Skip to main content

Showing 1–13 of 13 results for author: Urbieta, A

.
  1. arXiv:2411.03022  [pdf, other

    cs.CR cs.AI

    Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras

    Authors: Roberto Riaño, Gorka Abad, Stjepan Picek, Aitor Urbieta

    Abstract: While security vulnerabilities in traditional Deep Neural Networks (DNNs) have been extensively studied, the susceptibility of Spiking Neural Networks (SNNs) to adversarial attacks remains mostly underexplored. Until now, the mechanisms to inject backdoors into SNN models have been limited to digital scenarios; thus, we present the first evaluation of backdoor attacks in real-world environments.… ▽ More

    Submitted 5 November, 2024; originally announced November 2024.

  2. arXiv:2409.04142  [pdf, other

    cs.CR cs.AI

    Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers

    Authors: Gorka Abad, Stjepan Picek, Lorenzo Cavallaro, Aitor Urbieta

    Abstract: Due to the high cost of training, large model (LM) practitioners commonly use pretrained models downloaded from untrusted sources, which could lead to owning compromised models. In-context learning is the ability of LMs to perform multiple tasks depending on the prompt or context. This can enable new attacks, such as backdoor attacks with dynamic behavior depending on how models are prompted. In… ▽ More

    Submitted 6 September, 2024; originally announced September 2024.

  3. arXiv:2403.01871  [pdf, other

    cs.CR

    Penetration Testing of 5G Core Network Web Technologies

    Authors: Filippo Giambartolomei, Marc Barceló, Alessandro Brighente, Aitor Urbieta, Mauro Conti

    Abstract: Thanks to technologies such as virtual network function the Fifth Generation (5G) of mobile networks dynamically allocate resources to different types of users in an on-demand fashion. Virtualization extends up to the 5G core, where software-defined networks and network slicing implement a customizable environment. These technologies can be controlled via application programming interfaces and web… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  4. arXiv:2402.02886  [pdf, other

    cs.CR cs.CV cs.NE

    Time-Distributed Backdoor Attacks on Federated Spiking Learning

    Authors: Gorka Abad, Stjepan Picek, Aitor Urbieta

    Abstract: This paper investigates the vulnerability of spiking neural networks (SNNs) and federated learning (FL) to backdoor attacks using neuromorphic data. Despite the efficiency of SNNs and the privacy advantages of FL, particularly in low-powered devices, we demonstrate that these systems are susceptible to such attacks. We first assess the viability of using FL with SNNs using neuromorphic data, showi… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  5. Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

    Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza

    Abstract: There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being typically placed in uncontrolled environments make traditional IT security mechanisms such as signature-based intrusion detection and prevention systems challenging to integrate… ▽ More

    Submitted 27 July, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: Accepted for publication in Computers & Security

  6. arXiv:2302.06296  [pdf

    cond-mat.mtrl-sci

    Growth of Zr/ZrO2 core-shell structures by Fast Thermal Oxidation

    Authors: J. F. Ramos-Justicia, J. L. Ballester-andújar, A. Urbieta, P. Fernández

    Abstract: This research has been conducted to characterize and validate the resistive heating as a synthesis method for zirconium oxides (ZrO$_2$). A wire of Zr has been oxidized to form a core shell structure, in which the core is the metal wire, and the shell is an oxide layer around 10$μ$m thick. The characterization This research has been conducted to characterize and validate the resistive heating as a… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: 15 pages, 12 figures

  7. arXiv:2302.06279  [pdf, other

    cs.CR cs.CV cs.LG

    Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data

    Authors: Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta

    Abstract: Deep neural networks (DNNs) have demonstrated remarkable performance across various tasks, including image and speech recognition. However, maximizing the effectiveness of DNNs requires meticulous optimization of numerous hyperparameters and network parameters through training. Moreover, high-performance DNNs entail many parameters, which consume significant energy during training. In order to ove… ▽ More

    Submitted 5 February, 2024; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: To appear in Network and Distributed System Security (NDSS) Symposium 2024

    Journal ref: NDSS Symposium 2024

  8. arXiv:2209.12742  [pdf, other

    cs.CR

    Too Many Options: A Survey of ABE Libraries for Developers

    Authors: Aintzane Mosteiro-Sanchez, Marc Barcelo, Jasone Astorga, Aitor Urbieta

    Abstract: Attribute-based encryption (ABE) comprises a set of one-to-many encryption schemes that allow the encryption and decryption of data by associating it with access policies and attributes. Therefore, it is an asymmetric encryption scheme, and its computational requirements limit its deployment in IoT devices. There are different types of ABE and many schemes within each type. However, there is no co… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  9. Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

    Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza

    Abstract: The growing adoption of the Internet of Things (IoT) has brought a significant increase in attacks targeting those devices. Machine learning (ML) methods have shown promising results for intrusion detection; however, the scarcity of IoT datasets remains a limiting factor in developing ML-based security systems for IoT scenarios. Static datasets get outdated due to evolving IoT architectures and th… ▽ More

    Submitted 27 July, 2023; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: Accepted for publication in IEEE Transactions on Dependable and Secure Computing. Accepted version first online: Feb 22 2023

  10. arXiv:2203.08689  [pdf, other

    cs.CR

    Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning

    Authors: Gorka Abad, Servio Paguada, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta

    Abstract: Federated Learning (FL) enables collaborative training of Deep Learning (DL) models where the data is retained locally. Like DL, FL has severe security weaknesses that the attackers can exploit, e.g., model inversion and backdoor attacks. Model inversion attacks reconstruct the data from the training datasets, whereas backdoors misclassify only classes containing specific properties, e.g., a pixel… ▽ More

    Submitted 28 February, 2023; v1 submitted 16 March, 2022; originally announced March 2022.

  11. End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates

    Authors: Aintzane Mosteiro-Sanchez, Marc Barcelo, Jasone Astorga, Aitor Urbieta

    Abstract: Data exchange among value chain partners provides them with a competitive advantage, but the risk of exposing sensitive data is ever-increasing. Information must be protected in storage and transmission to reduce this risk, so only the data producer and the final consumer can access or modify it. End-to-end (E2E) security mechanisms address this challenge, protecting companies from data breaches r… ▽ More

    Submitted 13 September, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 22 pages, 9 figures Main changes from the previous version: - The introduction and Sections 5 and 6 are better written now. - State of the Art references update when necessary. - Design Requirements names have been changed to better ones. - Section 4 has been reordered. - Section 4.1 is better explained now. - Algorithms in Section 5 are better explained now, step-by-step

  12. Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0

    Authors: Aintzane Mosteiro-Sanchez, Marc Barcelo, Jasone Astorga, Aitor Urbieta

    Abstract: Industry 4.0 uses a subset of the IoT, named Industrial IoT (IIoT), to achieve connectivity, interoperability, and decentralization. The deployment of industrial networks rarely considers security by design, but this becomes imperative in smart manufacturing as connectivity increases. The combination of OT and IT infrastructures in Industry 4.0 adds new security threats beyond those of traditional… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

    Comments: 30 pages, 6 figures

  13. arXiv:2112.05423  [pdf, other

    cs.CR

    On the Security & Privacy in Federated Learning

    Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta

    Abstract: Recent privacy awareness initiatives such as the EU General Data Protection Regulation subdued Machine Learning (ML) to privacy and security assessments. Federated Learning (FL) grants a privacy-driven, decentralized training scheme that improves ML models' security. The industry's fast-growing adaptation and security evaluations of FL technology exposed various vulnerabilities that threaten FL's… ▽ More

    Submitted 16 March, 2022; v1 submitted 10 December, 2021; originally announced December 2021.