Skip to main content

Showing 1–28 of 28 results for author: Khorrami, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19461  [pdf, other

    cs.RO cs.CV

    Efficient and Distributed Large-Scale 3D Map Registration using Tomographic Features

    Authors: Halil Utku Unlu, Anthony Tzes, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: A robust, resource-efficient, distributed, and minimally parameterized 3D map matching and merging algorithm is proposed. The suggested algorithm utilizes tomographic features from 2D projections of horizontal cross-sections of gravity-aligned local maps, and matches these projection slices at all possible height differences, enabling the estimation of four degrees of freedom in an efficient and p… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: Submitted to Elsevier Journal: Robotics and Autonomous Systems (RAS)

  2. arXiv:2406.05590  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

    Authors: Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess LLMs in solving CTF challenges by creating a scalable, open-source benchmark database specifically designed for these applications. This database incl… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  3. arXiv:2405.14737  [pdf, other

    cs.CV

    CLIPScope: Enhancing Zero-Shot OOD Detection with Bayesian Scoring

    Authors: Hao Fu, Naman Patel, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Detection of out-of-distribution (OOD) samples is crucial for safe real-world deployment of machine learning models. Recent advances in vision language foundation models have made them capable of detecting OOD samples without requiring in-distribution (ID) images. However, these zero-shot methods often underperform as they do not adequately consider ID class likelihoods in their detection confiden… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  4. arXiv:2404.15446  [pdf, other

    cs.CR eess.SY

    OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems

    Authors: Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri

    Abstract: Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compr… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  5. arXiv:2403.18206  [pdf, other

    cs.RO

    Sailing Through Point Clouds: Safe Navigation Using Point Cloud Based Control Barrier Functions

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: The capability to navigate safely in an unstructured environment is crucial when deploying robotic systems in real-world scenarios. Recently, control barrier function (CBF) based approaches have been highly effective in synthesizing safety-critical controllers. In this work, we propose a novel CBF-based local planner comprised of two components: Vessel and Mariner. The Vessel is a novel scaling fa… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  6. arXiv:2402.16926  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem

    Authors: Georg Pichler, Marco Romanelli, Divya Prakash Manivannan, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg

    Abstract: We introduce a formal statistical definition for the problem of backdoor detection in machine learning systems and use it to analyze the feasibility of such problems, providing evidence for the utility and applicability of our definition. The main contributions of this work are an impossibility result and an achievability result for backdoor detection. We show a no-free-lunch theorem, proving that… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  7. arXiv:2402.08546  [pdf, other

    cs.RO

    Grounding LLMs For Robot Task Planning Using Closed-loop State Feedback

    Authors: Vineet Bhat, Ali Umut Kaypak, Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami

    Abstract: Robotic planning algorithms direct agents to perform actions within diverse environments to accomplish a task. Large Language Models (LLMs) like PaLM 2, GPT-3.5, and GPT-4 have revolutionized this domain, using their embedded real-world knowledge to tackle complex tasks involving multiple agents and objects. This paper introduces an innovative planning algorithm that integrates LLMs into the robot… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  8. arXiv:2401.14033  [pdf, ps, other

    cs.LG

    Novel Quadratic Constraints for Extending LipSDP beyond Slope-Restricted Activations

    Authors: Patricia Pauli, Aaron Havens, Alexandre Araujo, Siddharth Garg, Farshad Khorrami, Frank Allgöwer, Bin Hu

    Abstract: Recently, semidefinite programming (SDP) techniques have shown great promise in providing accurate Lipschitz bounds for neural networks. Specifically, the LipSDP approach (Fazlyab et al., 2019) has received much attention and provides the least conservative Lipschitz upper bounds that can be computed with polynomial time guarantees. However, one main restriction of LipSDP is that its formulation r… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: accepted as a conference paper at ICLR 2024

  9. arXiv:2310.18274  [pdf, other

    cs.CV cs.LG

    LipSim: A Provably Robust Perceptual Similarity Metric

    Authors: Sara Ghazanfari, Alexandre Araujo, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg

    Abstract: Recent years have seen growing interest in develo** and applying perceptual similarity metrics. Research has shown the superiority of perceptual metrics over pixel-wise metrics in aligning with human perception and serving as a proxy for the human visual system. On the other hand, as perceptual metrics rely on neural networks, there is a growing concern regarding their resilience, given the esta… ▽ More

    Submitted 29 March, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

  10. arXiv:2309.17226  [pdf, other

    cs.RO

    Differentiable Optimization Based Time-Varying Control Barrier Functions for Dynamic Obstacle Avoidance

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) provide a simple yet effective way for safe control synthesis. Recently, work has been done using differentiable optimization (diffOpt) based methods to systematically construct CBFs for static obstacle avoidance tasks between geometric shapes. In this work, we extend the application of diffOpt CBFs to perform dynamic obstacle avoidance tasks. We show that by using… ▽ More

    Submitted 23 January, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

  11. arXiv:2309.07709  [pdf, other

    cs.RO

    Safe Aerial Manipulator Maneuvering and Force Exertion via Control Barrier Functions

    Authors: Dimitris Chaikalis, Vinicius Goncalves, Nikolaos Evangeliou, Anthony Tzes, Farshad Khorrami

    Abstract: This article introduces a safe control strategy for application of forces to an external object using a dexterous robotic arm mounted on an unmanned Aerial Vehicle (UAV). A hybrid force-motion controller has been developed for this purpose. This controller employs a Control Barrier Function (CBF) constraint within an optimization framework based on Quadratic Programming (QP). The objective is to e… ▽ More

    Submitted 31 May, 2024; v1 submitted 14 September, 2023; originally announced September 2023.

  12. arXiv:2307.15157  [pdf, other

    cs.CV cs.LG eess.IV

    R-LPIPS: An Adversarially Robust Perceptual Similarity Metric

    Authors: Sara Ghazanfari, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Alexandre Araujo

    Abstract: Similarity metrics have played a significant role in computer vision to capture the underlying semantics of images. In recent years, advanced similarity metrics, such as the Learned Perceptual Image Patch Similarity (LPIPS), have emerged. These metrics leverage deep features extracted from trained neural networks and have demonstrated a remarkable ability to closely align with human perception whe… ▽ More

    Submitted 31 July, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

  13. arXiv:2307.05422  [pdf, other

    cs.CR cs.LG

    Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection

    Authors: Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes a data-efficient detection method for deep neural networks against backdoor attacks under a black-box scenario. The proposed approach is motivated by the intuition that features corresponding to triggers have a higher influence in determining the backdoored network output than any other benign features. To quantitatively measure the effects of triggers and benign features on de… ▽ More

    Submitted 14 July, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

    Comments: Published in the IEEE Transactions on Information Forensics and Security

    Journal ref: IEEE Transactions on Information Forensics and Security 2023

  14. arXiv:2306.09949  [pdf, other

    cs.CV

    Towards Better Certified Segmentation via Diffusion Models

    Authors: Othmane Laousy, Alexandre Araujo, Guillaume Chassagnon, Marie-Pierre Revel, Siddharth Garg, Farshad Khorrami, Maria Vakalopoulou

    Abstract: The robustness of image segmentation has been an important research topic in the past few years as segmentation models have reached production-level accuracy. However, like classification models, segmentation models can be vulnerable to adversarial perturbations, which hinders their use in critical-decision systems like healthcare or autonomous driving. Recently, randomized smoothing has been prop… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

  15. arXiv:2305.06902  [pdf, other

    cs.CR

    REMaQE: Reverse Engineering Math Equations from Executables

    Authors: Meet Udeshi, Prashanth Krishnamurthy, Hammond Pearce, Ramesh Karri, Farshad Khorrami

    Abstract: Cybersecurity attacks on embedded devices for industrial control systems and cyber-physical systems may cause catastrophic physical damage as well as economic loss. This could be achieved by infecting device binaries with malware that modifies the physical characteristics of the system operation. Mitigating such attacks benefits from reverse engineering tools that recover sufficient semantic knowl… ▽ More

    Submitted 11 April, 2024; v1 submitted 11 May, 2023; originally announced May 2023.

    ACM Class: C.3; D.2.5

  16. Safe Navigation and Obstacle Avoidance Using Differentiable Optimization Based Control Barrier Functions

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Vinícius Gonçalves, Anthony Tzes, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) have been widely applied to safety-critical robotic applications. However, the construction of control barrier functions for robotic systems remains a challenging task. Recently, collision detection using differentiable optimization has provided a way to compute the minimum uniform scaling factor that results in an intersection between two convex shapes and to also… ▽ More

    Submitted 21 November, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

  17. arXiv:2212.08701  [pdf, other

    cs.LG

    An Upper Bound for the Distribution Overlap Index and Its Applications

    Authors: Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes an easy-to-compute upper bound for the overlap index between two probability distributions without requiring any knowledge of the distribution models. The computation of our bound is time-efficient and memory-efficient and only requires finite samples. The proposed bound shows its value in one-class classification and domain shift analysis. Specifically, in one-class classifica… ▽ More

    Submitted 11 February, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  18. arXiv:2212.06322  [pdf, other

    cs.LG cs.CR

    Privacy-Preserving Collaborative Learning through Feature Extraction

    Authors: Alireza Sarmadi, Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: We propose a framework in which multiple entities collaborate to build a machine learning model while preserving privacy of their data. The approach utilizes feature embeddings from shared/per-entity feature extractors transforming data into a feature space for cooperation between entities. We propose two specific methods and compare them with a baseline method. In Shared Feature Extractor (SFE) L… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  19. arXiv:2210.04571  [pdf, other

    cs.RO

    Modular Multi-Copter Structure Control for Cooperative Aerial Cargo Transportation

    Authors: Dimitris Chaikalis, Nikolaos Evangeliou, Anthony Tzes, Farshad Khorrami

    Abstract: The control problem of a multi-copter swarm, mechanically coupled through a modular lattice structure of connecting rods, is considered in this article. The system's structural elasticity is considered in deriving the system's dynamics. The devised controller is robust against the induced flexibilities, while an inherent adaptation scheme allows for the control of asymmetrical configurations and t… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  20. arXiv:2205.05429  [pdf, other

    eess.SY cs.RO

    Learning a Better Control Barrier Function

    Authors: Bolun Dai, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) are widely used in safety-critical controllers. However, constructing a valid CBF is challenging, especially under nonlinear or non-convex constraints and for high relative degree systems. Meanwhile, finding a conservative CBF that only recovers a portion of the true safe set is usually possible. In this work, starting from a "conservative" handcrafted CBF (HCBF),… ▽ More

    Submitted 11 October, 2022; v1 submitted 11 May, 2022; originally announced May 2022.

    Comments: Accepted at 61st IEEE Conference on Decision and Control (CDC) 2022

  21. arXiv:2202.01142  [pdf, other

    cs.SE cs.CR cs.LG

    Pop Quiz! Can a Large Language Model Help With Reverse Engineering?

    Authors: Hammond Pearce, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt

    Abstract: Large language models (such as OpenAI's Codex) have demonstrated impressive zero-shot multi-task capabilities in the software domain, including code explanation. In this work, we examine if this ability can be used to help with reverse engineering. Specifically, we investigate prompting Codex to identify the purpose, capabilities, and important variable names or values from code, even when the cod… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 18 pages, 19 figures. Linked dataset: https://doi.org/10.5281/zenodo.5949075

  22. arXiv:2112.04114  [pdf, other

    cs.CR cs.NI

    ESAFE: Enterprise Security and Forensics at Scale

    Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Securing enterprise networks presents challenges in terms of both their size and distributed structure. Data required to detect and characterize malicious activities may be diffused and may be located across network and endpoint devices. Further, cyber-relevant data routinely exceeds total available storage, bandwidth, and analysis capability, often by several orders of magnitude. Real-time detect… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: 15 pages, 7 figures

  23. arXiv:2107.07931  [pdf, other

    cs.RO

    Learning Locomotion Controllers for Walking Using Deep FBSDE

    Authors: Bolun Dai, Virinchi Roy Surabhi, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: In this paper, we propose a deep forward-backward stochastic differential equation (FBSDE) based control algorithm for locomotion tasks. We also include state constraints in the FBSDE formulation to impose stable walking solutions or other constraints that one may want to consider (e.g., energy). Our approach utilizes a deep neural network (i.e., LSTM) to solve, in general, high-dimensional Hamilt… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: Submitted to IROS

  24. arXiv:2011.04065  [pdf, other

    cs.LG cs.CR

    Bait and Switch: Online Training Data Poisoning of Autonomous Driving Systems

    Authors: Naman Patel, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: We show that by controlling parts of a physical environment in which a pre-trained deep neural network (DNN) is being fine-tuned online, an adversary can launch subtle data poisoning attacks that degrade the performance of the system. While the attack can be applied in general to any perception task, we consider a DNN based traffic light classifier for an autonomous car that has been trained in on… ▽ More

    Submitted 7 December, 2020; v1 submitted 8 November, 2020; originally announced November 2020.

    Comments: To appear in the NeurIPS 2020 Workshop on Dataset Curation and Security

  25. Detecting Backdoors in Neural Networks Using Novel Feature-Based Anomaly Detection

    Authors: Hao Fu, Akshaj Kumar Veldanda, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes a new defense against neural network backdooring attacks that are maliciously trained to mispredict in the presence of attacker-chosen triggers. Our defense is based on the intuition that the feature extraction layers of a backdoored network embed new features to detect the presence of a trigger and the subsequent classification layers learn to mispredict when triggers are dete… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Journal ref: IEEE Access 10 (2022): 5545-5558

  26. Hardware Trojan Detection Using Controlled Circuit Aging

    Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami

    Abstract: This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC. This increase in delay results in timing violations that reveal as timing errors at the output of the IC during its operation. We present experiments using aging-aware standard cell libraries to illus… ▽ More

    Submitted 20 April, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: 21 pages, 34 figures

  27. NNoculation: Catching BadNets in the Wild

    Authors: Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg

    Abstract: This paper proposes a novel two-stage defense (NNoculation) against backdoored neural networks (BadNets) that, repairs a BadNet both pre-deployment and online in response to backdoored test inputs encountered in the field. In the pre-deployment stage, NNoculation retrains the BadNet with random perturbations of clean validation inputs to partially reduce the adversarial impact of a backdoor. Post-… ▽ More

    Submitted 15 November, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

  28. arXiv:1811.04539  [pdf, other

    cs.LG cs.RO stat.ML

    Adversarial Learning-Based On-Line Anomaly Monitoring for Assured Autonomy

    Authors: Naman Patel, Apoorva Nandini Saridena, Anna Choromanska, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: The paper proposes an on-line monitoring framework for continuous real-time safety/security in learning-based control systems (specifically application to a unmanned ground vehicle). We monitor validity of map**s from sensor inputs to actuator commands, controller-focused anomaly detection (CFAM), and from actuator commands to sensor inputs, system-focused anomaly detection (SFAM). CFAM is an im… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

    Comments: Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2018)