Latest in

total 11549took 0.11s
There is no Reliable Way to Detect Hacked Ballot-Marking DevicesAug 21 2019Election system vendors are marketing ballot-marking devices (BMDs) as a universal system, and some states are deploying them for all voters, not just those who need a BMD to vote independently. Like all devices with CPUs, BMDs can be hacked, misprogrammed, ... More
Flexible S-money token schemesAug 21 2019S-money [Proc. R. Soc. A 475, 20190170 (2019)] schemes define virtual tokens designed for networks with relativistic or other trusted signalling constraints. The tokens allow near-instant verification and guarantee unforgeability without requiring quantum ... More
Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access ControlAug 21 2019Future smart cities and intelligent world will have connected vehicles and smart cars as its indispensable and most essential components. The communication and interaction among such connected entities in this vehicular internet of things (IoT) domain, ... More
Testing Robustness Against Unforeseen AdversariesAug 21 2019Considerable work on adversarial defense has studied robustness to a fixed, known family of adversarial distortions, most frequently L_p-bounded distortions. In reality, the specific form of attack will rarely be known and adversaries are free to employ ... More
A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity DataAug 21 2019Publishing physical activity data can facilitate reproducible health-care research in several areas such as population health management, behavioral health research, and management of chronic health problems. However, publishing such data also brings ... More
Assessing the Impact of a User-Item Collaborative Attack on Class of UsersAug 21 2019Collaborative Filtering (CF) models lie at the core of most recommendation systems due to their state-of-the-art accuracy. They are commonly adopted in e-commerce and online services for their impact on sales volume and/or diversity, and their impact ... More
Evaluating Defensive Distillation For Defending Text Processing Neural Networks Against Adversarial ExamplesAug 21 2019Adversarial examples are artificially modified input samples which lead to misclassifications, while not being detectable by humans. These adversarial examples are a challenge for many tasks such as image and text classification, especially as research ... More
Detecting Fraudulent Accounts on Blockchain: A Supervised ApproachAug 21 2019Applications of blockchain technologies got a lot of attention in recent years. They exceed beyond exchanging value and being a substitute for fiat money and traditional banking system. Nevertheless, being able to exchange value on a blockchain is at ... More
Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy ProtectionAug 21 2019In this paper, we aim to understand the generalization properties of generative adversarial networks (GANs) from a new perspective of privacy protection. Theoretically, we prove that a differentially private learning algorithm used for training the GAN ... More
A Novel Privacy-Preserving Deep Learning Scheme without Using Cryptography ComponentAug 21 2019Recently, deep learning, which uses Deep Neural Networks (DNN), plays an important role in many fields. A secure neural network model with a secure training/inference scheme is indispensable to many applications. To accomplish such a task usually needs ... More
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial AttacksAug 21 2019Deep neural networks (DNNs) have demonstrated impressive performance on many challenging machine learning tasks. However, DNNs are vulnerable to adversarial inputs generated by adding maliciously crafted perturbations to the benign inputs. As a growing ... More
AdaCliP: Adaptive Clipping for Private SGDAug 20 2019Privacy preserving machine learning algorithms are crucial for learning models over user data to protect sensitive information. Motivated by this, differentially private stochastic gradient descent (SGD) algorithms for training machine learning models ... More
Realistic versus Rational Secret SharingAug 20 2019The study of Rational Secret Sharing initiated by Halpern and Teague regards the reconstruction of the secret in secret sharing as a game. It was shown that participants (parties) may refuse to reveal their shares and so the reconstruction may fail. Moreover, ... More
Securing HPC using Federated AuthenticationAug 20 2019Federated authentication can drastically reduce the overhead of basic account maintenance while simultaneously improving overall system security. Integrating with the user's more frequently used account at their primary organization both provides a better ... More
Eunomia: A Permissionless Parallel Chain Protocol Based on Logical ClockAug 20 2019The emerging parallel chain protocols represent a breakthrough to address the scalability of blockchain. By composing multiple parallel chain instances, the whole systems' throughput can approach the network capacity. How to coordinate different chains' ... More
Robust Graph Neural Network Against Poisoning Attacks via Transfer LearningAug 20 2019Graph neural networks (GNNs) are widely used in many applications. However, their robustness against adversarial attacks is criticized. Prior studies show that using unnoticeable modifications on graph topology or nodal features can significantly reduce ... More
PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion ManuscriptsAug 20 2019In this set of three companion manuscripts/articles, we unveil our new results on primality testing and reveal new primality testing algorithms enabled by those results. The results have been classified (and referred to) as lemmas/corollaries/claims whenever ... More
Memory Forensic Analysis of MQTT DevicesAug 20 2019Internet of Things is revolutionizing the current era with its vast usage in number of fields such as medicine, automation, home security, smart cities, etc. As these IoT devices' uses are increasing, the threat to its security and to its application ... More
Privacy-Preserving Support Vector Machine Computing Using Random Unitary TransformationAug 20 2019A privacy-preserving support vector machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as the unauthorized use of cloud ... More
MicroTEE: Designing TEE OS Based on the Microkernel ArchitectureAug 20 2019ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE) for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In such designs, device drivers, kernel services and kernel modules all run in the ... More
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited QueriesAug 19 2019In a black-box setting, the adversary only has API access to the target model and each query is expensive. Prior work on black-box adversarial examples follows one of two main strategies: (1) transfer attacks use white-box attacks on local models to find ... More
3D Marketplace: Distributed Attestation of 3D Designs on BlockchainAug 19 2019Additive manufacturing (AM), or 3D printing, is an emerging manufacturing technology that is expected to have far-reaching socioeconomic, environmental, and geopolitical implications. As the use of this technology increases, the need for validation of ... More
Boosting the Bounds of Symbolic QED for Effective Pre-Silicon Verification of Processor CoresAug 19 2019Existing techniques to ensure functional correctness and hardware trust during pre-silicon verification face severe limitations. In this work, we systematically leverage two key ideas: 1) Symbolic QED, a recent bug detection and localization technique ... More
Automated email Generation for Targeted Attacks using Natural LanguageAug 19 2019With an increasing number of malicious attacks, the number of people and organizations falling prey to social engineering attacks is proliferating. Despite considerable research in mitigation systems, attackers continually improve their modus operandi ... More
Weil descent and cryptographic trilinear mapsAug 19 2019It has recently been shown that cryptographic trilinear maps are sufficient for achieving indistinguishability obfuscation. In this paper we develop a method for constructing such maps on the Weil descent (restriction) of abelian varieties over finite ... More
Weil descent and cryptographic trilinear mapsAug 19 2019Aug 21 2019It has recently been shown that cryptographic trilinear maps are sufficient for achieving indistinguishability obfuscation. In this paper we develop a method for constructing such maps on the Weil descent (restriction) of abelian varieties over finite ... More
Undeniable signatures based on isogenies of supersingular hyperelliptic curvesAug 19 2019We present a proposal for an undeniable signature scheme based in supersingular hyperelliptic curves of genus 2.
A Kings Ransom for Encryption: Ransomware Classification using Augmented One-Shot Learning and Bayesian ApproximationAug 19 2019Newly emerging variants of ransomware pose an ever-growing threat to computer systems governing every aspect of modern life through the handling and analysis of big data. While various recent security-based approaches have focused on detecting and classifying ... More
PrivFT: Private and Fast Text Classification with Homomorphic EncryptionAug 19 2019Privacy and security have increasingly become a concern for computing services in recent years. In this work, we present an efficient method for Text Classification while preserving the privacy of the content, using Fully Homomorphic Encryption (FHE). ... More
Agent-based (BDI) modeling for automation of penetration testingAug 18 2019Penetration testing (or pentesting) is one of the widely used and important methodologies to assess the security of computer systems and networks. Traditional pentesting relies on the domain expert knowledge and requires considerable human effort all ... More
A Novel Kalman Filter Based Shilling Attack Detection AlgorithmAug 18 2019Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based recommendation systems are vulnerable to shilling attacks. Malicious users tend to increase or decrease ... More
Detection of Shilling Attack Based on T-distribution on the Dynamic Time Intervals in Recommendation SystemsAug 18 2019With the development of information technology and the Internet, recommendation systems have become an important means to solve the problem of information overload. However, recommendation system is greatly fragile as it relies heavily on behavior data ... More
Nesterov Accelerated Gradient and Scale Invariance for Improving Transferability of Adversarial ExamplesAug 17 2019Recent evidence suggests that deep neural networks (DNNs) are vulnerable to adversarial examples, which are crafted by adding human-imperceptible perturbations to legitimate examples. However, most of the existing adversarial attacks generate adversarial ... More
On the Adversarial Robustness of Subspace LearningAug 17 2019In this paper, we study the adversarial robustness of subspace learning problems. Different from the assumptions made in existing work on robust subspace learning where data samples are contaminated by gross sparse outliers or small dense noises, we consider ... More
FiFTy: Large-scale File Fragment Type Identification using Neural NetworksAug 16 2019We present FiFTy, a modern file type identification tool for memory forensics and data carving. In contrast to previous approaches based on hand-crafted features, we design a compact neural network architecture, which uses a trainable embedding space, ... More
Covert Computation in Self-Assembled CircuitsAug 16 2019Traditionally, computation within self-assembly models is hard to conceal because the self-assembly process generates a crystalline assembly whose computational history is inherently part of the structure itself. With no way to remove information from ... More
Adversarial point perturbations on 3D objectsAug 16 2019The importance of training robust neural network grows as 3D data is increasingly utilized in deep learning for vision tasks, like autonomous driving. We examine this problem from the perspective of the attacker, which is necessary in understanding how ... More
The Next 700 Policy Miners: A Universal Method for Building Policy MinersAug 16 2019A myriad of access control policy languages have been and continue to be proposed. The design of policy miners for each such language is a challenging task that has required specialized machine learning and combinatorial algorithms. We present an alternative ... More
Toward an Attribute-Based Digital Identity Modeling for Privacy PreservationAug 16 2019Digital identity is a multidimensional, multidisciplinary, and a complex concept. As a result, it is difficult to apprehend. Many contributions have proposed definitions and representations of digital identity. However, lots of them are either very generic ... More
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated ContentAug 16 2019Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security by providing additional verification steps. However, in practical ... More
Evaluating User Perception of Multi-Factor Authentication: A Systematic ReviewAug 16 2019Security vulnerabilities of traditional single factor authentication has become a major concern for security practitioners and researchers. To mitigate single point failures, new and technologically advanced Multi-Factor Authentication (MFA) tools have ... More
All About Phishing: Exploring User Research through a Systematic Literature ReviewAug 16 2019Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches, subsequent financial and productivity losses, and social ... More
A Reliable IoT-Based Embedded Health Care System for Diabetic PatientsAug 16 2019This paper introduces a reliable health care system for diabetic patients based on the Internet of Things technology. A diabetic health care system with a hardware implementation is presented. The proposed work employs Alaris 8100 infusion pump, Keil ... More
Quantum preprocessing for security enhancement in classical two-party computationAug 15 2019In classical two-party computation, a trusted initializer who prepares certain initial correlations can help make the bipartite computation secure. We propose two bipartite quantum protocols with possible aborts for approximately generating such bipartite ... More
Straggling for Covert Message Passing on Complete GraphsAug 15 2019We introduce a model for mobile, multi-agent information transfer that increases the communication covertness through a protocol which also increases the information transfer delay. Covertness is achieved in the presence of a warden who has the ability ... More
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequencesAug 15 2019Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for ... More
Systematization of Knowledge and Implementation: Short Identity-Based SignaturesAug 14 2019Identity-Based signature schemes are gaining a lot of popularity every day. Over the last decade, there has been a lot of schemes that have been proposed. Several libraries are there that implement identity-based cryptosystems that include identity-based ... More
Large-Scale-Exploit of GitHub Repository Metadata and Preventive MeasuresAug 14 2019When working with Git, a popular version-control system, email addresses are part of the metadata for each individual commit. When those commits are pushed to remote hosting services like GitHub, those email addresses become visible not only to fellow ... More
Network Reconnaissance and Vulnerability Excavation of Secure DDS SystemsAug 14 2019Distribution Service (DDS) is a realtime peer-to-peer protocol that serves as a scalable middleware between distributed networked systems found in many Industrial IoT domains such as automotive, medical, energy, and defense. Since the initial ratification ... More
A note on the Uniformed Patroller GameAug 14 2019Patrolling Games were introduced by Alpern, Morton and Papadaki (2011) to model the adversarial problem where a mobile Patroller can only thwart an attack at some location by visiting it during the attack period, which has a prescribed integer duration ... More
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network OnceAug 14 2019Modern deep neural networks are often vulnerable to adversarial samples. Based on the first optimization-based attacking method, many following methods are proposed to improve the attacking performance and speed. Recently, generation-based methods have ... More
Aleph: Efficient Atomic Broadcast in Asynchronous Networks with Byzantine NodesAug 14 2019The spectacular success of Bitcoin and Blockchain Technology in recent years has provided enough evidence that a widespread adoption of a common cryptocurrency system is not merely a distant vision, but a scenario that might come true in the near future. ... More
Breaking the encryption scheme of the Moscow internet voting systemAug 14 2019In September 2019, voters for the election at the Parliament of the city of Moscow will be allowed to use an internet voting system. The source code of it has been made available for public testing. The encryption used in this system is a variant of ElGamal ... More
Cyber-Physical Systems Resilience: State of the Art, Research Issues and Future TrendsAug 14 2019Ideally, full integration is needed between the Internet and Cyber-Physical Systems (CPSs). These systems should fulfil time-sensitive functions with variable levels of integration with their environment, incorporating data storage, computation, communications, ... More
Complexity of universal access structuresAug 14 2019An important parameter in a secret sharing scheme is the number of minimal qualified sets. Given this number, the universal access structure is the richest possible structure, namely the one in which there are one or more participants in every possible ... More
Side-Channel Aware FuzzingAug 14 2019Software testing is becoming a critical part of the development cycle of embedded devices, enabling vulnerability detection. A well-studied approach of software testing is fuzz-testing (fuzzing), during which mutated input is sent to an input-processing ... More
Stop the Open Data Bus, We Want to Get OffAug 14 2019The subject of this report is the re-identification of individuals in the Myki public transport dataset released as part of the Melbourne Datathon 2018. We demonstrate the ease with which we were able to re-identify ourselves, our co-travellers, and complete ... More
Interpretable Encrypted Searchable Neural NetworksAug 14 2019In cloud security, traditional searchable encryption (SE) requires high computation and communication overhead for dynamic search and update. The clever combination of machine learning (ML) and SE may be a new way to solve this problem. This paper proposes ... More
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the CloudAug 14 2019Security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt cloud services. One common approach to address the concerns is client-side encryption where data is encrypted on the client machine before ... More
Taking a Lesson from Quantum Particles for Statistical Data PrivacyAug 14 2019Privacy is under threat from artificial intelligence revolution fueled by unprecedented abundance of data. Differential privacy, an established candidate for privacy protection, is susceptible to adversarial attacks, acts conservatively, and leads to ... More
Risk-Limiting TalliesAug 14 2019Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one ... More
Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. IndistinguishabilityAug 14 2019Voting plays a central role in bringing crowd wisdom to collective decision making, meanwhile data privacy has been a common ethical/legal issue in eliciting preferences from individuals. This work studies the problem of aggregating individual's voting ... More
Trustable and Automated Machine Learning Running with Blockchain and Its ApplicationsAug 14 2019Machine learning algorithms learn from data and use data from databases that are mutable; therefore, the data and the results of machine learning cannot be fully trusted. Also, the machine learning process is often difficult to automate. A unified analytical ... More
Post-Incident Audits on Cyber Insurance DiscountsAug 13 2019We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity ... More
Exploit Prediction Scoring System (EPSS)Aug 13 2019Despite the massive investments in information security technologies and research over the past decades, the information security industry is still immature. In particular, the prioritization of remediation efforts within vulnerability management programs ... More
Blockchain Tree for eHealthAug 13 2019The design of access control mechanisms for healthcare systems is challenging: it must strike the right balance between permissions and restrictions. In this work, we propose a novel approach that is based on the Blockchain technology for storage patient ... More
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and DefensesAug 13 2019The blockchain technology is believed by many to be a game changer in many application domains, especially financial applications. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency ... More
A Simple and Intuitive Algorithm for Preventing Directory Traversal AttacksAug 13 2019With web applications becoming a preferred method of presenting graphical user interfaces to users, software vulnerabilities affecting web applications are becoming more and more prevalent and devastating. Some of these vulnerabilities, such as directory ... More
Private Rank Aggregation under Local Differential PrivacyAug 13 2019In typical collective decision-making scenarios, rank aggregation aims to combine different agents' preferences over the given alternatives into an aggregated ranking that agrees the most with all the preferences. However, since the aggregation procedure ... More
Adversarial Neural PruningAug 12 2019It is well known that neural networks are susceptible to adversarial perturbations and are also computationally and memory intensive which makes it difficult to deploy them in real-world applications where security and computation are constrained. In ... More
Identifying and characterizing ZMap scans: a cryptanalytic approachAug 12 2019Network scanning tools play a major role in Internet security. They are used by both network security researchers and malicious actors to identify vulnerable machines exposed on the Internet. ZMap is one of the most common probing tools for high-speed ... More
Identifying and characterizing ZMap scans: a cryptanalytic approachAug 12 2019Aug 13 2019Network scanning tools play a major role in Internet security. They are used by both network security researchers and malicious actors to identify vulnerable machines exposed on the Internet. ZMap is one of the most common probing tools for high-speed ... More
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted DataAug 12 2019In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that enables data scientists to deploy models with popular frameworks such as TensorFlow and PyTorch with minimal code changes. However, ... More
A Secure Dual-MCU Architecture for Robust Communication of IIoT DevicesAug 12 2019The Industrial Internet of Things (IIoT) has already become a part of our everyday life be it water supply, smart grid, or production, IIoT is everywhere. For example, factory operators want to know the current state of the production line. These new ... More
Douglas-Quaid -- Open Source Image Matching LibraryAug 12 2019Security analysts need to classify, search and correlate numerous images. Automatic classification tools improve the efficiency of such tasks. However, no open-source and turnkey library was found able to reach this goal. The present paper introduces ... More
Retrofitting a two-way peg between blockchainsAug 12 2019In December 2015, a bounty emerged to establish both reliable communication and secure transfer of value between the Dogecoin and Ethereum blockchains. This prized "Dogethereum bridge" would allow parties to "lock" a DOGE coin on Dogecoin and in exchange ... More
Interactive coin offeringsAug 12 2019Ethereum has emerged as a dynamic platform for exchanging cryptocurrency tokens. While token crowdsales cannot simultaneously guarantee buyers both certainty of valuation and certainty of participation, we show that if each token buyer specifies a desired ... More
Discounted Differential Privacy: Privacy of Evolving Datasets over an Infinite HorizonAug 12 2019In this paper, we define discounted differential privacy, as an alternative to (conventional) differential privacy, to investigate privacy of evolving datasets, containing time series over an unbounded horizon. Evolving datasets arise in energy systems ... More
A scalable verification solution for blockchainsAug 12 2019Bitcoin and Ethereum, whose miners arguably collectively comprise the most powerful computational resource in the history of mankind, offer no more power for processing and verifying transactions than a typical smart phone. The system described herein ... More
Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node DevicesAug 11 2019Communication between sensors, actors and Programmable Logic Controllers (PLCs) in industrial systems moves from two-wire field buses to IP-based protocols such as Modbus/TCP. This increases the attack surface because the IP-based network is often reachable ... More
A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical InterconnectsAug 11 2019Split manufacturing (SM) and layout camouflaging (LC) are two promising techniques to obscure integrated circuits (ICs) from malicious entities during and after manufacturing. While both techniques enable protecting the intellectual property (IP) of ICs, ... More
Digitally Mutating NV-FPGAs into Physically Clone-Resistant UnitsAug 11 2019The concept of Secret Unknown Ciphers (SUCs) was introduced a decade ago as a new visionary concept without devising practical real-world examples. The major contribution of this work is to show the feasibility of "self-mutating" unknown cipher-modules ... More
RISC-V: #AlphanumericShellcodingAug 10 2019We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTMAug 10 2019With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game client and server-side. Among various classification ... More
Slide Reduction, Revisited---Filling the Gaps in SVP ApproximationAug 10 2019We show how to generalize Gama and Nguyen's slide reduction algorithm [STOC '08] for solving the approximate Shortest Vector Problem over lattices (SVP). As a result, we show the fastest provably correct algorithm for $\delta$-approximate SVP for all ... More
Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-ChooseAug 10 2019As far as we know, the literature on secure computation from cut-and-choose has focused on achieving computational security against malicious adversaries. It is unclear whether the idea of cut-and-choose can be adapted to secure computation with information-theoretic ... More
Differentially Private Aggregated Mobility Data Publication Using Moving CharacteristicsAug 10 2019With the rapid development of GPS enabled devices (smartphones) and location-based applications, location privacy is increasingly concerned. Intuitively, it is widely believed that location privacy can be preserved by publishing aggregated mobility data, ... More
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big DataAug 10 2019Cloud service providers offer a low-cost and convenient solution to host unstructured data. However, cloud services act as third-party solutions and do not provide control of the data to users. This has raised security and privacy concerns for many organizations ... More
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)Aug 09 2019The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing ... More
Good Motive but Bad Design: Why ARM MPU Has Become an Outcast in Embedded SystemsAug 09 2019As more and more embedded devices are connected to the Internet, leading to the emergence of Internet-of-Things (IoT), previously less tested (and insecure) devices are exposed to miscreants. To prevent them from being compromised, the memory protection ... More
Emotionless: Privacy-Preserving Speech Analysis for Voice AssistantsAug 09 2019Voice-enabled interactions provide more human-like experiences in many popular IoT systems. Cloud-based speech analysis services extract useful information from voice input using speech recognition techniques. The voice signal is a rich resource that ... More
On the Adversarial Robustness of Neural Networks without Weight TransportAug 09 2019Neural networks trained with backpropagation, the standard algorithm of deep learning which uses weight transport, are easily fooled by existing gradient-based adversarial attacks. This class of attacks are based on certain small perturbations of the ... More
Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challengesAug 09 2019BCIs have significantly improved the patients' quality of life by restoring damaged hearing, sight and movement capabilities. After evolving their application scenarios, from medicine to entertainment, the trend of these interfaces is breaking new frontiers ... More
Making GDPR Usable: A Model to Support Usability Evaluations of PrivacyAug 09 2019We introduce a new perspective on the evaluation of privacy, where rights of the data subjects, privacy principles, and usability criteria are intertwined. This new perspective is visually represented through a cube where each of its three axes of variability ... More
Carl-Hauser -- Open Source Image Matching Algorithms Benchmarking FrameworkAug 09 2019Security analysts need to classify, search and correlate numerous images. Automatic classification tools improve the efficiency of such tasks. Many Image-Matching algorithms are presented in the litterature. The present paper introduces and provides a ... More
Privacy-Aware Distributed Mobility Choice Modelling over BlockchainAug 09 2019Aug 12 2019A generalized distributed tool for mobility choice modelling is presented, where participants do not share personal raw data, while all computations are done locally. Participants use Blockchain based Smart Mobility Data-market (BSMD), where all transactions ... More
Privacy-Aware Distributed Mobility Choice Modelling over BlockchainAug 09 2019A generalized distributed tool for mobility choice modelling is presented, where participants do not share personal raw data, while all computations are done locally. Participants use Blockchain based Smart Mobility Data-market (BSMD), where all transactions ... More
Tracking Temporal Evolution of Network Activity for Botnet DetectionAug 09 2019Botnets are becoming increasingly prevalent as the primary enabling technology in a variety of malicious campaigns such as email spam, click fraud, distributed denial-of-service (DDoS) attacks, and cryptocurrency mining. Botnet technology has continued ... More
Composable and Finite Computational Security of Quantum Message TransmissionAug 09 2019Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known ... More
Advanced profiling for probabilistic Prime+Probe attacks and covert channels in ScatterCacheAug 09 2019Timing channels in cache hierarchies are an important enabler in many microarchitectural attacks. ScatterCache (USENIX 2019) is a protected cache architecture that randomizes the address-to-index mapping with a keyed cryptographic function, aiming to ... More