Skip to main content

Showing 1–9 of 9 results for author: Khasawneh, K N

Searching in archive cs. Search in all archives.
.
  1. Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing

    Authors: Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh

    Abstract: Wireless device pairing is a critical security mechanism to bootstrap the secure communication between two devices without a pre-shared secret. It has been widely used in many Internet of Things (IoT) applications, such as smart-home and smart-health. Most existing device pairing mechanisms are based on out-of-band channels, e.g., extra sensors or hardware, to validate the proximity of pairing dev… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  2. arXiv:2401.02342  [pdf, other

    cs.CR cs.AR cs.LG

    Evasive Hardware Trojan through Adversarial Power Trace

    Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

    Abstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In thi… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  3. arXiv:2211.01182  [pdf, other

    cs.CR

    Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

    Authors: Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: Machine-learning architectures, such as Convolutional Neural Networks (CNNs) are vulnerable to adversarial attacks: inputs crafted carefully to force the system output to a wrong label. Since machine-learning is being deployed in safety-critical and security-sensitive domains, such attacks may have catastrophic security and safety consequences. In this paper, we propose for the first time to use h… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700

  4. arXiv:2201.01621  [pdf, other

    cs.CR cs.LG

    ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

    Authors: Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Advances in deep learning have enabled a wide range of promising applications. However, these systems are vulnerable to Adversarial Machine Learning (AML) attacks; adversarially crafted perturbations to their inputs could cause them to misclassify. Several state-of-the-art adversarial attacks have demonstrated that they can reliably fool classifiers making these attacks a significant threat. Adver… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: 12 pages

  5. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

    Authors: Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun

    Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes a… ▽ More

    Submitted 15 November, 2021; v1 submitted 2 October, 2021; originally announced October 2021.

  6. arXiv:2103.06936  [pdf, other

    cs.CR cs.LG

    Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

    Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh

    Abstract: Machine learning-based hardware malware detectors (HMDs) offer a potential game changing advantage in defending systems against malware. However, HMDs suffer from adversarial attacks, can be effectively reverse-engineered and subsequently be evaded, allowing malware to hide from detection. We address this issue by proposing a novel HMDs (Stochastic-HMDs) through approximate computing, which makes… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: 13 pages, 13 figures

  7. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  8. arXiv:1906.01345  [pdf, other

    cs.CR

    SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation

    Authors: Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijackin… ▽ More

    Submitted 4 December, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: To appear in IEEE S&P 2020

  9. arXiv:1806.05179  [pdf, other

    cs.CR cs.AR

    SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

    Authors: Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh

    Abstract: Speculative execution which is used pervasively in modern CPUs can leave side effects in the processor caches and other structures even when the speculated instructions do not commit and their direct effect is not visible. The recent Meltdown and Spectre attacks have shown that this behavior can be exploited to expose privileged information to an unprivileged attacker. In particular, the attack fo… ▽ More

    Submitted 15 June, 2018; v1 submitted 13 June, 2018; originally announced June 2018.