Skip to main content

Showing 1–16 of 16 results for author: Kallas, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.08152  [pdf, other

    cs.CV

    Energy Backdoor Attack to Deep Neural Networks

    Authors: Hanene F. Z. Brachemi Meftah, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Déforges, Kassem Kallas

    Abstract: The rise of deep learning (DL) has increased computing complexity and energy use, prompting the adoption of application specific integrated circuits (ASICs) for energy-efficient edge and mobile deployment. However, recent studies have demonstrated the vulnerability of these accelerators to energy attacks. Despite the development of various inference time energy attacks in prior research, backdoor… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

  2. arXiv:2412.12739  [pdf, other

    cs.LG cs.CR cs.MA cs.SI

    Deep Learning for Resilient Adversarial Decision Fusion in Byzantine Networks

    Authors: Kassem Kallas

    Abstract: This paper introduces a deep learning-based framework for resilient decision fusion in adversarial multi-sensor networks, providing a unified mathematical setup that encompasses diverse scenarios, including varying Byzantine node proportions, synchronized and unsynchronized attacks, unbalanced priors, adaptive strategies, and Markovian states. Unlike traditional methods, which depend on explicit p… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

  3. arXiv:2405.11361  [pdf, other

    cs.PL

    Opportunistically Parallel Lambda Calculus. Or, Lambda: The Ultimate LLM Scripting Language

    Authors: Stephen Mell, Konstantinos Kallas, Steve Zdancewic, Osbert Bastani

    Abstract: Scripting languages are widely used to compose external calls, such as foreign functions that perform expensive computations, remote APIs, and more recently, machine learning systems such as large language models (LLMs). The execution time of scripts is often dominated by waiting for these external calls, and large speedups can be achieved via parallelization and streaming. However, doing this man… ▽ More

    Submitted 19 January, 2025; v1 submitted 18 May, 2024; originally announced May 2024.

  4. arXiv:2212.02814  [pdf, other

    cs.CR cs.LG cs.MM

    Mixer: DNN Watermarking using Image Mixup

    Authors: Kassem Kallas, Teddy Furon

    Abstract: It is crucial to protect the intellectual property rights of DNN models prior to their deployment. The DNN should perform two main tasks: its primary task and watermarking task. This paper proposes a lightweight, reliable, and secure DNN watermarking that attempts to establish strong ties between these two tasks. The samples triggering the watermarking task are generated using image Mixup either f… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: text overlap with arXiv:2206.11024

  5. arXiv:2206.11024  [pdf, other

    cs.CR cs.AI cs.LG

    ROSE: A RObust and SEcure DNN Watermarking

    Authors: Kassem Kallas, Teddy Furon

    Abstract: Protecting the Intellectual Property rights of DNN models is of primary importance prior to their deployment. So far, the proposed methods either necessitate changes to internal model parameters or the machine learning pipeline, or they fail to meet both the security and robustness requirements. This paper proposes a lightweight, robust, and secure black-box DNN watermarking protocol that takes ad… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

  6. arXiv:2109.11016  [pdf, ps, other

    cs.OS cs.PL

    Report on the "The Future of the Shell" Panel at HotOS 2021

    Authors: Michael Greenberg, Konstantinos Kallas, Nikos Vasilakis, Stephen Kell

    Abstract: This document summarizes the challenges and possible research directions around the shell and its ecosystem, collected during and after the HotOS21 Panel on the future of the shell. The goal is to create a snapshot of what a number of researchers from various disciplines -- connected to the shell to varying degrees -- think about its future. We hope that this document will serve as a reference for… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  7. arXiv:2104.04512  [pdf, other

    cs.PL cs.DC

    Stream Processing With Dependency-Guided Synchronization (Extended Version)

    Authors: Konstantinos Kallas, Filip Niksic, Caleb Stanford, Rajeev Alur

    Abstract: Real-time data processing applications with low latency requirements have led to the increasing popularity of stream processing systems. While such systems offer convenient APIs that can be used to achieve data parallelism automatically, they offer limited support for computations that require synchronization between parallel nodes. In this paper, we propose *dependency-guided synchronization (DGS… ▽ More

    Submitted 3 January, 2022; v1 submitted 9 April, 2021; originally announced April 2021.

    Comments: 41 pages. Non-extended version to appear at Principles and Practice of Parallel Programming (PPoPP), February 2022

  8. arXiv:2103.00033  [pdf, other

    cs.DC cs.PL eess.SY

    Serverless Workflows with Durable Functions and Netherite

    Authors: Sebastian Burckhardt, Chris Gillum, David Justo, Konstantinos Kallas, Connor McMahon, Christopher S. Meiklejohn

    Abstract: Serverless is an increasingly popular choice for service architects because it can provide elasticity and load-based billing with minimal developer effort. A common and important use case is to compose serverless functions and cloud storage into reliable workflows. However, existing solutions for authoring workflows provide a rudimentary experience compared to writing standard code in a modern pro… ▽ More

    Submitted 26 February, 2021; originally announced March 2021.

    Comments: This paper was written in September 2020, and the content has not been edited after October 10, 2020

  9. arXiv:2012.15422  [pdf, other

    cs.PL cs.DC

    An Order-Aware Dataflow Model for Parallel Unix Pipelines

    Authors: Shivam Handa, Konstantinos Kallas, Nikos Vasilakis, Martin Rinard

    Abstract: We present a dataflow model for modelling parallel Unix shell pipelines. To accurately capture the semantics of complex Unix pipelines, the dataflow model is order-aware, i.e., the order in which a node in the dataflow graph consumes inputs from different edges plays a central role in the semantics of the computation and therefore in the resulting parallelization. We use this model to capture the… ▽ More

    Submitted 5 July, 2021; v1 submitted 30 December, 2020; originally announced December 2020.

  10. arXiv:2011.00253  [pdf, other

    cs.CR

    Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript

    Authors: Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel

    Abstract: Third-party libraries ease the development of large-scale software systems. However, they often execute with significantly more privilege than needed to complete their task. This additional privilege is often exploited at runtime via dynamic compromise, even when these libraries are not actively malicious. Mir addresses this problem by introducing a fine-grained read-write-execute (RWX) permission… ▽ More

    Submitted 1 January, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

  11. arXiv:2007.12909  [pdf, other

    cs.CV cs.CR cs.LG eess.IV

    CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis

    Authors: Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Last-generation GAN models allow to generate synthetic images which are visually indistinguishable from natural ones, raising the need to develop tools to distinguish fake and natural images thus contributing to preserve the trustworthiness of digital images. While modern GAN models can generate very high-quality images with no visible spatial artifacts, reconstruction of consistent relationships… ▽ More

    Submitted 2 October, 2020; v1 submitted 25 July, 2020; originally announced July 2020.

    Comments: (6 pages, 2 figures, 4 tables), (IEEE International Workshop on Information Forensics and Security - WIFS 2020, New York, USA)

  12. PaSh: Light-touch Data-Parallel Shell Processing

    Authors: Nikos Vasilakis, Konstantinos Kallas, Konstantinos Mamouras, Achilleas Benetopoulos, Lazar Cvetković

    Abstract: This paper presents {\scshape PaSh}, a system for parallelizing POSIX shell scripts. Given a script, {\scshape PaSh} converts it to a dataflow graph, performs a series of semantics-preserving program transformations that expose parallelism, and then converts the dataflow graph back into a script -- one that adds POSIX constructs to explicitly guide parallelism coupled with {\scshape PaSh}-provided… ▽ More

    Submitted 3 April, 2021; v1 submitted 18 July, 2020; originally announced July 2020.

    Comments: 18 pages, 12 figures

  13. arXiv:1902.11237  [pdf, other

    cs.CR cs.CV cs.LG

    A new Backdoor Attack in CNNs by training set corruption without label poisoning

    Authors: Mauro Barni, Kassem Kallas, Benedetta Tondi

    Abstract: Backdoor attacks against CNNs represent a new threat against deep learning systems, due to the possibility of corrupting the training set so to induce an incorrect behaviour at test time. To avoid that the trainer recognises the presence of the corrupted samples, the corruption of the training set must be as stealthy as possible. Previous works have focused on the stealthiness of the perturbation… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

  14. arXiv:1811.01629  [pdf, ps, other

    cs.CR

    On the Transferability of Adversarial Examples Against CNN-Based Image Forensics

    Authors: Mauro Barni, Kassem Kallas, Ehsan Nowroozi, Benedetta Tondi

    Abstract: Recent studies have shown that Convolutional Neural Networks (CNN) are relatively easy to attack through the generation of so-called adversarial examples. Such vulnerability also affects CNN-based image forensic tools. Research in deep learning has shown that adversarial examples exhibit a certain degree of transferability, i.e., they maintain part of their effectiveness even against CNN models ot… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

  15. arXiv:1507.00400  [pdf, other

    eess.SY cs.GT

    A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines

    Authors: Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi

    Abstract: Optimum decision fusion in the presence of malicious nodes - often referred to as Byzantines - is hindered by the necessity of exactly knowing the statistical behavior of Byzantines. By focusing on a simple, yet widely studied, set-up in which a Fusion Center (FC) is asked to make a binary decision about a sequence of system states by relying on the possibly corrupted decisions provided by local n… ▽ More

    Submitted 1 July, 2015; originally announced July 2015.

  16. arXiv:1503.05829  [pdf, other

    eess.SY cs.DC

    Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks

    Authors: Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi

    Abstract: The most common approach to mitigate the impact that the presence of malicious nodes has on the accuracy of decision fusion schemes consists in observing the behavior of the nodes over a time interval T and then removing the reports of suspect nodes from the fusion process. By assuming that some a-priori information about the presence of malicious nodes and their behavior is available, we show tha… ▽ More

    Submitted 19 March, 2015; originally announced March 2015.