Skip to main content

Showing 1–34 of 34 results for author: Fernandes, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.07417  [pdf, ps, other

    cs.CR cs.AI cs.CL

    May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks

    Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes

    Abstract: A popular class of defenses against prompt injection attacks on large language models (LLMs) relies on fine-tuning the model to separate instructions and data, so that the LLM does not follow instructions that might be present with data. There are several academic systems and production-level implementations of this idea. We evaluate the robustness of this class of prompt injection defenses in the… ▽ More

    Submitted 10 July, 2025; originally announced July 2025.

  2. arXiv:2505.22401  [pdf

    cs.CY

    Facial Age Estimation: A Research Roadmap for Technological and Legal Development and Deployment

    Authors: Richard Guest, Eva Lievens, Martin Sas, Elena Botoeva, Temitope Adeyemo, Valerie Verdoodt, Elora Fernandes, Chris Allgrove

    Abstract: Automated facial age assessment systems operate in either estimation mode - predicting age based on facial traits, or verification mode - confirming a claimed age. These systems support access control to age-restricted goods, services, and content, and can be used in areas like e-commerce, social media, forensics, and refugee support. They may also personalise services in healthcare, finance, and… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  3. arXiv:2505.18925  [pdf, other

    cs.CV

    Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation

    Authors: Ross Greer, Alisha Ukani, Katherine Izhikevich, Earlence Fernandes, Stefan Savage, Alex C. Snoeren

    Abstract: Document alignment and registration play a crucial role in numerous real-world applications, such as automated form processing, anomaly detection, and workflow automation. Traditional methods for document alignment rely on image-based features like keypoints, edges, and textures to estimate geometric transformations, such as homographies. However, these approaches often require access to the origi… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

  4. Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-based Prompt Injection Attacks via the Fine-Tuning Interface

    Authors: Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes

    Abstract: We surface a new threat to closed-weight Large Language Models (LLMs) that enables an attacker to compute optimization-based prompt injections. Specifically, we characterize how an attacker can leverage the loss-like information returned from the remote fine-tuning interface to guide the search for adversarial prompts. The fine-tuning interface is hosted by an LLM vendor and allows developers to f… ▽ More

    Submitted 9 May, 2025; v1 submitted 16 January, 2025; originally announced January 2025.

    Journal ref: Proceedings of the 2025 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2025, pp. 374-392

  5. arXiv:2410.14923  [pdf, other

    cs.CR

    Imprompter: Tricking LLM Agents into Improper Tool Use

    Authors: Xiaohan Fu, Shuheng Li, Zihan Wang, Yihao Liu, Rajesh K. Gupta, Taylor Berg-Kirkpatrick, Earlence Fernandes

    Abstract: Large Language Model (LLM) Agents are an emerging computing paradigm that blends generative machine learning with tools such as code interpreters, web browsing, email, and more generally, external resources. These agent-based systems represent an emerging shift in personal computing. We contribute to the security foundations of agent-based systems and surface a new class of automatically computed… ▽ More

    Submitted 21 October, 2024; v1 submitted 18 October, 2024; originally announced October 2024.

    Comments: website: https://imprompter.ai code: https://github.com/Reapor-Yurnero/imprompter v2 changelog: add new results to Table 3, correct several typos

  6. arXiv:2312.10549  [pdf

    cs.LG cs.AI

    Catastrophic Forgetting in Deep Learning: A Comprehensive Taxonomy

    Authors: Everton L. Aleixo, Juan G. Colonna, Marco Cristo, Everlandio Fernandes

    Abstract: Deep Learning models have achieved remarkable performance in tasks such as image classification or generation, often surpassing human accuracy. However, they can struggle to learn new tasks and update their knowledge without access to previous data, leading to a significant loss of accuracy known as Catastrophic Forgetting (CF). This phenomenon was first observed by McCloskey and Cohen in 1989 and… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  7. arXiv:2310.03185  [pdf, other

    cs.CR cs.AI

    Misusing Tools in Large Language Models With Visual Adversarial Examples

    Authors: Xiaohan Fu, Zihan Wang, Shuheng Li, Rajesh K. Gupta, Niloofar Mireshghallah, Taylor Berg-Kirkpatrick, Earlence Fernandes

    Abstract: Large Language Models (LLMs) are being enhanced with the ability to use tools and to process multiple modalities. These new capabilities bring new benefits and also new security risks. In this work, we show that an attacker can use visual adversarial examples to cause attacker-desired tool usage. For example, the attacker could cause a victim LLM to delete calendar events, leak private conversatio… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  8. Faster Control Plane Experimentation with Horse

    Authors: Eder Leao Fernandes, Gianni Antichi, Timm Boettger, Ignacio Castro, Steve Uhlig

    Abstract: Simulation and emulation are popular approaches for experimentation in Computer Networks. However, due to their respective inherent drawbacks, existing solutions cannot perform both fast and realistic control plane experiments. To close this gap, we introduce Horse. Horse is a hybrid solution with an emulated control plane, for realism, and simulated data plane, for speed. Our decoupling of the co… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  9. arXiv:2305.04301  [pdf

    cs.SE

    On the perceived relevance of critical internal quality attributes when evolving software features

    Authors: Eduardo Fernandes, Marcos Kalinowski

    Abstract: Several refactorings performed while evolving software features aim to improve internal quality attributes like cohesion and complexity. Indeed, internal attributes can become critical if their measurements assume anomalous values. Yet, current knowledge is scarce on how developers perceive the relevance of critical internal attributes while evolving features. This qualitative study investigates t… ▽ More

    Submitted 7 May, 2023; originally announced May 2023.

  10. arXiv:2212.08738  [pdf, other

    cs.CR cs.LG

    SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks

    Authors: Ashish Hooda, Matthew Wallace, Kushal Jhunjhunwalla, Earlence Fernandes, Kassem Fawaz

    Abstract: Voice assistants are deployed widely and provide useful functionality. However, recent work has shown that commercial systems like Amazon Alexa and Google Home are vulnerable to voice-based confusion attacks that exploit design issues. We propose a systems-oriented defense against this class of attacks and demonstrate its functionality for Amazon Alexa. We ensure that only the skills a user intend… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

  11. arXiv:2212.04107  [pdf, other

    cs.CR cs.CV

    Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

    Authors: Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes

    Abstract: Content scanning systems employ perceptual hashing algorithms to scan user content for illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing algorithms help determine whether two images are visually similar while preserving the privacy of the input images. Several efforts from industry and academia propose to conduct content scanning on client devices such… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  12. arXiv:2203.04427  [pdf, other

    cs.CR

    Experimental Security Analysis of the App Model in Business Collaboration Platforms

    Authors: Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes

    Abstract: Business Collaboration Platforms like Microsoft Teams and Slack enable teamwork by supporting text chatting and third-party resource integration. A user can access online file storage, make video calls, and manage a code repository, all from within the platform, thus making them a hub for sensitive communication and resources. The key enabler for these productivity features is a third-party applic… ▽ More

    Submitted 22 October, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  13. arXiv:2102.07265  [pdf, other

    cs.LG cs.AI

    Exploring Adversarial Robustness of Deep Metric Learning

    Authors: Thomas Kobber Panum, Zi Wang, Pengyu Kan, Earlence Fernandes, Somesh Jha

    Abstract: Deep Metric Learning (DML), a widely-used technique, involves learning a distance metric between pairs of samples. DML uses deep neural architectures to learn semantic embeddings of the input, where the distance between similar examples is small while dissimilar ones are far apart. Although the underlying neural networks produce good accuracy on naturally occurring samples, they are vulnerable to… ▽ More

    Submitted 14 February, 2021; originally announced February 2021.

  14. arXiv:2012.08704  [pdf, other

    cs.RO cs.AI cs.LG

    Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems

    Authors: Yuzhe Ma, Jon Sharp, Ruizhe Wang, Earlence Fernandes, Xiaojin Zhu

    Abstract: Kalman Filter (KF) is widely used in various domains to perform sequential learning or variable estimation. In the context of autonomous vehicles, KF constitutes the core component of many Advanced Driver Assistance Systems (ADAS), such as Forward Collision Warning (FCW). It tracks the states (distance, velocity etc.) of relevant traffic objects based on sensor measurements. The tracking output of… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

    Comments: Accepted by AAAI21

  15. arXiv:2012.05749  [pdf, other

    cs.CR

    Data Privacy in Trigger-Action Systems

    Authors: Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes

    Abstract: Trigger-action platforms (TAPs) allow users to connect independent web-based or IoT services to achieve useful automation. They provide a simple interface that helps end-users create trigger-compute-action rules that pass data between disparate Internet services. Unfortunately, TAPs introduce a large-scale security risk: if they are compromised, attackers will gain access to sensitive data for mil… ▽ More

    Submitted 24 May, 2021; v1 submitted 10 December, 2020; originally announced December 2020.

  16. arXiv:2011.13375  [pdf, other

    cs.CV cs.CR cs.LG

    Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect

    Authors: Athena Sayles, Ashish Hooda, Mohit Gupta, Rahul Chatterjee, Earlence Fernandes

    Abstract: Physical adversarial examples for camera-based computer vision have so far been achieved through visible artifacts -- a sticker on a Stop sign, colorful borders around eyeglasses or a 3D printed object with a colorful texture. An implicit assumption here is that the perturbations must be visible so that a camera can sense them. By contrast, we contribute a procedure to generate, for the first time… ▽ More

    Submitted 18 April, 2021; v1 submitted 26 November, 2020; originally announced November 2020.

  17. arXiv:2002.07088  [pdf, other

    cs.CR cs.CV cs.LG

    GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems

    Authors: Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash

    Abstract: This paper investigates an adversary's ease of attack in generating adversarial examples for real-world scenarios. We address three key requirements for practical attacks for the real-world: 1) automatically constraining the size and shape of the attack so it can be applied with stickers, 2) transform-robustness, i.e., robustness of a attack to environmental physical variations such as viewpoint a… ▽ More

    Submitted 28 February, 2022; v1 submitted 17 February, 2020; originally announced February 2020.

    Comments: IEEE European Symposium on Security and Privacy 2022 (EuroS&P 2022)

  18. arXiv:1910.03686  [pdf, ps, other

    cs.CR

    New Problems and Solutions in IoT Security and Privacy

    Authors: Earlence Fernandes, Amir Rahmati, Nick Feamster

    Abstract: In a previous article for S&P magazine, we made a case for the new intellectual challenges in the Internet of Things security research. In this article, we revisit our earlier observations and discuss a few results from the computer security community that tackle new issues. Using this sampling of recent work, we identify a few broad general themes for future work.

    Submitted 8 October, 2019; originally announced October 2019.

  19. arXiv:1909.06192  [pdf, ps, other

    cs.NI

    An Empirical Study of the Cost of DNS-over-HTTPS

    Authors: Timm Boettger, Felix Cuadrado, Gianni Antichi, Eder Leao Fernandes, Gareth Tyson, Ignacio Castro, Steve Uhlig

    Abstract: DNS is a vital component for almost every networked application. Originally it was designed as an unencrypted protocol, making user security a concern. DNS-over-HTTPS (DoH) is the latest proposal to make name resolution more secure. In this paper we study the current DNS-over-HTTPS ecosystem, especially the cost of the additional security. We start by surveying the current DoH landscape by assessi… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Journal ref: ACM Internet Measurement Conference 2019 (IMC)

  20. arXiv:1905.12429  [pdf, other

    cs.LG cs.AI stat.ML

    Analyzing the Interpretability Robustness of Self-Explaining Models

    Authors: Haizhong Zheng, Earlence Fernandes, Atul Prakash

    Abstract: Recently, interpretable models called self-explaining models (SEMs) have been proposed with the goal of providing interpretability robustness. We evaluate the interpretability robustness of SEMs and show that explanations provided by SEMs as currently proposed are not robust to adversarial inputs. Specifically, we successfully created adversarial inputs that do not change the model outputs but cau… ▽ More

    Submitted 2 July, 2020; v1 submitted 27 May, 2019; originally announced May 2019.

  21. arXiv:1901.06699  [pdf, other

    cs.NI

    The Road to BOFUSS: The Basic OpenFlow User-space Software Switch

    Authors: Eder Leao Fernandes, Elisa Rojas, Joaquin Alvarez-Horcajo, Zoltan Lajos Kis, Davide Sanvito, Nicola Bonelli, Carmelo Cascone, Christian Esteve Rothenberg

    Abstract: Software switches are pivotal in the Software-Defined Networking (SDN) paradigm, particularly in the early phases of development, deployment and testing. Currently, the most popular one is Open vSwitch (OVS), leveraged in many production-based environments. However, due to its kernel-based nature, OVS is typically complex to modify when additional features or adaptation is required. To this regard… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 24 pages, 7 figures; submitted to Telecommunications Systems journal

  22. arXiv:1810.10963  [pdf, other

    cs.NI

    Shaping the Internet: 10 Years of IXP Growth

    Authors: Timm Böttger, Gianni Antichi, Eder L. Fernandes, Roberto di Lallo, Marc Bruyere, Steve Uhlig, Gareth Tyson, Ignacio Castro

    Abstract: Over the past decade, IXPs have been playing a key role in enabling interdomain connectivity. Their traffic volumes have grown dramatically and their physical presence has spread throughout the world. While the relevance of IXPs is undeniable, their long-term contribution to the shaping of the current Internet is not fully understood yet. In this paper, we look into the impact on Internet routes… ▽ More

    Submitted 8 July, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

  23. arXiv:1809.06962  [pdf, other

    cs.CR cs.PL

    Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

    Authors: Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick McDaniel

    Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive---new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digita… ▽ More

    Submitted 24 December, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: syntax and grammar error are fixed, and IoT platforms are updated to match with the submission

  24. arXiv:1807.07769  [pdf, other

    cs.CR cs.CV cs.LG

    Physical Adversarial Examples for Object Detectors

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, Dawn Song

    Abstract: Deep neural networks (DNNs) are vulnerable to adversarial examples-maliciously crafted inputs that cause DNNs to make incorrect predictions. Recent work has shown that these attacks generalize to the physical domain, to create perturbations on physical objects that fool image classifiers under a variety of real-world conditions. Such attacks pose a risk to deep learning models used in safety-criti… ▽ More

    Submitted 5 October, 2018; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: This paper is the extended version of the USENIX WOOT 2018 version

  25. arXiv:1801.04609  [pdf, other

    cs.CR

    Tyche: Risk-Based Permissions for Smart Home Platforms

    Authors: Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash

    Abstract: Emerging smart home platforms, which interface with a variety of physical devices and support third-party application development, currently use permission models inspired by smartphone operating systems-they group functionally similar device operations into separate units, and require users to grant apps access to devices at that granularity. Unfortunately, this leads to two issues: (1) apps that… ▽ More

    Submitted 3 December, 2018; v1 submitted 14 January, 2018; originally announced January 2018.

  26. arXiv:1712.08062  [pdf, other

    cs.CR cs.CV cs.LG

    Note on Attacking Object Detectors with Adversarial Stickers

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramer

    Abstract: Deep learning has proven to be a powerful tool for computer vision and has seen widespread adoption for numerous tasks. However, deep learning algorithms are known to be vulnerable to adversarial examples. These adversarial inputs are created such that, when provided to a deep learning algorithm, they are very likely to be mislabeled. This can be problematic when deep learning is used to assist in… ▽ More

    Submitted 23 July, 2018; v1 submitted 21 December, 2017; originally announced December 2017.

    Comments: Short Note: The full version of this paper was accepted to USENIX WOOT 2018, and is available at arXiv:1807.07769

  27. arXiv:1709.02788  [pdf, other

    cs.CR

    IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks

    Authors: Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash

    Abstract: The growing popularity of online services and IoT platforms along with increased developer's access to devices and services through RESTful APIs is giving rise to a new class of frameworks that support trigger-action programming. These frameworks provide an interface for end-users to bridge different RESTful APIs in a trigger-action model and easily create automated tasks across diverse platforms.… ▽ More

    Submitted 8 September, 2017; originally announced September 2017.

  28. A Rational Agent Controlling an Autonomous Vehicle: Implementation and Formal Verification

    Authors: Lucas E. R. Fernandes, Vinicius Custodio, Gleifer V. Alves, Michael Fisher

    Abstract: The development and deployment of Autonomous Vehicles (AVs) on our roads is not only realistic in the near future but can also bring significant benefits. In particular, it can potentially solve several problems relating to vehicles and traffic, for instance: (i) possible reduction of traffic congestion, with the consequence of improved fuel economy and reduced driver inactivity; (ii) possible red… ▽ More

    Submitted 8 September, 2017; originally announced September 2017.

    Comments: In Proceedings FVAV 2017, arXiv:1709.02126

    Journal ref: EPTCS 257, 2017, pp. 35-42

  29. arXiv:1707.08945  [pdf, other

    cs.CR cs.LG

    Robust Physical-World Attacks on Deep Learning Models

    Authors: Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song

    Abstract: Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added to the input. Given that that emerging physical systems are using DNNs in safety-critical situations, adversarial examples could mislead these systems and cause dangerous situations.Therefore, understanding adversarial examples in the… ▽ More

    Submitted 10 April, 2018; v1 submitted 27 July, 2017; originally announced July 2017.

    Comments: Accepted to CVPR 2018

  30. arXiv:1707.00405  [pdf, other

    cs.CR

    Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things

    Authors: Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash

    Abstract: Trigger-Action platforms are an emerging class of web-based systems that enable users to create automation rules (or recipes) of the form, "If there is a smoke alarm, then turn off my oven." These platforms stitch together various online services including Internet of Things devices, social networks, and productivity tools by obtaining OAuth tokens on behalf of users. Unfortunately, these platform… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

  31. arXiv:1705.08522  [pdf, ps, other

    cs.CR

    Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?

    Authors: Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash

    Abstract: The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles? And, what are the new problems and challenges in this… ▽ More

    Submitted 18 July, 2017; v1 submitted 23 May, 2017; originally announced May 2017.

    Comments: published at IEEE Security and Privacy Magazine, July 2017: Systems Attacks and Defenses

  32. arXiv:1609.00878  [pdf, ps, other

    cs.CV cs.LG stat.ML

    A Probabilistic Optimum-Path Forest Classifier for Binary Classification Problems

    Authors: Silas E. N. Fernandes, Danillo R. Pereira, Caio C. O. Ramos, Andre N. Souza, Joao P. Papa

    Abstract: Probabilistic-driven classification techniques extend the role of traditional approaches that output labels (usually integer numbers) only. Such techniques are more fruitful when dealing with problems where one is not interested in recognition/identification only, but also into monitoring the behavior of consumers and/or machines, for instance. Therefore, by means of probability estimates, one can… ▽ More

    Submitted 3 September, 2016; originally announced September 2016.

    Comments: Submitted to Neural Processing Letters

  33. arXiv:1401.6726  [pdf, other

    cs.CR cs.OS

    Anception: Application Virtualization For Android

    Authors: Earlence Fernandes, Alexander Crowell, Ajit Aluri, Atul Prakash

    Abstract: The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant chal- lenge for several reasons: (1) graphics performance is important due to popularity of games and… ▽ More

    Submitted 26 January, 2014; originally announced January 2014.

    Comments: University of Michigan, Technical Report CSE-TR-583-13

    Report number: CSE-TR-583-13

  34. Modeling the input history of programs for improved instruction-memory performance

    Authors: C. A. G. Assis, E. S. T. Fernandes, V. C. Barbosa

    Abstract: When a program is loaded into memory for execution, the relative position of its basic blocks is crucial, since loading basic blocks that are unlikely to be executed first places them high in the instruction-memory hierarchy only to be dislodged as the execution goes on. In this paper we study the use of Bayesian networks as models of the input history of a program. The main point is the creatio… ▽ More

    Submitted 23 November, 2004; originally announced November 2004.

    Report number: ES-662/04 ACM Class: B.3.2

    Journal ref: Computer Journal 49 (2006), 744-761