Skip to main content

Showing 1–32 of 32 results for author: Fawaz, K

.
  1. arXiv:2403.19717  [pdf, other

    cs.LG cs.CR cs.CY

    A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok

    Authors: Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee

    Abstract: Mobile apps have embraced user privacy by moving their data processing to the user's smartphone. Advanced machine learning (ML) models, such as vision models, can now locally analyze user images to extract insights that drive several functionalities. Capitalizing on this new processing model of locally analyzing user images, we analyze two popular social media apps, TikTok and Instagram, to reveal… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: 18 pages, 13 figures, to appear at IEEE Symposium on Security and Privacy 2024

    ACM Class: K.4.2; C.4; D.2.2

  2. arXiv:2402.15911  [pdf, other

    cs.CR cs.CL

    PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

    Authors: Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash

    Abstract: Large language models (LLMs) are typically aligned to be harmless to humans. Unfortunately, recent work has shown that such models are susceptible to automated jailbreak attacks that induce them to generate harmful content. More recent LLMs often incorporate an additional layer of defense, a Guard Model, which is a second LLM that is designed to check and moderate the output response of the primar… ▽ More

    Submitted 24 February, 2024; originally announced February 2024.

  3. I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering

    Authors: René Walendy, Markus Weber, **gjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar

    Abstract: Trust in digital systems depends on secure hardware, often assured through Hardware Reverse Engineering (HRE). This work develops methods for investigating human problem-solving processes in HRE, an underexplored yet critical aspect. Since reverse engineers rely heavily on visual information, eye tracking holds promise for studying their cognitive processes. To gain further insights, we additional… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  4. arXiv:2402.05980  [pdf, other

    cs.SE cs.AI cs.LG cs.PL

    Do Large Code Models Understand Programming Concepts? A Black-box Approach

    Authors: Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha

    Abstract: Large Language Models' success on text generation has also made them better at code generation and coding tasks. While a lot of work has demonstrated their remarkable performance on tasks such as code completion and editing, it is still unclear as to why. We help bridge this gap by exploring to what degree auto-regressive models understand the logical constructs of the underlying programs. We prop… ▽ More

    Submitted 23 February, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  5. arXiv:2310.00438  [pdf, other

    cs.CV cs.LG

    Human-Producible Adversarial Examples

    Authors: David Khachaturov, Yue Gao, Ilia Shumailov, Robert Mullins, Ross Anderson, Kassem Fawaz

    Abstract: Visual adversarial examples have so far been restricted to pixel-level image manipulations in the digital world, or have required sophisticated equipment such as 2D or 3D printers to be produced in the physical real world. We present the first ever method of generating human-producible adversarial examples for the real world that requires nothing more complicated than a marker pen. We call them… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: Submitted to ICLR 2024

  6. arXiv:2309.07277  [pdf, ps, other

    cs.CV cs.LG

    Limitations of Face Image Generation

    Authors: Harrison Rosenberg, Shimaa Ahmed, Guruprasad V Ramesh, Ramya Korlakai Vinayak, Kassem Fawaz

    Abstract: Text-to-image diffusion models have achieved widespread popularity due to their unprecedented image generation capability. In particular, their ability to synthesize and modify human faces has spurred research into using generated face images in both training data augmentation and model performance assessments. In this paper, we study the efficacy and shortcomings of generative models in the conte… ▽ More

    Submitted 21 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: Accepted to The 38th Annual AAAI Conference on Artificial Intelligence (AAAI 2024)

  7. arXiv:2308.16321  [pdf, other

    cs.CR cs.CY

    Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields

    Authors: Asmit Nayak, Rishabh Khandelwal, Kassem Fawaz

    Abstract: In this work, we perform a comprehensive analysis of the security of text input fields in web browsers. We find that browsers' coarse-grained permission model violates two security design principles: least privilege and complete mediation. We further uncover two vulnerabilities in input fields, including the alarming discovery of passwords in plaintext within the HTML source code of the web page.… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  8. arXiv:2308.11845  [pdf, other

    cs.LG cs.CR

    SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz

    Abstract: Machine Learning (ML) systems are vulnerable to adversarial examples, particularly those from query-based black-box attacks. Despite various efforts to detect and prevent such attacks, there is a need for a more comprehensive approach to logging, analyzing, and sharing evidence of attacks. While classic security benefits from well-established forensics and intelligence sharing, Machine Learning is… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  9. arXiv:2307.16331  [pdf, other

    cs.LG cs.CR

    Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

    Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash

    Abstract: Adversarial examples threaten the integrity of machine learning systems with alarming success rates even under constrained black-box conditions. Stateful defenses have emerged as an effective countermeasure, detecting potential attacks by maintaining a buffer of recent queries and detecting new queries that are too similar. However, these defenses fundamentally pose a trade-off between attack dete… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 2nd AdvML Frontiers Workshop at ICML 2023

  10. arXiv:2306.08111  [pdf, other

    cs.CY cs.HC

    Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section

    Authors: Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz

    Abstract: Google has mandated developers to use Data Safety Sections (DSS) to increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Data Safety Section (DSS) using both quantitative and qualitative methods. We conduct the first large-scale measurement study of DSS using apps from Android Play store (n=1.1M). We find that there are inte… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  11. arXiv:2303.11575  [pdf, other

    cs.CR cs.HC

    How Interactions Influence Users' Security Perception of Virtual Reality Authentication?

    Authors: **gjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner

    Abstract: Users readily embrace the rapid advancements in virtual reality (VR) technology within various everyday contexts, such as gaming, social interactions, shop**, and commerce. In order to facilitate transactions and payments, VR systems require access to sensitive user data and assets, which consequently necessitates user authentication. However, there exists a limited understanding regarding how u… ▽ More

    Submitted 3 June, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  12. arXiv:2303.08213  [pdf, other

    cs.CY

    The Overview of Privacy Labels and their Compatibility with Privacy Policies

    Authors: Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz

    Abstract: Privacy nutrition labels provide a way to understand an app's key data practices without reading the long and hard-to-read privacy policies. Recently, the app distribution platforms for iOS(Apple) and Android(Google) have implemented mandates requiring app developers to fill privacy nutrition labels highlighting their privacy practices such as data collection, data sharing, and security practices.… ▽ More

    Submitted 24 April, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

  13. Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks

    Authors: Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash

    Abstract: Recent work has proposed stateful defense models (SDMs) as a compelling strategy to defend against a black-box attacker who only has query access to the model, as is common for online machine learning platforms. Such stateful defenses aim to defend against black-box attacks by tracking the query history and detecting and rejecting queries that are "similar" and thus preventing black-box attacks fr… ▽ More

    Submitted 26 September, 2023; v1 submitted 10 March, 2023; originally announced March 2023.

    Comments: ACM CCS 2023

  14. arXiv:2212.08738  [pdf, other

    cs.CR cs.LG

    SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

    Authors: Ashish Hooda, Matthew Wallace, Kushal Jhunjhunwalla, Earlence Fernandes, Kassem Fawaz

    Abstract: Voice assistants are deployed widely and provide useful functionality. However, recent work has shown that commercial systems like Amazon Alexa and Google Home are vulnerable to voice-based confusion attacks that exploit design issues. We propose a systems-oriented defense against this class of attacks and demonstrate its functionality for Amazon Alexa. We ensure that only the skills a user intend… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

  15. arXiv:2206.09491  [pdf, other

    cs.LG cs.CR

    On the Limitations of Stochastic Pre-processing Defenses

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz, Nicolas Papernot

    Abstract: Defending against adversarial examples remains an open problem. A common belief is that randomness at inference increases the cost of finding adversarial inputs. An example of such a defense is to apply a random transformation to inputs prior to feeding them to the model. In this paper, we empirically and theoretically investigate such stochastic pre-processing defenses and demonstrate that they a… ▽ More

    Submitted 11 October, 2022; v1 submitted 19 June, 2022; originally announced June 2022.

    Comments: Accepted by Proceedings of the 36th Conference on Neural Information Processing Systems

  16. arXiv:2204.06128  [pdf, other

    cs.CR

    Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

    Authors: Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz

    Abstract: Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device's video camera is carefully c… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  17. arXiv:2204.04221  [pdf, other

    cs.CR

    CookieEnforcer: Automated Cookie Notice Analysis and Enforcement

    Authors: Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz

    Abstract: Online websites use cookie notices to elicit consent from the users, as required by recent privacy regulations like the GDPR and the CCPA. Prior work has shown that these notices use dark patterns to manipulate users into making website-friendly choices which put users' privacy at risk. In this work, we develop CookieEnforcer, a new system for automatically discovering cookie notices and deciding… ▽ More

    Submitted 14 April, 2022; v1 submitted 8 April, 2022; originally announced April 2022.

  18. arXiv:2203.04427  [pdf, other

    cs.CR

    Experimental Security Analysis of the App Model in Business Collaboration Platforms

    Authors: Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes

    Abstract: Business Collaboration Platforms like Microsoft Teams and Slack enable teamwork by supporting text chatting and third-party resource integration. A user can access online file storage, make video calls, and manage a code repository, all from within the platform, thus making them a hub for sensitive communication and resources. The key enabler for these productivity features is a third-party applic… ▽ More

    Submitted 22 October, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  19. arXiv:2202.05687  [pdf, other

    cs.LG cs.CV

    D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles

    Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash

    Abstract: Detecting diffusion-generated deepfake images remains an open problem. Current detection methods fail against an adversary who adds imperceptible adversarial perturbations to the deepfake to evade detection. In this work, we propose Disjoint Diffusion Deepfake Detection (D4), a deepfake detector designed to improve black-box adversarial robustness beyond de facto solutions such as adversarial trai… ▽ More

    Submitted 5 August, 2023; v1 submitted 11 February, 2022; originally announced February 2022.

  20. arXiv:2202.04530  [pdf, other

    cs.LG

    An Exploration of Multicalibration Uniform Convergence Bounds

    Authors: Harrison Rosenberg, Robi Bhattacharjee, Kassem Fawaz, Somesh Jha

    Abstract: Recent works have investigated the sample complexity necessary for fair machine learning. The most advanced of such sample complexity bounds are developed by analyzing multicalibration uniform convergence for a given predictor class. We present a framework which yields multicalibration error uniform convergence bounds by reparametrizing sample complexities for Empirical Risk Minimization (ERM) lea… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  21. arXiv:2202.02751  [pdf, other

    cs.LG cs.CR cs.SD eess.AS

    Tubes Among Us: Analog Attack on Automatic Speaker Identification

    Authors: Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz

    Abstract: Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such attacks by targeting artificiality, i.e., they deploy mechanisms to detect the lack of human involvement in generating the adversarial examples.… ▽ More

    Submitted 27 May, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: Published at USENIX Security 2023 https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed

  22. arXiv:2201.02712  [pdf, other

    cs.RO

    CONFIDANT: A Privacy Controller for Social Robots

    Authors: Brian Tang, Dakota Sullivan, Bengisu Cagiltay, Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu

    Abstract: As social robots become increasingly prevalent in day-to-day environments, they will participate in conversations and appropriately manage the information shared with them. However, little is known about how robots might appropriately discern the sensitivity of information, which has major implications for human-robot trust. As a first step to address a part of this issue, we designed a privacy co… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

    Comments: HRI 2022

  23. arXiv:2108.02707  [pdf, other

    cs.CV cs.AI

    Fairness Properties of Face Recognition and Obfuscation Systems

    Authors: Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha

    Abstract: The proliferation of automated face recognition in the commercial and government sectors has caused significant privacy concerns for individuals. One approach to address these privacy concerns is to employ evasion attacks against the metric embedding networks powering face recognition systems: Face obfuscation systems generate imperceptibly perturbed images that cause face recognition systems to m… ▽ More

    Submitted 16 September, 2022; v1 submitted 5 August, 2021; originally announced August 2021.

  24. arXiv:2104.08690  [pdf, other

    cs.LG cs.CR

    Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz

    Abstract: As real-world images come in varying sizes, the machine learning model is part of a larger system that includes an upstream image scaling algorithm. In this paper, we investigate the interplay between vulnerabilities of the image scaling procedure and machine learning models in the decision-based black-box setting. We propose a novel sampling strategy to make a black-box attack exploit vulnerabili… ▽ More

    Submitted 19 June, 2022; v1 submitted 17 April, 2021; originally announced April 2021.

    Comments: Accepted by Proceedings of the 39th International Conference on Machine Learning

  25. arXiv:2003.08861  [pdf, other

    cs.CR

    Face-Off: Adversarial Face Obfuscation

    Authors: Varun Chandrasekaran, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha, Suman Banerjee

    Abstract: Advances in deep learning have made face recognition technologies pervasive. While useful to social media platforms and users, this technology carries significant privacy threats. Coupled with the abundant information they have about users, service providers can associate users with social interactions, visited places, activities, and preferences--some of which the user may not want to share. Addi… ▽ More

    Submitted 15 December, 2020; v1 submitted 19 March, 2020; originally announced March 2020.

    Comments: Published in PoPETs 2021

  26. arXiv:2003.01595  [pdf, other

    cs.LG stat.ML

    Analyzing Accuracy Loss in Randomized Smoothing Defenses

    Authors: Yue Gao, Harrison Rosenberg, Kassem Fawaz, Somesh Jha, Justin Hsu

    Abstract: Recent advances in machine learning (ML) algorithms, especially deep neural networks (DNNs), have demonstrated remarkable success (sometimes exceeding human-level performance) on several tasks, including face and speech recognition. However, ML algorithms are vulnerable to \emph{adversarial attacks}, such test-time, training-time, and backdoor attacks. In test-time attacks an adversary crafts adve… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Comments: 19 pages, 6 figures, 2 tables

  27. arXiv:1909.04198  [pdf, other

    cs.CR cs.SD eess.AS

    Preech: A System for Privacy-Preserving Speech Transcription

    Authors: Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan

    Abstract: New Advances in machine learning have made Automated Speech Recognition (ASR) systems practical and more scalable. These systems, however, pose serious privacy threats as speech is a rich source of sensitive acoustic and textual information. Although offline and open-source ASR eliminates the privacy risks, its transcription performance is inferior to that of cloud-based ASR systems, especially fo… ▽ More

    Submitted 3 July, 2020; v1 submitted 9 September, 2019; originally announced September 2019.

    Comments: 21 pages, 8 figures, 5 tables. The paper is accepted at the 29th USENIX Security Symposium - URL: https://www.usenix.org/conference/usenixsecurity20/presentation/ahmed-shimaa

  28. arXiv:1905.10900  [pdf, other

    cs.LG stat.ML

    Rearchitecting Classification Frameworks For Increased Robustness

    Authors: Varun Chandrasekaran, Brian Tang, Nicolas Papernot, Kassem Fawaz, Somesh Jha, Xi Wu

    Abstract: While generalizing well over natural inputs, neural networks are vulnerable to adversarial inputs. Existing defenses against adversarial inputs have largely been detached from the real world. These defenses also come at a cost to accuracy. Fortunately, there are invariances of an object that are its salient features; when we break them it will necessarily change the perception of the object. We fi… ▽ More

    Submitted 3 December, 2019; v1 submitted 26 May, 2019; originally announced May 2019.

  29. arXiv:1812.00263  [pdf, other

    cs.HC cs.CR

    PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Voice Assistants

    Authors: Varun Chandrasekaran, Suman Banerjee, Bilge Mutlu, Kassem Fawaz

    Abstract: The pervasive use of smart speakers has raised numerous privacy concerns. While work to date provides an understanding of user perceptions of these threats, limited research focuses on how we can mitigate these concerns, either through redesigning the smart speaker or through dedicated privacy-preserving interventions. In this paper, we present the design and prototy** of two privacy-preserving… ▽ More

    Submitted 9 June, 2021; v1 submitted 1 December, 2018; originally announced December 2018.

  30. arXiv:1809.08396  [pdf, other

    cs.CR cs.CL cs.CY

    The Privacy Policy Landscape After the GDPR

    Authors: Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz

    Abstract: The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online. We conduct the first longitudinal, in-depth, and at-scale assessment of privacy policies before and after the GDPR. We gauge the complete consumption cycle of these policie… ▽ More

    Submitted 24 June, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

  31. arXiv:1802.02561  [pdf, other

    cs.CL cs.CR cs.HC

    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning

    Authors: Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer

    Abstract: Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These policies are often long and difficult to comprehend. Short notices based on information extracted from privacy policies have been shown to be useful but face a significant scalability hurdle, given the number of policies and their evolution over time. Companies, us… ▽ More

    Submitted 29 June, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: Published at USENIX Security 2018; associated website: https://pribot.org

  32. arXiv:1701.04507  [pdf, other

    cs.CR

    Continuous Authentication for Voice Assistants

    Authors: Huan Feng, Kassem Fawaz, Kang G. Shin

    Abstract: Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the ongoing trend of wearables, smart vehicles, and home automation systems. Voice assistants such as Siri, Google Now and Cortana, have become our everyday fixtures, especially in scenarios where touch interfaces are inconvenient or even dangerous to use, such as driving or exercising. Nevertheless, the… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.