Skip to main content

Showing 1–26 of 26 results for author: Karame, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.14080  [pdf, other

    cs.LG cs.CR

    On the Robustness of Distributed Machine Learning against Transfer Attacks

    Authors: Sébastien Andreina, Pascal Zimmer, Ghassan Karame

    Abstract: Although distributed machine learning (distributed ML) is gaining considerable attention in the community, prior works have independently looked at instances of distributed ML in either the training or the inference phase. No prior work has examined the combined robustness stemming from distributing both the learning and the inference process. In this work, we explore, for the first time, the robu… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

    Comments: To appear in the Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) 2025

  2. arXiv:2412.00706  [pdf, other

    cs.CR

    The Forking Way: When TEEs Meet Consensus

    Authors: Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame

    Abstract: An increasing number of distributed platforms combine Trusted Execution Environments (TEEs) with blockchains. Indeed, many hail the combination of TEEs and blockchains a good "marriage": TEEs bring confidential computing to the blockchain while the consensus layer could help defend TEEs from forking attacks. In this paper, we systemize how current blockchain solutions integrate TEEs and to what… ▽ More

    Submitted 1 December, 2024; originally announced December 2024.

    Comments: 18 pages, 14 figures, 1 table

  3. arXiv:2410.03347  [pdf, other

    cs.CR

    Practical Light Clients for Committee-Based Blockchains

    Authors: Frederik Armknecht, Ghassan Karame, Malcom Mohamed, Christiane Weis

    Abstract: Light clients are gaining increasing attention in the literature since they obviate the need for users to set up dedicated blockchain full nodes. While the literature features a number of light client instantiations, most light client protocols optimize for long offline phases and implicitly assume that the block headers to be verified are signed by highly dynamic validators. In this paper, we s… ▽ More

    Submitted 18 October, 2024; v1 submitted 4 October, 2024; originally announced October 2024.

  4. arXiv:2406.13599  [pdf, other

    cs.CR

    Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers

    Authors: Sébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji

    Abstract: Solana gained considerable attention as one of the most popular blockchain platforms for deploying decentralized applications. Compared to Ethereum, however, we observe a lack of research on how Solana smart contract developers handle security, what challenges they encounter, and how this affects the overall security of the ecosystem. To address this, we conducted the first comprehensive study on… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: To appear in the Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS), 2024

  5. arXiv:2404.09895  [pdf, other

    cs.CR

    Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security

    Authors: Jannik Albrecht, Sebastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Marson, Julian Willingmann

    Abstract: Extensive research on Nakamoto-style consensus protocols has shown that network delays degrade the security of these protocols. Established results indicate that, perhaps surprisingly, maximal security is achieved when the network is as small as two nodes due to increased delays in larger networks. This contradicts the very foundation of blockchains, namely that decentralization improves security.… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: IEEE Symposium on Security and Privacy (IEEE SP), 2024

  6. Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks

    Authors: Pascal Zimmer, Sébastien Andreina, Giorgia Azzurra Marson, Ghassan Karame

    Abstract: Although promising, existing defenses against query-based attacks share a common limitation: they offer increased robustness against attacks at the price of a considerable accuracy drop on clean samples. In this work, we show how to efficiently establish, at test-time, a solid tradeoff between robustness and accuracy when mitigating query-based attacks. Given that these attacks necessarily explore… ▽ More

    Submitted 21 March, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: To appear in the Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) 2024

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, 38(19), 2024, 21859-21868

  7. arXiv:2310.03002  [pdf, other

    cs.CR

    No Forking Way: Detecting Cloning Attacks on Intel SGX Applications

    Authors: Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde

    Abstract: Forking attacks against TEEs like Intel SGX can be carried out either by rolling back the application to a previous state, or by cloning the application and by partitioning its inputs across the cloned instances. Current solutions to forking attacks require Trusted Third Parties (TTP) that are hard to find in real-world deployments. In the absence of a TTP, many TEE applications rely on monotonic… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 26 pages, 26 figures, 5 tables

  8. Fuzz on the Beach: Fuzzing Solana Smart Contracts

    Authors: Sven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl

    Abstract: Solana has quickly emerged as a popular platform for building decentralized applications (DApps), such as marketplaces for non-fungible tokens (NFTs). A key reason for its success are Solana's low transaction fees and high performance, which is achieved in part due to its stateless programming model. Although the literature features extensive tooling support for smart contract security, current so… ▽ More

    Submitted 15 December, 2024; v1 submitted 6 September, 2023; originally announced September 2023.

    Comments: This paper appeared on the ACM CCS 2023 in November 2023

  9. arXiv:2304.06341  [pdf, other

    cs.CR

    EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation

    Authors: Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi

    Abstract: Smart contracts are increasingly being used to manage large numbers of high-value cryptocurrency accounts. There is a strong demand for automated, efficient, and comprehensive methods to detect security vulnerabilities in a given contract. While the literature features a plethora of analysis methods for smart contracts, the existing proposals do not address the increasing complexity of contracts.… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: To be published at Euro S&P 2023

  10. arXiv:2205.07478  [pdf, other

    cs.CR

    Estimating Patch Propagation Times across (Blockchain) Forks

    Authors: Sebastien Andreina, Lorenzo Alluminio, Giorgia Azzurra Marson, Ghassan Karame

    Abstract: The wide success of Bitcoin has led to a huge surge of alternative cryptocurrencies (altcoins). Most altcoins essentially fork Bitcoin's code with minor modifications, such as the number of coins to be minted, the block size, and the block generation time. As such, they are often deemed identical to Bitcoin in terms of security, robustness, and maturity. In this paper, we show that this common c… ▽ More

    Submitted 9 February, 2023; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: A short version of this paper will appear at FC23

  11. arXiv:2205.04108  [pdf, other

    cs.CR

    On the Storage Overhead of Proof-of-Work Blockchains

    Authors: Alessandro Sforzin, Matteo Maso, Claudio Soriente, Ghassan Karame

    Abstract: Permissionless blockchains such as Bitcoin have long been criticized for their high computational and storage overhead. Unfortunately, while a number of proposals address the energy consumption of existing Proof-of-Work deployments, little attention has been given so far to remedy the storage overhead incurred by those blockchains. In fact, it seems widely acceptable that full nodes supporting the… ▽ More

    Submitted 30 June, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  12. arXiv:2203.00364  [pdf, other

    cs.CR

    HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts

    Authors: Jens-Rene Giesen, Sebastien Andreina, Michael Rodler, Ghassan O. Karame, Lucas Davi

    Abstract: Developing secure smart contracts remains a challenging task. Existing approaches are either impractical or leave the burden to developers for fixing bugs. In this paper, we propose the first practical smart contract compiler, called HCC, which automatically inserts security hardening checks at the source-code level based on a novel and language-independent code property graph (CPG) notation. The… ▽ More

    Submitted 5 December, 2024; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: To appear at ACNS 2025

  13. arXiv:2109.10302  [pdf, other

    cs.CR cs.DC

    MITOSIS: Practically Scaling Permissioned Blockchains

    Authors: Giorgia Azzurra Marson, Sebastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame

    Abstract: Scalability remains one of the biggest challenges to the adoption of permissioned blockchain technologies for large-scale deployments. Permissioned blockchains typically exhibit low latencies, compared to permissionless deployments -- however at the cost of poor scalability. Various solutions were proposed to capture "the best of both worlds", targeting low latency and high scalability simultaneou… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: 12 pages, 9 figures; to appear in the Annual Computer Security Applications Conference (ACSAC) 2021

  14. arXiv:2011.14599  [pdf, other

    cs.CR

    On the Challenges of Detecting Side-Channel Attacks in SGX

    Authors: Jianyu Jiang, Claudio Soriente, Ghassan Karame

    Abstract: Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the perfor… ▽ More

    Submitted 30 June, 2022; v1 submitted 30 November, 2020; originally announced November 2020.

  15. arXiv:2011.02167  [pdf, other

    cs.CR cs.LG

    BaFFLe: Backdoor detection via Feedback-based Federated Learning

    Authors: Sebastien Andreina, Giorgia Azzurra Marson, Helen Möllering, Ghassan Karame

    Abstract: Recent studies have shown that federated learning (FL) is vulnerable to poisoning attacks that inject a backdoor into the global model. These attacks are effective even when performed by a single client, and undetectable by most existing defensive techniques. In this paper, we propose Backdoor detection via Feedback-based Federated Learning (BAFFLE), a novel defense to secure FL against backdoor a… ▽ More

    Submitted 18 April, 2021; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: 11 pages, 5 figures; to appear in the 41st IEEE International Conference on Distributed Computing Systems (ICDCS'21)

  16. arXiv:2010.00341  [pdf, other

    cs.CR cs.DC

    EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts

    Authors: Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi

    Abstract: Recent attacks exploiting errors in smart contract code had devastating consequences thereby questioning the benefits of this technology. It is currently highly challenging to fix errors and deploy a patched contract in time. Instant patching is especially important since smart contracts are always online due to the distributed nature of blockchain systems. They also manage considerable amounts of… ▽ More

    Submitted 2 October, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: A slightly shorter version of this paper will be published at USENIX Security Symposium 2021

  17. arXiv:1908.09015  [pdf, other

    cs.DC cs.CR

    Towards Secure and Decentralized Sharing of IoT Data

    Authors: Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente

    Abstract: The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications with blockchains. However, current blockchain-backed IoT systems simply use the blockchain to store access control policies, thereby underutilizing t… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

  18. arXiv:1812.05934  [pdf, other

    cs.CR

    Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks

    Authors: Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi

    Abstract: Recently, a number of existing blockchain systems have witnessed major bugs and vulnerabilities within smart contracts. Although the literature features a number of proposals for securing smart contracts, these proposals mostly focus on proving the correctness or absence of a certain type of vulnerability within a contract, but cannot protect deployed (legacy) contracts from being exploited. In th… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

  19. arXiv:1812.04293  [pdf, other

    cs.CR

    On the Security of Randomized Defenses Against Adversarial Samples

    Authors: Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame

    Abstract: Deep Learning has been shown to be particularly vulnerable to adversarial samples. To combat adversarial strategies, numerous defensive techniques have been proposed. Among these, a promising approach is to use randomness in order to make the classification process unpredictable and presumably harder for the adversary to control. In this paper, we study the effectiveness of randomized defenses aga… ▽ More

    Submitted 16 March, 2020; v1 submitted 11 December, 2018; originally announced December 2018.

  20. arXiv:1809.05027  [pdf, other

    cs.CR

    ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud

    Authors: Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov

    Abstract: With the proliferation of Trusted Execution Environments (TEEs) such as Intel SGX, a number of cloud providers will soon introduce TEE capabilities within their offering (e.g., Microsoft Azure). Although the integration of SGX within the cloud considerably strengthens the threat model for cloud applications, the current model to deploy and provision enclaves prevents the cloud operator from adding… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

  21. Scalable Byzantine Consensus via Hardware-assisted Secret Sharing

    Authors: Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan

    Abstract: The surging interest in blockchain technology has revitalized the search for effective Byzantine consensus schemes. In particular, the blockchain community has been looking for ways to effectively integrate traditional Byzantine fault-tolerant (BFT) protocols into a blockchain consensus layer allowing various financial institutions to securely agree on the order of transactions. However, existing… ▽ More

    Submitted 14 November, 2018; v1 submitted 15 December, 2016; originally announced December 2016.

    Comments: This paper will be published in IEEE Transactions on Computers

  22. arXiv:1609.07256  [pdf, ps, other

    cs.CR

    Towards Fairness of Cryptocurrency Payments

    Authors: Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan

    Abstract: Motivated by the great success and adoption of Bitcoin, a number of cryptocurrencies such as Litecoin, Dogecoin, and Ethereum are becoming increasingly popular. Although existing blockchain-based cryptocurrency schemes can ensure reasonable security for transactions, they do not consider any notion of fairness. Fair exchange allows two players to exchange digital "items", such as digital signature… ▽ More

    Submitted 1 December, 2016; v1 submitted 23 September, 2016; originally announced September 2016.

    Comments: 13 pages, 3 tables, 3 figures

  23. arXiv:1512.06585  [pdf, other

    cs.CR cs.NI

    Fingerprinting Software-defined Networks

    Authors: Heng Cui, Ghassan O. Karame, Felix Klaedtke, Roberto Bifulco

    Abstract: Software-defined networking (SDN) eases network management by centralizing the control plane and separating it from the data plane. The separation of planes in SDN, however, introduces new vulnerabilities in SDN networks since the difference in processing packets at each plane allows an adversary to fingerprint the network's packet-forwarding logic. In this paper, we study the feasibility of finge… ▽ More

    Submitted 21 December, 2015; originally announced December 2015.

    Comments: 13 pages

  24. arXiv:1404.4744  [pdf, ps, other

    cs.CR

    PrivLoc: Preventing Location Tracking in Geofencing Services

    Authors: Jens Mathias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li

    Abstract: Location-based services are increasingly used in our daily activities. In current services, users however have to give up their location privacy in order to acquire the service. The literature features a large number of contributions which aim at enhancing user privacy in location-based services. Most of these contributions obfuscate the locations of users using spatial and/or temporal cloaking in… ▽ More

    Submitted 18 April, 2014; originally announced April 2014.

  25. arXiv:1311.6236  [pdf, other

    cs.CR

    Commune: Shared Ownership in an Agnostic Cloud

    Authors: Claudio Soriente, Ghassan Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun

    Abstract: Although cloud storage platforms promise a convenient way for users to share files and engage in collaborations, they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to shared ownership. This can be a significant limitation in many collaborations because one owner can, for example, delete files and revoke access without… ▽ More

    Submitted 25 November, 2013; originally announced November 2013.

  26. arXiv:1212.3555  [pdf, other

    cs.DC cs.CR

    Proofs of Writing for Efficient and Robust Storage

    Authors: Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic

    Abstract: We present PoWerStore, the first efficient robust storage protocol that achieves optimal latency without using digital signatures. PoWerStore's robustness comprises tolerating asynchrony, maximum number of Byzantine storage servers, any number of Byzantine readers and crash-faulty writers, and guaranteeing wait-freedom and linearizability of read/write operations. PoWerStore's efficiency stems fro… ▽ More

    Submitted 24 December, 2012; v1 submitted 14 December, 2012; originally announced December 2012.