Skip to main content

Showing 1–16 of 16 results for author: Peter, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16866  [pdf, other

    cs.CE

    Hierarchical Rank-One Sequence Convexification for the Relaxation of Variational Problems with Microstructures

    Authors: Maximilian Köhler, Timo Neumeier, Malte. A. Peter, Daniel Peterseim, Daniel Balzani

    Abstract: This paper presents an efficient algorithm for the approximation of the rank-one convex hull in the context of nonlinear solid mechanics. It is based on hierarchical rank-one sequences and simultaneously provides first and second derivative information essential for the calculation of mechanical stresses and the computational minimization of discretized energies. For materials, whose microstructur… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes

    Authors: Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter

    Abstract: While storing documents on the cloud can be attractive, the question remains whether cloud providers can be trusted with storing private documents. Even if trusted, data breaches are ubiquitous. To prevent information leakage one can store documents encrypted. If encrypted under traditional schemes, one loses the ability to perform simple operations over the documents, such as searching through th… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: Published in ACNS 2022

  3. arXiv:2306.15302  [pdf, other

    cs.CR

    A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents

    Authors: Marc Damie, Florian Hahn, Andreas Peter

    Abstract: Cloud data storage solutions offer customers cost-effective and reduced data management. While attractive, data security issues remain to be a core concern. Traditional encryption protects stored documents, but hinders simple functionalities such as keyword search. Therefore, searchable encryption schemes have been proposed to allow for the search on encrypted data. Efficient schemes leak at least… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: Published in USENIX 2021. Full version with extended appendices and removed some typos

  4. arXiv:2211.14318  [pdf, other

    cs.CE math.NA

    Multidimensional rank-one convexification of incremental damage models at finite strains

    Authors: Daniel Balzani, Maximilian Köhler, Timo Neumeier, Malte A. Peter, Daniel Peterseim

    Abstract: This paper presents computationally feasible rank-one relaxation algorithms for the efficient simulation of a time-incremental damage model with nonconvex incremental stress potentials in multiple spatial dimensions. While the standard model suffers from numerical issues due to the lack of convexity, the relaxation by rank-one convexification prevents non-existence of minimizers and mesh dependenc… ▽ More

    Submitted 9 February, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

  5. arXiv:2204.09106  [pdf, other

    cs.CR

    Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

    Authors: Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter

    Abstract: Industrial Control Systems (ICSs) rely on insecure protocols and devices to monitor and operate critical infrastructure. Prior work has demonstrated that powerful attackers with detailed system knowledge can manipulate exchanged sensor data to deteriorate performance of the process, even leading to full shutdowns of plants. Identifying those attacks requires iterating over all possible sensor valu… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted at Applied Cryptography and Network Security (ACNS) 2022

  6. arXiv:2102.09651  [pdf, other

    cs.CR

    Obfuscated Access and Search Patterns in Searchable Encryption

    Authors: Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum

    Abstract: Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its encrypted data to a cloud server while maintaining the ability to search over it and retrieve matched documents. Most existing SSE schemes leak which documents are accessed per query, i.e., the so-called access pattern, and thus are vulnerable to attacks that can recover the database or the queried keywords. Curren… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

    Comments: To be published at Network and Distributed Systems Security (NDSS) Symposium 2021, 21-24 February 2021, San Diego, CA, USA

  7. arXiv:2101.10631  [pdf, other

    cs.CR

    Biometric Verification Secure Against Malicious Adversaries

    Authors: Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter

    Abstract: Biometric verification has been widely deployed in current authentication solutions as it proves the physical presence of individuals. To protect the sensitive biometric data in such systems, several solutions have been developed that provide security against honest-but-curious (semi-honest) attackers. However, in practice attackers typically do not act honestly and multiple studies have shown dra… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: This is a complete reworking and major expansion of our paper arXiv:1705.09936 * Reworking of original semi-honest protocol and its security proof * Major expansions: tailored zero-knowledge proofs; efficient variant of original protocol that we prove secure against malicious adversaries; extensive experimental evaluation using three different datasets; in-depth comparison with related work

  8. arXiv:2004.14322  [pdf, other

    cs.CR cs.LG

    Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

    Authors: Valentine Legoy, Marco Caselli, Christin Seifert, Andreas Peter

    Abstract: Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professionals to access increasingly larger amounts of heterogeneous data. Among those, cyber attacks' Tactics, Techniques and Procedures (TTPs) have proven to be particularly valuable to characterize threat actors' behaviors and, thus, improve defensive countermeasures. Unfortunately, this information is of… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

  9. arXiv:1912.05459  [pdf, other

    cs.LG stat.ML

    Deep Relevance Regularization: Interpretable and Robust Tumor Ty** of Imaging Mass Spectrometry Data

    Authors: Christian Etmann, Maximilian Schmidt, Jens Behrmann, Tobias Boskamp, Lena Hauberg-Lotte, Annette Peter, Rita Casadonte, Jörg Kriegsmann, Peter Maass

    Abstract: Neural networks have recently been established as a viable classification method for imaging mass spectrometry data for tumor ty**. For multi-laboratory scenarios however, certain confounding factors may strongly impede their performance. In this work, we introduce Deep Relevance Regularization, a method of restricting what the neural network can focus on during classification, in order to impro… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

  10. arXiv:1911.05821  [pdf, other

    astro-ph.IM cs.CV

    Variable Star Classification Using Multi-View Metric Learning

    Authors: K. B. Johnston, S. M. Caballero-Nieves, V. Petit, A. M. Peter, R. Haber

    Abstract: Our multi-view metric learning framework enables robust characterization of star categories by directly learning to discriminate in a multi-faceted feature space, thus, eliminating the need to combine feature representations prior to fitting the machine learning model. We also demonstrate how to extend standard multi-view learning, which employs multiple vectorized views, to the matrix-variate cas… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Comments: 16 pages, 11 figures

  11. arXiv:1806.04042  [pdf, other

    cs.CR cs.RO

    Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics

    Authors: Víctor Mayoral Vilches, Laura Alzola Kirschgens, Asier Bilbao Calvo, Alejandro Hernández Cordero, Rodrigo Izquierdo Pisón, David Mayoral Vilches, Aday Muñiz Rosas, Gorka Olalde Mendia, Lander Usategi San Juan, Irati Zamalloa Ugarte, Endika Gil-Uriarte, Erik Tews, Andreas Peter

    Abstract: Robots have gained relevance in society, increasingly performing critical tasks. Nonetheless, robot security is being underestimated. Robotics security is a complex landscape, which often requires a cross-disciplinar perspective to which classical security lags behind. To address this issue, we present the Robot Security Framework (RSF), a methodology to perform systematic security assessments in… ▽ More

    Submitted 12 November, 2021; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: Complementary code available at https://github.com/aliasrobotics/RSF

  12. arXiv:1705.09936  [pdf, other

    cs.CR

    Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain

    Authors: Joep Peeters, Andreas Peter, Raymond N. J. Veldhuis

    Abstract: As applications of biometric verification proliferate, users become more vulnerable to privacy infringement. Biometric data is very privacy sensitive as it may contain information as gender, ethnicity and health conditions which should not be shared with third parties during the verification process. Moreover, biometric data that has fallen into the wrong hands often leads to identity theft. Secur… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.

  13. arXiv:1601.07648  [pdf, other

    cs.CV

    A Grassmannian Graph Approach to Affine Invariant Feature Matching

    Authors: Mark Moyou, John Corring, Adrian Peter, Anand Rangarajan

    Abstract: In this work, we present a novel and practical approach to address one of the longstanding problems in computer vision: 2D and 3D affine invariant feature matching. Our Grassmannian Graph (GrassGraph) framework employs a two stage procedure that is capable of robustly recovering correspondences between two unorganized, affinely related feature (point) sets. The first stage maps the feature sets to… ▽ More

    Submitted 4 February, 2016; v1 submitted 28 January, 2016; originally announced January 2016.

  14. arXiv:1403.7394  [pdf, other

    cs.DC

    Parallel Hierarchical Affinity Propagation with MapReduce

    Authors: Dillon Mark Rose, Jean Michel Rouly, Rana Haber, Nenad Mijatovic, Adrian M. Peter

    Abstract: The accelerated evolution and explosion of the Internet and social media is generating voluminous quantities of data (on zettabyte scales). Paramount amongst the desires to manipulate and extract actionable intelligence from vast big data volumes is the need for scalable, performance-conscious analytics algorithms. To directly address this need, we propose a novel MapReduce implementation of the e… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

  15. arXiv:1403.1937  [pdf, ps, other

    math.NA cs.CV

    A fast eikonal equation solver using the Schrodinger wave equation

    Authors: Karthik S. Gurumoorthy, Adrian M. Peter, Birmingham Hang Guan, Anand Rangarajan

    Abstract: We use a Schrödinger wave equation formalism to solve the eikonal equation. In our framework, a solution to the eikonal equation is obtained in the limit as Planck's constant $\hbar$ (treated as a free parameter) tends to zero of the solution to the corresponding linear Schrödinger equation. The Schrödinger equation corresponding to the eikonal turns out to be a \emph{generalized, screened Poisson… ▽ More

    Submitted 8 February, 2015; v1 submitted 8 March, 2014; originally announced March 2014.

  16. arXiv:1401.2417  [pdf, ps, other

    cs.CR math.GR

    General Impossibility of Group Homomorphic Encryption in the Quantum World

    Authors: Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter

    Abstract: Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation. Unfortunately, recent advances in quantum computation show that many of the existing schemes completely break down once quantum computers reach maturity (mainly du… ▽ More

    Submitted 13 January, 2014; v1 submitted 10 January, 2014; originally announced January 2014.

    Comments: 20 pages, 2 figures, conference