Skip to main content

Showing 1–7 of 7 results for author: Tsankov, P

.
  1. arXiv:2410.07959  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    COMPL-AI Framework: A Technical Interpretation and LLM Benchmarking Suite for the EU Artificial Intelligence Act

    Authors: Philipp Guldimann, Alexander Spiridonov, Robin Staab, Nikola Jovanović, Mark Vero, Velko Vechev, Anna-Maria Gueorguieva, Mislav Balunović, Nikola Konstantinov, Pavol Bielik, Petar Tsankov, Martin Vechev

    Abstract: The EU's Artificial Intelligence Act (AI Act) is a significant step towards responsible AI development, but lacks clear technical interpretation, making it difficult to assess models' compliance. This work presents COMPL-AI, a comprehensive framework consisting of (i) the first technical interpretation of the EU AI Act, translating its broad regulatory requirements into measurable technical requir… ▽ More

    Submitted 3 February, 2025; v1 submitted 10 October, 2024; originally announced October 2024.

  2. Robustness testing of AI systems: A case study for traffic sign recognition

    Authors: Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel

    Abstract: In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications. Unlike classical symbolic AI systems, neural networks are trained using large data sets and their inner structure containing possibly billions of parameters does not lend itself to human interpretation. As a consequence, it is so far… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

    Comments: 12 pages, 7 figures. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-79150-6_21

    Journal ref: In: Maglogiannis I., Macintyre J., Iliadis L. (eds) Artificial Intelligence Applications and Innovations. AIAI 2021. IFIP Advances in Information and Communication Technology, vol 627. Springer, Cham

  3. arXiv:2102.11860  [pdf, other

    cs.LG cs.CV stat.ML

    Automated Discovery of Adaptive Attacks on Adversarial Defenses

    Authors: Chengyuan Yao, Pavol Bielik, Petar Tsankov, Martin Vechev

    Abstract: Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defense's inner workings or approaches based on an ensemble of fixed attacks, none of which may be effective for the specific defense at hand. Our key observation is that adaptive attacks are composed of reusable building blocks that can be formalized in a… ▽ More

    Submitted 27 October, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: 21 pages, 3 figures, 10 tables. NeurIPS2021

  4. arXiv:2009.01020  [pdf, other

    cs.PL cs.CR

    zkay v0.2: Practical Data Privacy for Smart Contracts

    Authors: Nick Baumann, Samuel Steffen, Benjamin Bichsel, Petar Tsankov, Martin Vechev

    Abstract: Recent work introduces zkay, a system for specifying and enforcing data privacy in smart contracts. While the original prototype implementation of zkay (v0.1) demonstrates the feasibility of the approach, its proof-of-concept implementation suffers from severe limitations such as insecure encryption and lack of important language features. In this report, we present zkay v0.2, which addresses it… ▽ More

    Submitted 9 September, 2020; v1 submitted 2 September, 2020; originally announced September 2020.

  5. arXiv:1806.01143  [pdf, other

    cs.CR

    Securify: Practical Security Analysis of Smart Contracts

    Authors: Petar Tsankov, Andrei Dan, Dana Drachsler Cohen, Arthur Gervais, Florian Buenzli, Martin Vechev

    Abstract: Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties. Despite their potential, repeated security concerns have shaken the trust in handling billions of USD by smart contracts. To address this problem, we present Securify, a security analyzer for Ethereum smart contr… ▽ More

    Submitted 24 August, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

  6. arXiv:1611.02537  [pdf, other

    cs.NI cs.PL

    Network-wide Configuration Synthesis

    Authors: Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, Martin Vechev

    Abstract: Computer networks are hard to manage. Given a set of high-level requirements (e.g., reachability, security), operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they, collectively, compute a compatible forwarding state. Not surprisingly, operators often make mistakes which lead to downtimes. To address… ▽ More

    Submitted 30 May, 2017; v1 submitted 8 November, 2016; originally announced November 2016.

    Comments: 24 Pages, short version published in CAV 2017

  7. arXiv:1605.01769  [pdf, other

    cs.CR

    Access Control Synthesis for Physical Spaces

    Authors: Petar Tsankov, Mohammad Torabi Dashti, David Basin

    Abstract: Access-control requirements for physical spaces, like office buildings and airports, are best formulated from a global viewpoint in terms of system-wide requirements. For example, "there is an authorized path to exit the building from every room." In contrast, individual access-control components, such as doors and turnstiles, can only enforce local policies, specifying when the component may open… ▽ More

    Submitted 5 May, 2016; originally announced May 2016.