Skip to main content

Showing 1–6 of 6 results for author: Bahramali, A

.
  1. arXiv:2309.10147  [pdf, other

    cs.CR cs.LG

    Realistic Website Fingerprinting By Augmenting Network Trace

    Authors: Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr

    Abstract: Website Fingerprinting (WF) is considered a major threat to the anonymity of Tor users (and other anonymity systems). While state-of-the-art WF techniques have claimed high attack accuracies, e.g., by leveraging Deep Neural Networks (DNN), several recent works have questioned the practicality of such WF attacks in the real world due to the assumptions made in the design and evaluation of these att… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  2. arXiv:2301.09767  [pdf, other

    cs.LG cs.AI cs.CL

    Truveta Mapper: A Zero-shot Ontology Alignment Framework

    Authors: Mariyam Amir, Murchana Baruah, Mahsa Eslamialishah, Sina Ehsani, Alireza Bahramali, Sadra Naddaf-Sh, Saman Zarandioon

    Abstract: In this paper, a new perspective is suggested for unsupervised Ontology Matching (OM) or Ontology Alignment (OA) by treating it as a translation task. Ontologies are represented as graphs, and the translation is performed from a node in the source ontology graph to a path in the target ontology graph. The proposed framework, Truveta Mapper (TM), leverages a multi-task sequence-to-sequence transfor… ▽ More

    Submitted 21 August, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  3. arXiv:2102.00918  [pdf, other

    cs.CR

    Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems

    Authors: Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Deep Neural Networks (DNNs) have become prevalent in wireless communication systems due to their promising performance. However, similar to other DNN-based applications, they are vulnerable to adversarial examples. In this work, we propose an input-agnostic, undetectable, and robust adversarial attack against DNN-based wireless communication systems in both white-box and black-box scenarios. We de… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  4. Practical Traffic Analysis Attacks on Secure Messaging Applications

    Authors: Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become extremely popular in recent years. Unfortunately, such IM services have been targets of continuous governmental surveillance and censorship, as these services are home to public and private communication channels on socially and politically sensitive topics. To protect their clients, popular IM services deploy stat… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2020

  5. arXiv:2002.06495  [pdf, other

    cs.CR cs.LG

    Blind Adversarial Network Perturbations

    Authors: Milad Nasr, Alireza Bahramali, Amir Houmansadr

    Abstract: Deep Neural Networks (DNNs) are commonly used for various traffic analysis problems, such as website fingerprinting and flow correlation, as they outperform traditional (e.g., statistical) techniques by large margins. However, deep neural networks are known to be vulnerable to adversarial examples: adversarial inputs to the model that get labeled incorrectly by the model due to small adversarial p… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

  6. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

    Authors: Milad Nasr, Alireza Bahramali, Amir Houmansadr

    Abstract: Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation techniques are considered to be ineffective and unreliable in linking Tor flows when applied at a large scale, i.e., they impose high rates of false positive error rates or require impractically long flow observations to… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.