Skip to main content

Showing 1–50 of 79 results for author: Asokan, N

.
  1. arXiv:2506.08991  [pdf, ps, other

    cs.CV cs.CR

    Do Concept Replacement Techniques Really Erase Unacceptable Concepts?

    Authors: Anudeep Das, Gurjot Singh, Prach Chantasantitam, N. Asokan

    Abstract: Generative models, particularly diffusion-based text-to-image (T2I) models, have demonstrated astounding success. However, aligning them to avoid generating content with unacceptable concepts (e.g., offensive or copyrighted content, or celebrity likenesses) remains a significant challenge. Concept replacement techniques (CRTs) aim to address this challenge, often by trying to "erase" unacceptable… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  2. arXiv:2504.14654  [pdf, other

    cs.CR

    BLACKOUT: Data-Oblivious Computation with Blinded Capabilities

    Authors: Hossam ElAtali, Merve Gülmez, Thomas Nyman, N. Asokan

    Abstract: Lack of memory-safety and exposure to side channels are two prominent, persistent challenges for the secure implementation of software. Memory-safe programming languages promise to significantly reduce the prevalence of memory-safety bugs, but make it more difficult to implement side-channel-resistant code. We aim to address both memory-safety and side-channel resistance by augmenting memory-safe… ▽ More

    Submitted 27 May, 2025; v1 submitted 20 April, 2025; originally announced April 2025.

  3. arXiv:2411.09776  [pdf, ps, other

    cs.CR cs.LG

    Combining Machine Learning Defenses without Conflicts

    Authors: Vasisht Duddu, Rui Zhang, N. Asokan

    Abstract: Machine learning (ML) defenses protect against various risks to security, privacy, and fairness. Real-life models need simultaneous protection against multiple different risks which necessitates combining multiple defenses. But combining defenses with conflicting interactions in an ML model can be ineffective, incurring a significant drop in the effectiveness of one or more defenses being combined… ▽ More

    Submitted 14 November, 2024; originally announced November 2024.

  4. arXiv:2406.17548  [pdf, other

    cs.CR

    Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations

    Authors: Vasisht Duddu, Oskari Järvinen, Lachlan J Gunn, N Asokan

    Abstract: Regulations increasingly call for various assurances from machine learning (ML) model providers about their training data, training process, and model behavior. For better transparency, industry (e.g., Huggingface and Google) has adopted model cards and datasheets to describe various properties of training datasets and models. In the same vein, we introduce the notion of inference cards to describ… ▽ More

    Submitted 5 March, 2025; v1 submitted 25 June, 2024; originally announced June 2024.

    Comments: ACM Conference on Data and Application Security and Privacy (CODASPY), 2025

  5. arXiv:2406.15302  [pdf, other

    cs.CR

    BliMe Linter

    Authors: Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan

    Abstract: Outsourced computation presents a risk to the confidentiality of clients' sensitive data since they have to trust that the service providers will not mishandle this data. Blinded Memory (BliMe) is a set of hardware extensions that addresses this problem by using hardware-based taint tracking to keep track of sensitive client data and enforce a security policy that prevents software from leaking th… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  6. arXiv:2406.12110  [pdf, other

    cs.CR cs.AR

    CacheSquash: Making caches speculation-aware

    Authors: Hossam ElAtali, N. Asokan

    Abstract: Speculation is key to achieving high CPU performance, yet it enables risks like Spectre attacks which remain a significant challenge to mitigate without incurring substantial performance overheads. These attacks typically unfold in three stages: access, transmit, and receive. Typically, they exploit a cache timing side channel during the transmit and receive phases: speculatively accessing sensiti… ▽ More

    Submitted 8 May, 2025; v1 submitted 17 June, 2024; originally announced June 2024.

  7. arXiv:2404.19227  [pdf, other

    cs.CV cs.CR

    Espresso: Robust Concept Filtering in Text-to-Image Models

    Authors: Anudeep Das, Vasisht Duddu, Rui Zhang, N. Asokan

    Abstract: Diffusion based text-to-image models are trained on large datasets scraped from the Internet, potentially containing unacceptable concepts (e.g., copyright-infringing or unsafe). We need concept removal techniques (CRTs) which are i) effective in preventing the generation of images with unacceptable concepts, ii) utility-preserving on acceptable concepts, and, iii) robust against evasion with adve… ▽ More

    Submitted 26 February, 2025; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: ACM Conference on Data and Application Security and Privacy (CODASPY), 2025

  8. arXiv:2402.03373  [pdf, other

    cs.CR

    SeMalloc: Semantics-Informed Memory Allocator

    Authors: Ruizhe Wang, Meng Xu, N. Asokan

    Abstract: Use-after-free (UAF) is a critical and prevalent problem in memory unsafe languages. While many solutions have been proposed, balancing security, run-time cost, and memory overhead (an impossible trinity) is hard. In this paper, we show one way to balance the trinity by passing more semantics about the heap object to the allocator for it to make informed allocation decisions. More specifically,… ▽ More

    Submitted 22 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Accepted to ACM CCS 2024, camera-ready version under preparation

  9. arXiv:2402.01894  [pdf, other

    cs.CR

    S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More

    Authors: Ruizhe Wang, Meng Xu, N. Asokan

    Abstract: Attacks on heap memory, encompassing memory overflow, double and invalid free, use-after-free (UAF), and various heap spraying techniques are ever-increasing. Existing entropy-based secure memory allocators provide statistical defenses against virtually all of these attack vectors. Although they claim protections against UAF attacks, their designs are not tailored to detect (failed) attempts. Cons… ▽ More

    Submitted 29 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Accepted at DIMVA 2024, this is the extended version

  10. Data-Oblivious ML Accelerators using Hardware Security Extensions

    Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan

    Abstract: Outsourced computation can put client data confidentiality at risk. Existing solutions are either inefficient or insufficiently secure: cryptographic techniques like fully-homomorphic encryption incur significant overheads, even with hardware assistance, while the complexity of hardware-assisted trusted execution environments has been exploited to leak secret data. Recent proposals such as BliMe… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Journal ref: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2024, pp. 373-377

  11. arXiv:2401.15828  [pdf, other

    cs.CR cs.NI

    The Spectre of Surveillance and Censorship in Future Internet Architectures

    Authors: Michael Wrana, Diogo Barradas, N. Asokan

    Abstract: Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet to improve performance, scalability, and security. However, some governments perceive Internet access as a threat to their political standing and engage in widespread network surveillance and censorship. In this paper, we provide an in-depth analysis of the design principles of prominent FIAs in terms of… ▽ More

    Submitted 29 January, 2025; v1 submitted 28 January, 2024; originally announced January 2024.

  12. arXiv:2312.04542  [pdf, other

    cs.CR cs.LG

    SoK: Unintended Interactions among Machine Learning Defenses and Risks

    Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan

    Abstract: Machine learning (ML) models cannot neglect risks to security, privacy, and fairness. Several defenses have been proposed to mitigate such risks. When a defense is effective in mitigating one risk, it may correspond to increased or decreased susceptibility to other risks. Existing research lacks an effective framework to recognize and explain these unintended interactions. We present such a framew… ▽ More

    Submitted 4 April, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: IEEE Symposium on Security and Privacy (S&P) 2024

  13. arXiv:2308.09552  [pdf, other

    cs.CR cs.LG

    Attesting Distributional Properties of Training Data for Machine Learning

    Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan

    Abstract: The success of machine learning (ML) has been accompanied by increased concerns about its trustworthiness. Several jurisdictions are preparing ML regulatory frameworks. One such concern is ensuring that model training data has desirable distributional properties for certain sensitive attributes. For example, draft regulations indicate that model trainers are required to show that training datasets… ▽ More

    Submitted 9 April, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

    Comments: European Symposium on Research in Computer Security (ESORICS), 2024

  14. A User-centered Security Evaluation of Copilot

    Authors: Owura Asare, Meiyappan Nagappan, N. Asokan

    Abstract: Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of these tools may be a double-edged sword because while they can increase developer productivity by making it easier to write code, research has shown that they can also generate ins… ▽ More

    Submitted 5 January, 2024; v1 submitted 12 August, 2023; originally announced August 2023.

    Comments: To be published in ICSE 2024 Research Track

  15. arXiv:2307.14751  [pdf, other

    cs.LG cs.CR

    FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

    Authors: Buse G. A. Tekgul, N. Asokan

    Abstract: We propose FLARE, the first fingerprinting mechanism to verify whether a suspected Deep Reinforcement Learning (DRL) policy is an illegitimate copy of another (victim) policy. We first show that it is possible to find non-transferable, universal adversarial masks, i.e., perturbations, to generate adversarial examples that can successfully transfer from a victim policy to its modified versions but… ▽ More

    Submitted 25 September, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

    Comments: Will appear in the proceedings of ACSAC 2023; 14 pages, 6 figures, 8 tables

  16. arXiv:2306.05007  [pdf, other

    cs.CR

    Parallel and Asynchronous Smart Contract Execution

    Authors: Jian Liu, Peilun Li, Raymond~Cheng, N. Asokan, Dawn Song

    Abstract: Today's blockchains suffer from low throughput and high latency, which impedes their widespread adoption of more complex applications like smart contracts. In this paper, we propose a novel paradigm for smart contract execution. It distinguishes between consensus nodes and execution nodes: different groups of execution nodes can execute transactions in parallel; meanwhile, consensus nodes can asyn… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  17. arXiv:2304.08566  [pdf, other

    cs.LG cs.CR

    GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

    Authors: Asim Waheed, Vasisht Duddu, N. Asokan

    Abstract: Graph neural networks (GNNs) have emerged as a state-of-the-art approach to model and draw inferences from large scale graph-structured data in various application settings such as social networking. The primary goal of a GNN is to learn an embedding for each graph node in a dataset that encodes both the node features and the local graph structure around the node. Embeddings generated by a GNN for… ▽ More

    Submitted 1 September, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: To appear in the IEEE Symposium on Security and Privacy, 2024. 12 pages, 5 figures

  18. arXiv:2304.06607  [pdf, other

    cs.CR cs.AI

    False Claims against Model Ownership Resolution

    Authors: Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan

    Abstract: Deep neural network (DNN) models are valuable intellectual property of model owners, constituting a competitive advantage. Therefore, it is crucial to develop techniques to protect against model theft. Model ownership resolution (MOR) is a class of techniques that can deter model theft. A MOR scheme enables an accuser to assert an ownership claim for a suspect model by presenting evidence, such as… ▽ More

    Submitted 9 April, 2024; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: 13pages,3 figures. To appear in the 33rd USENIX Security Symposium (USENIX Security '24)

  19. arXiv:2210.13631  [pdf, other

    cs.LG cs.CR

    On the Robustness of Dataset Inference

    Authors: Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan

    Abstract: Machine learning (ML) models are costly to train as they can require a significant amount of data, computational resources and technical expertise. Thus, they constitute valuable intellectual property that needs protection from adversaries wanting to steal them. Ownership verification techniques allow the victims of model stealing attacks to demonstrate that a suspect model was in fact stolen from… ▽ More

    Submitted 19 June, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

    Comments: 19 pages; Accepted to Transactions on Machine Learning Research 06/2023

  20. arXiv:2210.11340  [pdf, ps, other

    cs.CR

    Towards cryptographically-authenticated in-memory data structures

    Authors: Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

    Abstract: Modern processors include high-performance cryptographic functionalities such as Intel's AES-NI and ARM's Pointer Authentication that allow programs to efficiently authenticate data held by the program. Pointer Authentication is already used to protect return addresses in recent Apple devices, but as yet these structures have seen little use for the protection of general program data. In this pa… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Presented at the 2022 IEEE Secure Development Conference. Copyright 2022 IEEE

  21. arXiv:2207.01991  [pdf, other

    cs.LG cs.CR

    Conflicting Interactions Among Protection Mechanisms for Machine Learning Models

    Authors: Sebastian Szyller, N. Asokan

    Abstract: Nowadays, systems based on machine learning (ML) are widely used in different domains. Given their popularity, ML models have become targets for various attacks. As a result, research at the intersection of security/privacy and ML has flourished. Typically such work has focused on individual types of security/privacy concerns and mitigations thereof. However, in real-life deployments, an ML model… ▽ More

    Submitted 21 November, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

    Comments: To appear in AAAI 2023; this is an extended technical report. 11 tables, 3 figures

  22. BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

    Authors: Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

    Abstract: Outsourced computing is widely used today. However, current approaches for protecting client data in outsourced computing fall short: use of cryptographic techniques like fully-homomorphic encryption incurs substantial costs, whereas use of hardware-assisted trusted execution environments has been shown to be vulnerable to run-time and side-channel attacks. We present Blinded Memory (BliMe), an… ▽ More

    Submitted 29 November, 2023; v1 submitted 20 April, 2022; originally announced April 2022.

    Comments: Accepted for publication at the Network and Distributed System Security (NDSS) Symposium 2024

  23. arXiv:2204.04741  [pdf, other

    cs.SE cs.CR

    Is GitHub's Copilot as Bad as Humans at Introducing Vulnerabilities in Code?

    Authors: Owura Asare, Meiyappan Nagappan, N. Asokan

    Abstract: Several advances in deep learning have been successfully applied to the software development process. Of recent interest is the use of neural language models to build tools, such as Copilot, that assist in writing code. In this paper we perform a comparative empirical analysis of Copilot-generated code from a security perspective. The aim of this study is to determine if Copilot is as bad as human… ▽ More

    Submitted 5 January, 2024; v1 submitted 10 April, 2022; originally announced April 2022.

    Comments: Accepted for publication in Empirical Software Engineering

  24. arXiv:2204.03781  [pdf, other

    cs.CR

    Color My World: Deterministic Tagging for Memory Safety

    Authors: Hans Liljestrand, Carlos Chinea, Rémi Denis-Courmont, Jan-Erik Ekberg, N. Asokan

    Abstract: Hardware-assisted memory protection features are increasingly being deployed in COTS processors. ARMv8.5 Memory Tagging Extensions (MTE) is a recent example, which has been used to provide probabilistic checks for memory safety. This use of MTE is not secure against the standard adversary with arbitrary read/write access to memory. Consequently MTE is used as a software development tool. In this p… ▽ More

    Submitted 25 October, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

  25. arXiv:2203.00162  [pdf, other

    cs.LG cs.AI cs.CL

    Do Transformers know symbolic rules, and would we know if they did?

    Authors: Tommi Gröndahl, Yujia Guo, N. Asokan

    Abstract: To improve the explainability of leading Transformer networks used in NLP, it is important to tease apart genuine symbolic rules from merely associative input-output patterns. However, we identify several inconsistencies in how ``symbolicity'' has been construed in recent NLP literature. To mitigate this problem, we propose two criteria to be the most relevant, one pertaining to a system's interna… ▽ More

    Submitted 1 March, 2023; v1 submitted 19 February, 2022; originally announced March 2022.

    Comments: 15 pages, 1 figure

  26. On the Effectiveness of Dataset Watermarking in Adversarial Settings

    Authors: Buse Gul Atli Tekgul, N. Asokan

    Abstract: In a data-driven world, datasets constitute a significant economic value. Dataset owners who spend time and money to collect and curate the data are incentivized to ensure that their datasets are not used in ways that they did not authorize. When such misuse occurs, dataset owners need technical mechanisms for demonstrating their ownership of the dataset in question. Dataset watermarking provides… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 7 pages, 2 figures. Will appear in the proceedings of CODASPY-IWSPA 2022

    ACM Class: I.2.0; I.4.9

  27. arXiv:2112.02230  [pdf, other

    cs.CR cs.LG

    SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

    Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan

    Abstract: Data used to train machine learning (ML) models can be sensitive. Membership inference attacks (MIAs), attempting to determine whether a particular data record was used to train an ML model, risk violating membership privacy. ML model builders need a principled definition of a metric to quantify the membership privacy risk of (a) individual training data records, (b) computed independently of spec… ▽ More

    Submitted 5 September, 2022; v1 submitted 3 December, 2021; originally announced December 2021.

  28. arXiv:2106.08746  [pdf, other

    cs.LG cs.AI cs.CR

    Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

    Authors: Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan

    Abstract: Deep reinforcement learning (DRL) is vulnerable to adversarial perturbations. Adversaries can mislead the policies of DRL agents by perturbing the state of the environment observed by the agents. Existing attacks are feasible in principle, but face challenges in practice, either by being too slow to fool DRL policies in real time or by modifying past observations stored in the agent's memory. We s… ▽ More

    Submitted 23 September, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: Will appear in the proceedings of ESORICS 2022; 13 pages, 6 figures, 6 tables

  29. arXiv:2104.12623  [pdf, other

    cs.LG cs.CR cs.CV

    Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models

    Authors: Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan

    Abstract: Machine learning models are typically made available to potential client users via inference APIs. Model extraction attacks occur when a malicious client uses information gleaned from queries to the inference API of a victim model $F_V$ to build a surrogate model $F_A$ with comparable functionality. Recent research has shown successful model extraction of image classification, and natural language… ▽ More

    Submitted 28 February, 2023; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: 19 pages

  30. arXiv:2009.12344  [pdf, other

    cs.CL

    A little goes a long way: Improving toxic language classification despite data scarcity

    Authors: Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan

    Abstract: Detection of some types of toxic language is hampered by extreme scarcity of labeled training data. Data augmentation - generating new synthetic data from a labeled seed dataset - can help. The efficacy of data augmentation on toxic language classification has not been fully explored. We present the first systematic study on how data augmentation techniques impact performance across toxic language… ▽ More

    Submitted 24 October, 2020; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: To appear in Findings of ACL: EMNLP 2020

  31. arXiv:2008.07298  [pdf, other

    cs.CR cs.DC cs.LG stat.ML

    WAFFLE: Watermarking in Federated Learning

    Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan

    Abstract: Federated learning is a distributed learning technique where machine learning models are trained on client devices in which the local training data resides. The training is coordinated via a central server which is, typically, controlled by the intended owner of the resulting model. By avoiding the need to transport the training data to the central server, federated learning improves privacy and e… ▽ More

    Submitted 22 July, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: Will appear in the proceedings of SRDS 2021; 14 pages, 11 figures, 10 tables

  32. arXiv:1910.05429  [pdf, other

    cs.LG cs.CR stat.ML

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

    Abstract: Recently, machine learning (ML) has introduced advanced solutions to many domains. Since ML models provide business advantage to model owners, protecting intellectual property of ML models has emerged as an important consideration. Confidentiality of ML models can be protected by exposing them to clients only via prediction APIs. However, model extraction attacks can steal the functionality of ML… ▽ More

    Submitted 27 May, 2020; v1 submitted 11 October, 2019; originally announced October 2019.

    Comments: 16 pages, 1 figure, Accepted for publication in AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (AAAI-EDSMLS 2020)

  33. arXiv:1909.05747  [pdf, other

    cs.CR

    Protecting the stack with PACed canaries

    Authors: Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan

    Abstract: Stack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and brute-forcing attacks. We propose PCan, a new approach based on ARMv8.3-A pointer authentication (PA), that uses dynamically-generated canaries to mitigate these weaknesses and show that it provides more fine-grained protection with… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

  34. arXiv:1906.03397  [pdf, other

    cs.LG cs.CR stat.ML

    Making targeted black-box evasion attacks effective and efficient

    Authors: Mika Juuti, Buse Gul Atli, N. Asokan

    Abstract: We investigate how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks in a black-box setting. We formalize the problem setting and systematically evaluate what benefits the adversary can gain by using substitute models. We show that there is an exploration-exploitation tradeoff in that query efficiency comes at the cost of effectiveness. We pr… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.

    Comments: 12 pages, 10 figures

    Journal ref: AISec 2019: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security

  35. arXiv:1906.00830  [pdf, other

    cs.CR stat.ML

    DAWN: Dynamic Adversarial Watermarking of Neural Networks

    Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan

    Abstract: Training machine learning (ML) models is expensive in terms of computational power, amounts of labeled data and human expertise. Thus, ML models constitute intellectual property (IP) and business value for their owners. Embedding digital watermarks during model training allows a model owner to later identify their models in case of theft or misuse. However, model functionality can also be stolen v… ▽ More

    Submitted 16 July, 2021; v1 submitted 3 June, 2019; originally announced June 2019.

    Comments: Shorter version of this work to appear in Proceedings of the ACM Multimedia 2021; 16 pages, 3 figures

  36. arXiv:1905.13464  [pdf, other

    cs.CL

    Effective writing style imitation via combinatorial paraphrasing

    Authors: Tommi Gröndahl, N. Asokan

    Abstract: Stylometry can be used to profile or deanonymize authors against their will based on writing style. Style transfer provides a defence. Current techniques typically use either encoder-decoder architectures or rule-based algorithms. Crucially, style transfer must reliably retain original semantic content to be actually deployable. We conduct a multifaceted evaluation of three state-of-the-art encode… ▽ More

    Submitted 3 July, 2020; v1 submitted 31 May, 2019; originally announced May 2019.

    Comments: 16 pages, 1 figure, Accepted for publication in Privacy Enhancing Technologies (PETS2020)

  37. arXiv:1905.10255  [pdf, other

    cs.CR

    Making Speculative BFT Resilient with Trusted Monotonic Counters

    Authors: Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan

    Abstract: Consensus mechanisms used by popular distributed ledgers are highly scalable but notoriously inefficient. Byzantine fault tolerance (BFT) protocols are efficient but far less scalable. Speculative BFT protocols such as Zyzzyva and Zyzzyva5 are efficient and scalable but require a trade-off: Zyzzyva requires only $3f + 1$ replicas to tolerate $f$ faults, but even a single slow replica will make Zyz… ▽ More

    Submitted 13 October, 2019; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  38. arXiv:1905.10242  [pdf, other

    cs.CR

    PACStack: an Authenticated Call Stack

    Authors: Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan

    Abstract: A popular run-time attack technique is to compromise the control-flow integrity of a program by modifying function return addresses on the stack. So far, shadow stacks have proven to be essential for comprehensively preventing return address manipulation. Shadow stacks record return addresses in integrity-protected memory secured with hardware-assistance or software access control. Software shadow… ▽ More

    Submitted 15 October, 2020; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: Author's version of article to appear in USENIX Security '21

  39. arXiv:1902.09381  [pdf, other

    cs.CL

    EAT: a simple and versatile semantic representation format for multi-purpose NLP

    Authors: Tommi Gröndahl

    Abstract: Semantic representations are central in many NLP tasks that require human-interpretable data. The conjunctivist framework - primarily developed by Pietroski (2005, 2018) - obtains expressive representations with only a few basic semantic types and relations systematically linked to syntactic positions. While representational simplicity is crucial for computational applications, such findings have… ▽ More

    Submitted 12 March, 2021; v1 submitted 25 February, 2019; originally announced February 2019.

    Comments: 34 pages

  40. arXiv:1902.08939  [pdf, ps, other

    cs.CL

    Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?

    Authors: Tommi Gröndahl, N. Asokan

    Abstract: Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review of existing empirical work, we demonstrate that while certain linguistic features have been indicative of deception in certain corpora, they fail to g… ▽ More

    Submitted 26 February, 2019; v1 submitted 24 February, 2019; originally announced February 2019.

    Comments: 35 pages To appear in ACM Computing Surveys (CSUR)

  41. arXiv:1902.08359  [pdf, other

    cs.CR

    Exploitation Techniques and Defenses for Data-Oriented Attacks

    Authors: Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan

    Abstract: Data-oriented attacks manipulate non-control data to alter a program's benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this SoK paper, we first map data-oriented exploits, including Data-Oriented Progra… ▽ More

    Submitted 24 March, 2019; v1 submitted 21 February, 2019; originally announced February 2019.

  42. arXiv:1811.09189  [pdf, other

    cs.CR

    PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

    Authors: Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan

    Abstract: Run-time attacks against programs written in memory-unsafe programming languages (e.g., C and C++) remain a prominent threat against computer systems. The prevalence of techniques like return-oriented programming (ROP) in attacking real-world systems has prompted major processor manufacturers to design hardware-based countermeasures against specific classes of run-time attacks. An example is the r… ▽ More

    Submitted 24 May, 2019; v1 submitted 22 November, 2018; originally announced November 2018.

    Comments: Author's version of article to appear in USENIX Security 2019

  43. S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX

    Authors: Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner

    Abstract: Function-as-a-Service (FaaS) is a recent and already very popular paradigm in cloud computing. The function provider need only specify the function to be run, usually in a high-level language like JavaScript, and the service provider orchestrates all the necessary infrastructure and software stacks. The function provider is only billed for the actual computational resources used by the function in… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

  44. arXiv:1808.09115  [pdf, ps, other

    cs.CL

    All You Need is "Love": Evading Hate-speech Detection

    Authors: Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

    Abstract: With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech detection models from prior work, and show that they perform well only when tested on the same type of data they were trained on. Based on these results, we argue that for successful hate speech… ▽ More

    Submitted 5 November, 2018; v1 submitted 28 August, 2018; originally announced August 2018.

    Comments: 11 pages, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec) 2018

  45. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

    Authors: N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik

    Abstract: Secure firmware update is an important stage in the IoT device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, since they do not consider idiosyncrasies of a realistic large-scale IoT deployment. This motivates our design of ASSURED, a secure and scalable update framework for IoT. ASSURED includes all stakeholders in a typical IoT… ▽ More

    Submitted 18 October, 2018; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: Author's version of the work that appeared in International Conference on Embedded Software (EMSOFT'18), Octobet 2018, TUrin, Italy. The definitive Version of Record was published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11, Nov. 2018

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11, Nov. 2018

  46. arXiv:1805.02628  [pdf, other

    cs.CR

    PRADA: Protecting against DNN Model Stealing Attacks

    Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan

    Abstract: Machine learning (ML) applications are increasingly prevalent. Protecting the confidentiality of ML models becomes paramount for two reasons: (a) a model can be a business advantage to its owner, and (b) an adversary may use a stolen model to find transferable adversarial examples that can evade classification by the original model. Access to the model can be restricted to be only via well-defined… ▽ More

    Submitted 31 March, 2019; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 17 pages, 7 figures, 9 tables. Accepted for publication in the 4th IEEE European Symposium on Security and Privacy (EuroS&P 2019)

  47. arXiv:1805.02400  [pdf, other

    cs.CR cs.CL

    Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

    Authors: Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan

    Abstract: Automatically generated fake restaurant reviews are a threat to online review systems. Recent research has shown that users have difficulties in detecting machine-generated fake reviews hiding among real restaurant reviews. The method used in this work (char-LSTM ) has one drawback: it has difficulties staying in context, i.e. when it generates a review for specific target entity, the resulting re… ▽ More

    Submitted 28 June, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 21 pages, 5 figures, 6 tables. Accepted for publication in the European Symposium on Research in Computer Security (ESORICS) 2018

  48. Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

    Authors: Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan

    Abstract: Personal cryptographic keys are the foundation of many secure services, but storing these keys securely is a challenge, especially if they are used from multiple devices. Storing keys in a centralized location, like an Internet-accessible server, raises serious security concerns (e.g. server compromise). Hardware-based Trusted Execution Environments (TEEs) are a well-known solution for protecting… ▽ More

    Submitted 1 June, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: Extended version of a paper to appear in the 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID) 2018

  49. arXiv:1804.07474  [pdf, other

    cs.CR

    DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Authors: Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi

    Abstract: IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have vulnerable IoT devices that are easy to compromise. This has led to a new category of malware specifically targeting IoT devices. However, existing intrusion detection techniques are not effective in d… ▽ More

    Submitted 10 May, 2019; v1 submitted 20 April, 2018; originally announced April 2018.

    Comments: Accepted version of paper to appear at ICDCS 2019, Dallas, TX, USA, July 2019

    Journal ref: Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), 2019

  50. Migrating SGX Enclaves with Persistent State

    Authors: Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan

    Abstract: Hardware-supported security mechanisms like Intel Software Guard Extensions (SGX) provide strong security guarantees, which are particularly relevant in cloud settings. However, their reliance on physical hardware conflicts with cloud practices, like migration of VMs between physical platforms. For instance, the SGX trusted execution environment (enclave) is bound to a single physical CPU. Altho… ▽ More

    Submitted 29 March, 2018; originally announced March 2018.