Skip to main content

Showing 1–13 of 13 results for author: Beugin, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.19577  [pdf, other

    cs.CR

    A Public and Reproducible Assessment of the Topics API on Real Data

    Authors: Yohan Beugin, Patrick McDaniel

    Abstract: The Topics API for the web is Google's privacy-enhancing alternative to replace third-party cookies. Results of prior work have led to an ongoing discussion between Google and research communities about the capability of Topics to trade off both utility and privacy. The central point of contention is largely around the realism of the datasets used in these analyses and their reproducibility; resea… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: Accepted at SecWeb 2024: Workshop on Designing Security for the Web

  2. Characterizing the Modification Space of Signature IDS Rules

    Authors: Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick McDaniel

    Abstract: Signature-based Intrusion Detection Systems (SIDSs) are traditionally used to detect malicious activity in networks. A notable example of such a system is Snort, which compares network traffic against a series of rules that match known exploits. Current SIDS rules are designed to minimize the amount of legitimate traffic flagged incorrectly, reducing the burden on network administrators. However,… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Published in: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)

  3. arXiv:2309.06263  [pdf, other

    cs.CR

    Systematic Evaluation of Geolocation Privacy Mechanisms

    Authors: Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick McDaniel

    Abstract: Location data privacy has become a serious concern for users as Location Based Services (LBSs) have become an important part of their life. It is possible for malicious parties having access to geolocation data to learn sensitive information about the user such as religion or political views. Location Privacy Preserving Mechanisms (LPPMs) have been proposed by previous works to ensure the privacy… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: M.S. Thesis (https://etda.libraries.psu.edu/catalog/25677abh5960)

  4. arXiv:2306.03825  [pdf, other

    cs.CR

    Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)

    Authors: Yohan Beugin, Patrick McDaniel

    Abstract: Today, targeted online advertising relies on unique identifiers assigned to users through third-party cookies--a practice at odds with user privacy. While the web and advertising communities have proposed solutions that we refer to as interest-disclosing mechanisms, including Google's Topics API, an independent analysis of these proposals in realistic scenarios has yet to be performed. In this pap… ▽ More

    Submitted 8 September, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2024

  5. arXiv:2305.18639  [pdf, other

    cs.CR cs.OS

    Securing Cloud File Systems using Shielded Execution

    Authors: Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta, Patrick McDaniel

    Abstract: Cloud file systems offer organizations a scalable and reliable file storage solution. However, cloud file systems have become prime targets for adversaries, and traditional designs are not equipped to protect organizations against the myriad of attacks that may be initiated by a malicious cloud provider, co-tenant, or end-client. Recently proposed designs leveraging cryptographic techniques and tr… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  6. arXiv:2210.14999  [pdf, other

    cs.CR

    EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale

    Authors: Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Patrick McDaniel

    Abstract: Public clouds provide impressive capability through resource sharing. However, recent works have shown that the reuse of IP addresses can allow adversaries to exploit the latent configurations left by previous tenants. In this work, we perform a comprehensive analysis of the effect of cloud IP address allocation on exploitation of latent configuration. We first develop a statistical model of cloud… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

  7. arXiv:2208.09776  [pdf, other

    cs.CR

    Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: Extension of arXiv:2201.09338

  8. arXiv:2204.05780  [pdf, other

    cs.LG astro-ph.EP astro-ph.SR

    A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting

    Authors: Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke, Patrick McDaniel

    Abstract: Geomagnetic storms, disturbances of Earth's magnetosphere caused by masses of charged particles being emitted from the Sun, are an uncontrollable threat to modern technology. Notably, they have the potential to damage satellites and cause instability in power grids on Earth, among other disasters. They result from high sun activity, which are induced from cool areas on the Sun known as sunspots. F… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Presented at ML-Helio 2022

  9. Measuring and Mitigating the Risk of IP Reuse on Public Clouds

    Authors: Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick McDaniel

    Abstract: Public clouds provide scalable and cost-efficient computing through resource sharing. However, moving from traditional on-premises service management to clouds introduces new challenges; failure to correctly provision, maintain, or decommission elastic services can lead to functional failure and vulnerability to attack. In this paper, we explore a broad class of attacks on clouds which we refer to… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  10. ReViVD: Exploration and Filtering of Trajectories in an Immersive Environment using 3D Shapes

    Authors: François Homps, Yohan Beugin, Romain Vuillemot

    Abstract: We present ReViVD, a tool for exploring and filtering large trajectory-based datasets using virtual reality. ReViVD's novelty lies in using simple 3D shapes -- such as cuboids, spheres and cylinders -- as queries for users to select and filter groups of trajectories. Building on this simple paradigm, more complex queries can be created by combining previously made selection groups through a system… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Accepted at IEEE Conference on Virtual Reality and 3D User Interfaces (VR) 2020

    Journal ref: 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)

  11. HoneyModels: Machine Learning Honeypots

    Authors: Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp, Patrick McDaniel

    Abstract: Machine Learning is becoming a pivotal aspect of many systems today, offering newfound performance on classification and prediction tasks, but this rapid integration also comes with new unforeseen vulnerabilities. To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms. However, a great asymmetry exists as these defensive method… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Published in: MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)

  12. arXiv:2201.09338  [pdf, other

    cs.CR

    Building a Privacy-Preserving Smart Camera System

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022

    Journal ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022

  13. arXiv:2105.08619  [pdf, other

    cs.CR cs.LG cs.LO

    On the Robustness of Domain Constraints

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly. However, it is unclear if adversarial examples represent realistic inputs in the modeled domains. Diverse domains such as networks and phishing have domain constraints-complex relationships between features that an adversary must satisfy for an attack to be realized (in addition to any adversa… ▽ More

    Submitted 7 November, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted to the 28th ACM Conference on Computer and Communications Security. Seoul, South Korea