Skip to main content

Showing 1–8 of 8 results for author: Boucher, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.09742  [pdf, other

    cs.CR

    Automatic Bill of Materials

    Authors: Nicholas Boucher, Ross Anderson

    Abstract: Ensuring the security of software supply chains requires reliable identification of upstream dependencies. We present the Automatic Bill of Materials, or ABOM, a technique for embedding dependency metadata in binaries at compile time. Rather than relying on developers to explicitly enumerate dependency names and versions, ABOM embeds a hash of each distinct input source code file into the binary e… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

  2. arXiv:2306.07033  [pdf, other

    cs.CR cs.LG

    When Vision Fails: Text Attacks Against ViT and OCR

    Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot

    Abstract: While text-based machine learning models that operate on visual inputs of rendered text have become robust against a wide range of existing attacks, we show that they are still vulnerable to visual adversarial examples encoded as text. We use the Unicode functionality of combining diacritical marks to manipulate encoded text so that small visual perturbations appear when the text is rendered. We s… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  3. arXiv:2305.04755  [pdf, other

    cs.CR

    If it's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard

    Authors: Ross Anderson, Nicholas Boucher

    Abstract: In this paper we're going to explore the ways in which security proofs can fail, and their broader lessons for security engineering. To mention just one example, Larry Paulson proved the security of SSL/TLS using his theorem prover Isabelle in 1999, yet it's sprung multiple leaks since then, from timing attacks to Heartbleed. We will go through a number of other examples in the hope of elucidating… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: To appear in the 28th International Workshop on Security Protocols

  4. Boosting Big Brother: Attacking Search Engines with Encodings

    Authors: Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti

    Abstract: Search engines are vulnerable to attacks against indexing and searching via text encoding manipulation. By imperceptibly perturbing text using uncommon encoded representations, adversaries can control results across search engines for specific search queries. We demonstrate that this attack is successful against two major commercial search engines - Google and Bing - and one open source search eng… ▽ More

    Submitted 27 July, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: To appear in the 26th Symposium on Research in Attacks, Intrusions and Defenses (RAID). Revisions: Adds table summarizing attacks

  5. arXiv:2301.05653  [pdf, other

    cs.CR

    Threat Models over Space and Time: A Case Study of E2EE Messaging Applications

    Authors: Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross Anderson, Awais Rashid

    Abstract: Threat modelling is foundational to secure systems engineering and should be done in consideration of the context within which systems operate. On the other hand, the continuous evolution of both the technical sophistication of threats and the system attack surface is an inescapable reality. In this work, we explore the extent to which real-world systems engineering reflects the changing threat co… ▽ More

    Submitted 28 May, 2023; v1 submitted 13 January, 2023; originally announced January 2023.

  6. Talking Trojan: Analyzing an Industry-Wide Disclosure

    Authors: Nicholas Boucher, Ross Anderson

    Abstract: While vulnerability research often focuses on technical findings and post-public release industrial response, we provide an analysis of the rest of the story: the coordinated disclosure process from discovery through public release. The industry-wide 'Trojan Source' vulnerability which affected most compilers, interpreters, code editors, and code repositories provided an interesting natural experi… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

  7. arXiv:2111.00169  [pdf, other

    cs.CR cs.PL

    Trojan Source: Invisible Vulnerabilities

    Authors: Nicholas Boucher, Ross Anderson

    Abstract: We present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by… ▽ More

    Submitted 8 March, 2023; v1 submitted 30 October, 2021; originally announced November 2021.

    Comments: To appear in the 32nd USENIX Security Symposium. Revisions: Adds 4 languages, 2 encodings, threat model, & scanning details

  8. arXiv:2106.09898  [pdf, other

    cs.CL cs.CR cs.LG

    Bad Characters: Imperceptible NLP Attacks

    Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot

    Abstract: Several years of research have shown that machine-learning systems are vulnerable to adversarial examples, both in theory and in practice. Until now, such attacks have primarily targeted visual models, exploiting the gap between human and machine perception. Although text-based models have also been attacked with adversarial examples, such attacks struggled to preserve semantic meaning and indisti… ▽ More

    Submitted 10 December, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: To appear in the 43rd IEEE Symposium on Security and Privacy. Revisions: NER & sentiment analysis experiments, previous work comparison, defense evaluation