Skip to main content

Showing 1–13 of 13 results for author: Toreini, E

.
  1. arXiv:2309.06061  [pdf, other

    cs.CR cs.CY cs.LG

    Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems

    Authors: Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel

    Abstract: Fair machine learning is a thriving and vibrant research topic. In this paper, we propose Fairness as a Service (FaaS), a secure, verifiable and privacy-preserving protocol to computes and verify the fairness of any machine learning (ML) model. In the deisgn of FaaS, the data and outcomes are represented through cryptograms to ensure privacy. Also, zero knowledge proofs guarantee the well-formedne… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: accepted in International Workshop on Private, Secure, and Trustworthy AI (PriST-AI), ESORICS'23 workshop

  2. arXiv:2308.11643  [pdf, other

    cs.HC cs.CR

    Invisible, Unreadable, and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments

    Authors: James M. Clarke, Maryam Mehrnezhad, Ehsan Toreini

    Abstract: This paper investigates the accessibility of cookie notices on websites for users with visual impairments (VI) via a set of system studies on top UK websites (n=46) and a user study (n=100). We use a set of methods and tools--including accessibility testing tools, text-only browsers, and screen readers, to perform our system studies. Our results demonstrate that the majority of cookie notices on t… ▽ More

    Submitted 17 January, 2024; v1 submitted 16 August, 2023; originally announced August 2023.

    Comments: Published in ACM Transactions on Accessible Computing

  3. A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards

    Authors: Joshua Harrison, Ehsan Toreini, Maryam Mehrnezhad

    Abstract: With recent developments in deep learning, the ubiquity of micro-phones and the rise in online services via personal devices, acoustic side channel attacks present a greater threat to keyboards than ever. This paper presents a practical implementation of a state-of-the-art deep learning model in order to classify laptop keystrokes, using a smartphone integrated microphone. When trained on keystrok… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

    Comments: This paper was already accepted in 2023 IEEE European Symposium on Security and Privacy Workshop, SiLM'23 (EuroS&PW)

  4. arXiv:2204.10344  [pdf

    cs.CR cs.HC

    In Private, Secure, Conversational FinBots We Trust

    Authors: Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel

    Abstract: In the past decade, the financial industry has experienced a technology revolution. While we witness a rapid introduction of conversational bots for financial services, there is a lack of understanding of conversational user interfaces (CUI) features in this domain. The finance industry also deals with highly sensitive information and monetary transactions, presenting a challenge for developers an… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: Proceedings of the CHI 2021 Workshop on Let's Talk About CUIs: Putting Conversational User Interface Design into Practice, May 8, 2021 in Yokohama, Japan

  5. arXiv:2202.04682  [pdf, other

    cs.HC cs.CR cs.CY

    "I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country

    Authors: Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini

    Abstract: Online tracking is a primary concern for Internet users, yet previous research has not found a clear link between the cognitive understanding of tracking and protective actions. We postulate that protective behaviour follows affective evaluation of tracking. We conducted an online study, with N=614 participants, across the UK, Germany and France, to investigate how users feel about third-party tra… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: https://www.usenix.org/system/files/sec22-coopamootoo.pdf

    Journal ref: USENIX Security Symposium 2022

  6. Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting

    Authors: Shen Wang, Ehsan Toreini, Feng Hao

    Abstract: Polymer banknotes are the trend for printed currency and have been adopted by more than fifty countries worldwide. However, over the past years, the quantity of polymer counterfeits has been increasing, so has the quality of counterfeits. This shows that the initial advantage of bringing a new polymer technology to fight against counterfeiting is reducing. To maintain one step ahead of counterfeit… ▽ More

    Submitted 23 March, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: 13 pages, 11 figures, 6 tables. This manuscript has been accepted for publication in IEEE Transactions on Information Forensics & Security in 2021

  7. arXiv:2007.08911  [pdf, other

    cs.LG cs.AI cs.CR cs.CY stat.ML

    Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context

    Authors: Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro Gonzalez Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel

    Abstract: Concerns about the societal impact of AI-based services and systems has encouraged governments and other organisations around the world to propose AI policy frameworks to address fairness, accountability, transparency and related topics. To achieve the objectives of these frameworks, the data and software engineers who build machine-learning systems require knowledge about a variety of relevant su… ▽ More

    Submitted 20 January, 2022; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: We are updating some sections to include more recent advances

  8. arXiv:2006.15449  [pdf, other

    cs.HC cs.CR

    Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance

    Authors: Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliot, Aad van Moorsel

    Abstract: FinBots are chatbots built on automated decision technology, aimed to facilitate accessible banking and to support customers in making financial decisions. Chatbots are increasing in prevalence, sometimes even equipped to mimic human social rules, expectations and norms, decreasing the necessity for human-to-human interaction. As banks and financial advisory platforms move towards creating bots th… ▽ More

    Submitted 3 July, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: In Publication for 5th IEEE European Symposium on Security & Privacy Workshops (EuroSPW)

  9. arXiv:1912.00782  [pdf, other

    cs.CY cs.AI cs.LG

    The relationship between trust in AI and trustworthy machine learning technologies

    Authors: Ehsan Toreini, Mhairi Aitken, Kovila Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel

    Abstract: To build AI-based systems that users and the public can justifiably trust one needs to understand how machine learning technologies impact trust put in these services. To guide technology developments, this paper provides a systematic approach to relate social science concepts of trust with the technologies used in AI-based services and products. We conceive trust as discussed in the ABI (Ability,… ▽ More

    Submitted 3 December, 2019; v1 submitted 27 November, 2019; originally announced December 2019.

    Comments: This submission has been accepted in ACM FAT* 2020 Conference

  10. arXiv:1905.12951  [pdf, other

    cs.CR cs.NI

    DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

    Authors: Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the `integrity' of the we… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  11. arXiv:1705.02510  [pdf, other

    cs.CR

    Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns

    Authors: Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show these patterns can be easily captured by a commodity camera and condensed into to a… ▽ More

    Submitted 7 May, 2019; v1 submitted 6 May, 2017; originally announced May 2017.

    Comments: This manuscript has been accepted for publication in the ACM Transactions on Privacy and Security (TOPS, formerly TISSEC) in 2017

    ACM Class: K.6.5; D.4.6

  12. Stealing PINs via Mobile Sensors: Actual Risk versus User Perception

    Authors: Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website controlled by an attacker, the JavaScript code embedded in the web page starts listening to the moti… ▽ More

    Submitted 18 April, 2017; v1 submitted 18 May, 2016; originally announced May 2016.

    Journal ref: International Journal of Information Security, P1-23, April 2017

  13. TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript

    Authors: Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user security and privacy are however not considered in W3C specifications. In this work, for the first time, we show how user security can be compromised using these sensor data via browser, despite that the d… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.