Skip to main content

Showing 1–50 of 52 results for author: Houmansadr, A

.
  1. arXiv:2407.08792  [pdf, other

    cs.CR

    ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies

    Authors: Dzung Pham, Jade Sheffey, Chau Minh Pham, Amir Houmansadr

    Abstract: AI-powered chatbots (ChatGPT, Claude, etc.) require users to create an account using their email and phone number, thereby linking their personally identifiable information to their conversational data and usage patterns. As these chatbots are increasingly being used for tasks involving sensitive information, privacy concerns have been raised about how chatbot providers handle user data. To addres… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2406.15213  [pdf, other

    cs.LG cs.AI cs.CR

    Injecting Bias in Text-To-Image Models via Composite-Trigger Backdoors

    Authors: Ali Naseh, Jaechul Roh, Eugene Bagdasaryan, Amir Houmansadr

    Abstract: Recent advances in large text-conditional image generative models such as Stable Diffusion, Midjourney, and DALL-E 3 have revolutionized the field of image generation, allowing users to produce high-quality, realistic images from textual prompts. While these developments have enhanced artistic creation and visual communication, they also present an underexplored attack opportunity: the possibility… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  3. arXiv:2406.14517  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    PostMark: A Robust Blackbox Watermark for Large Language Models

    Authors: Yapei Chang, Kalpesh Krishna, Amir Houmansadr, John Wieting, Mohit Iyyer

    Abstract: The most effective techniques to detect LLM-generated text rely on inserting a detectable signature -- or watermark -- during the model's decoding process. Most existing watermarking methods require access to the underlying LLM's logits, which LLM API providers are loath to share due to fears of model distillation. As such, these watermarks must be implemented independently by each LLM provider. I… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: preprint; 18 pages, 5 figures

  4. arXiv:2406.05927  [pdf, other

    cs.CV cs.CR cs.LG

    MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification

    Authors: Sajjad Amini, Mohammadreza Teymoorianfard, Shiqing Ma, Amir Houmansadr

    Abstract: We present a simple yet effective method to improve the robustness of Convolutional Neural Networks (CNNs) against adversarial examples by post-processing an adversarially trained model. Our technique, MeanSparse, cascades the activation functions of a trained model with novel operators that sparsify mean-centered feature vectors. This is equivalent to reducing feature variations around the mean,… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  5. arXiv:2405.16978  [pdf, other

    cs.LG cs.CR

    OSLO: One-Shot Label-Only Membership Inference Attacks

    Authors: Yuefeng Peng, Jaechul Roh, Subhransu Maji, Amir Houmansadr

    Abstract: We introduce One-Shot Label-Only (OSLO) membership inference attacks (MIAs), which accurately infer a given sample's membership in a target model's training set with high precision using just \emph{a single query}, where the target model only returns the predicted hard label. This is in contrast to state-of-the-art label-only attacks which require $\sim6000$ queries, yet get attack precisions lowe… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  6. arXiv:2404.13784  [pdf, other

    cs.CR cs.CL cs.CV

    Iteratively Prompting Multimodal LLMs to Reproduce Natural and AI-Generated Images

    Authors: Ali Naseh, Katherine Thai, Mohit Iyyer, Amir Houmansadr

    Abstract: With the digital imagery landscape rapidly evolving, image stocks and AI-generated image marketplaces have become central to visual media. Traditional stock images now exist alongside innovative platforms that trade in prompts for AI-generated visuals, driven by sophisticated APIs like DALL-E 3 and Midjourney. This paper studies the possibility of employing multi-modal models with enhanced visual… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  7. arXiv:2403.06319  [pdf, other

    cs.LG cs.CR

    Fake or Compromised? Making Sense of Malicious Clients in Federated Learning

    Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr

    Abstract: Federated learning (FL) is a distributed machine learning paradigm that enables training models on decentralized data. The field of FL security against poisoning attacks is plagued with confusion due to the proliferation of research that makes different assumptions about the capabilities of adversaries and the adversary models they operate under. Our work aims to clarify this confusion by presenti… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  8. arXiv:2403.02437  [pdf, other

    cs.LG cs.AI cs.DC

    SoK: Challenges and Opportunities in Federated Unlearning

    Authors: Hyejun Jeong, Shiqing Ma, Amir Houmansadr

    Abstract: Federated learning (FL), introduced in 2017, facilitates collaborative learning between non-trusting parties with no need for the parties to explicitly share their data among themselves. This allows training models on user data while respecting privacy regulations such as GDPR and CPRA. However, emerging privacy requirements may mandate model owners to be able to \emph{forget} some learned data, e… ▽ More

    Submitted 5 June, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

  9. arXiv:2312.07550  [pdf, other

    cs.CV cs.CL cs.CR cs.LG

    Understanding (Un)Intended Memorization in Text-to-Image Generative Models

    Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr

    Abstract: Multimodal machine learning, especially text-to-image models like Stable Diffusion and DALL-E 3, has gained significance for transforming text into detailed images. Despite their growing use and remarkable generative capabilities, there is a pressing need for a detailed examination of these models' behavior, particularly with respect to memorization. Historically, memorization in machine learnin… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  10. arXiv:2312.04692  [pdf, other

    cs.CR cs.CV cs.LG

    Diffence: Fencing Membership Privacy With Diffusion Models

    Authors: Yuefeng Peng, Ali Naseh, Amir Houmansadr

    Abstract: Deep learning models, while achieving remarkable performance across various tasks, are vulnerable to member inference attacks, wherein adversaries identify if a specific data point was part of a model's training set. This susceptibility raises substantial privacy concerns, especially when models are trained on sensitive datasets. Current defense methods often struggle to provide robust protection… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  11. arXiv:2312.03692  [pdf, other

    cs.CR cs.CV cs.LG

    Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication

    Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr

    Abstract: Diffusion-based models, such as the Stable Diffusion model, have revolutionized text-to-image synthesis with their ability to produce high-quality, high-resolution images. These advancements have prompted significant progress in image generation and editing tasks. However, these models also raise concerns due to their tendency to memorize and potentially replicate exact training samples, posing pr… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  12. arXiv:2310.19163  [pdf, other

    cs.CR cs.LG

    RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation

    Authors: Dzung Pham, Shreyas Kulkarni, Amir Houmansadr

    Abstract: Federated learning has emerged as a promising privacy-preserving solution for machine learning domains that rely on user interactions, particularly recommender systems and online learning to rank. While there has been substantial research on the privacy of traditional federated learning, little attention has been paid to the privacy properties of these interaction-based settings. In this work, we… ▽ More

    Submitted 11 July, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

  13. arXiv:2309.10147  [pdf, other

    cs.CR cs.LG

    Realistic Website Fingerprinting By Augmenting Network Trace

    Authors: Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr

    Abstract: Website Fingerprinting (WF) is considered a major threat to the anonymity of Tor users (and other anonymity systems). While state-of-the-art WF techniques have claimed high attack accuracies, e.g., by leveraging Deep Neural Networks (DNN), several recent works have questioned the practicality of such WF attacks in the real world due to the assumptions made in the design and evaluation of these att… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  14. arXiv:2303.04729  [pdf, other

    cs.LG cs.CL cs.CR

    Stealing the Decoding Algorithms of Language Models

    Authors: Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr

    Abstract: A key component of generating text from modern language models (LM) is the selection and tuning of decoding algorithms. These algorithms determine how to generate text from the internal probability distribution generated by the LM. The process of choosing a decoding algorithm and tuning its hyperparameters takes significant time, manual effort, and computation, and it also requires extensive human… ▽ More

    Submitted 1 December, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Journal ref: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security

  15. arXiv:2212.01716  [pdf, other

    cs.LG cs.AI cs.CR

    Security Analysis of SplitFed Learning

    Authors: Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima Muhammad Anwar

    Abstract: Split Learning (SL) and Federated Learning (FL) are two prominent distributed collaborative learning techniques that maintain data privacy by allowing clients to never share their private data with other clients and servers, and fined extensive IoT applications in smart healthcare, smart cities, and smart industry. Prior work has extensively explored the security vulnerabilities of FL in the form… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

  16. arXiv:2211.00453  [pdf, other

    cs.CR

    The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning

    Authors: Virat Shejwalkar, Lingjuan Lyu, Amir Houmansadr

    Abstract: Semi-supervised machine learning (SSL) is gaining popularity as it reduces the cost of training ML models. It does so by using very small amounts of (expensive, well-inspected) labeled data and large amounts of (cheap, non-inspected) unlabeled data. SSL has shown comparable or even superior performances compared to conventional fully-supervised ML techniques. In this paper, we show that the key… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

  17. arXiv:2205.10454  [pdf, other

    cs.LG

    E2FL: Equal and Equitable Federated Learning

    Authors: Hamid Mozaffari, Amir Houmansadr

    Abstract: Federated Learning (FL) enables data owners to train a shared global model without sharing their private data. Unfortunately, FL is susceptible to an intrinsic fairness issue: due to heterogeneity in clients' data distributions, the final trained model can give disproportionate advantages across the participating clients. In this work, we present Equal and Equitable Federated Learning (E2FL) to pr… ▽ More

    Submitted 16 August, 2022; v1 submitted 20 May, 2022; originally announced May 2022.

  18. arXiv:2110.08324  [pdf, other

    cs.CR cs.LG

    Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture

    Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal

    Abstract: Membership inference attacks are a key measure to evaluate privacy leakage in machine learning (ML) models. These attacks aim to distinguish training members from non-members by exploiting differential behavior of the models on member and non-member inputs. The goal of this work is to train ML models that have high membership privacy while largely preserving their utility; we therefore aim for an… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

  19. arXiv:2110.04350  [pdf, other

    cs.LG

    FRL: Federated Rank Learning

    Authors: Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr

    Abstract: Federated learning (FL) allows mutually untrusted clients to collaboratively train a common machine learning model without sharing their private/proprietary training data among each other. FL is unfortunately susceptible to poisoning by malicious clients who aim to hamper the accuracy of the commonly trained model through sending malicious model updates during FL's training process. We argue tha… ▽ More

    Submitted 16 August, 2022; v1 submitted 8 October, 2021; originally announced October 2021.

  20. arXiv:2108.12336  [pdf, other

    cs.CR cs.IT

    Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks

    Authors: Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: User privacy can be compromised by matching user data traces to records of their previous behavior. The matching of the statistical characteristics of traces to prior user behavior has been widely studied. However, an adversary can also identify a user deterministically by searching data traces for a pattern that is unique to that user. Our goal is to thwart such an adversary by applying small art… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  21. arXiv:2108.10241  [pdf, other

    cs.LG cs.CR cs.DC

    Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning

    Authors: Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage

    Abstract: While recent works have indicated that federated learning (FL) may be vulnerable to poisoning attacks by compromised clients, their real impact on production FL systems is not fully understood. In this work, we aim to develop a comprehensive systemization for poisoning attacks on FL by enumerating all possible threat models, variations of poisoning, and adversary capabilities. We specifically put… ▽ More

    Submitted 13 December, 2021; v1 submitted 23 August, 2021; originally announced August 2021.

    Comments: To appear in the IEEE Symposium on Security & Privacy (Oakland), 2022

  22. arXiv:2102.00918  [pdf, other

    cs.CR

    Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems

    Authors: Alireza Bahramali, Milad Nasr, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Deep Neural Networks (DNNs) have become prevalent in wireless communication systems due to their promising performance. However, similar to other DNN-based applications, they are vulnerable to adversarial examples. In this work, we propose an input-agnostic, undetectable, and robust adversarial attack against DNN-based wireless communication systems in both white-box and black-box scenarios. We de… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  23. arXiv:2007.11524  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising

    Authors: Milad Nasr, Reza Shokri, Amir houmansadr

    Abstract: Deep learning models leak significant amounts of information about their training datasets. Previous work has investigated training models with differential privacy (DP) guarantees through adding DP noise to the gradients. However, such solutions (specifically, DPSGD), result in large degradations in the accuracy of the trained models. In this paper, we aim at training deep learning models with DP… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  24. arXiv:2007.06119  [pdf, other

    cs.CR

    Asymptotic Privacy Loss due to Time Series Matching of Dependent Users

    Authors: Nazanin Takbiri, Minting Chen, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The Internet of Things (IoT) promises to improve user utility by tuning applications to user behavior, but revealing the characteristics of a user's behavior presents a significant privacy risk. Our previous work has established the challenging requirements for anonymization to protect users' privacy in a Bayesian setting in which we assume a powerful adversary who has perfect knowledge of the pri… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  25. Practical Traffic Analysis Attacks on Secure Messaging Applications

    Authors: Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become extremely popular in recent years. Unfortunately, such IM services have been targets of continuous governmental surveillance and censorship, as these services are home to public and private communication channels on socially and politically sensitive topics. To protect their clients, popular IM services deploy stat… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2020

  26. arXiv:2002.06495  [pdf, other

    cs.CR cs.LG

    Blind Adversarial Network Perturbations

    Authors: Milad Nasr, Alireza Bahramali, Amir Houmansadr

    Abstract: Deep Neural Networks (DNNs) are commonly used for various traffic analysis problems, such as website fingerprinting and flow correlation, as they outperform traditional (e.g., statistical) techniques by large margins. However, deep neural networks are known to be vulnerable to adversarial examples: adversarial inputs to the model that get labeled incorrectly by the model due to small adversarial p… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

  27. arXiv:1912.11279  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer

    Authors: Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr

    Abstract: Collaborative (federated) learning enables multiple parties to train a model without sharing their private data, but through repeated sharing of the parameters of their local models. Despite its advantages, this approach has many known privacy and security weaknesses and performance overhead, in addition to being limited only to models with homogeneous architectures. Shared parameters leak a signi… ▽ More

    Submitted 24 December, 2019; originally announced December 2019.

  28. arXiv:1912.02209  [pdf, other

    cs.IT eess.SP

    Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms

    Authors: Nazanin Takbiri, Virat Shejwalker, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: The prevalence of mobile devices and Location-Based Services (LBS) necessitate the study of Location Privacy-Preserving Mechanisms (LPPM). However, LPPMs reduce the utility of LBS due to the noise they add to users' locations. Here, we consider the remap** technique, which presumes the adversary has a perfect statistical model for the user location. We consider this assumption and show that unde… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: Submitted to IEEE Wireless Communications Letters

  29. arXiv:1906.06589  [pdf, other

    cs.LG stat.ML

    Membership Privacy for Machine Learning Models Through Knowledge Transfer

    Authors: Virat Shejwalkar, Amir Houmansadr

    Abstract: Large capacity machine learning (ML) models are prone to membership inference attacks (MIAs), which aim to infer whether the target sample is a member of the target model's training dataset. The serious privacy concerns due to the membership inference have motivated multiple defenses against MIAs, e.g., differential privacy and adversarial regularization. Unfortunately, these defenses produce ML m… ▽ More

    Submitted 31 December, 2020; v1 submitted 15 June, 2019; originally announced June 2019.

    Comments: To Appear in the 35th AAAI Conference on Artificial Intelligence, 2021

  30. arXiv:1903.11640  [pdf, other

    cs.CR

    Fundamental Limits of Covert Packet Insertion

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication conceals the existence of the transmission from a watchful adversary. We consider the fundamental limits for covert communications via packet insertion over packet channels whose packet timings are governed by a renewal process of rate $λ$. Authorized transmitter Jack sends packets to authorized receiver Steve, and covert transmitter Alice wishes to transmit packets to covert… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

  31. arXiv:1902.06404  [pdf, other

    cs.IT

    Asymptotic Limits of Privacy in Bayesian Time Series Matching

    Authors: Nazanin Takbiri, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: Various modern and highly popular applications make use of user data traces in order to offer specific services, often for the purpose of improving the user's experience while using such applications. However, even when user data is privatized by employing privacy-preserving mechanisms (PPM), users' privacy may still be compromised by an external party who leverages statistical matching methods to… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: The 53rd Annual Conference on Information Sciences and Systems

    Journal ref: The 53rd Annual Conference on Information Sciences and Systems 2019

  32. arXiv:1812.00910  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

    Authors: Milad Nasr, Reza Shokri, Amir Houmansadr

    Abstract: Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models. We measure the privacy leakage through parameters of fully trained models as well as the parameter updates of models during training. We design inference algorithms for bo… ▽ More

    Submitted 6 June, 2020; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: 2019 IEEE Symposium on Security and Privacy (SP)

  33. arXiv:1810.03510  [pdf, other

    cs.NI cs.CR cs.IT

    Fundamental Limits of Covert Bit Insertion in Packets

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve. Covert transmitter Alice wishes to alter the packet stream in some way to send inf… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: This work has been presented at the 56th Annual Allerton Conference on Communication, Control, and Computing, October 2018

  34. arXiv:1809.10289  [pdf, other

    cs.IT

    Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

    Authors: Nazanin Takbiri, Ramin Soltani, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information. In our previous work, we have established the privacy requirements for the case that the user traces are instantiations of discrete random variables a… ▽ More

    Submitted 18 February, 2019; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: IEEE Wireless Communications and Networking Conference

  35. arXiv:1809.08514  [pdf, other

    cs.NI cs.CR cs.IT eess.SP

    Fundamental Limits of Invisible Flow Fingerprinting

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by… ▽ More

    Submitted 27 March, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

  36. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

    Authors: Milad Nasr, Alireza Bahramali, Amir Houmansadr

    Abstract: Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation techniques are considered to be ineffective and unreliable in linking Tor flows when applied at a large scale, i.e., they impose high rates of false positive error rates or require impractically long flow observations to… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

  37. arXiv:1807.05852  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Machine Learning with Membership Privacy using Adversarial Regularization

    Authors: Milad Nasr, Reza Shokri, Amir Houmansadr

    Abstract: Machine learning models leak information about the datasets on which they are trained. An adversary can build an algorithm to trace the individual members of a model's training dataset. As a fundamental inference attack, he aims to distinguish between data points that were part of the model's training set and any other data points from the same distribution. This is known as the tracing (and also… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

  38. arXiv:1806.11108  [pdf, other

    cs.IT

    Privacy of Dependent Users Against Statistical Matching

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve a user's experience or be essential for the application to work, the exposure of user data to the application presents a significant privacy threat to the users\textemdash even when the traces are anonymized\textemdash since the sta… ▽ More

    Submitted 29 May, 2019; v1 submitted 28 June, 2018; originally announced June 2018.

    Comments: Submitted to IEEE Transaction on Information Theory

  39. arXiv:1805.01296  [pdf, other

    cs.IT

    Privacy against Statistical Matching: Inter-User Correlation

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Modern applications significantly enhance user experience by adapting to each user's individual condition and/or preferences. While this adaptation can greatly improve utility or be essential for the application to work (e.g., for ride-sharing applications), the exposure of user data to the application presents a significant privacy threat to the users, even when the traces are anonymized, since t… ▽ More

    Submitted 27 June, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1702.02701 and arXiv:1710.00197

    Journal ref: ISIT 2018

  40. arXiv:1711.10079  [pdf, other

    cs.NI cs.CR cs.IT math.PR

    Towards Provably Invisible Network Flow Fingerprints

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a wa… ▽ More

    Submitted 22 September, 2018; v1 submitted 27 November, 2017; originally announced November 2017.

  41. arXiv:1710.00197  [pdf, other

    cs.IT cs.CR

    Matching Anonymized and Obfuscated Time Series to Users' Profiles

    Authors: Nazanin Takbiri, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik

    Abstract: Many popular applications use traces of user data to offer various services to their users. However, even if user data is anonymized and obfuscated, a user's privacy can be compromised through the use of statistical matching techniques that match a user trace to prior user behavior. In this work, we derive the theoretical bounds on the privacy of users in such a scenario. We build on our recent st… ▽ More

    Submitted 27 June, 2018; v1 submitted 30 September, 2017; originally announced October 2017.

    Comments: 48 pages, 12 figures, Submitted to IEEE Transactions on Information Theory

  42. arXiv:1709.04030  [pdf, other

    cs.CR cs.GT

    Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution

    Authors: Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags

    Abstract: A core technique used by popular proxy-based circumvention systems like Tor, Psiphon, and Lantern is to secretly share the IP addresses of circumvention proxies with the censored clients for them to be able to use such systems. For instance, such secretly shared proxies are known as bridges in Tor. However, a key challenge to this mechanism is the insider attack problem: censoring agents can imper… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

  43. arXiv:1610.05210  [pdf, other

    cs.IT

    Achieving Perfect Location Privacy in Wireless Devices Using Anonymization

    Authors: Zarrin Montazeri, Amir Houmansadr, Hossein Pishro-Nik

    Abstract: The popularity of mobile devices and location-based services (LBS) has created great concern regarding the location privacy of their users. Anonymization is a common technique that is often used to protect the location privacy of LBS users. Here, we present an information-theoretic approach to define the notion of perfect location privacy. We show how LBS's should use the anonymization method to e… ▽ More

    Submitted 19 January, 2017; v1 submitted 17 October, 2016; originally announced October 2016.

    Comments: 12 pages, 3 figures

  44. Covert Communications on Poisson Packet Channels

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $λ$ packets per second for a time period $T$. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob on the same channel without being detected by a watchful adversary Willie. We consider two scenarios. In the first scenari… ▽ More

    Submitted 27 November, 2017; v1 submitted 2 October, 2016; originally announced October 2016.

    Comments: Allerton 2015 submission, minor edits. arXiv

  45. arXiv:1610.00368  [pdf, other

    cs.IT

    Covert Communications on Renewal Packet Channels

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Security and privacy are major concerns in modern communication networks. In recent years, the information theory of covert communications, where the very presence of the communication is undetectable to a watchful and determined adversary, has been of great interest. This emerging body of work has focused on additive white Gaussian noise (AWGN), discrete memoryless channels (DMCs), and optical ch… ▽ More

    Submitted 27 November, 2017; v1 submitted 2 October, 2016; originally announced October 2016.

    Comments: Contains details of an Allerton 2016 submission arXiv:1610.00381

  46. arXiv:1211.3191  [pdf, ps, other

    cs.CR

    SWEET: Serving the Web by Exploiting Email Tunnels

    Authors: Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov

    Abstract: Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can identify, hence disrupt, the traffic belonging to these systems using today's advanced cen… ▽ More

    Submitted 17 December, 2012; v1 submitted 13 November, 2012; originally announced November 2012.

  47. arXiv:1207.2683  [pdf, ps, other

    cs.CR

    IP over Voice-over-IP for censorship circumvention

    Authors: Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer

    Abstract: Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy network-based censorship mechanisms within their networks. Existing censorship circumvention systems face different difficulties in providing unobservable communication with their clients; this limits their availability and poses threats to their users. To provide th… ▽ More

    Submitted 17 December, 2012; v1 submitted 11 July, 2012; originally announced July 2012.

  48. arXiv:1203.2273  [pdf, ps, other

    cs.CR

    Non-blind watermarking of network flows

    Authors: Amir Houmansadr, Negar Kiyavash, Nikita Borisov

    Abstract: Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to reduce errors. Active traffic analysis, also known as flow watermarking, allows for better precision and is more scalable. Previous flow watermarks introduce significant delays to the traffic flow as a side effect of using a… ▽ More

    Submitted 10 March, 2012; originally announced March 2012.

  49. arXiv:1203.1673  [pdf, ps, other

    cs.CR

    CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing

    Authors: Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov

    Abstract: A key challenge in censorship-resistant web browsing is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. We propose a new framework for censorship-resistant web browsing called {\it CensorSpoofer} that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and… ▽ More

    Submitted 9 March, 2012; v1 submitted 7 March, 2012; originally announced March 2012.

  50. arXiv:1203.1568  [pdf, ps, other

    cs.CR

    BotMosaic: Collaborative Network Watermark for Botnet Detection

    Authors: Amir Houmansadr, Nikita Borisov

    Abstract: Recent research has made great strides in the field of detecting botnets. However, botnets of all kinds continue to plague the Internet, as many ISPs and organizations do not deploy these techniques. We aim to mitigate this state by creating a very low-cost method of detecting infected bot host. Our approach is to leverage the botnet detection work carried out by some organizations to easily locat… ▽ More

    Submitted 8 March, 2012; v1 submitted 7 March, 2012; originally announced March 2012.