Skip to main content

Showing 1–50 of 57 results for author: McDaniel, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03830  [pdf, other

    cs.CR

    Cloud Storage Integrity at Scale: A Case for Dynamic Hash Trees

    Authors: Quinn Burke, Ryan Sheatsley, Rachel King, Michael Swift, Patrick McDaniel

    Abstract: Merkle hash trees are the state-of-the-art method to protect the integrity of storage systems. However, using a hash tree can severely degrade performance, and prior works optimizing them have yet to yield a concrete understanding of the scalability of certain designs in the context of large-scale cloud storage systems. In this paper, we take a first-principles approach to analyzing hash tree perf… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  2. arXiv:2403.19577  [pdf, other

    cs.CR

    A Public and Reproducible Assessment of the Topics API on Real Data

    Authors: Yohan Beugin, Patrick McDaniel

    Abstract: The Topics API for the web is Google's privacy-enhancing alternative to replace third-party cookies. Results of prior work have led to an ongoing discussion between Google and research communities about the capability of Topics to trade off both utility and privacy. The central point of contention is largely around the realism of the datasets used in these analyses and their reproducibility; resea… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: Accepted at SecWeb 2024: Workshop on Designing Security for the Web

  3. arXiv:2403.09543  [pdf, other

    cs.CV cs.LG

    Explorations in Texture Learning

    Authors: Blaine Hoak, Patrick McDaniel

    Abstract: In this work, we investigate \textit{texture learning}: the identification of textures learned by object classification models, and the extent to which they rely on these textures. We build texture-object associations that uncover new insights about the relationships between texture and object classes in CNNs and find three classes of results: associations that are strong and expected, strong and… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted to ICLR 2024, Tiny Papers Track

  4. arXiv:2402.18649  [pdf, other

    cs.CR cs.AI

    A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems

    Authors: Fangzhou Wu, Ning Zhang, Somesh Jha, Patrick McDaniel, Chaowei Xiao

    Abstract: Large Language Model (LLM) systems are inherently compositional, with individual LLM serving as the core foundation with additional layers of objects such as plugins, sandbox, and so on. Along with the great potential, there are also increasing concerns over the security of such probabilistic intelligent systems. However, existing studies on LLM security often focus on individual LLM, but without… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  5. arXiv:2402.14968  [pdf, other

    cs.CR cs.CL

    Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety Alignment

    Authors: Jiongxiao Wang, Jiazhao Li, Yiquan Li, Xiangyu Qi, Junjie Hu, Yixuan Li, Patrick McDaniel, Muhao Chen, Bo Li, Chaowei Xiao

    Abstract: Despite the general capabilities of Large Language Models (LLM), these models still request fine-tuning or adaptation with customized data when meeting specific business demands. However, this process inevitably introduces new threats, particularly against the Fine-tuning based Jailbreak Attack (FJAttack) under the setting of Language-Model-as-a-Service (LMaaS), where the model's safety has been s… ▽ More

    Submitted 20 June, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

  6. Characterizing the Modification Space of Signature IDS Rules

    Authors: Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick McDaniel

    Abstract: Signature-based Intrusion Detection Systems (SIDSs) are traditionally used to detect malicious activity in networks. A notable example of such a system is Snort, which compares network traffic against a series of rules that match known exploits. Current SIDS rules are designed to minimize the amount of legitimate traffic flagged incorrectly, reducing the burden on network administrators. However,… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Published in: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)

  7. arXiv:2310.11597  [pdf, other

    cs.CR cs.AI

    The Efficacy of Transformer-based Adversarial Attacks in Security Domains

    Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel

    Abstract: Today, the security of many domains rely on the use of Machine Learning to detect threats, identify vulnerabilities, and safeguard systems from attacks. Recently, transformer architectures have improved the state-of-the-art performance on a wide range of tasks such as malware detection and network intrusion detection. But, before abandoning current approaches to transformers, it is crucial to unde… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: Accepted to IEEE Military Communications Conference (MILCOM), AI for Cyber Workshop, 2023

  8. arXiv:2309.06263  [pdf, other

    cs.CR

    Systematic Evaluation of Geolocation Privacy Mechanisms

    Authors: Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick McDaniel

    Abstract: Location data privacy has become a serious concern for users as Location Based Services (LBSs) have become an important part of their life. It is possible for malicious parties having access to geolocation data to learn sensitive information about the user such as religion or political views. Location Privacy Preserving Mechanisms (LPPMs) have been proposed by previous works to ensure the privacy… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: M.S. Thesis (https://etda.libraries.psu.edu/catalog/25677abh5960)

  9. arXiv:2308.00623  [pdf

    cs.CR

    Secure and Trustworthy Computing 2.0 Vision Statement

    Authors: Patrick McDaniel, Farinaz Koushanfar

    Abstract: The Secure and Trustworthy Computing (SaTC) program within the National Science Foundation (NSF) program serves as the primary instrument for creating novel fundamental science in security and privacy in the United States with broad impacts that influence the world. The program funds research in a vast array of research topics that span technology, theory, policy, law, and society. In the Spring o… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  10. arXiv:2307.11993  [pdf, other

    cs.CR cs.CY cs.DC cs.OS eess.SY

    Verifiable Sustainability in Data Centers

    Authors: Syed Rafiul Hussain, Patrick McDaniel, Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Dongyoon Lee, Yu David Liu, Zhenhua Liu, Shuai Mu, Erez Zadok

    Abstract: Data centers have significant energy needs, both embodied and operational, affecting sustainability adversely. The current techniques and tools for collecting, aggregating, and reporting verifiable sustainability data are vulnerable to cyberattacks and misuse, requiring new security and privacy-preserving solutions. This paper outlines security challenges and research directions for addressing the… ▽ More

    Submitted 12 January, 2024; v1 submitted 22 July, 2023; originally announced July 2023.

  11. arXiv:2306.03825  [pdf, other

    cs.CR

    Interest-disclosing Mechanisms for Advertising are Privacy-Exposing (not Preserving)

    Authors: Yohan Beugin, Patrick McDaniel

    Abstract: Today, targeted online advertising relies on unique identifiers assigned to users through third-party cookies--a practice at odds with user privacy. While the web and advertising communities have proposed solutions that we refer to as interest-disclosing mechanisms, including Google's Topics API, an independent analysis of these proposals in realistic scenarios has yet to be performed. In this pap… ▽ More

    Submitted 8 September, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2024

  12. arXiv:2305.18639  [pdf, other

    cs.CR cs.OS

    Securing Cloud File Systems using Shielded Execution

    Authors: Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta, Patrick McDaniel

    Abstract: Cloud file systems offer organizations a scalable and reliable file storage solution. However, cloud file systems have become prime targets for adversaries, and traditional designs are not equipped to protect organizations against the myriad of attacks that may be initiated by a malicious cloud provider, co-tenant, or end-client. Recently proposed designs leveraging cryptographic techniques and tr… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  13. arXiv:2210.14999  [pdf, other

    cs.CR

    EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale

    Authors: Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Patrick McDaniel

    Abstract: Public clouds provide impressive capability through resource sharing. However, recent works have shown that the reuse of IP addresses can allow adversaries to exploit the latent configurations left by previous tenants. In this work, we perform a comprehensive analysis of the effect of cloud IP address allocation on exploitation of latent configuration. We first develop a statistical model of cloud… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

  14. arXiv:2209.04521  [pdf, other

    cs.CR cs.LG

    The Space of Adversarial Strategies

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel

    Abstract: Adversarial examples, inputs designed to induce worst-case behavior in machine learning models, have been extensively studied over the past decade. Yet, our understanding of this phenomenon stems from a rather fragmented pool of knowledge; at present, there are a handful of attacks, each with disparate assumptions in threat models and incomparable definitions of optimality. In this paper, we propo… ▽ More

    Submitted 6 September, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

    Comments: Accepted to the 32nd USENIX Security Symposium

  15. arXiv:2208.09776  [pdf, other

    cs.CR

    Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: Extension of arXiv:2201.09338

  16. arXiv:2205.00566  [pdf, other

    cs.CR cs.AI

    Adversarial Plannning

    Authors: Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin Chan, Trent Jaeger, Patrick McDaniel

    Abstract: Planning algorithms are used in computational systems to direct autonomous behavior. In a canonical application, for example, planning for autonomous vehicles is used to automate the static or continuous planning towards performance, resource management, or functional goals (e.g., arriving at the destination, managing fuel fuel consumption). Existing planning algorithms assume non-adversarial sett… ▽ More

    Submitted 1 May, 2022; originally announced May 2022.

  17. arXiv:2204.05780  [pdf, other

    cs.LG astro-ph.EP astro-ph.SR

    A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting

    Authors: Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke, Patrick McDaniel

    Abstract: Geomagnetic storms, disturbances of Earth's magnetosphere caused by masses of charged particles being emitted from the Sun, are an uncontrollable threat to modern technology. Notably, they have the potential to damage satellites and cause instability in power grids on Earth, among other disasters. They result from high sun activity, which are induced from cool areas on the Sun known as sunspots. F… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Presented at ML-Helio 2022

  18. Measuring and Mitigating the Risk of IP Reuse on Public Clouds

    Authors: Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick McDaniel

    Abstract: Public clouds provide scalable and cost-efficient computing through resource sharing. However, moving from traditional on-premises service management to clouds introduces new challenges; failure to correctly provision, maintain, or decommission elastic services can lead to functional failure and vulnerability to attack. In this paper, we explore a broad class of attacks on clouds which we refer to… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  19. arXiv:2203.06694  [pdf, other

    cs.CR

    Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

    Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy

    Abstract: Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examp… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  20. arXiv:2202.10387  [pdf, other

    cs.LG cs.CR

    Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations

    Authors: Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick McDaniel

    Abstract: One of the principal uses of physical-space sensors in public safety applications is the detection of unsafe conditions (e.g., release of poisonous gases, weapons in airports, tainted food). However, current detection methods in these applications are often costly, slow to use, and can be inaccurate in complex, changing, or new environments. In this paper, we explore how machine learning methods u… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Accepted to IEEE Sensors Journal

  21. HoneyModels: Machine Learning Honeypots

    Authors: Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp, Patrick McDaniel

    Abstract: Machine Learning is becoming a pivotal aspect of many systems today, offering newfound performance on classification and prediction tasks, but this rapid integration also comes with new unforeseen vulnerabilities. To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms. However, a great asymmetry exists as these defensive method… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Published in: MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)

  22. arXiv:2201.09338  [pdf, other

    cs.CR

    Building a Privacy-Preserving Smart Camera System

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022

    Journal ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022

  23. arXiv:2105.08619  [pdf, other

    cs.CR cs.LG cs.LO

    On the Robustness of Domain Constraints

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly. However, it is unclear if adversarial examples represent realistic inputs in the modeled domains. Diverse domains such as networks and phishing have domain constraints-complex relationships between features that an adversary must satisfy for an attack to be realized (in addition to any adversa… ▽ More

    Submitted 7 November, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted to the 28th ACM Conference on Computer and Communications Security. Seoul, South Korea

  24. arXiv:2011.01183  [pdf, other

    cs.CR cs.LG

    Adversarial Examples in Constrained Domains

    Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

    Abstract: Machine learning algorithms have been shown to be vulnerable to adversarial manipulation through systematic modification of inputs (e.g., adversarial examples) in domains such as image recognition. Under the default threat model, the adversary exploits the unconstrained nature of images; each feature (pixel) is fully under control of the adversary. However, it is not clear how these attacks transl… ▽ More

    Submitted 9 September, 2022; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted to IOS Press Journal of Computer Security

  25. arXiv:2009.10021  [pdf, other

    cs.NI

    MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking

    Authors: Stefan Achleitner, Quinn Burke, Patrick McDaniel, Trent Jaeger, Thomas La Porta, Srikanth Krishnamurthy

    Abstract: Ensuring that information flowing through a network is secure from manipulation and eavesdrop** by unauthorized parties is an important task for network administrators. Many cyber attacks rely on a lack of network-level information flow controls to successfully compromise a victim network. Once an adversary exploits an initial entry point, they can eavesdrop and move laterally within the network… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Report number: INSR-500-TR-0500-2019

  26. arXiv:2002.07641  [pdf, other

    cs.SE cs.PF

    IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper)

    Authors: Michael Norris, Berkay Celik, Patrick McDaniel, Gang Tan, Prasanna Venkatesh, Shulin Zhao, Anand Sivasubramaniam

    Abstract: IoT devices are decentralized and deployed in un-stable environments, which causes them to be prone to various kinds of faults, such as device failure and network disruption. Yet, current IoT platforms require programmers to handle faults manually, a complex and error-prone task. In this paper, we present IoTRepair, a fault-handling system for IoT that (1)integrates a fault identification module t… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

  27. arXiv:1911.10461  [pdf, other

    cs.CR cs.LG

    Real-time Analysis of Privacy-(un)aware IoT Applications

    Authors: Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Users trust IoT apps to control and automate their smart devices. These apps necessarily have access to sensitive data to implement their functionality. However, users lack visibility into how their sensitive data is used (or leaked), and they often blindly trust the app developers. In this paper, we present IoTWatcH, a novel dynamic analysis tool that uncovers the privacy risks of IoT apps in rea… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  28. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  29. arXiv:1909.00056  [pdf, ps, other

    cs.CY cs.CR stat.ML

    How Relevant is the Turing Test in the Age of Sophisbots?

    Authors: Dan Boneh, Andrew J. Grotto, Patrick McDaniel, Nicolas Papernot

    Abstract: Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

    Submitted 30 August, 2019; originally announced September 2019.

  30. arXiv:1812.02978  [pdf, other

    cs.SI

    More or Less? Predict the Social Influence of Malicious URLs on Social Media

    Authors: Chun-Ming Lai, Xiaoyun Wang, Jon W. Chapman, Yu-Cheng Lin, Yu-Chang Ho, S. Felix Wu, Patrick McDaniel, Hasan Cam

    Abstract: Users of Online Social Networks (OSNs) interact with each other more than ever. In the context of a public discussion group, people receive, read, and write comments in response to articles and postings. In the absence of access control mechanisms, OSNs are a great environment for attackers to influence others, from spreading phishing URLs, to posting fake news. Moreover, OSN user behavior can be… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: 10 pages, 6 figures

  31. IoTSan: Fortifying the Safety of IoT Systems

    Authors: Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick McDaniel

    Abstract: Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurati… ▽ More

    Submitted 27 October, 2018; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: Proc. of the 14th ACM CoNEXT, 2018

  32. arXiv:1809.06962  [pdf, other

    cs.CR cs.PL

    Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

    Authors: Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick McDaniel

    Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive---new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digita… ▽ More

    Submitted 24 December, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: syntax and grammar error are fixed, and IoT platforms are updated to match with the submission

  33. arXiv:1808.05579  [pdf, other

    cs.CR cs.HC cs.OS

    Regulating Access to System Sensors in Cooperating Programs

    Authors: Giuseppe Petracca, Jens Grossklags, Patrick McDaniel, Trent Jaeger

    Abstract: Modern operating systems such as Android, iOS, Windows Phone, and Chrome OS support a cooperating program abstraction. Instead of placing all functionality into a single program, programs cooperate to complete tasks requested by users. However, untrusted programs may exploit interactions with other programs to obtain unauthorized access to system sensors either directly or through privileged servi… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.

  34. arXiv:1805.08876  [pdf, other

    cs.CR eess.SY

    Soteria: Automated IoT Safety and Security Analysis

    Authors: Z. Berkay Celik, Patrick McDaniel, Gang Tan

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital systems have changed the way we live, play and work. Yet existing IoT platforms cannot evaluate whether an IoT app or environment is safe, secure, and operates correctly. In this paper, we present Soteria, a static analysis system for validating whether an IoT app or IoT… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: Accepted to the USENIX Annual Technical Conference (USENIX ATC), 2018

  35. arXiv:1803.04765  [pdf, other

    cs.LG stat.ML

    Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning

    Authors: Nicolas Papernot, Patrick McDaniel

    Abstract: Deep neural networks (DNNs) enable innovative applications of machine learning like image recognition, machine translation, or malware detection. However, deep learning is often criticized for its lack of robustness in adversarial settings (e.g., vulnerability to adversarial inputs) and general inability to rationalize its predictions. In this work, we exploit the structure of deep learning to ena… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

  36. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  37. Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups

    Authors: Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, S. Felix Wu, Patrick McDaniel, Hasan Cam

    Abstract: Online social network (OSN) discussion groups are exerting significant effects on political dialogue. In the absence of access control mechanisms, any user can contribute to any OSN thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing and malware distribution. These kinds of actions will a… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Comments: 9 pages

  38. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  39. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  40. arXiv:1705.05264  [pdf, other

    cs.LG cs.CR stat.ML

    Extending Defensive Distillation

    Authors: Nicolas Papernot, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples: inputs carefully modified to force misclassification. Designing defenses against such inputs remains largely an open problem. In this work, we revisit defensive distillation---which is one of the mechanisms proposed to mitigate adversarial examples---to address its limitations. We view our results not only as an effective way of addressing so… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

  41. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  42. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)

  43. arXiv:1702.06280  [pdf, other

    cs.CR cs.LG stat.ML

    On the (Statistical) Detection of Adversarial Examples

    Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel

    Abstract: Machine Learning (ML) models are applied in a variety of tasks such as network intrusion detection or Malware classification. Yet, these models are vulnerable to a class of malicious inputs known as adversarial examples. These are slightly perturbed inputs that are classified incorrectly by the ML model. The mitigation of these adversarial inputs remains an open problem. As a step towards understa… ▽ More

    Submitted 17 October, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages, 4 figures, 5 tables. New version: improved writing, incorporating external feedback

  44. arXiv:1611.08648  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Patient-Driven Privacy Control through Generalized Distillation

    Authors: Z. Berkay Celik, David Lopez-Paz, Patrick McDaniel

    Abstract: The introduction of data analytics into medicine has changed the nature of patient treatment. In this, patients are asked to disclose personal information such as genetic markers, lifestyle habits, and clinical history. This data is then used by statistical models to predict personalized treatments. However, due to privacy concerns, patients often desire to withhold sensitive information. This sel… ▽ More

    Submitted 13 October, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: IEEE Symposium on Privacy-Aware Computing (IEEE PAC), 2017

  45. arXiv:1611.03814  [pdf, other

    cs.CR cs.LG

    Towards the Science of Security and Privacy in Machine Learning

    Authors: Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael Wellman

    Abstract: Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics, autonomous systems, and security diagnostics. ML is now pervasive---new systems and models are being deployed in every domain imaginable, leading to rapid and widespread deployment of software based inference and decision making. There is growing recognition that ML exposes new v… ▽ More

    Submitted 11 November, 2016; originally announced November 2016.

  46. arXiv:1610.00768  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

    Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long , et al. (1 additional authors not shown)

    Abstract: CleverHans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training. The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models' performance in the adversarial setting. Benchmarks constructed without a standardized implementation of adversarial exam… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: Technical report for https://github.com/tensorflow/cleverhans

  47. arXiv:1607.05113  [pdf, other

    cs.CR

    On the Effectiveness of Defensive Distillation

    Authors: Nicolas Papernot, Patrick McDaniel

    Abstract: We report experimental results indicating that defensive distillation successfully mitigates adversarial samples crafted using the fast gradient sign method, in addition to those crafted using the Jacobian-based iterative attack on which the defense mechanism was originally evaluated.

    Submitted 18 July, 2016; originally announced July 2016.

    Comments: Technical Report

  48. arXiv:1606.04435  [pdf, other

    cs.CR cs.LG cs.NE

    Adversarial Perturbations Against Deep Neural Networks for Malware Classification

    Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel

    Abstract: Deep neural networks, like many other machine learning models, have recently been shown to lack robustness against adversarially crafted inputs. These inputs are derived from regular inputs by minor yet carefully selected perturbations that deceive machine learning models into desired misclassifications. Existing work in this emerging field was largely specific to the domain of image classificatio… ▽ More

    Submitted 16 June, 2016; v1 submitted 14 June, 2016; originally announced June 2016.

    Comments: version update: correcting typos, incorporating external feedback

  49. arXiv:1605.07277  [pdf, other

    cs.CR cs.LG

    Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

    Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow

    Abstract: Many machine learning models are vulnerable to adversarial examples: inputs that are specially crafted to cause a machine learning model to produce an incorrect output. Adversarial examples that affect one model often affect another model, even if the two models have different architectures or were trained on different training sets, so long as both models were trained to perform the same task. An… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

  50. arXiv:1604.08275  [pdf, other

    cs.CR cs.LG cs.NE

    Crafting Adversarial Input Sequences for Recurrent Neural Networks

    Authors: Nicolas Papernot, Patrick McDaniel, Ananthram Swami, Richard Harang

    Abstract: Machine learning models are frequently used to solve complex security problems, as well as to make decisions in sensitive situations like guiding autonomous vehicles or predicting financial market behaviors. Previous efforts have shown that numerous machine learning models were vulnerable to adversarial manipulations of their inputs taking the form of adversarial samples. Such inputs are crafted b… ▽ More

    Submitted 27 April, 2016; originally announced April 2016.