Skip to main content

Showing 1–7 of 7 results for author: Marson, G A

.
  1. arXiv:2312.10132  [pdf, other

    cs.CV cs.CR cs.LG

    Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks

    Authors: Pascal Zimmer, Sébastien Andreina, Giorgia Azzurra Marson, Ghassan Karame

    Abstract: Although promising, existing defenses against query-based attacks share a common limitation: they offer increased robustness against attacks at the price of a considerable accuracy drop on clean samples. In this work, we show how to efficiently establish, at test-time, a solid tradeoff between robustness and accuracy when mitigating query-based attacks. Given that these attacks necessarily explore… ▽ More

    Submitted 21 March, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: To appear in the Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) 2024

  2. arXiv:2308.02208  [pdf, other

    cs.CR

    LISA: LIghtweight single-server Secure Aggregation with a public source of randomness

    Authors: Elina van Kempen, Qifei Li, Giorgia Azzurra Marson, Claudio Soriente

    Abstract: Secure Aggregation (SA) is a key component of privacy-friendly federated learning applications, where the server learns the sum of many user-supplied gradients, while individual gradients are kept private. State-of-the-art SA protocols protect individual inputs with zero-sum random shares that are distributed across users, have a per-user overhead that is logarithmic in the number of users, and ta… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  3. arXiv:2205.07478  [pdf, other

    cs.CR

    Estimating Patch Propagation Times across (Blockchain) Forks

    Authors: Sebastien Andreina, Lorenzo Alluminio, Giorgia Azzurra Marson, Ghassan Karame

    Abstract: The wide success of Bitcoin has led to a huge surge of alternative cryptocurrencies (altcoins). Most altcoins essentially fork Bitcoin's code with minor modifications, such as the number of coins to be minted, the block size, and the block generation time. As such, they are often deemed identical to Bitcoin in terms of security, robustness, and maturity. In this paper, we show that this common c… ▽ More

    Submitted 9 February, 2023; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: A short version of this paper will appear at FC23

  4. arXiv:2109.10302  [pdf, other

    cs.CR cs.DC

    MITOSIS: Practically Scaling Permissioned Blockchains

    Authors: Giorgia Azzurra Marson, Sebastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame

    Abstract: Scalability remains one of the biggest challenges to the adoption of permissioned blockchain technologies for large-scale deployments. Permissioned blockchains typically exhibit low latencies, compared to permissionless deployments -- however at the cost of poor scalability. Various solutions were proposed to capture "the best of both worlds", targeting low latency and high scalability simultaneou… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: 12 pages, 9 figures; to appear in the Annual Computer Security Applications Conference (ACSAC) 2021

  5. arXiv:2101.05543  [pdf, other

    cs.DC cs.CR

    On the Synchronization Power of Token Smart Contracts

    Authors: Orestis Alpos, Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini

    Abstract: Modern blockchains support a variety of distributed applications beyond cryptocurrencies, including smart contracts -- which let users execute arbitrary code in a distributed and decentralized fashion. Regardless of their intended application, blockchain platforms implicitly assume consensus for the correct execution of a smart contract, thus requiring that all transactions are totally ordered. It… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

  6. arXiv:2011.02167  [pdf, other

    cs.CR cs.LG

    BaFFLe: Backdoor detection via Feedback-based Federated Learning

    Authors: Sebastien Andreina, Giorgia Azzurra Marson, Helen Möllering, Ghassan Karame

    Abstract: Recent studies have shown that federated learning (FL) is vulnerable to poisoning attacks that inject a backdoor into the global model. These attacks are effective even when performed by a single client, and undetectable by most existing defensive techniques. In this paper, we propose Backdoor detection via Feedback-based Federated Learning (BAFFLE), a novel defense to secure FL against backdoor a… ▽ More

    Submitted 18 April, 2021; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: 11 pages, 5 figures; to appear in the 41st IEEE International Conference on Distributed Computing Systems (ICDCS'21)

  7. arXiv:1812.04293  [pdf, other

    cs.CR

    On the Security of Randomized Defenses Against Adversarial Samples

    Authors: Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame

    Abstract: Deep Learning has been shown to be particularly vulnerable to adversarial samples. To combat adversarial strategies, numerous defensive techniques have been proposed. Among these, a promising approach is to use randomness in order to make the classification process unpredictable and presumably harder for the adversary to control. In this paper, we study the effectiveness of randomized defenses aga… ▽ More

    Submitted 16 March, 2020; v1 submitted 11 December, 2018; originally announced December 2018.