-
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Authors:
Pascal Nasahl,
Salmin Sultana,
Hans Liljestrand,
Karanvir Grewal,
Michael LeMay,
David M. Durham,
David Schrammel,
Stefan Mangard
Abstract:
Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. Howe…
▽ More
Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside the program. To protect the control-flow from these attacks, dedicated fault control-flow integrity (CFI) countermeasures are commonly deployed. However, these schemes either have high detection latencies or require intrusive hardware changes. In this paper, we present EC-CFI, a software-based cryptographically enforced CFI scheme with no detection latency utilizing hardware features of recent Intel platforms. Our EC-CFI prototype is designed to prevent an adversary from escaping the program's call graph using faults by encrypting each function with a different key before execution. At runtime, the instrumented program dynamically derives the decryption key, ensuring that the code only can be successfully decrypted when the program follows the intended call graph. To enable this level of protection on Intel commodity systems, we introduce extended page table (EPT) aliasing allowing us to achieve function-granular encryption by combing Intel's TME-MK and virtualization technology. We open-source our custom LLVM-based toolchain automatically protecting arbitrary programs with EC-CFI. Furthermore, we evaluate our EPT aliasing approach with the SPEC CPU2017 and Embench-IoT benchmarks and discuss and evaluate potential TME-MK hardware changes minimizing runtime overheads.
△ Less
Submitted 24 March, 2023; v1 submitted 31 January, 2023;
originally announced January 2023.
-
P4BID: Information Flow Control in P4
Authors:
Karuna Grewal,
Loris D'Antoni,
Justin Hsu
Abstract:
Modern programmable network switches can implement custom applications using efficient packet processing hardware, and the programming language P4 provides high-level constructs to program such switches. The increase in speed and programmability has inspired research in dataplane programming, where many complex functionalities, e.g., key-value stores and load balancers, can be implemented entirely…
▽ More
Modern programmable network switches can implement custom applications using efficient packet processing hardware, and the programming language P4 provides high-level constructs to program such switches. The increase in speed and programmability has inspired research in dataplane programming, where many complex functionalities, e.g., key-value stores and load balancers, can be implemented entirely in network switches. However, dataplane programs may suffer from novel security errors that are not traditionally found in network switches.
To address this issue, we present a new information-flow control type system for P4. We formalize our type system in a recently-proposed core version of P4, and we prove a soundness theorem: well-typed programs satisfy non-interference. We also implement our type system in a tool, P4bid, which extends the type checker in the p4c compiler, the reference compiler for the latest version of P4. We present several case studies showing that natural security, integrity, and isolation properties in networks can be captured by non-interference, and our type system can detect violations of these properties while certifying correct programs.
△ Less
Submitted 14 June, 2022; v1 submitted 6 April, 2022;
originally announced April 2022.
-
Avoiding Catastrophe: Active Dendrites Enable Multi-Task Learning in Dynamic Environments
Authors:
Abhiram Iyer,
Karan Grewal,
Akash Velu,
Lucas Oliveira Souza,
Jeremy Forest,
Subutai Ahmad
Abstract:
A key challenge for AI is to build embodied systems that operate in dynamically changing environments. Such systems must adapt to changing task contexts and learn continuously. Although standard deep learning systems achieve state of the art results on static benchmarks, they often struggle in dynamic scenarios. In these settings, error signals from multiple contexts can interfere with one another…
▽ More
A key challenge for AI is to build embodied systems that operate in dynamically changing environments. Such systems must adapt to changing task contexts and learn continuously. Although standard deep learning systems achieve state of the art results on static benchmarks, they often struggle in dynamic scenarios. In these settings, error signals from multiple contexts can interfere with one another, ultimately leading to a phenomenon known as catastrophic forgetting. In this article we investigate biologically inspired architectures as solutions to these problems. Specifically, we show that the biophysical properties of dendrites and local inhibitory systems enable networks to dynamically restrict and route information in a context-specific manner. Our key contributions are as follows. First, we propose a novel artificial neural network architecture that incorporates active dendrites and sparse representations into the standard deep learning framework. Next, we study the performance of this architecture on two separate benchmarks requiring task-based adaptation: Meta-World, a multi-task reinforcement learning environment where a robotic agent must learn to solve a variety of manipulation tasks simultaneously; and a continual learning benchmark in which the model's prediction task changes throughout training. Analysis on both benchmarks demonstrates the emergence of overlapping but distinct and sparse subnetworks, allowing the system to fluidly learn multiple tasks with minimal forgetting. Our neural implementation marks the first time a single architecture has achieved competitive results on both multi-task and continual learning settings. Our research sheds light on how biological properties of neurons can inform deep learning systems to address dynamic scenarios that are typically impossible for traditional ANNs to solve.
△ Less
Submitted 25 April, 2022; v1 submitted 31 December, 2021;
originally announced January 2022.
-
Learning deep representations by mutual information estimation and maximization
Authors:
R Devon Hjelm,
Alex Fedorov,
Samuel Lavoie-Marchildon,
Karan Grewal,
Phil Bachman,
Adam Trischler,
Yoshua Bengio
Abstract:
In this work, we perform unsupervised learning of representations by maximizing mutual information between an input and the output of a deep neural network encoder. Importantly, we show that structure matters: incorporating knowledge about locality of the input to the objective can greatly influence a representation's suitability for downstream tasks. We further control characteristics of the repr…
▽ More
In this work, we perform unsupervised learning of representations by maximizing mutual information between an input and the output of a deep neural network encoder. Importantly, we show that structure matters: incorporating knowledge about locality of the input to the objective can greatly influence a representation's suitability for downstream tasks. We further control characteristics of the representation by matching to a prior distribution adversarially. Our method, which we call Deep InfoMax (DIM), outperforms a number of popular unsupervised learning methods and competes with fully-supervised learning on several classification tasks. DIM opens new avenues for unsupervised learning of representations and is an important step towards flexible formulations of representation-learning objectives for specific end-goals.
△ Less
Submitted 22 February, 2019; v1 submitted 20 August, 2018;
originally announced August 2018.
-
On the Challenges of Detecting Rude Conversational Behaviour
Authors:
Karan Grewal,
Khai N. Truong
Abstract:
In this study, we aim to identify moments of rudeness between two individuals. In particular, we segment all occurrences of rudeness in conversations into three broad, distinct categories and try to identify each. We show how machine learning algorithms can be used to identify rudeness based on acoustic and semantic signals extracted from conversations. Furthermore, we make note of our shortcoming…
▽ More
In this study, we aim to identify moments of rudeness between two individuals. In particular, we segment all occurrences of rudeness in conversations into three broad, distinct categories and try to identify each. We show how machine learning algorithms can be used to identify rudeness based on acoustic and semantic signals extracted from conversations. Furthermore, we make note of our shortcomings in this task and highlight what makes this problem inherently difficult. Finally, we provide next steps which are needed to ensure further success in identifying rudeness in conversations.
△ Less
Submitted 28 December, 2017;
originally announced December 2017.
-
Variance Regularizing Adversarial Learning
Authors:
Karan Grewal,
R Devon Hjelm,
Yoshua Bengio
Abstract:
We introduce a novel approach for training adversarial models by replacing the discriminator score with a bi-modal Gaussian distribution over the real/fake indicator variables. In order to do this, we train the Gaussian classifier to match the target bi-modal distribution implicitly through meta-adversarial training. We hypothesize that this approach ensures a non-zero gradient to the generator, e…
▽ More
We introduce a novel approach for training adversarial models by replacing the discriminator score with a bi-modal Gaussian distribution over the real/fake indicator variables. In order to do this, we train the Gaussian classifier to match the target bi-modal distribution implicitly through meta-adversarial training. We hypothesize that this approach ensures a non-zero gradient to the generator, even in the limit of a perfect classifier. We test our method against standard benchmark image datasets as well as show the classifier output distribution is smooth and has overlap between the real and fake modes.
△ Less
Submitted 19 August, 2018; v1 submitted 2 July, 2017;
originally announced July 2017.
-
Formation of Dominance Relationships via Strategy Updating in an Asymmetric Hawk-Dove Game
Authors:
Jasvir K. Grewal,
Cameron L. Hall,
Mason A. Porter,
Marian S. Dawkins
Abstract:
We develop a model to describe the development of dominance relations between social animals as they use past experiences to inform future interactions. Using the game-theoretic framework of a Hawk-Dove game with asymmetric resource-holding potentials (RHPs), we derive a simple model that describes the social interactions of animals that compete for resources. We then consider a game-playing strat…
▽ More
We develop a model to describe the development of dominance relations between social animals as they use past experiences to inform future interactions. Using the game-theoretic framework of a Hawk-Dove game with asymmetric resource-holding potentials (RHPs), we derive a simple model that describes the social interactions of animals that compete for resources. We then consider a game-playing strategy in which animals acquire information about their RHP asymmetry from the results of their previous contests and subsequently use their asymmetry assessment to inform their behavior in future contests. We examine how directly incorporating the fact that animals have incomplete information in their interactions can lead to outcomes that differ from what would be expected if one considers the situation as a static game in which the animals have perfect information about the asymmetry size. We thereby obtain results that are consistent with observations of dominance-hierarchy formation in social animals. We also discuss how increased interactions between animals can speed up the asymmetry assessment process and how this can explain why aggression can sometimes decrease as the number of interactions between animals increases over time.
△ Less
Submitted 24 August, 2013;
originally announced August 2013.