Skip to main content

Showing 1–9 of 9 results for author: Butler, K R B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11815  [pdf, other

    cs.CR

    AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

    Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi

    Abstract: Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulne… ▽ More

    Submitted 7 May, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024

  2. arXiv:2206.10746  [pdf

    cs.CR

    A Practical Methodology for ML-Based EM Side Channel Disassemblers

    Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler

    Abstract: Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine… ▽ More

    Submitted 20 July, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: Accepted to the poster section of the 7th IEEE European Symposium on Security and Privacy 2022

  3. arXiv:2204.01516  [pdf, other

    cs.CR cs.SE

    SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

    Authors: Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef

    Abstract: The Android operating system is currently the most popular mobile operating system in the world. Android is based on Linux and therefore inherits its features including its Inter-Process Communication (IPC) mechanisms. These mechanisms are used by processes to communicate with one another and are extensively used in Android. While Android-specific IPC mechanisms have been studied extensively, Unix… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted to EuroS&P 2022

  4. arXiv:2103.03325  [pdf, other

    cs.LG

    Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

    Authors: Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler

    Abstract: Designing deep networks robust to adversarial examples remains an open problem. Likewise, recent zeroth order hard-label attacks on image classification models have shown comparable performance to their first-order, gradient-level alternatives. It was recently shown in the gradient-level setting that regular adversarial examples leave the data manifold, while their on-manifold counterparts are in… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: Preprint

  5. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  6. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  7. arXiv:1904.05734  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

    Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

    Abstract: Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human b… ▽ More

    Submitted 18 March, 2019; originally announced April 2019.

    Journal ref: The Network and Distributed System Security Symposium (NDSS) 2019

  8. arXiv:1810.00024  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Explainable Black-Box Attacks Against Model-based Authentication

    Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler

    Abstract: Establishing unique identities for both humans and end systems has been an active research problem in the security community, giving rise to innovative machine learning-based authentication techniques. Although such techniques offer an automated method to establish identity, they have not been vetted against sophisticated attacks that target their core machine learning technique. This paper demons… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

  9. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

    Authors: Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler

    Abstract: The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit the unconstrained functionality afforded to these devices as a vector for compromise. Fundamentally, it is virtually impossible to know whether a… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 18 pages, CCS 2017