Skip to main content

Showing 1–4 of 4 results for author: Abera, T

.
  1. SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning (Full Version)

    Authors: Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi

    Abstract: Split Learning (SL) is a distributed deep learning approach enabling multiple clients and a server to collaboratively train and infer on a shared deep neural network (DNN) without requiring clients to share their private local data. The DNN is partitioned in SL, with most layers residing on the server and a few initial layers and inputs on the client side. This configuration allows resource-constr… ▽ More

    Submitted 24 February, 2025; v1 submitted 11 January, 2025; originally announced January 2025.

    Comments: To appear at NDSS 2025; 18 pages, 6 Tables, and 11 figures

  2. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

    Authors: Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi

    Abstract: Autonomous collaborative networks of devices are rapidly emerging in numerous domains, such as self-driving cars, smart factories, critical infrastructure, and Internet of Things in general. Although autonomy and self-organization are highly desired properties, they increase vulnerability to attacks. Hence, autonomous networks need dependable mechanisms to detect malicious devices in order to prev… ▽ More

    Submitted 1 August, 2023; v1 submitted 11 October, 2019; originally announced October 2019.

    Journal ref: RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, October 2021, Pages 220-234

  3. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  4. arXiv:1605.07763  [pdf, other

    cs.CR

    C-FLAT: Control-FLow ATtestation for Embedded Systems Software

    Authors: Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik

    Abstract: Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover). Most existing approaches are static in nature and only check whether benign software is initially loaded on the prover. However, they are vulnerable to… ▽ More

    Submitted 17 August, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Extended version of article to appear in CCS '16 Proceedings of the 23rd ACM Conference on Computer and Communications Security