Skip to main content

Showing 1–7 of 7 results for author: Stan, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.02959  [pdf, other

    cs.CR cs.LG

    When approximate design for fast homomorphic computation provides differential privacy guarantees

    Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler

    Abstract: While machine learning has become pervasive in as diversified fields as industry, healthcare, social networks, privacy concerns regarding the training data have gained a critical importance. In settings where several parties wish to collaboratively train a common model without jeopardizing their sensitive data, the need for a private training protocol is particularly stringent and implies to prote… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: 28 pages, 2 figures, 3 tables

  2. arXiv:2206.11519  [pdf

    cs.CR cs.DC

    Homomorphic Sortition -- Secret Leader Election for PoS Blockchains

    Authors: Luciano Freitas, Andrei Tonkikh, Adda-Akram Bendoukha, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Petr Kuznetsov

    Abstract: In a single secret leader election protocol (SSLE), one of the system participants is chosen and, unless it decides to reveal itself, no other participant can identify it. SSLE has a great potential in protecting blockchain consensus protocols against denial of service (DoS) attacks. However, all existing solutions either make strong synchrony assumptions or have expiring registration, meaning tha… ▽ More

    Submitted 30 January, 2023; v1 submitted 23 June, 2022; originally announced June 2022.

  3. arXiv:2205.04330  [pdf, other

    cs.CR cs.LG

    Protecting Data from all Parties: Combining FHE and DP in Federated Learning

    Authors: Arnaud Grivet Sébert, Renaud Sirdey, Oana Stan, Cédric Gouy-Pailler

    Abstract: This paper tackles the problem of ensuring training data privacy in a federated learning context. Relying on Homomorphic Encryption (HE) and Differential Privacy (DP), we propose a framework addressing threats on the privacy of the training data. Notably, the proposed framework ensures the privacy of the training data from all actors of the learning process, namely the data owners and the aggregat… ▽ More

    Submitted 31 May, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

    Comments: 21 pages, 2 figures, 2 tables

    ACM Class: I.2.6; E.3

  4. arXiv:2109.04911  [pdf, other

    cs.DC

    RandSolomon: Optimally Resilient Random Number Generator with Deterministic Termination

    Authors: Luciano Freitas de Souza, Andrei Tonkikh, Sara Tucci-Piergiovanni, Renaud Sirdey, Oana Stan, Nicolas Quero, Petr Kuznetsov

    Abstract: Multi-party random number generation is a key building-block in many practical protocols. While straightforward to solve when all parties are trusted to behave correctly, the problem becomes much more difficult in the presence of faults. In this context, this paper presents RandSolomon, a protocol that allows a network of N processes to produce an unpredictable common random number among the non-f… ▽ More

    Submitted 14 December, 2021; v1 submitted 10 September, 2021; originally announced September 2021.

  5. arXiv:1906.10943  [pdf, other

    cs.CR

    Heuristic Approach Towards Countermeasure Selection using Attack Graphs

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: Selecting the optimal set of countermeasures is a challenging task that involves various considerations and tradeoffs such as prioritizing the risks to mitigate and costs. The vast majority of studies for selecting a countermeasure deployment are based on a limited risk assessment procedure that utilizes the common vulnerability scoring system (CVSS). Such a risk assessment procedure does not nece… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  6. arXiv:1906.09786  [pdf, other

    cs.CR

    Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: An attack graph is a method used to enumerate the possible paths that an attacker can execute in the organization network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the representation of network protocol vulnerabilities, and thus it cannot be used to model common network attacks such as… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  7. arXiv:1707.05032  [pdf, other

    cs.CR

    Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus

    Authors: Orly Stan, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur

    Abstract: MIL-STD-1553 is a military standard that defines the physical and logical layers, and a command/response time division multiplexing of a communication bus used in military and aerospace avionic platforms for more than 40 years. As a legacy platform, MIL-STD-1553 was designed for high level of fault tolerance while less attention was taken with regard to security. Recent studies already addressed t… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.