Skip to main content

Showing 1–24 of 24 results for author: Nita-Rotaru, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20485  [pdf, other

    cs.CR cs.CL cs.LG

    Phantom: General Trigger Attacks on Retrieval Augmented Language Generation

    Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Retrieval Augmented Generation (RAG) expands the capabilities of modern large language models (LLMs) in chatbot applications, enabling developers to adapt and personalize the LLM output without expensive training or fine-tuning. RAG systems use an external knowledge database to retrieve the most relevant documents for a given query, providing this context to the LLM generator. While RAG achieves i… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2405.02147  [pdf, other

    cs.CR

    Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network

    Authors: Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos

    Abstract: The Lightning Network, a payment channel network with a market cap of over 192M USD, is designed to resolve Bitcoin's scalability issues through fast off-chain transactions. There are multiple Lightning Network client implementations, all of which conform to the same textual specifications known as BOLTs. Several vulnerabilities have been manually discovered, but to-date there have been few works… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: 16 pages, 7 figures, to appear at ACM CCS 2024

  3. arXiv:2405.00138  [pdf, other

    cs.CR

    Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups

    Authors: Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde

    Abstract: The emergence of decentralized finance has transformed asset trading on the blockchain, making traditional financial instruments more accessible while also introducing a series of exploitative economic practices known as Maximal Extractable Value (MEV). Concurrently, decentralized finance has embraced rollup-based Layer-2 solutions to facilitate asset trading at reduced transaction costs compared… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  4. arXiv:2403.05663  [pdf, other

    cs.CR

    A Formal Analysis of SCTP: Attack Synthesis and Patch Verification

    Authors: Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, Michael Tüxen

    Abstract: SCTP is a transport protocol offering features such as multi-homing, multi-streaming, and message-oriented delivery. Its two main implementations were subjected to conformance tests using the PacketDrill tool. Conformance testing is not exhaustive and a recent vulnerability (CVE-2021-3772) showed SCTP is not immune to attacks. Changes addressing the vulnerability were implemented, but the question… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  5. arXiv:2311.08859  [pdf, other

    cs.LO cs.CY cs.DC cs.NI

    Verification of GossipSub in ACL2s

    Authors: Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru

    Abstract: GossipSub is a popular new peer-to-peer network protocol designed to disseminate messages quickly and efficiently by allowing peers to forward the full content of messages only to a dynamically selected subset of their neighboring peers (mesh neighbors) while gossi** about messages they have seen with the rest. Peers decide which of their neighbors to graft or prune from their mesh locally and p… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: In Proceedings ACL2-2023, arXiv:2311.08373

    Journal ref: EPTCS 393, 2023, pp. 113-132

  6. A Case Study in Analytic Protocol Analysis in ACL2

    Authors: Max von Hippel, Panagiotis Manolios, Kenneth L. McMillan, Cristina Nita-Rotaru, Lenore Zuck

    Abstract: When verifying computer systems we sometimes want to study their asymptotic behaviors, i.e., how they behave in the long run. In such cases, we need real analysis, the area of mathematics that deals with limits and the foundations of calculus. In a prior work, we used real analysis in ACL2s to study the asymptotic behavior of the RTO computation, commonly used in congestion control algorithms acro… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: In Proceedings ACL2-2023, arXiv:2311.08373

    Journal ref: EPTCS 393, 2023, pp. 50-66

  7. arXiv:2308.02747  [pdf, other

    cs.LG cs.DC cs.MA

    SureFED: Robust Federated Learning via Uncertainty-Aware Inward and Outward Inspection

    Authors: Nasimeh Heydaribeni, Ruisi Zhang, Tara Javidi, Cristina Nita-Rotaru, Farinaz Koushanfar

    Abstract: In this work, we introduce SureFED, a novel framework for byzantine robust federated learning. Unlike many existing defense methods that rely on statistically robust quantities, making them vulnerable to stealthy and colluding attacks, SureFED establishes trust using the local information of benign clients. SureFED utilizes an uncertainty aware model evaluation and introspection to safeguard again… ▽ More

    Submitted 29 February, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

  8. arXiv:2307.08939  [pdf, other

    cs.CR cs.CV cs.LG

    Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems

    Authors: Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh

    Abstract: Adaptive Cruise Control (ACC) is a widely used driver assistance technology for maintaining the desired speed and safe distance to the leading vehicle. This paper evaluates the security of the deep neural network (DNN) based ACC systems under runtime stealthy perception attacks that strategically inject perturbations into camera data to cause forward collisions. We present a context-aware strategy… ▽ More

    Submitted 23 April, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 19 pages, 23 figures, 11 tables

  9. arXiv:2301.10704  [pdf, other

    cs.MA

    HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements

    Authors: Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li

    Abstract: Emerging multi-robot systems rely on cooperation between humans and robots, with robots following automatically generated motion plans to service application-level tasks. Given the safety requirements associated with operating in proximity to humans and expensive infrastructure, it is important to understand and mitigate the security vulnerabilities of such systems caused by compromised robots who… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: This is the long version of our paper accepted as an extended abstract to AAMAS'23

  10. arXiv:2301.09732  [pdf, other

    cs.LG cs.CR

    Backdoor Attacks in Peer-to-Peer Federated Learning

    Authors: Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets. While federated learning (FL) mitigates to some extent these privacy risks, it relies on a trusted aggregation server for training a shared global model. Recently, new distributed learning architectures based on Peer-to-Peer Federated Learning (P2PFL) offer advanta… ▽ More

    Submitted 25 June, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  11. arXiv:2301.06977  [pdf, other

    cs.RO cs.MA

    Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations

    Authors: Kacper Wardega, Max von Hippel, Roberto Tron, Cristina Nita-Rotaru, Wenchao Li

    Abstract: The Weighted-Mean Subsequence Reduced (W-MSR) algorithm, the state-of-the-art method for Byzantine-resilient design of decentralized multi-robot systems, is based on discarding outliers received over Linear Consensus Protocol (LCP). Although W-MSR provides well-understood theoretical guarantees relating robust network connectivity to the convergence of the underlying consensus, the method comes wi… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  12. arXiv:2212.05197  [pdf, other

    cs.CR

    Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers

    Authors: Ankit Kumar, Max von Hippel, Pete Manolios, Cristina Nita-Rotaru

    Abstract: GossipSub is a new peer-to-peer communication protocol designed to counter attacks from misbehaving peers by controlling what information is sent and to whom, via a score function computed by each peer that captures positive and negative behaviors of its neighbors. The score function depends on several parameters (weights, caps, thresholds) that can be configured by applications using GossipSub. T… ▽ More

    Submitted 17 November, 2023; v1 submitted 9 December, 2022; originally announced December 2022.

    Comments: To appear in IEEE Security and Privacy 2024 (Oakland)

  13. arXiv:2208.12911  [pdf, other

    cs.CR cs.LG cs.NI

    Network-Level Adversaries in Federated Learning

    Authors: Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru

    Abstract: Federated learning is a popular strategy for training models on distributed, sensitive data, while preserving data privacy. Prior work identified a range of security threats on federated learning protocols that poison the data or the model. However, federated learning is a networked system where the communication between clients and server plays a critical role for the learning task performance. W… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: 12 pages. Appearing at IEEE CNS 2022

  14. A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools

    Authors: Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, Radu State

    Abstract: The rise of Ethereum has lead to a flourishing decentralized marketplace that has, unfortunately, fallen victim to frontrunning and Maximal Extractable Value (MEV) activities, where savvy participants game transaction orderings within a block for profit. One popular solution to address such behavior is Flashbots, a private pool with infrastructure and design goals aimed at eliminating the negative… ▽ More

    Submitted 28 September, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: 14 pages, ACM IMC 2022

  15. arXiv:2204.04489  [pdf, other

    cs.NI cs.CR

    ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing

    Authors: Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas

    Abstract: We present ShorTor, a protocol for reducing latency on the Tor network. ShorTor uses multi-hop overlay routing, a technique typically employed by content delivery networks, to influence the route Tor traffic takes across the internet. ShorTor functions as an overlay on top of onion routing-Tor's existing routing protocol and is run by Tor relays, making it independent of the path selection perform… ▽ More

    Submitted 9 April, 2022; originally announced April 2022.

  16. arXiv:2202.09470  [pdf, other

    cs.CR cs.CL cs.FL cs.LG

    Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents

    Authors: Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru

    Abstract: Automated attack discovery techniques, such as attacker synthesis or model-based fuzzing, provide powerful ways to ensure network protocols operate correctly and securely. Such techniques, in general, require a formal representation of the protocol, often in the form of a finite state machine (FSM). Unfortunately, many protocols are only described in English prose, and implementing even a simple n… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: To appear in IEEE Security and Privacy, 2022

  17. arXiv:2110.09207  [pdf, other

    cs.CR

    SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay

    Authors: Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State

    Abstract: Payment systems are a critical component of everyday life in our society. While in many situations payments are still slow, opaque, siloed, expensive or even fail, users expect them to be fast, transparent, cheap, reliable and global. Recent technologies such as distributed ledgers create opportunities for near-real-time, cheaper and more transparent payments. However, in order to achieve a global… ▽ More

    Submitted 3 November, 2021; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: 9 pages, 14 figures, IEEE Conference on Communications and Network Security October 2021

  18. Structural Attacks on Local Routing in Payment Channel Networks

    Authors: Ben Weintraub, Cristina Nita-Rotaru, Stefanie Roos

    Abstract: Payment channel networks (PCN) enable scalable blockchain transactions without fundamentally changing the underlying distributed ledger algorithm. However, routing a payment via multiple channels in a PCN requires locking collateral for potentially long periods of time. Adversaries can abuse this mechanism to conduct denial-of-service attacks. Previous work focused on source routing, which is unli… ▽ More

    Submitted 7 September, 2021; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: IEEE Workshop on Security and Privacy on the Blockchain (S&B)

  19. arXiv:2004.01220  [pdf, ps, other

    cs.CR cs.FL

    Automated Attacker Synthesis for Distributed Protocols

    Authors: Max von Hippel, Cole Vick, Stavros Tripakis, Cristina Nita-Rotaru

    Abstract: Distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay) from internal or external adversaries. In this paper we take a formal approach to the automated synthesis of attackers, i.e. adversarial processes that can cause the protocol to malfunction. Specifically, given a formal threat model capturing the distributed protocol mode… ▽ More

    Submitted 12 April, 2022; v1 submitted 2 April, 2020; originally announced April 2020.

    Comments: 24 pages, 15 figures

  20. arXiv:1908.00592  [pdf, other

    cs.CR

    The House That Knows You: User Authentication Based on IoT Data

    Authors: Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh

    Abstract: Home-based Internet of Things (IoT) devices have gained in popularity and many households have become 'smart' by using devices such as smart sensors, locks, and voice-based assistants. Traditional authentication methods such as passwords, biometrics or multi-factor (using SMS or email) are either not applicable in the smart home setting, or they are inconvenient as they break the natural flow of i… ▽ More

    Submitted 27 December, 2021; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 11 pages, 5 figures

  21. arXiv:1904.07370  [pdf, other

    cs.LG cs.CR stat.ML

    Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction

    Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim

    Abstract: Deep Neural Networks (DNNs) have tremendous potential in advancing the vision for self-driving cars. However, the security of DNN models in this context leads to major safety implications and needs to be better understood. We consider the case study of steering angle prediction from camera images, using the dataset from the 2014 Udacity challenge. We demonstrate for the first time adversarial test… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: Preprint of the work accepted for publication at the IEEE Workshop on the Internet of Safe Things, San Francisco, CA, USA, May 23, 2019

  22. Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols

    Authors: Samuel Jero, Maria Leonor Pacheco, Dan Goldwasser, Cristina Nita-Rotaru

    Abstract: Grammar-based fuzzing is a technique used to find software vulnerabilities by injecting well-formed inputs generated following rules that encode application semantics. Most grammar-based fuzzers for network protocols rely on human experts to manually specify these rules. In this work we study automated learning of protocol rules from textual specifications (i.e. RFCs). We evaluate the automaticall… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

    Journal ref: The Thirty-First AAAI Conference on Innovative Applications of Artificial Intelligence, IAAI 2019

  23. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  24. arXiv:1804.00308  [pdf, other

    cs.CR cs.GT cs.LG

    Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

    Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li

    Abstract: As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms. In this paper, we perform the first systematic study of poisoning attacks and their countermeasures for linear regression models. In poisoning attacks, attackers deliberately influence the training data to manipulate the re… ▽ More

    Submitted 28 September, 2021; v1 submitted 1 April, 2018; originally announced April 2018.

    Comments: Preprint of the work accepted for publication at the 39th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 21-23, 2018; Sept 28 '21 update: add citation to trimmed losses