Skip to main content

Showing 1–7 of 7 results for author: Specter, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.03809  [pdf

    cs.CY cs.AI

    Can large language models democratize access to dual-use biotechnology?

    Authors: Emily H. Soice, Rafael Rocha, Kimberlee Cordova, Michael Specter, Kevin M. Esvelt

    Abstract: Large language models (LLMs) such as those embedded in 'chatbots' are accelerating and democratizing research by providing comprehensible information and expertise from many different fields. However, these models may also confer easy access to dual-use technologies capable of inflicting great harm. To evaluate this risk, the 'Safeguarding the Future' course at MIT tasked non-scientist students wi… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 6 pages, 0 figures

  2. arXiv:2304.02810  [pdf, other

    cs.CR

    Robust, privacy-preserving, transparent, and auditable on-device blocklisting

    Authors: Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher

    Abstract: With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  3. arXiv:2107.04940  [pdf, other

    cs.CR

    You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

    Authors: Jenny Blessing, Michael A. Specter, Daniel J. Weitzner

    Abstract: The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first comprehensive analysis of c… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

  4. arXiv:2012.04770  [pdf, other

    cs.NI cs.CR cs.CY

    SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol

    Authors: John Meklenburg, Michael Specter, Michael Wentz, Hari Balakrishnan, Anantha Chandrakasan, John Cohn, Gary Hatke, Louise Ivers, Ronald Rivest, Gerald Jay Sussman, Daniel Weitzner

    Abstract: Throughout the course of the COVID-19 pandemic, several countries have developed and released contact tracing and exposure notification smartphone applications (apps) to help slow the spread of the disease. To support such apps, Apple and Google have released Exposure Notification Application Programming Interfaces (APIs) to infer device (user) proximity using Bluetooth Low Energy (BLE) beacons. T… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

  5. arXiv:1904.06425  [pdf, other

    cs.CR cs.CY cs.NI

    KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures

    Authors: Michael Specter, Sunoo Park, Matthew Green

    Abstract: Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the stolen messages to third parties -- a property arising from a necessary anti-spam / anti-spoofing protocol called DKIM. This exacerbates the problem of… ▽ More

    Submitted 12 April, 2019; originally announced April 2019.

  6. arXiv:1904.05572  [pdf, other

    cs.CR cs.OS

    The Android Platform Security Model (2023)

    Authors: René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Dianne Hackborn, Bram Bonné, Güliz Seray Tuncay, Roger Piqueras Jover, Michael A. Specter

    Abstract: Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security expe… ▽ More

    Submitted 8 January, 2024; v1 submitted 11 April, 2019; originally announced April 2019.

    Journal ref: ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35

  7. arXiv:1806.00069  [pdf, ps, other

    cs.AI cs.LG stat.ML

    Explaining Explanations: An Overview of Interpretability of Machine Learning

    Authors: Leilani H. Gilpin, David Bau, Ben Z. Yuan, Ayesha Bajwa, Michael Specter, Lalana Kagal

    Abstract: There has recently been a surge of work in explanatory artificial intelligence (XAI). This research area tackles the important problem that complex machines and algorithms often cannot provide insights into their behavior and thought processes. XAI allows users and parts of the internal system to be more transparent, providing explanations of their decisions in some level of detail. These explanat… ▽ More

    Submitted 3 February, 2019; v1 submitted 31 May, 2018; originally announced June 2018.

    Comments: The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018). [Research Track]