Skip to main content

Showing 1–15 of 15 results for author: Quiring, E

.
  1. arXiv:2503.11404  [pdf, other

    cs.CR cs.AI cs.CV

    Towards A Correct Usage of Cryptography in Semantic Watermarks for Diffusion Models

    Authors: Jonas Thietke, Andreas Müller, Denis Lukovnikov, Asja Fischer, Erwin Quiring

    Abstract: Semantic watermarking methods enable the direct integration of watermarks into the generation process of latent diffusion models by only modifying the initial latent noise. One line of approaches building on Gaussian Shading relies on cryptographic primitives to steer the sampling process of the latent noise. However, we identify several issues in the usage of cryptographic techniques in Gaussian… ▽ More

    Submitted 14 March, 2025; originally announced March 2025.

    Comments: 8 pages, 3 figures, WMark@ICLR

  2. arXiv:2412.03283  [pdf, ps, other

    cs.CR cs.AI cs.CV

    Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models

    Authors: Andreas Müller, Denis Lukovnikov, Jonas Thietke, Asja Fischer, Erwin Quiring

    Abstract: Integrating watermarking into the generation process of latent diffusion models (LDMs) simplifies detection and attribution of generated content. Semantic watermarks, such as Tree-Rings and Gaussian Shading, represent a novel class of watermarking techniques that are easy to implement and highly robust against various perturbations. However, our work demonstrates a fundamental security vulnerabili… ▽ More

    Submitted 7 June, 2025; v1 submitted 4 December, 2024; originally announced December 2024.

    Comments: CVPR 2025

    Journal ref: Proc. IEEE/CVF Conf. on Computer Vision and Pattern Recognition (CVPR), 2025, pp. 20937-20946

  3. arXiv:2404.14244  [pdf, other

    cs.CR cs.AI cs.CY cs.LG cs.SI

    AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

    Authors: Jonas Ricker, Dennis Assenmacher, Thorsten Holz, Asja Fischer, Erwin Quiring

    Abstract: Recent advances in the field of generative artificial intelligence (AI) have blurred the lines between authentic and machine-generated content, making it almost impossible for humans to distinguish between such media. One notable consequence is the use of AI-generated images for fake profiles on social media. While several types of disinformation campaigns and similar incidents have been reported… ▽ More

    Submitted 3 October, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2024

  4. arXiv:2403.18587  [pdf, other

    cs.CR cs.CV cs.LG

    The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision

    Authors: Andreas Müller, Erwin Quiring

    Abstract: Resource efficiency plays an important role for machine learning nowadays. The energy and decision latency are two critical aspects to ensure a sustainable and practical application. Unfortunately, the energy consumption and decision latency are not robust against adversaries. Researchers have recently demonstrated that attackers can compute and submit so-called sponge examples at inference time t… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted at the DLSP 2024

  5. arXiv:2310.15085  [pdf, other

    cs.CR cs.CV cs.LG

    On the Detection of Image-Scaling Attacks in Machine Learning

    Authors: Erwin Quiring, Andreas Müller, Konrad Rieck

    Abstract: Image scaling is an integral part of machine learning and computer vision systems. Unfortunately, this preprocessing step is vulnerable to so-called image-scaling attacks where an attacker makes unnoticeable changes to an image so that it becomes a new image after scaling. This opens up new ways for attackers to control the prediction or to improve poisoning and backdoor attacks. While effective t… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted at ACSAC'23

  6. arXiv:2303.14443  [pdf, other

    cs.CR cs.LG

    No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

    Authors: Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

    Abstract: The number of papers submitted to academic conferences is steadily rising in many scientific disciplines. To handle this growth, systems for automatic paper-reviewer assignments are increasingly used during the reviewing process. These systems use statistical topic models to characterize the content of submissions and automate the assignment to reviewers. In this paper, we show that this automatio… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: Accepted at USENIX Security Symposium 2023

  7. arXiv:2208.12553  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    I still know it's you! On Challenges in Anonymizing Source Code

    Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck

    Abstract: The source code of a program not only defines its semantics but also contains subtle clues that can identify its author. Several studies have shown that these clues can be automatically extracted using machine learning and allow for determining a program's author among hundreds of programmers. This attribution poses a significant threat to developers of anti-censorship and privacy-enhancing techno… ▽ More

    Submitted 10 April, 2024; v1 submitted 26 August, 2022; originally announced August 2022.

  8. arXiv:2205.12543  [pdf, other

    cs.CV cs.CR cs.LG eess.IV

    Misleading Deep-Fake Detection with GAN Fingerprints

    Authors: Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring

    Abstract: Generative adversarial networks (GANs) have made remarkable progress in synthesizing realistic-looking images that effectively outsmart even humans. Although several detection methods can recognize these deep fakes by checking for image artifacts from the generation process, multiple counterattacks have demonstrated their limitations. These attacks, however, still require certain conditions to hol… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: In IEEE Deep Learning and Security Workshop (DLS) 2022

  9. arXiv:2010.09569  [pdf, other

    cs.CR cs.LG

    Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

    Authors: Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck

    Abstract: Machine learning-based systems for malware detection operate in a hostile environment. Consequently, adversaries will also target the learning system and use evasion attacks to bypass the detection of malware. In this paper, we outline our learning-based system PEberus that got the first place in the defender challenge of the Microsoft Evasion Competition, resisting a variety of attacks from indep… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  10. arXiv:2010.09470  [pdf, other

    cs.CR cs.LG

    Dos and Don'ts of Machine Learning in Computer Security

    Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck

    Abstract: With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas. This development has influenced computer security, spawning a series of work on learning-based security systems, such as for malware detection, vulnerability discovery, and binary code analysis. Despite grea… ▽ More

    Submitted 30 November, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: to appear at USENIX Security Symposium 2022

  11. arXiv:2003.08633  [pdf, other

    cs.CR cs.CV

    Backdooring and Poisoning Neural Networks with Image-Scaling Attacks

    Authors: Erwin Quiring, Konrad Rieck

    Abstract: Backdoors and poisoning attacks are a major threat to the security of machine-learning and vision systems. Often, however, these attacks leave visible artifacts in the images that can be visually detected and weaken the efficacy of the attacks. In this paper, we propose a novel strategy for hiding backdoor and poisoning attacks. Our approach builds on a recent class of attacks against image scalin… ▽ More

    Submitted 19 March, 2020; originally announced March 2020.

    Comments: IEEE Deep Learning and Security Workshop (DLS) 2020

  12. arXiv:1911.02142  [pdf, other

    cs.CR cs.LG

    Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]

    Authors: Jacopo Cortellazzi, Feargus Pendlebury, Daniel Arp, Erwin Quiring, Fabio Pierazzi, Lorenzo Cavallaro

    Abstract: Recent research efforts on adversarial machine learning (ML) have investigated problem-space attacks, focusing on the generation of real evasive objects in domains where, unlike images, there is no clear inverse mapping to the feature space (e.g., software). However, the design, comparison, and real-world implications of problem-space attacks remain underexplored. This article makes three major co… ▽ More

    Submitted 27 June, 2024; v1 submitted 5 November, 2019; originally announced November 2019.

    Comments: This arXiv version (v3) corresponds to an extended version

  13. arXiv:1907.04025  [pdf, other

    cs.MM cs.CR

    On the Security and Applicability of Fragile Camera Fingerprints

    Authors: Erwin Quiring, Matthias Kirchner, Konrad Rieck

    Abstract: Camera sensor noise is one of the most reliable device characteristics in digital image forensics, enabling the unique linkage of images to digital cameras. This so-called camera fingerprint gives rise to different applications, such as image forensics and authentication. However, if images are publicly available, an adversary can estimate the fingerprint from her victim and plant it into spurious… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: ESORICS 2019

  14. arXiv:1905.12386  [pdf, other

    cs.LG cs.CR stat.ML

    Misleading Authorship Attribution of Source Code using Adversarial Learning

    Authors: Erwin Quiring, Alwin Maier, Konrad Rieck

    Abstract: In this paper, we present a novel attack against authorship attribution of source code. We exploit that recent attribution methods rest on machine learning and thus can be deceived by adversarial examples of source code. Our attack performs a series of semantics-preserving code transformations that mislead learning-based attribution but appear plausible to a developer. The attack is guided by Mont… ▽ More

    Submitted 31 May, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

    Comments: USENIX Security Symposium 2019

  15. arXiv:1703.05561  [pdf, other

    cs.CR cs.LG

    Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

    Authors: Erwin Quiring, Daniel Arp, Konrad Rieck

    Abstract: Machine learning is increasingly used in security-critical applications, such as autonomous driving, face recognition and malware detection. Most learning methods, however, have not been designed with security in mind and thus are vulnerable to different types of attacks. This problem has motivated the research field of adversarial machine learning that is concerned with attacking and defending le… ▽ More

    Submitted 16 March, 2017; originally announced March 2017.