Skip to main content

Showing 1–6 of 6 results for author: Hengartner, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.16598  [pdf, other

    cs.CR cs.CV cs.LG

    DiffBreak: Is Diffusion-Based Purification Robust?

    Authors: Andre Kassis, Urs Hengartner, Yaoliang Yu

    Abstract: Diffusion-based purification (DBP) has become a cornerstone defense against adversarial examples (AEs), regarded as robust due to its use of diffusion models (DMs) that project AEs onto the natural data manifold. We refute this core claim, theoretically proving that gradient-based attacks effectively target the DM rather than the classifier, causing DBP's outputs to align with adversarial distribu… ▽ More

    Submitted 23 May, 2025; v1 submitted 25 November, 2024; originally announced November 2024.

  2. UnMarker: A Universal Attack on Defensive Image Watermarking

    Authors: Andre Kassis, Urs Hengartner

    Abstract: Reports regarding the misuse of Generative AI (GenAI) to create deepfakes are frequent. Defensive watermarking enables GenAI providers to hide fingerprints in their images and use them later for deepfake detection. Yet, its potential has not been fully explored. We present UnMarker -- the first practical universal attack on defensive watermarking. Unlike existing attacks, UnMarker requires no dete… ▽ More

    Submitted 22 November, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

    Comments: To appear at IEEE S&P 2025

  3. arXiv:2312.06802  [pdf, other

    cs.CR cs.RO

    On the Feasibility of Fingerprinting Collaborative Robot Network Traffic

    Authors: Cheng Tang, Diogo Barradas, Urs Hengartner, Yue Hu

    Abstract: This study examines privacy risks in collaborative robotics, focusing on the potential for traffic analysis in encrypted robot communications. While previous research has explored low-level command recovery in teleoperation setups, our work investigates high-level motion recovery from script-based control interfaces. We evaluate the efficacy of prominent website fingerprinting techniques (e.g., Ti… ▽ More

    Submitted 7 March, 2025; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: 22 pages

  4. arXiv:2107.14642  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Practical Attacks on Voice Spoofing Countermeasures

    Authors: Andre Kassis, Urs Hengartner

    Abstract: Voice authentication has become an integral part in security-critical operations, such as bank transactions and call center conversations. The vulnerability of automatic speaker verification systems (ASVs) to spoofing attacks instigated the development of countermeasures (CMs), whose task is to tell apart bonafide and spoofed speech. Together, ASVs and CMs form today's voice authentication platfor… ▽ More

    Submitted 30 July, 2021; originally announced July 2021.

  5. arXiv:2010.12112  [pdf, other

    cs.CR cs.LG

    Investigating Membership Inference Attacks under Data Dependencies

    Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum

    Abstract: Training machine learning models on privacy-sensitive data has become a popular practice, driving innovation in ever-expanding fields. This has opened the door to new attacks that can have serious privacy implications. One such attack, the Membership Inference Attack (MIA), exposes whether or not a particular data point was used to train a model. A growing body of literature uses Differentially Pr… ▽ More

    Submitted 14 June, 2023; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: IEEE 36th Computer Security Foundations Symposium (CSF)

  6. arXiv:1410.7746  [pdf

    cs.CR

    Two Novel Defenses against Motion-Based Keystroke Inference Attacks

    Authors: Yihang Song, Madhur Kukreti, Rahul Rawat, Urs Hengartner

    Abstract: Nowadays smartphones come embedded with multiple motion sensors, such as an accelerometer, a gyroscope and an orientation sensor. With these sensors, apps can gather more information and therefore provide end users with more functionality. However, these sensors also introduce the potential risk of leaking a user's private information because apps can access these sensors without requiring securit… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)

    Report number: MoST/2014/05