Skip to main content

Showing 1–11 of 11 results for author: Gunn, L J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17548  [pdf, other

    cs.CR

    Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations

    Authors: Vasisht Duddu, Oskari Järvinen, Lachlan J Gunn, N Asokan

    Abstract: Regulations increasingly call for various assurances from machine learning (ML) model providers about their training data, training process, and model behavior. For better transparency, industry (e.g., Huggingface and Google) has adopted model cards and datasheets to describe various properties of training datasets and models. In the same vein, we introduce the notion of inference cards to describ… ▽ More

    Submitted 5 March, 2025; v1 submitted 25 June, 2024; originally announced June 2024.

    Comments: ACM Conference on Data and Application Security and Privacy (CODASPY), 2025

  2. Data-Oblivious ML Accelerators using Hardware Security Extensions

    Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan

    Abstract: Outsourced computation can put client data confidentiality at risk. Existing solutions are either inefficient or insufficiently secure: cryptographic techniques like fully-homomorphic encryption incur significant overheads, even with hardware assistance, while the complexity of hardware-assisted trusted execution environments has been exploited to leak secret data. Recent proposals such as BliMe… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Journal ref: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2024, pp. 373-377

  3. arXiv:2210.11340  [pdf, ps, other

    cs.CR

    Towards cryptographically-authenticated in-memory data structures

    Authors: Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

    Abstract: Modern processors include high-performance cryptographic functionalities such as Intel's AES-NI and ARM's Pointer Authentication that allow programs to efficiently authenticate data held by the program. Pointer Authentication is already used to protect return addresses in recent Apple devices, but as yet these structures have seen little use for the protection of general program data. In this pa… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Presented at the 2022 IEEE Secure Development Conference. Copyright 2022 IEEE

  4. BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

    Authors: Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

    Abstract: Outsourced computing is widely used today. However, current approaches for protecting client data in outsourced computing fall short: use of cryptographic techniques like fully-homomorphic encryption incurs substantial costs, whereas use of hardware-assisted trusted execution environments has been shown to be vulnerable to run-time and side-channel attacks. We present Blinded Memory (BliMe), an… ▽ More

    Submitted 29 November, 2023; v1 submitted 20 April, 2022; originally announced April 2022.

    Comments: Accepted for publication at the Network and Distributed System Security (NDSS) Symposium 2024

  5. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

    Authors: Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi

    Abstract: Autonomous collaborative networks of devices are rapidly emerging in numerous domains, such as self-driving cars, smart factories, critical infrastructure, and Internet of Things in general. Although autonomy and self-organization are highly desired properties, they increase vulnerability to attacks. Hence, autonomous networks need dependable mechanisms to detect malicious devices in order to prev… ▽ More

    Submitted 1 August, 2023; v1 submitted 11 October, 2019; originally announced October 2019.

    Journal ref: RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, October 2021, Pages 220-234

  6. arXiv:1905.10255  [pdf, other

    cs.CR

    Making Speculative BFT Resilient with Trusted Monotonic Counters

    Authors: Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan

    Abstract: Consensus mechanisms used by popular distributed ledgers are highly scalable but notoriously inefficient. Byzantine fault tolerance (BFT) protocols are efficient but far less scalable. Speculative BFT protocols such as Zyzzyva and Zyzzyva5 are efficient and scalable but require a trade-off: Zyzzyva requires only $3f + 1$ replicas to tolerate $f$ faults, but even a single slow replica will make Zyz… ▽ More

    Submitted 13 October, 2019; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  7. arXiv:1905.10242  [pdf, other

    cs.CR

    PACStack: an Authenticated Call Stack

    Authors: Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan

    Abstract: A popular run-time attack technique is to compromise the control-flow integrity of a program by modifying function return addresses on the stack. So far, shadow stacks have proven to be essential for comprehensively preventing return address manipulation. Shadow stacks record return addresses in integrity-protected memory secured with hardware-assistance or software access control. Software shadow… ▽ More

    Submitted 15 October, 2020; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: Author's version of article to appear in USENIX Security '21

  8. Game theoretical modelling of network/cybersecurity

    Authors: Azhar Iqbal, Lachlan J. Gunn, Mingyu Guo, M. Ali Babar, Derek Abbott

    Abstract: Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of decision makers in security problems who compete for limited and shared resources. This article presents a review of the literature in the area of game theoretical modelling of network/cybersecurity.

    Submitted 19 October, 2019; v1 submitted 24 January, 2019; originally announced January 2019.

    Comments: Revised, 21 pages, to appear in IEEE Access

    Journal ref: IEEE Access, Vol. 7, pp 154167-154179 (2019)

  9. arXiv:1602.03316  [pdf, other

    cs.CR

    Safety in Numbers: Anonymization Makes Centralized Systems Trustworthy

    Authors: Lachlan J. Gunn, Andrew Allison, Derek Abbott

    Abstract: Decentralized systems can be more resistant to operator mischief than centralized ones, but they are substantially harder to develop, deploy, and maintain. This cost is dramatically reduced if the decentralized part of the system can be made highly generic, and thus incorporated into many different applications. We show how existing anonymization systems can serve this purpose, securing a public d… ▽ More

    Submitted 8 May, 2017; v1 submitted 10 February, 2016; originally announced February 2016.

  10. arXiv:1402.2709  [pdf, ps, other

    cs.CR

    A directional coupler attack against the Kish key distribution system

    Authors: Lachlan J. Gunn, Andrew Allison, Derek Abbott

    Abstract: The Kish key distribution system has been proposed as a class ical alternative to quantum key distribution. The idealized Kish scheme elegantly promise s secure key distribution by exploiting thermal noise in a transmission line. However, we demonstrate that it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission line connecting its endpoints. We intr… ▽ More

    Submitted 19 May, 2014; v1 submitted 11 February, 2014; originally announced February 2014.

  11. Physical-layer encryption on the public internet: a stochastic approach to the Kish-Sethuraman cipher

    Authors: Lachlan J. Gunn, James M. Chappell, Andrew Allison, Derek Abbott

    Abstract: While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically s… ▽ More

    Submitted 18 June, 2013; originally announced June 2013.

    Comments: 7 pages, 3 figures, to be presented at HotPI-2013