Skip to main content

Showing 1–12 of 12 results for author: Lodha, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.09401  [pdf

    cs.HC cs.CR

    Design and Execution Challenges for Cybersecurity Serious Games: An Overview

    Authors: Gokul Jayakrishnan, Vijayanand Banahatti, Sachin Lodha

    Abstract: Serious games are increasingly being used in cybersecurity education to engage and educate users. Several studies with cybersecurity serious games have shown that they are successful in educating users and the users also find them both fun and engaging. Meanwhile, several studies have also reported issues in identifying real life effects of the game and even the long-term effects that they have. B… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 5 Pages, Accepted at Workshop on Deconstructing Gamified Approaches to Security and Privacy, located at USENIX Symposium on Usable Privacy and Security (SOUPS) 2023

  2. arXiv:2112.02226  [pdf, other

    cs.CR cs.LG

    PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

    Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha

    Abstract: Phishing attacks continue to be a significant threat on the Internet. Prior studies show that it is possible to determine whether a website is phishing or not just by analyzing its URL more carefully. A major advantage of the URL based approach is that it can identify a phishing website even before the web page is rendered in the browser, thus avoiding other potential problems such as cryptojackin… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    ACM Class: E.1; F.1; F.2

  3. arXiv:2105.14803  [pdf, other

    cs.LG cs.AI cs.CR

    Gradient-based Data Subversion Attack Against Binary Classifiers

    Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha

    Abstract: Machine learning based data-driven technologies have shown impressive performances in a variety of application domains. Most enterprises use data from multiple sources to provide quality applications. The reliability of the external data sources raises concerns for the security of the machine learning techniques adopted. An attacker can tamper the training or test datasets to subvert the predictio… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: 26 pages, 3 Figures, 8 tables, adversarial attacks, data poisoning attacks, label contamination, transferability of attack, susceptibility

  4. arXiv:2104.13230  [pdf, other

    cs.LG cs.AI cs.CR

    Influence Based Defense Against Data Poisoning Attacks in Online Learning

    Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha

    Abstract: Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. Therefore, applications that rely on external data-sources for training data are at a significantly higher risk. There are several known defensive mechanisms that can help in mitigating the threat from such attacks. For example, data… ▽ More

    Submitted 24 April, 2021; originally announced April 2021.

    Comments: 18 pages, 3 Figures, 2 Tables, Adversarial Machine Learning, Data Poisoning, Online Learning, Defense, Influence Function

  5. arXiv:2009.03062  [pdf, other

    cs.CR

    Passwords: Divided they Stand, United they Fall

    Authors: Harshal Tupsamudre, Sachin Lodha

    Abstract: Today, offline attacks are one of the most severe threats to password security. These attacks have claimed millions of passwords from prominent websites including Yahoo, LinkedIn, Twitter, Sony, Adobe and many more. Therefore, as a preventive measure, it is necessary to gauge the offline guessing resistance of a password database and to help users choose secure passwords. The rule-based mechanisms… ▽ More

    Submitted 11 September, 2020; v1 submitted 7 September, 2020; originally announced September 2020.

    Comments: We propose an offline password guessing model in which attacker uses information from previous breaches and surveys to divide the search space into partitions. We prove that the success rate of attacker is maximum if the resulting partitions are explored in decreasing order of density. We demonstrate that the partition attack model is generic. This is an extended version of Passwords2014 paper

  6. arXiv:2005.10634  [pdf, other

    cs.CR cs.CY

    A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications

    Authors: Rajan M A, Manish Shukla, Sachin Lodha

    Abstract: Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracin… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 Pages, 3 Figures

  7. arXiv:2004.13328  [pdf, other

    cs.LG cs.CR cs.CY cs.DC

    Privacy Guidelines for Contact Tracing Applications

    Authors: Manish Shukla, Rajan M A, Sachin Lodha, Gautam Shroff, Ramesh Raskar

    Abstract: Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a comb… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: 10 pages, 0 images

  8. arXiv:1912.04231  [pdf, other

    cs.CR

    Extended- Force vs Nudge : Comparing Users' Pattern Choices on SysPal and TinPal

    Authors: Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha

    Abstract: Android's 3X3 graphical pattern lock scheme is one of the widely used authentication method on smartphone devices. However, users choose 3X3 patterns from a small subspace of all possible 389,112 patterns. The two recently proposed interfaces, SysPal by Cho et al. and TinPal by the authors, demonstrate that it is possible to influence users 3X3 pattern choices by making small modifications in the… ▽ More

    Submitted 26 December, 2019; v1 submitted 9 December, 2019; originally announced December 2019.

    Comments: Our paper is an extended version of ACM CCS 2019 poster by the same name. The paper is 32 pages long in ACM reference format. The paper has not been submitted to any journal or conference for the peer review

    MSC Class: D.4.6 ACM Class: D.4.6

  9. arXiv:1609.05001  [pdf, other

    cs.CV

    Stamp processing with examplar features

    Authors: Yash Bhalgat, Mandar Kulkarni, Shirish Karande, Sachin Lodha

    Abstract: Document digitization is becoming increasingly crucial. In this work, we propose a shape based approach for automatic stamp verification/detection in document images using an unsupervised feature learning. Given a small set of training images, our algorithm learns an appropriate shape representation using an unsupervised clustering. Experimental results demonstrate the effectiveness of our framewo… ▽ More

    Submitted 16 September, 2016; originally announced September 2016.

  10. arXiv:1604.04454  [pdf

    cs.ET

    Enhanced Circuit Densities in Epitaxially Defined FinFETs (EDFinFETs) over FinFETs

    Authors: Sushant Mittal, Aneesh Nainani, M. C. Abraham, Saurabh Lodha, Udayan Ganguly

    Abstract: FinFET technology is prone to suffer from Line Edge Roughness (LER) based VT variation with scaling. To address this, we proposed an Epitaxially Defined (ED) FinFET (EDFinFET) as an alternate to FinFET architecture for 10 nm node and beyond. We showed by statistical simulations that EDFinFET reduces LER based VT variability by 90% and overall variability by 59%. However, EDFinFET consists of wider… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

  11. arXiv:0902.3517  [pdf, other

    cs.DS cs.DC cs.DM

    Energy-Efficient Shortest Path Algorithms for Convergecast in Sensor Networks

    Authors: John Augustine, Qi Han, Philip Loden, Sachin Lodha, Sasanka Roy

    Abstract: We introduce a variant of the capacitated vehicle routing problem that is encountered in sensor networks for scientific data collection. Consider an undirected graph $G=(V \cup \{\mathbf{sink}\},E)$. Each vertex $v \in V$ holds a constant-sized reading normalized to 1 byte that needs to be communicated to the $\mathbf{sink}$. The communication protocol is defined such that readings travel in pac… ▽ More

    Submitted 20 February, 2009; originally announced February 2009.

    Comments: 15 pages, 7 figures

    ACM Class: F.2.2

  12. arXiv:0805.1401  [pdf, ps, other

    cs.CG cs.DS

    Approximation Algorithms for Shortest Descending Paths in Terrains

    Authors: Mustaq Ahmed, Sandip Das, Sachin Lodha, Anna Lubiw, Anil Maheshwari, Sasanka Roy

    Abstract: A path from s to t on a polyhedral terrain is descending if the height of a point p never increases while we move p along the path from s to t. No efficient algorithm is known to find a shortest descending path (SDP) from s to t in a polyhedral terrain. We give two approximation algorithms (more precisely, FPTASs) that solve the SDP problem on general terrains. Both algorithms are simple, robust… ▽ More

    Submitted 9 May, 2008; originally announced May 2008.

    Comments: 24 pages, 8 figures

    ACM Class: F.2.2