effective adversarial sample crafting attacks for neural networks used as malware classifiers. |
Kathrin Grosse; Nicolas Papernot; Praveen Manoharan; Michael Backes; Patrick McDaniel; |
2016 | 15 | MaMaDroid: Detecting Android Malware By Building Markov Chains Of Behavioral Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present MaMaDroid, an Android malware detection system that relies on app behavior. |
ENRICO MARICONTI et. al. |
2016 | 16 | Blockchain In Internet Of Things: Challenges And Solutions IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This position paper proposes a new secure, private, and lightweight architecture for IoT, based on BC technology that eliminates the overhead of BC while maintaining most of its security and privacy benefits. |
Ali Dorri; Salil S. Kanhere; Raja Jurdak; |
2016 | 17 | Defensive Distillation Is Not Robust To Adversarial Examples IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We show that defensive distillation is not secure: it is no more resistant to targeted misclassification attacks than unprotected neural networks. |
Nicholas Carlini; David Wagner; |
2016 | 18 | A New Android Malware Detection Approach Using Bayesian Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Hence, in this paper we present an effective approach to alleviate this problem based on Bayesian classification models obtained from static code analysis. |
Suleiman Y. Yerima; Sakir Sezer; Gavin McWilliams; Igor Muttik; |
2016 | 19 | Automated Dynamic Analysis Of Ransomware: Benefits, Limitations And Use For Detection IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present EldeRan, a machine learning approach for dynamically analysing and classifying ransomware. |
Daniele Sgandurra; Luis Muñoz-González; Rabih Mohsen; Emil C. Lupu; |
2016 | 20 | C-FLAT: Control-FLow ATtestation For Embedded Systems Software IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As a concrete step towards more comprehensive run-time remote attestation, we present the design and implementation of Control- FLow ATtestation (C-FLAT) that enables remote attestation of an application’s control-flow path, without requiring the source code. |
TIGIST ABERA et. al. |
2016 | 21 | On The Cryptanalysis Of Fridrich’s Chaotic Image Encryption Scheme IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The work provides some bases for further optimizing attack on the Fridrich’s scheme and its variants. |
Eric Yong Xie; Chengqing Li; Simin Yu; Jinhu Lü; |
2016 | 22 | Authentication Protocols For Internet Of Things: A Comprehensive Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). |
Mohamed Amine Ferrag; Leandros A. Maglaras; Helge Janicke; Jianmin Jiang; |
2016 | 23 | Predicting Domain Generation Algorithms With Long Short-Term Memory Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Experiments in this paper are run on open datasets and code snippets are provided to reproduce the results. |
Jonathan Woodbridge; Hyrum S. Anderson; Anjum Ahuja; Daniel Grant; |
2016 | 24 | Learning To Protect Communications With Adversarial Neural Cryptography IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Thus, a system may consist of neural networks named Alice and Bob, and we aim to limit what a third neural network named Eve learns from eavesdropping on the communication between Alice and Bob. |
Martín Abadi; David G. Andersen; |
2016 | 25 | Scalable Byzantine Consensus Via Hardware-assisted Secret Sharing IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose FastBFT, a fast and scalable BFT protocol. |
Jian Liu; Wenting Li; Ghassan O. Karame; N. Asokan; |
2016 | 26 | Survey On Misbehavior Detection In Cooperative Intelligent Transportation Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we present misbehavior detection mechanisms that can detect such insider attacks based on attacker behavior and information analysis. |
Rens W. van der Heijden; Stefan Dietzel; Tim Leinmüller; Frank Kargl; |
2016 | 27 | DeepDGA: Adversarially-Tuned Domain Generation And Detection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we leverage the concept of generative adversarial networks to construct a deep learning based DGA that is designed to intentionally bypass a deep learning based detector. |
Hyrum S. Anderson; Jonathan Woodbridge; Bobby Filar; |
2016 | 28 | Cryptanalyzing An Image-Scrambling Encryption Algorithm Of Pixel Bits IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, the authors re-evaluate the security of a typical image-scrambling encryption algorithm (ISEA). |
Chengqing Li; Dongdong Lin; Jinhu Lü; |
2016 | 29 | Systematic Classification Of Side-Channel Attacks: A Case Study For Mobile Devices IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a new categorization system for side-channel attacks, which is necessary as side-channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s. |
Raphael Spreitzer; Veelasha Moonsamy; Thomas Korak; Stefan Mangard; |
2016 | 30 | On The Security Defects Of An Image Encryption Scheme IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper studies the security of a recently-proposed chaos-based image encryption scheme, and points out the following problems: 1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; 2) given one chosen plain-image, a subkey $K_{10}$ can be guessed with a smaller computational complexity than that of the simple brute-force attack; 3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: $\{K_i\bmod 128\}_{i=4}^{10}$, which works very well when $K_{10}$ is not too large; 4) when $K_{10}$ is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key. |
CHENGQING LI et. al. |
2015 | 1 | The Limitations Of Deep Learning In Adversarial Settings IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we formalize the space of adversaries against deep neural networks (DNNs) and introduce a novel class of algorithms to craft adversarial samples based on a precise understanding of the mapping between inputs and outputs of DNNs. |
NICOLAS PAPERNOT et. al. |
2015 | 2 | Distillation As A Defense To Adversarial Perturbations Against Deep Neural Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we introduce a defensive mechanism called defensive distillation to reduce the effectiveness of adversarial samples on DNNs. |
Nicolas Papernot; Patrick McDaniel; Xi Wu; Somesh Jha; Ananthram Swami; |
2015 | 3 | Bitcoin-NG: A Scalable Blockchain Protocol IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. |
Ittay Eyal; Adem Efe Gencer; Emin Gun Sirer; Robbert van Renesse; |
2015 | 4 | Survey Of Security And Privacy Issues Of Internet Of Things IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: No countermeasure to the security drawbacks has been analyzed in the paper. |
Tuhin Borgohain; Uday Kumar; Sugata Sanyal; |
2015 | 5 | Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we a deep neural network malware classifier that achieves a usable detection rate at an extremely low false positive rate and scales to real world training example volumes on commodity hardware. |
Joshua Saxe; Konstantin Berlin; |
2015 | 6 | Optimal Selfish Mining Strategies In Bitcoin IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we extend the underlying model for selfish mining attacks, and provide an algorithm to find $\epsilon$-optimal policies for attackers within the model, as well as tight upper bounds on the revenue of optimal policies. |
Ayelet Sapirshtein; Yonatan Sompolinsky; Aviv Zohar; |
2015 | 7 | Flush+Flush: A Fast And Stealthy Cache Attack IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. |
Daniel Gruss; Clémentine Maurice; Klaus Wagner; Stefan Mangard; |
2015 | 8 | Enigma: Decentralized Computation Platform With Guaranteed Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: For storage, we use a modified distributed hashtable for holding secret-shared data. |
Guy Zyskind; Oz Nathan; Alex Pentland; |
2015 | 9 | Privacy In The Internet Of Things: Threats And Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper analyzes the privacy issues in the Internet of Things in detail. |
Jan Henrik Ziegeldorf; Oscar Garcia Morchon; Klaus Wehrle; |
2015 | 10 | Local, Private, Efficient Protocols For Succinct Histograms IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In a model with public coins, we show that each user need only send 1 bit to the server. |
Raef Bassily; Adam Smith; |
2015 | 11 | ARMageddon: Cache Attacks On Mobile Devices IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we demonstrate how to solve key challenges to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, and Flush+Flush on non-rooted ARM-based devices without any privileges. |
Moritz Lipp; Daniel Gruss; Raphael Spreitzer; Clémentine Maurice; Stefan Mangard; |
2015 | 12 | DRAMA: Exploiting DRAM Addressing For Cross-CPU Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present two methods to reverse engineer the mapping of memory addresses to DRAM channels, ranks, and banks. |
Peter Pessl; Daniel Gruss; Clémentine Maurice; Michael Schwarz; Stefan Mangard; |
2015 | 13 | Rowhammer.js: A Remote Software-Induced Fault Attack In JavaScript IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We overcome this limitation by defeating complex cache replacement policies. |
Daniel Gruss; Clémentine Maurice; Stefan Mangard; |
2015 | 14 | K-fingerprinting: A Robust Scalable Website Fingerprinting Technique IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present a new website fingerprinting technique based on random decision forests and evaluate performance over standard web pages as well as Tor hidden services, on a larger scale than previous works. |
Jamie Hayes; George Danezis; |
2015 | 15 | HMOG: New Behavioral Biometric Features For Continuous Authentication Of Smartphone Users IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce Hand Movement, Orientation, and Grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users. |
ZDENKA SITOVA et. al. |
2015 | 16 | Novel Feature Extraction, Selection And Fusion For Effective Malware Family Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paradigm is presented and discussed in the present paper, where emphasis has been given to the phases related to the extraction, and selection of a set of novel features for the effective representation of malware samples. |
Mansour Ahmadi; Dmitry Ulyanov; Stanislav Semenov; Mikhail Trofimov; Giorgio Giacinto; |
2015 | 17 | Building A RAPPOR With The Unknown: Privacy-Preserving Learning Of Associations And Data Dictionaries IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose a novel decoding algorithm for the RAPPOR mechanism that enables the estimation of unknown unknowns, i.e., strings we do not even know we should be estimating. |
Giulia Fanti; Vasyl Pihur; Úlfar Erlingsson; |
2015 | 18 | Centrally Banked Cryptocurrencies IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce RSCoin, a cryptocurrency framework in which central banks maintain complete control over the monetary supply, but rely on a distributed set of authorities, or mintettes, to prevent double-spending. |
George Danezis; Sarah Meiklejohn; |
2015 | 19 | Practical Attacks Against Privacy And Availability In 4G/LTE Mobile Communication Systems IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present several countermeasures to resist our specific attacks. |
Altaf Shaik; Ravishankar Borgaonkar; N. Asokan; Valtteri Niemi; Jean-Pierre Seifert; |
2015 | 20 | Privacy And Data Protection By Design – From Policy To Engineering IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The report sketches a method to map legal obligations to design strategies, which allow the system designer to select appropriate techniques for implementing the identified privacy requirements. |
GEORGE DANEZIS et. al. |
2015 | 21 | Keeping Authorities Honest Or Bust With Decentralized Witness Cosigning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. |
EWA SYTA et. al. |
2015 | 22 | Riposte: An Anonymous Messaging System Handling Millions of Users IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper presents Riposte, a new system for anonymous broadcast messaging. |
Henry Corrigan-Gibbs; Dan Boneh; David Mazières; |
2015 | 23 | DDoS Attacks In Cloud Computing: Issues, Taxonomy, And Future Directions IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. |
Gaurav Somani; Manoj Singh Gaur; Dheeraj Sanghi; Mauro Conti; Rajkumar Buyya; |
2015 | 24 | Bitcoin Blockchain Dynamics: The Selfish-Mine Strategy In The Presence Of Propagation Delay IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the context of the `selfish-mine’ strategy proposed by Eyal and Sirer, we study the effect of propagation delay on the evolution of the Bitcoin blockchain. |
Johannes Göbel; Paul Keeler; Anthony E. Krzesinski; Peter G. Taylor; |
2015 | 25 | ReCon: Revealing And Controlling PII Leaks In Mobile Network Traffic IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. |
Jingjing Ren; Ashwin Rao; Martina Lindorfer; Arnaud Legout; David Choffnes; |
2015 | 26 | Trends In Crypto-currencies And Blockchain Technologies: A Monetary Theory And Regulation Perspective IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We describe the historical context which led to the development of these currencies and some modern and recent trends in their uptake, in terms of both usage in the real economy and as investment products. |
Gareth W. Peters; Efstathios Panayi; Ariane Chapelle; |
2015 | 27 | Bitcoin Transaction Graph Analysis IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We explore the level of anonymity in the Bitcoin system. |
Michael Fleder; Michael S. Kester; Sudeep Pillai; |
2015 | 28 | Automated Dynamic Firmware Analysis At Scale: A Case Study On Embedded Web Interfaces IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present the first fully automated framework that applies dynamic firmware analysis techniques to achieve, in a scalable manner, automated vulnerability discovery within embedded firmware images. |
Andrei Costin; Apostolis Zarras; Aurélien Francillon; |
2015 | 29 | Sound-Proof: Usable Two-Factor Authentication Based On Ambient Sound IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose Sound-Proof, a usable and deployable two-factor authentication mechanism. |
Nikolaos Karapanos; Claudio Marforio; Claudio Soriente; Srdjan Capkun; |
2015 | 30 | Toward An Efficient Website Fingerprinting Defense IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a novel, lightweight defense based on Adaptive Padding that provides a sufficient level of security against website fingerprinting, particularly in realistic evaluation conditions. |
Marc Juarez; Mohsen Imani; Mike Perry; Claudia Diaz; Matthew Wright; |
2014 | 1 | RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper describes and motivates RAPPOR, details its differential-privacy and utility guarantees, discusses its practical deployment and properties in the face of different attack models, and, finally, gives results of its application to both synthetic and real-world data. |
Úlfar Erlingsson; Vasyl Pihur; Aleksandra Korolova; |
2014 | 2 | Deanonymisation Of Clients In Bitcoin P2P Network IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. |
Alex Biryukov; Dmitry Khovratovich; Ivan Pustogarov; |
2014 | 3 | Analysis Of Hashrate-Based Double Spending IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we take a look at the stochastic processes underlying typical attacks and their resulting probabilities of success. |
Meni Rosenfeld; |
2014 | 4 | Cryptocurrencies Without Proof Of Work IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We offer analysis of existing protocols that have a substantial amount of popularity. |
Iddo Bentov; Ariel Gabizon; Alex Mizrahi; |
2014 | 5 | The Miner’s Dilemma IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We define and analyze a game where pools use some of their participants to infiltrate other pools and perform such an attack. |
Ittay Eyal; |
2014 | 6 | TweetCred: Real-Time Credibility Assessment Of Content On Twitter IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a semi-supervised ranking model for scoring tweets according to their credibility. |
Aditi Gupta; Ponnurangam Kumaraguru; Carlos Castillo; Patrick Meier; |
2014 | 7 | Optimal Geo-Indistinguishable Mechanisms For Location Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. |
Nicolás E. Bordenabe; Konstantinos Chatzikokolakis; Catuscia Palamidessi; |
2014 | 8 | Automated Experiments On Ad Privacy Settings: A Tale Of Opacity, Choice, And Discrimination IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present AdFisher, an automated tool that explores how user behaviors, Google’s ads, and Ad Settings interact. |
Amit Datta; Michael Carl Tschantz; Anupam Datta; |
2014 | 9 | Differentially Private Distributed Optimization IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we study the private distributed optimization (PDOP) problem with the additional requirement that the cost function of the individual agents should remain differentially private. |
Zhenqi Huang; Sayan Mitra; Nitin Vaidya; |
2014 | 10 | Privacy In The Genomic Era IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. |
MUHAMMAD NAVEED et. al. |
2014 | 11 | Unsupervised Anomaly-based Malware Detection Using Hardware Features IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we propose a new class of detectors – anomaly-based hardware malware detectors – that do not require signatures for malware detection, and thus can catch a wider range of malware including potentially novel ones. |
Adrian Tang; Simha Sethumadhavan; Salvatore Stolfo; |
2014 | 12 | Mobile Device Identification Via Sensor Fingerprinting IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present two implementations: one based on analyzing the frequency response of the speakerphone-microphone system, and another based on analyzing device-specific accelerometer calibration errors. |
Hristo Bojinov; Yan Michalevsky; Gabi Nakibly; Dan Boneh; |
2014 | 13 | K-Nearest Neighbor Classification Over Semantically Secure Encrypted Relational Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we focus on solving the classification problem over encrypted data. |
Bharath K. Samanthula; Yousef Elmehdwi; Wei Jiang; |
2014 | 14 | Bitcoin Transaction Malleability And MtGox IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work we use traces of the Bitcoin network for over a year preceding the filing to show that, while the problem is real, there was no widespread use of malleability attacks before the closure of MtGox. |
Christian Decker; Roger Wattenhofer; |
2014 | 15 | On Subversive Miner Strategies And Block Withholding Attack In Bitcoin Digital Currency IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we look at the miner strategies with particular attention paid to subversive and dishonest strategies or those which could put bitcoin and its reputation in danger. |
Nicolas T. Courtois; Lear Bahack; |
2014 | 16 | Electromagnetic Fault Injection: Towards A Fault Model On A 32-bit Microcontroller IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The aim of this paper is twofold: providing a more in-depth study of the effects of electromagnetic glitch fault injection on a state-of-the-art microcontroller and building an associated register-transfer level fault model. |
Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz; |
2014 | 17 | Bitcoin Over Tor Isn’t A Good Idea IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we show that combining Tor and Bitcoin creates an attack vector for the deterministic and stealthy man-in-the-middle attacks. |
Alex Biryukov; Ivan Pustogarov; |
2014 | 18 | Detection Of Early-Stage Enterprise Infection By Mining Large-Scale Log Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We address the problem of detecting early-stage infection in an enterprise setting by proposing a new framework based on belief propagation inspired from graph theory. |
Alina Oprea; Zhou Li; Ting-Fang Yen; Sang Chin; Sumayah Alrwais; |
2014 | 19 | On Covert Acoustical Mesh Networks In Air IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. |
Michael Hanspach; Michael Goetz; |
2014 | 20 | Subspace Methods For Data Attack On State Estimation: A Data Driven Approach IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. |
Jinsub Kim; Lang Tong; Robert J. Thomas; |
2014 | 21 | Dynamic Analysis Of Digital Chaotic Maps Via State-Mapping Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper aims to study the dynamics of discrete-time chaotic maps in the digital (i.e., finite-precision) domain. |
Chengqing Li; Bingbing Feng; Shujun Li; Juergen Kurths; Guanrong Chen; |
2014 | 22 | On The Relation Between Identifiability, Differential Privacy And Mutual-Information Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Under a unified privacy-distortion framework, where the distortion is defined to be the Hamming distance of the input and output databases, we establish some fundamental connections between these three privacy notions. |
Weina Wang; Lei Ying; Junshan Zhang; |
2014 | 23 | Calm Before The Storm: The Challenges Of Cloud Computing In Digital Forensics IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. |
George Grispos; Tim Storer; William Bradley Glisson; |
2014 | 24 | Your Voice Assistant Is Mine: How To Abuse Speakers To Steal Information And Control Your Phone IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a novel approach (GVS-Attack) to launch permission bypassing attacks from a zero permission Android application (VoicEmployer) through the speaker. |
Wenrui Diao; Xiangyu Liu; Zhe Zhou; Kehuan Zhang; |
2014 | 25 | AirHopper: Bridging The Air-Gap Between Isolated Networks And Mobile Phones Using Radio Frequencies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we present AirHopper, a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals. |
Mordechai Guri; Gabi Kedma; Assaf Kachlon; Yuval Elovici; |
2014 | 26 | Privacy Games: Optimal User-Centric Data Obfuscation IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user’s privacy. |
Reza Shokri; |
2014 | 27 | Symmetric Algorithm Survey: A Comparative Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation that are essential for secure communication (Wired or Wireless). |
Mansoor Ebrahim; Shujaat Khan; Umer Bin Khalid; |
2014 | 28 | Sprobes: Enforcing Kernel Code Integrity On The TrustZone Architecture IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present SPROBES, a novel primitive that enables introspection of operating systems running on ARM TrustZone hardware. |
Xinyang Ge; Hayawardh Vijayakumar; Trent Jaeger; |
2014 | 29 | I Know Why You Went To The Clinic: Risks And Realization Of HTTPS Traffic Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present a traffic analysis attack against over 6000 webpages spanning the HTTPS deployments of 10 widely used, industry-leading websites in areas such as healthcare, finance, legal services and streaming video. |
Brad Miller; Ling Huang; A. D. Joseph; J. D. Tygar; |
2014 | 30 | User-Generated Free-Form Gestures For Authentication: Security And Memorability IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We conclude the paper with strategies for generating secure and memorable free-form gestures, which present a robust method for mobile authentication. |
MICHAEL SHERMAN et. al. |
2013 | 1 | Majority Is Not Enough: Bitcoin Mining Is Vulnerable IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an attack with which colluding miners obtain a revenue larger than their fair share. |
Ittay Eyal; Emin Gun Sirer; |
2013 | 2 | Security In Wireless Sensor Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This chapter provides a comprehensive discussion on the state of the art in security technologies for wireless sensor networks. |
Jaydip Sen; |
2013 | 3 | Hacking Smart Machines With Smarter Ones: How To Extract Meaningful Data From Machine Learning Classifiers IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. |
GIUSEPPE ATENIESE et. al. |
2013 | 4 | Secure K-Nearest Neighbor Query Over Encrypted Data In Outsourced Environments IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we focus on solving the k-nearest neighbor (kNN) query problem over encrypted database outsourced to a cloud: a user issues an encrypted query record to the cloud, and the cloud returns the k closest records to the user. |
Yousef Elmehdwi; Bharath K. Samanthula; Wei Jiang; |
2013 | 5 | DAG-Based Attack And Defense Modeling: Don’t Miss The Forest For The Attack Trees IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). |
Barbara Kordy; Ludovic Piètre-Cambacédès; Patrick Schweitzer; |
2013 | 6 | Security And Privacy Issues In Cloud Computing IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. |
Jaydip Sen; |
2013 | 7 | On The Security Of The Automatic Dependent Surveillance-Broadcast Protocol IF:6 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of … |
Martin Strohmeier; Vincent Lenders; Ivan Martinovic; |
2013 | 8 | Entropy Based Anomaly Detection System To Prevent DDoS Attacks In Cloud IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Grid and Cloud Computing Intrusion Detection System detects encrypted node communication and find the hidden attack trial which inspects and detects those attacks that network based and host based cant identify. |
A. S. Syed Navaz; V. Sangeetha; C. Prabhadevi; |
2013 | 9 | A Proposed NFC Payment Application IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a new NFC payment application, which is based on our previous NFC Cloud Wallet model to demonstrate a reliable structure of NFC ecosystem. |
Pardis Pourghomi; Muhammad Qasim saeed; Gheorghita Ghinea; |
2013 | 10 | Fingerprinting Codes And The Price Of Approximate Differential Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We show new lower bounds on the sample complexity of $(\varepsilon, \delta)$-differentially private algorithms that accurately answer large sets of counting queries. |
Mark Bun; Jonathan Ullman; Salil Vadhan; |
2013 | 11 | Time-Optimal Interactive Proofs For Circuit Evaluation IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We describe a refinement of a powerful interactive proof protocol originally due to Goldwasser, Kalai, and Rothblum. |
Justin Thaler; |
2013 | 12 | SybilBelief: A Semi-supervised Learning Approach For Structure-based Sybil Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we aim to overcome these drawbacks. |
Neil Zhenqiang Gong; Mario Frank; Prateek Mittal; |
2013 | 13 | Longitudinal Analysis Of Android Ad Library Permissions IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper investigates changes over time in the behavior of Android ad libraries. |
Theodore Book; Adam Pridgen; Dan S. Wallach; |
2013 | 14 | SecLaaS: Secure Logging-as-a-Service For Cloud Forensics IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce Secure-Logging-as-a-Service (SecLaaS), which stores virtual machines’ logs and provides access to forensic investigators ensuring the confidentiality of the cloud users. |
Shams Zawoad; Amit Kumar Dutta; Ragib Hasan; |
2013 | 15 | Content And Popularity Analysis Of Tor Hidden Services IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we analyse the landscape of Tor hidden services. |
Alex Biryukov; Ivan Pustogarov; Fabrice Thill; Ralf-Philipp Weinmann; |
2013 | 16 | Theoretical Bitcoin Attacks With Less Than Half Of The Computational Power (draft) IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the paper we analyze two kinds of attacks based on two theoretical flaws: the Block Discarding Attack and the Difficulty Raising Attack. |
Lear Bahack; |
2013 | 17 | P3: Toward Privacy-Preserving Photo Sharing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To address these concerns, we propose a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part. |
Moo-Ryong Ra; Ramesh Govindan; Antonio Ortega; |
2013 | 18 | A New Graphical Password Scheme Resistant To Shoulder-Surfing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. |
Haichang Gao; Zhongjie Ren; Xiuling Chang; Xiyang Liu; Uwe Aickelin; |
2013 | 19 | Mining Attribute-based Access Control Policies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents an ABAC policy mining algorithm. |
Zhongyuan Xu; Scott D. Stoller; |
2013 | 20 | Machine Learning Techniques For Intrusion Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we study several such schemes and compare their performance. |
Mahdi Zamani; Mahnush Movahedi; |
2013 | 21 | Cryptanalyzing Image Encryption Using Chaotic Logistic Map IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper presents a typical example to show insecurity of an image encryption scheme using chaotic logistic map. |
Chengqing Li; Tao Xie; Qi Liu; Ge Cheng; |
2013 | 22 | On The Complexity Of The Rank Syndrome Decoding Problem IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose two new generic attacks on the Rank Syndrome Decoding (RSD) problem Let $C$ be a random $[n,k]$ rank code over $GF(q^m)$ and let $y=x+e$ be a received word such that $x \in C$ and the $Rank(e)=r$. |
Philippe Gaborit; Olivier Ruatta; Julien Schrek; |
2013 | 23 | A Comparative Usability Study Of Two-Factor Authentication IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an exploratory comparative study of the usability of 2F technologies. |
Emiliano De Cristofaro; Honglu Du; Julien Freudiger; Greg Norcie; |
2013 | 24 | Text Steganographic Approaches: A Comparison IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents three novel approaches of text steganography. |
Monika Agarwal; |
2013 | 25 | A Secure And Effective Anonymous Authentication Scheme For Roaming Service In Global Mobility Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To remedy these weaknesses, in this paper we propose a novel anonymous authentication scheme for roaming service in global mobility networks. |
Dawei Zhao; Haipeng Peng; Lixiang Li; Yixian Yang; |
2013 | 26 | A Chaotic Image Encryption Scheme Owning Temp-value Feedback IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a novel efficient chaotic image encryption scheme, in which the temp-value feedback mechanism is introduced to the permutation and diffusion procedures. |
Leo Yu Zhang; Xiaobo Hu; Yuansheng Liu; Kwok-Wo Wong; |
2013 | 27 | A Predictive Differentially-Private Mechanism For Mobility Traces IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we show that correlations in the trace can be in fact exploited in terms of a prediction function that tries to guess the new location based on the previously reported locations. |
Konstantinos Chatzikokolakis; Catuscia Palamidessi; Marco Stronati; |
2013 | 28 | A Static Malware Detection System Using Data Mining Methods IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Different researchers have proposed methods using data mining and machine learning for detecting new malicious programs. |
Usukhbayar Baldangombo; Nyamjav Jambaljav; Shi-Jinn Horng; |
2013 | 29 | Secure Biometrics: Concepts, Authentication Architectures And Challenges IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article we present an overview of secure biometrics, also referred to as biometric template protection, an emerging class of methods that address these concerns. |
Shantanu Rane; Ye Wang; Stark. C. Draper; Prakash Ishwar; |
2013 | 30 | Elastic Pathing: Your Speed Is Enough To Track You IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To demonstrate the real-world applicability of our approach we applied our algorithm, elastic pathing, to data collected over hundreds of driving trips occurring over several months. |
Bernhard Firner; Shridatt Sugrim; Yulong Yang; Janne Lindqvist; |
2012 | 1 | Geo-Indistinguishability: Differential Privacy For Location-Based Systems IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we study geo-indistinguishability, a formal notion of privacy for location-based systems that protects the user’s exact location, while allowing approximate information – typically needed to obtain a certain desired service – to be released. |
Miguel E. Andrés; Nicolás E. Bordenabe; Konstantinos Chatzikokolakis; Catuscia Palamidessi; |
2012 | 2 | Path ORAM: An Extremely Simple Oblivious RAM Protocol IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. |
EMIL STEFANOV et. al. |
2012 | 3 | Touchalytics: On The Applicability Of Touchscreen Input As A Behavioral Biometric For Continuous Authentication IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen. |
Mario Frank; Ralf Biedert; Eugene Ma; Ivan Martinovic; Dawn Song; |
2012 | 4 | A New Approach To Practical Active-Secure Two-Party Computation IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a new approach to practical two-party computation secure against an active adversary. |
Jesper Buus Nielsen; Peter Sebastian Nordholt; Claudio Orlandi; Sai Sheshank Burra; |
2012 | 5 | An Implementation Of Intrusion Detection System Using Genetic Algorithm IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. |
Mohammad Sazzadul Hoque; Md. Abdul Mukit; Md. Abu Naser Bikas; |
2012 | 6 | Attribute-Based Encryption For Circuits From Multilinear Maps IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. |
Amit Sahai; Brent Waters; |
2012 | 7 | Differentially Private Grids For Geospatial Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we tackle the problem of constructing a differentially private synopsis for two-dimensional datasets such as geospatial datasets. |
Wahbeh Qardaji; Weining Yang; Ninghui Li; |
2012 | 8 | Differentially Private Iterative Synchronous Consensus IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce the private iterative consensus problem where agents are required to converge while protecting the privacy of their initial values from honest but curious adversaries. |
Zhenqi Huang; Sayan Mitra; Geir Dullerud; |
2012 | 9 | Differentially Private Data Analysis Of Social Networks Via Restricted Sensitivity IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce the notion of restricted sensitivity as an alternative to global and smooth sensitivity to improve accuracy in differentially private data analysis. |
Jeremiah Blocki; Avrim Blum; Anupam Datta; Or Sheffet; |
2012 | 10 | Botnet-based Distributed Denial Of Service (DDoS) Attacks On Web Servers: Classification And Art IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive study to show the danger of Botnet-based DDoS attacks on application layer, especially on the Web server and the increased incidents of such attacks that has evidently increased recently. |
Esraa Alomari; Selvakumar Manickam; B. B. Gupta; Shankar Karuppayah; Rafeef Alfaris; |
2012 | 11 | Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: From the simulation results based on the PJM 5 Bus test system, we can show the effectiveness and properties of the studied game. |
Mohammad Esmalifalak; Ge Shi; Zhu Han; Lingyang Song; |
2012 | 12 | Survey On Security Issues In Cloud Computing And Associated Mitigation Techniques IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it. |
Rohit Bhadauria; Sugata Sanyal; |
2012 | 13 | STAR-Vote: A Secure, Transparent, Auditable, And Reliable Voting System IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper describes the STAR-Vote architecture, which could well be the next-generation voting system for Travis County and perhaps elsewhere. |
JOSH BENALOH et. al. |
2012 | 14 | Automatically Securing Permission-Based Software By Reducing The Attack Surface: An Application To Android IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an approach to detecting permission gaps using static analysis. |
Alexandre Bartel; Jacques Klein; Martin Monperrus; Yves Le Traon; |
2012 | 15 | Breaking A Novel Image Encryption Scheme Based On Improved Hyperchaotic Sequences IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper re-evaluates the security of the encryption scheme and finds that the encryption scheme can be broken with only one known plain-image. |
Chengqing Li; Yuansheng Liu; Tao Xie; Michael Z. Q. Chen; |
2012 | 16 | A Lightweight Dynamic Pseudonym Identity Based Authentication And Key Agreement Protocol Without Verification Tables For Multi-server Architecture IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Unfortunately, our further research shows that Li et al.’s protocol contains several drawbacks and can not resist some types of known attacks, such as replay attack, Deny-of-Service attack, internal attack, eavesdropping attack, masquerade attack, and so on. |
Kaiping Xue; Peilin Hong; Changsha Ma; |
2012 | 17 | Calibrating Data To Sensitivity In Private Data Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an approach to differentially private computation in which one does not scale up the magnitude of noise for challenging queries, but rather scales down the contributions of challenging records. |
Davide Proserpio; Sharon Goldberg; Frank McSherry; |
2012 | 18 | A Novel Latin Square Image Cipher IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. |
Yue Wu; Yicong Zhou; Joseph P. Noonan; Sos Agaian; C. L. Philip Chen; |
2012 | 19 | A Theory Of Pricing Private Data IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose a theoretical framework for assigning prices to noisy query answers, as a function of their accuracy, and for dividing the price amongst data owners who deserve compensation for their loss of privacy. |
Chao Li; Daniel Yang Li; Gerome Miklau; Dan Suciu; |
2012 | 20 | Search Me If You Can: Privacy-preserving Location Query Service IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper tackles this non-trivial challenge by designing a suite of novel fine-grained Privacy-preserving Location Query Protocol (PLQP). |
Xiang-Yang Li; Taeho Jung; |
2012 | 21 | Privacy In Content-Oriented Networking: Threats And Countermeasures IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. |
Abdelberi Chaabane; Emiliano De Cristofaro; Mohammed-Ali Kaafar; Ersin Uzun; |
2012 | 22 | The Optimal Mechanism In Differential Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We derive the optimal $\epsilon$-differentially private mechanism for single real-valued query function under a very general utility-maximization (or cost-minimization) framework. |
Quan Geng; Pramod Viswanath; |
2012 | 23 | Breaking A Novel Colour Image Encryption Algorithm Based On Chaos IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic map. |
Chengqing Li; Yu Zhang; Rong Ou; Kwok-Wo Wong; |
2012 | 24 | Preserving Link Privacy In Social Network Based Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we make the following contributions. |
Prateek Mittal; Charalampos Papamanthou; Dawn Song; |
2012 | 25 | PlaceRaider: Virtual Theft In Physical Spaces With Smartphones IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. |
Robert Templeman; Zahid Rahman; David Crandall; Apu Kapadia; |
2012 | 26 | Proactively Accountable Anonymous Messaging In Verdict IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Verdict, the first practical anonymous group communication system built using proactively verifiable DC-nets: participants use public key cryptography to construct DC-net ciphertexts, and knowledge proofs to detect and detect and exclude misbehavior before disruption. |
Henry Corrigan-Gibbs; David Isaac Wolinsky; Bryan Ford; |
2012 | 27 | Distributed Denial Of Service Prevention Techniques IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from possible DDoS attacks and discuss the strengths and weaknesses of each mechanism. |
B. B. Gupta; R. C. Joshi; Manoj Misra; |
2012 | 28 | Principles And Overview Of Network Steganography IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The paper presents basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques. |
Jozef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski; |
2012 | 29 | Participatory Privacy: Enabling Privacy In Participatory Sensing IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. |
Emiliano De Cristofaro; Claudio Soriente; |
2012 | 30 | A Novel Approach Of Color Image Hiding Using RGB Color Planes And DWT IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This work proposes a wavelet based Steganographic technique for the color image. |
Nilanjan Dey; Anamitra Bardhan Roy; Sayantan Dey; |
2011 | 1 | Shannon Entropy Based Randomness Measurement And Test For Image Encryption IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a new information entropy-based randomness measurement for image encryption is introduced which, for the first time, answers the question of whether a given ciphertext image is sufficiently random-like. |
Yue Wu; Joseph P. Noonan; Sos Agaian; |
2011 | 2 | Quire: Lightweight Provenance For Smart Phone Operating Systems IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We demonstrate the usefulness of Quire with two example applications. |
Michael Dietz; Shashi Shekhar; Yuliy Pisetsky; Anhei Shu; Dan S. Wallach; |
2011 | 3 | Towards Practical Oblivious RAM IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: On the theoretic front, we propose a fundamentally novel technique for constructing Oblivious RAMs: specifically, we partition a bigger O-RAM into smaller O-RAMs, and employ a background eviction technique to obliviously evict blocks from the client-side cache into a randomly assigned server-side partition. |
Emil Stefanov; Elaine Shi; Dawn Song; |
2011 | 4 | A Survey On Security Issues In Cloud Computing IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the Cloud computing adoption and diffusion affecting the various stake-holders linked to it. |
Rohit Bhadauria; Rituparna Chaki; Nabendu Chaki; Sugata Sanyal; |
2011 | 5 | On Sampling, Anonymization, And Differential Privacy: Or, K-Anonymization Meets Differential Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper aims at answering the following two questions in privacy-preserving data analysis and publishing: What formal privacy guarantee (if any) does $k$-anonymization provide? |
Ninghui Li; Wahbeh Qardaji; Dong Su; |
2011 | 6 | Privacy-Preserving Group Data Access Via Stateless Oblivious RAM Simulation IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users. |
Michael T. Goodrich; Michael Mitzenmacher; Olga Ohrimenko; Roberto Tamassia; |
2011 | 7 | How Unique And Traceable Are Usernames? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: One possible way of estimating this probability would be to look at the public information associated to the two accounts and try to match them. |
Daniele Perito; Claude Castelluccia; Mohamed Ali Kaafar; Pere Manils; |
2011 | 8 | Distributed Private Data Analysis: On Simultaneously Solving How And What IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential privacy. |
Amos Beimel; Kobbi Nissim; Eran Omri; |
2011 | 9 | Link Prediction By De-anonymization: How We Won The Kaggle Social Network Challenge IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. |
Arvind Narayanan; Elaine Shi; Benjamin I. P. Rubinstein; |
2011 | 10 | Image Encryption Using Differential Evolution Approach In Frequency Domain IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. |
Maaly Awad S Hassan; Ibrahim Soliman I Abuhaiba; |
2011 | 11 | Exploiting Channel Diversity In Secret Key Generation From Multipath Fading Randomness IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a key generation system based on low-density parity-check (LDPC) codes and describe the design and performance of two systems: one based on binary LDPC codes and the other (useful at higher signal-to-noise ratios) based on four-ary LDPC codes. |
Yanpei Liu; Stark C. Draper; Akbar M. Sayeed; |
2011 | 12 | Oblivious RAM Simulation With Efficient Worst-Case Access Overhead IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to de-amortize oblivious RAM simulations, so that each access takes a worst-case bounded amount of time. |
Michael T. Goodrich; Michael Mitzenmacher; Olga Ohrimenko; Roberto Tamassia; |
2011 | 13 | ANDaNA: Anonymous Named Data Networking Application IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. |
Steven DiBenedetto; Paolo Gasti; Gene Tsudik; Ersin Uzun; |
2011 | 14 | Differential Privacy: On The Trade-off Between Utility And Information Leakage IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of mutual information. |
Mário S. Alvim; Miguel E. Andrés; Konstantinos Chatzikokolakis; Pierpaolo Degano; Catuscia Palamidessi; |
2011 | 15 | DECENT: A Decentralized Architecture For Enforcing Privacy In Online Social Networks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. |
Sonia Jahid; Shirin Nilizadeh; Prateek Mittal; Nikita Borisov; Apu Kapadia; |
2011 | 16 | A Mechanism For Detection Of Gray Hole Attack In Mobile Ad Hoc Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. |
Jaydip Sen; M. Girish Chandra; Harihara S. G.; Harish Reddy; P. Balamuralidhar; |
2011 | 17 | Investigating The Distribution Of Password Choices IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we will look at the distribution with which passwords are chosen. |
David Malone; Kevin Maher; |
2011 | 18 | Lower Bounds In Differential Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate various lower bounds on the noise required to maintain different kind of privacy guarantees. |
Anindya De; |
2011 | 19 | Probabilistic Analysis Of Onion Routing In A Black-box Model IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We perform a probabilistic analysis of onion routing. |
Joan Feigenbaum; Aaron Johnson; Paul Syverson; |
2011 | 20 | Stealthy Traffic Analysis Of Low-Latency Anonymous Communication Using Throughput Fingerprinting IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show that doing this leaks information about the set of Tor relays in a circuit (path). |
Prateek Mittal; Ahmed Khurshid; Joshua Juen; Matthew Caesar; Nikita Borisov; |
2011 | 21 | Security Through Amnesia: A Software-Based Solution To The Cold Boot Attack On Disk Encryption IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Loop-Amnesia, a kernel-based disk encryption mechanism implementing a novel technique to eliminate vulnerability to the cold boot attack. |
Patrick Simmons; |
2011 | 22 | A Mechanism For Detection Of Cooperative Black Hole Attack In Mobile Ad Hoc Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. |
Jaydip Sen; Sripad Koilakonda; Arijit Ukil; |
2011 | 23 | Cooperative Secret Key Generation From Phase Estimation In Narrowband Fading Channels IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a novel cooperative key generation protocol is developed to facilitate high-rate key generation in narrowband fading channels, where two keying nodes extract the phase randomness of the fading channel with the aid of relay node(s). |
Qian Wang; Kaihe Xu; Kui Ren; |
2011 | 24 | Using Transcoding For Hidden Communication In IP Telephony IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). |
Wojciech Mazurczyk; Pawel Szaga; Krzysztof Szczypiorski; |
2011 | 25 | Efficient Detection Of Sybil Attack Based On Cryptography In Vanet IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. |
Mina Rahbari; Mohammad Ali Jabreil Jamali; |
2011 | 26 | Breaking A Chaotic Image Encryption Algorithm Based On Perceptron Model IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recently, a chaotic image encryption algorithm based on perceptron model was proposed. |
Yu Zhang; Chengqing Li; Qin Li; Dan Zhang; Shi Shu; |
2011 | 27 | Image Encryption Based On Diffusion And Multiple Chaotic Maps IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a new algorithm for the image encryption/decryption scheme. |
G. A. Sathishkumar; Dr. K. Bhoopathy bagan; Dr. N. Sriraam; |
2011 | 28 | Attack Prevention For Collaborative Spectrum Sensing In Cognitive Radio Networks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. |
Lingjie Duan; Alexander W. Min; Jianwei Huang; Kang G. Shin; |
2011 | 29 | The Identity Crisis. Security, Privacy And Usability Issues In Identity Management IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper brings them together in a single, comprehensive study and proposes recommendations to resolve or to mitigate the problems. |
Gergely Alpár; Jaap-Henk Hoepman; Johanneke Siljee; |
2011 | 30 | Steganography And Steganalysis: Different Approaches IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article we have tried to elucidate the different approaches towards implementation of steganography using ‘multimedia’ file (text, static image, audio and video) and Network IP datagram as cover. |
Soumyendu Das; Subhendu Das; Bijoy Bandyopadhyay; Sugata Sanyal; |
2010 | 1 | A Survey On Wireless Sensor Network Security IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper discusses the current state of the art in security mechanisms for WSNs. |
Jaydip Sen; |
2010 | 2 | EphPub: Toward Robust Ephemeral Publishing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose an efficient and robust protocol that builds on the Domain Name System (DNS) and its caching mechanism. |
Claude Castelluccia; Emiliano De Cristofaro; Aurelien Francillon; Mohamed-Ali Kaafar; |
2010 | 3 | New Comparative Study Between DES, 3DES And AES Within Nine Factors IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper a three algorithm of multimedia encryption schemes have been proposed in the literature and description. |
HAMDAN. O. ALANAZI et. al. |
2010 | 4 | Malware Classification Based On Call Graph Clustering IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. |
Joris Kinable; Orestis Kostakis; |
2010 | 5 | PhishDef: URL Names Say It All IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we take the following steps to identify phishing URLs. |
Anh Le; Athina Markopoulou; Michalis Faloutsos; |
2010 | 6 | Fingerprint Recognition Using Minutia Score Matching IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). |
Ravi. J; K. B. Raja; Venugopal. K. R; |
2010 | 7 | Plug-in Privacy For Smart Metering Billing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we describe the functional and privacy requirements, the specification and security proof of our solution and give a performance evaluation of a prototypical implementation. |
Marek Jawurek; Martin Johns; Florian Kerschbaum; |
2010 | 8 | Fighting Online Click-Fraud Using Bluff Ads IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this note we wish to raise the awareness of the networking research community on potential research areas within this emerging field. |
Hamed Haddadi; |
2010 | 9 | Stochastic Games For Security In Networks With Interdependent Nodes IF:4 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take … |
Kien C. Nguyen; Tansu Alpcan; Tamer Basar; |
2010 | 10 | A Comparison Between Memetic Algorithm And Genetic Algorithm For The Cryptanalysis Of Simplified Data Encryption Standard Algorithm IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a comparison between memetic algorithm and genetic algorithm were made in order to investigate the performance for the cryptanalysis on simplified data encryption standard problems(SDES). |
Poonam Garg; |
2010 | 11 | Overview: Main Fundamentals For Steganography IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main goals for this paper, to recognize the researchers for the main fundamentals of steganography. |
Zaidoon Kh. AL-Ani; A. A. Zaidan; B. B. Zaidan; Hamdan. O. Alanazi; |
2010 | 12 | Managing Delegation In Access Control Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we describe a new delegation approach for extended role-based access control models. |
Meriam Ben Ghorbel-Talbi; Frederic Cuppens; Nora Cuppens-Boulahia; Adel Bouhoula; |
2010 | 13 | SSMS – A Secure SMS Messaging Protocol For The M-payment Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the SMS messages to be used as a secure bearer in the m-payment systems. |
M. Toorani; A. A. Beheshti; |
2010 | 14 | Solutions To The GSM Security Weaknesses IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper briefly presents the most important security flaws of the GSM network and its transport channels. |
M. Toorani; A. A. Beheshti; |
2010 | 15 | Detecting DNS Tunnels Using Character Frequency Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domains in DNS queries and responses. |
Kenton Born; David Gustafson; |
2010 | 16 | Impossibility Of Differentially Private Universally Optimal Mechanisms IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: For the Bayesian case, we go further, and give a characterization of those functions that admit universally-optimal mechanisms, showing that a universally-optimal mechanism exists, essentially, only for a (single) count query. |
Hai Brenner; Kobbi Nissim; |
2010 | 17 | An LSB Data Hiding Technique Using Prime Numbers IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. |
Sandipan Dey; Ajith Abraham; Sugata Sanyal; |
2010 | 18 | Avoiding Black Hole And Cooperative Black Hole Attacks In Wireless Ad Hoc Networks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, after having specified the black hole attack, a secure mechanism, which consists in checking the good forwarding of packets by an intermediate node, was proposed. |
Abderrahmane Baadache; Ali Belmehdi; |
2010 | 19 | Universally Optimal Privacy Mechanisms For Minimax Agents IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a universal treatment of utility based on the standard minimax rule from decision theory (in contrast to the utility model in, which is Bayesian). |
Mangesh Gupte; Mukund Sundararajan; |
2010 | 20 | Proposed System For Data Hiding Using Cryptography And Steganography Proposed System For Data Hiding Using Cryptography And Steganography IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. |
Dipti Kapoor Sarmah; Neha Bajpai; |
2010 | 21 | Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. |
A. Jagadeesan; K. Duraiswamy; |
2010 | 22 | Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion Of Fingerprint And Iris IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. |
A. Jagadeesan; K. Duraiswamy; |
2010 | 23 | A Distributed K-Secure Sum Protocol For Secure Multi-Party Computations IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a novel protocol to compute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a middle party. |
Rashid Sheikh; Beerendra Kumar; Durgesh Kumar Mishra; |
2010 | 24 | Secure Iris Authentication Using Visual Cryptography IF:3 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a … |
P. S. Revenkar; Anisa Anjum; W. Z. Gandhare; |
2010 | 25 | A Survey Of RFID Authentication Protocols Based On Hash-Chain Method IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article is a survey to closely observe those protocols in terms of its focus and limitations. |
Irfan Syamsuddin; Tharam Dillon; Elizabeth Chang; Song Han; |
2010 | 26 | Botnet Detection By Monitoring Similar Communication Patterns IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Botnet has been defined as a group of bots that perform similar communication and malicious activity patterns within the same Botnet. |
Hossein Rouhani Zeidanloo; Azizah Bt Abdul Manaf; |
2010 | 27 | Quantitative Information Flow – Verification Hardness And Possibilities IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper investigates the hardness and possibilities of precisely checking and inferring quantitative information flow according to such definitions. |
Hirotoshi Yasuoka; Tachio Terauchi; |
2010 | 28 | An Elliptic Curve-based Signcryption Scheme With Forward Secrecy IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the traditional signature-then-encryption schemes. |
M. Toorani; A. A. Beheshti; |
2010 | 29 | LPKI – A Lightweight Public Key Infrastructure For The Mobile Environments IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main contribution of this paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the constrained platforms such as mobile phones. |
M. Toorani; A. A. Beheshti; |
2010 | 30 | Atomicity Improvement For Elliptic Curve Scalar Multiplication IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we address the problem of protecting elliptic curve scalar multiplication implementations against side-channel analysis by using the atomicity principle. |
Christophe Giraud; Vincent Verneuil; |