Skip to main content

Showing 1–15 of 15 results for author: Eykholt, K

.
  1. arXiv:2308.01840  [pdf, other

    cs.LG cs.AI cs.CR

    URET: Universal Robustness Evaluation Toolkit (for Evasion)

    Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin

    Abstract: Machine learning models are known to be vulnerable to adversarial evasion attacks as illustrated by image classification models. Thoroughly understanding such attacks is critical in order to ensure the safety and robustness of critical AI tasks. However, most evasion attacks are difficult to deploy against a majority of AI systems because they have focused on image domain with only few constraints… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

    Comments: Accepted at USENIX '23

  2. arXiv:2210.14283  [pdf, other

    cs.LG cs.CR cs.CV

    Accelerating Certified Robustness Training via Knowledge Transfer

    Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati

    Abstract: Training deep neural network classifiers that are certifiably robust against adversarial attacks is critical to ensuring the security and reliability of AI-controlled systems. Although numerous state-of-the-art certified training methods have been developed, they are computationally expensive and scale poorly with respect to both dataset and network complexity. Widespread usage of certified traini… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

    Comments: NeurIPS '22 Camera Ready version (with appendix)

  3. arXiv:2210.12952  [pdf, other

    cs.LG cs.AI cs.CR

    Ares: A System-Oriented Wargame Framework for Adversarial ML

    Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati

    Abstract: Since the discovery of adversarial attacks against machine learning models nearly a decade ago, research on adversarial machine learning has rapidly evolved into an eternal war between defenders, who seek to increase the robustness of ML models against adversarial attacks, and adversaries, who seek to develop better attacks capable of weakening or defeating these defenses. This domain, however, ha… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: Presented at the DLS Workshop at S&P 2022

  4. arXiv:2202.09994  [pdf, other

    cs.LG cs.CR cs.CV

    Transferring Adversarial Robustness Through Robust Representation Matching

    Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati

    Abstract: With the widespread use of machine learning, concerns over its security and reliability have become prevalent. As such, many have developed defenses to harden neural networks against adversarial examples, imperceptibly perturbed inputs that are reliably misclassified. Adversarial training in which adversarial examples are generated and used during training is one of the few known defenses able to… ▽ More

    Submitted 5 May, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: To appear at USENIX Security '22. Updated version with artifact evaluation badges and appendix

  5. arXiv:2105.09400  [pdf, other

    cs.CR cs.LG

    Separation of Powers in Federated Learning

    Authors: Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma

    Abstract: Federated Learning (FL) enables collaborative training among mutually distrusting parties. Model updates, rather than training data, are concentrated and fused in a central aggregation server. A key security challenge in FL is that an untrustworthy or compromised aggregation process might lead to unforeseeable information leakage. This challenge is especially acute due to recently demonstrated att… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

  6. arXiv:2012.07887  [pdf, other

    cs.LG

    Adaptive Verifiable Training Using Pairwise Class Similarity

    Authors: Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian Molloy

    Abstract: Verifiable training has shown success in creating neural networks that are provably robust to a given amount of noise. However, despite only enforcing a single robustness criterion, its performance scales poorly with dataset complexity. On CIFAR10, a non-robust LeNet model has a 21.63% error rate, while a model created using verifiable training and a L-infinity robustness criterion of 8/255, has a… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: Acceped at AAAI21

  7. arXiv:1911.11946  [pdf, other

    cs.CV cs.CR cs.LG

    Can Attention Masks Improve Adversarial Robustness?

    Authors: Pratik Vaishnavi, Tianji Cong, Kevin Eykholt, Atul Prakash, Amir Rahmati

    Abstract: Deep Neural Networks (DNNs) are known to be susceptible to adversarial examples. Adversarial examples are maliciously crafted inputs that are designed to fool a model, but appear normal to human beings. Recent work has shown that pixel discretization can be used to make classifiers for MNIST highly robust to adversarial examples. However, pixel discretization fails to provide significant protectio… ▽ More

    Submitted 21 December, 2019; v1 submitted 26 November, 2019; originally announced November 2019.

    Comments: Version presented at AAAI-20 workshop on Engineering Dependable and Secure Machine Learning Systems (EDSMLS)

  8. arXiv:1909.05921  [pdf, other

    cs.CV cs.LG

    Towards Model-Agnostic Adversarial Defenses using Adversarially Trained Autoencoders

    Authors: Pratik Vaishnavi, Kevin Eykholt, Atul Prakash, Amir Rahmati

    Abstract: Adversarial machine learning is a well-studied field of research where an adversary causes predictable errors in a machine learning algorithm through precise manipulation of the input. Numerous techniques have been proposed to harden machine learning algorithms and mitigate the effect of adversarial attacks. Of these techniques, adversarial training, which augments the training data with adversari… ▽ More

    Submitted 29 March, 2020; v1 submitted 12 September, 2019; originally announced September 2019.

  9. arXiv:1905.10904  [pdf, other

    cs.LG stat.ML

    Robust Classification using Robust Feature Augmentation

    Authors: Kevin Eykholt, Swati Gupta, Atul Prakash, Amir Rahmati, Pratik Vaishnavi, Haizhong Zheng

    Abstract: Existing deep neural networks, say for image classification, have been shown to be vulnerable to adversarial images that can cause a DNN misclassification, without any perceptible change to an image. In this work, we propose shock absorbing robust features such as binarization, e.g., rounding, and group extraction, e.g., color or shape, to augment the classification pipeline, resulting in more rob… ▽ More

    Submitted 17 September, 2019; v1 submitted 26 May, 2019; originally announced May 2019.

  10. arXiv:1812.06626  [pdf, other

    cs.LG cs.CR stat.ML

    Designing Adversarially Resilient Classifiers using Resilient Feature Engineering

    Authors: Kevin Eykholt, Atul Prakash

    Abstract: We provide a methodology, resilient feature engineering, for creating adversarially resilient classifiers. According to existing work, adversarial attacks identify weakly correlated or non-predictive features learned by the classifier during training and design the adversarial noise to utilize these features. Therefore, highly predictive features should be used first during classification in order… ▽ More

    Submitted 17 December, 2018; originally announced December 2018.

  11. arXiv:1807.07769  [pdf, other

    cs.CR cs.CV cs.LG

    Physical Adversarial Examples for Object Detectors

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, Dawn Song

    Abstract: Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs to make incorrect predictions. Recent work has shown that these attacks generalize to the physical domain, to create perturbations on physical objects that fool image classifiers under a variety of real-world conditions. Such attacks pose a risk to deep learning models used in safety-criti… ▽ More

    Submitted 5 October, 2018; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: This paper is the extended version of the USENIX WOOT 2018 version

  12. arXiv:1801.04609  [pdf, other

    cs.CR

    Tyche: Risk-Based Permissions for Smart Home Platforms

    Authors: Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash

    Abstract: Emerging smart home platforms, which interface with a variety of physical devices and support third-party application development, currently use permission models inspired by smartphone operating systems-they group functionally similar device operations into separate units, and require users to grant apps access to devices at that granularity. Unfortunately, this leads to two issues: (1) apps that… ▽ More

    Submitted 3 December, 2018; v1 submitted 14 January, 2018; originally announced January 2018.

  13. arXiv:1712.08062  [pdf, other

    cs.CR cs.CV cs.LG

    Note on Attacking Object Detectors with Adversarial Stickers

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramer

    Abstract: Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist in… ▽ More

    Submitted 23 July, 2018; v1 submitted 21 December, 2017; originally announced December 2017.

    Comments: Short Note: The full version of this paper was accepted to USENIX WOOT 2018, and is available at arXiv:1807.07769

  14. arXiv:1707.08945  [pdf, other

    cs.CR cs.LG

    Robust Physical-World Attacks on Deep Learning Models

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song

    Abstract: Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added to the input. Given that that emerging physical systems are using DNNs in safety-critical situations, adversarial examples could mislead these systems and cause dangerous situations.Therefore, understanding adversarial examples in the… ▽ More

    Submitted 10 April, 2018; v1 submitted 27 July, 2017; originally announced July 2017.

    Comments: Accepted to CVPR 2018

  15. arXiv:1705.08522  [pdf, ps, other

    cs.CR

    Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?

    Authors: Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash

    Abstract: The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles? And, what are the new problems and challenges in this… ▽ More

    Submitted 18 July, 2017; v1 submitted 23 May, 2017; originally announced May 2017.

    Comments: published at IEEE Security and Privacy Magazine, July 2017: Systems Attacks and Defenses