Skip to main content

Showing 1–21 of 21 results for author: Strohmeier, M

.
  1. arXiv:2403.03792  [pdf, other

    cs.CR cs.LG

    Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks

    Authors: Dario Pasquini, Martin Strohmeier, Carmela Troncoso

    Abstract: We introduce a new family of prompt injection attacks, termed Neural Exec. Unlike known attacks that rely on handcrafted strings (e.g., "Ignore previous instructions and..."), we show that it is possible to conceptualize the creation of execution triggers as a differentiable search problem and use learning-based methods to autonomously generate them. Our results demonstrate that a motivated adve… ▽ More

    Submitted 2 May, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: v0.2

  2. arXiv:2402.07510  [pdf, other

    cs.AI cs.CR

    Secret Collusion Among Generative AI Agents

    Authors: Sumeet Ramesh Motwani, Mikhail Baranchuk, Martin Strohmeier, Vijay Bolina, Philip H. S. Torr, Lewis Hammond, Christian Schroeder de Witt

    Abstract: Recent capability increases in large language models (LLMs) open up applications in which teams of communicating generative AI agents solve joint tasks. This poses privacy and security challenges concerning the unauthorised sharing of information, or other unwanted forms of agent coordination. Modern steganographic techniques could render such dynamics hard to detect. In this paper, we comprehensi… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  3. Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks

    Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of sate… ▽ More

    Submitted 4 April, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: 9 pages, 12 figures

  4. Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

    Authors: Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: Due to an increase in the availability of cheap off-the-shelf radio hardware, spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not offer cryptographic security and cannot be patched to support novel security measures. In this paper we explore radio transmitter fingerprinting in satel… ▽ More

    Submitted 7 September, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: 14 pages, 16 figures

  5. arXiv:2305.06901  [pdf, other

    cs.CR

    Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks

    Authors: Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic

    Abstract: Many modern devices, including critical infrastructures, depend on the reliable operation of electrical power conversion systems. The small size and versatility of switched-mode power converters has resulted in their widespread adoption. Whereas transformer-based systems passively convert voltage, switched-mode converters feature an actively regulated feedback loop, which relies on accurate sensor… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  6. arXiv:2304.03108  [pdf, other

    cs.NI cs.CR

    FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks

    Authors: Cyrill Krähenbühl, Marc Wyss, David Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier

    Abstract: In its current state, the Internet does not provide end users with transparency and control regarding on-path forwarding devices. In particular, the lack of network device information reduces the trustworthiness of the forwarding path and prevents end-user applications requiring specific router capabilities from reaching their full potential. Moreover, the inability to influence the traffic's forw… ▽ More

    Submitted 10 October, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  7. arXiv:2210.14889  [pdf, other

    cs.CR cs.AI cs.MM

    Perfectly Secure Steganography Using Minimum Entropy Coupling

    Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier

    Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning. While this problem has classically been studied in security literature, recent advances in generative models have led to a shared interest among security and machine learning researchers in develo** scalable steganogr… ▽ More

    Submitted 30 October, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

  8. arXiv:2209.13669  [pdf, other

    cs.NI cs.DC

    Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition

    Authors: Martin Strohmeier, Mauro Leonardi, Sergei Markochev, Fabio Ricciato, Matthias Schäfer, Vincent Lenders

    Abstract: Knowledge about the exact positioning of aircraft is crucial in many settings. Consequently, the opportunistic and independent localization of aircraft based on their communication has been a longstanding problem and subject of much research. Originating from military settings, the capability to conduct aircraft localization has moved first towards the institutional civil aviation domain and can n… ▽ More

    Submitted 6 August, 2022; originally announced September 2022.

    Comments: 14 pages, 3 figures, 5 tables

  9. Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging

    Authors: Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic

    Abstract: We present a novel attack against the Combined Charging System, one of the most widely used DC rapid charging technologies for electric vehicles (EVs). Our attack, Brokenwire, interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack requires only temporary physical proximity and can be conducted wirelessly from a distance, allowing… ▽ More

    Submitted 26 March, 2024; v1 submitted 4 February, 2022; originally announced February 2022.

    Journal ref: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society 2023

  10. arXiv:2111.12197  [pdf, other

    cs.CR cs.AI

    Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

    Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier

    Abstract: Cyber attacks are increasing in volume, frequency, and complexity. In response, the security community is looking toward fully automating cyber defense systems using machine learning. However, so far the resultant effects on the coevolutionary dynamics of attackers and defenders have not been examined. In this whitepaper, we hypothesise that increased automation on both sides will accelerate the c… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

  11. arXiv:2107.08295  [pdf, other

    cs.AI cs.MA

    Communicating via Markov Decision Processes

    Authors: Samuel Sokota, Christian Schroeder de Witt, Maximilian Igl, Luisa Zintgraf, Philip Torr, Martin Strohmeier, J. Zico Kolter, Shimon Whiteson, Jakob Foerster

    Abstract: We consider the problem of communicating exogenous information by means of Markov decision process trajectories. This setting, which we call a Markov coding game (MCG), generalizes both source coding and a large class of referential games. MCGs also isolate a problem that is important in decentralized control settings in which cheap-talk is not available -- namely, they require balancing communica… ▽ More

    Submitted 12 June, 2022; v1 submitted 17 July, 2021; originally announced July 2021.

    Comments: ICML 2022

  12. arXiv:2012.00116  [pdf, other

    cs.NI

    LocaRDS: A Localization Reference Data Set

    Authors: Matthias Schäfer, Martin Strohmeier, Mauro Leonardi, Vincent Lenders

    Abstract: The use of wireless signals for purposes of localization enables a host of applications relating to the determination and verification of the positions of network participants, ranging from radar to satellite navigation. Consequently, it has been a longstanding interest of theoretical and practical research in mobile networks and many solutions have been proposed in the scientific literature. Howe… ▽ More

    Submitted 30 November, 2020; originally announced December 2020.

    Comments: 10 pages, 6 figures, 1 table

  13. arXiv:2010.01034  [pdf, other

    cs.CR

    Understanding Realistic Attacks on Airborne Collision Avoidance Systems

    Authors: Matthew Smith, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions. Recent years have seen security research increasingly focus on aviation, identifying that key wireles… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

  14. arXiv:2007.04137  [pdf, other

    cs.CV cs.LG

    SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations

    Authors: Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic

    Abstract: Research into adversarial examples (AE) has developed rapidly, yet static adversarial patches are still the main technique for conducting attacks in the real world, despite being obvious, semi-permanent and unmodifiable once deployed. In this paper, we propose Short-Lived Adversarial Perturbations (SLAP), a novel technique that allows adversaries to realize physically robust real-world AE by usi… ▽ More

    Submitted 6 January, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Comments: 13 pages, to be published in Usenix Security 2021, project page https://github.com/ssloxford/short-lived-adversarial-perturbations

  15. arXiv:2002.05091  [pdf, other

    cs.CR cs.NI cs.PF

    QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband

    Authors: James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Satellite broadband services are critical infrastructures enabling advanced technologies to function in the most remote regions of the globe. However, status-quo services are often unencrypted by default and vulnerable to eavesdrop** attacks. In this paper, we challenge the historical perception that over-the-air security must trade off with TCP performance in high-latency satellite networks due… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: A reference implementation of QPEP and a dockerized version of the testbed and scripts used for its evaluation can be found at https://www.github.com/pavja2/qpep

  16. arXiv:1908.01061  [pdf, other

    cs.LG cs.IR stat.ML

    Classi-Fly: Inferring Aircraft Categories from Open Data using Machine Learning

    Authors: Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic

    Abstract: In recent years, air traffic communication data has become easy to access, enabling novel research in many fields. Exploiting this new data source, a wide range of applications have emerged, from weather forecasting to stock market prediction, or the collection of information about military and government movements. Typically these applications require knowledge about the metadata of the aircraft,… ▽ More

    Submitted 5 August, 2020; v1 submitted 30 July, 2019; originally announced August 2019.

    Comments: 10 pages, 6 figures, 8 tables, 40 references

  17. arXiv:1905.08039  [pdf, other

    cs.CR

    Safety vs. Security: Attacking Avionic Systems with Humans in the Loop

    Authors: Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic

    Abstract: Many wireless communications systems found in aircraft lack standard security mechanisms, leaving them fundamentally vulnerable to attack. With affordable software-defined radios available, a novel threat has emerged, allowing a wide range of attackers to easily interfere with wireless avionic systems. Whilst these vulnerabilities are known, concrete attacks that exploit them are still novel and n… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  18. arXiv:1705.07065  [pdf, other

    cs.CR cs.CY

    Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)

    Authors: Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: The manner in which Aircraft Communications, Addressing and Reporting System (ACARS) is being used has significantly changed over time. Whilst originally used by commercial airliners to track their flights and provide automated timekee** on crew, today it serves as a multi-purpose air-ground data link for many aviation stakeholders including private jet owners, state actors and military. Since A… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: 16 pages

  19. arXiv:1610.06754  [pdf, other

    cs.NI

    A Localization Approach for Crowdsourced Air Traffic Communication Networks

    Authors: Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: In this work, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with random, unplanned deployment geometry. We propose an alternative, a grid-based localization approach using the k-Nearest Neighbor algorithm, to deal with the identified shortcomings. Our proposal does not req… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: 10 pages, 10 figures, 5 tables

  20. On Perception and Reality in Wireless Air Traffic Communications Security

    Authors: Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic

    Abstract: More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these… ▽ More

    Submitted 24 October, 2016; v1 submitted 28 February, 2016; originally announced February 2016.

    Comments: 20 pages, 5 figures, 7 tables

  21. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Authors: Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in… ▽ More

    Submitted 15 April, 2014; v1 submitted 13 July, 2013; originally announced July 2013.

    Comments: Survey, 22 Pages, 21 Figures

    Report number: RR-13-10