Skip to main content

Showing 1–15 of 15 results for author: Pauley, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.07041  [pdf, other

    cs.CR

    Efficient Storage Integrity in Adversarial Settings

    Authors: Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick McDaniel

    Abstract: Storage integrity is essential to systems and applications that use untrusted storage (e.g., public clouds, end-user devices). However, known methods for achieving storage integrity either suffer from high (and often prohibitive) overheads or provide weak integrity guarantees. In this work, we demonstrate a hybrid approach to storage integrity that simultaneously reduces overhead while providing s… ▽ More

    Submitted 9 April, 2025; originally announced April 2025.

    Comments: Published in the 2025 IEEE Symposium on Security and Privacy (S&P)

  2. arXiv:2503.14836  [pdf, other

    cs.LG cs.CV

    On the Robustness Tradeoff in Fine-Tuning

    Authors: Kunyang Li, Jean-Charles Noirot Ferrand, Ryan Sheatsley, Blaine Hoak, Yohan Beugin, Eric Pauley, Patrick McDaniel

    Abstract: Fine-tuning has become the standard practice for adapting pre-trained (upstream) models to downstream tasks. However, the impact on model robustness is not well understood. In this work, we characterize the robustness-accuracy trade-off in fine-tuning. We evaluate the robustness and accuracy of fine-tuned models over 6 benchmark datasets and 7 different fine-tuning strategies. We observe a consist… ▽ More

    Submitted 18 March, 2025; originally announced March 2025.

  3. arXiv:2503.01734  [pdf, other

    cs.CR cs.AI

    Adversarial Agents: Black-Box Evasion Attacks with Reinforcement Learning

    Authors: Kyle Domico, Jean-Charles Noirot Ferrand, Ryan Sheatsley, Eric Pauley, Josiah Hanna, Patrick McDaniel

    Abstract: Reinforcement learning (RL) offers powerful techniques for solving complex sequential decision-making tasks from experience. In this paper, we demonstrate how RL can be applied to adversarial machine learning (AML) to develop a new class of attacks that learn to generate adversarial examples: inputs designed to fool machine learning models. Unlike traditional AML methods that craft adversarial exa… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

  4. arXiv:2501.16534  [pdf, other

    cs.CR cs.AI

    Targeting Alignment: Extracting Safety Classifiers of Aligned LLMs

    Authors: Jean-Charles Noirot Ferrand, Yohan Beugin, Eric Pauley, Ryan Sheatsley, Patrick McDaniel

    Abstract: Alignment in large language models (LLMs) is used to enforce guidelines such as safety. Yet, alignment fails in the face of jailbreak attacks that modify inputs to induce unsafe outputs. In this paper, we present and evaluate a method to assess the robustness of LLM alignment. We observe that alignment embeds a safety classifier in the target model that is responsible for deciding between refusal… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

  5. arXiv:2408.14646  [pdf, other

    cs.CR

    ParTEETor: A System for Partial Deployments of TEEs within Tor

    Authors: Rachel King, Quinn Burke, Yohan Beugin, Blaine Hoak, Kunyang Li, Eric Pauley, Ryan Sheatsley, Patrick McDaniel

    Abstract: The Tor anonymity network allows users such as political activists and those under repressive governments to protect their privacy when communicating over the internet. At the same time, Tor has been demonstrated to be vulnerable to several classes of deanonymizing attacks that expose user behavior and identities. Prior work has shown that these threats can be mitigated by leveraging trusted execu… ▽ More

    Submitted 26 August, 2024; originally announced August 2024.

  6. Characterizing the Modification Space of Signature IDS Rules

    Authors: Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick McDaniel

    Abstract: Signature-based Intrusion Detection Systems (SIDSs) are traditionally used to detect malicious activity in networks. A notable example of such a system is Snort, which compares network traffic against a series of rules that match known exploits. Current SIDS rules are designed to minimize the amount of legitimate traffic flagged incorrectly, reducing the burden on network administrators. However,… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Published in: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)

  7. arXiv:2309.06263  [pdf, other

    cs.CR

    Systematic Evaluation of Geolocation Privacy Mechanisms

    Authors: Alban Héon, Ryan Sheatsley, Quinn Burke, Blaine Hoak, Eric Pauley, Yohan Beugin, Patrick McDaniel

    Abstract: Location data privacy has become a serious concern for users as Location Based Services (LBSs) have become an important part of their life. It is possible for malicious parties having access to geolocation data to learn sensitive information about the user such as religion or political views. Location Privacy Preserving Mechanisms (LPPMs) have been proposed by previous works to ensure the privacy… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: M.S. Thesis (https://etda.libraries.psu.edu/catalog/25677abh5960)

  8. arXiv:2305.18639  [pdf, other

    cs.CR cs.OS

    Securing Cloud File Systems with Trusted Execution

    Authors: Quinn Burke, Yohan Beugin, Blaine Hoak, Rachel King, Eric Pauley, Ryan Sheatsley, Mingli Yu, Ting He, Thomas La Porta, Patrick McDaniel

    Abstract: Cloud file systems offer organizations a scalable and reliable file storage solution. However, cloud file systems have become prime targets for adversaries, and traditional designs are not equipped to protect organizations against the myriad of attacks that may be initiated by a malicious cloud provider, co-tenant, or end-client. Recently proposed designs leveraging cryptographic techniques and tr… ▽ More

    Submitted 2 October, 2024; v1 submitted 29 May, 2023; originally announced May 2023.

  9. arXiv:2210.14999  [pdf, other

    cs.CR

    Secure IP Address Allocation at Cloud Scale

    Authors: Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Engin Kirda, Patrick McDaniel

    Abstract: Public clouds necessitate dynamic resource allocation and sharing. However, the dynamic allocation of IP addresses can be abused by adversaries to source malicious traffic, bypass rate limiting systems, and even capture traffic intended for other cloud tenants. As a result, both the cloud provider and their customers are put at risk, and defending against these threats requires a rigorous analysis… ▽ More

    Submitted 10 September, 2024; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: Replaced with version to appear in 2025 Network and Distributed Systems Security (NDSS) Symposium

  10. arXiv:2209.04521  [pdf, other

    cs.CR cs.LG

    The Space of Adversarial Strategies

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel

    Abstract: Adversarial examples, inputs designed to induce worst-case behavior in machine learning models, have been extensively studied over the past decade. Yet, our understanding of this phenomenon stems from a rather fragmented pool of knowledge; at present, there are a handful of attacks, each with disparate assumptions in threat models and incomparable definitions of optimality. In this paper, we propo… ▽ More

    Submitted 6 September, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

    Comments: Accepted to the 32nd USENIX Security Symposium

  11. arXiv:2208.09776  [pdf, other

    cs.CR

    Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 20 August, 2022; originally announced August 2022.

    Comments: Extension of arXiv:2201.09338

  12. Measuring and Mitigating the Risk of IP Reuse on Public Clouds

    Authors: Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick McDaniel

    Abstract: Public clouds provide scalable and cost-efficient computing through resource sharing. However, moving from traditional on-premises service management to clouds introduces new challenges; failure to correctly provision, maintain, or decommission elastic services can lead to functional failure and vulnerability to attack. In this paper, we explore a broad class of attacks on clouds which we refer to… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  13. arXiv:2201.09338  [pdf, other

    cs.CR

    Building a Privacy-Preserving Smart Camera System

    Authors: Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel

    Abstract: Millions of consumers depend on smart camera systems to remotely monitor their homes and businesses. However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). Third parties therefore can (and in some instances have) access the video footage without the users' knowledg… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

    Comments: Accepted to PETS (Privacy Enhancing Technologies Symposium) 2022

    Journal ref: PoPETS (Proceedings on Privacy Enhancing Technologies Symposium) 2022

  14. arXiv:2105.08619  [pdf, other

    cs.CR cs.LG cs.LO

    On the Robustness of Domain Constraints

    Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly. However, it is unclear if adversarial examples represent realistic inputs in the modeled domains. Diverse domains such as networks and phishing have domain constraints-complex relationships between features that an adversary must satisfy for an attack to be realized (in addition to any adversa… ▽ More

    Submitted 7 November, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted to the 28th ACM Conference on Computer and Communications Security. Seoul, South Korea

  15. arXiv:1809.06962  [pdf, other

    cs.CR cs.PL

    Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

    Authors: Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick McDaniel

    Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive---new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digita… ▽ More

    Submitted 24 December, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: syntax and grammar error are fixed, and IoT platforms are updated to match with the submission