Latest in

total 9118took 0.12s
RowHammer: A RetrospectiveApr 22 2019This retrospective paper describes the RowHammer problem in Dynamic Random Access Memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 conference~\cite{rowhammer-isca2014}. RowHammer is a prime (and perhaps the first) example of ... More
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse EngineeringApr 20 2019PCBs are the core components for the devices ranging from the consumer electronics to military applications. Due to the accessibility of the PCBs, they are vulnerable to the attacks such as probing, eavesdropping, and reverse engineering. In this paper, ... More
Auditable Blockchain Randomization ToolApr 20 2019Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems, see Marcondes et al. (2019) This paper presents an easy to implement randomization protocol that assures, in a formal mathematical ... More
Compiling for Encrypted Computing: Obfuscation but Not in NameApr 20 2019Encrypted computing is the emerging science and technology of processors that take encrypted inputs to encrypted outputs via encrypted intermediates (at nearly conventional speeds). The aim is to make user data in general-purpose computing secure against ... More
Secure and secret cooperation of robotic swarms by using Merkle treesApr 19 2019Swarm robotics systems are envisioned to become an important component of both academic research and real-world applications. However, in order to reach widespread adoption, new models that ensure the secure cooperation of these systems need to be developed. ... More
Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS securityApr 19 2019The trend toward autonomous robot deployments is on an upward growth curve. These robots are undertaking new tasks and are being integrated into society. Examples of this trend are autonomous vehicles, humanoids, and eldercare. The movement from factory ... More
Erasing Data from Blockchain NodesApr 18 2019It is a common narrative that blockchains are immutable and so it is technically impossible to erase data stored on them. For legal and ethical reasons, however, individuals and organizations might be compelled to erase locally stored data, be it encoded ... More
Enhancing the Privacy and Computability of Location-Sensitive Data for Context AuthenticationApr 18 2019This paper proposes a new privacy-enhancing, context-aware user authentication system, ConSec, which uses a transformation of general location-sensitive data, such as GPS location, barometric altitude and noise levels, collected from the user's device, ... More
Intrusion Detection Mechanism Using Fuzzy Rule InterpolationApr 18 2019Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated) conclusions even in case if some situations are not explicitly defined in a fuzzy rule based knowledge representation. This property can be beneficial in partial heuristically solved ... More
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural NetworksApr 18 2019Deep neural networks are vulnerable to adversarial attacks. Numerous efforts have focused on defenses that either try to patch `holes' in trained models or try to make it difficult or costly to compute adversarial examples exploiting these holes. In our ... More
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural NetworksApr 17 2019Neural Network classifiers have been used successfully in a wide range of applications. However, their underlying assumption of attack free environment has been defied by adversarial examples. Researchers tried to develop defenses; however, existing approaches ... More
Understanding the Effectiveness of Ultrasonic Microphone JammerApr 17 2019Recent works have explained the principle of using ultrasonic transmissions to jam nearby microphones. These signals are inaudible to nearby users, but leverage "hardware nonlinearity" to induce a jamming signal inside microphones that disrupts voice ... More
The current state of affairs in 5G security and the main remaining security challengesApr 17 2019Apr 18 2019The first release of the 5G protocol specifications, 3rd Generation Partnership Project (3GPP) Release 15, were published in December 2017 and the first 5G protocol security specifications in March 2018. As one of the technology cornerstones for Vehicle-to-Vehicle ... More
I2PA : An Efficient ABC for IoTApr 17 2019Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously takes ... More
Truxen: A Trusted Computing Enhanced BlockchainApr 17 2019Truxen is a Trusted Computing enhanced blockchain that uses Proof of Integrity protocol as the consensus. Proof of Integrity protocol is derived from Trusted Computing and associated Remote Attestations, that can be used to vouch a node's identity and ... More
Performance study of ABC scheme in an IoT context: the case of I2PA, Idemix and U-proveApr 17 2019Apr 18 2019IoT has lots of benefits. However, when tackling issues about user's privacy, there are many challenges to be taken up. As a result, several protocols have been designed so far to overcome this issue. So, this papers aims to present a performance study ... More
Privacy-preserving Health Data Sharing for Medical Cyber-Physical SystemsApr 17 2019The recent spades of cyber security attacks have compromised end users' data safety and privacy in Medical Cyber-Physical Systems (MCPS). Traditional standard encryption algorithms for data protection are designed based on a viewpoint of system architecture ... More
Adversarial Defense Through Network Profiling Based Path ExtractionApr 17 2019Recently, researchers have started decomposing deep neural network models according to their semantics or functions. Recent work has shown the effectiveness of decomposed functional blocks for defending adversarial attacks, which add small input perturbation ... More
Approximating Cumulative Pebbling Cost is Unique Games HardApr 17 2019The cumulative pebbling complexity of a directed acyclic graph $G$ is defined as $\mathsf{cc}(G) = \min_P \sum_i |P_i|$, where the minimum is taken over all legal (parallel) black pebblings of $G$ and $|P_i|$ denotes the number of pebbles on the graph ... More
Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based CryptosystemApr 17 2019The cryptosystem based on the Learning-with-Errors (LWE) problem is considered as a post-quantum cryptosystem, because it is not based on the factoring problem with large primes which is easily solved by a quantum computer. Moreover, the LWE-based cryptosystem ... More
Reducing Adversarial Example Transferability Using Gradient RegularizationApr 16 2019Deep learning algorithms have increasingly been shown to lack robustness to simple adversarial examples (AdvX). An equally troubling observation is that these adversarial examples transfer between different architectures trained on different datasets. ... More
AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial NetsApr 16 2019Apr 17 2019Recent studies have discovered the vulnerability of Deep Neural Networks (DNNs) to adversarial examples, which are imperceptible to humans but can easily fool DNNs. Existing methods for crafting adversarial examples are mainly based on adding small-magnitude ... More
AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial NetsApr 16 2019Recent studies have discovered the vulnerability of Deep Neural Networks (DNNs) to adversarial examples, which are imperceptible to humans but can easily fool DNNs. Existing methods for crafting adversarial examples are mainly based on adding small-magnitude ... More
Use of Approaches to the Methodology of Factor Analysis of Information Risks for the Quantitative Assessment of Information Risks Based on the Formation of Cause-And-Effect LinksApr 16 2019The paper suggests methods to the assessment of information risks, which makes the transition from a qualitative assessment of information risks (according to the factor analysis of information risks methodology) to a quantitative assessment. The development ... More
Decrypting SSL/TLS traffic for hidden threats detectionApr 16 2019The paper presents an analysis of the main mechanisms of decryption of SSL/TLS traffic. Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. Also, the approach for intercepting ... More
Steganographer IdentificationApr 16 2019Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as ... More
Re: What's Up Johnny? -- Covert Content Attacks on Email End-to-End EncryptionApr 16 2019Apr 17 2019We show practical attacks against OpenPGP and S/MIME encryption and digital signatures in the context of email. Instead of targeting the underlying cryptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported ... More
Re: What's Up Johnny? -- Covert Content Attacks on Email End-to-End EncryptionApr 16 2019We show practical attacks against OpenPGP and S/MIME encryption and digital signatures in the context of email. Instead of targeting the underlying cryptographic primitives, our attacks abuse legitimate features of the MIME standard and HTML, as supported ... More
Spoof detection using x-vector and feature switchingApr 16 2019Detecting spoofed utterances is a fundamental problem in voice-based biometrics. Spoofing can be performed either by logical accesses like speech synthesis, voice conversion or by physical accesses such as replaying the pre-recorded utterance. Inspired ... More
On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security InnovationsApr 16 2019A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued ... More
Helping IT and OT Defenders CollaborateApr 16 2019Cyber-physical systems, especially in critical infrastructures, have become primary hacking targets in international conflicts and diplomacy. However, cyber-physical systems present unique challenges to defenders, starting with an inability to communicate. ... More
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle PredictionApr 15 2019Deep Neural Networks (DNNs) have tremendous potential in advancing the vision for self-driving cars. However, the security of DNN models in this context leads to major safety implications and needs to be better understood. We consider the case study of ... More
Incentivized Blockchain-based Social Media Platforms: A Case Study of SteemitApr 15 2019This paper presents an empirical analysis of Steemit, a key representative of the emerging incentivized social media platforms over Blockchains, to understand and evaluate the actual level of decentralization and the practical effects of cryptocurrency-driven ... More
CryptoNN: Training Neural Networks over Encrypted DataApr 15 2019Emerging neural networks based machine learning techniques such as deep learning and its variants have shown tremendous potential in many application domains. However, they raise serious privacy concerns due to the risk of leakage of highly privacy-sensitive ... More
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract ExecutionApr 15 2019The abundance of rich varieties of data is enabling many transformative applications of big data analytics that have profound societal impacts. However, there are also increasing concerns regarding the improper use of individual users' private data. Many ... More
RF-Trojan: Leaking Kernel Data Using Register File TrojanApr 15 2019Register Files (RFs) are the most frequently accessed memories in a microprocessor for fast and efficient computation and control logic. Segment registers and control registers are especially critical for maintaining the CPU mode of execution that determinesthe ... More
Comparison of System Call Representations for Intrusion DetectionApr 15 2019Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related non-continuous data like ... More
Detecting brute-force attacks on cryptocurrency walletsApr 15 2019Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. ... More
A Security Reference Architecture for BlockchainsApr 15 2019Due to their interesting features, blockchains have become popular in recent years. They are full-stack systems where security is a critical factor for their success. The main focus of this work is to systematize knowledge about security and privacy issues ... More
Towards Realistic Battery-DoS Protection of Implantable Medical DevicesApr 15 2019Modern Implantable Medical Devices (IMDs) feature wireless connectivity, which makes them vulnerable to security attacks. Particular to IMDs is the battery Denial-of-Service attack whereby attackers aim to fully deplete the battery by occupying the IMD ... More
POSTER: IMD Security vs. Energy: Are we tilting at windmills?Apr 15 2019Implantable Medical Devices (IMDs) such as pacemakers and neurostimulators are highly constrained in terms of energy. In addition, the wireless-communication facilities of these devices also impose security requirements considering their life-critical ... More
IoD-Crypt: A Lightweight Cryptographic Framework for Internet of DronesApr 15 2019Internet of Drones (IoD) is expected to play a central role in many civilian and military applications, that require sensitive and mission-critical information to be processed. It is therefore vital to ensure the security and privacy of IoD. However, ... More
Differential Privacy for Eye-Tracking DataApr 15 2019As large eye-tracking datasets are created, data privacy is a pressing concern for the eye-tracking community. De-identifying data does not guarantee privacy because multiple datasets can be linked for inferences. A common belief is that aggregating individuals' ... More
Performance Analysis of Physical Layer Security over Fluctuating Beckmann Fading ChannelsApr 14 2019In this paper, we analyse the performance of physical layer security over Fluctuating Beckmann (FB) fading channel which is an extended model of both the $\kappa-\mu$ shadowed and the classical Beckmann distributions. Specifically, the average secrecy ... More
Secure Consistency Verification for Untrusted Cloud Storage by Public BlockchainsApr 14 2019This work presents ContractChecker, a Blockchain-based security protocol for verifying the storage consistency between the mutually distrusting cloud provider and clients. Unlike existing protocols, the ContractChecker uniquely delegates log auditing ... More
Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for ReplayApr 13 2019Fake audio detection is expected to become an important research area in the field of smart speakers such as Google Home, Amazon Echo and chatbots developed for these platforms. This paper presents replay attack vulnerability of voice-driven interfaces ... More
Statistical-Based Privacy-Preserving Scheme with Malicious Consumers Identification for Smart~GridApr 13 2019As smart grids are getting popular and being widely implemented, preserving the privacy of consumers is becoming more substantial. Power generation and pricing in smart grids depends on the continuously gathered information from the consumers. However, ... More
Flint for Safer Smart ContractsApr 13 2019The Ethereum blockchain platform supports the execution of decentralised applications or smart contracts. These typically hold and transfer digital currency to other parties on the platform; however, they have been subject to numerous attacks due to the ... More
SPHINCS$^+$ digital signature scheme with GOST hash functionsApr 13 2019Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged ... More
Cryptocurrency with Fully Asynchronous Communication based on Banks and DemocracyApr 13 2019Cryptocurrencies came to the world in the recent decade and attempted to put a new order where the financial system is not governed by a centralized entity, and where you have complete control over your account without the need to trust strangers (governments ... More
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity WorkflowApr 13 2019The emerging Internet of Things (IoT) has lead to a dramatic increase in type, quantity, and the number of functions that can be offered in a smart environment. Future smart environments will be even richer in terms of the number of devices and functionality ... More
Building Scalable Decentralized Payment SystemsApr 12 2019Increasing the transactional throughput of decentralized blockchains in a secure manner has been the holy grail of blockchain research for most of the past decade. This paper introduces a scheme for scaling blockchains while retaining virtually identical ... More
KeyForge: Mitigating Email Breaches with Forward-Forgeable SignaturesApr 12 2019Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the stolen ... More
Computationally-secure and composable remote state preparationApr 12 2019We introduce a protocol between a classical polynomial-time verifier and a quantum polynomial-time prover that allows the verifier to securely delegate to the prover the preparation of certain single-qubit quantum states. The protocol realizes the following ... More
QFactory: classically-instructed remote secret qubits preparationApr 12 2019The functionality of classically-instructed remotely prepared random secret qubits was introduced in (Cojocaru et al 2018) as a way to enable classical parties to participate in secure quantum computation and communications protocols. The idea is that ... More
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against AttacksApr 12 2019With the wide deployment of machine learning (ML) based systems for a variety of applications including medical, military, automotive, genomic, as well as multimedia and social networking, there is great potential for damage from adversarial learning ... More
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache AttacksApr 12 2019Caches have become the prime method for unintended information extraction across logical isolation boundaries. Even Spectre and Meltdown rely on the cache side channel, as it provides great resolution and is widely available on all major CPU platforms. ... More
QUICker connection establishment with out-of-band validation tokensApr 12 2019QUIC is a secure transport protocol and aims to improve the performance of HTTPS traffic. It is a design goal of QUIC to reduce the delay overhead of its connection establishment. However, an initial handshake enforcing strict validation of the client's ... More
Generating Minimal Adversarial Perturbations with Integrated Adaptive GradientsApr 12 2019We focus our attention on the problem of generating adversarial perturbations based on the gradient in image classification domain; substantial pixel perturbations make features learned by deep neural networks changed in clean images which fool deep neural ... More
Parity-Based Concurrent Error Detection Schemes for the ChaCha Stream CipherApr 12 2019We propose two parity-based concurrent error detection schemes for the Quarterround of the ChaCha stream cipher to protect from transient and permanent faults. They offer a trade-off between implementation overhead and error coverage. The second approach ... More
Towards Formalizing the GDPR's Notion of Singling OutApr 12 2019There is a significant conceptual gap between legal and mathematical thinking around data privacy. The effect is uncertainty as to which technical offerings adequately match expectations expressed in legal standards. The uncertainty is exacerbated by ... More
Selfish Mining and Dyck Words in Bitcoin and Ethereum NetworksApr 11 2019The main goal of this article is to present a direct approach for the formula giving the long-term apparent hashrates of Selfish Mining strategies using only elementary probabilities and combinatorics, more precisely, Dyck words. We can avoid computing ... More
Deployment Optimization of IoT Devices through Attack Graph AnalysisApr 11 2019The Internet of things (IoT) has become an integral part of our life at both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, low resources, the diversity of vendors, and proprietary firmware. Moreover, ... More
Detecting Sybil Attacks using Proofs of Work and Location in VANETsApr 11 2019In this paper, we propose a Sybil attack detection scheme using proofs of work and location. The idea is that each road side unit (RSU) issues a signed time-stamped tag as a proof for the vehicle's anonymous location. Proofs sent from multiple consecutive ... More
A Secure Architecture for Standard Medical Imaging RepositoriesApr 11 2019The production of medical images in digital format has been growing in the most varied healthcare providers, currently representing an essential element for supporting medical diagnosis and treatment. In this field, formats, transmission, and visualization ... More
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and DefensesApr 11 2019Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness. ... More
Reconstructing Network Inputs with Additive Perturbation SignaturesApr 11 2019In this work, we present preliminary results demonstrating the ability to recover a significant amount of information about secret model inputs given only very limited access to model outputs and the ability evaluate the model on additive perturbations ... More
A Case Study of Execution of Untrusted Business Process on Permissioned BlockchainApr 11 2019Many studies have been done to improve the performance of centrally controlled business processes and enhance the integration between different parties of these collaborations. However, the most serious issues of collaborative business processes remained ... More
On Machine Learning DoS Attack Identification from Cloud Computing TelemetryApr 11 2019The detection of Denial of Service (DoS) attacks remains a challenge for the cloud environment, affecting a massive number of services and applications hosted by such virtualized infrastructures. Typically, in the literature, the detection of DoS attacks ... More
STC Antispoofing Systems for the ASVspoof2019 ChallengeApr 11 2019This paper describes the Speech Technology Center (STC) antispoofing systems submitted to the ASVspoof 2019 challenge. The ASVspoof2019 is the extended version of the previous challenges and includes 2 evaluation conditions: logical access use-case scenario ... More
The Android Platform Security ModelApr 11 2019Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, ... More
Privacy protocolsApr 11 2019Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels ... More
Smart Home Survey on Security and PrivacyApr 10 2019Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern. ... More
What Storage Access Privacy is Achievable with Small Overhead?Apr 10 2019Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead ... More
Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control SystemsApr 10 2019Temperature sensors are extensively used in real-time monitoring and control of critical processes, such as maintaining thermal stability in incubators that treat low birth weight or sick newborns, or monitoring critical biological and chemical reactions. ... More
Leveraging Distributed Ledger Technologies and Blockchain to Combat Fake NewsApr 10 2019The rise of ubiquitous misinformation, disinformation, propaganda and post-truth, often referred to as fake news, raises some concerns over the role of Internet and social media in modern democratic societies. Due to its rapid and widespread diffusion, ... More
Trusted CI Experiences in Cybersecurity and Service to Open ScienceApr 10 2019This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address cybersecurity for ... More
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized ExchangesApr 10 2019Blockchains, and specifically smart contracts, have promised to create fair and transparent trading ecosystems. Unfortunately, we show that this promise has not been met. We document and quantify the widespread and rising deployment of arbitrage bots ... More
Black-box Adversarial Attacks on Video Recognition ModelsApr 10 2019Deep neural networks (DNNs) are known for their vulnerability to adversarial examples. These are examples that have undergone a small, carefully crafted perturbation, and which can easily fool a DNN into making misclassifications at test time. Thus far, ... More
The resistance of an FPGA implementation of Grasshopper block cipher to CPA attacksApr 10 2019In this paper, we implement the Russian standard block cipher Grasshopper on Field-Programmable Gate Array (FPGA). We also study the Correlation Power Analysis attack, which is a special type of side-channel attack proposed by Brier et al. To face this ... More
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot DetectionApr 10 2019The arm race between spambots and spambot-detectors is made of several cycles (or generations): a new wave of spambots is created (and new spam is spread), new spambot filters are derived and old spambots mutate (or evolve) to new species. Recently, with ... More
Reconstruction of C&C Channel for Structured P2P BotnetApr 10 2019Botnets are problematic malware and a big challenge for researchers who have always been unsuccessful in preventing their attacks. Not only have P2P botnets increased the robustness of C&C channels, they have also made the detection of botmaster harder. ... More
Detecting Cybersecurity Events from Noisy Short TextApr 10 2019It is very critical to analyze messages shared over social networks for cyber threat intelligence and cyber-crime prevention. In this study, we propose a method that leverages both domain-specific word embeddings and task-specific features to detect cyber ... More
KEY-SSD: Access-Control Drive to Protect Files from Ransomware AttacksApr 10 2019Traditional techniques to prevent damage from ransomware attacks are to detect and block attacks by monitoring the known behaviors such as frequent name changes, recurring access to cryptographic libraries and exchange keys with remote servers. Unfortunately, ... More
Malicious Overtones: hunting data theft in the frequency domain with one-class learningApr 09 2019A method for detecting electronic data theft from computer networks is described, capable of recognizing patterns of remote exfiltration occurring over days to weeks. Normal traffic flow data, in the form of a host's ingress and egress bytes over time, ... More
Short Paper: Creating Adversarial Malware Examples using Code InsertionApr 09 2019There has been an increased interest in the application of convolutional neural networks for image based malware classification, but the susceptibility of neural networks to adversarial examples allows malicious actors to evade classifiers. We shed light ... More
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution EnvironmentApr 09 2019Apr 10 2019There is an urgent demand for privacy-preserving techniques capable of supporting compute and data intensive (CDI) computing in the era of big data. However, none of existing TEEs can truly support CDI computing tasks, as CDI requires high throughput ... More
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution EnvironmentApr 09 2019There is an urgent demand for privacy-preserving techniques capable of supporting compute and data intensive (CDI) computing in the era of big data. However, none of existing TEEs can truly support CDI computing tasks, as CDI requires high throughput ... More
ASVspoof 2019: Future Horizons in Spoofed and Fake Audio DetectionApr 09 2019ASVspoof, now in its third edition, is a series of community-led challenges which promote the development of countermeasures to protect automatic speaker verification (ASV) from the threat of spoofing. Advances in the 2019 edition include: (i) a consideration ... More
ASVspoof 2019: Future Horizons in Spoofed and Fake Audio DetectionApr 09 2019Apr 14 2019ASVspoof, now in its third edition, is a series of community-led challenges which promote the development of countermeasures to protect automatic speaker verification (ASV) from the threat of spoofing. Advances in the 2019 edition include: (i) a consideration ... More
Privacy protection of occupant behavior data and using blockchain for securely transferring temperature records in HVAC systemsApr 09 2019The proportion of Energy consumption in the building industry is great, as well as the amount of cooling and heating system. Scholars have been working on energy conservation of Heating, ventilation, and air-conditioning and other systems in buildings. ... More
Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy ExtractorApr 09 2019In this paper, we have proposed a multi factor biometric-based remote authentication protocol. Our proposal overcomes the vulnerabilities of some previous works. At the same time, the protocol also obtains a low false accept rate (FAR) and false reject ... More
Lower Bounds for Oblivious Near-Neighbor SearchApr 09 2019We prove an $\Omega(d \lg n/ (\lg\lg n)^2)$ lower bound on the dynamic cell-probe complexity of statistically $\mathit{oblivious}$ approximate-near-neighbor search ($\mathsf{ANN}$) over the $d$-dimensional Hamming cube. For the natural setting of $d = ... More
Towards Analyzing Semantic Robustness of Deep Neural NetworksApr 09 2019Despite the impressive performance of Deep Neural Networks (DNNs) on various vision tasks, they still exhibit erroneous high sensitivity toward semantic primitives (e.g. object pose). We propose a theoretically grounded analysis for DNNs robustness in ... More
The Last Mile: High-Assurance and High-Speed Cryptographic ImplementationsApr 09 2019We develop a new approach for building cryptographic implementations. Our approach goes the last mile and delivers assembly code that is provably functionally correct, protected against side-channels, and as efficient as hand-written assembly. We illustrate ... More
A new Hybrid Lattice Attack on Galbraith's Binary LWE CryptosystemApr 09 2019LWE-based cryptosystems are an attractive alternative to traditional ones in the post-quantum era. To minimize the storage cost of part of its public key - a $256 \times 640$ integer matrix, $\textbf{T}$ - a binary version of $\textbf{T}$ has been proposed. ... More
Thinkey: A Scalable Blockchain ArchitectureApr 09 2019This paper presents Thinkey, an efficient, secure, infinitely scalable and decentralized blockchain architecture. It ensures system correctness and liveness by a multi-layer structure. In particular, the system is based on a double-chain architecture ... More
Thinkey: A Scalable Blockchain ArchitectureApr 09 2019Apr 10 2019This paper presents Thinkey, an efficient, secure, infinitely scalable and decentralized blockchain architecture. It ensures system correctness and liveness by a multi-layer structure. In particular, the system is based on a double-chain architecture ... More
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient ApproximationApr 09 2019Machine Learning (ML) is widely used for predictive tasks in a number of critical applications. Recently, collaborative or federated learning is a new paradigm that enables multiple parties to jointly learn ML models on their combined datasets. Yet, in ... More
Efficient Decision-based Black-box Adversarial Attacks on Face RecognitionApr 09 2019Face recognition has obtained remarkable progress in recent years due to the great improvement of deep convolutional neural networks (CNNs). However, deep CNNs are vulnerable to adversarial examples, which can cause fateful consequences in real-world ... More