Skip to main content

Showing 1–23 of 23 results for author: Maniatakos, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.11687  [pdf, other

    cs.CR cs.AI cs.LG

    ReVeil: Unconstrained Concealed Backdoor Attack on Deep Neural Networks using Machine Unlearning

    Authors: Manaar Alam, Hithem Lamri, Michail Maniatakos

    Abstract: Backdoor attacks embed hidden functionalities in deep neural networks (DNN), triggering malicious behavior with specific inputs. Advanced defenses monitor anomalous DNN inferences to detect such attacks. However, concealed backdoors evade detection by maintaining a low pre-deployment attack success rate (ASR) and restoring high ASR post-deployment via machine unlearning. Existing concealed backdoo… ▽ More

    Submitted 17 February, 2025; originally announced February 2025.

    Comments: This paper is accepted at 62nd Design Automation Conference (DAC) 2025

  2. arXiv:2411.17569  [pdf, other

    cs.CR cs.AR

    RTL-Breaker: Assessing the Security of LLMs against Backdoor Attacks on HDL Code Generation

    Authors: Lakshmi Likhitha Mankali, Jitendra Bhandari, Manaar Alam, Ramesh Karri, Michail Maniatakos, Ozgur Sinanoglu, Johann Knechtel

    Abstract: Large language models (LLMs) have demonstrated remarkable potential with code generation/completion tasks for hardware design. In fact, LLM-based hardware description language (HDL) code generation has enabled the industry to realize complex designs more quickly, reducing the time and effort required in the development cycle. However, the increased reliance on such automation introduces critical s… ▽ More

    Submitted 13 December, 2024; v1 submitted 26 November, 2024; originally announced November 2024.

    Comments: Accepted at 2025 Design, Automation & Test in Europe (DATE) Conference

  3. arXiv:2405.05999  [pdf, other

    cs.CR cs.LG

    LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation

    Authors: Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos

    Abstract: Industrial Control Systems (ICS) are extensively used in critical infrastructures ensuring efficient, reliable, and continuous operations. However, their increasing connectivity and addition of advanced features make them vulnerable to cyber threats, potentially leading to severe disruptions in essential services. In this context, honeypots play a vital role by acting as decoy targets within ICS n… ▽ More

    Submitted 19 May, 2025; v1 submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2305.18226  [pdf, other

    cs.CL cs.AI

    HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis

    Authors: Christoforos Vasilatos, Manaar Alam, Talal Rahwan, Yasir Zaki, Michail Maniatakos

    Abstract: As the use of Large Language Models (LLMs) in text generation tasks proliferates, concerns arise over their potential to compromise academic integrity. The education sector currently tussles with distinguishing student-authored homework assignments from AI-generated ones. This paper addresses the challenge by introducing HowkGPT, designed to identify homework assignments generated by AI. HowkGPT i… ▽ More

    Submitted 11 March, 2025; v1 submitted 26 May, 2023; originally announced May 2023.

  5. Perception, performance, and detectability of conversational artificial intelligence across 32 university courses

    Authors: Hazem Ibrahim, Fengyuan Liu, Rohail Asim, Balaraju Battu, Sidahmed Benabderrahmane, Bashar Alhafni, Wifag Adnan, Tuka Alhanai, Bedoor AlShebli, Riyadh Baghdadi, Jocelyn J. Bélanger, Elena Beretta, Kemal Celik, Moumena Chaqfeh, Mohammed F. Daqaq, Zaynab El Bernoussi, Daryl Fougnie, Borja Garcia de Soto, Alberto Gandolfi, Andras Gyorgy, Nizar Habash, J. Andrew Harris, Aaron Kaufman, Lefteris Kirousis, Korhan Kocak , et al. (14 additional authors not shown)

    Abstract: The emergence of large language models has led to the development of powerful tools such as ChatGPT that can produce text indistinguishable from human-generated work. With the increasing accessibility of such technology, students across the globe may utilize it to help with their school work -- a possibility that has sparked discussions on the integrity of student evaluations in the age of artific… ▽ More

    Submitted 7 May, 2023; originally announced May 2023.

    Comments: 17 pages, 4 figures

  6. arXiv:2304.10638  [pdf, other

    cs.LG cs.CR

    Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning

    Authors: Manaar Alam, Hithem Lamri, Michail Maniatakos

    Abstract: Federated Learning (FL) enables collaborative deep learning training across multiple participants without exposing sensitive personal data. However, the distributed nature of FL and the unvetted participants' data makes it vulnerable to backdoor attacks. In these attacks, adversaries inject malicious functionality into the centralized model during training, leading to intentional misclassification… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  7. arXiv:2304.05237  [pdf

    cs.CR cs.AR cs.DC cs.PF

    TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation

    Authors: David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram

    Abstract: Secure computation is of critical importance to not only the DoD, but across financial institutions, healthcare, and anywhere personally identifiable information (PII) is accessed. Traditional security techniques require data to be decrypted before performing any computation. When processed on untrusted systems the decrypted data is vulnerable to attacks to extract the sensitive information. To ad… ▽ More

    Submitted 18 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: 6 pages, 5 figures and 2 tables

  8. arXiv:2303.17118  [pdf, other

    cs.AR cs.CR

    RPU: The Ring Processing Unit

    Authors: Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen

    Abstract: Ring-Learning-with-Errors (RLWE) has emerged as the foundation of many important techniques for improving security and privacy, including homomorphic encryption and post-quantum cryptography. While promising, these techniques have received limited use due to their extreme overheads of running on general-purpose machines. In this paper, we present a novel vector Instruction Set Architecture (ISA) a… ▽ More

    Submitted 13 April, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

  9. Privacy-preserving machine learning for healthcare: open challenges and future perspectives

    Authors: Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout

    Abstract: Machine Learning (ML) has recently shown tremendous success in modeling various healthcare prediction tasks, ranging from disease diagnosis and prognosis to patient treatment. Due to the sensitive nature of medical data, privacy must be considered along the entire ML pipeline, from model training to inference. In this paper, we conduct a review of recent literature concerning Privacy-Preserving Ma… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    Comments: ICLR 2023 Workshop on Trustworthy Machine Learning for Healthcare (TML4H)

    Journal ref: Trustworthy Machine Learning for Healthcare. TML4H 2023. Lecture Notes in Computer Science, vol 13932

  10. arXiv:2303.14197  [pdf, other

    cs.LG cs.AI cs.CR

    Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems

    Authors: Yue Wang, Wending Li, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Deep Reinforcement Learning (DRL) enhances the efficiency of Autonomous Vehicles (AV), but also makes them susceptible to backdoor attacks that can result in traffic congestion or collisions. Backdoor functionality is typically incorporated by contaminating training datasets with covert malicious data to maintain high precision on genuine inputs while inducing the desired (malicious) outputs for s… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

  11. arXiv:2212.04229  [pdf, other

    cs.CR eess.SY

    ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs

    Authors: Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos

    Abstract: The paradigm shift of enabling extensive intercommunication between the Operational Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the IT world to propagate to the OT side. Therefore, the security layer offered in the past by air gapping is removed, making security patching for OT devices a hard requirement. Conventional patching involves a device reboot… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA [16 pages, 12 figures, 5 tables, code available at https://github.com/momalab/ICSPatch]

  12. arXiv:2205.13523  [pdf, other

    cs.CR

    PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations

    Authors: Manaar Alam, Esha Sarkar, Michail Maniatakos

    Abstract: Federated Learning (FL) enables numerous participants to train deep learning models collaboratively without exposing their personal, potentially sensitive data, making it a promising solution for data privacy in collaborative training. The distributed nature of FL and unvetted data, however, makes it inherently vulnerable to backdoor attacks: In this scenario, an adversary injects backdoor functio… ▽ More

    Submitted 1 June, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

  13. arXiv:2204.13499  [pdf, other

    cs.CR

    FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network

    Authors: Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Nils Ole Tippenhauer, Michail Maniatakos, Jianying Zhou

    Abstract: Networked Programmable Logic Controllers (PLCs) are proprietary industrial devices utilized in critical infrastructure that execute control logic applications in complex proprietary runtime environments that provide standardized access to the hardware resources in the PLC. These control applications are programmed in domain-specific IEC 61131-3 languages, compiled into a proprietary binary format,… ▽ More

    Submitted 31 July, 2023; v1 submitted 28 April, 2022; originally announced April 2022.

  14. Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic

    Authors: Eduardo Chielle, Oleg Mazonka, Homer Gamil, Michail Maniatakos

    Abstract: The dramatic increase of data breaches in modern computing platforms has emphasized that access control is not sufficient to protect sensitive user data. Recent advances in cryptography allow end-to-end processing of encrypted data without the need for decryption using Fully Homomorphic Encryption (FHE). Such computation however, is still orders of magnitude slower than direct (unencrypted) comput… ▽ More

    Submitted 13 January, 2023; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: Published in the IEEE/ACM 2022 International Conference on Computer-Aided Design (ICCAD)

  15. CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution (Extended Version)

    Authors: Mohammed Nabeel, Homer Gamil, Deepraj Soni, Mohammed Ashraf, Mizan Abraha Gebremichael, Eduardo Chielle, Ramesh Karri, Mihai Sanduleanu, Michail Maniatakos

    Abstract: The migration of computation to the cloud has raised concerns regarding the security and privacy of sensitive data, as their need to be decrypted before processing, renders them susceptible to potential breaches. Fully Homomorphic Encryption (FHE) serves as a countermeasure to this issue by enabling computation to be executed directly on encrypted data. Nevertheless, the execution of FHE is orders… ▽ More

    Submitted 14 February, 2024; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: 13 pages

  16. arXiv:2204.05496  [pdf, other

    cs.CR cs.AI

    Scalable privacy-preserving cancer type prediction with homomorphic encryption

    Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos

    Abstract: Machine Learning (ML) alleviates the challenges of high-dimensional data analysis and improves decision making in critical applications like healthcare. Effective cancer type from high-dimensional genetic mutation data can be useful for cancer diagnosis and treatment, if the distinguishable patterns between cancer types are identified. At the same time, analysis of high-dimensional data is computa… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  17. PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks

    Authors: Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Backdoor attacks impose a new threat in Deep Neural Networks (DNNs), where a backdoor is inserted into the neural network by poisoning the training dataset, misclassifying inputs that contain the adversary trigger. The major challenge for defending against these attacks is that only the attacker knows the secret trigger and the target class. The problem is further exacerbated by the recent introdu… ▽ More

    Submitted 26 March, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

  18. arXiv:2202.10075  [pdf, other

    cs.LG cs.CR eess.SY

    ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

    Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos

    Abstract: Industrial Control Systems (ICS) have played a catalytic role in enabling the 4th Industrial Revolution. ICS devices like Programmable Logic Controllers (PLCs), automate, monitor, and control critical processes in industrial, energy, and commercial environments. The convergence of traditional Operational Technology (OT) with Information Technology (IT) has opened a new and unique threat landscape.… ▽ More

    Submitted 21 April, 2023; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: 12 pages, 8 figures, code available at https://github.com/momalab/ICSML, to appear in CPSS 2023 workshop (ACM AsiaCCS'23)

  19. arXiv:2108.10132  [pdf, other

    cs.LG cs.AI

    TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis

    Authors: Esha Sarkar, Michail Maniatakos

    Abstract: Machine Learning (ML) has achieved unprecedented performance in several applications including image, speech, text, and data analysis. Use of ML to understand underlying patterns in gene mutations (genomics) has far-reaching results, not only in overcoming diagnostic pitfalls, but also in designing treatments for life-threatening diseases like cancer. Success and sustainability of ML algorithms de… ▽ More

    Submitted 20 October, 2021; v1 submitted 14 August, 2021; originally announced August 2021.

  20. arXiv:2101.00008  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    Explainability Matters: Backdoor Attacks on Medical Imaging

    Authors: Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout

    Abstract: Deep neural networks have been shown to be vulnerable to backdoor attacks, which could be easily introduced to the training set prior to model training. Recent work has focused on investigating backdoor attacks on natural images or toy datasets. Consequently, the exact impact of backdoors is not yet fully understood in complex real-world applications, such as in medical imaging where misdiagnosis… ▽ More

    Submitted 30 December, 2020; originally announced January 2021.

  21. arXiv:2006.11623  [pdf, other

    cs.CV cs.LG

    FaceHack: Triggering backdoored facial recognition systems using facial characteristics

    Authors: Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos

    Abstract: Recent advances in Machine Learning (ML) have opened up new avenues for its extensive use in real-world applications. Facial recognition, specifically, is used from simple friend suggestions in social-media platforms to critical security applications for biometric validation in automated immigration at airports. Considering these scenarios, security vulnerabilities to such ML algorithms pose serio… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

  22. arXiv:2003.07859  [pdf, other

    cs.CR cs.LG eess.SY physics.soc-ph stat.ML

    Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

    Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Recent work has shown that the introduction of autonomous vehicles (AVs) in traffic could help reduce traffic jams. Deep reinforcement learning methods demonstrate good performance in complex control problems, including autonomous vehicle control, and have been used in state-of-the-art AV controllers. However, deep neural networks (DNNs) render automated driving vulnerable to machine learning-base… ▽ More

    Submitted 26 August, 2021; v1 submitted 17 March, 2020; originally announced March 2020.

    Report number: 2021

    Journal ref: IEEE Transactions on Information Forensics and Security, 2021

  23. ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries

    Authors: Anastasis Keliris, Michail Maniatakos

    Abstract: The security of Industrial Control Systems (ICS) has been attracting increased attention over the past years, following the discovery of real threats targeting industrial environments. Despite this attention, automation of the reverse engineering process of ICS binaries for programmable logic controllers remains an open problem, mainly due to the use of proprietary compilers by ICS vendors. Such a… ▽ More

    Submitted 9 December, 2018; originally announced December 2018.

    Comments: To appear in the 26th Annual Network and Distributed System Security Symposium (NDSS), Feb 2019

    Journal ref: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society 2019, ISBN 1-891562-55-X