Skip to main content

Showing 1–13 of 13 results for author: Christodorescu, M

.
  1. arXiv:2402.05980  [pdf, other

    cs.SE cs.AI cs.LG cs.PL

    Do Large Code Models Understand Programming Concepts? A Black-box Approach

    Authors: Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha

    Abstract: Large Language Models' success on text generation has also made them better at code generation and coding tasks. While a lot of work has demonstrated their remarkable performance on tasks such as code completion and editing, it is still unclear as to why. We help bridge this gap by exploring to what degree auto-regressive models understand the logical constructs of the underlying programs. We prop… ▽ More

    Submitted 23 February, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  2. arXiv:2310.03285  [pdf, other

    cs.LG cs.CR

    Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

    Authors: Ahmed Abusnaina, Yizhen Wang, Sunpreet Arora, Ke Wang, Mihai Christodorescu, David Mohaisen

    Abstract: Toward robust malware detection, we explore the attack surface of existing malware detection systems. We conduct root-cause analyses of the practical binary-level black-box adversarial malware examples. Additionally, we uncover the sensitivity of volatile features within the detection engines and exhibit their exploitability. Highlighting volatile information channels within the software, we intro… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 12 pages

  3. Identifying and Mitigating the Security Risks of Generative AI

    Authors: Clark Barrett, Brad Boyd, Elie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang

    Abstract: Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, such as large language models (LLMs) and diffusion models, have shown remarkable capabilities (e.g., in-context learning, code-completion, and text-to-image generation and editing). However, GenAI can be used just as well… ▽ More

    Submitted 28 December, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Journal ref: Foundations and Trends in Privacy and Security 6 (2023) 1-52

  4. arXiv:2302.13525  [pdf, other

    cs.CR

    Formal Analysis of the API Proxy Problem

    Authors: Somesh Jha, Mihai Christodorescu, Anh Pham

    Abstract: Implementing a security mechanism on top of APIs requires clear understanding of the semantics of each API, to ensure that security entitlements are enforced consistently and completely across all APIs that could perform the same function for an attacker. Unfortunately, APIs are not designed to be "semantically orthogonal" and they often overlap, for example by offering different performance point… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  5. arXiv:2211.13195  [pdf, other

    cs.CR

    Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

    Authors: Mihai Christodorescu, Maliheh Shirvanian, Shams Zawoad

    Abstract: Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve suc… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

  6. arXiv:2109.12194  [pdf

    cs.CR cs.DC

    Universal Payment Channels: An Interoperability Platform for Digital Currencies

    Authors: Mihai Christodorescu, Erin English, Wanyun Catherine Gu, David Kreissman, Ranjit Kumaresan, Mohsen Minaei, Srinivasan Raghuraman, Cuy Sheffield, Arjuna Wijeyekoon, Mahdi Zamani

    Abstract: With the innovation of distributed ledger technology (DLT), often known as blockchain technology, there has been significant growth of digital tokens in the form of cryptocurrencies, stablecoins, and central bank digital currencies. As the number of DLT networks increases, each with varying design characteristics, the likelihood that transacting parties are on the same network decreases. Thus, it… ▽ More

    Submitted 28 September, 2021; v1 submitted 24 September, 2021; originally announced September 2021.

  7. arXiv:2012.08003  [pdf, other

    cs.CR cs.DC

    Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies

    Authors: Mihai Christodorescu, Wanyun Catherine Gu, Ranjit Kumaresan, Mohsen Minaei, Mustafa Ozdayi, Benjamin Price, Srinivasan Raghuraman, Muhammad Saad, Cuy Sheffield, Minghua Xu, Mahdi Zamani

    Abstract: Digital payments traditionally rely on online communications with several intermediaries such as banks, payment networks, and payment processors in order to authorize and process payment transactions. While these communication networks are designed to be highly available with continuous uptime, there may be times when an end-user experiences little or no access to network connectivity. The growi… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 21 pages

  8. arXiv:2007.00772  [pdf, other

    cs.LG cs.CR stat.ML

    Robust and Accurate Authorship Attribution via Program Normalization

    Authors: Yizhen Wang, Mohannad Alhanahnah, Ke Wang, Mihai Christodorescu, Somesh Jha

    Abstract: Source code attribution approaches have achieved remarkable accuracy thanks to the rapid advances in deep learning. However, recent studies shed light on their vulnerability to adversarial attacks. In particular, they can be easily deceived by adversaries who attempt to either create a forgery of another author or to mask the original author. To address these emerging issues, we formulate this sec… ▽ More

    Submitted 25 February, 2022; v1 submitted 1 July, 2020; originally announced July 2020.

  9. arXiv:1911.09222  [pdf, other

    cs.CR

    Privacy-Preserving Payment Splitting

    Authors: Saba Eskandarian, Mihai Christodorescu, Payman Mohassel

    Abstract: Widely used payment splitting apps allow members of a group to keep track of debts between members by sending charges for expenses paid by one member on behalf of others. While offering a great deal of convenience, these apps gain access to sensitive data on users' financial transactions. In this paper, we present a payment splitting app that hides all transaction data within a group from the serv… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

  10. arXiv:1908.00592  [pdf, other

    cs.CR

    The House That Knows You: User Authentication Based on IoT Data

    Authors: Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh

    Abstract: Home-based Internet of Things (IoT) devices have gained in popularity and many households have become 'smart' by using devices such as smart sensors, locks, and voice-based assistants. Traditional authentication methods such as passwords, biometrics or multi-factor (using SMS or email) are either not applicable in the smart home setting, or they are inconvenient as they break the natural flow of i… ▽ More

    Submitted 27 December, 2021; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 11 pages, 5 figures

  11. arXiv:1905.11445  [pdf, other

    cs.LG cs.PL stat.ML

    COSET: A Benchmark for Evaluating Neural Program Embeddings

    Authors: Ke Wang, Mihai Christodorescu

    Abstract: Neural program embedding can be helpful in analyzing large software, a task that is challenging for traditional logic-based program analyses due to their limited scalability. A key focus of recent machine-learning advances in this area is on modeling program semantics instead of just syntax. Unfortunately evaluating such advances is not obvious, as program semantics does not lend itself to straigh… ▽ More

    Submitted 27 May, 2019; originally announced May 2019.

    Comments: 8 Pages

  12. arXiv:1709.04569  [pdf, other

    cs.CR cs.DC cs.GT

    REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways

    Authors: Abhinav Aggarwal, Mahdi Zamani, Mihai Christodorescu

    Abstract: Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. How can the server block the attack packets through this gateway? In this paper, we introduce REMOTEGATE, a trustworthy mechanism for allowing any part… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: Working manuscript

  13. arXiv:1501.05963  [pdf, other

    cs.CR

    Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems

    Authors: Man-Ki Yoon, Sibin Mohan, Jaesik Choi, Mihai Christodorescu, Lui Sha

    Abstract: Existing techniques used for intrusion detection do not fully utilize the intrinsic properties of embedded systems. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal execu… ▽ More

    Submitted 2 August, 2015; v1 submitted 23 January, 2015; originally announced January 2015.