Skip to main content

Showing 1–19 of 19 results for author: Ateniese, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.12471  [pdf, other

    cs.LG cs.DC cs.PF

    You Don't Need All Attentions: Distributed Dynamic Fine-Tuning for Foundation Models

    Authors: Shiwei Ding, Lan Zhang, Zhenlin Wang, Giuseppe Ateniese, Xiaoyong Yuan

    Abstract: Fine-tuning plays a crucial role in adapting models to downstream tasks with minimal training efforts. However, the rapidly increasing size of foundation models poses a daunting challenge for accommodating foundation model fine-tuning in most commercial devices, which often have limited memory bandwidth. Techniques like model sharding and tensor parallelism address this issue by distributing compu… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  2. arXiv:2410.20911  [pdf, other

    cs.CR cs.AI

    Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks

    Authors: Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese

    Abstract: Large language models (LLMs) are increasingly being harnessed to automate cyberattacks, making sophisticated exploits more accessible and scalable. In response, we propose a new defense strategy tailored to counter LLM-driven cyberattacks. We introduce Mantis, a defensive framework that exploits LLMs' susceptibility to adversarial inputs to undermine malicious operations. Upon detecting an automat… ▽ More

    Submitted 18 November, 2024; v1 submitted 28 October, 2024; originally announced October 2024.

    Comments: v0.2 (evaluated on more agents)

  3. arXiv:2407.15847  [pdf, other

    cs.CR cs.AI

    LLMmap: Fingerprinting For Large Language Models

    Authors: Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese

    Abstract: We introduce LLMmap, a first-generation fingerprinting technique targeted at LLM-integrated applications. LLMmap employs an active fingerprinting approach, sending carefully crafted queries to the application and analyzing the responses to identify the specific LLM version in use. Our query selection is informed by domain expertise on how LLMs generate uniquely identifiable responses to thematical… ▽ More

    Submitted 10 February, 2025; v1 submitted 22 July, 2024; originally announced July 2024.

    Comments: Appearing in the proceedings of the 34th USENIX Security Symposium

  4. arXiv:2311.04378  [pdf, other

    cs.LG cs.CL cs.CR

    Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models

    Authors: Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak

    Abstract: Watermarking generative models consists of planting a statistical signal (watermark) in a model's output so that it can be later verified that the output was generated by the given model. A strong watermarking scheme satisfies the property that a computationally bounded attacker cannot erase the watermark without causing significant quality degradation. In this paper, we study the (im)possibility… ▽ More

    Submitted 27 May, 2025; v1 submitted 7 November, 2023; originally announced November 2023.

    Comments: ICML 2024. Website: https://hanlin-zhang.com/impossibility-watermarks

  5. arXiv:2301.07628  [pdf, other

    cs.CR cs.LG

    Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

    Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso

    Abstract: We introduce the concept of "universal password model" -- a password model that, once pre-trained, can automatically adapt its guessing strategy based on the target system. To achieve this, the model does not need to access any plaintext passwords from the target credentials. Instead, it exploits users' auxiliary information, such as email addresses, as a proxy signal to predict the underlying pas… ▽ More

    Submitted 13 March, 2024; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: Appearing in the proceedings of the 45th IEEE Symposium on Security and Privacy S&P 2024

  6. arXiv:2111.07380  [pdf, other

    cs.LG cs.CR

    Eluding Secure Aggregation in Federated Learning via Model Inconsistency

    Authors: Dario Pasquini, Danilo Francati, Giuseppe Ateniese

    Abstract: Secure aggregation is a cryptographic protocol that securely computes the aggregation of its inputs. It is pivotal in keeping model updates private in federated learning. Indeed, the use of secure aggregation prevents the server from learning the value and the source of the individual model updates provided by the users, hampering inference and data attribution attacks. In this work, we show that… ▽ More

    Submitted 6 September, 2022; v1 submitted 14 November, 2021; originally announced November 2021.

    Comments: An abridged version of this paper appears in the proceedings of ACM Conference on Computer and Communications Security 2022 (CCS '22)

  7. arXiv:2012.02670  [pdf, other

    cs.CR cs.LG

    Unleashing the Tiger: Inference Attacks on Split Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption. In the present paper, we expose vulnerabilities of the protocol and demonstrate its inherent insecurity by introducing general attack strategies targeting the reconstruction of clients' private training sets. More prominently, w… ▽ More

    Submitted 4 November, 2021; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: ACM Conference on Computer and Communications Security 2021 (CCS21)

  8. arXiv:2010.12269  [pdf, other

    cs.CR cs.LG

    Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

    Authors: Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Password security hinges on an in-depth understanding of the techniques adopted by attackers. Unfortunately, real-world adversaries resort to pragmatic guessing strategies such as dictionary attacks that are inherently difficult to model in password security studies. In order to be representative of the actual threat, dictionary attacks must be thoughtfully configured and tuned. However, this proc… ▽ More

    Submitted 26 February, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: To appear in the proceedings of the 30th USENIX Security Symposium 2021

  9. arXiv:2004.07179  [pdf, other

    cs.CR cs.LG

    Interpretable Probabilistic Password Strength Meters via Deep Learning

    Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

    Abstract: Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength. Unfortunately, by construction, they are limited to solely produce an opaque security estimation that fails to fully support the user during the password composition. In the present work, we move the first steps towards cracking the intelligibility barrier of this compelling class of… ▽ More

    Submitted 11 May, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: An abridged version of this paper appears in the proceedings of the 25th European Symposium on Research in Computer Security (ESORICS) 2020

  10. arXiv:1911.08515  [pdf, other

    cs.CR

    Audita: A Blockchain-based Auditing Framework for Off-chain Storage

    Authors: Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano

    Abstract: The cloud changed the way we manage and store data. Today, cloud storage services offer clients an infrastructure that allows them a convenient source to store, replicate, and secure data online. However, with these new capabilities also come limitations, such as lack of transparency, limited decentralization, and challenges with privacy and security. And, as the need for more agile, private and s… ▽ More

    Submitted 3 July, 2020; v1 submitted 19 November, 2019; originally announced November 2019.

  11. arXiv:1910.04232  [pdf, other

    cs.CR

    Improving Password Guessing via Representation Learning

    Authors: Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti

    Abstract: Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. In this paper, we introduce a deep generative model representation learning approach for password guessing. We show that an abstract password represent… ▽ More

    Submitted 26 July, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: This paper appears in the proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland) S&P 2021

  12. arXiv:1906.05919  [pdf, other

    cs.CR

    Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains

    Authors: Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese

    Abstract: This work presents Arcula, a new design for hierarchical deterministic wallets that brings identity-based addresses to the blockchain. Arcula is built on top of provably secure cryptographic primitives. It generates all its cryptographic secrets from a user-provided seed and enables the derivation of new public keys based on the identities of users, without requiring any secret information. Unlike… ▽ More

    Submitted 10 December, 2019; v1 submitted 13 June, 2019; originally announced June 2019.

  13. arXiv:1709.00440  [pdf, other

    cs.CR cs.LG stat.ML

    PassGAN: A Deep Learning Approach for Password Guessing

    Authors: Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz

    Abstract: State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dictionaries using password generation rules, such as concatenation of words (e.g., "password123456") and leet speak (e.g., "password" becomes "p4s… ▽ More

    Submitted 14 February, 2019; v1 submitted 1 September, 2017; originally announced September 2017.

    Comments: This is an extended version of the paper which appeared in NeurIPS 2018 Workshop on Security in Machine Learning (SecML'18), see https://github.com/secml2018/secml2018.github.io/raw/master/PASSGAN_SECML2018.pdf

  14. arXiv:1702.07464  [pdf, other

    cs.CR cs.LG stat.ML

    Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

    Authors: Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz

    Abstract: Deep Learning has recently become hugely popular in machine learning, providing significant improvements in classification accuracy in the presence of highly-structured and large databases. Researchers have also considered privacy implications of deep learning. Models are typically trained in a centralized manner with all the data being processed by the same training algorithm. If the data is a… ▽ More

    Submitted 14 September, 2017; v1 submitted 24 February, 2017; originally announced February 2017.

    Comments: ACM CCS'17, 16 pages, 18 figures

  15. arXiv:1508.04868  [pdf, other

    cs.CR

    From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain

    Authors: Duane Wilson, Giuseppe Ateniese

    Abstract: PGP is built upon a Distributed Web of Trust in which the trustworthiness of a user is established by others who can vouch through a digital signature for that particular identity. Preventing its wholesale adoption are a number of inherent weaknesses to include (but not limited to) the following: 1) Trust Relationships are built on a subjective honor system, 2) Only first degree relationships can… ▽ More

    Submitted 20 August, 2015; v1 submitted 19 August, 2015; originally announced August 2015.

  16. arXiv:1505.07774  [pdf, other

    cs.CR

    No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position

    Authors: Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino V. Verde, Antonio Villani

    Abstract: News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature. In this paper, we propose a new adversary model for Location Based Services (LBSs). The model takes into account an unauthorized third party, different… ▽ More

    Submitted 4 September, 2015; v1 submitted 28 May, 2015; originally announced May 2015.

    Comments: 14 pages, 9th International Conference on Network and System Security (NSS 2015)

  17. arXiv:1404.2697  [pdf, ps, other

    cs.CR cs.DC

    To Share or Not to Share in Client-Side Encrypted Clouds

    Authors: Duane Wilson, Giuseppe Ateniese

    Abstract: With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations. SaaS (different than Software-as-a-Service in this context) refers to an architectural model in which a cloud provider provides digital storage on their own infrastructure. Three models exist amongst SaaS providers for pr… ▽ More

    Submitted 19 November, 2014; v1 submitted 10 April, 2014; originally announced April 2014.

    Journal ref: Information Security, Lecture Notes in Computer Science Volume 8783, 2014, pp 401-412

  18. arXiv:1402.1940  [pdf, other

    cs.CR

    No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

    Authors: Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi

    Abstract: It is generally recognized that the traffic generated by an individual connected to a network acts as his biometric signature. Several tools exploit this fact to fingerprint and monitor users. Often, though, these tools assume to access the entire traffic, including IP addresses and payloads. This is not feasible on the grounds that both performance and privacy would be negatively affected. In rea… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

  19. arXiv:1306.4447  [pdf, ps, other

    cs.CR cs.LG stat.ML

    Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

    Authors: Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali

    Abstract: Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience. Computers learn how to recognize patterns, make unintended decisions, or react to a dynamic environment. Certain trained machines may be more effective than others because they are based on more suitable ML algorithms or because they were trained through superior training… ▽ More

    Submitted 19 June, 2013; originally announced June 2013.