Skip to main content

Showing 1–12 of 12 results for author: Khasawneh, K

.
  1. Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing

    Authors: Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh

    Abstract: Wireless device pairing is a critical security mechanism to bootstrap the secure communication between two devices without a pre-shared secret. It has been widely used in many Internet of Things (IoT) applications, such as smart-home and smart-health. Most existing device pairing mechanisms are based on out-of-band channels, e.g., extra sensors or hardware, to validate the proximity of pairing dev… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  2. arXiv:2401.02342  [pdf, other

    cs.CR cs.AR cs.LG

    Evasive Hardware Trojan through Adversarial Power Trace

    Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

    Abstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In thi… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  3. arXiv:2211.01182  [pdf, other

    cs.CR

    Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

    Authors: Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: Machine-learning architectures, such as Convolutional Neural Networks (CNNs) are vulnerable to adversarial attacks: inputs crafted carefully to force the system output to a wrong label. Since machine-learning is being deployed in safety-critical and security-sensitive domains, such attacks may have catastrophic security and safety consequences. In this paper, we propose for the first time to use h… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700

  4. arXiv:2201.01621  [pdf, other

    cs.CR cs.LG

    ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

    Authors: Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Advances in deep learning have enabled a wide range of promising applications. However, these systems are vulnerable to Adversarial Machine Learning (AML) attacks; adversarially crafted perturbations to their inputs could cause them to misclassify. Several state-of-the-art adversarial attacks have demonstrated that they can reliably fool classifiers making these attacks a significant threat. Adver… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: 12 pages

  5. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

    Authors: Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun

    Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes a… ▽ More

    Submitted 15 November, 2021; v1 submitted 2 October, 2021; originally announced October 2021.

  6. arXiv:2103.06936  [pdf, other

    cs.CR cs.LG

    Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

    Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh

    Abstract: Machine learning-based hardware malware detectors (HMDs) offer a potential game changing advantage in defending systems against malware. However, HMDs suffer from adversarial attacks, can be effectively reverse-engineered and subsequently be evaded, allowing malware to hide from detection. We address this issue by proposing a novel HMDs (Stochastic-HMDs) through approximate computing, which makes… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: 13 pages, 13 figures

  7. Defensive Approximation: Securing CNNs using Approximate Computing

    Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-life problems. However, these architectures are vulnerable to adversarial attacks. In this paper, we propose for the first time to use hardware-supported approximate computing to improve the robustness of machi… ▽ More

    Submitted 29 July, 2021; v1 submitted 13 June, 2020; originally announced June 2020.

    Comments: ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)

  8. arXiv:2001.06099  [pdf, other

    cs.LG cs.CV stat.ML

    Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

    Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we propose Code-Bridged Classifier (CBC), a framework for making a Convolutional Neural Network (CNNs) robust against adversarial attacks without increasing or even by decreasing the overall models' computational complexity. More specifically, we propose a stacked encoder-convolutional model, in which the input image is first encoded by the encoder module of a denoising auto-encoder… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: 6 pages, Accepted and to appear in ISQED 2020

  9. arXiv:1906.01345  [pdf, other

    cs.CR

    SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation

    Authors: Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijackin… ▽ More

    Submitted 4 December, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: To appear in IEEE S&P 2020

  10. Investigation of neutron-induced reaction at the Goethe University Frankfurt

    Authors: Rene Reifarth, Lukas Bott, Benjamin Brückner, Ozan Dogan, Markus Dworac, Anne Endres, Philipp Erbacher, Stefan Fiebiger, Roman Gernhäuser, Kathrin Göbel, Fabian Hebermehl, Tanja Heftrich, Christoph Langer, Tanja Kausch, Nadine Klapper, Kafa Khasawneh, Christoph Köppchen, Sabina Krasilovskaja, Deniz Kurtulgil, Markus Reich, Markus S. Schöffler, Lothar Ph. H. Schmidt, Christian Schwarz, Zuzana Slavkovská, Kurt E. Stiebing , et al. (5 additional authors not shown)

    Abstract: We present first results and plans for future neutron activation measurements at the Goethe University Frankfurt. The measurements were performed at the Van-de-Graaff accelerator employing the 7Li(p,n) reaction.

    Submitted 11 May, 2019; originally announced May 2019.

    Comments: 5 pages, 5 figures, accepted as proceeding of the Nuclei in the Cosmos XV conference 2018

    Journal ref: Nuclei in the Cosmos XV. Springer Proceedings in Physics, vol 219. Springer, Cham (2019)

  11. arXiv:1807.07940  [pdf, other

    cs.CR

    Spectre Returns! Speculation Attacks using the Return Stack Buffer

    Authors: Esmaeil Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection boundaries. In this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than exploiting the branch predictor unit, SpectreRSB exploits the return stack buffer (RSB), a common predictor… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: This paper has been accepted at WOOT'18

  12. arXiv:1806.05179  [pdf, other

    cs.CR cs.AR

    SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

    Authors: Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh

    Abstract: Speculative execution which is used pervasively in modern CPUs can leave side effects in the processor caches and other structures even when the speculated instructions do not commit and their direct effect is not visible. The recent Meltdown and Spectre attacks have shown that this behavior can be exploited to expose privileged information to an unprivileged attacker. In particular, the attack fo… ▽ More

    Submitted 15 June, 2018; v1 submitted 13 June, 2018; originally announced June 2018.