Skip to main content

Showing 1–17 of 17 results for author: Wenger, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.10328  [pdf, other

    cs.CR

    The cool and the cruel: separating hard parts of LWE secrets

    Authors: Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Li, François Charton, Kristin Lauter

    Abstract: Sparse binary LWE secrets are under consideration for standardization for Homomorphic Encryption and its applications to private computation. Known attacks on sparse binary LWE secrets include the sparse dual attack and the hybrid sparse dual-meet in the middle attack which requires significant memory. In this paper, we provide a new statistical attack with low memory requirement. The attack relie… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  2. arXiv:2402.01082  [pdf, other

    cs.CR cs.LG

    Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

    Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem underlying recently standardized post-quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work proposed new machine learning (ML)-based attacks on LWE problems with small, sparse secrets, but these attacks require millions of LWE samples to train on and take days to recover secrets. We propose three key methods -- bett… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 8 pages (main text)

  3. arXiv:2306.11641  [pdf, ps, other

    cs.CR

    SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

    Authors: Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, Francois Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem used in post-quantum cryptography. Homomorphic Encryption (HE) schemes rely on the hardness of the LWE problem for their security, and two LWE-based cryptosystems were recently standardized by NIST for digital signatures and key exchange (KEM). Thus, it is critical to continue assessing the security of LWE and specific parameter choices. For exampl… ▽ More

    Submitted 27 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 18 pages, accepted to NeurIPS 2023

  4. arXiv:2303.04178  [pdf, ps, other

    cs.CR cs.LG

    SALSA PICANTE: a machine learning attack on LWE with binary secrets

    Authors: Cathy Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, Francois Charton, Kristin Lauter

    Abstract: Learning with Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST is based on module~LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could we… ▽ More

    Submitted 31 October, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: 15 pages, 6 figures, 17 tables; accepted to CCS 2023

  5. arXiv:2302.04222  [pdf, other

    cs.CR

    Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models

    Authors: Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao

    Abstract: Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to displace many in the professional artist community. In particular, models can learn to mimic the artistic style of specific artists after "fine-tuning" on samples of their art. In this paper, we describe the design, implementation and evaluation of Glaze, a tool that enables artists to apply "style cloaks" to… ▽ More

    Submitted 3 August, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: USENIX Security 2023

  6. arXiv:2208.13893  [pdf, ps, other

    cs.CR cs.LG

    Data Isotopes for Data Provenance in DNNs

    Authors: Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov

    Abstract: Today, creators of data-hungry deep neural networks (DNNs) scour the Internet for training fodder, leaving users with little control over or knowledge of when their data is appropriated for model training. To empower users to counteract unwanted data use, we design, implement and evaluate a practical system that enables users to detect if their data was used to train an DNN model. We show how user… ▽ More

    Submitted 27 February, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Comments: 17 pages

  7. arXiv:2207.04785  [pdf, ps, other

    cs.CR cs.LG

    SALSA: Attacking Lattice Cryptography with Transformers

    Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter

    Abstract: Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and combin… ▽ More

    Submitted 21 April, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: Extended version of work published at NeurIPS 2022

  8. arXiv:2206.10673  [pdf, ps, other

    cs.CV cs.CR

    Natural Backdoor Datasets

    Authors: Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

    Abstract: Extensive literature on backdoor poison attacks has studied attacks and defenses for backdoors using "digital trigger patterns." In contrast, "physical backdoors" use physical objects as triggers, have only recently been identified, and are qualitatively different enough to resist all defenses targeting digital trigger backdoors. Research on physical backdoors is limited by access to large dataset… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: 18 pages

  9. Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models

    Authors: Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao

    Abstract: Server breaches are an unfortunate reality on today's Internet. In the context of deep neural network (DNN) models, they are particularly harmful, because a leaked model gives an attacker "white-box" access to generate adversarial examples, a threat model that has no practical robust defenses. For practitioners who have invested years and millions into proprietary DNNs, e.g. medical imaging, this… ▽ More

    Submitted 16 October, 2022; v1 submitted 21 May, 2022; originally announced May 2022.

    Journal ref: 2022 ACM Conference on Computer and Communications Security (CCS)

  10. arXiv:2202.05760  [pdf, ps, other

    cs.CR cs.CV

    Assessing Privacy Risks from Feature Vector Reconstruction Attacks

    Authors: Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao

    Abstract: In deep neural networks for facial recognition, feature vectors are numerical representations that capture the unique features of a given face. While it is known that a version of the original face can be recovered via "feature reconstruction," we lack an understanding of the end-to-end privacy risks produced by these attacks. In this work, we address this shortcoming by develo** metrics that me… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: 7 pages

  11. arXiv:2112.04558  [pdf, ps, other

    cs.CR cs.CV cs.LG

    SoK: Anti-Facial Recognition Technology

    Authors: Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao

    Abstract: The rapid adoption of facial recognition (FR) technology by both government and commercial entities in recent years has raised concerns about civil liberties and privacy. In response, a broad suite of so-called "anti-facial recognition" (AFR) tools has been developed to help users avoid unwanted facial recognition. The set of AFR tools proposed in the last few years is wide-ranging and rapidly evo… ▽ More

    Submitted 15 February, 2023; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: Camera-ready version for Oakland S&P 2023

  12. arXiv:2109.09598  [pdf, ps, other

    cs.CR cs.AI cs.SD eess.AS

    "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

    Authors: Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao

    Abstract: Advances in deep learning have introduced a new wave of voice synthesis tools, capable of producing audio that sounds as if spoken by a target speaker. If successful, such tools in the wrong hands will enable a range of powerful attacks against both humans and software systems (aka machines). This paper documents efforts and findings from a comprehensive experimental study on the impact of deep-le… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 13 pages

  13. arXiv:2006.14580  [pdf, ps, other

    cs.CV cs.CR cs.LG

    Backdoor Attacks Against Deep Learning Systems in the Physical World

    Authors: Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

    Abstract: Backdoor attacks embed hidden malicious behaviors into deep learning models, which only activate and cause misclassifications on model inputs containing a specific trigger. Existing works on backdoor attacks and defenses, however, mostly focus on digital attacks that use digitally generated patterns as triggers. A critical question remains unanswered: can backdoor attacks succeed using physical ob… ▽ More

    Submitted 7 September, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: Accepted to the 2021 Conference on Computer Vision and Pattern Recognition (CVPR 2021); 14 pages

  14. arXiv:2006.14042  [pdf, ps, other

    cs.CR cs.CV cs.LG

    Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks

    Authors: Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao

    Abstract: Deep learning systems are known to be vulnerable to adversarial examples. In particular, query-based black-box attacks do not require knowledge of the deep learning model, but can compute adversarial examples over the network by submitting queries and inspecting returns. Recent work largely improves the efficiency of those attacks, demonstrating their practicality on today's ML-as-a-service platfo… ▽ More

    Submitted 9 June, 2022; v1 submitted 24 June, 2020; originally announced June 2020.

  15. arXiv:2002.08327  [pdf, ps, other

    cs.CR cs.CV cs.LG stat.ML

    Fawkes: Protecting Privacy against Unauthorized Deep Learning Models

    Authors: Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao

    Abstract: Today's proliferation of powerful facial recognition systems poses a real threat to personal privacy. As Clearview.ai demonstrated, anyone can canvas the Internet for data and train highly accurate facial recognition models of individuals without their knowledge. We need tools to protect ourselves from potential misuses of unauthorized facial recognition systems. Unfortunately, no practical or eff… ▽ More

    Submitted 22 June, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Journal ref: USENIX Security Symposium 2020

  16. arXiv:1910.01226  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Piracy Resistant Watermarks for Deep Neural Networks

    Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng

    Abstract: As companies continue to invest heavily in larger, more accurate and more robust deep learning models, they are exploring approaches to monetize their models while protecting their intellectual property. Model licensing is promising, but requires a robust tool for owners to claim ownership of models, i.e. a watermark. Unfortunately, current designs have not been able to address piracy attacks, whe… ▽ More

    Submitted 2 December, 2020; v1 submitted 2 October, 2019; originally announced October 2019.

    Comments: 18 pages

  17. arXiv:1904.08554  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks

    Authors: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao

    Abstract: Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them. In our work, we explore a new "honeypot" approach to protect DNN models. We intentionally inject trapdoors, honeypot weaknesses in the classification manifold that at… ▽ More

    Submitted 28 September, 2020; v1 submitted 17 April, 2019; originally announced April 2019.

    Journal ref: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security