-
Internet of Paint (IoP): Channel Modeling and Capacity Analysis for Terahertz Electromagnetic Nanonetworks Embedded in Paint
Authors:
Lasantha Thakshila Wedage,
Mehmet Can Vuran,
Bernard Butler,
Yevgeni Koucheryavy,
Sasitharan Balasubramaniam
Abstract:
This work opens a new chapter in the 100,000 year-old concept of paint, by leveraging innovations in nano-technology in the sub-THz frequency range. More specifically, the groundbreaking concept of Internet of Paint (IoP) is introduced along with a comprehensive channel model and a capacity analysis for nano-scale radios embedded in paint and communicating through paint. Nano-network devices, inte…
▽ More
This work opens a new chapter in the 100,000 year-old concept of paint, by leveraging innovations in nano-technology in the sub-THz frequency range. More specifically, the groundbreaking concept of Internet of Paint (IoP) is introduced along with a comprehensive channel model and a capacity analysis for nano-scale radios embedded in paint and communicating through paint. Nano-network devices, integrated within a paint medium, communicate via a multipath strategy, encompassing direct waves, reflections from interfaces, and lateral wave propagation. The evaluation incorporates three distinct paint types to assess path losses, received powers, and channel capacity. Analysis of path loss indicates a slight non-linear increase with both frequency and Line of Sight (LoS) distance between transceivers. Notably, paints with high refractive indexes result in the highest path loss. Moreover, burying transceivers at similar depths near the Air-Paint interface showcases promising performance of lateral waves with increasing LoS distance. Increasing paint layer depth leads to amplified attenuation, while total received power exhibits promising results when in close proximity to the Air-Paint interface but steeply declines with burial depth. Additionally, a substantial reduction in channel capacity is observed with LoS distance and burial depth, so transceivers need to be close together and in proximity of the A-P interface to communicate effectively. Comparing paint and air mediums, IoP demonstrates approximately two orders of magnitude reduction in channel capacity compared to air-based communication channels. This paper provides valuable insights into the potential of IoP communication within paint mediums and offers a foundation for further advancements in this emerging field.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Authors:
Jennifer Sheldon,
Weidong Zhu,
Adnan Abdullah,
Sri Hrushikesh Varma Bhupathiraju,
Takeshi Sugawara,
Kevin R. B. Butler,
Md Jahidul Islam,
Sara Rampazzi
Abstract:
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulne…
▽ More
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulnerabilities of fault-tolerant storage devices, resource allocation software, and distributed file systems to acoustic injection attacks in UDCs. With a realistic testbed approximating UDC server operations, we empirically characterize the capabilities of acoustic injection underwater and find that an attacker can reduce fault-tolerant RAID 5 storage system throughput by 17% up to 100%. Our closed-water analyses reveal that attackers can (i) cause unresponsiveness and automatic node removal in a distributed filesystem with only 2.4 minutes of sustained acoustic injection, (ii) induce a distributed database's latency to increase by up to 92.7% to reduce system reliability, and (iii) induce load-balance managers to redirect up to 74% of resources to a target server to cause overload or force resource colocation. Furthermore, we perform open-water experiments in a lake and find that an attacker can cause controlled throughput degradation at a maximum allowable distance of 6.35 m using a commercial speaker. We also investigate and discuss the effectiveness of standard defenses against acoustic injection attacks. Finally, we formulate a novel machine learning-based detection system that reaches 0% False Positive Rate and 98.2% True Positive Rate trained on our dataset of profiled hard disk drives under 30-second FIO benchmark execution. With this work, we aim to help manufacturers proactively protect UDCs against acoustic injection attacks and ensure the security of subsea computing infrastructures.
△ Less
Submitted 7 May, 2024; v1 submitted 17 April, 2024;
originally announced April 2024.
-
The Landscape and Challenges of HPC Research and LLMs
Authors:
Le Chen,
Nesreen K. Ahmed,
Akash Dutta,
Arijit Bhattacharjee,
Sixing Yu,
Quazi Ishtiaque Mahmud,
Waqwoya Abebe,
Hung Phan,
Aishwarya Sarkar,
Branden Butler,
Niranjan Hasabnis,
Gal Oren,
Vy A. Vo,
Juan Pablo Munoz,
Theodore L. Willke,
Tim Mattson,
Ali Jannesari
Abstract:
Recently, language models (LMs), especially large language models (LLMs), have revolutionized the field of deep learning. Both encoder-decoder models and prompt-based techniques have shown immense potential for natural language processing and code-based tasks. Over the past several years, many research labs and institutions have invested heavily in high-performance computing, approaching or breach…
▽ More
Recently, language models (LMs), especially large language models (LLMs), have revolutionized the field of deep learning. Both encoder-decoder models and prompt-based techniques have shown immense potential for natural language processing and code-based tasks. Over the past several years, many research labs and institutions have invested heavily in high-performance computing, approaching or breaching exascale performance levels. In this paper, we posit that adapting and utilizing such language model-based techniques for tasks in high-performance computing (HPC) would be very beneficial. This study presents our reasoning behind the aforementioned position and highlights how existing ideas can be improved and adapted for HPC tasks.
△ Less
Submitted 6 February, 2024; v1 submitted 2 February, 2024;
originally announced February 2024.
-
Collaborative Safe Formation Control for Coupled Multi-Agent Systems
Authors:
Brooks A. Butler,
Chi Ho Leung,
Philip E. Paré
Abstract:
The safe control of multi-robot swarms is a challenging and active field of research, where common goals include maintaining group cohesion while simultaneously avoiding obstacles and inter-agent collision. Building off our previously developed theory for distributed collaborative safety-critical control for networked dynamic systems, we propose a distributed algorithm for the formation control of…
▽ More
The safe control of multi-robot swarms is a challenging and active field of research, where common goals include maintaining group cohesion while simultaneously avoiding obstacles and inter-agent collision. Building off our previously developed theory for distributed collaborative safety-critical control for networked dynamic systems, we propose a distributed algorithm for the formation control of robot swarms given individual agent dynamics, induced formation dynamics, and local neighborhood position and velocity information within a defined sensing radius for each agent. Individual safety guarantees for each agent are obtained using rounds of communication between neighbors to restrict unsafe control actions among cooperating agents through safety conditions derived from high-order control barrier functions. We provide conditions under which a swarm is guaranteed to achieve collective safety with respect to multiple obstacles using a modified collaborative safety algorithm. We demonstrate the performance of our distributed algorithm via simulation in a simplified physics-based environment.
△ Less
Submitted 2 April, 2024; v1 submitted 18 November, 2023;
originally announced November 2023.
-
Collaborative Safety-Critical Control for Networked Dynamic Systems
Authors:
Brooks A. Butler,
Philip E. Paré
Abstract:
As modern systems become ever more connected with complex dynamic coupling relationships, the development of safe control methods for such networked systems becomes paramount. In this paper, we define a general networked model with coupled dynamics and local control and discuss the relationship of node-level safety definitions for individual agents with local neighborhood dynamics. We define a nod…
▽ More
As modern systems become ever more connected with complex dynamic coupling relationships, the development of safe control methods for such networked systems becomes paramount. In this paper, we define a general networked model with coupled dynamics and local control and discuss the relationship of node-level safety definitions for individual agents with local neighborhood dynamics. We define a node-level barrier function (NBF), node-level control barrier function (NCBF), and collaborative node-level barrier function (cNCBF) and provide conditions under which sets defined by these functions will be forward invariant. We use collaborative node-level barrier functions to construct a novel distributed algorithm for the safe control of collaborating network agents and provide conditions under which the algorithm is guaranteed to converge to a viable set of safe control actions for all agents or a terminally infeasible state for at least one agent. We introduce the notion of non-compliance of network neighbors as a metric of robustness for collaborative safety for a given network state and chosen barrier function hyper-parameters. We illustrate these results on a networked susceptible-infected-susceptible (SIS) model.
△ Less
Submitted 1 May, 2024; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Comparative Analysis of Terahertz Propagation Under Dust Storm Conditions on Mars and Earth
Authors:
Lasantha Thakshila Wedage,
Bernard Butler,
Sasitharan Balasubramaniam,
Yevgeni Koucheryavy,
Mehmet C. Vuran
Abstract:
Reliable Terahertz (THz) links are necessary for outdoor point-to-point communication with the exponential growth of wireless data traffic. This study presents a modified Monte Carlo simulation procedure for estimating THz link attenuation due to multiple scattering by dust particles on the THz beam propagation path. Scattering models are developed for beams through dust, based on Mie and Rayleigh…
▽ More
Reliable Terahertz (THz) links are necessary for outdoor point-to-point communication with the exponential growth of wireless data traffic. This study presents a modified Monte Carlo simulation procedure for estimating THz link attenuation due to multiple scattering by dust particles on the THz beam propagation path. Scattering models are developed for beams through dust, based on Mie and Rayleigh approximations for corresponding frequencies for Earth (0.24 THz) and Mars (1.64 THz). The simulation results are compared, considering parameters such as the number of Monte-Carlo photon (MCP) packets, visibility, dust particle placement density along the beam, frequency, and distance between the transmitter and the receiver. Moreover, a channel capacity model was proposed, considering THz link attenuation due to dust storms, spreading loss and molecular absorption loss for Earth and Mars outdoor environments. Simulation results for Earth show that link attenuation increases with dust particle placement density, distance and frequency, and attenuation decreases with visibility. On Mars, similar results are obtained, except that the attenuation is variate around a constant value with the frequency increase. Channel capacity is estimated for Earth and Mars environments considering time and distance-dependent scenarios. Time windows that show a sudden drop of dust particles along the beam provide opportunities to communicate with high reliability. Moreover, increasing the distance between the transmitter and receiver severely reduces the channel capacity measurement in strong dust storm conditions in both environments. Our study has found that weak dust storms have relatively little effect on Mars, but much larger effects on Earth.
△ Less
Submitted 10 December, 2022;
originally announced January 2023.
-
A Practical Methodology for ML-Based EM Side Channel Disassemblers
Authors:
Cesar N. Arguello,
Hunter Searle,
Sara Rampazzi,
Kevin R. B. Butler
Abstract:
Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine…
▽ More
Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine learning model, we built an EM side channel based instruction level disassembler. The disassembler was tested on an Arduino UNO board, yielding an accuracy of 88.69% instruction recognition for traces from twelve instructions captured at a single location in the device; this is an improvement compared to the 75.6% (for twenty instructions) reported in previous similar work.
△ Less
Submitted 20 July, 2022; v1 submitted 21 June, 2022;
originally announced June 2022.
-
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android
Authors:
Mounir Elgharabawy,
Blas Kojusner,
Mohammad Mannan,
Kevin R. B. Butler,
Byron Williams,
Amr Youssef
Abstract:
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix…
▽ More
The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix domain sockets have not been examined comprehensively, despite playing a crucial role in the IPC of highly privileged system daemons. In this paper, we propose SAUSAGE, an efficient novel static analysis framework to study the security properties of these sockets. SAUSAGE considers access control policies implemented in the Android security model, as well as authentication checks implemented by the daemon binaries. It is a fully static analysis framework, specifically designed to analyze Unix domain socket usage in Android system daemons, at scale. We use this framework to analyze 200 Android images across eight popular smartphone vendors spanning Android versions 7-9. As a result, we uncover multiple access control misconfigurations and insecure authentication checks. Our notable findings include a permission bypass in highly privileged Qualcomm system daemons and an unprotected socket that allows an untrusted app to set the scheduling priority of other processes running on the system, despite the implementation of mandatory SELinux policies. Ultimately, the results of our analysis are worrisome; all vendors except the Android Open Source Project (AOSP) have access control issues, allowing an untrusted app to communicate to highly privileged daemons through Unix domain sockets introduced by hardware manufacturer or vendor customization.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Graph-based Heuristic Solution for Placing Distributed Video Processing Applications on Moving Vehicle Clusters
Authors:
Kanika Sharma,
Bernard Butler,
Brendan Jennings
Abstract:
Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of on-board sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources,…
▽ More
Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of on-board sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment by a), Using real vehicle density data to build a realistic mobility model that helps in selecting nodes for service deployment b), Using community-detection algorithms for selecting a robust vehicular cluster using the predicted mobility behavior of vehicles. The stability of the chosen cluster is validated using a graph centrality measure, and c), Graph-based placement heuristics are developed to find the optimal placement of service graphs based on a multi-objective constrained optimization problem with the objective of efficient resource utilization. The heuristic solves an important problem of processing data generated from distributed devices by balancing the trade-off between increasing the number of service instances to have enough redundancy of processing instances to increase resilience in the service in case of node or link failure, versus reducing their number to minimise resource usage. We compare our heuristic to an integer linear program solution and a first-fit heuristic. Our approach performs better than these comparable schemes in terms of resource utilization and/or has a lesser service latency, which is a crucial requirement for safety-related applications.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
Scaling and Placing Distributed Services on Vehicle Clusters in Urban Environments
Authors:
Kanika Sharma,
Bernard Butler,
Brendan Jennings
Abstract:
Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous cars, driver assistance systems, and in-vehicle entertainment, many vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question…
▽ More
Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous cars, driver assistance systems, and in-vehicle entertainment, many vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question, we study the efficient placement of distributed services on a moving vehicle cluster. We present a macroscopic flow model for an intersection in Dublin, Ireland, using real vehicle density data. We show that such aggregate flows are highly predictable (even though the paths of individual vehicles are not known in advance), making it viable to deploy services harnessing vehicles' sensing capabilities. Our main contribution is a detailed mathematical specification for a task-based, distributed service placement model that scales according to the resource requirements and is robust to the changes caused by the mobility of the cluster. We formulate this as a constrained optimization problem, with the objective of minimizing overall processing and communication costs. Our results show that jointly scaling tasks and finding a mobility-aware, optimal placement results in reduced processing and communication costs compared to an autonomous vehicular edge computing-based naïve solution.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Authors:
Washington Garcia,
Pin-Yu Chen,
Somesh Jha,
Scott Clouse,
Kevin R. B. Butler
Abstract:
Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It was recently shown in the gradient-level setting that regular adversarial examples leave the data manifold, while their on-manifold counterparts are in…
▽ More
Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It was recently shown in the gradient-level setting that regular adversarial examples leave the data manifold, while their on-manifold counterparts are in fact generalization errors. In this paper, we argue that query efficiency in the zeroth-order setting is connected to an adversary's traversal through the data manifold. To explain this behavior, we propose an information-theoretic argument based on a noisy manifold distance oracle, which leaks manifold information through the adversary's gradient estimate. Through numerical experiments of manifold-gradient mutual information, we show this behavior acts as a function of the effective problem dimensionality and number of training points. On real-world datasets and multiple zeroth-order attacks using dimension-reduction, we observe the same universal behavior to produce samples closer to the data manifold. This results in up to two-fold decrease in the manifold distance measure, regardless of the model robustness. Our results suggest that taking the manifold-gradient mutual information into account can thus inform better robust model design in the future, and avoid leakage of the sensitive data manifold.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Evolving Intelligent Reflector Surface towards 6G for Public Health: Application in Airborne Virus Detection
Authors:
Harun Šiljak,
Nouman Ashraf,
Michael Taynnan Barros,
Daniel Perez Martins,
Bernard Butler,
Arman Farhang,
Nicola Marchetti,
Sasitharan Balasubramaniam
Abstract:
While metasurface based intelligent reflecting surfaces (IRS) are an important emerging technology for future generations of wireless connectivity in its own right, the plans for the mass deployment of these surfaces motivate the question of their integration with other new and emerging technologies that would require mass proliferation. This question of integration and the vision of future commun…
▽ More
While metasurface based intelligent reflecting surfaces (IRS) are an important emerging technology for future generations of wireless connectivity in its own right, the plans for the mass deployment of these surfaces motivate the question of their integration with other new and emerging technologies that would require mass proliferation. This question of integration and the vision of future communication systems as an invaluable component for public health motivated our new concept of Intelligent Reflector-Viral Detectors (IR-VD). In this novel scheme, we propose deployment of intelligent reflectors with strips of receptor-based viral detectors placed between the reflective surface tiles. Our proposed approach encodes information of the virus by flicking the angle of the reflected beams, using time variations between the beam deviations to represent the messages. This information includes the presence of the virus, its location and load size. The paper presents simulation to demonstrate the encoding process based on varying quantity of virus that have bound onto the IR-VD.
△ Less
Submitted 4 September, 2020;
originally announced September 2020.
-
One-Time Programs made Practical
Authors:
Lianying Zhao,
Joseph I. Choi,
Didem Demirag,
Kevin R. B. Butler,
Mohammad Mannan,
Erman Ayday,
Jeremy Clark
Abstract:
A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh…
▽ More
A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adhoc/unrealistic assumptions. To bridge this gap, we explore how the Trusted Execution Environment (TEE) of modern CPUs can realize the OTP functionality. Specifically, we build two flavours of such a system: in the first, the TEE directly enforces the one-timeness of the program; in the second, the program is represented with a garbled circuit and the TEE ensures Bob's input can only be wired into the circuit once, equivalent to a smaller cryptographic primitive called one-time memory. These have different performance profiles: the first is best when Alice's input is small and Bob's is large, and the second for the converse.
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
A Hybrid Approach to Secure Function Evaluation Using SGX
Authors:
Joseph I. Choi,
Dave '**g' Tian,
Grant Hernandez,
Christopher Patton,
Benjamin Mood,
Thomas Shrimpton,
Kevin R. B. Butler,
Patrick Traynor
Abstract:
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica…
▽ More
A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractical for most real-time, online computations, particularly on modestly provisioned devices. Intel's Software Guard Extensions (SGX) provides hardware-protected execution environments, called enclaves, that may be viewed as trusted computation oracles. While SGX provides native CPU speed for secure computation, previous side-channel and micro-architecture attacks have demonstrated how security guarantees of enclaves can be compromised.
In this paper, we explore a balanced approach to 2P-SFE on SGX-enabled processors by constructing a protocol for evaluating $f$ relative to a partitioning of $f$. This approach alleviates the burden of trust on the enclave by allowing the protocol designer to choose which components should be evaluated within the enclave, and which via standard cryptographic techniques. We describe SGX-enabled SFE protocols (modeling the enclave as an oracle), and formalize the strongest-possible notion of 2P-SFE for our setting. We prove our protocol meets this notion when properly realized. We implement the protocol and apply it to two practical problems: privacy-preserving queries to a database, and a version of Dijkstra's algorithm for privacy-preserving navigation. Our evaluation shows that our SGX-enabled SFE scheme enjoys a 38x increase in performance over garbled-circuit-based SFE. Finally, we justify modeling of the enclave as an oracle by implementing protections against known side-channels.
△ Less
Submitted 6 May, 2019; v1 submitted 3 May, 2019;
originally announced May 2019.
-
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Authors:
Hadi Abdullah,
Washington Garcia,
Christian Peeters,
Patrick Traynor,
Kevin R. B. Butler,
Joseph Wilson
Abstract:
Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human b…
▽ More
Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human beings. Such attacks, though, are often highly dependent on white-box knowledge of a specific machine learning model and limited to specific microphones and speakers, making their use across different acoustic hardware platforms (and thus their practicality) limited. In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (blackbox) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems. Specifically, we exploit the fact that multiple source audio samples have similar feature vectors when transformed by acoustic feature extraction algorithms (e.g., FFTs). We develop four classes of perturbations that create unintelligible audio and test them against 12 machine learning models, including 7 proprietary models (e.g., Google Speech API, Bing Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful attacks against all targets. Moreover, we successfully use our maliciously generated audio samples in multiple hardware configurations, demonstrating effectiveness across both models and real systems. In so doing, we demonstrate that domain-specific knowledge of audio signal processing represents a practical means of generating successful hidden voice command attacks.
△ Less
Submitted 18 March, 2019;
originally announced April 2019.
-
Explainable Black-Box Attacks Against Model-based Authentication
Authors:
Washington Garcia,
Joseph I. Choi,
Suman K. Adari,
Somesh Jha,
Kevin R. B. Butler
Abstract:
Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demons…
▽ More
Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demonstrates that mimicking the unique signatures generated by host fingerprinting and biometric authentication systems is possible. We expose the ineffectiveness of underlying machine learning classification models by constructing a blind attack based around the query synthesis framework and utilizing Explainable-AI (XAI) techniques. We launch an attack in under 130 queries on a state-of-the-art face authentication system, and under 100 queries on a host authentication system. We examine how these attacks can be defended against and explore their limitations. XAI provides an effective means for adversaries to infer decision boundaries and provides a new way forward in constructing attacks against systems using machine learning models for authentication.
△ Less
Submitted 28 September, 2018;
originally announced October 2018.
-
Potential of Augmented Reality for Intelligent Transportation Systems
Authors:
Adnan Mahmood,
Bernard Butler,
Brendan Jennings
Abstract:
Rapid advances in wireless communication technologies coupled with ongoing massive development in vehicular networking standards and innovations in computing, sensing, and analytics have paved the way for intelligent transportation systems (ITS) to develop rapidly in the near future. ITS provides a complete solution for the efficient and intelligent management of real-time traffic, wherein sensory…
▽ More
Rapid advances in wireless communication technologies coupled with ongoing massive development in vehicular networking standards and innovations in computing, sensing, and analytics have paved the way for intelligent transportation systems (ITS) to develop rapidly in the near future. ITS provides a complete solution for the efficient and intelligent management of real-time traffic, wherein sensory data is collected from within the vehicles (i.e., via their onboard units) as well as data exchanged between the vehicles, between the vehicles and their supporting roadside infrastructure/network, among the vehicles and vulnerable pedestrians, subsequently paving the way for the realization of the futuristic Internet of Vehicles. The traditional intent of an ITS system is to detect, monitor, control, and subsequently reduce traffic congestion based on a real-time analysis of the data pertinent to certain patterns of the road traffic, including traffic density at a geographical area of interest, precise velocity of vehicles, current and predicted travelling trajectories and times, etc. However, merely relying on an ITS framework is not an optimal solution. In case of dense traffic environments, where communication broadcasts from hundreds of thousands of vehicles could potentially choke the entire network (and so could lead to fatal accidents in the case of autonomous vehicles that depend on reliable communications for their operational safety), a fall back to the traditional decentralized vehicular ad hoc network (VANET) approach becomes necessary. It is therefore of critical importance to enhance the situational awareness of vehicular drivers so as to enable them to make quick but well-founded manual decisions in such safety-critical situations.
△ Less
Submitted 10 June, 2018;
originally announced June 2018.
-
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
Authors:
Grant Hernandez,
Farhaan Fowze,
Dave Tian,
Tuba Yavuz,
Kevin R. B. Butler
Abstract:
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit the unconstrained functionality afforded to these devices as a vector for compromise. Fundamentally, it is virtually impossible to know whether a…
▽ More
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit the unconstrained functionality afforded to these devices as a vector for compromise. Fundamentally, it is virtually impossible to know whether a USB device is benign or malicious. This work introduces FirmUSB, a USB-specific firmware analysis framework that uses domain knowledge of the USB protocol to examine firmware images and determine the activity that they can produce. Embedded USB devices use microcontrollers that have not been well studied by the binary analysis community, and our work demonstrates how lifters into popular intermediate representations for analysis can be built, as well as the challenges of doing so. We develop targeting algorithms and use domain knowledge to speed up these processes by a factor of 7 compared to unconstrained fully symbolic execution. We also successfully find malicious activity in embedded 8051 firmwares without the use of source code. Finally, we provide insights into the challenges of symbolic analysis on embedded architectures and provide guidance on improving tools to better handle this important class of devices.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
Minimum Distances of the QC-LDPC Codes in IEEE 802 Communication Standards
Authors:
Brian K. Butler
Abstract:
This work applies earlier results on Quasi-Cyclic (QC) LDPC codes to the codes specified in six separate IEEE 802 standards, specifying wireless communications from 54 MHz to 60 GHz. First, we examine the weight matrices specified to upper bound the codes' minimum distance independent of block length. Next, we search for the minimum distance achieved for the parity check matrices selected at each…
▽ More
This work applies earlier results on Quasi-Cyclic (QC) LDPC codes to the codes specified in six separate IEEE 802 standards, specifying wireless communications from 54 MHz to 60 GHz. First, we examine the weight matrices specified to upper bound the codes' minimum distance independent of block length. Next, we search for the minimum distance achieved for the parity check matrices selected at each block length. Finally, solutions to the computational challenges encountered are addressed.
△ Less
Submitted 8 February, 2016;
originally announced February 2016.
-
LDPC Code Density Evolution in the Error Floor Region
Authors:
Brian K. Butler,
Paul H. Siegel
Abstract:
This short paper explores density evolution (DE) for low-density parity-check (LDPC) codes at signal-to-noise-ratios (SNRs) that are significantly above the decoding threshold. The focus is on the additive white Gaussian noise channel and LDPC codes in which the variable nodes have regular degree.
Prior work, using DE, produced results in the error floor region which were asymptotic in the belie…
▽ More
This short paper explores density evolution (DE) for low-density parity-check (LDPC) codes at signal-to-noise-ratios (SNRs) that are significantly above the decoding threshold. The focus is on the additive white Gaussian noise channel and LDPC codes in which the variable nodes have regular degree.
Prior work, using DE, produced results in the error floor region which were asymptotic in the belief-propagation decoder's log-likelihood ratio (LLR) values. We develop expressions which closely approximate the LLR growth behavior at moderate LLR magnitudes. We then produce bounds on the mean extrinsic check-node LLR values required, as a function of SNR, such that the growth rate of the LLRs exceeds that of a particular trap** set's internal LLRs such that its error floor contribution may be eliminated. We find that our predictions for the mean LLRs to be accurate in the error floor region, but the predictions for the LLR variance to be lacking beyond several initial iterations.
△ Less
Submitted 19 September, 2014;
originally announced September 2014.
-
Numerical Issues Affecting LDPC Error Floors
Authors:
Brian K. Butler,
Paul H. Siegel
Abstract:
Numerical issues related to the occurrence of error floors in floating-point simulations of belief propagation (BP) decoders are examined. Careful processing of messages corresponding to highly-certain bit values can sometimes reduce error floors by several orders of magnitude. Computational solutions for properly handling such messages are provided for the sum-product algorithm (SPA) and several…
▽ More
Numerical issues related to the occurrence of error floors in floating-point simulations of belief propagation (BP) decoders are examined. Careful processing of messages corresponding to highly-certain bit values can sometimes reduce error floors by several orders of magnitude. Computational solutions for properly handling such messages are provided for the sum-product algorithm (SPA) and several variants.
△ Less
Submitted 6 August, 2012;
originally announced August 2012.
-
Error Floor Approximation for LDPC Codes in the AWGN Channel
Authors:
Brian K. Butler,
Paul H. Siegel
Abstract:
This paper addresses the prediction of error floors of low-density parity-check (LDPC) codes with variable nodes of constant degree in the additive white Gaussian noise (AWGN) channel. Specifically, we focus on the performance of the sum-product algorithm (SPA) decoder formulated in the log-likelihood ratio (LLR) domain. We hypothesize that several published error floor levels are due to the manne…
▽ More
This paper addresses the prediction of error floors of low-density parity-check (LDPC) codes with variable nodes of constant degree in the additive white Gaussian noise (AWGN) channel. Specifically, we focus on the performance of the sum-product algorithm (SPA) decoder formulated in the log-likelihood ratio (LLR) domain. We hypothesize that several published error floor levels are due to the manner in which decoder implementations handled the LLRs at high SNRs. We employ an LLR-domain SPA decoder that does not saturate near-certain messages and find the error rates of our decoder to be lower by at least several orders of magnitude. We study the behavior of trap** sets (or near-codewords) that are the dominant cause of the reported error floors.
We develop a refined linear model, based on the work of Sun and others, that accurately predicts error floors caused by elementary tap** sets for saturating decoders. Performance results of several codes at several levels of decoder saturation are presented.
△ Less
Submitted 9 June, 2013; v1 submitted 13 February, 2012;
originally announced February 2012.
-
Bounds on the Minimum Distance of Punctured Quasi-Cyclic LDPC Codes
Authors:
Brian K. Butler,
Paul H. Siegel
Abstract:
Recent work by Divsalar et al. has shown that properly designed protograph-based low-density parity-check (LDPC) codes typically have minimum (Hamming) distance linearly increasing with block length. This fact rests on ensemble arguments over all possible expansions of the base protograph. However, when implementation complexity is considered, the expansions are frequently selected from a smaller…
▽ More
Recent work by Divsalar et al. has shown that properly designed protograph-based low-density parity-check (LDPC) codes typically have minimum (Hamming) distance linearly increasing with block length. This fact rests on ensemble arguments over all possible expansions of the base protograph. However, when implementation complexity is considered, the expansions are frequently selected from a smaller class of structured expansions. For example, protograph expansion by cyclically shifting connections generates a quasi-cyclic (QC) code. Other recent work by Smarandache and Vontobel has provided upper bounds on the minimum distance of QC codes. In this paper, we generalize these bounds to punctured QC codes and then show how to tighten these for certain classes of codes. We then evaluate these upper bounds for the family of protograph codes known as AR4JA codes that have been recommended for use in deep space communications in a standard established by the Consultative Committee for Space Data Systems (CCSDS). At block lengths larger than 4400 bits, these upper bounds fall well below the ensemble lower bounds.
△ Less
Submitted 20 February, 2013; v1 submitted 11 January, 2012;
originally announced January 2012.
-
On Distance Properties of Quasi-Cyclic Protograph-Based LDPC Codes
Authors:
Brian K. Butler,
Paul H. Siegel
Abstract:
Recent work has shown that properly designed protograph-based LDPC codes may have minimum distance linearly increasing with block length. This notion rests on ensemble arguments over all possible expansions of the base protograph. When implementation complexity is considered, the expansion is typically chosen to be quite orderly. For example, protograph expansion by cyclically shifting connections…
▽ More
Recent work has shown that properly designed protograph-based LDPC codes may have minimum distance linearly increasing with block length. This notion rests on ensemble arguments over all possible expansions of the base protograph. When implementation complexity is considered, the expansion is typically chosen to be quite orderly. For example, protograph expansion by cyclically shifting connections creates a quasi-cyclic (QC) code. Other recent work has provided upper bounds on the minimum distance of QC codes. In this paper, these bounds are expanded upon to cover puncturing and tightened in several specific cases. We then evaluate our upper bounds for the most prominent protograph code thus far, one proposed for deep-space usage in the CCSDS experimental standard, the code known as AR4JA.
△ Less
Submitted 29 April, 2010;
originally announced April 2010.