Skip to main content

Showing 1–23 of 23 results for author: Castelluccia, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.03821  [pdf, other

    cs.CY cs.HC

    Taking Advice from (Dis)Similar Machines: The Impact of Human-Machine Similarity on Machine-Assisted Decision-Making

    Authors: Nina Grgić-Hlača, Claude Castelluccia, Krishna P. Gummadi

    Abstract: Machine learning algorithms are increasingly used to assist human decision-making. When the goal of machine assistance is to improve the accuracy of human decisions, it might seem appealing to design ML algorithms that complement human knowledge. While neither the algorithm nor the human are perfectly accurate, one could expect that their complementary expertise might lead to improved outcomes. In… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  2. arXiv:2109.11960  [pdf

    q-bio.NC cs.CY

    Towards a Governance Framework for Brain Data

    Authors: Marcello Ienca, Joseph J. Fins, Ralf J. Jox, Fabrice Jotterand, Silja Voeneky, Roberto Andorno, Tonio Ball, Claude Castelluccia, Ricardo Chavarriaga, Hervé Chneiweiss, Agata Ferretti, Orsolya Friedrich, Samia Hurst, Grischa Merkel, Fruzsina Molnar-Gabor, Jean-Marc Rickli, James Scheibner, Effy Vayena, Rafael Yuste, Philipp Kellmeyer

    Abstract: The increasing availability of brain data within and outside the biomedical field, combined with the application of artificial intelligence (AI) to brain data analysis, poses a challenge for ethics and governance. We identify distinctive ethical implications of brain data acquisition and processing, and outline a multi-level governance framework. This framework is aimed at maximizing the benefits… ▽ More

    Submitted 28 September, 2021; v1 submitted 24 September, 2021; originally announced September 2021.

  3. arXiv:2103.00342  [pdf, other

    cs.CR cs.AI cs.LG

    Constrained Differentially Private Federated Learning for Low-bandwidth Devices

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès

    Abstract: Federated learning becomes a prominent approach when different entities want to learn collaboratively a common model without sharing their training data. However, Federated learning has two main drawbacks. First, it is quite bandwidth inefficient as it involves a lot of message exchanges between the aggregating server and the participating entities. This bandwidth and corresponding processing cost… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:2011.05578

  4. arXiv:2011.05578  [pdf, ps, other

    cs.LG cs.CR

    Compression Boosts Differentially Private Federated Learning

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès

    Abstract: Federated Learning allows distributed entities to train a common model collaboratively without sharing their own data. Although it prevents data collection and aggregation by exchanging only parameter updates, it remains vulnerable to various inference and reconstruction attacks where a malicious entity can learn private information about the participants' training data from the captured gradients… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:2010.07808

  5. arXiv:2010.07808  [pdf, other

    cs.CR cs.DC cs.LG

    Federated Learning in Adversarial Settings

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia

    Abstract: Federated Learning enables entities to collaboratively learn a shared prediction model while kee** their training data locally. It prevents data collection and aggregation and, therefore, mitigates the associated privacy risks. However, it still remains vulnerable to various security attacks where malicious participants aim at degrading the generated model, inserting backdoors, or inferring othe… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  6. arXiv:2008.01621  [pdf, other

    cs.CR

    DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems

    Authors: Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca

    Abstract: This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary I… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

  7. arXiv:2001.02650  [pdf, ps, other

    cs.CR cs.CY cs.DB

    Techniques d'anonymisation tabulaire : concepts et mise en oeuvre

    Authors: Benjamin Nguyen, Claude Castelluccia

    Abstract: In this document, we present a state of the art of anonymization techniques for classical tabular datasets. This article is geared towards a general public having some knowledge of mathematics and computer science, but with no need for specific knowledge in anonymization. The objective of this document it to explain anonymization concepts in order to be able to sanitize a dataset and compute reind… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

    Comments: 20 pages, in French

  8. arXiv:1808.07359  [pdf, other

    cs.CR

    To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins

    Authors: Gabor Gyorgy Gulyas, Doliere Francis Some, Nataliia Bielova, Claude Castelluccia

    Abstract: Recent works showed that websites can detect browser extensions that users install and websites they are logged into. This poses significant privacy risks, since extensions and Web logins that reflect user's behavior, can be used to uniquely identify users on the Web. This paper reports on the first large-scale behavioral uniqueness study based on 16,393 users who visited our website. We test an… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Comments: accepted at WPES 2018

  9. arXiv:1709.04514  [pdf, other

    cs.LG cs.CR

    Differentially Private Mixture of Generative Neural Networks

    Authors: Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro

    Abstract: Generative models are used in a wide range of applications building on large amounts of contextually rich information. Due to possible privacy violations of the individuals whose data is used to train these models, however, publishing or sharing generative models is not always viable. In this paper, we present a novel technique for privately releasing generative models and entire high-dimensional… ▽ More

    Submitted 13 July, 2018; v1 submitted 13 September, 2017; originally announced September 2017.

    Comments: A shorter version of this paper appeared at the 17th IEEE International Conference on Data Mining (ICDM 2017). This is the full version, published in IEEE Transactions on Knowledge and Data Engineering (TKDE)

  10. Near-Optimal Fingerprinting with Constraints

    Authors: Gabor Gyorgy Gulyas, Gergely Acs, Claude Castelluccia

    Abstract: Several recent studies have demonstrated that people show large behavioural uniqueness. This has serious privacy implications as most individuals become increasingly re-identifiable in large datasets or can be tracked while they are browsing the web using only a couple of their attributes, called as their fingerprints. Often, the success of these attacks depend on explicit constraints on the numbe… ▽ More

    Submitted 3 June, 2016; v1 submitted 27 May, 2016; originally announced May 2016.

  11. arXiv:1605.08357  [pdf, other

    cs.CR

    MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs

    Authors: Jagdish Prasad Achara, Vincent Roca, Claude Castelluccia, Aurelien Francillon

    Abstract: Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly become a major threat to our privacy. As "tracking the trackers" has become a necessity, various static and dynamic analysis tools have been developed in the past. However, today, we still lack suitable tools to detect, measure and compare the ongoing tracking across mobile OSs. To this end, we pro… ▽ More

    Submitted 10 June, 2016; v1 submitted 26 May, 2016; originally announced May 2016.

  12. arXiv:1604.04495  [pdf, other

    cs.CR cs.CY

    MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences

    Authors: Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia

    Abstract: Free content and services on the Web are often supported by ads. However, with the proliferation of intrusive and privacy-invasive ads, a significant proportion of users have started to use ad blockers. As existing ad blockers are radical (they block all ads) and are not designed taking into account their economic impact, ad-based economic model of the Web is in danger today. In this paper, we tar… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

    Comments: Accepted at The Workshop on the Economics of Information Security (WEIS), 2016

  13. arXiv:1602.02046  [pdf, other

    cs.CY cs.CR

    MyAdChoices: Bringing Transparency and Control to Online Advertising

    Authors: Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia

    Abstract: The intrusiveness and the increasing invasiveness of online advertising have, in the last few years, raised serious concerns regarding user privacy and Web usability. As a reaction to these concerns, we have witnessed the emergence of a myriad of ad-blocking and anti-tracking tools, whose aim is to return control to users over advertising. The problem with these technologies, however, is that they… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

  14. arXiv:1507.07851  [pdf, other

    cs.CR

    On the Unicity of Smartphone Applications

    Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia

    Abstract: Prior works have shown that the list of apps installed by a user reveal a lot about user interests and behavior. These works rely on the semantics of the installed apps and show that various user traits could be learnt automatically using off-the-shelf machine-learning techniques. In this work, we focus on the re-identifiability issue and thoroughly study the unicity of smartphone apps on a datase… ▽ More

    Submitted 29 October, 2015; v1 submitted 28 July, 2015; originally announced July 2015.

    Comments: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in Electronic Society (WPES) 2015

  15. arXiv:1404.4533  [pdf, other

    cs.CR cs.CY cs.NI

    Retargeting Without Tracking

    Authors: Minh-Dung Tran, Gergely Acs, Claude Castelluccia

    Abstract: Retargeting ads are increasingly prevalent on the Internet as their effectiveness has been shown to outperform conventional targeted ads. Retargeting ads are not only based on users' interests, but also on their intents, i.e. commercial products users have shown interest in. Existing retargeting systems heavily rely on tracking, as retargeting companies need to know not only the websites a user ha… ▽ More

    Submitted 17 April, 2014; originally announced April 2014.

  16. arXiv:1304.6584  [pdf, ps, other

    cs.CR

    When Privacy meets Security: Leveraging personal information for password cracking

    Authors: Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito

    Abstract: Passwords are widely used for user authentication and, despite their weaknesses, will likely remain in use in the foreseeable future. Human-generated passwords typically have a rich structure, which makes them susceptible to guessing attacks. In this paper, we study the effectiveness of guessing attacks based on Markov models. Our contributions are two-fold. First, we propose a novel password crac… ▽ More

    Submitted 24 April, 2013; originally announced April 2013.

  17. arXiv:1201.2531  [pdf, ps, other

    cs.CR

    DREAM: DiffeRentially privatE smArt Metering

    Authors: Gergely Acs, Claude Castelluccia

    Abstract: This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees. With our scheme, an (electricity) supplier can periodically collect data from smart meters and derive aggregated statistics while learning only limited information about the activities of individual households. For exa… ▽ More

    Submitted 12 January, 2012; originally announced January 2012.

    Comments: Shorter version appeared on Information Hiding Conference 2011

  18. arXiv:1103.1518  [pdf, ps, other

    cs.NI

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Authors: Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Dali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practi… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.

    Journal ref: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11) (2011)

  19. arXiv:1101.5578  [pdf, other

    cs.CR

    How Unique and Traceable are Usernames?

    Authors: Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils

    Abstract: Suppose you find the same username on different online services, what is the probability that these usernames refer to the same physical person? This work addresses what appears to be a fairly simple question, which has many implications for anonymity and privacy on the Internet. One possible way of estimating this probability would be to look at the public information associated to the two accoun… ▽ More

    Submitted 8 March, 2011; v1 submitted 28 January, 2011; originally announced January 2011.

  20. arXiv:1004.1461  [pdf, ps, other

    cs.NI cs.CR

    Compromising Tor Anonymity Exploiting P2P Information Leakage

    Authors: Pere Manils, Chaabane Abdelberri, Stevens Le Blond, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak inf… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

  21. arXiv:1003.5510  [pdf, other

    cs.CR cs.NI

    EphPub: Toward Robust Ephemeral Publishing

    Authors: Claude Castelluccia, Emiliano De Cristofaro, Aurelien Francillon, Mohamed-Ali Kaafar

    Abstract: The increasing amount of personal and sensitive information disseminated over the Internet prompts commensurately growing privacy concerns. Digital data often lingers indefinitely and users lose its control. This motivates the desire to restrict content availability to an expiration time set by the data owner. This paper presents and formalizes the notion of Ephemeral Publishing (EphPub), to preve… ▽ More

    Submitted 18 October, 2011; v1 submitted 29 March, 2010; originally announced March 2010.

    Comments: Proceedings of IEEE ICNP 2011

  22. arXiv:1003.3242  [pdf, other

    cs.CR

    Private Information Disclosure from Web Searches. (The case of Google Web History)

    Authors: Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito

    Abstract: As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and authenticated sessions are kept using HTTP cookies, data theft becomes extremely easy to achieve. In this paper, we study the architecture of the world's largest service provider, i.e., Google. First, with the exception… ▽ More

    Submitted 23 March, 2010; v1 submitted 16 March, 2010; originally announced March 2010.

    Comments: Our report was sent to Google on February 23rd, 2010. Google is investigating the problem and has decided to temporarily suspend search suggestions from Search History. Furthermore, Google Web History page is now offered over HTTPS only. Updated information about this project is available at: http://planete.inrialpes.fr/projects/private-information-disclosure-from-web-searches

  23. arXiv:0901.3482  [pdf, ps, other

    cs.CR

    Code injection attacks on harvard-architecture devices

    Authors: Aurélien Francillon, Claude Castelluccia

    Abstract: Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited memory and can process only very small packets. Stack-based buffer overflow techniques that inject code into the stack and then execute it are therefore not applicable. It has been a common belief that code injection is i… ▽ More

    Submitted 22 January, 2009; originally announced January 2009.

    Journal ref: CCS '08: Proceedings of the 15th ACM conference on Computer and communications security (2008) 15--26