Skip to main content

Showing 1–12 of 12 results for author: Pasquini, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03792  [pdf, other

    cs.CR cs.LG

    Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks

    Authors: Dario Pasquini, Martin Strohmeier, Carmela Troncoso

    Abstract: We introduce a new family of prompt injection attacks, termed Neural Exec. Unlike known attacks that rely on handcrafted strings (e.g., "Ignore previous instructions and..."), we show that it is possible to conceptualize the creation of execution triggers as a differentiable search problem and use learning-based methods to autonomously generate them. Our results demonstrate that a motivated adve… ▽ More

    Submitted 2 May, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: v0.2

  2. arXiv:2306.08638  [pdf, other

    cs.CR

    Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning

    Authors: Etienne Salimbeni, Nina Mainusch, Dario Pasquini

    Abstract: In this work, we investigate the effectiveness of deep-learning-based password guessing models for targeted attacks on human-chosen passwords. In recent years, service providers have increased the level of security of users'passwords. This is done by requiring more complex password generation patterns and by using computationally expensive hash functions. For the attackers this means a reduced num… ▽ More

    Submitted 16 June, 2023; v1 submitted 14 June, 2023; originally announced June 2023.

    Comments: Presented at the IEEE Symposium on Security and Privacy workshop for deep learning and security 2023. (DLSP'23)

  3. arXiv:2303.03829  [pdf, other

    cs.LG cs.CR

    Can Decentralized Learning be more robust than Federated Learning?

    Authors: Mathilde Raynal, Dario Pasquini, Carmela Troncoso

    Abstract: Decentralized Learning (DL) is a peer--to--peer learning approach that allows a group of users to jointly train a machine learning model. To ensure correctness, DL should be robust, i.e., Byzantine users must not be able to tamper with the result of the collaboration. In this paper, we introduce two \textit{new} attacks against DL where a Byzantine user can: make the network converge to an arbitra… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  4. arXiv:2301.07628  [pdf, other

    cs.CR cs.LG

    Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

    Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso

    Abstract: We introduce the concept of "universal password model" -- a password model that, once pre-trained, can automatically adapt its guessing strategy based on the target system. To achieve this, the model does not need to access any plaintext passwords from the target credentials. Instead, it exploits users' auxiliary information, such as email addresses, as a proxy signal to predict the underlying pas… ▽ More

    Submitted 13 March, 2024; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: Appearing in the proceedings of the 45th IEEE Symposium on Security and Privacy S&P 2024

  5. arXiv:2301.06499  [pdf, other

    cs.DS

    PROPAGATE: a seed propagation framework to compute Distance-based metrics on Very Large Graphs

    Authors: Giambattista Amati, Antonio Cruciani, Daniele Pasquini, Paola Vocca, Simone Angelini

    Abstract: We propose PROPAGATE, a fast approximation framework to estimate distance-based metrics on very large graphs such as the (effective) diameter, the (effective) radius, or the average distance within a small error. The framework assigns seeds to nodes and propagates them in a BFS-like fashion, computing the neighbors set until we obtain either the whole vertex set (the diameter) or a given percentag… ▽ More

    Submitted 21 August, 2023; v1 submitted 16 January, 2023; originally announced January 2023.

  6. arXiv:2205.08443  [pdf, other

    cs.CR cs.LG

    On the (In)security of Peer-to-Peer Decentralized Machine Learning

    Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso

    Abstract: In this work, we carry out the first, in-depth, privacy analysis of Decentralized Learning -- a collaborative machine learning framework aimed at addressing the main limitations of federated learning. We introduce a suite of novel attacks for both passive and active decentralized adversaries. We demonstrate that, contrary to what is claimed by decentralized learning proposers, decentralized learni… ▽ More

    Submitted 10 November, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: IEEE S&P'23 (Previous title: "On the Privacy of Decentralized Machine Learning") + Fixed error in neighbors-discovery trick

  7. arXiv:2111.07380  [pdf, other

    cs.LG cs.CR

    Eluding Secure Aggregation in Federated Learning via Model Inconsistency

    Authors: Dario Pasquini, Danilo Francati, Giuseppe Ateniese

    Abstract: Secure aggregation is a cryptographic protocol that securely computes the aggregation of its inputs. It is pivotal in kee** model updates private in federated learning. Indeed, the use of secure aggregation prevents the server from learning the value and the source of the individual model updates provided by the users, hampering inference and data attribution attacks. In this work, we show that… ▽ More

    Submitted 6 September, 2022; v1 submitted 14 November, 2021; originally announced November 2021.

    Comments: An abridged version of this paper appears in the proceedings of ACM Conference on Computer and Communications Security 2022 (CCS '22)

  8. arXiv:2012.02670  [pdf, other

    cs.CR cs.LG

    Unleashing the Tiger: Inference Attacks on Split Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption. In the present paper, we expose vulnerabilities of the protocol and demonstrate its inherent insecurity by introducing general attack strategies targeting the reconstruction of clients' private training sets. More prominently, w… ▽ More

    Submitted 4 November, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: ACM Conference on Computer and Communications Security 2021 (CCS21)

  9. arXiv:2010.12269  [pdf, other

    cs.CR cs.LG

    Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

    Authors: Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Password security hinges on an in-depth understanding of the techniques adopted by attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such as dictionary attacks that are inherently difficult to model in password security studies. In order to be representative of the actual threat, dictionary attacks must be thoughtfully configured and tuned. However, this proc… ▽ More

    Submitted 26 February, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: To appear in the proceedings of the 30th USENIX Security Symposium 2021

  10. arXiv:2004.07179  [pdf, other

    cs.CR cs.LG

    Interpretable Probabilistic Password Strength Meters via Deep Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength. Unfortunately, by construction, they are limited to solely produce an opaque security estimation that fails to fully support the user during the password composition. In the present work, we move the first steps towards cracking the intelligibility barrier of this compelling class of… ▽ More

    Submitted 11 May, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: An abridged version of this paper appears in the proceedings of the 25th European Symposium on Research in Computer Security (ESORICS) 2020

  11. arXiv:1910.04232  [pdf, other

    cs.CR

    Improving Password Guessing via Representation Learning

    Authors: Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti

    Abstract: Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. In this paper, we introduce a deep generative model representation learning approach for password guessing. We show that an abstract password represent… ▽ More

    Submitted 26 July, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: This paper appears in the proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland) S&P 2021

  12. arXiv:1903.02926  [pdf, other

    cs.LG stat.ML

    Adversarial Out-domain Examples for Generative Models

    Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi

    Abstract: Deep generative models are rapidly becoming a common tool for researchers and developers. However, as exhaustively shown for the family of discriminative models, the test-time inference of deep neural networks cannot be fully controlled and erroneous behaviors can be induced by an attacker. In the present work, we show how a malicious user can force a pre-trained generator to reproduce arbitrary d… ▽ More

    Submitted 13 May, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

    Comments: accepted in proceedings of the Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurity