Skip to main content

Showing 1–5 of 5 results for author: Shrimpton, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.13250  [pdf, other

    cs.CR cs.SD eess.AS

    Beyond $L_p$ clip**: Equalization-based Psychoacoustic Attacks against ASRs

    Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, Patrick Traynor

    Abstract: Automatic Speech Recognition (ASR) systems convert speech into text and can be placed into two broad categories: traditional and fully end-to-end. Both types have been shown to be vulnerable to adversarial audio examples that sound benign to the human ear but force the ASR to produce malicious transcriptions. Of these attacks, only the "psychoacoustic" attacks can create examples with relatively i… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: accepted at ACML 2021

  2. arXiv:2110.07009  [pdf, other

    cs.CR cs.LG

    Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments

    Authors: Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton

    Abstract: State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication. In particular, generative models of natural language text. Loosely, these works (invertibly) encode message-carrying bits into a sequence of samples from the model, ultimately yielding a plausible natural language covertext. By focusing on this n… ▽ More

    Submitted 18 June, 2024; v1 submitted 13 October, 2021; originally announced October 2021.

  3. arXiv:1910.05262  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

    Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor

    Abstract: Automatic speech recognition and voice identification systems are being deployed in a wide array of applications, from providing control mechanisms to devices lacking traditional interfaces, to the automatic transcription of conversations and authentication of users. Many of these applications have significant security and privacy considerations. We develop attacks that force mistranscription and… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

  4. A Hybrid Approach to Secure Function Evaluation Using SGX

    Authors: Joseph I. Choi, Dave '**g' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

    Abstract: A protocol for two-party secure function evaluation (2P-SFE) aims to allow the parties to learn the output of function $f$ of their private inputs, while leaking nothing more. In a sense, such a protocol realizes a trusted oracle that computes $f$ and returns the result to both parties. There have been tremendous strides in efficiency over the past ten years, yet 2P-SFE protocols remain impractica… ▽ More

    Submitted 6 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: Full version, with proofs, of conference paper at AsiaCCS 2019; updated to include copyright information

  5. arXiv:1605.04044  [pdf, other

    cs.NI cs.CR

    Network Traffic Obfuscation and Automated Internet Censorship

    Authors: Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton

    Abstract: Internet censors seek ways to identify and block internet access to information they deem objectionable. Increasingly, censors deploy advanced networking tools such as deep-packet inspection (DPI) to identify such connections. In response, activists and academic researchers have developed and deployed network traffic obfuscation mechanisms. These apply specialized cryptographic tools to attempt to… ▽ More

    Submitted 13 November, 2016; v1 submitted 13 May, 2016; originally announced May 2016.

    Comments: 9 pages

    ACM Class: C.2