Skip to main content

Showing 1–27 of 27 results for author: Bauer, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04755  [pdf, other

    cs.CR cs.AI cs.HC cs.LG

    Sales Whisperer: A Human-Inconspicuous Attack on LLM Brand Recommendations

    Authors: Weiran Lin, Anna Gerchanovsky, Omer Akgul, Lujo Bauer, Matt Fredrikson, Zifan Wang

    Abstract: Large language model (LLM) users might rely on others (e.g., prompting services), to write prompts. However, the risks of trusting prompts written by others remain unstudied. In this paper, we assess the risk of using such prompts on brand recommendation tasks when shop**. First, we found that paraphrasing prompts can result in LLMs mentioning given brands with drastically different probabilitie… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  2. arXiv:2404.02608  [pdf, other

    cs.CR

    LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation

    Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel

    Abstract: With the continuous evolution of computational devices, more and more applications are being executed remotely. The applications operate on a wide spectrum of devices, ranging from IoT nodes with low computational capabilities to large cloud providers with high capabilities. Remote execution often deals with sensitive data or executes proprietary software. Hence, the challenge of ensuring that the… ▽ More

    Submitted 4 April, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

    Comments: This official version of this paper will appear in the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  3. arXiv:2403.01860  [pdf, other

    cs.CR

    MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs

    Authors: Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori

    Abstract: The security of cloud field-programmable gate arrays (FPGAs) faces challenges from untrusted users attempting fault and side-channel attacks through malicious circuit configurations. Fault injection attacks can result in denial of service, disrupting functionality or leaking secret information. This threat is further amplified in multi-tenancy scenarios. Detecting such threats before loading onto… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Will appear in the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  4. Extension of the Dip-test Repertoire -- Efficient and Differentiable p-value Calculation for Clustering

    Authors: Lena G. M. Bauer, Collin Leiber, Christian Böhm, Claudia Plant

    Abstract: Over the last decade, the Dip-test of unimodality has gained increasing interest in the data mining community as it is a parameter-free statistical test that reliably rates the modality in one-dimensional samples. It returns a so called Dip-value and a corresponding probability for the sample's unimodality (Dip-p-value). These two values share a sigmoidal relationship. However, the specific transf… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of the 2023 SIAM International Conference on Data Mining (SDM) (pp. 109-117). Society for Industrial and Applied Mathematics

  5. arXiv:2309.10323  [pdf, other

    cs.CR

    The Impact of Exposed Passwords on Honeyword Efficacy

    Authors: Zonghao Huang, Lujo Bauer, Michael K. Reiter

    Abstract: Honeywords are decoy passwords that can be added to a credential database; if a login attempt uses a honeyword, this indicates that the site's credential database has been leaked. In this paper we explore the basic requirements for honeywords to be effective, in a threat model where the attacker knows passwords for the same users at other sites. First, we show that for user-chosen (vs. algorithmic… ▽ More

    Submitted 5 March, 2024; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: The full paper of "The Impact of Exposed Passwords on Honeyword Efficacy" accepted by the 33rd USENIX Security Symposium, August 2024

  6. arXiv:2306.16614  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    Group-based Robustness: A General Framework for Customized Robustness in the Real World

    Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif

    Abstract: Machine-learning models are known to be vulnerable to evasion attacks that perturb model inputs to induce misclassifications. In this work, we identify real-world scenarios where the true threat cannot be assessed accurately by existing attacks. Specifically, we find that conventional metrics measuring targeted and untargeted robustness do not appropriately reflect a model's ability to withstand a… ▽ More

    Submitted 10 March, 2024; v1 submitted 28 June, 2023; originally announced June 2023.

  7. arXiv:2302.13464  [pdf, other

    cs.LG cs.CR

    Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators

    Authors: Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini

    Abstract: It is becoming increasingly imperative to design robust ML defenses. However, recent work has found that many defenses that initially resist state-of-the-art attacks can be broken by an adaptive adversary. In this work we take steps to simplify the design of defenses and argue that white-box defenses should eschew randomness when possible. We begin by illustrating a new issue with the deployment o… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

  8. arXiv:2302.01757  [pdf, other

    cs.CR cs.LG stat.ML

    RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion

    Authors: Zhuoqun Huang, Neil G. Marchant, Keane Lucas, Lujo Bauer, Olga Ohrimenko, Benjamin I. P. Rubinstein

    Abstract: Randomized smoothing is a leading approach for constructing classifiers that are certifiably robust against adversarial examples. Existing work on randomized smoothing has focused on classifiers with continuous inputs, such as images, where $\ell_p$-norm bounded adversaries are commonly studied. However, there has been limited work for classifiers with discrete or variable-size inputs, such as for… ▽ More

    Submitted 24 January, 2024; v1 submitted 30 January, 2023; originally announced February 2023.

    Comments: Final camera-ready version for NeurIPS 2023. 36 pages, 7 figures, 12 tables. Includes 20 pages of appendices. Code available at https://github.com/Dovermore/randomized-deletion

  9. arXiv:2205.06720  [pdf, other

    cs.CR cs.LG

    On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

    Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler

    Abstract: We study a pitfall in the typical workflow for differentially private machine learning. The use of differentially private learning algorithms in a "drop-in" fashion -- without accounting for the impact of differential privacy (DP) noise when choosing what feature engineering operations to use, what features to select, or what neural network architecture to use -- yields overly complex and poorly p… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  10. arXiv:2204.06603  [pdf, other

    cs.MA

    Agent-based Constraint Solving for Resource Allocation in Manycore Systems

    Authors: Volker Wenzel, Lars Bauer, Wolfgang Schröder-Preikschat, Jörg Henkel

    Abstract: For efficiency reasons, manycore systems are increasingly heterogeneous, which makes the map** of complex workloads a key problem with a high optimization potential. Constraints express the application requirements like which core type to choose, how many cores to choose, exclusively or non-exclusively, using a certain core, etc. In this work, we propose a decentralized solution for solving appl… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  11. arXiv:2203.05408  [pdf, other

    cs.CR cs.AI cs.SD eess.AS

    Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

    Authors: Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor

    Abstract: Audio CAPTCHAs are supposed to provide a strong defense for online resources; however, advances in speech-to-text mechanisms have rendered these defenses ineffective. Audio CAPTCHAs cannot simply be abandoned, as they are specifically named by the W3C as important enablers of accessibility. Accordingly, demonstrably more robust audio CAPTCHAs are important to the future of a secure and accessible… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  12. arXiv:2112.14232  [pdf, other

    cs.LG cs.CR cs.CV

    Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks

    Authors: Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif

    Abstract: We propose new, more efficient targeted white-box attacks against deep neural networks. Our attacks better align with the attacker's goal: (1) tricking a model to assign higher probability to the target class than to any other class, while (2) staying within an $ε$-distance of the attacked input. First, we demonstrate a loss function that explicitly encodes (1) and show that Auto-PGD finds more at… ▽ More

    Submitted 20 June, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

  13. arXiv:2112.08637  [pdf, other

    cs.CL cs.AI

    Analyzing the Limits of Self-Supervision in Handling Bias in Language

    Authors: Lisa Bauer, Karthik Gopalakrishnan, Spandana Gella, Yang Liu, Mohit Bansal, Dilek Hakkani-Tur

    Abstract: Prompting inputs with natural language task descriptions has emerged as a popular mechanism to elicit reasonably accurate outputs from large-scale generative language models with little to no in-context supervision. This also helps gain insight into how well language models capture the semantics of a wide range of downstream tasks purely from self-supervised pre-training on massive corpora of unla… ▽ More

    Submitted 16 August, 2023; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: Accepted at Findings of the Conference on Empirical Methods in Natural Language Processing (EMNLP) 2022

  14. arXiv:2110.07009  [pdf, other

    cs.CR cs.LG

    Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments

    Authors: Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton

    Abstract: State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication. In particular, generative models of natural language text. Loosely, these works (invertibly) encode message-carrying bits into a sequence of samples from the model, ultimately yielding a plausible natural language covertext. By focusing on this n… ▽ More

    Submitted 18 June, 2024; v1 submitted 13 October, 2021; originally announced October 2021.

  15. arXiv:2107.10139  [pdf, other

    cs.CR

    Generative Models for Security: Attacks, Defenses, and Opportunities

    Authors: Luke A. Bauer, Vincent Bindschaedler

    Abstract: Generative models learn the distribution of data from a sample dataset and can then generate new data instances. Recent advances in deep learning has brought forth improvements in generative model architectures, and some state-of-the-art models can (in some cases) produce outputs realistic enough to fool humans. We survey recent research at the intersection of security and privacy and generative… ▽ More

    Submitted 29 July, 2021; v1 submitted 21 July, 2021; originally announced July 2021.

  16. arXiv:2106.09024  [pdf, other

    cs.CL cs.LG

    Disentangling Online Chats with DAG-Structured LSTMs

    Authors: Duccio Pappadopulo, Lisa Bauer, Marco Farina, Ozan İrsoy, Mohit Bansal

    Abstract: Many modern messaging systems allow fast and synchronous textual communication among many users. The resulting sequence of messages hides a more complicated structure in which independent sub-conversations are interwoven with one another. This poses a challenge for any task aiming to understand the content of the chat logs or gather information from them. The ability to disentangle these conversat… ▽ More

    Submitted 16 June, 2021; originally announced June 2021.

    Comments: 8 pages, 1 figure. Accepted at *SEM 2021

  17. arXiv:2104.10193  [pdf, other

    cs.CL cs.AI

    Identify, Align, and Integrate: Matching Knowledge Graphs to Commonsense Reasoning Tasks

    Authors: Lisa Bauer, Mohit Bansal

    Abstract: Integrating external knowledge into commonsense reasoning tasks has shown progress in resolving some, but not all, knowledge gaps in these tasks. For knowledge integration to yield peak performance, it is critical to select a knowledge graph (KG) that is well-aligned with the given task's objective. We present an approach to assess how well a candidate KG can correctly identify and accurately fill… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

    Comments: EACL 2021 (14 pages, 2 figures, 10 tables)

  18. arXiv:2104.07644  [pdf, other

    cs.CL cs.AI

    ExplaGraphs: An Explanation Graph Generation Task for Structured Commonsense Reasoning

    Authors: Swarnadeep Saha, Prateek Yadav, Lisa Bauer, Mohit Bansal

    Abstract: Recent commonsense-reasoning tasks are typically discriminative in nature, where a model answers a multiple-choice question for a certain context. Discriminative tasks are limiting because they fail to adequately evaluate the model's ability to reason and explain predictions with underlying commonsense knowledge. They also allow such models to use reasoning shortcuts and not be "right for the righ… ▽ More

    Submitted 18 October, 2021; v1 submitted 15 April, 2021; originally announced April 2021.

    Comments: EMNLP 2021 (25 pages)

  19. arXiv:2012.12415  [pdf, other

    cs.HC cs.CY

    What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention

    Authors: Tianshi Li, Camille Cobb, Jackie, Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong

    Abstract: Smartphone-based contact-tracing apps are a promising solution to help scale up the conventional contact-tracing process. However, low adoption rates have become a major issue that prevents these apps from achieving their full potential. In this paper, we present a national-scale survey experiment ($N = 1963$) in the U.S. to investigate the effects of app design choices and individual differences… ▽ More

    Submitted 10 May, 2021; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: 44 pages, 7 figures, 7 tables

  20. arXiv:2010.09853  [pdf, other

    cs.CR cs.CY

    (How) Do people change their passwords after a breach?

    Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia

    Abstract: To protect against misuse of passwords compromised in a breach, consumers should promptly change affected passwords and any similar passwords on other accounts. Ideally, affected companies should strongly encourage this behavior and have mechanisms in place to mitigate harm. In order to make recommendations to companies about how to help their users perform these and other security-enhancing actio… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: 9 pages

  21. arXiv:2010.09843  [pdf, other

    cs.CR cs.CY

    What breach? Measuring online awareness of security incidents by studying real-world browsing behavior

    Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia

    Abstract: Awareness about security and privacy risks is important for develo** good security habits. Learning about real-world security incidents and data breaches can alert people to the ways in which their information is vulnerable online, thus playing a significant role in encouraging safe security behavior. This paper examines 1) how often people read about security incidents online, 2) of those peopl… ▽ More

    Submitted 27 May, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: 17 pages

  22. arXiv:2004.03244  [pdf, ps, other

    cs.OS cs.AR

    SoftWear: Software-Only In-Memory Wear-Leveling for Non-Volatile Main Memory

    Authors: Christian Hakert, Kuan-Hsun Chen, Paul R. Genssler, Georg von der Brüggen, Lars Bauer, Hussam Amrouch, Jian-Jia Chen, Jörg Henkel

    Abstract: Several emerging technologies for byte-addressable non-volatile memory (NVM) have been considered to replace DRAM as the main memory in computer systems during the last years. The disadvantage of a lower write endurance, compared to DRAM, of NVM technologies like Phase-Change Memory (PCM) or Ferroelectric RAM (FeRAM) has been addressed in the literature. As a solution, in-memory wear-leveling tech… ▽ More

    Submitted 8 April, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

  23. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

    Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre

    Abstract: Motivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality o… ▽ More

    Submitted 25 October, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: Code for transformations at https://github.com/pwwl/enhanced-binary-diversification. Presentation at https://dl.acm.org/doi/10.1145/3433210.3453086. An author of a related work [32] contacted us regarding our characterization of their defense (Sec 2.2). They point out that our attack is not within the stated scope of their defense, but agree their defense would be ineffective against our attack

  24. arXiv:1912.09059  [pdf, other

    cs.CV cs.CR

    $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers

    Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter

    Abstract: This paper proposes a new defense called $n$-ML against adversarial examples, i.e., inputs crafted by perturbing benign inputs by small amounts to induce misclassifications by classifiers. Inspired by $n$-version programming, $n$-ML trains an ensemble of $n$ classifiers, and inputs are classified by a vote of the classifiers in the ensemble. Unlike prior such approaches, however, the classifiers i… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

  25. arXiv:1809.06309  [pdf, other

    cs.CL cs.AI

    Commonsense for Generative Multi-Hop Question Answering Tasks

    Authors: Lisa Bauer, Yicheng Wang, Mohit Bansal

    Abstract: Reading comprehension QA tasks have seen a recent surge in popularity, yet most works have focused on fact-finding extractive QA. We instead focus on a more challenging multi-hop generative task (NarrativeQA), which requires the model to reason, gather, and synthesize disjoint pieces of information within the context to generate an answer. This type of multi-step reasoning also often requires unde… ▽ More

    Submitted 31 May, 2019; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: EMNLP 2018 (22 pages)

  26. arXiv:1802.09653  [pdf, other

    cs.CR cs.CV

    On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

    Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter

    Abstract: Much research effort has been devoted to better understanding adversarial examples, which are specially crafted inputs to machine-learning models that are perceptually similar to benign inputs, but are classified differently (i.e., misclassified). Both algorithms that create adversarial examples and strategies for defending against them typically use $L_p$-norms to measure the perceptual similarit… ▽ More

    Submitted 27 July, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: Appeared in CV-COPS/CVPRW 2018

  27. arXiv:1801.00349  [pdf, other

    cs.CV cs.CR

    A General Framework for Adversarial Examples with Objectives

    Authors: Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter

    Abstract: Images perturbed subtly to be misclassified by neural networks, called adversarial examples, have emerged as a technically deep challenge and an important concern for several application domains. Most research on adversarial examples takes as its only constraint that the perturbed images are similar to the originals. However, real-world application of these ideas often requires the examples to sat… ▽ More

    Submitted 3 April, 2019; v1 submitted 31 December, 2017; originally announced January 2018.

    Comments: Accepted for publication at ACM TOPS