Skip to main content

Showing 1–30 of 30 results for author: Reiter, M K

.
  1. arXiv:2407.00030  [pdf, other

    cs.DC cs.PF

    On Orchestrating Parallel Broadcasts for Distributed Ledgers

    Authors: Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin

    Abstract: This paper introduces and develops the concept of ``ticketing'', through which atomic broadcasts are orchestrated by nodes in a distributed system. The paper studies different ticketing regimes that allow parallelism, yet prevent slow nodes from hampering overall progress. It introduces a hybrid scheme which combines managed and unmanaged ticketing regimes, striking a balance between adaptivity an… ▽ More

    Submitted 17 May, 2024; originally announced July 2024.

  2. arXiv:2405.06206  [pdf, other

    cs.CR cs.AI cs.LG

    Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning

    Authors: Yujie Zhang, Neil Gong, Michael K. Reiter

    Abstract: Federated Learning (FL) is a decentralized machine learning method that enables participants to collaboratively train a model without sharing their private data. Despite its privacy and scalability benefits, FL is susceptible to backdoor attacks, where adversaries poison the local training data of a subset of clients using a backdoor trigger, aiming to make the aggregated model produce malicious r… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  3. arXiv:2405.02431  [pdf, other

    cs.DC cs.CR

    Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

    Authors: Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter

    Abstract: Agreement protocols are crucial in various emerging applications, spanning from distributed (blockchains) oracles to fault-tolerant cyber-physical systems. In scenarios where sensor/oracle nodes measure a common source, maintaining output within the convex range of correct inputs, known as convex validity, is imperative. Present asynchronous convex agreement protocols employ either randomization,… ▽ More

    Submitted 7 May, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: 14 pages, 8 figures, Accepted to DSN 2024

  4. arXiv:2402.14977  [pdf, other

    cs.CR cs.CV cs.LG

    Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models

    Authors: Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong

    Abstract: Foundation model has become the backbone of the AI ecosystem. In particular, a foundation model can be used as a general-purpose feature extractor to build various downstream classifiers. However, foundation models are vulnerable to backdoor attacks and a backdoored foundation model is a single-point-of-failure of the AI ecosystem, e.g., multiple downstream classifiers inherit the backdoor vulnera… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: To appear in USENIX Security Symposium, 2024

  5. arXiv:2312.01281  [pdf, other

    cs.CR cs.LG

    Mendata: A Framework to Purify Manipulated Training Data

    Authors: Zonghao Huang, Neil Gong, Michael K. Reiter

    Abstract: Untrusted data used to train a model might have been manipulated to endow the learned model with hidden properties that the data contributor might later exploit. Data purification aims to remove such manipulations prior to training the model. We propose Mendata, a novel framework to purify manipulated training data. Starting from a small reference dataset in which a large majority of the inputs ar… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

  6. arXiv:2309.10323  [pdf, other

    cs.CR

    The Impact of Exposed Passwords on Honeyword Efficacy

    Authors: Zonghao Huang, Lujo Bauer, Michael K. Reiter

    Abstract: Honeywords are decoy passwords that can be added to a credential database; if a login attempt uses a honeyword, this indicates that the site's credential database has been leaked. In this paper we explore the basic requirements for honeywords to be effective, in a threat model where the attacker knows passwords for the same users at other sites. First, we show that for user-chosen (vs. algorithmic… ▽ More

    Submitted 5 March, 2024; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: The full paper of "The Impact of Exposed Passwords on Honeyword Efficacy" accepted by the 33rd USENIX Security Symposium, August 2024

  7. arXiv:2306.16614  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    Group-based Robustness: A General Framework for Customized Robustness in the Real World

    Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif

    Abstract: Machine-learning models are known to be vulnerable to evasion attacks that perturb model inputs to induce misclassifications. In this work, we identify real-world scenarios where the true threat cannot be assessed accurately by existing attacks. Specifically, we find that conventional metrics measuring targeted and untargeted robustness do not appropriately reflect a model's ability to withstand a… ▽ More

    Submitted 10 March, 2024; v1 submitted 28 June, 2023; originally announced June 2023.

  8. arXiv:2304.04998  [pdf, other

    cs.CR cs.DC

    EESMR: Energy Efficient BFT-SMR for the masses

    Authors: Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter

    Abstract: Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explores the energy efficiency of BFT-SMR protocols. First, we propose a novel SMR protocol that optimizes for the steady state, i.e., when the leader is correct. This is done by reducing the number of required signatures per… ▽ More

    Submitted 14 October, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: Appearing in Middleware 2023

  9. Bernoulli honeywords

    Authors: Ke Coby Wang, Michael K. Reiter

    Abstract: Decoy passwords, or "honeywords," planted in a credential database can alert a site to its breach if ever submitted in a login attempt. To be effective, some honeywords must appear at least as likely to be user-chosen passwords as the real ones, and honeywords must be very difficult to guess without having breached the database, to prevent false breach alarms. These goals have proved elusive, howe… ▽ More

    Submitted 21 November, 2023; v1 submitted 24 December, 2022; originally announced December 2022.

    Comments: Accepted for publication in the Network and Distributed System Security (NDSS) Symposium 2024

  10. arXiv:2112.14737  [pdf, other

    cs.CR

    Distance-Aware Private Set Intersection

    Authors: Anrin Chakraborti, Giulia Fanti, Michael K. Reiter

    Abstract: Private set intersection (PSI) allows two mutually untrusting parties to compute an intersection of their sets, without revealing information about items that are not in the intersection. This work introduces a PSI variant called distance-aware PSI (DA-PSI) for sets whose elements lie in a metric space. DA-PSI returns pairs of items that are within a specified distance threshold of each other. Thi… ▽ More

    Submitted 18 July, 2022; v1 submitted 29 December, 2021; originally announced December 2021.

  11. arXiv:2112.14232  [pdf, other

    cs.LG cs.CR cs.CV

    Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks

    Authors: Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif

    Abstract: We propose new, more efficient targeted white-box attacks against deep neural networks. Our attacks better align with the attacker's goal: (1) tricking a model to assign higher probability to the target class than to any other class, while (2) staying within an $ε$-distance of the attacked input. First, we demonstrate a loss function that explicitly encodes (1) and show that Auto-PGD finds more at… ▽ More

    Submitted 20 June, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

  12. arXiv:2108.01753  [pdf, other

    cs.CR

    Optimally Hiding Object Sizes with Constrained Padding

    Authors: Andrew C. Reed, Michael K. Reiter

    Abstract: Among the most challenging traffic-analysis attacks to confound are those leveraging the sizes of objects downloaded over the network. In this paper we systematically analyze this problem under realistic constraints regarding the padding overhead that the object store is willing to incur. We give algorithms to compute privacy-optimal padding schemes -- specifically that minimize the network observ… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

  13. arXiv:2106.03278  [pdf, other

    cs.GT

    Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games

    Authors: Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe

    Abstract: A growing body of work in game theory extends the traditional Stackelberg game to settings with one leader and multiple followers who play a Nash equilibrium. Standard approaches for computing equilibria in these games reformulate the followers' best response as constraints in the leader's optimization problem. These reformulation approaches can sometimes be effective, but often get trapped in low… ▽ More

    Submitted 3 December, 2021; v1 submitted 6 June, 2021; originally announced June 2021.

  14. arXiv:2008.02979  [pdf, ps, other

    cs.CR

    Role-Based Deception in Enterprise Networks

    Authors: Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar Singh

    Abstract: Historically, enterprise network reconnaissance is an active process, often involving port scanning. However, as routers and switches become more complex, they also become more susceptible to compromise. From this vantage point, an attacker can passively identify high-value hosts such as the workstations of IT administrators, C-suite executives, and finance personnel. The goal of this paper is to… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: 15 pages, 7 Figures, coference

  15. arXiv:2003.10602  [pdf, other

    cs.LG stat.ML

    Defense Through Diverse Directions

    Authors: Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva

    Abstract: In this work we develop a novel Bayesian neural network methodology to achieve strong adversarial robustness without the need for online adversarial training. Unlike previous efforts in this direction, we do not rely solely on the stochasticity of network weights by minimizing the divergence between the learned parameter distribution and a prior. Instead, we additionally require that the model mai… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

  16. arXiv:1912.12363  [pdf, other

    cs.CR

    TASE: Reducing latency of symbolic execution with transactional memory

    Authors: Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter

    Abstract: We present the design and implementation of a tool called TASE that uses transactional memory to reduce the latency of symbolic-execution applications with small amounts of symbolic state. Execution paths are executed natively while operating on concrete values, and only when execution encounters symbolic values (or modeled functions) is native execution suspended and interpretation begun. Executi… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: 13 pages, 7 figures

  17. arXiv:1912.11118  [pdf, other

    cs.CR

    Detecting stuffing of a user's credentials at her own accounts

    Authors: Ke Coby Wang, Michael K. Reiter

    Abstract: We propose a framework by which websites can coordinate to detect credential stuffing on individual user accounts. Our detection algorithm teases apart normal login behavior (involving password reuse, entering correct passwords into the wrong sites, etc.) from credential stuffing, by leveraging modern anomaly detection and carefully tracking suspicious logins. Websites coordinate using a novel pri… ▽ More

    Submitted 4 March, 2021; v1 submitted 23 December, 2019; originally announced December 2019.

    Journal ref: Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020)

  18. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

    Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre

    Abstract: Motivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality o… ▽ More

    Submitted 25 October, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: Code for transformations at https://github.com/pwwl/enhanced-binary-diversification. Presentation at https://dl.acm.org/doi/10.1145/3433210.3453086. An author of a related work [32] contacted us regarding our characterization of their defense (Sec 2.2). They point out that our attack is not within the stated scope of their defense, but agree their defense would be ineffective against our attack

  19. arXiv:1912.09059  [pdf, other

    cs.CV cs.CR

    $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers

    Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter

    Abstract: This paper proposes a new defense called $n$-ML against adversarial examples, i.e., inputs crafted by perturbing benign inputs by small amounts to induce misclassifications by classifiers. Inspired by $n$-version programming, $n$-ML trains an ensemble of $n$ classifiers, and inputs are classified by a vote of the classifiers in the ensemble. Unlike prior such approaches, however, the classifiers i… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

  20. arXiv:1910.08648  [pdf, other

    cs.CR

    n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications

    Authors: Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter

    Abstract: Web servers are a popular target for adversaries as they are publicly accessible and often vulnerable to compromise. Compromises can go unnoticed for months, if not years, and recovery often involves a complete system rebuild. In this paper, we propose n-m-Variant Systems, an adversarial-resistant software rejuvenation framework for cloud-based web applications. We improve the state-of-the-art by… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

  21. arXiv:1807.03720  [pdf, other

    cs.CR

    sAVSS: Scalable Asynchronous Verifiable Secret Sharing in BFT Protocols

    Authors: Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer

    Abstract: This paper introduces a new way to incorporate verifiable secret sharing (VSS) schemes into Byzantine Fault Tolerance (BFT) protocols. This technique extends the threshold guarantee of classical Byzantine Fault Tolerant algorithms to include privacy as well. This provides applications with a powerful primitive: a threshold trusted third party, which simplifies many difficult problems such as a fai… ▽ More

    Submitted 21 December, 2018; v1 submitted 10 July, 2018; originally announced July 2018.

  22. How to end password reuse on the web

    Authors: Ke Coby Wang, Michael K. Reiter

    Abstract: We present a framework by which websites can coordinate to make it difficult for users to set similar passwords at these websites, in an effort to break the culture of password reuse on the web today. Though the design of such a framework is fraught with risks to users' security and privacy, we show that these risks can be effectively mitigated through careful sco** of the goals for such a frame… ▽ More

    Submitted 3 March, 2021; v1 submitted 1 May, 2018; originally announced May 2018.

    Comments: This is the full version of the paper that appears in NDSS 2019

    Journal ref: Proceedings of the 26th ISOC Network and Distributed System Security Symposium (NDSS 2019)

  23. arXiv:1804.01626  [pdf, other

    cs.DC

    SBFT: a Scalable and Decentralized Trust Infrastructure

    Authors: Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu

    Abstract: SBFT is a state of the art Byzantine fault tolerant permissioned blockchain system that addresses the challenges of scalability, decentralization and world-scale geo-replication. SBFTis optimized for decentralization and can easily handle more than 200 active replicas in a real world-scale deployment. We evaluate \sysname in a world-scale geo-replicated deployment with 209 replicas withstanding f=… ▽ More

    Submitted 2 January, 2019; v1 submitted 4 April, 2018; originally announced April 2018.

  24. arXiv:1803.05069  [pdf, other

    cs.DC

    HotStuff: BFT Consensus in the Lens of Blockchain

    Authors: Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, Ittai Abraham

    Abstract: We present HotStuff, a leader-based Byzantine fault-tolerant replication protocol for the partially synchronous model. Once network communication becomes synchronous, HotStuff enables a correct leader to drive the protocol to consensus at the pace of actual (vs. maximum) network delay--a property called responsiveness--and with communication complexity that is linear in the number of replicas. To… ▽ More

    Submitted 23 July, 2019; v1 submitted 13 March, 2018; originally announced March 2018.

    Comments: a shorter version of this paper has been published in PODC'19, which does not include interpretation of other protocols using the framework, system evaluation or additional proofs in appendices

  25. arXiv:1802.09653  [pdf, other

    cs.CR cs.CV

    On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

    Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter

    Abstract: Much research effort has been devoted to better understanding adversarial examples, which are specially crafted inputs to machine-learning models that are perceptually similar to benign inputs, but are classified differently (i.e., misclassified). Both algorithms that create adversarial examples and strategies for defending against them typically use $L_p$-norms to measure the perceptual similarit… ▽ More

    Submitted 27 July, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: Appeared in CV-COPS/CVPRW 2018

  26. arXiv:1801.00349  [pdf, other

    cs.CV cs.CR

    A General Framework for Adversarial Examples with Objectives

    Authors: Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter

    Abstract: Images perturbed subtly to be misclassified by neural networks, called adversarial examples, have emerged as a technically deep challenge and an important concern for several application domains. Most research on adversarial examples takes as its only constraint that the perturbed images are similar to the originals. However, real-world application of these ideas often requires the examples to sat… ▽ More

    Submitted 3 April, 2019; v1 submitted 31 December, 2017; originally announced January 2018.

    Comments: Accepted for publication at ACM TOPS

  27. arXiv:1609.02943  [pdf, other

    cs.CR cs.LG stat.ML

    Stealing Machine Learning Models via Prediction APIs

    Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

    Abstract: Machine learning (ML) models may be deemed confidential due to their sensitive training data, commercial value, or use in security applications. Increasingly often, confidential ML models are being deployed with publicly accessible query interfaces. ML-as-a-service ("predictive analytics") systems are an example: Some allow users to train models on potentially sensitive data and charge others for… ▽ More

    Submitted 2 October, 2016; v1 submitted 9 September, 2016; originally announced September 2016.

    Comments: 19 pages, 7 figures, Proceedings of USENIX Security 2016

  28. arXiv:1603.05615  [pdf, ps, other

    cs.CR

    A software approach to defeating side channels in last-level caches

    Authors: Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang

    Abstract: We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud). Our approach dynamically manages physical memory pages shared between security domains to disable sharing of LLC lines, thus preventing "Flush-Reload" side channels via LLCs. It also manages… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.

  29. arXiv:1603.04085  [pdf, other

    cs.CR

    Server-side verification of client behavior in cryptographic protocols

    Authors: Andrew Chi, Robert Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton

    Abstract: Numerous exploits of client-server protocols and applications involve modifying clients to behave in ways that untampered clients would not, such as crafting malicious packets. In this paper, we demonstrate practical verification of a cryptographic protocol client's messaging behavior as being consistent with the client program it is believed to be running. Moreover, we accomplish this without mod… ▽ More

    Submitted 13 March, 2016; originally announced March 2016.

  30. arXiv:1504.07704  [pdf, other

    cs.NI

    Accelerating the Development of Software-Defined Network Optimization Applications Using SOL

    Authors: Victor Heorhiadi, Michael K. Reiter, Vyas Sekar

    Abstract: Software-defined networking (SDN) can enable diverse network management applications such as traffic engineering, service chaining, network function outsourcing, and topology reconfiguration. Realizing the benefits of SDN for these applications, however, entails addressing complex network optimizations that are central to these problems. Unfortunately, such optimization problems require significan… ▽ More

    Submitted 28 April, 2015; originally announced April 2015.