Skip to main content

Showing 1–12 of 12 results for author: Mitchell, J C

.
  1. arXiv:2402.04489  [pdf, other

    cs.LG cs.CR cs.CY stat.ME

    De-amplifying Bias from Differential Privacy in Language Model Fine-tuning

    Authors: Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C Mitchell

    Abstract: Fairness and privacy are two important values machine learning (ML) practitioners often seek to operationalize in models. Fairness aims to reduce model bias for social/demographic sub-groups. Privacy via differential privacy (DP) mechanisms, on the other hand, limits the impact of any individual's training data on the resulting model. The trade-offs between privacy and fairness goals of trustworth… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  2. arXiv:2309.05174  [pdf, other

    cs.CR cs.AR

    Serberus: Protecting Cryptographic Code from Spectres at Compile-Time

    Authors: Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel

    Abstract: We present Serberus, the first comprehensive mitigation for hardening constant-time (CT) code against Spectre attacks (involving the PHT, BTB, RSB, STL and/or PSF speculation primitives) on existing hardware. Serberus is based on three insights. First, some hardware control-flow integrity (CFI) protections restrict transient control-flow to the extent that it may be comprehensively considered by s… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: Authors' version; to appear in the Proceedings of the IEEE Symposium on Security and Privacy (S&P) 2024

  3. arXiv:2203.09050  [pdf, other

    cs.CY

    Insights for post-pandemic pedagogy across one CS department

    Authors: Maxwell Bigman, Yosefa Gilon, Jenny Han, John C Mitchell

    Abstract: Adaptive remote instruction has led to important lessons for the future, including rediscovery of known pedagogical principles in new contexts and new insights for supporting remote learning. Studying one computer science department that serves residential and remote undergraduate and graduate students, we conducted interviews with stakeholders in the department (n=26) and ran a department-wide st… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  4. arXiv:2007.08644  [pdf, other

    cs.CR

    Model Checking Bitcoin and other Proof-of-Work Consensus Protocols

    Authors: Max DiGiacomo-Castillo, Yiyun Liang, Advay Pal, John C. Mitchell

    Abstract: The Bitcoin Backbone Protocol [GKL15] is an abstraction of the bitcoin proof-of-work consensus protocol. We use a model-checking tool (UPPAALSMC) to examine the concrete security of proof-ofwork consensus by varying protocol parameters and using an adversary that leverages the selfish mining strategy introduced in [GKL15]. We provide insights into modeling proof-of-work protocols and demonstrate t… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  5. arXiv:2004.05106  [pdf, other

    cs.PL

    Resources: A Safe Language Abstraction for Money

    Authors: Sam Blackshear, David L. Dill, Shaz Qadeer, Clark W. Barrett, John C. Mitchell, Oded Padon, Yoni Zohar

    Abstract: Smart contracts are programs that implement potentially sophisticated transactions on modern blockchain platforms. In the rapidly evolving blockchain environment, smart contract programming languages must allow users to write expressive programs that manage and transfer assets, yet provide strong protection against sophisticated attacks. Addressing this need, we present flexible and reliable abstr… ▽ More

    Submitted 23 July, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

  6. Privacy-Preserving Shortest Path Computation

    Authors: David J. Wu, Joe Zimmerman, Jérémy Planul, John C. Mitchell

    Abstract: Navigation is one of the most popular cloud computing services. But in virtually all cloud-based navigation systems, the client must reveal her location and destination to the cloud service provider in order to learn the fastest route. In this work, we present a cryptographic protocol for navigation on city streets that provides privacy for both the client's location and the service provider's rou… ▽ More

    Submitted 10 January, 2016; originally announced January 2016.

    Comments: Extended version of NDSS 2016 paper

  7. arXiv:1511.07536  [pdf, other

    cs.LO cs.CR

    A Symbolic Logic with Concrete Bounds for Cryptographic Protocols

    Authors: Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak Sen

    Abstract: We present a formal logic for quantitative reasoning about security properties of network protocols. The system allows us to derive concrete security bounds that can be used to choose key lengths and other security parameters. We provide axioms for reasoning about digital signatures and random nonces, with security properties based on the concrete security of signature schemes and pseudorandom num… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

    ACM Class: F.3.1; C.2.2

  8. arXiv:1511.06606  [pdf, other

    cs.LG

    Data Representation and Compression Using Linear-Programming Approximations

    Authors: Hristo S. Paskov, John C. Mitchell, Trevor J. Hastie

    Abstract: We propose `Dracula', a new framework for unsupervised feature selection from sequential data such as text. Dracula learns a dictionary of $n$-grams that efficiently compresses a given corpus and recursively compresses its own dictionary; in effect, Dracula is a `deep' extension of Compressive Feature Learning. It requires solving a binary linear program that may be relaxed to a linear program. Bo… ▽ More

    Submitted 2 May, 2016; v1 submitted 20 November, 2015; originally announced November 2015.

  9. arXiv:1501.04132  [pdf, other

    cs.PL cs.CR

    IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version)

    Authors: Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo

    Abstract: Many important security problems in JavaScript, such as browser extension security, untrusted JavaScript libraries and safe integration of mutually distrustful websites (mash-ups), may be effectively addressed using an efficient implementation of information flow control (IFC). Unfortunately existing fine-grained approaches to JavaScript IFC require modifications to the language semantics and its… ▽ More

    Submitted 16 January, 2015; originally announced January 2015.

    Comments: Extended version of POST'15 paper; 31 pages

  10. arXiv:1207.1457  [pdf, ps, other

    cs.CR cs.PL

    Flexible Dynamic Information Flow Control in the Presence of Exceptions

    Authors: Deian Stefan, Alejandro Russo, John C. Mitchell, David Mazières

    Abstract: We describe a new, dynamic, floating-label approach to language-based information flow control. A labeled IO monad, LIO, keeps track of a current label and permits restricted access to IO functionality. The current label floats to exceed the labels of all data observed and restricts what can be modified. Unlike other language-based work, LIO also bounds the current label with a current clearance t… ▽ More

    Submitted 5 July, 2012; originally announced July 2012.

    ACM Class: D.4.6; D.1.1; D.3.3

  11. Driving magnetic order in a manganite by ultrafast lattice excitation

    Authors: M. Först, R. I. Tobey, S. Wall, H. Bromberger, V. Khanna, A. L. Cavalieri, Y. -D. Chuang, W. S. Lee, R. Moore, W. F. Schlotter, J. J. Turner, O. Krupin, M. Trigo, J. C. Mitchell, S. S. Dhesi, J. P. Hill, A. Cavalleri

    Abstract: Optical control of magnetism, of interest for high-speed data processing and storage, has only been demonstrated with near-infrared excitation to date. However, in absorbing materials, such high photon energies can lead to significant dissipation, making switch back times long and miniaturization challenging. In manganites, magnetism is directly coupled to the lattice, as evidenced by the response… ▽ More

    Submitted 19 May, 2011; originally announced May 2011.

    Comments: 10 pages manuscript, 4 figures

    Journal ref: Physical Review B, Vol. 84, 241104(R) (2011)

  12. A Learning-Based Approach to Reactive Security

    Authors: Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett

    Abstract: Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the at… ▽ More

    Submitted 21 December, 2009; v1 submitted 6 December, 2009; originally announced December 2009.

    Comments: 22 pages, 4 figures; full version of paper to be published in Financial Cryptography and Data Security 2010 (FC'10)