-
The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption
Authors:
Taylor Henderson,
Eric Osterweil,
Pavan Kumar Dinesh,
Robert Simon
Abstract:
Preserving privacy is an undeniable benefit to users online. However, this benefit (unfortunately) also extends to those who conduct cyber attacks and other types of malfeasance. In this work, we consider the scenario in which Privacy Preserving Technologies (PPTs) have been used to obfuscate users who are communicating online with ill intentions. We present a novel methodology that is effective a…
▽ More
Preserving privacy is an undeniable benefit to users online. However, this benefit (unfortunately) also extends to those who conduct cyber attacks and other types of malfeasance. In this work, we consider the scenario in which Privacy Preserving Technologies (PPTs) have been used to obfuscate users who are communicating online with ill intentions. We present a novel methodology that is effective at deobfuscating such sources by synthesizing measurements from key locations along protocol transaction paths. Our approach links online personas with their origin IP addresses based on a Pattern of Life (PoL) analysis, and is successful even when different PPTs are used. We show that, when monitoring in the correct places on the Internet, DNS over HTTPS (DoH) and DNS over TLS (DoT) can be deobfuscated with up to 100% accuracy, when they are the only privacy-preserving technologies used. Our evaluation used multiple simulated monitoring points and communications are sampled from an actual multiyear-long social network message board to replay actual user behavior. Our evaluation compared plain old DNS, DoH, DoT, and VPN in order to quantify their relative privacy-preserving abilities and provide recommendations for where ideal monitoring vantage points would be in the Internet to achieve the best performance. To illustrate the utility of our methodology, we created a proof-of-concept cybersecurity analyst dashboard (with backend processing infrastructure) that uses a search engine interface to allow analysts to deobfuscate sources based on observed screen names and by providing packet captures from subsets of vantage points.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
Bounded Simultaneous Messages
Authors:
Andrej Bogdanov,
Krishnamoorthy Dinesh,
Yuval Filmus,
Yuval Ishai,
Avi Kaplan,
Sruthi Sekar
Abstract:
We consider the following question of bounded simultaneous messages (BSM) protocols: Can computationally unbounded Alice and Bob evaluate a function $f(x,y)$ of their inputs by sending polynomial-size messages to a computationally bounded Carol? The special case where $f$ is the mod-2 inner-product function and Carol is bounded to AC$^0$ has been studied in previous works. The general question can…
▽ More
We consider the following question of bounded simultaneous messages (BSM) protocols: Can computationally unbounded Alice and Bob evaluate a function $f(x,y)$ of their inputs by sending polynomial-size messages to a computationally bounded Carol? The special case where $f$ is the mod-2 inner-product function and Carol is bounded to AC$^0$ has been studied in previous works. The general question can be broadly motivated by applications in which distributed computation is more costly than local computation, including secure two-party computation.
In this work, we initiate a more systematic study of the BSM model, with different functions $f$ and computational bounds on Carol. In particular, we give evidence against the existence of BSM protocols with polynomial-size Carol for naturally distributed variants of NP-complete languages.
△ Less
Submitted 21 December, 2023; v1 submitted 30 September, 2023;
originally announced October 2023.
-
Sensitivity, Affine Transforms and Quantum Communication Complexity
Authors:
Krishnamoorthy Dinesh,
Jayalal Sarma
Abstract:
$\newcommand{\F}{\mathbb{F}}$We study the Boolean function parameters sensitivity ($s$), block sensitivity ($bs$), and alternation ($alt$) under specially designed affine transforms. For a function $f:\F_2^n\to \{0,1\}$, and $A=Mx+b$ for $M \in \F_2^{n\times n}$ and $b\in \F_2^n$, the result of the transformation $g$ is defined as $\forall x\in\F_2^n, g(x)=f(Mx+b)…
▽ More
$\newcommand{\F}{\mathbb{F}}$We study the Boolean function parameters sensitivity ($s$), block sensitivity ($bs$), and alternation ($alt$) under specially designed affine transforms. For a function $f:\F_2^n\to \{0,1\}$, and $A=Mx+b$ for $M \in \F_2^{n\times n}$ and $b\in \F_2^n$, the result of the transformation $g$ is defined as $\forall x\in\F_2^n, g(x)=f(Mx+b)$.
We study alternation under linear shifts ($M$ is the identity matrix) called the shift invariant alternation (denoted by $salt(f)$). We exhibit an explicit family of functions for which $salt(f)$ is $2^{Ω(s(f))}$. We show an affine transform $A$, such that the corresponding function $g$ satisfies $bs(f,0^n) \le s(g)$, using which we proving that for $F(x,y)=f(x\land y)$, the bounded error quantum communication complexity of $F$ with prior entanglement, $Q^*_{1/3}(F)=Ω(\sqrt{bs(f,0^n)})$. Our proof builds on ideas from Sherstov (2010) where we use specific properties of the above affine transformation. We show,
* For a prime $p$ and $0<ε<1$, any $f$ with $deg_p(f)\le(1-ε)\log n$ must satisfy $Q^*_{1/3}(F) = Ω(\frac{n^{ε/2}}{\log n})$. Here, $deg_p(f)$ denotes the degree of the multilinear polynomial of $f$ over $\F_p$.
* For any $f$ such that there exists primes $p$ and $q$ with $deg_q(f) \ge Ω(deg_p(f)^δ)$ for $δ> 2$, the deterministic communication complexity - $D(F)$ and $Q^*_{1/3}(F)$ are polynomially related. In particular, this holds when $deg_p(f) = O(1)$. Thus, for this class of functions, this answers an open question (see Buhrman and deWolf (2001)) about the relation between the two measures.
We construct linear transformation $A$, such that $g$ satisfies, $alt(f) \le 2s(g)+1$. Using this, we exhibit a family of Boolean functions that rule out a potential approach to settle the XOR Log-Rank conjecture via a proof of Sensitivity conjecture [Hao Huang (2019)].
△ Less
Submitted 12 September, 2020; v1 submitted 30 August, 2018;
originally announced August 2018.
-
New Bounds for Energy Complexity of Boolean Functions
Authors:
Krishnamoorthy Dinesh,
Samir Otiv,
Jayalal Sarma
Abstract:
$\newcommand{\EC}{\mathsf{EC}}\newcommand{\KW}{\mathsf{KW}}\newcommand{\DT}{\mathsf{DT}}\newcommand{\psens}{\mathsf{psens}} \newcommand{\calB}{\cal B} $ For a Boolean function $f:\{0,1\}^n \to \{0,1\}$ computed by a circuit $C$ over a finite basis $\mathcal{B}$, the energy complexity of $C$ (denoted by $\EC_{\calB}(C)$) is the maximum over all inputs $\{0,1\}^n…
▽ More
$\newcommand{\EC}{\mathsf{EC}}\newcommand{\KW}{\mathsf{KW}}\newcommand{\DT}{\mathsf{DT}}\newcommand{\psens}{\mathsf{psens}} \newcommand{\calB}{\cal B} $ For a Boolean function $f:\{0,1\}^n \to \{0,1\}$ computed by a circuit $C$ over a finite basis $\mathcal{B}$, the energy complexity of $C$ (denoted by $\EC_{\calB}(C)$) is the maximum over all inputs $\{0,1\}^n$ the numbers of gates of the circuit $C$ (excluding the inputs) that output a one. Energy Complexity of a Boolean function over a finite basis $\calB$ denoted by $\EC_\calB(f):= \min_C \EC_{\calB}(C)$ where $C$ is a circuit over $\calB$ computing $f$.
We study the case when $\calB = \{\land_2, \lor_2, \lnot\}$, the standard Boolean basis. It is known that any Boolean function can be computed by a circuit (with potentially large size) with an energy of at most $3n(1+ε(n))$ for a small $ ε(n)$(which we observe is improvable to $3n-1$). We show several new results and connections between energy complexity and other well-studied parameters of Boolean functions.
* For all Boolean functions $f$, $\EC(f) \le O(\DT(f)^3)$ where $\DT(f)$ is the optimal decision tree depth of $f$.
* We define a parameter \textit{positive sensitivity} (denoted by $\psens$), a quantity that is smaller than sensitivity and defined in a similar way, and show that for any Boolean circuit $C$ computing a Boolean function $f$, $ \EC(C) \ge \psens(f)/3$.
* For a monotone function $f$, we show that $\EC(f) = Ω(\KW^+(f))$ where $\KW^+(f)$ is the cost of monotone Karchmer-Wigderson game of $f$.
* Restricting the above notion of energy complexity to Boolean formulas, we show $\EC(F) = Ω\left (\sqrt{L(F)}-depth(F)\right )$ where $L(F)$ is the size and $depth(F)$ is the depth of a formula $F$.
△ Less
Submitted 12 September, 2020; v1 submitted 21 August, 2018;
originally announced August 2018.
-
Alternation, Sparsity and Sensitivity : Bounds and Exponential Gaps
Authors:
Krishnamoorthy Dinesh,
Jayalal Sarma
Abstract:
$\newcommand{\sp}{\mathsf{sparsity}}\newcommand{\s}{\mathsf{s}}\newcommand{\al}{\mathsf{alt}}$ The well-known Sensitivity Conjecture states that for any Boolean function $f$, block sensitivity of $f$ is at most polynomial in sensitivity of $f$ (denoted by $\s(f)$). The XOR Log-Rank Conjecture states that for any $n$ bit Boolean function, $f$ the communication complexity of a related function $f^{\…
▽ More
$\newcommand{\sp}{\mathsf{sparsity}}\newcommand{\s}{\mathsf{s}}\newcommand{\al}{\mathsf{alt}}$ The well-known Sensitivity Conjecture states that for any Boolean function $f$, block sensitivity of $f$ is at most polynomial in sensitivity of $f$ (denoted by $\s(f)$). The XOR Log-Rank Conjecture states that for any $n$ bit Boolean function, $f$ the communication complexity of a related function $f^{\oplus}$ on $2n$ bits, (defined as $f^{\oplus}(x,y)=f(x\oplus y)$) is at most polynomial in logarithm of the sparsity of $f$ (denoted by $\sp(f)$). A recent result of Lin and Zhang (2017) implies that to confirm the above conjectures it suffices to upper bound alternation of $f$ (denoted $\al(f)$) for all Boolean functions $f$ by polynomial in $\s(f)$ and logarithm of $\sp(f)$, respectively. In this context, we show the following :
* There exists a family of Boolean functions for which $\al(f)$ is at least exponential in $\s(f)$ and $\al(f)$ is at least exponential in $\log \sp(f)$. En route to the proof, we also show an exponential gap between $\al(f)$ and the decision tree complexity of $f$, which might be of independent interest.
* As our main result, we show that, despite the above gap between $\al(f)$ and $\log \sp(f)$, the XOR Log-Rank Conjecture is true for functions with the alternation upper bounded by $poly(\log n)$. It is easy to observe that the Sensitivity Conjecture is also true for this class of functions.
* The starting point for the above result is the observation (derived from Lin and Zhang (2017)) that for any Boolean function $f$ and $m \ge 2$, $deg(f)\le \al(f)deg_2(f)deg_m(f)$ where $deg(f)$, $deg_2(f)$ and $deg_m(f)$ are the degrees of $f$ over $\mathbb{R}$, $\mathbb{F}_2$ and $\mathbb{Z}_m$ respectively. We also show three further applications of this observation.
△ Less
Submitted 11 February, 2019; v1 submitted 15 December, 2017;
originally announced December 2017.
-
Creating A Multi-track Classical Musical Performance Dataset for Multimodal Music Analysis: Challenges, Insights, and Applications
Authors:
Bochen Li,
Xinzhao Liu,
Karthik Dinesh,
Zhiyao Duan,
Gaurav Sharma
Abstract:
We introduce a dataset for facilitating audio-visual analysis of music performances. The dataset comprises 44 simple multi-instrument classical music pieces assembled from coordinated but separately recorded performances of individual tracks. For each piece, we provide the musical score in MIDI format, the audio recordings of the individual tracks, the audio and video recording of the assembled mi…
▽ More
We introduce a dataset for facilitating audio-visual analysis of music performances. The dataset comprises 44 simple multi-instrument classical music pieces assembled from coordinated but separately recorded performances of individual tracks. For each piece, we provide the musical score in MIDI format, the audio recordings of the individual tracks, the audio and video recording of the assembled mixture, and ground-truth annotation files including frame-level and note-level transcriptions. We describe our methodology for the creation of the dataset, particularly highlighting our approaches for addressing the challenges involved in maintaining synchronization and expressiveness. We demonstrate the high quality of synchronization achieved with our proposed approach by comparing the dataset with existing widely-used music audio datasets.
We anticipate that the dataset will be useful for the development and evaluation of existing music information retrieval (MIR) tasks, as well as for novel multi-modal tasks. We benchmark two existing MIR tasks (multi-pitch analysis and score-informed source separation) on the dataset and compare with other existing music audio datasets. Additionally, we consider two novel multi-modal MIR tasks (visually informed multi-pitch analysis and polyphonic vibrato analysis) enabled by the dataset and provide evaluation measures and baseline systems for future comparisons (from our recent work). Finally, we propose several emerging research directions that the dataset enables.
△ Less
Submitted 7 August, 2018; v1 submitted 27 December, 2016;
originally announced December 2016.
-
Characterization and Lower Bounds for Branching Program Size using Projective Dimension
Authors:
Krishnamoorthy Dinesh,
Sa** Koroth,
Jayalal Sarma
Abstract:
We study projective dimension, a graph parameter (denoted by pd$(G)$ for a graph $G$), introduced by (Pudlák, Rödl 1992), who showed that proving lower bounds for pd$(G_f)$ for bipartite graphs $G_f$ associated with a Boolean function $f$ imply size lower bounds for branching programs computing $f$. Despite several attempts (Pudlák, Rödl 1992 ; Babai, Rónyai, Ganapathy 2000), proving super-linear…
▽ More
We study projective dimension, a graph parameter (denoted by pd$(G)$ for a graph $G$), introduced by (Pudlák, Rödl 1992), who showed that proving lower bounds for pd$(G_f)$ for bipartite graphs $G_f$ associated with a Boolean function $f$ imply size lower bounds for branching programs computing $f$. Despite several attempts (Pudlák, Rödl 1992 ; Babai, Rónyai, Ganapathy 2000), proving super-linear lower bounds for projective dimension of explicit families of graphs has remained elusive.
We show that there exist a Boolean function $f$ (on $n$ bits) for which the gap between the projective dimension and size of the optimal branching program computing $f$ (denoted by bpsize$(f)$), is $2^{Ω(n)}$. Motivated by the argument in (Pudlák, Rödl 1992), we define two variants of projective dimension - projective dimension with intersection dimension 1 (denoted by upd$(G)$) and bitwise decomposable projective dimension (denoted by bitpdim$(G)$).
As our main result, we show that there is an explicit family of graphs on $N = 2^n$ vertices such that the projective dimension is $O(\sqrt{n})$, the projective dimension with intersection dimension $1$ is $Ω(n)$ and the bitwise decomposable projective dimension is $Ω(\frac{n^{1.5}}{\log n})$. We also show that there exist a Boolean function $f$ (on $n$ bits) for which the gap between upd$(G_f)$ and bpsize$(f)$ is $2^{Ω(n)}$. In contrast, we also show that the bitwise decomposable projective dimension characterizes size of the branching program up to a polynomial factor. That is, there exists a constant $c>0$ and for any function $f$, $\textrm{bitpdim}(G_f)/6 \le \textrm{bpsize}(f) \le (\textrm{bitpdim}(G_f))^c$. We also study two other variants of projective dimension and show that they are exactly equal to well-studied graph parameters - bipartite clique cover number and bipartite partition number respectively.
△ Less
Submitted 9 February, 2017; v1 submitted 25 April, 2016;
originally announced April 2016.