Skip to main content

Showing 1–3 of 3 results for author: Chua, Z L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2002.06864  [pdf, other

    cs.LG stat.ML

    Scalable Quantitative Verification For Deep Neural Networks

    Authors: Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena

    Abstract: Despite the functional success of deep neural networks (DNNs), their trustworthiness remains a crucial open challenge. To address this challenge, both testing and verification techniques have been proposed. But these existing techniques provide either scalability to large networks or formal guarantees, not both. In this paper, we propose a scalable quantitative verification framework for deep neur… ▽ More

    Submitted 23 March, 2021; v1 submitted 17 February, 2020; originally announced February 2020.

  2. arXiv:1901.03538  [pdf, other

    cs.CR

    Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework

    Authors: Xiaoxuan Lou, Fan Zhang, Zheng Leong Chua, Zhenkai Liang, Yueqiang Cheng, Ya** Zhou

    Abstract: Rowhammer is a hardware-based bug that allows the attacker to modify the data in the memory without accessing it, just repeatedly and frequently accessing (or hammering) physically adjacent memory rows. So that it can break the memory isolation between processes, which is seen as the cornerstone of modern system security, exposing the sensitive data to unauthorized and imperceptible corruption. A… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  3. arXiv:1506.04832  [pdf, other

    cs.CR

    Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks

    Authors: Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena

    Abstract: New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel. In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptograph… ▽ More

    Submitted 12 January, 2016; v1 submitted 16 June, 2015; originally announced June 2015.