Most Influential ArXiv (Cryptography and Security) Papers (2025-09 Version)
The field of Cryptography and Security in arXiv covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly it includes material in ACM Subject Classes D.4.6 and E.3. Paper Digest Team analyzes all papers published in this field in the past years, and presents up to 30 most influential papers for each year. This ranking list is automatically constructed based upon citations from both research papers and granted patents, and will be frequently updated to reflect the most recent changes. To find the latest version of this list or the most influential papers from other conferences/journals, please visit Best Paper Digest page. Note: the most influential papers may or may not include the papers that won the best paper awards. (Version: 2025-09).
This list is created by the Paper Digest Team. Experience the cutting-edge capabilities of Paper Digest, an innovative AI-powered research platform that empowers you to read articles, write articles, get answers, conduct literature reviews and generate research reports.
Paper Digest Team
New York City, New York, 10017
team@paperdigest.org
TABLE 1: Most Influential ArXiv (Cryptography and Security) Papers (2025-09 Version)
| Year | Rank | Paper | Author(s) |
|---|---|---|---|
| 2025 | 1 | Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We analyze the security and privacy risks associated with each phase and propose strategies to mitigate potential threats. |
Xinyi Hou; Yanjie Zhao; Shenao Wang; Haoyu Wang; |
| 2025 | 2 | Conditional Cube Attack on Round-Reduced ASCON IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we generalize the conditional cube attack proposed by Huang\emph{et~al.}, and find new cubes depending on some key bit conditions for5/6-round reduced \textsc{Ascon}, and translate the previous theoretic 6-roundattack with $2^{66}$ time complexity to a practical one with $2^{40}$ timecomplexity. |
Zheng Li; Xiaoyang Dong; Xiaoyun Wang; |
| 2025 | 3 | A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Currently, existing surveys on LLM safety primarily focus on specific stages of the LLM lifecycle, e.g., deployment phase or fine-tuning phase, lacking a comprehensive understanding of the entire lifechain of LLMs. To address this gap, this paper introduces, for the first time, the concept of full-stack safety to systematically consider safety issues throughout the entire process of LLM training, deployment, and eventual commercialization. |
KUN WANG et. al. |
| 2025 | 4 | Leveraging 3D Technologies for Hardware Security: Opportunities and Challenges IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present: (i) a 3Darchitecture for shielding side-channel information; (ii) split fabricationusing active interposers; (iii) circuit camouflage on monolithic 3D IC, and(iv) 3D IC-based security processing-in-memory (PIM). |
PENG GU et. al. |
| 2025 | 5 | Rethinking Membership Inference Attacks Against Transfer Learning IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a new MIA vector against transfer learning, to determine whether a specific data point was used to train the teacher model while only accessing the student model in a white-box setting. |
CONG WU et. al. |
| 2025 | 6 | Safety Tax: Safety Alignment Makes Your Large Reasoning Models Less Reasonable IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We in this paper systematically examine a simplified pipeline for producing safety aligned LRMs. |
TIANSHENG HUANG et. al. |
| 2025 | 7 | GuardReasoner: Towards Reasoning-based LLM Safeguards IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper proposes GuardReasoner, a new safeguard for LLMs, by guiding the guard model to learn to reason. |
YUE LIU et. al. |
| 2025 | 8 | Defeating Prompt Injections By Design IF:3 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Large Language Models (LLMs) are increasingly deployed in agentic systemsthat interact with an untrusted environment. However, LLM agents are vulnerableto prompt injection attacks … |
EDOARDO DEBENEDETTI et. al. |
| 2025 | 9 | SmartBugBert: BERT-Enhanced Vulnerability Detection for Smart Contract Bytecode IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces SmartBugBert, a novel approach that combines BERT-based deep learning with control flow graph (CFG) analysis to detect vulnerabilities directly from bytecode. |
Jiuyang Bu; Wenkai Li; Zongwei Li; Zeng Zhang; Xiaoqi Li; |
| 2025 | 10 | Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper proposes a novel approach leveraging fine-tuned Large Language Models (LLMs) to enhance smart contract vulnerability detection. |
Jiuyang Bu; Wenkai Li; Zongwei Li; Zeng Zhang; Xiaoqi Li; |
| 2025 | 11 | CheatAgent: Attacking LLM-Empowered Recommender Systems Via LLM Agent IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: On the other hand, LLMs provide unprecedented opportunities to serve as attack agents to attack RecSys because of their impressive capability in simulating human-like decision-making processes. Therefore, in this paper, we propose a novel attack framework called CheatAgent by harnessing the human-like capabilities of LLMs, where an LLM-based agent is developed to attack LLM-Empowered RecSys. |
LIANG-BO NING et. al. |
| 2025 | 12 | SoK: Security Analysis of Blockchain-based Cryptocurrency IF:3 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Cryptocurrency is a novel exploration of a form of currency that proposes a decentralized electronic payment scheme based on blockchain technology and cryptographic theory. While … |
Zekai Liu; Xiaoqi Li; |
| 2025 | 13 | Optimisation of Cyber Insurance Coverage with Selection of Cost Effective Security Controls IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In other words, organisations need an investment strategy to decide the optimal amount of investments into cyber insurance and self-protection. In this work, we propose an approach to help a risk-averse organisation to distribute its cyber security investments in a cost-efficient way. |
Ganbayar Uuganbayar; Artsiom Yautsiukhin; Fabio Martinelli; Fabio Massacci; |
| 2024 | 1 | On Lattices, Learning with Errors, Random Linear Codes, and Cryptography IF:9 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Our main result is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the … |
Oded Regev; |
| 2024 | 2 | Secure Link State Routing for Mobile Ad Hoc Networks IF:7 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, … |
Panagiotis Papadimitratos; Zygmunt J. Haas; |
| 2024 | 3 | Secure Routing for Mobile Ad Hoc Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In particular, in MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we present a route discovery protocol that mitigates the detrimental effects of such malicious behavior, as to provide correct connectivity information. |
Panagiotis Papadimitratos; Zygmunt J. Haas; |
| 2024 | 4 | Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this way, we achieve 100% attack success rate — according to GPT-4 as a judge — on Vicuna-13B, Mistral-7B, Phi-3-Mini, Nemotron-4-340B, Llama-2-Chat-7B/13B/70B, Llama-3-Instruct-8B, Gemma-7B, GPT-3.5, GPT-4o, and R2D2 from HarmBench that was adversarially trained against the GCG attack. |
Maksym Andriushchenko; Francesco Croce; Nicolas Flammarion; |
| 2024 | 5 | A Review on Blockchain Technologies for An Advanced and Cyber-Resilient Automotive Industry IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: One of the latest technologies that can benefit the automotive industry is blockchain, which can enhance its data security, privacy, anonymity, traceability, accountability, integrity, robustness, transparency, trustworthiness and authentication, as well as provide long-term sustainability and a higher operational efficiency to the whole industry. This review analyzes the great potential of applying blockchain technologies to the automotive industry emphasizing its cybersecurity features. |
Paula Fraga-Lamas; Tiago M. Fernandez-Carames; |
| 2024 | 6 | Sleeper Agents: Training Deceptive LLMs That Persist Through Safety Training IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: If an AI system learned such a deceptive strategy, could we detect it and remove it using current state-of-the-art safety training techniques? To study this question, we construct proof-of-concept examples of deceptive behavior in large language models (LLMs). |
EVAN HUBINGER et. al. |
| 2024 | 7 | Safety Alignment Should Be Made More Than Just A Few Tokens Deep IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We refer to this issue as shallow safety alignment. In this paper, we present case studies to explain why shallow safety alignment can exist and provide evidence that current aligned LLMs are subject to this issue. |
XIANGYU QI et. al. |
| 2024 | 8 | JailbreakBench: An Open Robustness Benchmark for Jailbreaking Large Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: And third, numerous works are not reproducible, as they withhold adversarial prompts, involve closed-source code, or rely on evolving proprietary APIs. To address these challenges, we introduce JailbreakBench, an open-sourced benchmark with the following components: (1) an evolving repository of state-of-the-art adversarial prompts, which we refer to as jailbreak artifacts; (2) a jailbreaking dataset comprising 100 behaviors — both original and sourced from prior work (Zou et al., 2023; Mazeika et al., 2023, 2024) — which align with OpenAI’s usage policies; (3) a standardized evaluation framework at https://github.com/JailbreakBench/jailbreakbench that includes a clearly defined threat model, system prompts, chat templates, and scoring functions; and (4) a leaderboard at https://jailbreakbench.github.io/ that tracks the performance of attacks and defenses for various LLMs. |
PATRICK CHAO et. al. |
| 2024 | 9 | The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Today’s LLMs are susceptible to prompt injections, jailbreaks, and other attacks that allow adversaries to overwrite a model’s original instructions with their own malicious prompts. In this work, we argue that one of the primary vulnerabilities underlying these attacks is that LLMs often consider system prompts (e.g., text from an application developer) to be the same priority as text from untrusted users and third parties. |
ERIC WALLACE et. al. |
| 2024 | 10 | Jailbreak Attacks and Defenses Against Large Language Models: A Survey IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a comprehensive and detailed taxonomy of jailbreak attack and defense methods. |
SIBO YI et. al. |
| 2024 | 11 | SafeDecoding: Defending Against Jailbreak Attacks Via Safety-Aware Decoding IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we aim to defend LLMs against jailbreak attacks by introducing SafeDecoding, a safety-aware decoding strategy for LLMs to generate helpful and harmless responses to user queries. |
ZHANGCHEN XU et. al. |
| 2024 | 12 | Great, Now Write An Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a novel jailbreak attack called Crescendo. |
Mark Russinovich; Ahmed Salem; Ronen Eldan; |
| 2024 | 13 | JailBreakV: A Benchmark for Assessing The Robustness of MultiModal Large Language Models Against Jailbreak Attacks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we investigate an important and unexplored question of whether techniques that successfully jailbreak Large Language Models (LLMs) can be equally effective in jailbreaking MLLMs. |
Weidi Luo; Siyuan Ma; Xiaogeng Liu; Xiaoyu Guo; Chaowei Xiao; |
| 2024 | 14 | StruQ: Defending Against Prompt Injection with Structured Queries IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: These attacks rely on the LLM’s ability to follow instructions and inability to separate prompts and user data. We introduce structured queries, a general approach to tackle this problem. |
Sizhe Chen; Julien Piet; Chawin Sitawarin; David Wagner; |
| 2024 | 15 | Stealing Part of A Production Language Model IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI’s ChatGPT or Google’s PaLM-2. |
NICHOLAS CARLINI et. al. |
| 2024 | 16 | On Protecting The Data Privacy of Large Language Models (LLMs): A Survey IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Subsequently, we conduct an assessment of the privacy protection mechanisms employed by LLMs at various stages, followed by a detailed examination of their efficacy and constraints. |
BIWEI YAN et. al. |
| 2024 | 17 | AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present a novel method that uses another LLM, called AdvPrompter, to generate human-readable adversarial prompts in seconds. |
Anselm Paulus; Arman Zharmagambetov; Chuan Guo; Brandon Amos; Yuandong Tian; |
| 2024 | 18 | Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we take the first step to investigate one of the typical safety threats, backdoor attack, to LLM-based agents. |
WENKAI YANG et. al. |
| 2024 | 19 | A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we systematically analyze the security of LLM systems, instead of focusing on the individual LLMs. |
Fangzhou Wu; Ning Zhang; Somesh Jha; Patrick McDaniel; Chaowei Xiao; |
| 2024 | 20 | Adaptive Artificial Immune Networks for Mitigating DoS Flooding Attacks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In order to contribute to their development, in this paper, the use of artificial immune systems to mitigate denial of service attacks is proposed. |
Jorge Maestre Vidal; Ana Lucila Sandoval Orozco; Luis Javier García Villalba; |
| 2024 | 21 | LLM Agents Can Autonomously Exploit One-day Vulnerabilities IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we show that LLM agents can autonomously exploit one-day vulnerabilities in real-world systems. |
Richard Fang; Rohan Bindu; Akul Gupta; Daniel Kang; |
| 2024 | 22 | Optimization-based Prompt Injection Attack to LLM-as-a-Judge IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose JudgeDeceiver,an optimization-based prompt injection attack to LLM-as-a-Judge. |
JIAWEN SHI et. al. |
| 2024 | 23 | AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This survey delves into the emerging security threats faced by AI agents, categorizing them into four critical knowledge gaps: unpredictability of multi-step user inputs, complexity in internal executions, variability of operational environments, and interactions with untrusted external entities. By systematically reviewing these threats, this paper highlights both the progress made and the existing limitations in safeguarding AI agents. |
ZEHANG DENG et. al. |
| 2024 | 24 | Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries Via Disguise and Reconstruction IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Attackers can craft adversarial prompts that induce harmful responses from LLMs. In this work, we pioneer a theoretical foundation in LLMs security by identifying bias vulnerabilities within the safety fine-tuning and design a black-box jailbreak method named DRA (Disguise and Reconstruction Attack), which conceals harmful instructions through disguise and prompts the model to reconstruct the original harmful instruction within its completion. |
TONG LIU et. al. |
| 2024 | 25 | AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack Via Adaptive Shield Prompting IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, with the integration of additional modalities, MLLMs are exposed to new vulnerabilities, rendering them prone to structured-based jailbreak attacks, where semantic content (e.g., harmful text) has been injected into the images to mislead MLLMs. In this work, we aim to defend against such threats. |
Yu Wang; Xiaogeng Liu; Yu Li; Muhao Chen; Chaowei Xiao; |
| 2024 | 26 | BadEdit: Backdooring Large Language Models By Model Editing IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Mainstream backdoor attack methods typically demand substantial tuning data for poisoning, limiting their practicality and potentially degrading the overall performance when applied to Large Language Models (LLMs). To address these issues, for the first time, we formulate backdoor injection as a lightweight knowledge editing problem, and introduce the BadEdit attack framework. |
YANZHOU LI et. al. |
| 2024 | 27 | LLM Agents Can Autonomously Hack Websites IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we show that LLM agents can autonomously hack websites, performing tasks as complex as blind database schema extraction and SQL injections without human feedback. |
Richard Fang; Rohan Bindu; Akul Gupta; Qiusi Zhan; Daniel Kang; |
| 2024 | 28 | AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This shift may transform organizational attacks from rare, expert-led events to frequent, automated operations requiring no expertise and executed at automation speed and scale. This risks fundamentally changing global computer security and correspondingly causing substantial economic impacts, and a goal of this work is to better understand these risks now so we can better prepare for these inevitable ever-more-capable LLMs on the horizon. |
JIACEN XU et. al. |
| 2024 | 29 | DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce an automatic prompt \textbf{D}ecomposition and \textbf{R}econstruction framework for jailbreak \textbf{Attack} (DrAttack). |
Xirui Li; Ruochen Wang; Minhao Cheng; Tianyi Zhou; Cho-Jui Hsieh; |
| 2024 | 30 | When LLMs Meet Cybersecurity: A Systematic Literature Review IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Our comprehensive overview addresses three key research questions: the construction of cybersecurity-oriented LLMs, the application of LLMs to various cybersecurity tasks, the challenges and further research in this area. This study aims to shed light on the extensive potential of LLMs in enhancing cybersecurity practices and serve as a valuable resource for applying LLMs in this field. |
JIE ZHANG et. al. |
| 2023 | 1 | Extracting Training Data from Diffusion Models IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted significant attention due to their ability to generate high-quality synthetic images. In this work, we show that diffusion models memorize individual images from their training data and emit them at generation time. |
NICHOLAS CARLINI et. al. |
| 2023 | 2 | A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper explores the intersection of LLMs with security and privacy. |
YIFAN YAO et. al. |
| 2023 | 3 | Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To solve the RowHammer problem, our paper examined seven different approaches (including a novel probabilistic approach that has very low cost), some of which influenced or were adopted in different industrial products. |
Onur Mutlu; |
| 2023 | 4 | Not What You’ve Signed Up For: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Despite the increasing integration and reliance on LLMs, effective mitigations of these emerging threats are currently lacking. By raising awareness of these vulnerabilities and providing key insights into their implications, we aim to promote the safe and responsible deployment of these powerful models and the development of robust defenses that protect users and systems from potential attacks. |
KAI GRESHAKE et. al. |
| 2023 | 5 | From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The work presents the vulnerabilities of ChatGPT, which can be exploited by malicious users to exfiltrate malicious information bypassing the ethical constraints on the model. |
Maanak Gupta; CharanKumar Akiri; Kshitiz Aryal; Eli Parker; Lopamudra Praharaj; |
| 2023 | 6 | Prompt Injection Attack Against LLM-integrated Applications IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Initially, we conduct an exploratory analysis on ten commercial applications, highlighting the constraints of current attack strategies in practice. Prompted by these limitations, we subsequently formulate HouYi, a novel black-box prompt injection attack technique, which draws inspiration from traditional web injection attacks. |
YI LIU et. al. |
| 2023 | 7 | Do Anything Now: Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, employing our new framework JailbreakHub, we conduct a comprehensive analysis of 1,405 jailbreak prompts spanning from December 2022 to December 2023. |
Xinyue Shen; Zeyuan Chen; Michael Backes; Yun Shen; Yang Zhang; |
| 2023 | 8 | Machine Learning Based Intrusion Detection Systems for IoT Applications IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate the prospects of using machine learning classification algorithms for securing IoT against DoS attacks. |
Abhishek Verma; Virender Ranga; |
| 2023 | 9 | Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models. |
DANIEL KANG et. al. |
| 2023 | 10 | Poisoning Web-Scale Training Datasets Is Practical IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model’s performance. |
NICHOLAS CARLINI et. al. |
| 2023 | 11 | Unveiling Security, Privacy, and Ethical Concerns of ChatGPT IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: By exploring the upgrade path from GPT-1 to GPT-4, discussing the model’s features, limitations, and potential applications, this study aims to shed light on the potential risks of integrating ChatGPT into our daily lives. |
Xiaodong Wu; Ran Duan; Jianbing Ni; |
| 2023 | 12 | Glaze: Protecting Artists from Style Mimicry By Text-to-Image Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply style cloaks to their art before sharing online. |
SHAWN SHAN et. al. |
| 2023 | 13 | Information Leakage from Optical Emanations IF:5 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a … |
Joe Loughry; David A. Umphress; |
| 2023 | 14 | Visual Adversarial Examples Jailbreak Aligned Large Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As an illustration, we present a case study in which we exploit visual adversarial examples to circumvent the safety guardrail of aligned LLMs with integrated vision. |
XIANGYU QI et. al. |
| 2023 | 15 | FigStep: Jailbreaking Large Vision-Language Models Via Typographic Visual Prompts IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose FigStep, a straightforward yet effective black-box jailbreak algorithm against LVLMs. |
YICHEN GONG et. al. |
| 2023 | 16 | DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose and release a new vulnerable source code dataset. |
Yizheng Chen; Zhoujie Ding; Lamya Alowain; Xinyun Chen; David Wagner; |
| 2023 | 17 | Jailbreak in Pieces: Compositional Adversarial Attacks on Multi-Modal Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce new jailbreak attacks on vision language models (VLMs), which use aligned LLMs and are resilient to text-only jailbreak attacks. |
Erfan Shayegani; Yue Dong; Nael Abu-Ghazaleh; |
| 2023 | 18 | Large Language Models for Code: Security Hardening and Adversarial Testing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: The task is parametric and takes as input a binary property to guide the LM to generate secure or unsafe code, while preserving the LM’s capability of generating functionally correct code. We propose a novel learning-based approach called SVEN to solve this task. |
Jingxuan He; Martin Vechev; |
| 2023 | 19 | A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To this end, this paper presents an in-depth review of the IoDT with respect to system architecture, enabling technologies, and security/privacy issues. |
YUNTAO WANG et. al. |
| 2023 | 20 | ProPILE: Probing Privacy Leakage in Large Language Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents ProPILE, a novel probing tool designed to empower data subjects, or the owners of the PII, with awareness of potential PII leakage in LLM-based services. |
SIWON KIM et. al. |
| 2023 | 21 | MGTBench: Benchmarking Machine-Generated Text Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Furthermore, it remains unclear how existing detection methods would perform against powerful LLMs. In this paper, we fill this gap by proposing the first benchmark framework for MGT detection against powerful LLMs, named MGTBench. |
Xinlei He; Xinyue Shen; Zeyuan Chen; Michael Backes; Yang Zhang; |
| 2023 | 22 | Formalizing and Benchmarking Prompt Injection Attacks and Defenses IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In particular, we propose a framework to formalize prompt injection attacks. |
Yupei Liu; Yuqi Jia; Runpeng Geng; Jinyuan Jia; Neil Zhenqiang Gong; |
| 2023 | 23 | How Secure Is Code Generated By ChatGPT? IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, the safety of programs generated by ChatGPT should not be overlooked. In this paper, we perform an experiment to address this issue. |
Raphaël Khoury; Anderson R. Avila; Jacob Brunelle; Baba Mamadou Camara; |
| 2023 | 24 | SCALE-UP: An Efficient Black-box Input-level Backdoor Detection Via Analyzing Scaled Prediction Consistency IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, almost all of them cannot be adopted in MLaaS scenarios since they require getting access to or even modifying the suspicious models. In this paper, we propose a simple yet effective black-box input-level backdoor detection, called SCALE-UP, which requires only the predicted labels to alleviate this problem. |
JUNFENG GUO et. al. |
| 2023 | 25 | GPTScan: Detecting Logic Vulnerabilities in Smart Contracts By Combining GPT with Program Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose GPTScan, the first tool combining GPT with static analysis for smart contract logic vulnerability detection. |
YUQIANG SUN et. al. |
| 2023 | 26 | Revolutionizing Cyber Threat Detection with Large Language Models: A Privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents SecurityBERT, a novel architecture that leverages the Bidirectional Encoder Representations from Transformers (BERT) model for cyber threat detection in IoT networks. |
MOHAMED AMINE FERRAG et. al. |
| 2023 | 27 | On The Exploitability of Instruction Tuning IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we investigate how an adversary can exploit instruction tuning by injecting specific instruction-following examples into the training data that intentionally changes the model’s behavior. |
MANLI SHU et. al. |
| 2023 | 28 | An LLM Can Fool Itself: A Prompt-Based Adversarial Attack IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper proposes an efficient tool to audit the LLM’s adversarial robustness via a prompt-based adversarial attack (PromptAttack). |
XILIE XU et. al. |
| 2023 | 29 | MMA-Diffusion: MultiModal Attack on Diffusion Models IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Our work introduces MMA-Diffusion, a framework that presents a significant and realistic threat to the security of T2I models by effectively circumventing current defensive measures in both open-source models and commercial online services. |
YIJUN YANG et. al. |
| 2023 | 30 | Protecting Language Generation Models Via Invisible Watermarking IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, these methods can be nullified by obvious countermeasures such as synonym randomization. To address this issue, we propose GINSEW, a novel method to protect text generation models from being stolen through distillation. |
Xuandong Zhao; Yu-Xiang Wang; Lei Li; |
| 2022 | 1 | A Survey on Metaverse: Fundamentals, Security, and Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. |
YUNTAO WANG et. al. |
| 2022 | 2 | Deduplicating Training Data Mitigates Privacy Risks in Language Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Past work has shown that large language models are susceptible to privacy attacks, where adversaries generate sequences from a trained model and detect which sequences are memorized from the training set. In this work, we show that the success of these attacks is largely due to duplication in commonly used web-scraped training sets. |
Nikhil Kandpal; Eric Wallace; Colin Raffel; |
| 2022 | 3 | ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper,we propose a new traffic representation model called Encrypted Traffic Bidirectional Encoder Representations from Transformer (ET-BERT), which pre-trains deep contextualized datagram-level representation from large-scale unlabeled data. |
XINJIE LIN et. al. |
| 2022 | 4 | FLDetector: Defending Federated Learning Against Model Poisoning Attacks Via Detecting Malicious Clients IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Our FLDetector addresses this challenge via detecting malicious clients. FLDetector aims to detect and remove the majority of the malicious clients such that a Byzantine-robust FL method can learn an accurate global model using the remaining clients. |
Zaixi Zhang; Xiaoyu Cao; Jinyuan Jia; Neil Zhenqiang Gong; |
| 2022 | 5 | Survey on Federated Learning Threats: Concepts, Taxonomy on Attacks and Defences, Experimental Study and Challenges IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an extensive review of the threats of federated learning, as well as as their corresponding countermeasures, attacks versus defences. |
Nuria Rodríguez-Barroso; Daniel Jiménez López; M. Victoria Luzón; Francisco Herrera; Eugenio Martínez-Cámara; |
| 2022 | 6 | Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Inspired by federated learning, a FDIA detection method based on secure federated deep learning is proposed in this paper by combining Transformer, federated learning and Paillier cryptosystem. |
Yang Li; Xinhao Wei; Yuanzheng Li; Zhaoyang Dong; Mohammad Shahidehpour; |
| 2022 | 7 | Bullshark: DAG BFT Protocols Made Practical IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Bullshark, the first directed acyclic graph (DAG) based asynchronous Byzantine Atomic Broadcast protocol that is optimized for the common synchronous case. |
Alexander Spiegelman; Neil Giridharan; Alberto Sonnino; Lefteris Kokoris-Kogias; |
| 2022 | 8 | Do Users Write More Insecure Code with AI Assistants? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. |
Neil Perry; Megha Srivastava; Deepak Kumar; Dan Boneh; |
| 2022 | 9 | Federated Learning from Pre-Trained Models: A Contrastive Learning Approach IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: However, excessive computation and communication demands pose challenges to current FL frameworks, especially when training large-scale models. To prevent these issues from hindering the deployment of FL systems, we propose a lightweight framework where clients jointly learn to fuse the representations generated by multiple fixed pre-trained models rather than training a large-scale model from scratch. |
YUE TAN et. al. |
| 2022 | 10 | Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: With poisoning equal to or less than 0.5% of the target-class data and 0.05% of the training set, we can train a model to classify test examples from arbitrary classes into the target class when the examples are patched with a backdoor trigger. |
YI ZENG et. al. |
| 2022 | 11 | LineVD: Statement-level Vulnerability Detection Using Graph Neural Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a novel deep learning framework, LineVD, which formulates statement-level vulnerability detection as a node classification task. |
David Hin; Andrey Kan; Huaming Chen; M. Ali Babar; |
| 2022 | 12 | Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. |
Zhibo Zhang; Hussam Al Hamadi; Ernesto Damiani; Chan Yeob Yeun; Fatma Taher; |
| 2022 | 13 | Reconstructing Training Data with Informed Adversaries IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: For more general models (e.g. neural networks), we propose an attack strategy based on training a reconstructor network that receives as input the weights of the model under attack and produces as output the target data point. |
Borja Balle; Giovanni Cherubin; Jamie Hayes; |
| 2022 | 14 | Metaverse: Security and Privacy Issues IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide several contributions. We start by analysing the foundations of the metaverse, later we focus on the novel privacy and security issues introduced by this new paradigm, and finally we broaden the scope of the contribution highlighting some of the far-reaching yet logical implications of the metaverse on a number of domains, not all of them in tech. |
Roberto Di Pietro; Stefano Cresci; |
| 2022 | 15 | DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To address this problem, we propose DeepSight, a novel model filtering approach for mitigating backdoor attacks. |
Phillip Rieger; Thien Duc Nguyen; Markus Miettinen; Ahmad-Reza Sadeghi; |
| 2022 | 16 | A Dependable Hybrid Machine Learning Model for Network Intrusion Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this research, we propose a new hybrid model that combines machine learning and deep learning to increase detection rates while securing dependability. |
MD. ALAMIN TALUKDER et. al. |
| 2022 | 17 | The Right to Be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate the problem of machine unlearning in FL systems. |
Yi Liu; Lei Xu; Xingliang Yuan; Cong Wang; Bo Li; |
| 2022 | 18 | DE-FAKE: Detection and Attribution of Fake Images Generated By Text-to-Image Generation Models IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We conduct extensive experiments on four popular text-to-image generation models, including DALL$\cdot$E 2, Stable Diffusion, GLIDE, and Latent Diffusion, and two benchmark prompt-image datasets. |
Zeyang Sha; Zheng Li; Ning Yu; Yang Zhang; |
| 2022 | 19 | The Role of Machine Learning in Cybersecurity IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Our contributions are complemented with two real case studies describing industrial applications of ML as defense against cyber-threats. |
GIOVANNI APRUZZESE et. al. |
| 2022 | 20 | ZkBridge: Trustless Cross-chain Bridges Made Practical IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce zkBridge, an efficient cross-chain bridge that guarantees strong security without external trust assumptions. |
TIANCHENG XIE et. al. |
| 2022 | 21 | Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we use Federated Learning (FL) to build a threat hunting framework called Block Hunter to automatically hunt for attacks in blockchain-based IIoT networks. |
ABBAS YAZDINEJAD et. al. |
| 2022 | 22 | A Survey of Layer-Two Blockchain Protocols IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: However, rapid and discrete developments have resulted in diverse branches of Layer-2 protocols. In this work, we systematically create a broad taxonomy of such protocols and implementations. |
Ankit Gangwal; Haripriya Ravali Gangavalli; Apoorva Thirupathi; |
| 2022 | 23 | MPAF: Model Poisoning Attacks to Federated Learning Based on Fake Clients IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose the first Model Poisoning Attack based on Fake clients called MPAF. |
Xiaoyu Cao; Neil Zhenqiang Gong; |
| 2022 | 24 | Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a new class of attacks on machine learning models. |
FLORIAN TRAMÈR et. al. |
| 2022 | 25 | Biometric Security Technology IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents an overview of the main topics related to biometric security technology, with the main purpose to provide a primer on this subject. |
Marcos Faundez-Zanuy; |
| 2022 | 26 | Privacy for Free: How Does Dataset Condensation Help Privacy? IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we for the first time identify that dataset condensation (DC) which is originally designed for improving training efficiency is also a better solution to replace the traditional data generators for private data generation, thus providing privacy for free. |
Tian Dong; Bo Zhao; Lingjuan Lyu; |
| 2022 | 27 | VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper presents VulBERTa, a deep learning approach to detect security vulnerabilities in source code. |
Hazim Hanif; Sergio Maffeis; |
| 2022 | 28 | Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we revisit dataset ownership verification. |
YIMING LI et. al. |
| 2022 | 29 | Membership Inference Attacks By Exploiting Loss Trajectory IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As a result, in practical scenarios where both the member and non-member samples yield similarly small losses, these methods are naturally unable to differentiate between them. To address this limitation, in this paper, we propose a new attack method, called \system, which can exploit the membership information from the whole training process of the target model for improving the attack performance. |
Yiyong Liu; Zhengyu Zhao; Michael Backes; Yang Zhang; |
| 2022 | 30 | THE-X: Privacy-Preserving Transformer Inference with Homomorphic Encryption IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we introduce $\textit{THE-X}$, an approximation approach for transformers, which enables privacy-preserving inference of pre-trained models developed by popular frameworks. |
TIANYU CHEN et. al. |
| 2021 | 1 | The Queen’s Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Specifically, we show that an attacker can abuse platform-provided APIs to evade access controls without leaving any traces. |
Fahad Shaon; Sazzadur Rahaman; Murat Kantarcioglu; |
| 2021 | 2 | The Inductive Approach to Verifying Cryptographic Protocols IF:8 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with … |
Lawrence C. Paulson; |
| 2021 | 3 | Membership Inference Attacks From First Principles IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: A membership inference attack allows an adversary to query a trained machine learning model to predict whether or not a particular example was contained in the model’s training dataset. |
NICHOLAS CARLINI et. al. |
| 2021 | 4 | Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this technical report, we explore the NFT ecosystems in several aspects. |
Qin Wang; Rujia Li; Qi Wang; Shiping Chen; |
| 2021 | 5 | Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article presents an overview of the fundamental concepts and explores the opportunities of FLchain in MEC networks. |
DINH C. NGUYEN et. al. |
| 2021 | 6 | Jamming Attacks And Anti-Jamming Strategies In Wireless Networks: A Comprehensive Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article surveys existing jamming attacks and anti-jamming strategies in wireless local area networks (WLANs), cellular networks, cognitive radio networks (CRNs), ZigBee networks, Bluetooth networks, vehicular networks, LoRa networks, RFID networks, and GPS system, with the objective of offering a comprehensive knowledge landscape of existing jamming/anti-jamming strategies and stimulating more research efforts to secure wireless networks against jamming attacks. |
Hossein Pirayesh; Huacheng Zeng; |
| 2021 | 7 | Deepfakes Generation and Detection: State-of-the-art, Open Challenges, Countermeasures, and Way Forward IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper provides a comprehensive review and detailed analysis of existing tools and machine learning (ML) based approaches for deepfake generation and the methodologies used to detect such manipulations for both audio and visual deepfakes. |
Momina Masood; Marriam Nawaz; Khalid Mahmood Malik; Ali Javed; Aun Irtaza; |
| 2021 | 8 | Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This survey provides a systematic overview of security and privacy issues based on prospective technologies for 6G in the physical, connection, and service layers, as well as through lessons learned from the failures of existing security architectures and state-of-the-art defenses. |
Van-Linh Nguyen; Po-Ching Lin; Bo-Chao Cheng; Ren-Hung Hwang; Ying-Dar Lin; |
| 2021 | 9 | Evaluating Gradient Inversion Attacks and Defenses in Federated Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We find that some attacks make strong assumptions about the setup. |
Yangsibo Huang; Samyak Gupta; Zhao Song; Kai Li; Sanjeev Arora; |
| 2021 | 10 | SoK: Decentralized Finance (DeFi) IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We provide a distinction between technical security, which has a healthy literature, and economic security, which is largely unexplored, connecting the latter with new models and thereby synthesizing insights from computer science, economics and finance. |
SAM M. WERNER et. al. |
| 2021 | 11 | Federated Learning for Malware Detection in IoT Devices IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. |
Valerian Rey; Pedro Miguel Sánchez Sánchez; Alberto Huertas Celdrán; Gérôme Bovet; Martin Jaggi; |
| 2021 | 12 | Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose separating the task of reliable transaction dissemination from transaction ordering, to enable high-performance Byzantine fault-tolerant quorum-based consensus. |
George Danezis; Eleftherios Kokoris Kogias; Alberto Sonnino; Alexander Spiegelman; |
| 2021 | 13 | Quantifying Blockchain Extractable Value: How Dark Is The Forest? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we allow to quantify the BEV danger by deriving the USD extracted from sandwich attacks, liquidations, and decentralized exchange arbitrage. |
Kaihua Qin; Liyi Zhou; Arthur Gervais; |
| 2021 | 14 | PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning. |
FAN MO et. al. |
| 2021 | 15 | Vulnerability Detection with Fine-grained Interpretations IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present IVDetect an interpretable vulnerability detector with the philosophy of using Artificial Intelligence (AI) to detect vulnerabilities, while using Intelligence Assistant (IA) via providing VD interpretations in terms of vulnerable statements. |
Yi Li; Shaohua Wang; Tien N. Nguyen; |
| 2021 | 16 | LogBERT: Log Anomaly Detection Via BERT IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose LogBERT, a self-supervised framework for log anomaly detection based on Bidirectional Encoder Representations from Transformers (BERT). |
Haixuan Guo; Shuhan Yuan; Xintao Wu; |
| 2021 | 17 | Invisible for Both Camera and LiDAR: Security of Multi-Sensor Fusion Based Perception in Autonomous Driving Under Physical-World Attacks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a novel attack pipeline that addresses two main design challenges: (1) non-differentiable target camera and LiDAR sensing systems, and (2) non-differentiable cell-level aggregated features popularly used in LiDAR-based AD perception. |
YULONG CAO* et. al. |
| 2021 | 18 | Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we explore using graph neural networks and expert knowledge for smart contract vulnerability detection. |
ZHENGUANG LIU et. al. |
| 2021 | 19 | Examining Zero-Shot Vulnerability Repair with Large Language Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Can emerging ‘smart’ code completion tools help repair those bugs? In this work, we examine the use of large language models (LLMs) for code (such as OpenAI’s Codex and AI21’s Jurassic J-1) for zero-shot vulnerability repair. |
Hammond Pearce; Benjamin Tan; Baleegh Ahmad; Ramesh Karri; Brendan Dolan-Gavitt; |
| 2021 | 20 | Challenges and Opportunities in Securing The Industrial Internet of Things IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we identify the unique security goals and challenges of the Industrial Internet of Things, which, unlike consumer deployments, mainly follow from safety and productivity requirements. |
Martin Serror; Sacha Hack; Martin Henze; Marko Schuba; Klaus Wehrle; |
| 2021 | 21 | Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies Within Cyber Threat Intelligence IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This research evaluates existing cyber-threat-intelligence-relevant ontologies, sharing standards, and taxonomies for the purpose of measuring their high-level conceptual expressivity with regards to the who, what, why, where, when, and how elements of an adversarial attack in addition to courses of action and technical indicators. |
Vasileios Mavroeidis; Siri Bromander; |
| 2021 | 22 | Practical and Private (Deep) Learning Without Sampling or Shuffling IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We consider training models with differential privacy (DP) using mini-batch gradients. |
PETER KAIROUZ et. al. |
| 2021 | 23 | A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In order to fill this gap and motivate further research, in this paper, we present a comprehensive survey on ransomware and ransomware defense research with respect to PCs/workstations, mobile devices, and IoT/CPS platforms. |
Harun Oz; Ahmet Aris; Albert Levi; A. Selcuk Uluagac; |
| 2021 | 24 | CryptGPU: Fast Privacy-Preserving Machine Learning on The GPU IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we start by introducing a new interface to losslessly embed cryptographic operations over secret-shared values (in a discrete domain) into floating-point operations that can be processed by highly-optimized CUDA kernels for linear algebra. |
Sijun Tan; Brian Knott; Yuan Tian; David J. Wu; |
| 2021 | 25 | Blockchain and AI-based Solutions to Combat Coronavirus (COVID-19)-like Epidemics: A Survey IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Therefore, we present an extensive survey on the use of blockchain and AI for combating COVID-19 epidemics. |
Dinh C. Nguyen; Ming Ding; Pubudu N. Pathirana; Aruna Seneviratne; |
| 2021 | 26 | Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a comprehensive overview of the CPS security landscape with emphasis on CPES. |
Ioannis Zografopoulos; Juan Ospina; XiaoRui Liu; Charalambos Konstantinou; |
| 2021 | 27 | Realtime Robust Malicious Traffic Detection Via Frequency Domain Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To this end, we propose Whisper, a realtime ML based malicious traffic detection system that achieves both high accuracy and high throughput by utilizing frequency domain features. |
Chuanpu Fu; Qi Li; Meng Shen; Ke Xu; |
| 2021 | 28 | BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose BadEncoder, the first backdoor attack to self-supervised learning. |
Jinyuan Jia; Yupei Liu; Neil Zhenqiang Gong; |
| 2021 | 29 | Understanding Security Issues in The NFT Ecosystem IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we first present a systematic overview of how the NFT ecosystem works, and we identify three major actors: marketplaces, external entities, and users. We perform an in-depth analysis of the top 8 marketplaces (ranked by transaction volume) to discover potential issues associated with such marketplaces. |
Dipanjan Das; Priyanka Bose; Nicola Ruaro; Christopher Kruegel; Giovanni Vigna; |
| 2021 | 30 | BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In particular, we propose BTS – Bootstrappable, Technologydriven, Secure accelerator architecture for FHE. |
SANGPYO KIM et. al. |
| 2020 | 1 | Extracting Training Data from Large Language Models IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We demonstrate our attack on GPT-2, a language model trained on scrapes of the public Internet, and are able to extract hundreds of verbatim text sequences from the model’s training data. |
NICHOLAS CARLINI et. al. |
| 2020 | 2 | FLTrust: Byzantine-robust Federated Learning Via Trust Bootstrapping IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we bridge the gap via proposing FLTrust, a new federated learning method in which the service provider itself bootstraps trust. |
Xiaoyu Cao; Minghong Fang; Jia Liu; Neil Zhenqiang Gong; |
| 2020 | 3 | Backdoor Learning: A Survey IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the first comprehensive survey of this realm. |
Yiming Li; Yong Jiang; Zhifeng Li; Shu-Tao Xia; |
| 2020 | 4 | Label-Only Membership Inference Attacks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we introduce label-only membership inference attacks. |
Christopher A. Choquette-Choo; Florian Tramer; Nicholas Carlini; Nicolas Papernot; |
| 2020 | 5 | Invisible Backdoor Attack with Sample-Specific Triggers IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we explore a novel attack paradigm, where backdoor triggers are sample-specific. |
YUEZUN LI et. al. |
| 2020 | 6 | A Survey Of COVID-19 Contact Tracing Apps IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we provide the first comprehensive review of these much-discussed tracing app attributes. |
NADEEM AHMED et. al. |
| 2020 | 7 | Threats To Federated Learning: A Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we bridge this important gap in FL literature. |
Lingjuan Lyu; Han Yu; Qiang Yang; |
| 2020 | 8 | Contact Tracing Mobile Apps For COVID-19: Privacy Considerations And Related Trade-offs IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Here, we analyze some of those implications and discuss ways of ameliorating the privacy concerns without decreasing usefulness to public health. |
Hyunghoon Cho; Daphne Ippolito; Yun William Yu; |
| 2020 | 9 | Input-Aware Dynamic Backdoor Attack IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose a novel backdoor attack technique in which the triggers vary from input to input. |
Anh Nguyen; Anh Tran; |
| 2020 | 10 | Cyber Security In The Age Of COVID-19: A Timeline And Analysis Of Cyber-Crime And Cyber-Attacks During The Pandemic IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. |
HARJINDER SINGH LALLIE et. al. |
| 2020 | 11 | A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we provide a comprehensive survey on blockchain for big data, focusing on up-to-date approaches, opportunities, and future directions. |
NATARAJAN DEEPA et. al. |
| 2020 | 12 | Privacy and Robustness in Federated Learning: Attacks and Defenses IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct the first comprehensive survey on this topic. |
LINGJUAN LYU et. al. |
| 2020 | 13 | Systematic Evaluation Of Privacy Risks Of Machine Learning Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we show that prior work on membership inference attacks may severely underestimate the privacy risks by relying solely on training custom neural network classifiers to perform attacks and focusing only on the aggregate results over data samples, such as the attack accuracy. We also propose benchmarks for defense mechanisms by accounting for adaptive adversaries with knowledge of the defense and also accounting for the trade-off between model accuracy and privacy risks. |
Liwei Song; Prateek Mittal; |
| 2020 | 14 | CrypTFlow2: Practical 2-Party Secure Inference IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation. |
DEEVASHWER RATHEE et. al. |
| 2020 | 15 | Machine Learning Based Solutions For Security Of Internet Of Things (IoT): A Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey paper, the architecture of IoT is discussed, following a comprehensive literature review on ML approaches the importance of security of IoT in terms of different types of possible attacks. |
Syeda Manjia Tahsien; Hadis Karimipour; Petros Spachos; |
| 2020 | 16 | Blind Backdoors in Deep Learning Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We investigate a new method for injecting backdoors into machine learning models, based on compromising the loss-value computation in the model-training code. |
Eugene Bagdasaryan; Vitaly Shmatikov; |
| 2020 | 17 | FALCON: Honest-Majority Maliciously Secure Framework For Private Deep Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. |
SAMEER WAGH et. al. |
| 2020 | 18 | UNICORN: Runtime Provenance-Based Detector For Advanced Persistent Threats IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. |
Xueyuan Han; Thomas Pasquier; Adam Bates; James Mickens; Margo Seltzer; |
| 2020 | 19 | Dynamic Backdoor Attacks Against Machine Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose the first class of dynamic backdooring techniques against deep neural networks (DNN), namely Random Backdoor, Backdoor Generating Network (BaN), and conditional Backdoor Generating Network (c-BaN). |
Ahmed Salem; Rui Wen; Michael Backes; Shiqing Ma; Yang Zhang; |
| 2020 | 20 | Blockchain For The Internet Of Vehicles Towards Intelligent Transportation Systems: A Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a contemporary survey on the latest advancement in blockchain for IoV. |
MUHAMMAD BAQER MOLLAH et. al. |
| 2020 | 21 | Privacy Preservation in Federated Learning: An Insightful Survey from The GDPR Perspective IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Conventionally, data is collected and aggregated in a data centre on which machine learning models are trained. |
Nguyen Truong; Kai Sun; Siyao Wang; Florian Guitton; Yike Guo; |
| 2020 | 22 | LUCID: A Practical, Lightweight Deep Learning Solution For DDoS Attack Detection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present a practical, lightweight deep learning DDoS detection system called LUCID, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign. |
Roberto Doriguzzi-Corin; Stuart Millar; Sandra Scott-Hayward; Jesus Martinez-del-Rincon; Domenico Siracusa; |
| 2020 | 23 | Auditing Differentially Private Machine Learning: How Private Is Private SGD? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: More generally, our work takes a quantitative, empirical approach to understanding the privacy afforded by specific implementations of differentially private algorithms that we believe has the potential to complement and influence analytical work on differential privacy. |
Matthew Jagielski; Jonathan Ullman; Alina Oprea; |
| 2020 | 24 | Byzantine-Resilient Secure Federated Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Towards addressing this challenge, this paper presents the first single-server Byzantine-resilient secure aggregation framework (BREA) for secure federated learning. |
Jinhyun So; Basak Guler; A. Salman Avestimehr; |
| 2020 | 25 | BadNL: Backdoor Attacks Against NLP Models with Semantic-preserving Improvements IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we perform a systematic investigation of backdoor attack on NLP models, and propose BadNL, a general NLP backdoor attack framework including novel attack methods. |
XIAOYI CHEN et. al. |
| 2020 | 26 | Towards Robust LiDAR-based Perception In Autonomous Driving: General Black-box Adversarial Sensor Attack And Countermeasures IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we perform the first study to explore the general vulnerability of current LiDAR-based perception architectures and discover that the ignored occlusion patterns in LiDAR point clouds make self-driving cars vulnerable to spoofing attacks. |
Jiachen Sun; Yulong Cao; Qi Alfred Chen; Z. Morley Mao; |
| 2020 | 27 | Cybersecurity For Industrial Control Systems: A Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments. |
DEVAL BHAMARE et. al. |
| 2020 | 28 | When Machine Unlearning Jeopardizes Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we perform the first study on investigating the unintended information leakage caused by machine unlearning. |
MIN CHEN et. al. |
| 2020 | 29 | Fawkes: Protecting Privacy Against Unauthorized Deep Learning Models IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose Fawkes, a system that helps individuals inoculate their images against unauthorized facial recognition models. |
SHAWN SHAN et. al. |
| 2020 | 30 | Backdoor Attacks And Countermeasures On Deep Learning: A Comprehensive Review IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. |
YANSONG GAO et. al. |
| 2019 | 1 | Local Model Poisoning Attacks to Byzantine-Robust Federated Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we perform the first systematic study on local model poisoning attacks to federated learning. |
Minghong Fang; Xiaoyu Cao; Jinyuan Jia; Neil Zhenqiang Gong; |
| 2019 | 2 | Celeb-DF: A Large-scale Challenging Dataset For DeepFake Forensics IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present a new large-scale challenging DeepFake video dataset, Celeb-DF, which contains 5,639 high-quality DeepFake videos of celebrities generated using improved synthesis process. |
Yuezun Li; Xin Yang; Pu Sun; Honggang Qi; Siwei Lyu; |
| 2019 | 3 | Machine Unlearning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce SISA training, a framework that expedites the unlearning process by strategically limiting the influence of a data point in the training procedure. |
LUCAS BOURTOULE et. al. |
| 2019 | 4 | Blockchain Technology Overview IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This document provides a high-level technical overview of blockchain technology. |
Dylan Yaga; Peter Mell; Nik Roby; Karen Scarfone; |
| 2019 | 5 | STRIP: A Defence Against Trojan Attacks On Deep Neural Networks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This work builds STRong Intentional Perturbation (STRIP) based run-time trojan attack detection system and focuses on vision system. |
YANSONG GAO et. al. |
| 2019 | 6 | Security And Privacy On Blockchain IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive overview of the security and privacy of blockchain. |
Rui Zhang; Rui Xue; Ling Liu; |
| 2019 | 7 | A Survey Of Distributed Consensus Protocols For Blockchain Networks IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we present a comprehensive review and analysis on the state-of-the-art blockchain consensus protocols. |
Yang Xiao; Ning Zhang; Wenjing Lou; Y. Thomas Hou; |
| 2019 | 8 | A Survey Of Network-based Intrusion Detection Data Sets IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This work provides a focused literature survey of data sets for network-based intrusion detection and describes the underlying packet- and flow-based network data in detail. |
Markus Ring; Sarah Wunderlich; Deniz Scheuring; Dieter Landes; Andreas Hotho; |
| 2019 | 9 | Adversarial Sensor Attack On LiDAR-based Perception In Autonomous Driving IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In contrast to prior work that concentrates on camera-based perception, in this work we perform the first security study of LiDAR-based perception in AV settings, which is highly important but unexplored. |
YULONG CAO et. al. |
| 2019 | 10 | Machine Learning In IoT Security: Current Solutions And Future Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. |
Fatima Hussain; Rasheed Hussain; Syed Ali Hassan; Ekram Hossain; |
| 2019 | 11 | Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. |
Ismail Butun; Patrik Österberg; Houbing Song; |
| 2019 | 12 | ZombieLoad: Cross-Privilege-Boundary Data Sampling IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the ZombieLoad attack which uncovers a novel Meltdown-type effect in the processor’s previously unexplored fill-buffer logic. |
MICHAEL SCHWARZ et. al. |
| 2019 | 13 | MemGuard: Defending Against Black-Box Membership Inference Attacks Via Adversarial Examples IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we propose MemGuard, the first defense with formal utility-loss guarantees against black-box membership inference attacks. |
Jinyuan Jia; Ahmed Salem; Michael Backes; Yang Zhang; Neil Zhenqiang Gong; |
| 2019 | 14 | Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To protect customers’ privacy and improve the test accuracy, we enforce differential privacy on the extracted features and propose a new normalization technique. |
YANG ZHAO et. al. |
| 2019 | 15 | A New Backdoor Attack In CNNs By Training Set Corruption Without Label Poisoning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we present a new backdoor attack without label poisoning Since the attack works by corrupting only samples of the target class, it has the additional advantage that it does not need to identify beforehand the class of the samples to be attacked at test time. |
Mauro Barni; Kassem Kallas; Benedetta Tondi; |
| 2019 | 16 | Building An Efficient Intrusion Detection System Based On Feature Selection And Ensemble Classifier IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Thus, we propose a new intrusion detection framework in this paper, and this framework is based on the feature selection and ensemble learning techniques. |
Yuyang Zhou; Guang Cheng; Shanqing Jiang; Mian Dai; |
| 2019 | 17 | Cyber Security Awareness Campaigns: Why Do They Fail To Change Behaviour? IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. |
Maria Bada; Angela M. Sasse; Jason R. C. Nurse; |
| 2019 | 18 | Blockchain For Future Smart Grid: A Comprehensive Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we aim to provide a comprehensive survey on application of blockchain in smart grid. |
MUHAMMAD BAQER MOLLAH et. al. |
| 2019 | 19 | Deep Reinforcement Learning for Cyber Security IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a survey of DRL approaches developed for cyber security. |
Thanh Thi Nguyen; Vijay Janapa Reddi; |
| 2019 | 20 | Secure Federated Matrix Factorization IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a secure matrix factorization framework under the federated learning setting, called FedMF. |
Di Chai; Leye Wang; Kai Chen; Qiang Yang; |
| 2019 | 21 | GIDS: GAN Based Intrusion Detection System For In-Vehicle Network IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To solve this problem, we propose a novel IDS model for in-vehicle networks, GIDS (GAN based Intrusion Detection System) using deep-learning model, Generative Adversarial Nets. |
Eunbi Seo; Hyun Min Song; Huy Kang Kim; |
| 2019 | 22 | A Backdoor Attack Against LSTM-based Text Classification Systems IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we implement a backdoor attack in text classification based on LSTM by data poisoning. |
Jiazhu Dai; Chuanshuai Chen; |
| 2019 | 23 | Invisible Backdoor Attacks On Deep Neural Networks Via Steganography And Regularization IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we create covert and scattered triggers for backdoor attacks, invisible backdoors, where triggers can fool both DNN models and human inspection. |
Shaofeng Li; Minhui Xue; Benjamin Zi Hao Zhao; Haojin Zhu; Xinpeng Zhang; |
| 2019 | 24 | DL-Droid: Deep Learning Based Android Malware Detection Using Real Devices IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose DL-Droid, a deep learning system to detect malicious Android applications through dynamic analysis using stateful input generation. |
Mohammed K. Alzaylaee; Suleiman Y. Yerima; Sakir Sezer; |
| 2019 | 25 | Concurrency And Privacy With Payment-Channel Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we lay the foundations for privacy and concurrency in PCNs, presenting a formal definition in the Universal Composability framework as well as practical and provably secure solutions. |
Giulio Malavolta; Pedro Moreno-Sanchez; Aniket Kate; Matteo Maffei; Srivatsan Ravi; |
| 2019 | 26 | HybridAlpha: An Efficient Approach For Privacy-Preserving Federated Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose HybridAlpha, an approach for privacy-preserving federated learning employing an SMC protocol based on functional encryption. |
Runhua Xu; Nathalie Baracaldo; Yi Zhou; Ali Anwar; Heiko Ludwig; |
| 2019 | 27 | Inductive Analysis Of The Internet Protocol TLS IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover … |
Lawrence C. Paulson; |
| 2019 | 28 | XONN: XNOR-based Oblivious Deep Neural Network Inference IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces XONN, a novel end-to-end framework based on Yao’s Garbled Circuits (GC) protocol, that provides a paradigm shift in the conceptual and practical realization of oblivious inference. |
M. SADEGH RIAZI et. al. |
| 2019 | 29 | Intriguing Properties Of Adversarial ML Attacks In The Problem Space IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We shed light on the relationship between feature space and problem space, and we introduce the concept of side-effect features as the byproduct of the inverse feature-mapping problem. |
Fabio Pierazzi; Feargus Pendlebury; Jacopo Cortellazzi; Lorenzo Cavallaro; |
| 2019 | 30 | Differentially Private Model Publishing For Deep Learning IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To tackle this problem, we propose a differentially private approach for training neural networks. |
Lei Yu; Ling Liu; Calton Pu; Mehmet Emre Gursoy; Stacey Truex; |
| 2018 | 1 | Spectre Attacks: Exploiting Speculative Execution IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper describes practical attacks that combine methodology from side channel attacks, fault attacks, and return-oriented programming that can read arbitrary memory from the victim’s process. |
PAUL KOCHER et. al. |
| 2018 | 2 | How To Backdoor Federated Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We demonstrate that any participant in federated learning can introduce hidden backdoor functionality into the joint global model, e.g., to ensure that an image classifier assigns an attacker-chosen label to images with certain features, or that a word predictor completes certain sentences with an attacker-chosen word. |
Eugene Bagdasaryan; Andreas Veit; Yiqing Hua; Deborah Estrin; Vitaly Shmatikov; |
| 2018 | 3 | Exploiting Unintended Feature Leakage In Collaborative Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Collaborative machine learning and related techniques such as federated learning allow multiple participants, each with his own training dataset, to build a joint model by training locally and periodically exchanging model updates. |
Luca Melis; Congzheng Song; Emiliano De Cristofaro; Vitaly Shmatikov; |
| 2018 | 4 | A Survey On The Security Of Blockchain Systems IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. |
Xiaoqi Li; Peng Jiang; Ting Chen; Xiapu Luo; Qiaoyan Wen; |
| 2018 | 5 | Towards The Development Of Realistic Botnet Dataset In The Internet Of Things For Network Forensic Analytics: Bot-IoT Dataset IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper, proposes a new dataset, Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks. |
Nickolaos Koroniotis; Nour Moustafa; Elena Sitnikova; Benjamin Turnbull; |
| 2018 | 6 | Fine-Pruning: Defending Against Backdooring Attacks On Deep Neural Networks IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we provide the first effective defenses against backdoor attacks on DNNs. |
Kang Liu; Brendan Dolan-Gavitt; Siddharth Garg; |
| 2018 | 7 | ML-Leaks: Model And Data Independent Membership Inference Attacks And Defenses On Machine Learning Models IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present the most comprehensive study so far on this emerging and developing threat using eight diverse datasets which show the viability of the proposed attacks across domains. |
AHMED SALEM et. al. |
| 2018 | 8 | Securify: Practical Security Analysis Of Smart Contracts IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To address this problem, we present Securify, a security analyzer for Ethereum smart contracts that is scalable, fully automated, and able to prove contract behaviors as safe/unsafe with respect to a given property. |
PETAR TSANKOV et. al. |
| 2018 | 9 | Gazelle: A Low Latency Framework For Secure Neural Network Inference IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Our goal is to build efficient protocols whereby the client can acquire the classification result without revealing their input to the server, while guaranteeing the privacy of the server’s neural network. |
Chiraag Juvekar; Vinod Vaikuntanathan; Anantha Chandrakasan; |
| 2018 | 10 | Generating Adversarial Examples With Adversarial Networks IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose AdvGAN to generate adversarial examples with generative adversarial networks (GANs), which can learn and approximate the distribution of original instances. |
CHAOWEI XIAO et. al. |
| 2018 | 11 | A Survey Of Machine And Deep Learning Methods For Internet Of Things (IoT) Security IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The goal of this work is to provide a comprehensive survey of ML /DL methods that can be used to develop enhanced security methods for IoT systems. |
Mohammed Ali Al-Garadi; Amr Mohamed; Abdulla Al-Ali; Xiaojiang Du; Mohsen Guizani; |
| 2018 | 12 | Kitsune: An Ensemble Of Autoencoders For Online Network Intrusion Detection IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner. |
Yisroel Mirsky; Tomer Doitshman; Yuval Elovici; Asaf Shabtai; |
| 2018 | 13 | Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a theoretically-grounded optimization framework specifically designed for linear regression and demonstrate its effectiveness on a range of datasets and models. |
MATTHEW JAGIELSKI et. al. |
| 2018 | 14 | Cyber-Security In Smart Grid: Survey And Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The purpose of this paper is to provide a comprehensive overview of the relevant published works. |
Zakaria El Mrabet; Hassan El Ghazi; Naima Kaabouch; Hamid El Ghazi; |
| 2018 | 15 | A Survey On Consensus Mechanisms And Mining Strategy Management In Blockchain Networks IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we provide a systematic vision of the organization of blockchain networks. |
WENBO WANG et. al. |
| 2018 | 16 | TextBugger: Generating Adversarial Text Against Real-world Applications IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we show that DLTU is inherently vulnerable to adversarial text attacks, in which maliciously crafted texts trigger target DLTU systems and services to misbehave. |
Jinfeng Li; Shouling Ji; Tianyu Du; Bo Li; Ting Wang; |
| 2018 | 17 | Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To overcome the limitations of such rankings, we propose improvements to reduce the fluctuations in list composition and guarantee better defenses against manipulation. |
Victor Le Pochat; Tom Van Goethem; Samaneh Tajalizadehkhoob; Maciej Korczyński; Wouter Joosen; |
| 2018 | 18 | Evaluating Fuzz Testing IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We found problems in every evaluation we considered. |
George Klees; Andrew Ruef; Benji Cooper; Shiyi Wei; Michael Hicks; |
| 2018 | 19 | Finding The Greedy, Prodigal, And Suicidal Contracts At Scale IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present a new systematic characterization of a class of trace vulnerabilities, which result from analyzing multiple invocations of a contract over its lifetime. |
Ivica Nikolic; Aashish Kolluri; Ilya Sergey; Prateek Saxena; Aquinas Hobor; |
| 2018 | 20 | Machine Learning DDoS Detection For Consumer Internet Of Things Devices IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we demonstrate that using IoT-specific network behaviors (e.g. limited number of endpoints and regular time intervals between packets) to inform feature selection can result in high accuracy DDoS detection in IoT network traffic with a variety of machine learning algorithms, including neural networks. |
Rohan Doshi; Noah Apthorpe; Nick Feamster; |
| 2018 | 21 | Smart Contract-Based Access Control For The Internet Of Things IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. |
Yuanyu Zhang; Shoji Kasahara; Yulong Shen; Xiaohong Jiang; Jianxiong Wan; |
| 2018 | 22 | Blockchain Technologies For The Internet Of Things: Research Issues And Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. |
MOHAMED AMINE FERRAG et. al. |
| 2018 | 23 | Angora: Efficient Fuzzing By Principled Search IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To solve path constraints efficiently, we introduce several key techniques: scalable byte-level taint tracking, context-sensitive branch count, search based on gradient descent, and input length exploration. |
Peng Chen; Hao Chen; |
| 2018 | 24 | Spatially Transformed Adversarial Examples IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Many advanced algorithms have been proposed to generate adversarial examples by leveraging the $\mathcal{L}_p$ distance for penalizing perturbations. |
CHAOWEI XIAO et. al. |
| 2018 | 25 | Internet Of Things Security And Forensics: Challenges And Opportunities IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: null In this paper, we first introduce existing major security and forensics challenges within IoT domain and then briefly discuss about papers published in this special issue targeting identified challenges. |
Mauro Conti; Ali Dehghantanha; Katrin Franke; Steve Watson; |
| 2018 | 26 | Chameleon: A Hybrid Secure Computation Framework For Machine Learning Applications IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. |
M. SADEGH RIAZI et. al. |
| 2018 | 27 | DÏoT: A Federated Self-learning Anomaly Detection System For IoT IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present D\IoT, an autonomous self-learning distributed system for detecting compromised IoT devices effectively. |
THIEN DUC NGUYEN et. al. |
| 2018 | 28 | EMBER: An Open Dataset For Training Static PE Malware Machine Learning Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper describes EMBER: a labeled benchmark dataset for training machine learning models to statically detect malicious Windows portable executable files. |
Hyrum S. Anderson; Phil Roth; |
| 2018 | 29 | The Art, Science, And Engineering Of Fuzzing: A Survey IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To help preserve and bring coherence to the vast literature of fuzzing, this paper presents a unified, general-purpose model of fuzzing together with a taxonomy of the current fuzzing literature. |
VALENTIN J. M. MANES et. al. |
| 2018 | 30 | Physical Adversarial Examples For Object Detectors IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we extend physical attacks to more challenging object detection models, a broader class of deep learning algorithms widely used to detect and label multiple objects within a scene. |
KEVIN EYKHOLT et. al. |
| 2017 | 1 | Evasion Attacks Against Machine Learning At Test Time IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we present a simple but effective gradient-based approach that can be exploited to systematically assess the security of several, widely-used classification algorithms against evasion attacks. |
BATTISTA BIGGIO et. al. |
| 2017 | 2 | Targeted Backdoor Attacks On Deep Learning Systems Using Data Poisoning IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we consider a new type of attacks, called backdoor attacks, where the attacker’s goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor. |
Xinyun Chen; Chang Liu; Bo Li; Kimberly Lu; Dawn Song; |
| 2017 | 3 | BadNets: Identifying Vulnerabilities In The Machine Learning Model Supply Chain IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we show that outsourced training introduces new security risks: an adversary can create a maliciously trained network (a backdoored neural network, or a \emph{BadNet}) that has state-of-the-art performance on the user’s training and validation samples, but behaves badly on specific attacker-chosen inputs. |
Tianyu Gu; Brendan Dolan-Gavitt; Siddharth Garg; |
| 2017 | 4 | Deep Models Under The GAN: Information Leakage From Collaborative Deep Learning IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Unfortunately, we show that any privacy-preserving collaborative deep learning is susceptible to a powerful attack that we devise in this paper. |
Briland Hitaj; Giuseppe Ateniese; Fernando Perez-Cruz; |
| 2017 | 5 | Differentially Private Federated Learning: A Client Level Perspective IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We tackle this problem and propose an algorithm for client sided differential privacy preserving federated optimization. |
Robin C. Geyer; Tassilo Klein; Moin Nabi; |
| 2017 | 6 | MagNet: A Two-Pronged Defense Against Adversarial Examples IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose MagNet, a framework for defending neural network classifiers against adversarial examples. |
Dongyu Meng; Hao Chen; |
| 2017 | 7 | Privacy Risk In Machine Learning: Analyzing The Connection To Overfitting IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. |
Samuel Yeom; Irene Giacomelli; Matt Fredrikson; Somesh Jha; |
| 2017 | 8 | A Survey On Security And Privacy Issues Of Bitcoin IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This exponential growth in the market valueof Bitcoin motivates adversaries to exploit weaknesses for profit,and researchers to discover new vulnerabilities in the system,propose countermeasures, and predict upcoming trends.In this paper, we present a systematic survey that covers thesecurity and privacy aspects of Bitcoin. |
Mauro Conti; Sandeep Kumar E; Chhagan Lal; Sushmita Ruj; |
| 2017 | 9 | On The (Statistical) Detection Of Adversarial Examples IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Using thus knowledge, we introduce a complimentary approach to identify specific inputs that are adversarial. |
Kathrin Grosse; Praveen Manoharan; Nicolas Papernot; Michael Backes; Patrick McDaniel; |
| 2017 | 10 | Collecting Telemetry Data Privately IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we develop new LDP mechanisms geared towards repeated collection of counter data, with formal privacy guarantees even after being executed for an arbitrarily long period of time. |
Bolin Ding; Janardhan Kulkarni; Sergey Yekhanin; |
| 2017 | 11 | BlockChain: A Distributed Solution To Automotive Security And Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we argue that BlockChain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. |
Ali Dorri; Marco Steger; Salil S. Kanhere; Raja Jurdak; |
| 2017 | 12 | Casper The Friendly Finality Gadget IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce Casper, a proof of stake-based finality system which overlays an existing proof of work blockchain. |
Vitalik Buterin; Virgil Griffith; |
| 2017 | 13 | Software Grand Exposure: SGX Cache Attacks Are Practical IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we demonstrate that cache-based attacks are indeed a serious threat to the confidentiality of SGX-protected programs. |
FERDINAND BRASSER et. al. |
| 2017 | 14 | Neural Network-based Graph Embedding For Cross-Platform Binary Code Similarity Detection IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To address these issues, in this work, we propose a novel neural network-based approach to compute the embedding, i.e., a numeric vector, based on the control flow graph of each binary function, then the similarity detection can be done efficiently by measuring the distance between the embeddings for two functions. |
XIAOJUN XU et. al. |
| 2017 | 15 | Robust Physical-World Attacks On Deep Learning Models IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We propose a general attack algorithm,Robust Physical Perturbations (RP2), to generate robust visual adversarial perturbations under different physical conditions. |
KEVIN EYKHOLT et. al. |
| 2017 | 16 | Machine Learning Models That Remember Too Much IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this setting, we design and implement practical algorithms, some of them very similar to standard ML techniques such as regularization and data augmentation, that memorize information about the training dataset in the model yet the model is as accurate and predictive as a conventionally trained model. |
Congzheng Song; Thomas Ristenpart; Vitaly Shmatikov; |
| 2017 | 17 | LOGAN: Membership Inference Attacks Against Generative Models IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present the first membership inference attacks against generative models: given a data point, the adversary determines whether or not it was used to train the model. |
Jamie Hayes; Luca Melis; George Danezis; Emiliano De Cristofaro; |
| 2017 | 18 | Deep Text Classification Can Be Fooled IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an effective method to craft text adversarial samples, revealing one important yet underestimated fact that DNN-based text classifiers are also prone to adversarial sample attack. |
BIN LIANG et. al. |
| 2017 | 19 | Malware Guard Extension: Using SGX To Conceal Cache Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves. |
Michael Schwarz; Samuel Weiser; Daniel Gruss; Clémentine Maurice; Stefan Mangard; |
| 2017 | 20 | DeepSecure: Scalable Provably-Secure Deep Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. |
Bita Darvish Rouhani; M. Sadegh Riazi; Farinaz Koushanfar; |
| 2017 | 21 | Blockchain-based Smart Contracts: A Systematic Mapping Study IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we conduct a systematic mapping study to collect all research that is relevant to smart contracts from a technical perspective. |
Maher Alharby; Aad van Moorsel; |
| 2017 | 22 | CryptoDL: Deep Neural Networks Over Encrypted Data IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encryption schemes. |
Ehsan Hesamifard; Hassan Takabi; Mehdi Ghasemi; |
| 2017 | 23 | A Byzantine Fault-Tolerant Ordering Service For The Hyperledger Fabric Blockchain Platform IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To overcome this limitation, we designed, implemented, and evaluated a BFT ordering service for HLF on top of the BFT-SMaRt state machine replication/consensus library, implementing also optimizations for wide-area deployment. |
João Sousa; Alysson Bessani; Marko Vukolić; |
| 2017 | 24 | Leaky Cauldron On The Dark Land: Understanding Memory Side-Channel Hazards In SGX IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. |
WENHAO WANG et. al. |
| 2017 | 25 | Neural Trojans IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We show that this is an effective attack and provide three mitigation techniques: input anomaly detection, re-training, and input preprocessing. |
Yuntao Liu; Yang Xie; Ankur Srivastava; |
| 2017 | 26 | Prio: Private, Robust, And Scalable Computation Of Aggregate Statistics IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents Prio, a privacy-preserving system for the collection of aggregate statistics. |
Henry Corrigan-Gibbs; Dan Boneh; |
| 2017 | 27 | Adversarial Frontier Stitching For Remote Neural Network Watermarking IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Instead, we aim at allowing the extraction of the watermark from a neural network (or any other machine learning model) that is operated remotely, and available through a service API. In the present paper, we formally introduce the problem and propose a novel zero-bit watermarking algorithm that makes use of adversarial model examples. |
Erwan Le Merrer; Patrick Perez; Gilles Trédan; |
| 2017 | 28 | CacheZoom: How SGX Amplifies The Power Of Cache Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. |
Ahmad Moghimi; Gorka Irazoqui; Thomas Eisenbarth; |
| 2017 | 29 | A Smart Home Is No Castle: Privacy Vulnerabilities Of Encrypted IoT Traffic IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Here, we examine four IoT smart home devices (a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo switch, and an Amazon Echo) and find that their network traffic rates can reveal potentially sensitive user interactions even when the traffic is encrypted. |
Noah Apthorpe; Dillon Reisman; Nick Feamster; |
| 2017 | 30 | Dissecting Ponzi Schemes On Ethereum: Identification, Analysis, And Impact IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present a comprehensive survey of Ponzi schemes on Ethereum, analysing their behaviour and their impact from various viewpoints. |
Massimo Bartoletti; Salvatore Carta; Tiziana Cimoli; Roberto Saia; |
| 2016 | 1 | Towards Evaluating The Robustness Of Neural Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we demonstrate that defensive distillation does not significantly increase the robustness of neural networks by introducing three new attack algorithms that are successful on both distilled and undistilled neural networks with $100\%$ probability. |
Nicholas Carlini; David Wagner; |
| 2016 | 2 | Membership Inference Attacks Against Machine Learning Models IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model’s predictions on the inputs that it trained on versus the inputs that it did not train on. |
Reza Shokri; Marco Stronati; Congzheng Song; Vitaly Shmatikov; |
| 2016 | 3 | Practical Black-Box Attacks Against Machine Learning IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We introduce the first practical demonstration of an attacker controlling a remotely hosted DNN with no such knowledge. |
NICOLAS PAPERNOT et. al. |
| 2016 | 4 | Stealing Machine Learning Models Via Prediction APIs IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: ML-as-a-service (predictive analytics) systems are an example: Some allow users to train models on potentially sensitive data and charge others for access on a pay-per-query basis. |
Florian Tramèr; Fan Zhang; Ari Juels; Michael K. Reiter; Thomas Ristenpart; |
| 2016 | 5 | Transferability In Machine Learning: From Phenomena To Black-Box Attacks Using Adversarial Samples IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce new transferability attacks between previously unexplored (substitute, victim) pairs of machine learning model classes, most notably SVMs and decision trees. |
Nicolas Papernot; Patrick McDaniel; Ian Goodfellow; |
| 2016 | 6 | Mobile Edge Computing, Fog Et Al.: A Survey And Analysis Of Security Threats And Challenges IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. |
Rodrigo Roman; Javier Lopez; Masahiro Mambo; |
| 2016 | 7 | Concentrated Differential Privacy: Simplifications, Extensions, And Lower Bounds IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present an alternative formulation of the concept of concentrated differential privacy in terms of the Renyi divergence between the distributions obtained by running an algorithm on neighboring inputs. |
Mark Bun; Thomas Steinke; |
| 2016 | 8 | Enhancing Bitcoin Security And Performance With Strong Consistency Via Collective Signing IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. |
ELEFTHERIOS KOKORIS-KOGIAS et. al. |
| 2016 | 9 | IoT Sentinel: Automated Device-Type Identification For Security Enforcement In IoT IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. |
MARKUS MIETTINEN et. al. |
| 2016 | 10 | Inferring Fine-grained Control Flow Inside SGX Enclaves With Branch Shadowing IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we explore a new, yet critical, side-channel attack against Intel Software Guard Extension (SGX), called a branch shadowing attack, which can reveal fine-grained control flows (i.e., each branch) of an enclave program running on real SGX hardware. |
SANGHO LEE et. al. |
| 2016 | 11 | Practical Secure Aggregation For Federated Learning On User-Held Data IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We consider training a deep neural network in the Federated Learning model, using distributed stochastic gradient descent across user-held training data on mobile devices, wherein Secure Aggregation protects each user’s model gradient. |
KEITH BONAWITZ et. al. |
| 2016 | 12 | Towards The Science Of Security And Privacy In Machine Learning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We articulate a comprehensive threat model for ML, and categorize attacks and defenses within an adversarial framework. |
Nicolas Papernot; Patrick McDaniel; Arunesh Sinha; Michael Wellman; |
| 2016 | 13 | Crafting Adversarial Input Sequences For Recurrent Neural Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we contribute to the field of adversarial machine learning by investigating adversarial input sequences for recurrent neural networks processing sequential data. |
Nicolas Papernot; Patrick McDaniel; Ananthram Swami; Richard Harang; |
| 2016 | 14 | MaMaDroid: Detecting Android Malware By Building Markov Chains Of Behavioral Models IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present MaMaDroid, an Android malware detection system that relies on app behavior. |
ENRICO MARICONTI et. al. |
| 2016 | 15 | Adversarial Perturbations Against Deep Neural Networks For Malware Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to construct highly-effective adversarial sample crafting attacks for neural networks used as malware classifiers. |
Kathrin Grosse; Nicolas Papernot; Praveen Manoharan; Michael Backes; Patrick McDaniel; |
| 2016 | 16 | Blockchain In Internet Of Things: Challenges And Solutions IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This position paper proposes a new secure, private, and lightweight architecture for IoT, based on BC technology that eliminates the overhead of BC while maintaining most of its security and privacy benefits. |
Ali Dorri; Salil S. Kanhere; Raja Jurdak; |
| 2016 | 17 | Defensive Distillation Is Not Robust To Adversarial Examples IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We show that defensive distillation is not secure: it is no more resistant to targeted misclassification attacks than unprotected neural networks. |
Nicholas Carlini; David Wagner; |
| 2016 | 18 | A New Android Malware Detection Approach Using Bayesian Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Hence, in this paper we present an effective approach to alleviate this problem based on Bayesian classification models obtained from static code analysis. |
Suleiman Y. Yerima; Sakir Sezer; Gavin McWilliams; Igor Muttik; |
| 2016 | 19 | Automated Dynamic Analysis Of Ransomware: Benefits, Limitations And Use For Detection IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present EldeRan, a machine learning approach for dynamically analysing and classifying ransomware. |
Daniele Sgandurra; Luis Muñoz-González; Rabih Mohsen; Emil C. Lupu; |
| 2016 | 20 | C-FLAT: Control-FLow ATtestation For Embedded Systems Software IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: As a concrete step towards more comprehensive run-time remote attestation, we present the design and implementation of Control- FLow ATtestation (C-FLAT) that enables remote attestation of an application’s control-flow path, without requiring the source code. |
TIGIST ABERA et. al. |
| 2016 | 21 | On The Cryptanalysis Of Fridrich’s Chaotic Image Encryption Scheme IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The work provides some bases for further optimizing attack on the Fridrich’s scheme and its variants. |
Eric Yong Xie; Chengqing Li; Simin Yu; Jinhu Lü; |
| 2016 | 22 | Authentication Protocols For Internet Of Things: A Comprehensive Survey IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). |
Mohamed Amine Ferrag; Leandros A. Maglaras; Helge Janicke; Jianmin Jiang; |
| 2016 | 23 | Predicting Domain Generation Algorithms With Long Short-Term Memory Networks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Experiments in this paper are run on open datasets and code snippets are provided to reproduce the results. |
Jonathan Woodbridge; Hyrum S. Anderson; Anjum Ahuja; Daniel Grant; |
| 2016 | 24 | Scalable Byzantine Consensus Via Hardware-assisted Secret Sharing IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose FastBFT, a fast and scalable BFT protocol. |
Jian Liu; Wenting Li; Ghassan O. Karame; N. Asokan; |
| 2016 | 25 | Learning To Protect Communications With Adversarial Neural Cryptography IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: Thus, a system may consist of neural networks named Alice and Bob, and we aim to limit what a third neural network named Eve learns from eavesdropping on the communication between Alice and Bob. |
Martín Abadi; David G. Andersen; |
| 2016 | 26 | Survey On Misbehavior Detection In Cooperative Intelligent Transportation Systems IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this survey, we present misbehavior detection mechanisms that can detect such insider attacks based on attacker behavior and information analysis. |
Rens W. van der Heijden; Stefan Dietzel; Tim Leinmüller; Frank Kargl; |
| 2016 | 27 | Systematic Classification Of Side-Channel Attacks: A Case Study For Mobile Devices IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a new categorization system for side-channel attacks, which is necessary as side-channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s. |
Raphael Spreitzer; Veelasha Moonsamy; Thomas Korak; Stefan Mangard; |
| 2016 | 28 | DeepDGA: Adversarially-Tuned Domain Generation And Detection IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we leverage the concept of generative adversarial networks to construct a deep learning based DGA that is designed to intentionally bypass a deep learning based detector. |
Hyrum S. Anderson; Jonathan Woodbridge; Bobby Filar; |
| 2016 | 29 | A Comprehensive Formal Security Analysis Of OAuth 2.0 IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we carry out the first extensive formal analysis of the OAuth 2.0 standard in an expressive web model. |
Daniel Fett; Ralf Kuesters; Guido Schmitz; |
| 2016 | 30 | Coding Schemes For Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. |
Fei Miao; Quanyan Zhu; Miroslav Pajic; George J. Pappas; |
| 2015 | 1 | The Limitations Of Deep Learning In Adversarial Settings IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we formalize the space of adversaries against deep neural networks (DNNs) and introduce a novel class of algorithms to craft adversarial samples based on a precise understanding of the mapping between inputs and outputs of DNNs. |
NICOLAS PAPERNOT et. al. |
| 2015 | 2 | Distillation As A Defense To Adversarial Perturbations Against Deep Neural Networks IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we introduce a defensive mechanism called defensive distillation to reduce the effectiveness of adversarial samples on DNNs. |
Nicolas Papernot; Patrick McDaniel; Xi Wu; Somesh Jha; Ananthram Swami; |
| 2015 | 3 | Bitcoin-NG: A Scalable Blockchain Protocol IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. |
Ittay Eyal; Adem Efe Gencer; Emin Gun Sirer; Robbert van Renesse; |
| 2015 | 4 | Survey Of Security And Privacy Issues Of Internet Of Things IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: No countermeasure to the security drawbacks has been analyzed in the paper. |
Tuhin Borgohain; Uday Kumar; Sugata Sanyal; |
| 2015 | 5 | Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we a deep neural network malware classifier that achieves a usable detection rate at an extremely low false positive rate and scales to real world training example volumes on commodity hardware. |
Joshua Saxe; Konstantin Berlin; |
| 2015 | 6 | Optimal Selfish Mining Strategies In Bitcoin IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we extend the underlying model for selfish mining attacks, and provide an algorithm to find $\epsilon$-optimal policies for attackers within the model, as well as tight upper bounds on the revenue of optimal policies. |
Ayelet Sapirshtein; Yonatan Sompolinsky; Aviv Zohar; |
| 2015 | 7 | Flush+Flush: A Fast And Stealthy Cache Attack IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. |
Daniel Gruss; Clémentine Maurice; Klaus Wagner; Stefan Mangard; |
| 2015 | 8 | Enigma: Decentralized Computation Platform With Guaranteed Privacy IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: For storage, we use a modified distributed hashtable for holding secret-shared data. |
Guy Zyskind; Oz Nathan; Alex Pentland; |
| 2015 | 9 | Privacy In The Internet Of Things: Threats And Challenges IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper analyzes the privacy issues in the Internet of Things in detail. |
Jan Henrik Ziegeldorf; Oscar Garcia Morchon; Klaus Wehrle; |
| 2015 | 10 | Local, Private, Efficient Protocols For Succinct Histograms IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In a model with public coins, we show that each user need only send 1 bit to the server. |
Raef Bassily; Adam Smith; |
| 2015 | 11 | DRAMA: Exploiting DRAM Addressing For Cross-CPU Attacks IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present two methods to reverse engineer the mapping of memory addresses to DRAM channels, ranks, and banks. |
Peter Pessl; Daniel Gruss; Clémentine Maurice; Michael Schwarz; Stefan Mangard; |
| 2015 | 12 | ARMageddon: Cache Attacks On Mobile Devices IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this work, we demonstrate how to solve key challenges to perform the most powerful cross-core cache attacks Prime+Probe, Flush+Reload, Evict+Reload, and Flush+Flush on non-rooted ARM-based devices without any privileges. |
Moritz Lipp; Daniel Gruss; Raphael Spreitzer; Clémentine Maurice; Stefan Mangard; |
| 2015 | 13 | Rowhammer.js: A Remote Software-Induced Fault Attack In JavaScript IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We overcome this limitation by defeating complex cache replacement policies. |
Daniel Gruss; Clémentine Maurice; Stefan Mangard; |
| 2015 | 14 | K-fingerprinting: A Robust Scalable Website Fingerprinting Technique IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present a new website fingerprinting technique based on random decision forests and evaluate performance over standard web pages as well as Tor hidden services, on a larger scale than previous works. |
Jamie Hayes; George Danezis; |
| 2015 | 15 | Novel Feature Extraction, Selection And Fusion For Effective Malware Family Classification IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paradigm is presented and discussed in the present paper, where emphasis has been given to the phases related to the extraction, and selection of a set of novel features for the effective representation of malware samples. |
Mansour Ahmadi; Dmitry Ulyanov; Stanislav Semenov; Mikhail Trofimov; Giorgio Giacinto; |
| 2015 | 16 | HMOG: New Behavioral Biometric Features For Continuous Authentication Of Smartphone Users IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce Hand Movement, Orientation, and Grasp (HMOG), a set of behavioral features to continuously authenticate smartphone users. |
ZDENKA SITOVA et. al. |
| 2015 | 17 | Building A RAPPOR With The Unknown: Privacy-Preserving Learning Of Associations And Data Dictionaries IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper, we propose a novel decoding algorithm for the RAPPOR mechanism that enables the estimation of unknown unknowns, i.e., strings we do not even know we should be estimating. |
Giulia Fanti; Vasyl Pihur; Úlfar Erlingsson; |
| 2015 | 18 | Practical Attacks Against Privacy And Availability In 4G/LTE Mobile Communication Systems IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present several countermeasures to resist our specific attacks. |
Altaf Shaik; Ravishankar Borgaonkar; N. Asokan; Valtteri Niemi; Jean-Pierre Seifert; |
| 2015 | 19 | Centrally Banked Cryptocurrencies IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce RSCoin, a cryptocurrency framework in which central banks maintain complete control over the monetary supply, but rely on a distributed set of authorities, or mintettes, to prevent double-spending. |
George Danezis; Sarah Meiklejohn; |
| 2015 | 20 | Privacy And Data Protection By Design – From Policy To Engineering IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The report sketches a method to map legal obligations to design strategies, which allow the system designer to select appropriate techniques for implementing the identified privacy requirements. |
GEORGE DANEZIS et. al. |
| 2015 | 21 | Keeping Authorities Honest Or Bust With Decentralized Witness Cosigning IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. |
EWA SYTA et. al. |
| 2015 | 22 | Riposte: An Anonymous Messaging System Handling Millions of Users IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper presents Riposte, a new system for anonymous broadcast messaging. |
Henry Corrigan-Gibbs; Dan Boneh; David Mazières; |
| 2015 | 23 | DDoS Attacks In Cloud Computing: Issues, Taxonomy, And Future Directions IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present developments related to DDoS attack mitigation solutions in the cloud. |
Gaurav Somani; Manoj Singh Gaur; Dheeraj Sanghi; Mauro Conti; Rajkumar Buyya; |
| 2015 | 24 | ReCon: Revealing And Controlling PII Leaks In Mobile Network Traffic IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. |
Jingjing Ren; Ashwin Rao; Martina Lindorfer; Arnaud Legout; David Choffnes; |
| 2015 | 25 | Bitcoin Blockchain Dynamics: The Selfish-Mine Strategy In The Presence Of Propagation Delay IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the context of the `selfish-mine’ strategy proposed by Eyal and Sirer, we study the effect of propagation delay on the evolution of the Bitcoin blockchain. |
Johannes Göbel; Paul Keeler; Anthony E. Krzesinski; Peter G. Taylor; |
| 2015 | 26 | Trends In Crypto-currencies And Blockchain Technologies: A Monetary Theory And Regulation Perspective IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We describe the historical context which led to the development of these currencies and some modern and recent trends in their uptake, in terms of both usage in the real economy and as investment products. |
Gareth W. Peters; Efstathios Panayi; Ariane Chapelle; |
| 2015 | 27 | Bitcoin Transaction Graph Analysis IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We explore the level of anonymity in the Bitcoin system. |
Michael Fleder; Michael S. Kester; Sudeep Pillai; |
| 2015 | 28 | Sound-Proof: Usable Two-Factor Authentication Based On Ambient Sound IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose Sound-Proof, a usable and deployable two-factor authentication mechanism. |
Nikolaos Karapanos; Claudio Marforio; Claudio Soriente; Srdjan Capkun; |
| 2015 | 29 | Toward An Efficient Website Fingerprinting Defense IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose a novel, lightweight defense based on Adaptive Padding that provides a sufficient level of security against website fingerprinting, particularly in realistic evaluation conditions. |
Marc Juarez; Mohsen Imani; Mike Perry; Claudia Diaz; Matthew Wright; |
| 2015 | 30 | Automated Dynamic Firmware Analysis At Scale: A Case Study On Embedded Web Interfaces IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present the first fully automated framework that applies dynamic firmware analysis techniques to achieve, in a scalable manner, automated vulnerability discovery within embedded firmware images. |
Andrei Costin; Apostolis Zarras; Aurélien Francillon; |
| 2014 | 1 | RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: This paper describes and motivates RAPPOR, details its differential-privacy and utility guarantees, discusses its practical deployment and properties in the face of different attack models, and, finally, gives results of its application to both synthetic and real-world data. |
Úlfar Erlingsson; Vasyl Pihur; Aleksandra Korolova; |
| 2014 | 2 | Deanonymisation Of Clients In Bitcoin P2P Network IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. |
Alex Biryukov; Dmitry Khovratovich; Ivan Pustogarov; |
| 2014 | 3 | Analysis Of Hashrate-Based Double Spending IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we take a look at the stochastic processes underlying typical attacks and their resulting probabilities of success. |
Meni Rosenfeld; |
| 2014 | 4 | The Miner’s Dilemma IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We define and analyze a game where pools use some of their participants to infiltrate other pools and perform such an attack. |
Ittay Eyal; |
| 2014 | 5 | Cryptocurrencies Without Proof Of Work IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We offer analysis of existing protocols that have a substantial amount of popularity. |
Iddo Bentov; Ariel Gabizon; Alex Mizrahi; |
| 2014 | 6 | TweetCred: Real-Time Credibility Assessment Of Content On Twitter IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a semi-supervised ranking model for scoring tweets according to their credibility. |
Aditi Gupta; Ponnurangam Kumaraguru; Carlos Castillo; Patrick Meier; |
| 2014 | 7 | Optimal Geo-Indistinguishable Mechanisms For Location Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. |
Nicolás E. Bordenabe; Konstantinos Chatzikokolakis; Catuscia Palamidessi; |
| 2014 | 8 | Differentially Private Distributed Optimization IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we study the private distributed optimization (PDOP) problem with the additional requirement that the cost function of the individual agents should remain differentially private. |
Zhenqi Huang; Sayan Mitra; Nitin Vaidya; |
| 2014 | 9 | Privacy In The Genomic Era IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. |
MUHAMMAD NAVEED et. al. |
| 2014 | 10 | Unsupervised Anomaly-based Malware Detection Using Hardware Features IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we propose a new class of detectors – anomaly-based hardware malware detectors – that do not require signatures for malware detection, and thus can catch a wider range of malware including potentially novel ones. |
Adrian Tang; Simha Sethumadhavan; Salvatore Stolfo; |
| 2014 | 11 | Mobile Device Identification Via Sensor Fingerprinting IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present two implementations: one based on analyzing the frequency response of the speakerphone-microphone system, and another based on analyzing device-specific accelerometer calibration errors. |
Hristo Bojinov; Yan Michalevsky; Gabi Nakibly; Dan Boneh; |
| 2014 | 12 | Bitcoin Transaction Malleability And MtGox IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work we use traces of the Bitcoin network for over a year preceding the filing to show that, while the problem is real, there was no widespread use of malleability attacks before the closure of MtGox. |
Christian Decker; Roger Wattenhofer; |
| 2014 | 13 | K-Nearest Neighbor Classification Over Semantically Secure Encrypted Relational Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we focus on solving the classification problem over encrypted data. |
Bharath K. Samanthula; Yousef Elmehdwi; Wei Jiang; |
| 2014 | 14 | On Subversive Miner Strategies And Block Withholding Attack In Bitcoin Digital Currency IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we look at the miner strategies with particular attention paid to subversive and dishonest strategies or those which could put bitcoin and its reputation in danger. |
Nicolas T. Courtois; Lear Bahack; |
| 2014 | 15 | Electromagnetic Fault Injection: Towards A Fault Model On A 32-bit Microcontroller IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The aim of this paper is twofold: providing a more in-depth study of the effects of electromagnetic glitch fault injection on a state-of-the-art microcontroller and building an associated register-transfer level fault model. |
Nicolas Moro; Amine Dehbaoui; Karine Heydemann; Bruno Robisson; Emmanuelle Encrenaz; |
| 2014 | 16 | Bitcoin Over Tor Isn’t A Good Idea IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we show that combining Tor and Bitcoin creates an attack vector for the deterministic and stealthy man-in-the-middle attacks. |
Alex Biryukov; Ivan Pustogarov; |
| 2014 | 17 | Detection Of Early-Stage Enterprise Infection By Mining Large-Scale Log Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We address the problem of detecting early-stage infection in an enterprise setting by proposing a new framework based on belief propagation inspired from graph theory. |
Alina Oprea; Zhou Li; Ting-Fang Yen; Sang Chin; Sumayah Alrwais; |
| 2014 | 18 | Dynamic Analysis Of Digital Chaotic Maps Via State-Mapping Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper aims to study the dynamics of discrete-time chaotic maps in the digital (i.e., finite-precision) domain. |
Chengqing Li; Bingbing Feng; Shujun Li; Juergen Kurths; Guanrong Chen; |
| 2014 | 19 | Subspace Methods For Data Attack On State Estimation: A Data Driven Approach IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. |
Jinsub Kim; Lang Tong; Robert J. Thomas; |
| 2014 | 20 | On Covert Acoustical Mesh Networks In Air IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. |
Michael Hanspach; Michael Goetz; |
| 2014 | 21 | On The Relation Between Identifiability, Differential Privacy And Mutual-Information Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Under a unified privacy-distortion framework, where the distortion is defined to be the Hamming distance of the input and output databases, we establish some fundamental connections between these three privacy notions. |
Weina Wang; Lei Ying; Junshan Zhang; |
| 2014 | 22 | Your Voice Assistant Is Mine: How To Abuse Speakers To Steal Information And Control Your Phone IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a novel approach (GVS-Attack) to launch permission bypassing attacks from a zero permission Android application (VoicEmployer) through the speaker. |
Wenrui Diao; Xiangyu Liu; Zhe Zhou; Kehuan Zhang; |
| 2014 | 23 | Calm Before The Storm: The Challenges Of Cloud Computing In Digital Forensics IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. |
George Grispos; Tim Storer; William Bradley Glisson; |
| 2014 | 24 | AirHopper: Bridging The Air-Gap Between Isolated Networks And Mobile Phones Using Radio Frequencies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we present AirHopper, a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals. |
Mordechai Guri; Gabi Kedma; Assaf Kachlon; Yuval Elovici; |
| 2014 | 25 | Privacy Games: Optimal User-Centric Data Obfuscation IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user’s privacy. |
Reza Shokri; |
| 2014 | 26 | Symmetric Algorithm Survey: A Comparative Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation that are essential for secure communication (Wired or Wireless). |
Mansoor Ebrahim; Shujaat Khan; Umer Bin Khalid; |
| 2014 | 27 | Sprobes: Enforcing Kernel Code Integrity On The TrustZone Architecture IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present SPROBES, a novel primitive that enables introspection of operating systems running on ARM TrustZone hardware. |
Xinyang Ge; Hayawardh Vijayakumar; Trent Jaeger; |
| 2014 | 28 | I Know Why You Went To The Clinic: Risks And Realization Of HTTPS Traffic Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present a traffic analysis attack against over 6000 webpages spanning the HTTPS deployments of 10 widely used, industry-leading websites in areas such as healthcare, finance, legal services and streaming video. |
Brad Miller; Ling Huang; A. D. Joseph; J. D. Tygar; |
| 2014 | 29 | User-Generated Free-Form Gestures For Authentication: Security And Memorability IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We conclude the paper with strategies for generating secure and memorable free-form gestures, which present a robust method for mobile authentication. |
MICHAEL SHERMAN et. al. |
| 2014 | 30 | Can’t You Hear Me Knocking: Identification Of User Actions On Android Apps Via Traffic Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we move a step forward: we investigate to which extent it is feasible to identify the specific actions that a user is doing on his mobile device, by simply eavesdropping the device’s network traffic. |
Mauro Conti; Luigi V. Mancini; Riccardo Spolaor; Nino V. Verde; |
| 2013 | 1 | Hacking Smart Machines With Smarter Ones: How To Extract Meaningful Data From Machine Learning Classifiers IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. |
GIUSEPPE ATENIESE et. al. |
| 2013 | 2 | Secure K-Nearest Neighbor Query Over Encrypted Data In Outsourced Environments IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we focus on solving the k-nearest neighbor (kNN) query problem over encrypted database outsourced to a cloud: a user issues an encrypted query record to the cloud, and the cloud returns the k closest records to the user. |
Yousef Elmehdwi; Bharath K. Samanthula; Wei Jiang; |
| 2013 | 3 | DAG-Based Attack And Defense Modeling: Don’t Miss The Forest For The Attack Trees IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). |
Barbara Kordy; Ludovic Piètre-Cambacédès; Patrick Schweitzer; |
| 2013 | 4 | Security And Privacy Issues In Cloud Computing IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this chapter, we describe various service and deployment models of cloud computing and identify major challenges. |
Jaydip Sen; |
| 2013 | 5 | On The Security Of The Automatic Dependent Surveillance-Broadcast Protocol IF:6 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of … |
Martin Strohmeier; Vincent Lenders; Ivan Martinovic; |
| 2013 | 6 | Time-Optimal Interactive Proofs For Circuit Evaluation IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We describe a refinement of a powerful interactive proof protocol originally due to Goldwasser, Kalai, and Rothblum. |
Justin Thaler; |
| 2013 | 7 | Entropy Based Anomaly Detection System To Prevent DDoS Attacks In Cloud IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Grid and Cloud Computing Intrusion Detection System detects encrypted node communication and find the hidden attack trial which inspects and detects those attacks that network based and host based cant identify. |
A. S. Syed Navaz; V. Sangeetha; C. Prabhadevi; |
| 2013 | 8 | Fingerprinting Codes And The Price Of Approximate Differential Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We show new lower bounds on the sample complexity of $(\varepsilon, \delta)$-differentially private algorithms that accurately answer large sets of counting queries. |
Mark Bun; Jonathan Ullman; Salil Vadhan; |
| 2013 | 9 | A Proposed NFC Payment Application IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a new NFC payment application, which is based on our previous NFC Cloud Wallet model to demonstrate a reliable structure of NFC ecosystem. |
Pardis Pourghomi; Muhammad Qasim saeed; Gheorghita Ghinea; |
| 2013 | 10 | SybilBelief: A Semi-supervised Learning Approach For Structure-based Sybil Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we aim to overcome these drawbacks. |
Neil Zhenqiang Gong; Mario Frank; Prateek Mittal; |
| 2013 | 11 | Longitudinal Analysis Of Android Ad Library Permissions IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper investigates changes over time in the behavior of Android ad libraries. |
Theodore Book; Adam Pridgen; Dan S. Wallach; |
| 2013 | 12 | SecLaaS: Secure Logging-as-a-Service For Cloud Forensics IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce Secure-Logging-as-a-Service (SecLaaS), which stores virtual machines’ logs and provides access to forensic investigators ensuring the confidentiality of the cloud users. |
Shams Zawoad; Amit Kumar Dutta; Ragib Hasan; |
| 2013 | 13 | Mining Attribute-based Access Control Policies IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents an ABAC policy mining algorithm. |
Zhongyuan Xu; Scott D. Stoller; |
| 2013 | 14 | P3: Toward Privacy-Preserving Photo Sharing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To address these concerns, we propose a privacy-preserving photo encoding algorithm that extracts and encrypts a small, but significant, component of the photo, while preserving the remainder in a public, standards-compatible, part. |
Moo-Ryong Ra; Ramesh Govindan; Antonio Ortega; |
| 2013 | 15 | Content And Popularity Analysis Of Tor Hidden Services IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we analyse the landscape of Tor hidden services. |
Alex Biryukov; Ivan Pustogarov; Fabrice Thill; Ralf-Philipp Weinmann; |
| 2013 | 16 | Theoretical Bitcoin Attacks With Less Than Half Of The Computational Power (draft) IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In the paper we analyze two kinds of attacks based on two theoretical flaws: the Block Discarding Attack and the Difficulty Raising Attack. |
Lear Bahack; |
| 2013 | 17 | A New Graphical Password Scheme Resistant To Shoulder-Surfing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. |
Haichang Gao; Zhongjie Ren; Xiuling Chang; Xiyang Liu; Uwe Aickelin; |
| 2013 | 18 | Machine Learning Techniques For Intrusion Detection IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we study several such schemes and compare their performance. |
Mahdi Zamani; Mahnush Movahedi; |
| 2013 | 19 | Cryptanalyzing Image Encryption Using Chaotic Logistic Map IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper presents a typical example to show insecurity of an image encryption scheme using chaotic logistic map. |
Chengqing Li; Tao Xie; Qi Liu; Ge Cheng; |
| 2013 | 20 | A Comparative Usability Study Of Two-Factor Authentication IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an exploratory comparative study of the usability of 2F technologies. |
Emiliano De Cristofaro; Honglu Du; Julien Freudiger; Greg Norcie; |
| 2013 | 21 | On The Complexity Of The Rank Syndrome Decoding Problem IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose two new generic attacks on the Rank Syndrome Decoding (RSD) problem Let $C$ be a random $[n,k]$ rank code over $GF(q^m)$ and let $y=x+e$ be a received word such that $x \in C$ and the $Rank(e)=r$. |
Philippe Gaborit; Olivier Ruatta; Julien Schrek; |
| 2013 | 22 | A Secure And Effective Anonymous Authentication Scheme For Roaming Service In Global Mobility Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To remedy these weaknesses, in this paper we propose a novel anonymous authentication scheme for roaming service in global mobility networks. |
Dawei Zhao; Haipeng Peng; Lixiang Li; Yixian Yang; |
| 2013 | 23 | Text Steganographic Approaches: A Comparison IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents three novel approaches of text steganography. |
Monika Agarwal; |
| 2013 | 24 | A Chaotic Image Encryption Scheme Owning Temp-value Feedback IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a novel efficient chaotic image encryption scheme, in which the temp-value feedback mechanism is introduced to the permutation and diffusion procedures. |
Leo Yu Zhang; Xiaobo Hu; Yuansheng Liu; Kwok-Wo Wong; |
| 2013 | 25 | A Predictive Differentially-Private Mechanism For Mobility Traces IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we show that correlations in the trace can be in fact exploited in terms of a prediction function that tries to guess the new location based on the previously reported locations. |
Konstantinos Chatzikokolakis; Catuscia Palamidessi; Marco Stronati; |
| 2013 | 26 | A Static Malware Detection System Using Data Mining Methods IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Different researchers have proposed methods using data mining and machine learning for detecting new malicious programs. |
Usukhbayar Baldangombo; Nyamjav Jambaljav; Shi-Jinn Horng; |
| 2013 | 27 | Secure Biometrics: Concepts, Authentication Architectures And Challenges IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article we present an overview of secure biometrics, also referred to as biometric template protection, an emerging class of methods that address these concerns. |
Shantanu Rane; Ye Wang; Stark. C. Draper; Prakash Ishwar; |
| 2013 | 28 | Public Key Exchange Using Matrices Over Group Rings IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform. |
Delaram Kahrobaei; Charalambos Koupparis; Vladimir Shpilrain; |
| 2013 | 29 | Attack Planning In The Real World IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we present a complete PDDL representation of an attack model, and an implementation that integrates a planner into a penetration testing tool. |
Jorge Lucangeli Obes; Carlos Sarraute; Gerardo Richarte; |
| 2013 | 30 | Utilizing Noise Addition For Data Privacy, An Overview IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we take a look at noise addition as one of the data privacy providing techniques. |
Kato Mivule; |
| 2012 | 1 | Geo-Indistinguishability: Differential Privacy For Location-Based Systems IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: In this paper we study geo-indistinguishability, a formal notion of privacy for location-based systems that protects the user’s exact location, while allowing approximate information – typically needed to obtain a certain desired service – to be released. |
Miguel E. Andrés; Nicolás E. Bordenabe; Konstantinos Chatzikokolakis; Catuscia Palamidessi; |
| 2012 | 2 | Path ORAM: An Extremely Simple Oblivious RAM Protocol IF:9 Related Papers Related Patents Related Grants Related Venues Related Experts Related Code View Highlight: We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. |
EMIL STEFANOV et. al. |
| 2012 | 3 | Touchalytics: On The Applicability Of Touchscreen Input As A Behavioral Biometric For Continuous Authentication IF:8 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen. |
Mario Frank; Ralf Biedert; Eugene Ma; Ivan Martinovic; Dawn Song; |
| 2012 | 4 | A New Approach To Practical Active-Secure Two-Party Computation IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a new approach to practical two-party computation secure against an active adversary. |
Jesper Buus Nielsen; Peter Sebastian Nordholt; Claudio Orlandi; Sai Sheshank Burra; |
| 2012 | 5 | An Implementation Of Intrusion Detection System Using Genetic Algorithm IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this progression, here we present an Intrusion Detection System (IDS), by applying genetic algorithm (GA) to efficiently detect various types of network intrusions. |
Mohammad Sazzadul Hoque; Md. Abdul Mukit; Md. Abu Naser Bikas; |
| 2012 | 6 | Attribute-Based Encryption For Circuits From Multilinear Maps IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. |
Amit Sahai; Brent Waters; |
| 2012 | 7 | Differentially Private Iterative Synchronous Consensus IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce the private iterative consensus problem where agents are required to converge while protecting the privacy of their initial values from honest but curious adversaries. |
Zhenqi Huang; Sayan Mitra; Geir Dullerud; |
| 2012 | 8 | Differentially Private Grids For Geospatial Data IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we tackle the problem of constructing a differentially private synopsis for two-dimensional datasets such as geospatial datasets. |
Wahbeh Qardaji; Weining Yang; Ninghui Li; |
| 2012 | 9 | Differentially Private Data Analysis Of Social Networks Via Restricted Sensitivity IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce the notion of restricted sensitivity as an alternative to global and smooth sensitivity to improve accuracy in differentially private data analysis. |
Jeremiah Blocki; Avrim Blum; Anupam Datta; Or Sheffet; |
| 2012 | 10 | Botnet-based Distributed Denial Of Service (DDoS) Attacks On Web Servers: Classification And Art IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a comprehensive study to show the danger of Botnet-based DDoS attacks on application layer, especially on the Web server and the increased incidents of such attacks that has evidently increased recently. |
Esraa Alomari; Selvakumar Manickam; B. B. Gupta; Shankar Karuppayah; Rafeef Alfaris; |
| 2012 | 11 | Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: From the simulation results based on the PJM 5 Bus test system, we can show the effectiveness and properties of the studied game. |
Mohammad Esmalifalak; Ge Shi; Zhu Han; Lingyang Song; |
| 2012 | 12 | Survey On Security Issues In Cloud Computing And Associated Mitigation Techniques IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it. |
Rohit Bhadauria; Sugata Sanyal; |
| 2012 | 13 | STAR-Vote: A Secure, Transparent, Auditable, And Reliable Voting System IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper describes the STAR-Vote architecture, which could well be the next-generation voting system for Travis County and perhaps elsewhere. |
JOSH BENALOH et. al. |
| 2012 | 14 | Automatically Securing Permission-Based Software By Reducing The Attack Surface: An Application To Android IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present an approach to detecting permission gaps using static analysis. |
Alexandre Bartel; Jacques Klein; Martin Monperrus; Yves Le Traon; |
| 2012 | 15 | A Lightweight Dynamic Pseudonym Identity Based Authentication And Key Agreement Protocol Without Verification Tables For Multi-server Architecture IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Unfortunately, our further research shows that Li et al.’s protocol contains several drawbacks and can not resist some types of known attacks, such as replay attack, Deny-of-Service attack, internal attack, eavesdropping attack, masquerade attack, and so on. |
Kaiping Xue; Peilin Hong; Changsha Ma; |
| 2012 | 16 | Calibrating Data To Sensitivity In Private Data Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present an approach to differentially private computation in which one does not scale up the magnitude of noise for challenging queries, but rather scales down the contributions of challenging records. |
Davide Proserpio; Sharon Goldberg; Frank McSherry; |
| 2012 | 17 | Breaking A Novel Image Encryption Scheme Based On Improved Hyperchaotic Sequences IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper re-evaluates the security of the encryption scheme and finds that the encryption scheme can be broken with only one known plain-image. |
Chengqing Li; Yuansheng Liu; Tao Xie; Michael Z. Q. Chen; |
| 2012 | 18 | A Theory Of Pricing Private Data IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we propose a theoretical framework for assigning prices to noisy query answers, as a function of their accuracy, and for dividing the price amongst data owners who deserve compensation for their loss of privacy. |
Chao Li; Daniel Yang Li; Gerome Miklau; Dan Suciu; |
| 2012 | 19 | A Novel Latin Square Image Cipher IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. |
Yue Wu; Yicong Zhou; Joseph P. Noonan; Sos Agaian; C. L. Philip Chen; |
| 2012 | 20 | Search Me If You Can: Privacy-preserving Location Query Service IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper tackles this non-trivial challenge by designing a suite of novel fine-grained Privacy-preserving Location Query Protocol (PLQP). |
Xiang-Yang Li; Taeho Jung; |
| 2012 | 21 | Privacy In Content-Oriented Networking: Threats And Countermeasures IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a systematic privacy analysis of CON and the common building blocks among its various architectural instances in order to highlight emerging privacy threats, and analyze a few potential countermeasures. |
Abdelberi Chaabane; Emiliano De Cristofaro; Mohammed-Ali Kaafar; Ersin Uzun; |
| 2012 | 22 | The Optimal Mechanism In Differential Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We derive the optimal $\epsilon$-differentially private mechanism for single real-valued query function under a very general utility-maximization (or cost-minimization) framework. |
Quan Geng; Pramod Viswanath; |
| 2012 | 23 | Breaking A Novel Colour Image Encryption Algorithm Based On Chaos IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic map. |
Chengqing Li; Yu Zhang; Rong Ou; Kwok-Wo Wong; |
| 2012 | 24 | Preserving Link Privacy In Social Network Based Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this work, we make the following contributions. |
Prateek Mittal; Charalampos Papamanthou; Dawn Song; |
| 2012 | 25 | Proactively Accountable Anonymous Messaging In Verdict IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Verdict, the first practical anonymous group communication system built using proactively verifiable DC-nets: participants use public key cryptography to construct DC-net ciphertexts, and knowledge proofs to detect and detect and exclude misbehavior before disruption. |
Henry Corrigan-Gibbs; David Isaac Wolinsky; Bryan Ford; |
| 2012 | 26 | PlaceRaider: Virtual Theft In Physical Spaces With Smartphones IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. |
Robert Templeman; Zahid Rahman; David Crandall; Apu Kapadia; |
| 2012 | 27 | Distributed Denial Of Service Prevention Techniques IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from possible DDoS attacks and discuss the strengths and weaknesses of each mechanism. |
B. B. Gupta; R. C. Joshi; Manoj Misra; |
| 2012 | 28 | Principles And Overview Of Network Steganography IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The paper presents basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques. |
Jozef Lubacz; Wojciech Mazurczyk; Krzysztof Szczypiorski; |
| 2012 | 29 | Participatory Privacy: Enabling Privacy In Participatory Sensing IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. |
Emiliano De Cristofaro; Claudio Soriente; |
| 2012 | 30 | Polynomial-time Solutions Of Computational Problems In Noncommutative-algebraic Cryptography IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce the \emph{linear centralizer method}, and use it to devise a provable polynomial time solution of the Commutator Key Exchange Problem, the computational problem on which, in the passive adversary model, the security of the Anshel–Anshel–Goldfeld 1999 \emph{Commutator} key exchange protocol is based. |
Boaz Tsaban; |
| 2011 | 1 | Shannon Entropy Based Randomness Measurement And Test For Image Encryption IF:7 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a new information entropy-based randomness measurement for image encryption is introduced which, for the first time, answers the question of whether a given ciphertext image is sufficiently random-like. |
Yue Wu; Joseph P. Noonan; Sos Agaian; |
| 2011 | 2 | Quire: Lightweight Provenance For Smart Phone Operating Systems IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We demonstrate the usefulness of Quire with two example applications. |
Michael Dietz; Shashi Shekhar; Yuliy Pisetsky; Anhei Shu; Dan S. Wallach; |
| 2011 | 3 | Towards Practical Oblivious RAM IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: On the theoretic front, we propose a fundamentally novel technique for constructing Oblivious RAMs: specifically, we partition a bigger O-RAM into smaller O-RAMs, and employ a background eviction technique to obliviously evict blocks from the client-side cache into a randomly assigned server-side partition. |
Emil Stefanov; Elaine Shi; Dawn Song; |
| 2011 | 4 | A Survey On Security Issues In Cloud Computing IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the Cloud computing adoption and diffusion affecting the various stake-holders linked to it. |
Rohit Bhadauria; Rituparna Chaki; Nabendu Chaki; Sugata Sanyal; |
| 2011 | 5 | On Sampling, Anonymization, And Differential Privacy: Or, K-Anonymization Meets Differential Privacy IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper aims at answering the following two questions in privacy-preserving data analysis and publishing: What formal privacy guarantee (if any) does $k$-anonymization provide? |
Ninghui Li; Wahbeh Qardaji; Dong Su; |
| 2011 | 6 | Privacy-Preserving Group Data Access Via Stateless Oblivious RAM Simulation IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We study the problem of providing privacy-preserving access to an outsourced honest-but-curious data repository for a group of trusted users. |
Michael T. Goodrich; Michael Mitzenmacher; Olga Ohrimenko; Roberto Tamassia; |
| 2011 | 7 | How Unique And Traceable Are Usernames? IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: One possible way of estimating this probability would be to look at the public information associated to the two accounts and try to match them. |
Daniele Perito; Claude Castelluccia; Mohamed Ali Kaafar; Pere Manils; |
| 2011 | 8 | Distributed Private Data Analysis: On Simultaneously Solving How And What IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential privacy. |
Amos Beimel; Kobbi Nissim; Eran Omri; |
| 2011 | 9 | Link Prediction By De-anonymization: How We Won The Kaggle Social Network Challenge IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. |
Arvind Narayanan; Elaine Shi; Benjamin I. P. Rubinstein; |
| 2011 | 10 | Exploiting Channel Diversity In Secret Key Generation From Multipath Fading Randomness IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose a key generation system based on low-density parity-check (LDPC) codes and describe the design and performance of two systems: one based on binary LDPC codes and the other (useful at higher signal-to-noise ratios) based on four-ary LDPC codes. |
Yanpei Liu; Stark C. Draper; Akbar M. Sayeed; |
| 2011 | 11 | Image Encryption Using Differential Evolution Approach In Frequency Domain IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. |
Maaly Awad S Hassan; Ibrahim Soliman I Abuhaiba; |
| 2011 | 12 | Oblivious RAM Simulation With Efficient Worst-Case Access Overhead IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to de-amortize oblivious RAM simulations, so that each access takes a worst-case bounded amount of time. |
Michael T. Goodrich; Michael Mitzenmacher; Olga Ohrimenko; Roberto Tamassia; |
| 2011 | 13 | Differential Privacy: On The Trade-off Between Utility And Information Leakage IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of mutual information. |
Mário S. Alvim; Miguel E. Andrés; Konstantinos Chatzikokolakis; Pierpaolo Degano; Catuscia Palamidessi; |
| 2011 | 14 | ANDaNA: Anonymous Named Data Networking Application IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. |
Steven DiBenedetto; Paolo Gasti; Gene Tsudik; Ersin Uzun; |
| 2011 | 15 | DECENT: A Decentralized Architecture For Enforcing Privacy In Online Social Networks IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. |
Sonia Jahid; Shirin Nilizadeh; Prateek Mittal; Nikita Borisov; Apu Kapadia; |
| 2011 | 16 | A Mechanism For Detection Of Gray Hole Attack In Mobile Ad Hoc Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. |
Jaydip Sen; M. Girish Chandra; Harihara S. G.; Harish Reddy; P. Balamuralidhar; |
| 2011 | 17 | Investigating The Distribution Of Password Choices IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we will look at the distribution with which passwords are chosen. |
David Malone; Kevin Maher; |
| 2011 | 18 | Lower Bounds In Differential Privacy IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we investigate various lower bounds on the noise required to maintain different kind of privacy guarantees. |
Anindya De; |
| 2011 | 19 | Probabilistic Analysis Of Onion Routing In A Black-box Model IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We perform a probabilistic analysis of onion routing. |
Joan Feigenbaum; Aaron Johnson; Paul Syverson; |
| 2011 | 20 | Stealthy Traffic Analysis Of Low-Latency Anonymous Communication Using Throughput Fingerprinting IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we show that doing this leaks information about the set of Tor relays in a circuit (path). |
Prateek Mittal; Ahmed Khurshid; Joshua Juen; Matthew Caesar; Nikita Borisov; |
| 2011 | 21 | Cooperative Secret Key Generation From Phase Estimation In Narrowband Fading Channels IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a novel cooperative key generation protocol is developed to facilitate high-rate key generation in narrowband fading channels, where two keying nodes extract the phase randomness of the fading channel with the aid of relay node(s). |
Qian Wang; Kaihe Xu; Kui Ren; |
| 2011 | 22 | Security Through Amnesia: A Software-Based Solution To The Cold Boot Attack On Disk Encryption IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We present Loop-Amnesia, a kernel-based disk encryption mechanism implementing a novel technique to eliminate vulnerability to the cold boot attack. |
Patrick Simmons; |
| 2011 | 23 | A Mechanism For Detection Of Cooperative Black Hole Attack In Mobile Ad Hoc Networks IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. |
Jaydip Sen; Sripad Koilakonda; Arijit Ukil; |
| 2011 | 24 | An Overview Of The Security Concerns In Enterprise Cloud Computing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. |
Anthony Bisong; M. Rahman; |
| 2011 | 25 | Using Transcoding For Hidden Communication In IP Telephony IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). |
Wojciech Mazurczyk; Pawel Szaga; Krzysztof Szczypiorski; |
| 2011 | 26 | Efficient Detection Of Sybil Attack Based On Cryptography In Vanet IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. |
Mina Rahbari; Mohammad Ali Jabreil Jamali; |
| 2011 | 27 | Image Encryption Based On Diffusion And Multiple Chaotic Maps IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper presents a new algorithm for the image encryption/decryption scheme. |
G. A. Sathishkumar; Dr. K. Bhoopathy bagan; Dr. N. Sriraam; |
| 2011 | 28 | Breaking A Chaotic Image Encryption Algorithm Based On Perceptron Model IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Recently, a chaotic image encryption algorithm based on perceptron model was proposed. |
Yu Zhang; Chengqing Li; Qin Li; Dan Zhang; Shi Shu; |
| 2011 | 29 | The Identity Crisis. Security, Privacy And Usability Issues In Identity Management IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper brings them together in a single, comprehensive study and proposes recommendations to resolve or to mitigate the problems. |
Gergely Alpár; Jaap-Henk Hoepman; Johanneke Siljee; |
| 2011 | 30 | Attack Prevention For Collaborative Spectrum Sensing In Cognitive Radio Networks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. |
Lingjie Duan; Alexander W. Min; Jianwei Huang; Kang G. Shin; |
| 2010 | 1 | A Survey On Wireless Sensor Network Security IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper discusses the current state of the art in security mechanisms for WSNs. |
Jaydip Sen; |
| 2010 | 2 | EphPub: Toward Robust Ephemeral Publishing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: We propose an efficient and robust protocol that builds on the Domain Name System (DNS) and its caching mechanism. |
Claude Castelluccia; Emiliano De Cristofaro; Aurelien Francillon; Mohamed-Ali Kaafar; |
| 2010 | 3 | New Comparative Study Between DES, 3DES And AES Within Nine Factors IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper a three algorithm of multimedia encryption schemes have been proposed in the literature and description. |
HAMDAN. O. ALANAZI et. al. |
| 2010 | 4 | Malware Classification Based On Call Graph Clustering IF:6 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. |
Joris Kinable; Orestis Kostakis; |
| 2010 | 5 | PhishDef: URL Names Say It All IF:5 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we take the following steps to identify phishing URLs. |
Anh Le; Athina Markopoulou; Michalis Faloutsos; |
| 2010 | 6 | Fingerprint Recognition Using Minutia Score Matching IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). |
Ravi. J; K. B. Raja; Venugopal. K. R; |
| 2010 | 7 | Plug-in Privacy For Smart Metering Billing IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we describe the functional and privacy requirements, the specification and security proof of our solution and give a performance evaluation of a prototypical implementation. |
Marek Jawurek; Martin Johns; Florian Kerschbaum; |
| 2010 | 8 | Fighting Online Click-Fraud Using Bluff Ads IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this note we wish to raise the awareness of the networking research community on potential research areas within this emerging field. |
Hamed Haddadi; |
| 2010 | 9 | Stochastic Games For Security In Networks With Interdependent Nodes IF:4 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take … |
Kien C. Nguyen; Tansu Alpcan; Tamer Basar; |
| 2010 | 10 | A Comparison Between Memetic Algorithm And Genetic Algorithm For The Cryptanalysis Of Simplified Data Encryption Standard Algorithm IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a comparison between memetic algorithm and genetic algorithm were made in order to investigate the performance for the cryptanalysis on simplified data encryption standard problems(SDES). |
Poonam Garg; |
| 2010 | 11 | Overview: Main Fundamentals For Steganography IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main goals for this paper, to recognize the researchers for the main fundamentals of steganography. |
Zaidoon Kh. AL-Ani; A. A. Zaidan; B. B. Zaidan; Hamdan. O. Alanazi; |
| 2010 | 12 | Solutions To The GSM Security Weaknesses IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper briefly presents the most important security flaws of the GSM network and its transport channels. |
M. Toorani; A. A. Beheshti; |
| 2010 | 13 | SSMS – A Secure SMS Messaging Protocol For The M-payment Systems IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the SMS messages to be used as a secure bearer in the m-payment systems. |
M. Toorani; A. A. Beheshti; |
| 2010 | 14 | Detecting DNS Tunnels Using Character Frequency Analysis IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domains in DNS queries and responses. |
Kenton Born; David Gustafson; |
| 2010 | 15 | Impossibility Of Differentially Private Universally Optimal Mechanisms IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: For the Bayesian case, we go further, and give a characterization of those functions that admit universally-optimal mechanisms, showing that a universally-optimal mechanism exists, essentially, only for a (single) count query. |
Hai Brenner; Kobbi Nissim; |
| 2010 | 16 | Universally Optimal Privacy Mechanisms For Minimax Agents IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we present a universal treatment of utility based on the standard minimax rule from decision theory (in contrast to the utility model in, which is Bayesian). |
Mangesh Gupte; Mukund Sundararajan; |
| 2010 | 17 | An LSB Data Hiding Technique Using Prime Numbers IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. |
Sandipan Dey; Ajith Abraham; Sugata Sanyal; |
| 2010 | 18 | Avoiding Black Hole And Cooperative Black Hole Attacks In Wireless Ad Hoc Networks IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, after having specified the black hole attack, a secure mechanism, which consists in checking the good forwarding of packets by an intermediate node, was proposed. |
Abderrahmane Baadache; Ali Belmehdi; |
| 2010 | 19 | Proposed System For Data Hiding Using Cryptography And Steganography Proposed System For Data Hiding Using Cryptography And Steganography IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. |
Dipti Kapoor Sarmah; Neha Bajpai; |
| 2010 | 20 | Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. |
A. Jagadeesan; K. Duraiswamy; |
| 2010 | 21 | Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion Of Fingerprint And Iris IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. |
A. Jagadeesan; K. Duraiswamy; |
| 2010 | 22 | A Distributed K-Secure Sum Protocol For Secure Multi-Party Computations IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper, we provide a novel protocol to compute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a middle party. |
Rashid Sheikh; Beerendra Kumar; Durgesh Kumar Mishra; |
| 2010 | 23 | Secure Iris Authentication Using Visual Cryptography IF:3 Summary Related Papers Related Patents Related Grants Related Venues Related Experts View Abstract: Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a … |
P. S. Revenkar; Anisa Anjum; W. Z. Gandhare; |
| 2010 | 24 | LPKI – A Lightweight Public Key Infrastructure For The Mobile Environments IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: The main contribution of this paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the constrained platforms such as mobile phones. |
M. Toorani; A. A. Beheshti; |
| 2010 | 25 | A Survey Of RFID Authentication Protocols Based On Hash-Chain Method IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This article is a survey to closely observe those protocols in terms of its focus and limitations. |
Irfan Syamsuddin; Tharam Dillon; Elizabeth Chang; Song Han; |
| 2010 | 26 | Botnet Detection By Monitoring Similar Communication Patterns IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: Botnet has been defined as a group of bots that perform similar communication and malicious activity patterns within the same Botnet. |
Hossein Rouhani Zeidanloo; Azizah Bt Abdul Manaf; |
| 2010 | 27 | Quantitative Information Flow – Verification Hardness And Possibilities IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: This paper investigates the hardness and possibilities of precisely checking and inferring quantitative information flow according to such definitions. |
Hirotoshi Yasuoka; Tachio Terauchi; |
| 2010 | 28 | An Elliptic Curve-based Signcryption Scheme With Forward Secrecy IF:3 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: An elliptic curve-based signcryption scheme is introduced in this paper that effectively combines the functionalities of digital signature and encryption, and decreases the computational costs and communication overheads in comparison with the traditional signature-then-encryption schemes. |
M. Toorani; A. A. Beheshti; |
| 2010 | 30 | Atomicity Improvement For Elliptic Curve Scalar Multiplication IF:4 Related Papers Related Patents Related Grants Related Venues Related Experts View Highlight: In this paper we address the problem of protecting elliptic curve scalar multiplication implementations against side-channel analysis by using the atomicity principle. |
Christophe Giraud; Vincent Verneuil; |