Skip to main content

Showing 1–5 of 5 results for author: Khouzani, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1811.09652  [pdf, other

    cs.IT

    Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints

    Authors: MHR Khouzani, Pasquale Malacaria

    Abstract: We introduce a novel generalization of entropy and conditional entropy from which most definitions from the literature can be derived as particular cases. Within this general framework, we investigate the problem of designing countermeasures for information leakage. In particular, we seek metric-invariant solutions, i.e., they are robust against the choice of entropy for quantifying the leakage. T… ▽ More

    Submitted 23 November, 2018; originally announced November 2018.

    Comments: Accepted to IEEE Transactions on Information Theory, in November 2018

  2. arXiv:1810.00378  [pdf, other

    cs.LG stat.ML

    Pseudo-Random Number Generation using Generative Adversarial Networks

    Authors: Marcello De Bernardi, MHR Khouzani, Pasquale Malacaria

    Abstract: Pseudo-random number generators (PRNG) are a fundamental element of many security algorithms. We introduce a novel approach to their implementation, by proposing the use of generative adversarial networks (GAN) to train a neural network to behave as a PRNG. Furthermore, we showcase a number of interesting modifications to the standard GAN architecture. The most significant is partially concealing… ▽ More

    Submitted 30 September, 2018; originally announced October 2018.

  3. arXiv:1505.02325  [pdf, other

    cs.GT cs.CR math.OC

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)

    Authors: MHR Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa

    Abstract: Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it is a password for user authentication or a secret key for a cryptographic primitive, picking it requires the user to trade-off usability costs with resistance against an adversary: a simple password is easier to remember but is also easier to guess; likewise, a shorter cryptographic key may require fewer co… ▽ More

    Submitted 9 May, 2015; originally announced May 2015.

    Comments: This manuscript is the extended version of our conference paper: "Picking vs. Guessing Secrets: A Game-Theoretic Analysis", in 28th IEEE Computer Security Foundations Symposium (CSF 2015), Verona, Italy, July 2015

    MSC Class: 91A05; 91A80 ACM Class: K.6.5

  4. arXiv:1403.1642  [pdf, other

    eess.SY cs.DC cs.NI math.OC

    Optimal Energy-Aware Epidemic Routing in DTNs

    Authors: Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh

    Abstract: In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy leve… ▽ More

    Submitted 2 June, 2015; v1 submitted 6 March, 2014; originally announced March 2014.

    Comments: 17 pages, 9 figures

  5. arXiv:1403.1639  [pdf, other

    cs.CR cs.NI cs.SI eess.SY math.OC

    Optimal Patching in Clustered Malware Epidemics

    Authors: Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Santosh S. Venkatesh

    Abstract: Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies th… ▽ More

    Submitted 6 March, 2014; originally announced March 2014.

    Comments: 18 pages, 6 figures