Skip to main content

Showing 1–30 of 30 results for author: Lupu, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.14161  [pdf, other

    cs.CR eess.SY

    ICCPS: Impact discovery using causal inference for cyber attacks in CPSs

    Authors: Rajib Ranjan Maiti, Sridhar Adepu, Emil Lupu

    Abstract: We propose a new method to quantify the impact of cyber attacks in Cyber Physical Systems (CPSs). In particular, our method allows to identify the Design Parameter (DPs) affected due to a cyber attack launched on a different set of DPs in the same CPS. To achieve this, we adopt causal graphs to causally link DPs with each other and quantify the impact of one DP on another. Using SWaT, a real world… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 35 pages, 17 figures

  2. arXiv:2306.01613  [pdf, other

    cs.LG cs.CR stat.ML

    Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization

    Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu

    Abstract: Machine Learning (ML) algorithms are vulnerable to poisoning attacks, where a fraction of the training data is manipulated to deliberately degrade the algorithms' performance. Optimal attacks can be formulated as bilevel optimization problems and help to assess their robustness in worst-case scenarios. We show that current approaches, which typically assume that hyperparameters remain constant, le… ▽ More

    Submitted 23 June, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: Accepted to IEEE Transactions on Neural Networks and Learning Systems. arXiv admin note: text overlap with arXiv:2003.00040

  3. arXiv:2204.13973  [pdf, other

    cs.CV cs.CR

    Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

    Authors: Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu

    Abstract: Autonomous Vehicles (AVs) are mostly reliant on LiDAR sensors which enable spatial perception of their surroundings and help make driving decisions. Recent works demonstrated attacks that aim to hide objects from AV perception, which can result in severe consequences. 3D shadows, are regions void of measurements in 3D point clouds which arise from occlusions of objects in a scene. 3D shadows were… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    Comments: To appear in the Proceedings of the 2022 IEEE Security and Privacy Workshop on the Internet of Safe Things (SafeThings 2022)

  4. arXiv:2204.08726  [pdf, other

    cs.LG cs.CR cs.CV

    Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks

    Authors: Kenneth T. Co, David Martinez-Rego, Zhongyuan Hau, Emil C. Lupu

    Abstract: Deep neural networks have become an integral part of our software infrastructure and are being deployed in many widely-used and safety-critical applications. However, their integration into many systems also brings with it the vulnerability to test time attacks in the form of Universal Adversarial Perturbations (UAPs). UAPs are a class of perturbations that when applied to any input causes model m… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  5. arXiv:2105.10948  [pdf, other

    cs.LG cs.CR stat.ML

    Regularization Can Help Mitigate Poisoning Attacks... with the Right Hyperparameters

    Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu

    Abstract: Machine learning algorithms are vulnerable to poisoning attacks, where a fraction of the training data is manipulated to degrade the algorithms' performance. We show that current approaches, which typically assume that regularization hyperparameters remain constant, lead to an overly pessimistic view of the algorithms' robustness and of the impact of regularization. We propose a novel optimal atta… ▽ More

    Submitted 23 May, 2021; originally announced May 2021.

    Comments: Published at ICLR 2021 Workshop on Security and Safety in Machine Learning Systems. arXiv admin note: text overlap with arXiv:2003.00040

  6. arXiv:2105.07334  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    Real-time Detection of Practical Universal Adversarial Perturbations

    Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu

    Abstract: Universal Adversarial Perturbations (UAPs) are a prominent class of adversarial examples that exploit the systemic vulnerabilities and enable physically realizable and robust attacks against Deep Neural Networks (DNNs). UAPs generalize across many different inputs; this leads to realistic and effective attacks that can be applied at scale. In this paper we propose HyperNeuron, an efficient and sca… ▽ More

    Submitted 22 May, 2021; v1 submitted 15 May, 2021; originally announced May 2021.

  7. arXiv:2104.10459  [pdf, ps, other

    cs.LG cs.AI cs.CR cs.CV

    Jacobian Regularization for Mitigating Universal Adversarial Perturbations

    Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu

    Abstract: Universal Adversarial Perturbations (UAPs) are input perturbations that can fool a neural network on large sets of data. They are a class of attacks that represents a significant threat as they facilitate realistic, practical, and low-cost attacks on neural networks. In this work, we derive upper bounds for the effectiveness of UAPs based on norms of data-dependent Jacobians. We empirically verify… ▽ More

    Submitted 12 September, 2021; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: In Proceedings of the 30th International Conference on Artificial Neural Networks (ICANN 2021), related code available at: https://github.com/kenny-co/sgd-uap-torch

  8. arXiv:2102.03722  [pdf, other

    cs.CV cs.CR cs.LG

    Object Removal Attacks on LiDAR-based 3D Object Detectors

    Authors: Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu

    Abstract: LiDARs play a critical role in Autonomous Vehicles' (AVs) perception and their safe operations. Recent works have demonstrated that it is possible to spoof LiDAR return signals to elicit fake objects. In this work we demonstrate how the same physical capabilities can be used to mount a new, even more dangerous class of attacks, namely Object Removal Attacks (ORAs). ORAs aim to force 3D object dete… ▽ More

    Submitted 7 February, 2021; originally announced February 2021.

    Comments: Accepted to AutoSec at NDSS 2021

  9. arXiv:2012.06024  [pdf, other

    cs.LG cs.AI cs.CR

    Robustness and Transferability of Universal Attacks on Compressed Models

    Authors: Alberto G. Matachana, Kenneth T. Co, Luis Muñoz-González, David Martinez, Emil C. Lupu

    Abstract: Neural network compression methods like pruning and quantization are very effective at efficiently deploying Deep Neural Networks (DNNs) on edge devices. However, DNNs remain vulnerable to adversarial examples-inconspicuous inputs that are specifically designed to fool these models. In particular, Universal Adversarial Perturbations (UAPs), are a powerful class of adversarial attacks which create… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: Accepted to AAAI 2021 Workshop: Towards Robust, Secure and Efficient Machine Learning

  10. arXiv:2008.12008  [pdf, other

    cs.CR

    Shadow-Catcher: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing

    Authors: Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu

    Abstract: LiDAR-driven 3D sensing allows new generations of vehicles to achieve advanced levels of situation awareness. However, recent works have demonstrated that physical adversaries can spoof LiDAR return signals and deceive 3D object detectors to erroneously detect "ghost" objects. Existing defenses are either impractical or focus only on vehicles. Unfortunately, it is easier to spoof smaller objects s… ▽ More

    Submitted 2 May, 2021; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: To appear in 26th European Symposium on Research in Computer Security (ESORICS) 2021. Accepted at ESORICS'21 for the Winter Cycle submission

  11. Adaptive Nonlinear Control of Fixed-Wing VTOL with Airflow Vector Sensing

    Authors: Xichen Shi, Patrick Spieler, Ellande Tang, Elena-Sorina Lupu, Phillip Tokumaru, Soon-Jo Chung

    Abstract: Fixed-wing vertical take-off and landing (VTOL) aircraft pose a unique control challenge that stems from complex aerodynamic interactions between wings and rotors. Thus, accurate estimation of external forces is indispensable for achieving high performance flight. In this paper, we present a composite adaptive nonlinear tracking controller for a fixed-wing VTOL. The method employs online adaptatio… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Comments: 7 pages, 7 figures, International Conference on Robotics and Automation (ICRA) 2020

    Report number: CaltechAUTHORS:20200526-151816924

    Journal ref: IEEE International Conference on Robotics and Automation (ICRA), 2020, pp. 5321-5327

  12. arXiv:2003.00040  [pdf, other

    cs.LG cs.CR stat.ML

    Regularisation Can Mitigate Poisoning Attacks: A Novel Analysis Based on Multiobjective Bilevel Optimisation

    Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu

    Abstract: Machine Learning (ML) algorithms are vulnerable to poisoning attacks, where a fraction of the training data is manipulated to deliberately degrade the algorithms' performance. Optimal poisoning attacks, which can be formulated as bilevel optimisation problems, help to assess the robustness of learning algorithms in worst-case scenarios. However, current attacks against algorithms with hyperparamet… ▽ More

    Submitted 20 June, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

  13. Universal Adversarial Robustness of Texture and Shape-Biased Models

    Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Ben Glocker, Emil C. Lupu

    Abstract: Increasing shape-bias in deep neural networks has been shown to improve robustness to common corruptions and noise. In this paper we analyze the adversarial robustness of texture and shape-biased models to Universal Adversarial Perturbations (UAPs). We use UAPs to evaluate the robustness of DNN models with varying degrees of shape-based training. We find that shape-biased models do not markedly im… ▽ More

    Submitted 30 August, 2021; v1 submitted 23 November, 2019; originally announced November 2019.

    Comments: In Proceedings of the 28th IEEE International Conference on Image Processing (ICIP 2021), code available at: https://github.com/kenny-co/sgd-uap-torch

  14. arXiv:1909.05125  [pdf, other

    stat.ML cs.DC cs.LG

    Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging

    Authors: Luis Muñoz-González, Kenneth T. Co, Emil C. Lupu

    Abstract: Federated learning enables training collaborative machine learning models at scale with many participants whilst preserving the privacy of their datasets. Standard federated learning techniques are vulnerable to Byzantine failures, biased local datasets, and poisoning attacks. In this paper we introduce Adaptive Federated Averaging, a novel algorithm for robust federated learning that is designed… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

  15. arXiv:1906.07773  [pdf, other

    cs.LG cs.CR stat.ML

    Poisoning Attacks with Generative Adversarial Nets

    Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu

    Abstract: Machine learning algorithms are vulnerable to poisoning attacks: An adversary can inject malicious points in the training dataset to influence the learning process and degrade the algorithm's performance. Optimal poisoning attacks have already been proposed to evaluate worst-case scenarios, modelling attacks as a bi-level optimization problem. Solving these problems is computationally demanding an… ▽ More

    Submitted 25 September, 2019; v1 submitted 18 June, 2019; originally announced June 2019.

  16. arXiv:1906.03455  [pdf, other

    cs.LG cs.CR stat.ML

    Sensitivity of Deep Convolutional Networks to Gabor Noise

    Authors: Kenneth T. Co, Luis Muñoz-González, Emil C. Lupu

    Abstract: Deep Convolutional Networks (DCNs) have been shown to be sensitive to Universal Adversarial Perturbations (UAPs): input-agnostic perturbations that fool a model on large portions of a dataset. These UAPs exhibit interesting visual patterns, but this phenomena is, as yet, poorly understood. Our work shows that visually similar procedural noise patterns also act as UAPs. In particular, we demonstrat… ▽ More

    Submitted 10 June, 2019; v1 submitted 8 June, 2019; originally announced June 2019.

    Comments: Accepted to ICML 2019 Workshop on Identifying and Understanding Deep Learning Phenomena

  17. arXiv:1904.13173  [pdf, other

    cs.CR cs.AI

    An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

    Authors: Erisa Karafili, Linna Wang, Emil C. Lupu

    Abstract: We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive security measures. In this work, we propose an argumentation-based reasoner (ABR) as a proof-of-concept tool that can help a forensics analyst during… ▽ More

    Submitted 21 January, 2020; v1 submitted 30 April, 2019; originally announced April 2019.

  18. arXiv:1904.03082  [pdf, other

    cs.CR

    Efficient attack countermeasure selection accounting for recovery and action costs

    Authors: Jukka Soikkeli, Luis Muñoz-González, Emil C. Lupu

    Abstract: The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending against such attacks can also be costly. This work proposes an attack countermeasure selection approach based on cost impact analysis that takes into account the impacts of actions by both the attacker and the defender. We consider a networked system providing services whose provision depends on oth… ▽ More

    Submitted 5 April, 2019; originally announced April 2019.

    Comments: 10 pages

  19. arXiv:1812.02982  [pdf

    cs.NI cs.MM

    An Experimental Evaluation Of Analog TV Cable Services Distributed In GPON Architecture

    Authors: Radu Arsinte, Eugen Lupu

    Abstract: This paper explores the benefits of GPON (Gigabit Passive Optical Networks) in analog TV services. Analog TV service is still present in the standard triple play distribution architectures, as an effect of unique advantages: simple distribution in an apartment via standard RF splitters, unlimited number of viewing sites, real time behavior by lack of encoding/decoding processes. Of course, the qua… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: 4pages, 7 figures

    Journal ref: Acta technica Napocensis, Electronics and telecommunications, ISSN 1221-6542, Volume 57, Number 4/2016, pp.11-14

  20. Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks

    Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu

    Abstract: Deep Convolutional Networks (DCNs) have been shown to be vulnerable to adversarial examples---perturbed inputs specifically designed to produce intentional errors in the learning algorithms at test time. Existing input-agnostic adversarial perturbations exhibit interesting visual patterns that are currently unexplained. In this paper, we introduce a structured approach for generating Universal Adv… ▽ More

    Submitted 23 November, 2019; v1 submitted 30 September, 2018; originally announced October 2018.

    Comments: 16 pages, 10 figures. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19)

  21. arXiv:1808.05705  [pdf, other

    cs.CR stat.ML

    Mitigation of Adversarial Attacks through Embedded Feature Selection

    Authors: Ziyi Bao, Luis Muñoz-González, Emil C. Lupu

    Abstract: Machine learning has become one of the main components for task automation in many application domains. Despite the advancements and impressive achievements of machine learning, it has been shown that learning algorithms can be compromised by attackers both at training and test time. Machine learning systems are especially vulnerable to adversarial examples where small perturbations added to the o… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

  22. arXiv:1806.10984  [pdf, other

    cs.CR

    Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices

    Authors: Hassan Chizari, Emil Lupu

    Abstract: Achieving secure communication between an Implantable Medical Device (IMD) inside the body and a gateway outside the body has showed its criticality with recent reports of hackings. The use of asymmetric cryptography is not a practical solution for IMDs due to the scarce computational and power resources, symmetric key cryptography is preferred. One of the factors in security of a symmetric crypto… ▽ More

    Submitted 28 June, 2018; originally announced June 2018.

    Comments: 17 pages, 18 figures

  23. arXiv:1803.00992  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Label Sanitization against Label Flip** Poisoning Attacks

    Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu

    Abstract: Many machine learning systems rely on data collected in the wild from untrusted sources, exposing the learning algorithms to data poisoning. Attackers can inject malicious data in the training dataset to subvert the learning process, compromising the performance of the algorithm producing errors in a targeted or an indiscriminate way. Label flip** attacks are a special case of data poisoning, wh… ▽ More

    Submitted 2 October, 2018; v1 submitted 2 March, 2018; originally announced March 2018.

  24. arXiv:1802.03041  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

    Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu

    Abstract: Machine learning has become an important component for many systems and applications including computer vision, spam filtering, malware and network intrusion detection, among others. Despite the capabilities of machine learning algorithms to extract valuable information from data and produce accurate predictions, it has been shown that these algorithms are vulnerable to attacks. Data poisoning is… ▽ More

    Submitted 8 February, 2018; originally announced February 2018.

    Comments: 10 pages, 3 figures

  25. arXiv:1708.08689  [pdf, other

    cs.LG

    Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization

    Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli

    Abstract: A number of online services nowadays rely upon machine learning to extract valuable information from data collected in the wild. This exposes learning algorithms to the threat of data poisoning, i.e., a coordinate attack in which a fraction of the training data is controlled by the attacker and manipulated to subvert the learning process. To date, these attacks have been devised only against a lim… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  26. arXiv:1705.00732  [pdf, ps, other

    cs.CR cs.AI

    Argumentation-based Security for Social Good

    Authors: Erisa Karafili, Antonis C. Kakas, Nikolaos I. Spanoudakis, Emil C. Lupu

    Abstract: The increase of connectivity and the impact it has in every day life is raising new and existing security problems that are becoming important for social good. We introduce two particular problems: cyber attack attribution and regulatory data sharing. For both problems, decisions about which rules to apply, should be taken under incomplete and context dependent information. The solution we propose… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: Paper presented at the AAAI Spring Symposium 2017, 7 pages

  27. arXiv:1609.03020  [pdf, ps, other

    cs.CR

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Authors: Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu

    Abstract: Recent statistics show that in 2015 more than 140 millions new malware samples have been found. Among these, a large portion is due to ransomware, the class of malware whose specific goal is to render the victim's system unusable, in particular by encrypting important files, and then ask the user to pay a ransom to revert the damage. Several ransomware include sophisticated packing techniques, and… ▽ More

    Submitted 10 September, 2016; originally announced September 2016.

  28. arXiv:1606.07025  [pdf, ps, other

    cs.CR cs.AI stat.ML

    Efficient Attack Graph Analysis through Approximate Inference

    Authors: Luis Muñoz-González, Daniele Sgandurra, Andrea Paudice, Emil C. Lupu

    Abstract: Attack graphs provide compact representations of the attack paths that an attacker can follow to compromise network resources by analysing network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. Bayesian inference on attack graphs enables the estimation of the risk of compromise to the system's components given their vulnerabilities and interco… ▽ More

    Submitted 22 June, 2016; originally announced June 2016.

    Comments: 30 pages, 14 figures

  29. arXiv:1510.02427  [pdf, ps, other

    cs.CR stat.AP stat.ML

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Authors: Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil Lupu

    Abstract: Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model attack graphs to perform static and dynamic analysis. Previous approaches have focused on the formalization of attack graphs into a Bayesian model… ▽ More

    Submitted 4 November, 2016; v1 submitted 8 October, 2015; originally announced October 2015.

    Comments: 14 pages, 15 figures

    MSC Class: 62F15

  30. arXiv:1105.0826  [pdf

    cs.MM cs.CV

    Streaming Multimedia Information Using the Features of the DVB-S Card

    Authors: Radu Arsinte, Eugen Lupu

    Abstract: This paper presents a study of audio-video streaming using the additional possibilities of a DVB-S card. The board used for experiments (Technisat SkyStar 2) is one of the most frequently used cards for this purpose. Using the main blocks of the board's software support it is possible the implement a really useful and full functional system for audio-video streaming. The streaming is possible to b… ▽ More

    Submitted 4 May, 2011; originally announced May 2011.

    Comments: 4 pages, 5 figures

    Journal ref: Scientific Bulletin of the "Politehnica" University Timişoara, Transaction on Electronics and Telecomunications, Tom 51(65), Fascicola 1-2, pag. 181-184, 2006