Skip to main content

Showing 1–42 of 42 results for author: van Dijk, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.07842  [pdf, other

    cs.LG cs.CR

    Quantifying and Mitigating Privacy Risks for Tabular Generative Models

    Authors: Chaoyi Zhu, Jiayi Tang, Hans Brouwer, Juan F. Pérez, Marten van Dijk, Lydia Y. Chen

    Abstract: Synthetic data from generative models emerges as the privacy-preserving data-sharing solution. Such a synthetic data set shall resemble the original data without revealing identifiable private information. The backbone technology of tabular synthesizers is rooted in image generative models, ranging from Generative Adversarial Networks (GANs) to recent diffusion models. Recent prior work sheds ligh… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  2. arXiv:2312.08086  [pdf, other

    cs.CR cs.DC

    Recursive Augmented Fernet (RAF) Token: Alleviating the Pain of Stolen Tokens

    Authors: Reza Rahaeimehr, Marten van Dijk

    Abstract: A robust authentication and authorization mechanism is imperative in modular system development, where modularity and modular thinking are pivotal. Traditional systems often employ identity modules responsible for authentication and token issuance. Tokens, representing user credentials, offer advantages such as reduced reliance on passwords, limited lifespan, and scoped access. Despite these benef… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  3. arXiv:2312.01256  [pdf, other

    cs.CR

    Breaking XOR Arbiter PUFs without Reliability Information

    Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu **

    Abstract: Unreliable XOR Arbiter PUFs were broken by a machine learning attack, which targets the underlying Arbiter PUFs individually. However, reliability information from the PUF was required for this attack. We show that, for the first time, a perfectly reliable XOR Arbiter PUF, where no reliability information is accessible, can be efficiently attacked in the same divide-and-conquer manner. Our key i… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

  4. arXiv:2310.20328  [pdf, other

    cs.CL

    ChiSCor: A Corpus of Freely Told Fantasy Stories by Dutch Children for Computational Linguistics and Cognitive Science

    Authors: Bram M. A. van Dijk, Max J. van Duijn, Suzan Verberne, Marco R. Spruit

    Abstract: In this resource paper we release ChiSCor, a new corpus containing 619 fantasy stories, told freely by 442 Dutch children aged 4-12. ChiSCor was compiled for studying how children render character perspectives, and unravelling language and cognition in development, with computational tools. Unlike existing resources, ChiSCor's stories were produced in natural contexts, in line with recent calls fo… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: 12 pages, 5 figures, forthcoming in Proceedings of the 27th Conference on Computational Natural Language Learning (CoNLL)

  5. arXiv:2310.20320  [pdf, other

    cs.CL cs.AI

    Theory of Mind in Large Language Models: Examining Performance of 11 State-of-the-Art models vs. Children Aged 7-10 on Advanced Tests

    Authors: Max J. van Duijn, Bram M. A. van Dijk, Tom Kouwenhoven, Werner de Valk, Marco R. Spruit, Peter van der Putten

    Abstract: To what degree should we ascribe cognitive capacities to Large Language Models (LLMs), such as the ability to reason about intentions and beliefs known as Theory of Mind (ToM)? Here we add to this emerging debate by (i) testing 11 base- and instruction-tuned LLMs on capabilities relevant to ToM beyond the dominant false-belief paradigm, including non-literal language usage and recursive intentiona… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: 14 pages, 4 figures, Forthcoming in Proceedings of the 27th Conference on Computational Natural Language Learning (CoNLL)

  6. arXiv:2310.19671  [pdf, other

    cs.CL cs.AI

    Large Language Models: The Need for Nuance in Current Debates and a Pragmatic Perspective on Understanding

    Authors: Bram M. A. van Dijk, Tom Kouwenhoven, Marco R. Spruit, Max J. van Duijn

    Abstract: Current Large Language Models (LLMs) are unparalleled in their ability to generate grammatically correct, fluent text. LLMs are appearing rapidly, and debates on LLM capacities have taken off, but reflection is lagging behind. Thus, in this position paper, we first zoom in on the debate and critically assess three points recurring in critiques of LLM capacities: i) that LLMs only parrot statistica… ▽ More

    Submitted 31 October, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: 15 pages, 0 figures, Forthcoming in Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing

  7. arXiv:2307.11939  [pdf, other

    cs.LG

    Batch Clip** and Adaptive Layerwise Clip** for Differential Private Stochastic Gradient Descent

    Authors: Toan N. Nguyen, Phuong Ha Nguyen, Lam M. Nguyen, Marten Van Dijk

    Abstract: Each round in Differential Private Stochastic Gradient Descent (DPSGD) transmits a sum of clipped gradients obfuscated with Gaussian noise to a central server which uses this to update a global model which often represents a deep neural network. Since the clipped gradients are computed separately, which we call Individual Clip** (IC), deep neural networks like resnet-18 cannot use Batch Normaliz… ▽ More

    Submitted 21 July, 2023; originally announced July 2023.

    Comments: 20 pages, 18 Figures

  8. arXiv:2303.04676  [pdf, ps, other

    cs.LG cs.CR

    Considerations on the Theory of Training Models with Differential Privacy

    Authors: Marten van Dijk, Phuong Ha Nguyen

    Abstract: In federated learning collaborative learning takes place by a set of clients who each want to remain in control of how their local training data is used, in particular, how can each client's local training data remain private? Differential privacy is one method to limit privacy leakage. We provide a general overview of its framework and provable properties, adopt the more recent hypothesis based d… ▽ More

    Submitted 16 July, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: 18 pages, a book chapter. arXiv admin note: text overlap with arXiv:2212.05796

  9. arXiv:2303.00064  [pdf

    cs.HC cs.CY

    WEARDA: Recording Wearable Sensor Data for Human Activity Monitoring

    Authors: Richard M. K. van Dijk, Daniela Gawehns, Matthijs van Leeuwen

    Abstract: We present WEARDA, the open source WEARable sensor Data Acquisition software package. WEARDA facilitates the acquisition of human activity data with smartwatches and is primarily aimed at researchers who require transparency, full control, and access to raw sensor data. It provides functionality to simultaneously record raw data from four sensors -- tri-axis accelerometer, tri-axis gyroscope, baro… ▽ More

    Submitted 30 October, 2023; v1 submitted 28 February, 2023; originally announced March 2023.

    Comments: Submitted 20 January 2023; Accepted 6 July 2023; Published 26 October 2023 by the Journal of Open Research Software JORS, 11 pages, 5 figures, 3 tables

    Report number: van Dijk RMK, Gawehns D, van Leeuwen M 2023 WEARDA: Recording Wearable Sensor Data for Human Activity Monitoring. Journal of Open Research Software, 11:13

    Journal ref: van Dijk RMK, Gawehns D, van Leeuwen M 2023 WEARDA: Recording Wearable Sensor Data for Human Activity Monitoring. Journal of Open Research Software, 11:13

  10. arXiv:2212.05796  [pdf, other

    cs.LG cs.CR

    Generalizing DP-SGD with Shuffling and Batch Clip**

    Authors: Marten van Dijk, Phuong Ha Nguyen, Toan N. Nguyen, Lam M. Nguyen

    Abstract: Classical differential private DP-SGD implements individual clip** with random subsampling, which forces a mini-batch SGD approach. We provide a general differential private algorithmic framework that goes beyond DP-SGD and allows any possible first order optimizers (e.g., classical SGD and momentum based SGD approaches) in combination with batch clip**, which clips an aggregate of computed gr… ▽ More

    Submitted 25 July, 2023; v1 submitted 12 December, 2022; originally announced December 2022.

    Comments: Update disclaimers

  11. arXiv:2211.14669  [pdf, other

    cs.LG cs.AI cs.GT

    Game Theoretic Mixed Experts for Combinational Adversarial Machine Learning

    Authors: Ethan Rathbun, Kaleel Mahmood, Sohaib Ahmad, Caiwen Ding, Marten van Dijk

    Abstract: Recent advances in adversarial machine learning have shown that defenses considered to be robust are actually susceptible to adversarial attacks which are specifically customized to target their weaknesses. These defenses include Barrage of Random Transforms (BaRT), Friendly Adversarial Training (FAT), Trash is Treasure (TiT) and ensemble models made up of Vision Transformers (ViTs), Big Transfer… ▽ More

    Submitted 29 April, 2023; v1 submitted 26 November, 2022; originally announced November 2022.

    Comments: 17pages, 10 figures

    ACM Class: I.2; I.4

  12. arXiv:2207.06193  [pdf, other

    eess.IV cs.CV cs.LG

    Domain adaptation strategies for cancer-independent detection of lymph node metastases

    Authors: Péter Bándi, Maschenka Balkenhol, Marcory van Dijk, Bram van Ginneken, Jeroen van der Laak, Geert Litjens

    Abstract: Recently, large, high-quality public datasets have led to the development of convolutional neural networks that can detect lymph node metastases of breast cancer at the level of expert pathologists. Many cancers, regardless of the site of origin, can metastasize to lymph nodes. However, collecting and annotating high-volume, high-quality datasets for every cancer type is challenging. In this paper… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  13. arXiv:2202.03524  [pdf, ps, other

    cs.LG math.OC stat.ML

    Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution

    Authors: Lam M. Nguyen, Trang H. Tran, Marten van Dijk

    Abstract: Deep neural networks (DNNs) have shown great success in many machine learning tasks. Their training is challenging since the loss surface of the network architecture is generally non-convex, or even non-smooth. How and under what assumptions is guaranteed convergence to a \textit{global} minimum possible? We propose a reformulation of the minimization problem allowing for a new recursive algorithm… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  14. arXiv:2201.01834  [pdf, other

    cs.CR cs.AR

    Secure Remote Attestation with Strong Key Insulation Guarantees

    Authors: Deniz Gurevin, Chenglu **, Phuong Ha Nguyen, Omer Khan, Marten van Dijk

    Abstract: Recent years have witnessed a trend of secure processor design in both academia and industry. Secure processors with hardware-enforced isolation can be a solid foundation of cloud computation in the future. However, due to recent side-channel attacks, the commercial secure processors failed to deliver the promises of a secure isolated execution environment. Sensitive information inside the secure… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

  15. arXiv:2109.15031  [pdf, other

    cs.CR cs.LG

    Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

    Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk

    Abstract: The field of adversarial machine learning has experienced a near exponential growth in the amount of papers being produced since 2018. This massive information output has yet to be properly processed and categorized. In this paper, we seek to help alleviate this problem by systematizing the recent advances in adversarial machine learning black-box attacks since 2019. Our survey summarizes and cate… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  16. arXiv:2104.02610  [pdf, other

    cs.CV cs.LG

    On the Robustness of Vision Transformers to Adversarial Examples

    Authors: Kaleel Mahmood, Rigel Mahmood, Marten van Dijk

    Abstract: Recent advances in attention-based networks have shown that Vision Transformers can achieve state-of-the-art or near state-of-the-art results on many image classification tasks. This puts transformers in the unique position of being a promising alternative to traditional convolutional neural networks (CNNs). While CNNs have been carefully studied with respect to adversarial attacks, the same canno… ▽ More

    Submitted 4 June, 2021; v1 submitted 30 March, 2021; originally announced April 2021.

  17. arXiv:2102.09030  [pdf, other

    cs.LG math.OC stat.ML

    Proactive DP: A Multple Target Optimization Framework for DP-SGD

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Phuong Ha Nguyen

    Abstract: We introduce a multiple target optimization framework for DP-SGD referred to as pro-active DP. In contrast to traditional DP accountants, which are used to track the expenditure of privacy budgets, the pro-active DP scheme allows one to a-priori select parameters of DP-SGD based on a fixed privacy budget (in terms of $ε$ and $δ$) in such a way to optimize the anticipated utility (test accuracy) th… ▽ More

    Submitted 4 June, 2024; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: text overlap with arXiv:2007.09208, changes in contents and title

  18. arXiv:2010.14763  [pdf, other

    cs.LG math.OC stat.ML

    Hogwild! over Distributed Local Data Sets with Linearly Increasing Mini-Batch Sizes

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen

    Abstract: Hogwild! implements asynchronous Stochastic Gradient Descent (SGD) where multiple threads in parallel access a common repository containing training data, perform SGD iterations and update shared state that represents a jointly learned (global) model. We consider big data analysis where training data is distributed among local data sets in a heterogeneous way -- and we wish to move SGD computation… ▽ More

    Submitted 26 February, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2007.09208 AISTATS 2021

  19. arXiv:2007.09208  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise

    Authors: Marten van Dijk, Nhuong V. Nguyen, Toan N. Nguyen, Lam M. Nguyen, Quoc Tran-Dinh, Phuong Ha Nguyen

    Abstract: The feasibility of federated learning is highly constrained by the server-clients infrastructure in terms of network communication. Most newly launched smartphones and IoT devices are equipped with GPUs or sufficient computing hardware to run powerful AI models. However, in case of the original synchronous federated learning, client devices suffer waiting times and regular communication between cl… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  20. arXiv:2006.10876  [pdf, other

    cs.LG stat.ML

    Beware the Black-Box: on the Robustness of Recent Defenses to Adversarial Examples

    Authors: Kaleel Mahmood, Deniz Gurevin, Marten van Dijk, Phuong Ha Nguyen

    Abstract: Many defenses have recently been proposed at venues like NIPS, ICML, ICLR and CVPR. These defenses are mainly focused on mitigating white-box attacks. They do not properly examine black-box attacks. In this paper, we expand upon the analysis of these defenses to include adaptive black-box adversaries. Our evaluation is done on nine defenses including Barrage of Random Transforms, ComDefend, Ensemb… ▽ More

    Submitted 20 May, 2021; v1 submitted 18 June, 2020; originally announced June 2020.

  21. arXiv:2003.00430  [pdf, other

    cs.LG math.OC

    A Hybrid Stochastic Policy Gradient Algorithm for Reinforcement Learning

    Authors: Nhan H. Pham, Lam M. Nguyen, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk, Quoc Tran-Dinh

    Abstract: We propose a novel hybrid stochastic policy gradient estimator by combining an unbiased policy gradient estimator, the REINFORCE estimator, with another biased one, an adapted SARAH estimator for policy optimization. The hybrid policy gradient estimator is shown to be biased, but has variance reduced property. Using this estimator, we develop a new Proximal Hybrid Stochastic Policy Gradient Algori… ▽ More

    Submitted 21 September, 2020; v1 submitted 1 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS 2020)

    Journal ref: Proceedings of the International Conference on Artificial Intelligence and Statistics, PMLR 108:374-385, 2020

  22. arXiv:2002.08246  [pdf, other

    math.OC cs.LG stat.ML

    A Unified Convergence Analysis for Shuffling-Type Gradient Methods

    Authors: Lam M. Nguyen, Quoc Tran-Dinh, Dzung T. Phan, Phuong Ha Nguyen, Marten van Dijk

    Abstract: In this paper, we propose a unified convergence analysis for a class of generic shuffling-type gradient methods for solving finite-sum optimization problems. Our analysis works with any sampling without replacement strategy and covers many known variants such as randomized reshuffling, deterministic or randomized single permutation, and cyclic and incremental gradient schemes. We focus on two diff… ▽ More

    Submitted 19 September, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: Journal of Machine Learning Research, 2021

  23. arXiv:2002.07161  [pdf, other

    physics.med-ph cs.LG stat.ML

    Surrogate-free machine learning-based organ dose reconstruction for pediatric abdominal radiotherapy

    Authors: M. Virgolin, Z. Wang, B. V. Balgobind, I. W. E. M. van Dijk, J. Wiersma, P. S. Kroon, G. O. Janssens, M. van Herk, D. C. Hodgson, L. Zadravec Zaletel, C. R. N. Rasch, A. Bel, P. A. N. Bosman, T. Alderliesten

    Abstract: To study radiotherapy-related adverse effects, detailed dose information (3D distribution) is needed for accurate dose-effect modeling. For childhood cancer survivors who underwent radiotherapy in the pre-CT era, only 2D radiographs were acquired, thus 3D dose distributions must be reconstructed from limited information. State-of-the-art methods achieve this by using 3D surrogate anatomies. These… ▽ More

    Submitted 10 February, 2021; v1 submitted 16 February, 2020; originally announced February 2020.

    Comments: M. Virgolin and Z. Wang share first authorship

    Journal ref: Physics in Medicine & Biology. 2020 Dec 8;65(24):245021

  24. arXiv:1910.02785  [pdf, other

    cs.LG cs.CR eess.IV stat.ML

    BUZz: BUffer Zones for defending adversarial examples in image classification

    Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk

    Abstract: We propose a novel defense against all existing gradient based adversarial attacks on deep neural networks for image classification problems. Our defense is based on a combination of deep neural networks and simple image transformations. While straightforward in implementation, this defense yields a unique security property which we term buffer zones. We argue that our defense based on buffer zone… ▽ More

    Submitted 16 June, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

  25. arXiv:1905.00154  [pdf, ps, other

    cs.CR cs.NI

    On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware

    Authors: Saeed Valizadeh, Marten van Dijk

    Abstract: In this paper, we investigate the importance of a defense system's learning rates to fight against the self-propagating class of malware such as worms and bots. To this end, we introduce a new propagation model based on the interactions between an adversary (and its agents) who wishes to construct a zombie army of a specific size, and a defender taking advantage of standard security tools and tech… ▽ More

    Submitted 30 April, 2019; originally announced May 2019.

    Comments: This work was funded by NSF grant CNS-1413996 "MACS: A Modular Approach to Cloud Security."

  26. arXiv:1901.07648  [pdf, other

    math.OC cs.LG stat.ML

    Finite-Sum Smooth Optimization with SARAH

    Authors: Lam M. Nguyen, Marten van Dijk, Dzung T. Phan, Phuong Ha Nguyen, Tsui-Wei Weng, Jayant R. Kalagnanam

    Abstract: The total complexity (measured as the total number of gradient computations) of a stochastic first-order optimization algorithm that finds a first-order stationary point of a finite-sum smooth nonconvex objective function $F(w)=\frac{1}{n} \sum_{i=1}^n f_i(w)$ has been proven to be at least $Ω(\sqrt{n}/ε)$ for $n \leq \mathcal{O}(ε^{-2})$ where $ε$ denotes the attained accuracy… ▽ More

    Submitted 22 April, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

  27. arXiv:1901.07634   

    cs.LG math.OC stat.ML

    DTN: A Learning Rate Scheme with Convergence Rate of $\mathcal{O}(1/t)$ for SGD

    Authors: Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan, Jayant R. Kalagnanam, Marten van Dijk

    Abstract: This paper has some inconsistent results, i.e., we made some failed claims because we did some mistakes for using the test criterion for a series. Precisely, our claims on the convergence rate of $\mathcal{O}(1/t)$ of SGD presented in Theorem 1, Corollary 1, Theorem 2 and Corollary 2 are wrongly derived because they are based on Lemma 5. In Lemma 5, we do not correctly use the test criterion for a… ▽ More

    Submitted 27 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: This paper has inconsistent results, i.e., we made some failed claims because we did some mistakes for using the test criterion for a series

  28. arXiv:1901.01598  [pdf, other

    cs.CR cs.GT

    Toward a Theory of Cyber Attacks

    Authors: Saeed Valizadeh, Marten van Dijk

    Abstract: We provide a general methodology for analyzing defender-attacker based "games" in which we model such games as Markov models and introduce a capacity region to analyze how defensive and adversarial strategies impact security. Such a framework allows us to analyze under what kind of conditions we can prove statements (about an attack objective $k$) of the form "if the attacker has a time budget… ▽ More

    Submitted 6 January, 2019; originally announced January 2019.

    Comments: This work was funded by NSF grant CNS-1413996 "MACS: A Modular Approach to Cloud Security"

  29. arXiv:1811.12403  [pdf, other

    math.OC cs.LG

    New Convergence Aspects of Stochastic Gradient Algorithms

    Authors: Lam M. Nguyen, Phuong Ha Nguyen, Peter Richtárik, Katya Scheinberg, Martin Takáč, Marten van Dijk

    Abstract: The classical convergence analysis of SGD is carried out under the assumption that the norm of the stochastic gradient is uniformly bounded. While this might hold for some loss functions, it is violated for cases where the objective function is strongly convex. In Bottou et al. (2018), a new analysis of convergence of SGD is performed under the assumption that stochastic gradients are bounded with… ▽ More

    Submitted 7 November, 2019; v1 submitted 9 November, 2018; originally announced November 2018.

    Comments: Journal of Machine Learning Research. arXiv admin note: substantial text overlap with arXiv:1802.03801

  30. arXiv:1810.04723  [pdf, other

    math.OC cs.LG

    Tight Dimension Independent Lower Bound on the Expected Convergence Rate for Diminishing Step Sizes in SGD

    Authors: Phuong Ha Nguyen, Lam M. Nguyen, Marten van Dijk

    Abstract: We study the convergence of Stochastic Gradient Descent (SGD) for strongly convex objective functions. We prove for all $t$ a lower bound on the expected convergence rate after the $t$-th SGD iteration; the lower bound is over all possible sequences of diminishing step sizes. It implies that recently proposed sequences of step sizes at ICML 2018 and ICML 2019 are {\em universally} close to optimal… ▽ More

    Submitted 7 November, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

    Comments: The 33th Annual Conference on Neural Information Processing Systems (NeurIPS 2019)

  31. arXiv:1810.04100  [pdf, other

    math.OC cs.LG

    Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD

    Authors: Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan

    Abstract: We study Stochastic Gradient Descent (SGD) with diminishing step sizes for convex objective functions. We introduce a definitional framework and theory that defines and characterizes a core property, called curvature, of convex objective functions. In terms of curvature we can derive a new inequality that can be used to compute an optimal sequence of diminishing step sizes by solving a differentia… ▽ More

    Submitted 13 May, 2019; v1 submitted 9 October, 2018; originally announced October 2018.

    Journal ref: Proceedings of the 36th International Conference on Machine Learning, PMLR 97, 2019

  32. arXiv:1807.11046  [pdf, other

    cs.CR

    TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

    Authors: Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, Damith C. Ranasinghe

    Abstract: A physical unclonable function (PUF) generates hardware intrinsic volatile secrets by exploiting uncontrollable manufacturing randomness. Although PUFs provide the potential for lightweight and secure authentication for increasing numbers of low-end Internet of Things devices, practical and secure mechanisms remain elusive. We aim to explore simulatable PUFs (SimPUFs) that are physically unclonabl… ▽ More

    Submitted 3 May, 2020; v1 submitted 29 July, 2018; originally announced July 2018.

    Comments: 23 pages, 16 figures

    Journal ref: IEEE Transactions on Dependable and Secure Computing, 2020

  33. arXiv:1804.04783  [pdf, ps, other

    cs.CR

    Comments on "Defeating HaTCh: Building Malicious IP Cores"

    Authors: Syed Kamran Haider, Chenglu **, Marten van Dijk

    Abstract: Recently, Haider et al. introduced the first rigorous hardware Trojan detection algorithm called HaTCh. The foundation of HaTCh is a formal framework of hardware Trojan design, which formally characterizes all the hardware Trojans based on its properties. However, Bhardwaj et al. recently published one paper "Defeating HaTCh: Building Malicious IP Cores", which incorrectly claims that their newly… ▽ More

    Submitted 4 October, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

  34. arXiv:1802.03801  [pdf, other

    math.OC cs.LG stat.ML

    SGD and Hogwild! Convergence Without the Bounded Gradients Assumption

    Authors: Lam M. Nguyen, Phuong Ha Nguyen, Marten van Dijk, Peter Richtárik, Katya Scheinberg, Martin Takáč

    Abstract: Stochastic gradient descent (SGD) is the optimization algorithm of choice in many machine learning applications such as regularized empirical risk minimization and training deep neural networks. The classical convergence analysis of SGD is carried out under the assumption that the norm of the stochastic gradient is uniformly bounded. While this might hold for some loss functions, it is always viol… ▽ More

    Submitted 8 June, 2018; v1 submitted 11 February, 2018; originally announced February 2018.

    Journal ref: Proceedings of the 35th International Conference on Machine Learning, PMLR 80:3747-3755, 2018

  35. arXiv:1706.03852  [pdf, other

    cs.CR

    Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations

    Authors: Syed Kamran Haider, Omer Khan, Marten van Dijk

    Abstract: Oblivious RAM (ORAM) is a renowned technique to hide the access patterns of an application to an untrusted memory. According to the standard ORAM definition presented by Goldreich and Ostrovsky, two ORAM access sequences must be computationally indistinguishable if the lengths of these sequences are identically distributed. An artifact of this definition is that it does not apply to modern ORAM im… ▽ More

    Submitted 21 October, 2017; v1 submitted 12 June, 2017; originally announced June 2017.

  36. arXiv:1703.07427  [pdf, other

    cs.CR

    Intrinsically Reliable and Lightweight Physical Obfuscated Keys

    Authors: Raihan Sayeed Khan, Nadim Kanan, Chenglu **, Jake Scoggin, Nafisa Noor, Sadid Muneer, Faruk Dirisaglik, Phuong Ha Nguyen, Helena Silva, Marten van Dijk, Ali Gokirmak

    Abstract: Physical Obfuscated Keys (POKs) allow tamper-resistant storage of random keys based on physical disorder. The output bits of current POK designs need to be first corrected due to measurement noise and next de-correlated since the original output bits may not be i.i.d. (independent and identically distributed) and also public helper information for error correction necessarily correlates the correc… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

  37. arXiv:1702.03965  [pdf, other

    cs.CR

    Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory

    Authors: Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk

    Abstract: Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patt… ▽ More

    Submitted 17 June, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: A 250 word preliminary abstract of this work has been accepted for publication and a poster presentation at Hardware Oriented Security and Trust (HOST) 2017. Added Section 5: Leakage under Caching Effects

  38. arXiv:1611.01571  [pdf, other

    cs.AR cs.CR

    Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors

    Authors: Syed Kamran Haider, Marten van Dijk

    Abstract: Oblivious RAM (ORAM) is a cryptographic primitive which obfuscates the access patterns to a storage thereby preventing privacy leakage. So far in the current literature, only `fully functional' ORAMs are widely studied which can protect, at a cost of considerable performance penalty, against the strong adversaries who can monitor all read and write operations. However, recent research has shown th… ▽ More

    Submitted 10 September, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

  39. arXiv:1605.08413  [pdf, other

    cs.CR

    Advancing the State-of-the-Art in Hardware Trojans Design

    Authors: Syed Kamran Haider, Chenglu **, Marten van Dijk

    Abstract: Electronic Design Automation (EDA) industry heavily reuses third party IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers or by malicious insiders in the design team. State of the art research has shown that existing HT detection techniques, which claim to detect all publicly available HT benchmarks, can still be defeated… ▽ More

    Submitted 12 April, 2017; v1 submitted 26 May, 2016; originally announced May 2016.

    Comments: Updated Definition 10. Invited to 60th IEEE International Midwest Symposium on Circuits and Systems

  40. arXiv:1202.5150  [pdf, other

    cs.CR

    Path ORAM: An Extremely Simple Oblivious RAM Protocol

    Authors: Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas

    Abstract: We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM has a O(log N) bandwidth cost for blocks of size B = Omega(log^2 N) bits. For such block sizes, Path ORAM is asymptotically better than the best kno… ▽ More

    Submitted 13 January, 2014; v1 submitted 23 February, 2012; originally announced February 2012.

  41. arXiv:cs/0605109  [pdf, ps, other

    cs.CR cs.SE

    Knowledge Flow Analysis for Security Protocols

    Authors: Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas

    Abstract: Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles… ▽ More

    Submitted 24 May, 2006; originally announced May 2006.

    Comments: 20 pages

    Report number: MIT-CSAIL-TR-2005-066

  42. arXiv:cs/0605097  [pdf, ps, other

    cs.CR

    A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols

    Authors: Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas

    Abstract: We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assump- tions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and suffici… ▽ More

    Submitted 22 May, 2006; originally announced May 2006.

    Comments: 16 pages