Skip to main content

Showing 1–23 of 23 results for author: Böhme, R

.
  1. arXiv:2406.15206  [pdf, other

    cs.CR cs.CV

    Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications

    Authors: Benedikt Lorch, Rainer Böhme

    Abstract: The orientation in which a source image is captured can affect the resulting security in downstream applications. One reason for this is that many state-of-the-art methods in media security assume that image statistics are similar in the horizontal and vertical directions, allowing them to reduce the number of features (or trainable weights) by merging coefficients. We show that this artificial sy… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2402.09776  [pdf, other

    cs.GT cs.MA

    Strategic Vote Timing in Online Elections With Public Tallies

    Authors: Aviv Yaish, Svetlana Abramova, Rainer Böhme

    Abstract: We study the effect of public tallies on online elections, in a setting where voting is costly and voters are allowed to strategically time their votes. The strategic importance of choosing \emph{when} to vote arises when votes are public, such as in online event scheduling polls (e.g., Doodle), or in blockchain governance mechanisms. In particular, there is a tension between voting early to influ… ▽ More

    Submitted 18 February, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: 44 pages, 4 figures, 1 table

  3. arXiv:2308.00375  [pdf, other

    cs.CR

    Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case

    Authors: Svetlana Abramova, Rainer Böhme

    Abstract: Media reports show an alarming increase of data breaches at providers of cybersecurity products and services. Since the exposed records may reveal security-relevant data, such incidents cause undue burden and create the risk of re-victimization to individuals whose personal data gets exposed. In pursuit of examining a broad spectrum of the downstream effects on victims, we surveyed 104 persons who… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

    Comments: Accepted to appear at the 32nd USENIX Security Symposium (USENIX Security '23)

  4. arXiv:2204.00034  [pdf, other

    cs.CR

    Parallel Proof-of-Work with Concrete Bounds

    Authors: Patrik Keller, Rainer Böhme

    Abstract: Authorization is challenging in distributed systems that cannot rely on the identification of nodes. Proof-of-work offers an alternative gate-kee** mechanism, but its probabilistic nature is incompatible with conventional security definitions. Recent related work establishes concrete bounds for the failure probability of Bitcoin's sequential proof-of-work mechanism. We propose a family of state… ▽ More

    Submitted 19 September, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

  5. arXiv:2109.14286  [pdf, other

    cs.HC

    Conflicting Privacy Preference Signals in the Wild

    Authors: Maximilian Hils, Daniel W. Woods, Rainer Böhme

    Abstract: Privacy preference signals allow users to express preferences over how their personal data is processed. These signals become important in determining privacy outcomes when they reference an enforceable legal basis, as is the case with recent signals such as the Global Privacy Control and the Transparency & Consent Framework. However, the coexistence of multiple privacy preference signals creates… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  6. arXiv:2109.10958  [pdf, other

    q-fin.GN cs.CR econ.GN q-fin.PM

    Who are the arbitrageurs? Empirical evidence from Bitcoin traders in the Mt. Gox exchange platform

    Authors: Pietro Saggese, Alessandro Belmonte, Nicola Dimitri, Angelo Facchini, Rainer Böhme

    Abstract: We mine the leaked history of trades on Mt. Gox, the dominant Bitcoin exchange from 2011 to early 2014, to detect the triangular arbitrage activity conducted within the platform. The availability of user identifiers per trade allows us to focus on the historical record of 440 investors, detected as arbitrageurs, and consequently to describe their trading behavior. We begin by showing that a consid… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  7. arXiv:2106.07303  [pdf, other

    cs.LG cs.CR cs.MM

    iNNformant: Boundary Samples as Telltale Watermarks

    Authors: Alexander Schlögl, Tobias Kupek, Rainer Böhme

    Abstract: Boundary samples are special inputs to artificial neural networks crafted to identify the execution environment used for inference by the resulting output label. The paper presents and evaluates algorithms to generate transparent boundary samples. Transparency refers to a small perceptual distortion of the host signal (i.e., a natural input sample). For two established image classifiers, ResNet on… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: Will be presented at IH&MMSEC '21

  8. More Real than Real: A Study on Human Visual Perception of Synthetic Faces

    Authors: Federica Lago, Cecilia Pasquini, Rainer Böhme, Hélène Dumont, Valérie Goffaux, Giulia Boato

    Abstract: Deep fakes became extremely popular in the last years, also thanks to their increasing realism. Therefore, there is the need to measures human's ability to distinguish between real and synthetic face images when confronted with cutting-edge creation technologies. We describe the design and results of a perceptual experiment we have conducted, where a wide and diverse group of volunteers has been e… ▽ More

    Submitted 20 October, 2021; v1 submitted 14 June, 2021; originally announced June 2021.

  9. Privacy Preference Signals: Past, Present and Future

    Authors: Maximilian Hils, Daniel W. Woods, Rainer Böhme

    Abstract: Privacy preference signals are digital representations of how users want their personal data to be processed. Such signals must be adopted by both the sender (users) and intended recipients (data processors). Adoption represents a coordination problem that remains unsolved despite efforts dating back to the 1990s. Browsers implemented standards like the Platform for Privacy Preferences (P3P) and D… ▽ More

    Submitted 14 July, 2021; v1 submitted 4 June, 2021; originally announced June 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies 2021

  10. arXiv:2102.00921  [pdf, ps, other

    cs.LG cs.CR cs.MM

    Forensicability of Deep Neural Network Inference Pipelines

    Authors: Alexander Schlögl, Tobias Kupek, Rainer Böhme

    Abstract: We propose methods to infer properties of the execution environment of machine learning pipelines by tracing characteristic numerical deviations in observable outputs. Results from a series of proof-of-concept experiments obtained on local and cloud-hosted machines give rise to possible forensic applications, such as the identification of the hardware platform used to produce deep neural network p… ▽ More

    Submitted 18 February, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

    Comments: Accepted at ICASSP 2021

  11. arXiv:2012.03706  [pdf, other

    cs.CR

    Pricing Security in Proof-of-Work Systems

    Authors: George Bissias, Rainer Böhme, David Thibodeau, Brian N. Levine

    Abstract: A key component of security in decentralized blockchains is proof of opportunity cost among block producers. In the case of proof-of-work (PoW), currently used by the most prominent systems, the cost is due to spent computation. In this paper, we characterize the security investment of miners in terms of its cost in fiat money. This enables comparison of security allocations across PoW blockchains… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  12. arXiv:2005.03535  [pdf, ps, other

    cs.CR cs.CY

    Collaborative Deanonymization

    Authors: Patrik Keller, Martin Florian, Rainer Böhme

    Abstract: Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign users potentially provide anonymity to bad actors. We propose overlay protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner. Cryptocurrencies can adopt this approach to enable prosecution of publicly recognized crimes.… ▽ More

    Submitted 26 February, 2021; v1 submitted 7 May, 2020; originally announced May 2020.

  13. arXiv:2001.02564  [pdf, other

    cs.NI cs.CR

    Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069

    Authors: Maximilian Hils, Rainer Böhme

    Abstract: TR-069 is a standard for the remote management of end-user devices by service providers. Despite being implemented in nearly a billion devices, almost no research has been published on the security and privacy aspects of TR-069. The first contribution of this paper is a study of the TR-069 ecosystem and techniques to inspect TR-069 communication. We find that the majority of analyzed providers do… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

    Comments: Full Version. Abridged Conference Version to be published (ACNS 2019)

  14. arXiv:1910.08820  [pdf, ps, other

    cs.CR cs.GT

    Rationality is Self-Defeating in Permissionless Systems

    Authors: Bryan Ford, Rainer Böhme

    Abstract: We outline a metacircular argument explaining why it is rational to be irrational when attacking open-world decentralized systems, and why systems whose security depend on rationality assumptions are insecure.

    Submitted 19 October, 2019; originally announced October 2019.

    Comments: First posted on September 23, 2019 at https://bford.info/2019/09/23/rational/

  15. arXiv:1908.10048  [pdf, other

    cs.HC cs.CR cs.CY

    Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR

    Authors: Dominique Machuletz, Rainer Böhme

    Abstract: The European Union's General Data Protection Regulation (GDPR) requires websites to ask for consent to the use of cookies for \emph{specific purposes}. This enlarges the relevant design space for consent dialogs. Websites could try to maximize click-through rates and positive consent decision, even at the risk of users agreeing to more purposes than intended. We evaluate a practice observed on pop… ▽ More

    Submitted 2 March, 2020; v1 submitted 27 August, 2019; originally announced August 2019.

    Journal ref: Proceedings on Privacy Enhancing Technologies 2020

  16. arXiv:1907.13531  [pdf, other

    cs.CR cs.DC

    HotPoW: Finality from Proof-of-Work Quorums

    Authors: Patrik Keller, Rainer Böhme

    Abstract: A fundamental conflict of many proof-of-work systems is that they want to achieve inclusiveness and security at the same time. We analyze and resolve this conflict with a theory of proof-of-work quorums, which enables a new bridge between Byzantine and Nakamoto consensus. The theory yields stochastic uniqueness of quorums as a function of a security parameter. We employ the theory in HotPoW, a sca… ▽ More

    Submitted 21 February, 2020; v1 submitted 31 July, 2019; originally announced July 2019.

  17. arXiv:1907.12383  [pdf, other

    cs.CR cs.DS cs.SE

    The Operational Cost of Ethereum Airdrops

    Authors: Michael Fröwis, Rainer Böhme

    Abstract: Efficient transfers to many recipients present a host of issues on Ethereum. First, accounts are identified by long and incompressible constants. Second, these constants have to be stored and communicated for each payment. Third, the standard interface for token transfers does not support lists of recipients, adding repeated communication to the overhead. Since Ethereum charges resource usage, eve… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

  18. arXiv:1905.02613  [pdf

    q-bio.NC

    Affective touch communication in close adult relationships

    Authors: Sarah McIntyre, Athanasia Moungou, Rebecca Boehme, Peder M. Isager, Frances Lau, Ali Israr, Ellen A. Lumpkin, Freddy Abnousi, Håkan Olausson

    Abstract: Inter-personal touch is a powerful aspect of social interaction that we expect to be particularly important for emotional communication. We studied the capacity of closely acquainted humans to signal the meaning of several word cues (e.g. gratitude, sadness) using touch sensation alone. Participants communicated all cues with above chance performance. We show that emotionally close people can accu… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

    Comments: Technical paper accepted for presentation at World Haptics 2019. Data and materials available: https://doi.org/10.17605/OSF.IO/7XRWC

  19. arXiv:1811.11645  [pdf, other

    cs.CR

    Detecting Token Systems on Ethereum

    Authors: Michael Fröwis, Andreas Fuchs, Rainer Böhme

    Abstract: We propose and compare two approaches to identify smart contracts as token systems by analyzing their public bytecode. The first approach symbolically executes the code in order to detect token systems by their characteristic behavior of updating internal accounts. The second approach serves as a comparison base and exploits the common interface of ERC-20, the most popular token standard. We prese… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

  20. arXiv:1803.03613  [pdf, ps, other

    cs.CR

    Detecting Adversarial Examples - A Lesson from Multimedia Forensics

    Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme

    Abstract: Adversarial classification is the task of performing robust classification in the presence of a strategic attacker. Originating from information hiding and multimedia forensics, adversarial classification recently received a lot of attention in a broader security context. In the domain of machine learning-based image classification, adversarial classification can be interpreted as detecting so-cal… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: Submitted to EUSIPCO 2018, Special Session on Adversarial Multimedia Forensics

  21. arXiv:1708.06693  [pdf, other

    cs.CR

    Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Authors: Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten

    Abstract: Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. {\em Shared} hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical analysis of the distribution of web security featu… ▽ More

    Submitted 22 August, 2017; originally announced August 2017.

  22. arXiv:1702.01624  [pdf, other

    cs.CR

    Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse

    Authors: Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczyński, Michel Van Eeten

    Abstract: Internet security and technology policy research regularly uses technical indicators of abuse in order to identify culprits and to tailor mitigation strategies. As a major obstacle, readily available data are often misaligned with actual information needs. They are subject to measurement errors relating to observation, aggregation, attribution, and various sources of heterogeneity. More precise in… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

  23. arXiv:0905.0416  [pdf, ps, other

    cond-mat.mtrl-sci

    $T_1$- and $T_2$-spin relaxation time limitations of phosphorous donor electrons near crystalline silicon to silicon dioxide interface defects

    Authors: S. -Y. Paik, S. -Y. Lee, W. J. Baker, D. R. McCamey. C. Boehme

    Abstract: A study of donor electron spins and spin--dependent electronic transitions involving phosphorous ($^{31}$P) atoms in proximity of the (111) oriented crystalline silicon (c-Si) to silicon dioxide (SiO$_{2}$) interface is presented for [$^{31}$P] = 10$^{15}$ $\mathrm{cm}^{-3}$ and [$^{31}$P] = 10$^{16}$ $\mathrm{cm}^{-3}$ at about liquid $^4$He temperatures ($T = 5$ $\mathrm{K} - 15$ $\mathrm{K}$)… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.