Skip to main content

Showing 1–14 of 14 results for author: Eisenhofer, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.15942  [pdf, other

    cs.CR cs.LG

    Adversarial Observations in Weather Forecasting

    Authors: Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck

    Abstract: AI-based systems, such as Google's GenCast, have recently redefined the state of the art in weather forecasting, offering more accurate and timely predictions of both everyday weather and extreme events. While these systems are on the verge of replacing traditional meteorological methods, they also introduce new vulnerabilities into the forecasting process. In this paper, we investigate this threa… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

  2. SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing

    Authors: Felix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck

    Abstract: A common paradigm for improving fuzzing performance is to focus on selected regions of a program rather than its entirety. While previous work has largely explored how these locations can be reached, their selection, that is, the where, has received little attention so far. A common paradigm for improving fuzzing performance is to focus on selected regions of a program rather than its entirety. Wh… ▽ More

    Submitted 12 February, 2025; originally announced February 2025.

    Journal ref: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (2024) 1539-1553

  3. arXiv:2409.11026  [pdf, other

    cs.CR cs.LG

    Prompt Obfuscation for Large Language Models

    Authors: David Pape, Sina Mavali, Thorsten Eisenhofer, Lea Schönherr

    Abstract: System prompts that include detailed instructions to describe the task performed by the underlying LLM can easily transform foundation models into tools and services with minimal overhead. Because of their crucial impact on the utility, they are often considered intellectual property, similar to the code of a software product. However, extracting system prompts is easily possible. As of today, the… ▽ More

    Submitted 29 January, 2025; v1 submitted 17 September, 2024; originally announced September 2024.

  4. arXiv:2402.06922  [pdf, other

    cs.CR cs.LG

    Whispers in the Machine: Confidentiality in LLM-integrated Systems

    Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer

    Abstract: Large Language Models (LLMs) are increasingly augmented with external tools and commercial services into LLM-integrated systems. While these interfaces can significantly enhance the capabilities of the models, they also introduce a new attack surface. Manipulated integrations, for example, can exploit the model and compromise sensitive data accessed through other interfaces. While previous work pr… ▽ More

    Submitted 6 November, 2024; v1 submitted 10 February, 2024; originally announced February 2024.

  5. arXiv:2312.05976  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    A Representative Study on Human Detection of Artificially Generated Media Across Countries

    Authors: Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

    Abstract: AI-generated media has become a threat to our digital society as we know it. These forgeries can be created automatically and on a large scale based on publicly available technology. Recognizing this challenge, academics and practitioners have proposed a multitude of automatic detection strategies to detect such artificial media. However, in contrast to these technical advances, the human percepti… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: Security and Privacy 2024 (S&P 24)

  6. arXiv:2305.05293  [pdf, ps, other

    cs.LG cs.CR

    On the Limitations of Model Stealing with Uncertainty Quantification Models

    Authors: David Pape, Sina Däubener, Thorsten Eisenhofer, Antonio Emanuele Cinà, Lea Schönherr

    Abstract: Model stealing aims at inferring a victim model's functionality at a fraction of the original training cost. While the goal is clear, in practice the model's architecture, weight dimension, and original training data can not be determined exactly, leading to mutual uncertainty during stealing. In this work, we explicitly tackle this uncertainty by generating multiple possible networks and combinin… ▽ More

    Submitted 18 August, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: 6 pages, 1 figure, 2 table, paper submitted to European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning

  7. arXiv:2303.14443  [pdf, other

    cs.CR cs.LG

    No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning

    Authors: Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck

    Abstract: The number of papers submitted to academic conferences is steadily rising in many scientific disciplines. To handle this growth, systems for automatic paper-reviewer assignments are increasingly used during the reviewing process. These systems use statistical topic models to characterize the content of submissions and automate the assignment to reviewers. In this paper, we show that this automatio… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: Accepted at USENIX Security Symposium 2023

  8. arXiv:2212.10318  [pdf, other

    cs.CR cs.LG

    Learned Systems Security

    Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot

    Abstract: A learned system uses machine learning (ML) internally to improve performance. We can expect such systems to be vulnerable to some adversarial-ML attacks. Often, the learned component is shared between mutually-distrusting users or processes, much like microarchitectural resources such as caches, potentially giving rise to highly-realistic attacker models. However, compared to attacks on other ML-… ▽ More

    Submitted 10 January, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

  9. arXiv:2210.09126  [pdf, ps, other

    cs.LG

    Verifiable and Provably Secure Machine Unlearning

    Authors: Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot

    Abstract: Machine unlearning aims to remove points from the training dataset of a machine learning model after training: e.g., when a user requests their data to be deleted. While many unlearning methods have been proposed, none of them enable users to audit the procedure. Furthermore, recent work shows a user is unable to verify whether their data was unlearnt from an inspection of the model parameter alon… ▽ More

    Submitted 5 March, 2025; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted at IEEE SaTML2025

  10. arXiv:2102.05431  [pdf, other

    cs.CR cs.LG cs.SD

    Dompteur: Taming Audio Adversarial Examples

    Authors: Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

    Abstract: Adversarial examples seem to be inevitable. These specifically crafted inputs allow attackers to arbitrarily manipulate machine learning systems. Even worse, they often seem harmless to human observers. In our digital society, this poses a significant threat. For example, Automatic Speech Recognition (ASR) systems, which serve as hands-free interfaces to many kinds of systems, can be attacked with… ▽ More

    Submitted 3 June, 2021; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX Security Symposium 2021

  11. arXiv:2010.10682  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    VenoMave: Targeted Poisoning Against Speech Recognition

    Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna

    Abstract: Despite remarkable improvements, automatic speech recognition is susceptible to adversarial perturbations. Compared to standard machine learning architectures, these attacks are significantly more challenging, especially since the inputs to a speech recognition system are time series that contain both acoustic and linguistic properties of speech. Extracting all recognition-relevant information req… ▽ More

    Submitted 20 April, 2023; v1 submitted 20 October, 2020; originally announced October 2020.

  12. arXiv:2008.00508  [pdf, other

    cs.CR

    Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers

    Authors: Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz

    Abstract: Voice assistants like Amazon's Alexa, Google's Assistant, or Apple's Siri, have become the primary (voice) interface in smart speakers that can be found in millions of households. For privacy reasons, these speakers analyze every sound in their environment for their respective wake word like ''Alexa'' or ''Hey Siri,'' before uploading the audio stream to the cloud for further processing. Previous… ▽ More

    Submitted 2 August, 2020; originally announced August 2020.

  13. arXiv:2003.08685  [pdf, other

    cs.CV eess.IV

    Leveraging Frequency Analysis for Deep Fake Image Recognition

    Authors: Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, Thorsten Holz

    Abstract: Deep neural networks can generate images that are astonishingly realistic, so much so that it is often hard for humans to distinguish them from actual photos. These achievements have been largely made possible by Generative Adversarial Networks (GANs). While deep fake images have been thoroughly investigated in the image domain - a classical approach from the area of image forensics - an analysis… ▽ More

    Submitted 26 June, 2020; v1 submitted 19 March, 2020; originally announced March 2020.

    Comments: Accepted to ICML 2020. New experiments, updated several sections, code: https://github.com/RUB-SysSec/GANDCTAnalysis

  14. arXiv:1908.01551  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

    Authors: Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa

    Abstract: Automatic speech recognition (ASR) systems can be fooled via targeted adversarial examples, which induce the ASR to produce arbitrary transcriptions in response to altered audio signals. However, state-of-the-art adversarial examples typically have to be fed into the ASR system directly, and are not successful when played in a room. The few published over-the-air adversarial examples fall into one… ▽ More

    Submitted 24 November, 2020; v1 submitted 5 August, 2019; originally announced August 2019.