Skip to main content

Showing 1–5 of 5 results for author: Shintre, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.13907  [pdf, other

    cs.CR

    Blockchain based solution design for Energy Exchange Platform

    Authors: Atharv Bhadange, Rohan Doshi, Tanmay Karmarkar, Snehal Shintre

    Abstract: It is observed that users have higher requirements for fairness, transparency, and privacy of transactions of energy exchanges that occur across platforms like Indian Energy Exchange (IEX) and Power Exchange India Limited (PXIL). As a decentralized distributed accounting system, blockchain is characterized by traceability, security, credibility, and non-tampering of transactions, which can meet th… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

  2. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

    Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre

    Abstract: Motivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality o… ▽ More

    Submitted 25 October, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: Code for transformations at https://github.com/pwwl/enhanced-binary-diversification. Presentation at https://dl.acm.org/doi/10.1145/3433210.3453086. An author of a related work [32] contacted us regarding our characterization of their defense (Sec 2.2). They point out that our attack is not within the stated scope of their defense, but agree their defense would be ineffective against our attack

  3. arXiv:1911.08090  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Deep Detector Health Management under Adversarial Campaigns

    Authors: Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner

    Abstract: Machine learning models are vulnerable to adversarial inputs that induce seemingly unjustifiable errors. As automated classifiers are increasingly used in industrial control systems and machinery, these adversarial errors could grow to be a serious problem. Despite numerous studies over the past few years, the field of adversarial ML is still considered alchemy, with no practical unbroken defenses… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: International Journal of Prognostics and Health Management, Special Issue: PHM Applications of Deep Learning and Emerging Analytics, 2019

  4. arXiv:1806.10707  [pdf, other

    cs.CV cs.CR cs.LG

    Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning

    Authors: Jasjeet Dhaliwal, Saurabh Shintre

    Abstract: Deep neural networks are susceptible to small-but-specific adversarial perturbations capable of deceiving the network. This vulnerability can lead to potentially harmful consequences in security-critical applications. To address this vulnerability, we propose a novel metric called \emph{Gradient Similarity} that allows us to capture the influence of training data on test inputs. We show that \emph… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

    Comments: 11 pages, 6 figures

  5. arXiv:1703.00410  [pdf, other

    stat.ML cs.LG

    Detecting Adversarial Samples from Artifacts

    Authors: Reuben Feinman, Ryan R. Curtin, Saurabh Shintre, Andrew B. Gardner

    Abstract: Deep neural networks (DNNs) are powerful nonlinear architectures that are known to be robust to random perturbations of the input. However, these models are vulnerable to adversarial perturbations--small input changes crafted explicitly to fool the model. In this paper, we ask whether a DNN can distinguish adversarial samples from their normal and noisy counterparts. We investigate model confidenc… ▽ More

    Submitted 15 November, 2017; v1 submitted 1 March, 2017; originally announced March 2017.

    Comments: Submitted to ICML 2017