Skip to main content

Showing 1–20 of 20 results for author: Celik, Z B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.06407  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Rethinking How to Evaluate Language Model Jailbreak

    Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik

    Abstract: Large language models (LLMs) have become increasingly integrated with various applications. To ensure that LLMs do not generate unsafe responses, they are aligned with safeguards that specify what content is restricted. However, such alignment can be bypassed to produce prohibited content using a technique commonly referred to as jailbreak. Different systems have been proposed to perform the jailb… ▽ More

    Submitted 7 May, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

  2. arXiv:2401.12317  [pdf, ps, other

    cs.RO cs.SE

    Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics

    Authors: Claire Le Goues, Sebastian Elbaum, David Anthony, Z. Berkay Celik, Mauricio Castillo-Effen, Nikolaus Correll, Pooyan Jamshidi, Morgan Quigley, Trenton Tabor, Qi Zhu

    Abstract: Robots are experiencing a revolution as they permeate many aspects of our daily lives, from performing house maintenance to infrastructure inspection, from efficiently warehousing goods to autonomous vehicles, and more. This technical progress and its impact are astounding. This revolution, however, is outstrip** the capabilities of existing software development processes, techniques, and tools,… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 16 pages

  3. arXiv:2310.02431  [pdf, other

    cs.HC cs.CL

    Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions

    Authors: Yufan Chen, Arjun Arunasalam, Z. Berkay Celik

    Abstract: Users seek security & privacy (S&P) advice from online resources, including trusted websites and content-sharing platforms. These resources help users understand S&P technologies and tools and suggest actionable strategies. Large Language Models (LLMs) have recently emerged as trusted information sources. However, their accuracy and correctness have been called into question. Prior research has ou… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: Accepted to the Annual Computer Security Applications Conference (ACSAC), 2023

  4. arXiv:2107.13173  [pdf, other

    cs.LG

    New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning

    Authors: Siddharth Divi, Yi-Shan Lin, Habiba Farrukh, Z. Berkay Celik

    Abstract: In Federated Learning (FL), the clients learn a single global model (FedAvg) through a central aggregator. In this setting, the non-IID distribution of the data across clients restricts the global FL model from delivering good performance on the local data of each client. Personalized FL aims to address this problem by finding a personalized model for each client. Recent works widely report the av… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  5. arXiv:2105.00645  [pdf, other

    cs.CR

    On the Safety Implications of Misordered Events and Commands in IoT Systems

    Authors: Furkan Goksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik

    Abstract: IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  6. S3: Side-Channel Attack on Stylus Pencil through Sensors

    Authors: Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik

    Abstract: With smart devices being an essential part of our everyday lives, unsupervised access to the mobile sensors' data can result in a multitude of side-channel attacks. In this paper, we study potential data leaks from Apple Pencil (2nd generation) supported by the Apple iPad Pro, the latest stylus pen which attaches to the iPad body magnetically for charging. We observe that the Pencil's body affects… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 25 pages

  7. Discovering IoT Physical Channel Vulnerabilities

    Authors: Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang

    Abstract: Smart homes contain diverse sensors and actuators controlled by IoT apps that provide custom automation. Prior works showed that an adversary could exploit physical interaction vulnerabilities among apps and put the users and environment at risk, e.g., to break into a house, an adversary turns on the heater to trigger an app that opens windows when the temperature exceeds a threshold. Currently, t… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Published in ACM CCS 2022

  8. arXiv:2009.10639  [pdf, other

    cs.CV cs.AI cs.LG

    What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors

    Authors: Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik

    Abstract: EXplainable AI (XAI) methods have been proposed to interpret how a deep neural network predicts inputs through model saliency explanations that highlight the parts of the inputs deemed important to arrive a decision at a specific target. However, it remains challenging to quantify correctness of their interpretability as current evaluation approaches either require subjective input from humans or… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

  9. arXiv:2006.14679  [pdf, other

    eess.SP cs.CY eess.SY

    On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

    Authors: Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan Gerdes, Z. Berkay Celik

    Abstract: Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and in… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  10. arXiv:1911.10461  [pdf, other

    cs.CR cs.LG

    Real-time Analysis of Privacy-(un)aware IoT Applications

    Authors: Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Users trust IoT apps to control and automate their smart devices. These apps necessarily have access to sensitive data to implement their functionality. However, users lack visibility into how their sensitive data is used (or leaked), and they often blindly trust the app developers. In this paper, we present IoTWatcH, a novel dynamic analysis tool that uncovers the privacy risks of IoT apps in rea… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  11. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  12. arXiv:1809.06962  [pdf, other

    cs.CR cs.PL

    Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

    Authors: Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick McDaniel

    Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive---new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digita… ▽ More

    Submitted 24 December, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: syntax and grammar error are fixed, and IoT platforms are updated to match with the submission

  13. arXiv:1805.08876  [pdf, other

    cs.CR eess.SY

    Soteria: Automated IoT Safety and Security Analysis

    Authors: Z. Berkay Celik, Patrick McDaniel, Gang Tan

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital systems have changed the way we live, play and work. Yet existing IoT platforms cannot evaluate whether an IoT app or environment is safe, secure, and operates correctly. In this paper, we present Soteria, a static analysis system for validating whether an IoT app or IoT… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: Accepted to the USENIX Annual Technical Conference (USENIX ATC), 2018

  14. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  15. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  16. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)

  17. arXiv:1611.08648  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Patient-Driven Privacy Control through Generalized Distillation

    Authors: Z. Berkay Celik, David Lopez-Paz, Patrick McDaniel

    Abstract: The introduction of data analytics into medicine has changed the nature of patient treatment. In this, patients are asked to disclose personal information such as genetic markers, lifestyle habits, and clinical history. This data is then used by statistical models to predict personalized treatments. However, due to privacy concerns, patients often desire to withhold sensitive information. This sel… ▽ More

    Submitted 13 October, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: IEEE Symposium on Privacy-Aware Computing (IEEE PAC), 2017

  18. arXiv:1603.09638  [pdf, other

    cs.CR cs.LG stat.ML

    Detection under Privileged Information

    Authors: Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami

    Abstract: For well over a quarter century, detection systems have been driven by models learned from input features collected from real or simulated environments. An artifact (e.g., network event, potential malware sample, suspicious email) is deemed malicious or non-malicious based on its similarity to the learned model at runtime. However, the training of the models has been historically limited to only t… ▽ More

    Submitted 30 March, 2018; v1 submitted 31 March, 2016; originally announced March 2016.

    Comments: A short version of this paper is accepted to ASIACCS 2018

  19. arXiv:1602.02697  [pdf, other

    cs.CR cs.LG

    Practical Black-Box Attacks against Machine Learning

    Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami

    Abstract: Machine learning (ML) models, e.g., deep neural networks (DNNs), are vulnerable to adversarial examples: malicious inputs modified to yield erroneous model outputs, while appearing unmodified to human observers. Potential attacks include having malicious content like malware identified as legitimate or controlling vehicle behavior. Yet, all existing adversarial example attacks require knowledge of… ▽ More

    Submitted 19 March, 2017; v1 submitted 8 February, 2016; originally announced February 2016.

    Comments: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE

  20. arXiv:1511.07528  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    The Limitations of Deep Learning in Adversarial Settings

    Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami

    Abstract: Deep learning takes advantage of large datasets and computationally efficient training algorithms to outperform other approaches at various machine learning tasks. However, imperfections in the training phase of deep neural networks make them vulnerable to adversarial samples: inputs crafted by adversaries with the intent of causing deep neural networks to misclassify. In this work, we formalize t… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

    Comments: Accepted to the 1st IEEE European Symposium on Security & Privacy, IEEE 2016. Saarbrucken, Germany