Skip to main content

Showing 1–50 of 85 results for author: Kaafar

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18133  [pdf, other

    cs.CL

    ConvoCache: Smart Re-Use of Chatbot Responses

    Authors: Conor Atkins, Ian Wood, Mohamed Ali Kaafar, Hassan Asghar, Nardine Basta, Michal Kepkowski

    Abstract: We present ConvoCache, a conversational caching system that solves the problem of slow and expensive generative AI models in spoken chatbots. ConvoCache finds a semantically similar prompt in the past and reuses the response. In this paper we evaluate ConvoCache on the DailyDialog dataset. We find that ConvoCache can apply a UniEval coherence threshold of 90% and respond to 89% of prompts using th… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: Accepted to appear at Interspeech 2024

  2. arXiv:2406.02801  [pdf, other

    cs.SI

    SenTopX: Benchmark for User Sentiment on Various Topics

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zhao, Ian Wood, Mohamad Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxic sentiment analysis on Twitter (X) often focuses on specific topics and events such as politics and elections. Datasets of toxic users in such research are typically gathered through lexicon-based techniques, providing only a cross-sectional view. his approach has a tight confine for studying toxic user behavior and effective platform moderation. To identify users consistently spreading toxic… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. arXiv:2405.10547  [pdf, other

    cs.SI

    GPTs Window Shop**: An analysis of the Landscape of Custom ChatGPT Models

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: OpenAI's ChatGPT initiated a wave of technical iterations in the space of Large Language Models (LLMs) by demonstrating the capability and disruptive power of LLMs. OpenAI has prompted large organizations to respond with their own advancements and models to push the LLM performance envelope. OpenAI has prompted large organizations to respond with their own advancements and models to push the LLM p… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

    Comments: 9 pages

  4. On mission Twitter Profiles: A Study of Selective Toxic Behavior

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, an D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: The argument for persistent social media influence campaigns, often funded by malicious entities, is gaining traction. These entities utilize instrumented profiles to disseminate divisive content and disinformation, sha** public perception. Despite ample evidence of these instrumented profiles, few identification methods exist to locate them in the wild. To evade detection and appear genuine, sm… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Journal ref: 2023 IEEE International Conference on Big Data (BigData)

  5. Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: In the pursuit of bolstering user safety, social media platforms deploy active moderation strategies, including content removal and user suspension. These measures target users engaged in discussions marked by hate speech or toxicity, often linked to specific keywords or hashtags. Nonetheless, the increasing prevalence of toxicity indicates that certain users adeptly circumvent these measures. Thi… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 2023 IEEE International Conference on Big Data (BigData)

  6. arXiv:2310.02563  [pdf, other

    cs.CR cs.LG

    Practical, Private Assurance of the Value of Collaboration

    Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar

    Abstract: Two parties wish to collaborate on their datasets. However, before they reveal their datasets to each other, the parties want to have the guarantee that the collaboration would be fruitful. We look at this problem from the point of view of machine learning, where one party is promised an improvement on its prediction model by incorporating data from the other party. The parties would only wish to… ▽ More

    Submitted 6 December, 2023; v1 submitted 3 October, 2023; originally announced October 2023.

  7. arXiv:2308.08096  [pdf, other

    cs.CR

    Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study

    Authors: Michal Kepkowski, Maciej Machulak, Ian Wood, Dali Kaafar

    Abstract: Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gaining popularity as a default strong authentication mechanism. It has been recognized as a leading candidate to overcome limitations (e.g., it is phishing resistant) of existing authentication solutions. However, the task of deprecating weak methods such as password-based authentication is not trivial and requires a comprehensi… ▽ More

    Submitted 13 September, 2023; v1 submitted 15 August, 2023; originally announced August 2023.

    Comments: to be published in the IEEE Secure Development Conference 2023

  8. arXiv:2307.01965  [pdf, other

    cs.CR

    An analysis of scam baiting calls: Identifying and extracting scam stages and scripts

    Authors: Ian Wood, Michal Kepkowski, Leron Zinatullin, Travis Darnley, Mohamed Ali Kaafar

    Abstract: Phone scams remain a difficult problem to tackle due to the combination of protocol limitations, legal enforcement challenges and advances in technology enabling attackers to hide their identities and reduce costs. Scammers use social engineering techniques to manipulate victims into revealing their personal details, purchasing online vouchers or transferring funds, causing significant financial l… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

  9. arXiv:2305.19487  [pdf, other

    cs.CR cs.NE cs.NI

    SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation

    Authors: Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker

    Abstract: Attack paths are the potential chain of malicious activities an attacker performs to compromise network assets and acquire privileges through exploiting network vulnerabilities. Attack path analysis helps organizations to identify new/unknown chains of attack vectors that reach critical assets within the network, as opposed to individual attack vectors in signature-based attack analysis. Timely id… ▽ More

    Submitted 21 November, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: IEEE Transactions on Information Forensics & Security (TIFS)

  10. arXiv:2305.16758  [pdf, other

    cs.CR

    Fast IDentity Online with Anonymous Credentials (FIDO-AC)

    Authors: Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik

    Abstract: Web authentication is a critical component of today's Internet and the digital world we interact with. The FIDO2 protocol enables users to leverage common devices to easily authenticate to online services in both mobile and desktop environments following the passwordless authentication approach based on cryptography and biometric verification. However, there is little to no connection between the… ▽ More

    Submitted 20 June, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: to be published in the 32nd USENIX Security Symposium(USENIX 2023)

  11. arXiv:2304.05561  [pdf, other

    cs.CV cs.CR cs.LG

    On the Adversarial Inversion of Deep Biometric Representations

    Authors: Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar

    Abstract: Biometric authentication service providers often claim that it is not possible to reverse-engineer a user's raw biometric sample, such as a fingerprint or a face image, from its mathematical (feature-space) representation. In this paper, we investigate this claim on the specific example of deep neural network (DNN) embeddings. Inversion of DNN embeddings has been investigated for explaining deep i… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

  12. arXiv:2304.05371  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories

    Authors: Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar

    Abstract: One of the new developments in chit-chat bots is a long-term memory mechanism that remembers information from past conversations for increasing engagement and consistency of responses. The bot is designed to extract knowledge of personal nature from their conversation partner, e.g., stating preference for a particular color. In this paper, we show that this memory mechanism can result in unintende… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: To be published in 21st International Conference on Applied Cryptography and Network Security, ACNS 2023

  13. A longitudinal study of the top 1% toxic Twitter profiles

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxicity is endemic to online social networks including Twitter. It follows a Pareto like distribution where most of the toxicity is generated by a very small number of profiles and as such, analyzing and characterizing these toxic profiles is critical. Prior research has largely focused on sporadic, event centric toxic content to characterize toxicity on the platform. Instead, we approach the pro… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

  14. arXiv:2301.04000  [pdf, other

    cs.CR cs.LG

    Privacy-Preserving Record Linkage for Cardinality Counting

    Authors: Nan Wu, Dinusha Vatsalan, Mohamed Ali Kaafar, Sanath Kumar Ramesh

    Abstract: Several applications require counting the number of distinct items in the data, which is known as the cardinality counting problem. Example applications include health applications such as rare disease patients counting for adequate awareness and funding, and counting the number of cases of a new disease for outbreak detection, marketing applications such as counting the visibility reached for a n… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  15. arXiv:2212.04008  [pdf, other

    cs.CR

    Use of Cryptography in Malware Obfuscation

    Authors: Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

    Abstract: Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: This is the full version of the paper with the same title to appear in the Journal of Computer Virology and Hacking Techniques

  16. arXiv:2212.03980  [pdf, other

    cs.HC cs.AI cs.LG

    DDoD: Dual Denial of Decision Attacks on Human-AI Teams

    Authors: Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko

    Abstract: Artificial Intelligence (AI) systems have been increasingly used to make decision-making processes faster, more accurate, and more efficient. However, such systems are also at constant risk of being attacked. While the majority of attacks targeting AI-based applications aim to manipulate classifiers or training data and alter the output of an AI model, recently proposed Sponge Attacks against AI m… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: 10 pages, 1 figure, IEEE Pervasive Computing, IEEE Special Issue on Human-Centered AI

  17. arXiv:2211.02245  [pdf, other

    cs.CR cs.AI cs.LG

    Unintended Memorization and Timing Attacks in Named Entity Recognition Models

    Authors: Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

    Abstract: Named entity recognition models (NER), are widely used for identifying named entities (e.g., individuals, locations, and other information) in text documents. Machine learning based NER models are increasingly being applied in privacy-sensitive applications that need automatic and scalable identification of sensitive information to redact text for data sharing. In this paper, we study the setting… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: This is the full version of the paper with the same title accepted for publication in the Proceedings of the 23rd Privacy Enhancing Technologies Symposium, PETS 2023

  18. arXiv:2210.10451  [pdf, other

    cs.CR

    An Empirical Analysis of SMS Scam Detection Systems

    Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: The short message service (SMS) was introduced a generation ago to the mobile phone users. They make up the world's oldest large-scale network, with billions of users and therefore attracts a lot of fraud. Due to the convergence of mobile network with internet, SMS based scams can potentially compromise the security of internet services as well. In this study, we present a new SMS scam dataset con… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1911.00953 by other authors

  19. Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure

    Authors: Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and traffic management applications. Recent works of RAPPOR and Apple's count-mean sketch (CMS) algorithm propose privacy preserving mechanisms for count estimation in large volumes of data using probabilistic data structures like counting Bloom filte… ▽ More

    Submitted 30 November, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: Version 2 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022

  20. arXiv:2206.15089  [pdf, other

    cs.CR

    Fairness and Cost Constrained Privacy-Aware Record Linkage

    Authors: Nan Wu, Dinusha Vatsalan, Sunny Verma, Mohamed Ali Kaafar

    Abstract: Record linkage algorithms match and link records from different databases that refer to the same real-world entity based on direct and/or quasi-identifiers, such as name, address, age, and gender, available in the records. Since these identifiers generally contain personal identifiable information (PII) about the entities, record linkage algorithms need to be developed with privacy constraints. Kn… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

  21. arXiv:2205.08071  [pdf, other

    cs.CR

    How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy

    Authors: Michal Kepkowski, Lucjan Hanzlik, Ian Wood, Mohamed Ali Kaafar

    Abstract: This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  22. arXiv:2205.06641  [pdf, other

    cs.CR

    Privacy Preserving Release of Mobile Sensor Data

    Authors: Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: Sensors embedded in mobile smart devices can monitor users' activity with high accuracy to provide a variety of services to end-users ranging from precise geolocation, health monitoring, and handwritten word recognition. However, this involves the risk of accessing and potentially disclosing sensitive information of individuals to the apps that may lead to privacy breaches. In this paper, we aim t… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 12 pages, 10 figures, 1 table

  23. A Differentially Private Framework for Deep Learning with Convexified Loss Functions

    Authors: Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: Differential privacy (DP) has been applied in deep learning for preserving privacy of the underlying training sets. Existing DP practice falls into three categories - objective perturbation, gradient perturbation and output perturbation. They suffer from three main problems. First, conditions on objective functions limit objective perturbation in general deep learning tasks. Second, gradient pertu… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted by the IEEE Transactions on Information Forensics & Security. Early access of IEEE Explore will be available soon

  24. arXiv:2203.10673  [pdf

    cs.NI cs.CR

    5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System

    Authors: Nardine Basta, Ming Ding, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Cooperative Intelligent Transportation Systems (C-ITS) enable communications between vehicles, road-side infrastructures, and road-users to improve users' safety and to efficiently manage traffic. Most, if not all, of the intelligent vehicles-to-everything (V2X) applications, often rely on continuous collection and sharing of sensitive information such as detailed location information which raises… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

  25. arXiv:2203.03077  [pdf, other

    cs.CR

    A Study of Third-party Resources Loading on Web

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Roya Ensafi

    Abstract: This paper performs a large-scale study of dependency chains in the web, to find that around 50% of first-party websites render content that they did not directly load. Although the majority (84.91%) of websites have short dependency chains (below 3 levels), we find websites with dependency chains exceeding 30. Using VirusTotal, we show that 1.2% of these third-parties are classified as suspicious… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: 3 pages. arXiv admin note: substantial text overlap with arXiv:1901.07699

  26. arXiv:2202.07853  [pdf, other

    cs.SI cs.CY

    A deep dive into the consistently toxic 1% of Twitter

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Misbehavior in online social networks (OSN) is an ever-growing phenomenon. The research to date tends to focus on the deployment of machine learning to identify and classify types of misbehavior such as bullying, aggression, and racism to name a few. The main goal of identification is to curb natural and mechanical misconduct and make OSNs a safer place for social discourse. Going beyond past work… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  27. Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework

    Authors: Nardine Basta, Muhammad Ikram, Mohamed Ali Kaafar, Andy Walker

    Abstract: Micro-segmentation is an emerging security technique that separates physical networks into isolated logical micro-segments (workloads). By tying fine-grained security policies to individual workloads, it limits the attacker's ability to move laterally through the network, even after infiltrating the perimeter defences. While micro-segmentation is proved to be effective for shrinking enterprise net… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

    Journal ref: NOMS2022

  28. Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play

    Authors: I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar, Shlomo Berkovsky

    Abstract: Smartphone technology has drastically improved over the past decade. These improvements have seen the creation of specialized health applications, which offer consumers a range of health-related activities such as tracking and checking symptoms of health conditions or diseases through their smartphones. We term these applications as Symptom Checking apps or simply SymptomCheckers. Due to the sensi… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

    Comments: Published in SECRYPT 2021

  29. arXiv:2107.07063  [pdf

    cs.CR cs.DC

    BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain

    Authors: I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: We propose BlockJack, a system based on a distributed and tamper-proof consortium Blockchain that aims at blocking IP prefix hijacking in the Border Gateway Protocol (BGP). In essence, BlockJack provides synchronization among BlockChain and BGP network through interfaces ensuring operational independence and this approach preserving the legacy system and accommodates the impact of a race condition… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

  30. arXiv:2106.09904  [pdf, other

    cs.CR

    Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants

    Authors: Tham Nguyen, Hassan Jameel Asghar, Raghav Bhakar, Dali Kaafar, Farhad Farokhi

    Abstract: Lack of trust between organisations and privacy concerns about their data are impediments to an otherwise potentially symbiotic joint data analysis. We propose DataRing, a data sharing system that allows mutually mistrusting participants to query each others' datasets in a privacy-preserving manner while ensuring the correctness of input datasets and query answers even in the presence of (cheating… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  31. arXiv:2103.07101  [pdf, other

    cs.LG cs.CR

    On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: With an increase in low-cost machine learning APIs, advanced machine learning models may be trained on private datasets and monetized by providing them as a service. However, privacy researchers have demonstrated that these models may leak information about records in the training dataset via membership inference attacks. In this paper, we take a closer look at another inference attack reported in… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 20 pages, accepted at IEEE EuroS&P 2021

  32. arXiv:2102.01944  [pdf, other

    cs.CR

    All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks

    Authors: Zainab Abaid, Dilip Sarkar, Mohamed Ali Kaafar, Sanjay Jha

    Abstract: Many techniques have been proposed for quickly detecting and containing malware-generated network attacks such as large-scale denial of service attacks; unfortunately, much damage is already done within the first few minutes of an attack, before it is identified and contained. There is a need for an early warning system that can predict attacks before they actually manifest, so that upcoming attac… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: 14 pages, 7 figures

  33. Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

    Authors: Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Data holders are increasingly seeking to protect their user's privacy, whilst still maximizing their ability to produce machine models with high quality predictions. In this work, we empirically evaluate various implementations of differential privacy (DP), and measure their ability to fend off real-world privacy attacks, in addition to measuring their core goal of providing accurate classificatio… ▽ More

    Submitted 15 September, 2020; v1 submitted 20 August, 2020; originally announced August 2020.

    Comments: 12 pages, Accepted at CCSW'20, an ACM CCS Workshop

  34. arXiv:2007.11210  [pdf, other

    cs.CR cs.HC

    Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar, Francesca Trevisan, Haiyue Yuan

    Abstract: Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge-response identification schemes where a user mentally computes the response via a cognitive function to authenticate herself such that eavesdroppers cannot readily extract the secret. Security evaluation of ORAS generally involves quantifying information leaked via observed challenge-response pairs. However,… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

    Comments: Accepted into ACM Transactions on Privacy and Security. 32 Pages

  35. arXiv:2003.11231  [pdf, other

    cs.CR

    Unsupervised Learning for security of Enterprise networks by micro-segmentation

    Authors: Mahmood Yousefi-Azar, Mohamed-Ali Kaafar, Andy Walker

    Abstract: Micro-segmentation is a network security technique that requires delivering services for each unique segment. To do so, the first stage is defining these unique segments (a.k.a security groups) and then initializing policy-driven security controls. In this paper, we propose an unsupervised learning technique that covers both the security grou** and policy creation. For the network asset grou**… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

  36. arXiv:2003.08500  [pdf, ps, other

    cs.LG cs.CR eess.SP math.OC stat.ML

    The Cost of Privacy in Asynchronous Differentially-Private Machine Learning

    Authors: Farhad Farokhi, Nan Wu, David Smith, Mohamed Ali Kaafar

    Abstract: We consider training machine learning models using Training data located on multiple private and geographically-scattered servers with different privacy settings. Due to the distributed nature of the data, communicating with all collaborating private data owners simultaneously may prove challenging or altogether impossible. In this paper, we develop differentially-private asynchronous algorithms f… ▽ More

    Submitted 29 June, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

  37. arXiv:2002.06856  [pdf, other

    cs.LG stat.ML

    Data and Model Dependencies of Membership Inference Attack

    Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari

    Abstract: Machine learning (ML) models have been shown to be vulnerable to Membership Inference Attacks (MIA), which infer the membership of a given data point in the target dataset by observing the prediction output of the ML model. While the key factors for the success of MIA have not yet been fully understood, existing defense mechanisms such as using L2 regularization \cite{10shokri2017membership} and d… ▽ More

    Submitted 25 July, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

  38. arXiv:2001.10648  [pdf, ps, other

    cs.LG cs.CR cs.IT math.OC math.ST stat.ML

    Modelling and Quantifying Membership Information Leakage in Machine Learning

    Authors: Farhad Farokhi, Mohamed Ali Kaafar

    Abstract: Machine learning models have been shown to be vulnerable to membership inference attacks, i.e., inferring whether individuals' data have been used for training models. The lack of understanding about factors contributing success of these attacks motivates the need for modelling membership information leakage using information theory and for investigating properties of machine learning models and t… ▽ More

    Submitted 27 April, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

  39. On the Resilience of Biometric Authentication Systems against Random Inputs

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: We assess the security of machine learning based biometric authentication systems against an attacker who submits uniform random inputs, either as feature vectors or raw inputs, in order to find an accepting sample of a target user. The average false positive rate (FPR) of the system, i.e., the rate at which an impostor is incorrectly accepted as the legitimate user, may be interpreted as a measur… ▽ More

    Submitted 23 January, 2020; v1 submitted 12 January, 2020; originally announced January 2020.

    Comments: Accepted by NDSS2020, 18 pages

  40. arXiv:1908.10558  [pdf, other

    cs.CR cs.LG

    On Inferring Training Data Attributes in Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: A number of recent works have demonstrated that API access to machine learning models leaks information about the dataset records used to train the models. Further, the work of \cite{somesh-overfit} shows that such membership inference attacks (MIAs) may be sufficient to construct a stronger breed of attribute inference attacks (AIAs), which given a partial view of a record can guess the missing a… ▽ More

    Submitted 12 October, 2019; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: Accepted by PPML'19, a CCS workshop. Submission of 4-pages bar references, and appendix V2: Update in dataset splitting, and comments on related works

  41. arXiv:1906.09679  [pdf, ps, other

    cs.CR cs.LG stat.ML

    The Value of Collaboration in Convex Machine Learning with Differential Privacy

    Authors: Nan Wu, Farhad Farokhi, David Smith, Mohamed Ali Kaafar

    Abstract: In this paper, we apply machine learning to distributed private data owned by multiple data owners, entities with access to non-overlap** training datasets. We use noisy, differentially-private gradients to minimize the fitness cost of the machine learning model using stochastic gradient descent. We quantify the quality of the trained model, using the fitness cost, as a function of privacy budge… ▽ More

    Submitted 23 June, 2019; originally announced June 2019.

    Comments: Accepted in IEEE S&P 2020

    Journal ref: IEEE Symposium on Security and Privacy 2020 (IEEE SP 2020)

  42. arXiv:1906.00166  [pdf, other

    cs.CR

    A Longitudinal Analysis of Online Ad-Blocking Blacklists

    Authors: Saad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kaafar

    Abstract: Websites employ third-party ads and tracking services leveraging cookies and JavaScript code, to deliver ads and track users' behavior, causing privacy concerns. To limit online tracking and block advertisements, several ad-blocking (black) lists have been curated consisting of URLs and domains of well-known ads and tracking services. Using Internet Archive's Wayback Machine in this paper, we coll… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    Comments: 9

  43. arXiv:1905.09136  [pdf, other

    cs.CR

    DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

    Authors: Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kaafar

    Abstract: With the number of new mobile malware instances increasing by over 50\% annually since 2012 [24], malware embedding in mobile apps is arguably one of the most serious security issues mobile platforms are exposed to. While obfuscation techniques are successfully used to protect the intellectual property of apps' developers, they are unfortunately also often used by cybercriminals to hide malicious… ▽ More

    Submitted 21 August, 2019; v1 submitted 22 May, 2019; originally announced May 2019.

    Comments: 9 pages. arXiv admin note: text overlap with arXiv:1801.01633 by other authors

  44. arXiv:1905.07082  [pdf, other

    cs.CR cs.SD eess.AS

    The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services

    Authors: Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang

    Abstract: With the rapid development of deep learning techniques, the popularity of voice services implemented on various Internet of Things (IoT) devices is ever increasing. In this paper, we examine user-level membership inference in the problem space of voice services, by designing an audio auditor to verify whether a specific user had unwillingly contributed audio used to train an automatic speech recog… ▽ More

    Submitted 26 June, 2021; v1 submitted 16 May, 2019; originally announced May 2019.

    Comments: Accepted by PoPETs 2021.1

  45. arXiv:1904.10629  [pdf, other

    cs.CR

    A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna

    Abstract: This paper focuses on reporting of Internet malicious activity (or mal-activity in short) by public blacklists with the objective of providing a systematic characterization of what has been reported over the years, and more importantly, the evolution of reported activities. Using an initial seed of 22 blacklists, covering the period from January 2007 to June 2017, we collect more than 51 million m… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: ACM Asia Conference on Computer and Communications Security (AsiaCCS), 13 pages

  46. arXiv:1902.06414  [pdf, other

    cs.CR

    Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms

    Authors: Hassan Jameel Asghar, Dali Kaafar

    Abstract: We describe and evaluate an attack that reconstructs the histogram of any target attribute of a sensitive dataset which can only be queried through a specific class of real-world privacy-preserving algorithms which we call bounded perturbation algorithms. A defining property of such an algorithm is that it perturbs answers to the queries by adding zero-mean noise distributed within a bounded (poss… ▽ More

    Submitted 4 November, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: Accepted for publication in Proceedings of PETS 2020

  47. arXiv:1902.01499  [pdf, other

    cs.CR cs.DS

    Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula

    Authors: Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kaafar

    Abstract: We propose a generic mechanism to efficiently release differentially private synthetic versions of high-dimensional datasets with high utility. The core technique in our mechanism is the use of copulas. Specifically, we use the Gaussian copula to define dependencies of attributes in the input dataset, whose rows are modelled as samples from an unknown multivariate distribution, and then sample syn… ▽ More

    Submitted 4 February, 2019; originally announced February 2019.

  48. arXiv:1901.07699  [pdf, other

    cs.CR

    The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, Roya Ensafi

    Abstract: The Web is a tangled mass of interconnected services, where websites import a range of external resources from various third-party domains. However, the latter can further load resources hosted on other domains. For each website, this creates a dependency chain underpinned by a form of implicit trust between the first-party and transitively connected third-parties. The chain can only be loosely co… ▽ More

    Submitted 18 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 12 pages

  49. arXiv:1811.03197  [pdf, other

    cs.CR cs.DS

    Private Continual Release of Real-Valued Data Streams

    Authors: Victor Perrier, Hassan Jameel Asghar, Dali Kaafar

    Abstract: We present a differentially private mechanism to display statistics (e.g., the moving average) of a stream of real valued observations where the bound on each observation is either too conservative or unknown in advance. This is particularly relevant to scenarios of real-time data monitoring and reporting, e.g., energy data through smart meters. Our focus is on real-world data streams whose distri… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: Accepted for publication at NDSS 2019

  50. arXiv:1809.06988  [pdf, other

    cs.CR

    Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems

    Authors: Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kaafar, Sanjay Jha

    Abstract: A Software-Defined Network (SDN) controller (aka. Network Operating System or NOS) is regarded as the brain of the network and is the single most critical element responsible to manage an SDN. Complimentary to existing solutions that aim to protect a NOS, we propose an intrusion protection system designed to protect an SDN against a controller that has been successfully compromised. Gwardar mainta… ▽ More

    Submitted 18 September, 2018; originally announced September 2018.

    Comments: Accepted for publication at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018) - Final version published by the conference may slightly differ