Skip to main content

Showing 1–50 of 128 results for author: Perez, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.09318  [pdf, other

    cs.CR cs.LG

    Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the lite… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Submitted to IEEE MILCOM 2024

  2. arXiv:2405.02086  [pdf, other

    cs.LG

    Multi-level projection with exponential parallel speedup; Application to sparse auto-encoders neural networks

    Authors: Guillaume Perez, Michel Barlaud

    Abstract: The $\ell_{1,\infty}$ norm is an efficient structured projection but the complexity of the best algorithm is unfortunately $\mathcal{O}\big(n m \log(n m)\big)$ for a matrix in $\mathbb{R}^{n\times m}$. In this paper, we propose a new bi-level projection method for which we show that the time complexity for the $\ell_{1,\infty}$ norm is only $\mathcal{O}\big(n m \big)$ for a matrix in… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  3. arXiv:2403.16291  [pdf, other

    cs.RO cs.AI

    Guessing human intentions to avoid dangerous situations in caregiving robots

    Authors: Noé Zapata, Gerardo Pérez, Lucas Bonilla, Pedro Núñez, Pilar Bachiller, Pablo Bustos

    Abstract: For robots to interact socially, they must interpret human intentions and anticipate their potential outcomes accurately. This is particularly important for social robots designed for human care, which may face potentially dangerous situations for people, such as unseen obstacles in their way, that should be avoided. This paper explores the Artificial Theory of Mind (ATM) approach to inferring and… ▽ More

    Submitted 26 March, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: 8 pages, 6 figures. Submitted to IROS2024. For associated mpeg file see https://youtu.be/87UEB8P97KY

  4. arXiv:2403.02019  [pdf, other

    cs.FL cs.LG

    Active Learning of Mealy Machines with Timers

    Authors: Véronique Bruyère, Bharat Garhewal, Guillermo A. Pérez, Gaëtan Staquet, Frits W. Vaandrager

    Abstract: We present the first algorithm for query learning of a general class of Mealy machines with timers (MMTs) in a black-box context. Our algorithm is an extension of the L# algorithm of Vaandrager et al. to a timed setting. Like the algorithm for learning timed automata proposed by Waga, our algorithm is inspired by ideas of Maler & Pnueli. Based on the elementary languages of, both Waga's and our al… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 77 pages, 19 figures

    MSC Class: 68Q45 ACM Class: F.4.3

  5. arXiv:2402.13785  [pdf, other

    cs.AI

    Synthesis of Hierarchical Controllers Based on Deep Reinforcement Learning Policies

    Authors: Florent Delgrange, Guy Avni, Anna Lukina, Christian Schilling, Ann Nowé, Guillermo A. Pérez

    Abstract: We propose a novel approach to the problem of controller design for environments modeled as Markov decision processes (MDPs). Specifically, we consider a hierarchical MDP a graph with each vertex populated by an MDP called a "room". We first apply deep reinforcement learning (DRL) to obtain low-level policies for each room, scaling to large rooms of unknown structure. We then apply reactive synthe… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 19 pages main text, 17 pages Appendix (excluding references)

  6. arXiv:2402.13237  [pdf, other

    cs.LO cs.FL

    Continuous Pushdown VASS in One Dimension are Easy

    Authors: Guillermo A. Perez, Shrisha Rao

    Abstract: A pushdown vector addition system with states (PVASS) extends the model of vector addition systems with a pushdown stack. The algorithmic analysis of PVASS has applications such as static analysis of recursive programs manipulating integer variables. Unfortunately, reachability analysis, even for one-dimensional PVASS is not known to be decidable. We relax the model of one-dimensional PVASS to mak… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: 2 tables, 6 figures, 12 pages

  7. arXiv:2402.09191  [pdf, other

    cs.CR cs.NI cs.PF eess.SY

    Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots

    Authors: Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Perez

    Abstract: Cybersecurity is develo** rapidly, and new methods of defence against attackers are appearing, such as Cyber Deception (CYDEC). CYDEC consists of deceiving the enemy who performs actions without realising that he/she is being deceived. This article proposes designing, implementing, and evaluating a deception mechanism based on the stealthy redirection of TCP communications to an on-demand honey… ▽ More

    Submitted 20 February, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

  8. arXiv:2402.09121  [pdf, ps, other

    cs.FL

    Inform: From Compartmental Models to Stochastic Bounded Counter Machines

    Authors: Tim Leys, Guillermo A. Perez

    Abstract: Compartmental models are used in epidemiology to capture the evolution of infectious diseases such as COVID-19 in a population by assigning members of it to compartments with labels such as susceptible, infected, and recovered. In a stochastic compartmental model the flow of individuals between compartments is determined probabilistically. We establish that certain stochastic compartment models ca… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  9. arXiv:2401.13320  [pdf, other

    cs.DC cs.IR

    A Big Data Architecture for Early Identification and Categorization of Dark Web Sites

    Authors: Javier Pastor-Galindo, Hông-Ân Sandlin, Félix Gómez Mármol, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The dark web has become notorious for its association with illicit activities and there is a growing need for systems to automate the monitoring of this space. This paper proposes an end-to-end scalable architecture for the early identification of new Tor sites and the daily analysis of their content. The solution is built using an Open Source Big Data stack for data serving with Kubernetes, Kafka… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  10. arXiv:2312.13682  [pdf, other

    cs.AI

    A Constraint Programming Model for Scheduling the Unloading of Trains in Ports: Extended

    Authors: Guillaume Perez, Gael Glorian, Wijnand Suijlen, Arnaud Lallouet

    Abstract: In this paper, we propose a model to schedule the next 24 hours of operations in a bulk cargo port to unload bulk cargo trains onto stockpiles. It is a problem that includes multiple parts such as splitting long trains into shorter ones and the routing of bulk material through a configurable network of conveyors to the stockpiles. Managing such trains (up to three kilometers long) also requires sp… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  11. arXiv:2312.05287  [pdf, other

    cs.CV

    Human in-the-Loop Estimation of Cluster Count in Datasets via Similarity-Driven Nested Importance Sampling

    Authors: Gustavo Perez, Daniel Sheldon, Grant Van Horn, Subhransu Maji

    Abstract: Identifying the number of clusters serves as a preliminary goal for many data analysis tasks. A common approach to this problem is to vary the number of clusters in a clustering algorithm (e.g., 'k' in $k$-means) and pick the value that best explains the data. However, the count estimates can be unreliable especially when the image similarity is poor. Human feedback on the pairwise similarity can… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  12. arXiv:2311.05309  [pdf, other

    cond-mat.soft cond-mat.mtrl-sci cs.CE physics.chem-ph

    Liquid phase fast electron tomography unravels the true 3D structure of colloidal assemblies

    Authors: Daniel Arenas Esteban, Da Wang, A**kya Kadu, Noa Olluyn, Ana Sánchez Iglesias, Alejandro Gomez Perez, Jesus Gonzalez Casablanca, Stavros Nicolopoulos, Luis M. Liz-Marzán, Sara Bals

    Abstract: Electron tomography has become a commonly used tool to investigate the three-dimensional (3D) structure of nanomaterials, including colloidal nanoparticle assemblies. However, electron microscopy is typically carried out under high vacuum conditions. Therefore, pre-treatment sample preparation is needed for assemblies obtained by (wet) colloid chemistry methods, including solvent evaporation and d… ▽ More

    Submitted 23 November, 2023; v1 submitted 9 November, 2023; originally announced November 2023.

    Comments: 32 pages, 12 figures, 2 tables, submitted

  13. arXiv:2311.05270  [pdf, other

    cs.HC

    Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces

    Authors: Eduardo López Bernal, Sergio López Bernal, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct communication between the brain and computers. Specifically, electroencephalography (EEG) is one of the most common techniques for obtaining evoked potentials resulting from external stimuli, as the P300 potential is elicited from known images. The combination of Machine Learning (ML) and P300 potentials is… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  14. arXiv:2310.17410  [pdf, ps, other

    cs.AI cs.LO

    Synthesizing Efficiently Monitorable Formulas in Metric Temporal Logic

    Authors: Ritam Raha, Rajarshi Roy, Nathanael Fijalkow, Daniel Neider, Guillermo A. Perez

    Abstract: In runtime verification, manually formalizing a specification for monitoring system executions is a tedious and error-prone process. To address this issue, we consider the problem of automatically synthesizing formal specifications from system executions. To demonstrate our approach, we consider the popular specification language Metric Temporal Logic (MTL), which is particularly tailored towards… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

  15. arXiv:2310.05350  [pdf

    cs.DC cs.LG

    Scaling Studies for Efficient Parameter Search and Parallelism for Large Language Model Pre-training

    Authors: Michael Benington, Leo Phan, Chris Pierre Paul, Evan Shoemaker, Priyanka Ranade, Torstein Collett, Grant Hodgson Perez, Christopher Krieger

    Abstract: AI accelerator processing capabilities and memory constraints largely dictate the scale in which machine learning workloads (e.g., training and inference) can be executed within a desirable time frame. Training a state of the art, transformer-based model today requires use of GPU-accelerated high performance computers with high-speed interconnects. As datasets and models continue to increase in si… ▽ More

    Submitted 10 October, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Journal ref: Supercomputing 2023 (SC23) Student Research Poster Track

  16. arXiv:2308.13609  [pdf, ps, other

    cs.LO math.NT

    Integer Programming with GCD Constraints

    Authors: Rémy Defossez, Christoph Haase, Alessio Mansutti, Guillermo A. Perez

    Abstract: We study the non-linear extension of integer programming with greatest common divisor constraints of the form $\gcd(f,g) \sim d$, where $f$ and $g$ are linear polynomials, $d$ is a positive integer, and $\sim$ is a relation among $\leq, =, \neq$ and $\geq$. We show that the feasibility problem for these systems is in NP, and that an optimal solution minimizing a linear objective function, if it ex… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

  17. arXiv:2308.07738  [pdf, other

    cs.AI

    Formally-Sharp DAgger for MCTS: Lower-Latency Monte Carlo Tree Search using Data Aggregation with Formal Methods

    Authors: Debraj Chakraborty, Damien Busatto-Gaston, Jean-François Raskin, Guillermo A. Pérez

    Abstract: We study how to efficiently combine formal methods, Monte Carlo Tree Search (MCTS), and deep learning in order to produce high-quality receding horizon policies in large Markov Decision processes (MDPs). In particular, we use model-checking techniques to guide the MCTS algorithm in order to generate offline samples of high-quality decisions on a representative set of states of the MDP. Those sampl… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  18. arXiv:2308.05978  [pdf, other

    cs.CR cs.AI

    CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

    Authors: Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Jan Kreischer, Jan von der Assen, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains… ▽ More

    Submitted 8 September, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

    Comments: 11 pages, 8 figures

  19. arXiv:2307.16821  [pdf, ps, other

    cs.SE

    Towards Formal Verification of a TPM Software Stack

    Authors: Yani Ziani, Nikolai Kosmatov, Frédéric Loulergue, Daniel Gracia Pérez, Téo Bernier

    Abstract: The Trusted Platform Module (TPM) is a cryptoprocessor designed to protect integrity and security of modern computers. Communications with the TPM go through the TPM Software Stack (TSS), a popular implementation of which is the open-source library tpm2-tss. Vulnerabilities in its code could allow attackers to recover sensitive information and take control of the system. This paper describes a cas… ▽ More

    Submitted 27 October, 2023; v1 submitted 31 July, 2023; originally announced July 2023.

    Comments: 28 pages

    MSC Class: 68Q60 ACM Class: D.2.4

  20. arXiv:2307.12648  [pdf, other

    cs.CR cs.SE

    Execution at RISC: Stealth JOP Attacks on RISC-V Applications

    Authors: Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov

    Abstract: RISC-V is a recently developed open instruction set architecture gaining a lot of attention. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks. We provide… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: 16 pages. arXiv admin note: text overlap with arXiv:2211.16212

    MSC Class: 68M25; ACM Class: D.4.6

  21. arXiv:2307.11730  [pdf, other

    cs.CR cs.AI cs.DC cs.LG cs.NI

    Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

    Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent… ▽ More

    Submitted 9 December, 2023; v1 submitted 21 July, 2023; originally announced July 2023.

  22. arXiv:2307.09836  [pdf, other

    cs.LG math.OC

    Near-Linear Time Projection onto the $\ell_{1,\infty}$ Ball; Application to Sparse Autoencoders

    Authors: Guillaume Perez, Laurent Condat, Michel Barlaud

    Abstract: Looking for sparsity is nowadays crucial to speed up the training of large-scale neural networks. Projections onto the $\ell_{1,2}$ and $\ell_{1,\infty}$ are among the most efficient techniques to sparsify and reduce the overall cost of neural networks. In this paper, we introduce a new projection algorithm for the $\ell_{1,\infty}$ norm ball. The worst-case time complexity of this algorithm is… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: 22 pages, 8 figures

  23. arXiv:2306.15559  [pdf, other

    cs.CR cs.AI cs.LG

    RansomAI: AI-powered Ransomware for Stealthy Encryption

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  24. arXiv:2306.09750  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Fedstellar: A Platform for Decentralized Federated Learning

    Authors: Enrique Tomás Martínez Beltrán, Ángel Luis Perales Gómez, Chao Feng, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin… ▽ More

    Submitted 8 April, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

  25. arXiv:2306.08495  [pdf, other

    cs.CR

    Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerab… ▽ More

    Submitted 11 November, 2023; v1 submitted 14 June, 2023; originally announced June 2023.

  26. arXiv:2306.03151  [pdf, other

    cs.CV cs.LG

    DISCount: Counting in Large Image Collections with Detector-Based Importance Sampling

    Authors: Gustavo Perez, Subhransu Maji, Daniel Sheldon

    Abstract: Many modern applications use computer vision to detect and count objects in massive image collections. However, when the detection task is very difficult or in the presence of domain shifts, the counts may be inaccurate even with significant investments in training data and model development. We propose DISCount -- a detector-based importance sampling framework for counting in large image collecti… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  27. arXiv:2305.09634  [pdf, other

    cs.GT

    Bi-Objective Lexicographic Optimization in Markov Decision Processes with Related Objectives

    Authors: Damien Busatto-Gaston, Debraj Chakraborty, Anirban Majumdar, Sayan Mukherjee, Guillermo A. Pérez, Jean-François Raskin

    Abstract: We consider lexicographic bi-objective problems on Markov Decision Processes (MDPs), where we optimize one objective while guaranteeing optimality of another. We propose a two-stage technique for solving such problems when the objectives are related (in a way that we formalize). We instantiate our technique for two natural pairs of objectives: minimizing the (conditional) expected number of steps… ▽ More

    Submitted 15 August, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

  28. Automata with Timers

    Authors: Véronique Bruyère, Guillermo A. Pérez, Gaëtan Staquet, Frits W. Vaandrager

    Abstract: In this work, we study properties of deterministic finite-state automata with timers, a subclass of timed automata proposed by Vaandrager et al. as a candidate for an efficiently learnable timed model. We first study the complexity of the configuration reachability problem for such automata and establish that it is PSPACE-complete. Then, as simultaneous timeouts (we call these, races) can occur in… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 35 pages, 9 figures

    ACM Class: F.4.3

    Journal ref: Formal Modeling and Analysis of Timed Systems (FORMATS) 2023 pp. 33-49

  29. arXiv:2305.05739  [pdf, ps, other

    cs.LO cs.AI

    Graph-Based Reductions for Parametric and Weighted MDPs

    Authors: Kasper Engelen, Guillermo A. Pérez, Shrisha Rao

    Abstract: We study the complexity of reductions for weighted reachability in parametric Markov decision processes. That is, we say a state p is never worse than q if for all valuations of the polynomial indeterminates it is the case that the maximal expected weight that can be reached from p is greater than the same value from q. In terms of computational complexity, we establish that determining whether p… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  30. arXiv:2303.12558  [pdf, other

    cs.LG cs.AI

    Wasserstein Auto-encoded MDPs: Formal Verification of Efficiently Distilled RL Policies with Many-sided Guarantees

    Authors: Florent Delgrange, Ann Nowé, Guillermo A. Pérez

    Abstract: Although deep reinforcement learning (DRL) has many success stories, the large-scale deployment of policies learned through these advanced techniques in safety-critical scenarios is hindered by their lack of formal guarantees. Variational Markov Decision Processes (VAE-MDPs) are discrete latent space models that provide a reliable framework for distilling formally verifiable controllers from any R… ▽ More

    Submitted 21 April, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

    Comments: ICLR 2023, 10 pages main text, 14 pages appendix (excluding references)

  31. arXiv:2303.03839  [pdf, ps, other

    cs.LO

    The Temporal Logic Synthesis Format TLSF v1.2

    Authors: Swen Jacobs, Guillermo A. Perez, Philipp Schlehuber-Caissier

    Abstract: We present an extension of the Temporal Logic Synthesis Format (TLSF). TLSF builds on standard LTL, but additionally supports high-level constructs, such as sets and functions, as well as parameters that allow a specification to define a whole a family of problems. Our extension introduces operators and a new semantics option for LTLf , i.e., LTL on finite executions.

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:1604.02284, arXiv:1601.05228

  32. arXiv:2303.03284  [pdf, other

    cs.LG cs.AI

    The Wasserstein Believer: Learning Belief Updates for Partially Observable Environments through Reliable Latent Space Models

    Authors: Raphael Avalos, Florent Delgrange, Ann Nowé, Guillermo A. Pérez, Diederik M. Roijers

    Abstract: Partially Observable Markov Decision Processes (POMDPs) are used to model environments where the full state cannot be perceived by an agent. As such the agent needs to reason taking into account the past observations and actions. However, simply remembering the full history is generally intractable due to the exponential growth in the history space. Maintaining a probability distribution that mode… ▽ More

    Submitted 26 October, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

  33. arXiv:2302.13784  [pdf, other

    cs.CL cs.LG

    Solution for the EPO CodeFest on Green Plastics: Hierarchical multi-label classification of patents relating to green plastics using deep learning

    Authors: Tingting Qiao, Gonzalo Moro Perez

    Abstract: This work aims at hierarchical multi-label patents classification for patents disclosing technologies related to green plastics. This is an emerging field for which there is currently no classification scheme, and hence, no labeled data is available, making this task particularly challenging. We first propose a classification scheme for this technology and a way to learn a machine learning model t… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

  34. arXiv:2302.09844  [pdf, other

    cs.CR cs.AI

    FederatedTrust: A Solution for Trustworthy Federated Learning

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data pri… ▽ More

    Submitted 6 July, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  35. arXiv:2212.14677  [pdf, other

    cs.CR cs.AI

    Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  36. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learnin… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  37. arXiv:2212.05337  [pdf, ps, other

    cs.LG

    Targeted Adversarial Attacks on Deep Reinforcement Learning Policies via Model Checking

    Authors: Dennis Gross, Thiago D. Simao, Nils Jansen, Guillermo A. Perez

    Abstract: Deep Reinforcement Learning (RL) agents are susceptible to adversarial noise in their observations that can mislead their policies and decrease their performance. However, an adversary may be interested not only in decreasing the reward, but also in modifying specific temporal logic properties of the policy. This paper presents a metric that measures the exact impact of adversarial attacks against… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

    Comments: ICAART 2023 Paper (Technical Report)

  38. arXiv:2212.03169  [pdf, other

    cs.HC

    When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns

    Authors: Sergio López Bernal, Mario Quiles Pérez, Enrique Tomás Martínez Beltrán, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: The metaverse has gained tremendous popularity in recent years, allowing the interconnection of users worldwide. However, current systems in metaverse scenarios, such as virtual reality glasses, offer a partial immersive experience. In this context, Brain-Computer Interfaces (BCIs) can introduce a revolution in the metaverse, although a study of the applicability and implications of BCIs in these… ▽ More

    Submitted 16 November, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

  39. arXiv:2211.16212  [pdf, other

    cs.CR

    Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming

    Authors: Olivier Gilles, Franck Viguier, Nikolai Kosmatov, Daniel Gracia Pérez

    Abstract: RISC-V is an open instruction set architecture recently developed for embedded real-time systems. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks, able t… ▽ More

    Submitted 26 November, 2022; originally announced November 2022.

    Comments: 9 pages

    MSC Class: 68M25

  40. Validating Streaming JSON Documents with Learned VPAs

    Authors: Véronique Bruyère, Guillermo A. Perez, Gaëtan Staquet

    Abstract: We present a new streaming algorithm to validate JSON documents against a set of constraints given as a JSON schema. Among the possible values a JSON document can hold, objects are unordered collections of key-value pairs while arrays are ordered collections of values. We prove that there always exists a visibly pushdown automaton (VPA) that accepts the same set of JSON documents as a JSON schema.… ▽ More

    Submitted 8 March, 2023; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 46 pages, 10 figures, published at TACAS 2023

    ACM Class: F.4.3

    Journal ref: Tools and Algorithms for the Construction and Analysis of Systems (TACAS) 2023, pp. 271-289

  41. arXiv:2211.08413  [pdf, other

    cs.LG cs.CR cs.DC cs.NI

    Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges

    Authors: Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustwo… ▽ More

    Submitted 13 September, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

  42. arXiv:2210.11517  [pdf, other

    cs.CR

    A Security and Trust Framework for Decentralized 5G Marketplaces

    Authors: José María Jorquera Valero, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: 5G networks intend to cover user demands through multi-party collaborations in a secure and trustworthy manner. To this end, marketplaces play a pivotal role as enablers for network service consumers and infrastructure providers to offer, negotiate, and purchase 5G resources and services. Nevertheless, marketplaces often do not ensure trustworthy networking by analyzing the security and trust of t… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Journal ref: Proceedings of the VII Jornadas Nacionales de Investigación en Ciberseguridad, pp. 237-240, Bilbao, Spain (2022)

  43. arXiv:2210.11501  [pdf, other

    cs.CR cs.NI

    Trust-as-a-Service: A reputation-enabled trust framework for 5G networks

    Authors: José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez

    Abstract: Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  44. arXiv:2210.11061  [pdf, other

    cs.LG

    Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Enrique Tomás Martínez Beltrán, Daniel Demeter, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. How… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  45. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challengi… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  46. arXiv:2210.00785  [pdf, ps, other

    cs.LO

    The Geometry of Reachability in Continuous Vector Addition Systems with States

    Authors: Shaull Almagor, Arka Ghosh, Tim Leys, Guillermo A. Perez

    Abstract: We study the geometry of reachability sets of continuous vector addition systems with states (VASS). In particular we establish that they are almost Minkowski sums of convex cones and zonotopes generated by the vectors labelling the transitions of the VASS. We use the latter to prove that short so-called linear path schemes suffice as witnesses of reachability in continuous VASS of fixed dimension… ▽ More

    Submitted 14 November, 2022; v1 submitted 3 October, 2022; originally announced October 2022.

  47. arXiv:2209.07133  [pdf, other

    cs.LG cs.LO

    COOL-MC: A Comprehensive Tool for Reinforcement Learning and Model Checking

    Authors: Dennis Gross, Nils Jansen, Sebastian Junges, Guillermo A. Perez

    Abstract: This paper presents COOL-MC, a tool that integrates state-of-the-art reinforcement learning (RL) and model checking. Specifically, the tool builds upon the OpenAI gym and the probabilistic model checker Storm. COOL-MC provides the following features: (1) a simulator to train RL policies in the OpenAI gym for Markov decision processes (MDPs) that are defined as input for Storm, (2) a new model buil… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

  48. arXiv:2209.04048  [pdf, other

    eess.SP cs.LG

    Studying Drowsiness Detection Performance while Driving through Scalable Machine Learning Models using Electroencephalography

    Authors: José Manuel Hidalgo Rogel, Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Sergio López Bernal, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: - Background / Introduction: Driver drowsiness is a significant concern and one of the leading causes of traffic accidents. Advances in cognitive neuroscience and computer science have enabled the detection of drivers' drowsiness using Brain-Computer Interfaces (BCIs) and Machine Learning (ML). However, the literature lacks a comprehensive evaluation of drowsiness detection performance using a het… ▽ More

    Submitted 30 October, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

  49. arXiv:2206.00251  [pdf, other

    cs.LO

    The Reactive Synthesis Competition (SYNTCOMP): 2018-2021

    Authors: Swen Jacobs, Guillermo A. Perez, Remco Abraham, Veronique Bruyere, Michael Cadilhac, Maximilien Colange, Charly Delfosse, Tom van Dijk, Alexandre Duret-Lutz, Peter Faymonville, Bernd Finkbeiner, Ayrat Khalimov, Felix Klein, Michael Luttenberger, Klara Meyer, Thibaud Michaud, Adrien Pommellet, Florian Renkin, Philipp Schlehuber-Caissier, Mouhammad Sakr, Salomon Sickert, Gaetan Staquet, Clement Tamines, Leander Tentrup, Adam Walker

    Abstract: We report on the last four editions of the reactive synthesis competition (SYNTCOMP 2018-2021). We briefly describe the evaluation scheme and the experimental setup of SYNTCOMP. Then, we introduce new benchmark classes that have been added to the SYNTCOMP library and give an overview of the participants of SYNTCOMP. Finally, we present and analyze the results of our experimental evaluations, inclu… ▽ More

    Submitted 6 May, 2024; v1 submitted 1 June, 2022; originally announced June 2022.

    Comments: accepted for publication in STTT

  50. LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers

    Authors: Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore… ▽ More

    Submitted 24 October, 2022; v1 submitted 18 April, 2022; originally announced April 2022.