Skip to main content

Showing 1–50 of 54 results for author: Troncoso, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.10117  [pdf, ps, other

    cs.CV cs.ET

    A Manually Annotated Image-Caption Dataset for Detecting Children in the Wild

    Authors: Klim Kireev, Ana-Maria Creţu, Raphael Meier, Sarah Adel Bargal, Elissa Redmiles, Carmela Troncoso

    Abstract: Platforms and the law regulate digital content depicting minors (defined as individuals under 18 years of age) differently from other types of content. Given the sheer amount of content that needs to be assessed, machine learning-based automation tools are commonly used to detect content depicting minors. To our knowledge, no dataset or benchmark currently exists for detecting these identification… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Comments: 14 pages, 6 figures

  2. arXiv:2410.15942  [pdf, other

    cs.CR

    A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution

    Authors: Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks

    Abstract: Humanitarian organizations distribute aid to people affected by armed conflicts or natural disasters. Digitalization has the potential to increase the efficiency and fairness of aid-distribution systems, and recent work by Wang et al. has shown that these benefits are possible without creating privacy harms for aid recipients. However, their work only provides a solution for one particular aid-dis… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

  3. arXiv:2407.02191  [pdf, other

    cs.LG cs.AI cs.CR math.ST stat.ML

    Attack-Aware Noise Calibration for Differential Privacy

    Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso

    Abstract: Differential privacy (DP) is a widely used approach for mitigating privacy risks when training machine learning models on sensitive data. DP mechanisms add noise during training to limit the risk of information leakage. The scale of the added noise is critical, as it determines the trade-off between privacy and utility. The standard practice is to select the noise scale to satisfy a given privacy… ▽ More

    Submitted 7 November, 2024; v1 submitted 2 July, 2024; originally announced July 2024.

    Comments: Appears in NeurIPS 2024

  4. arXiv:2406.08084  [pdf, other

    cs.SI cs.CR

    Characterizing and Detecting Propaganda-Spreading Accounts on Telegram

    Authors: Klim Kireev, Yevhen Mykhno, Carmela Troncoso, Rebekah Overdorf

    Abstract: Information-based attacks on social media, such as disinformation campaigns and propaganda, are emerging cybersecurity threats. The security community has focused on countering these threats on social media platforms like X and Reddit. However, they also appear in instant-messaging social media platforms such as WhatsApp, Telegram, and Signal. In these platforms information-based attacks primarily… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  5. arXiv:2405.05196  [pdf, other

    cs.CR cs.LG

    SINBAD: Saliency-informed detection of breakage caused by ad blocking

    Authors: Saiid El Hajj Chehade, Sandra Siby, Carmela Troncoso

    Abstract: Privacy-enhancing blocking tools based on filter-list rules tend to break legitimate functionality. Filter-list maintainers could benefit from automated breakage detection tools that allow them to proactively fix problematic rules before deploying them to millions of users. We introduce SINBAD, an automated breakage detector that improves the accuracy over the state of the art by 20%, and is the f… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 19 pages, 13 figures, Appearing in IEEE S&P 2024

  6. arXiv:2403.03792  [pdf, other

    cs.CR cs.LG

    Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks

    Authors: Dario Pasquini, Martin Strohmeier, Carmela Troncoso

    Abstract: We introduce a new family of prompt injection attacks, termed Neural Exec. Unlike known attacks that rely on handcrafted strings (e.g., "Ignore previous instructions and..."), we show that it is possible to conceptualize the creation of execution triggers as a differentiable search problem and use learning-based methods to autonomously generate them. Our results demonstrate that a motivated adve… ▽ More

    Submitted 2 May, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: v0.2

  7. arXiv:2402.13700  [pdf, other

    cs.LG cs.CR

    On the Conflict of Robustness and Learning in Collaborative Machine Learning

    Authors: Mathilde Raynal, Carmela Troncoso

    Abstract: Collaborative Machine Learning (CML) allows participants to jointly train a machine learning model while keeping their training data private. In many scenarios where CML is seen as the solution to privacy issues, such as health-related applications, safety is also a primary concern. To ensure that CML processes produce models that output correct and reliable decisions \emph{even in the presence of… ▽ More

    Submitted 26 July, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

  8. arXiv:2402.12235  [pdf, other

    cs.LG cs.CR

    The Fundamental Limits of Least-Privilege Learning

    Authors: Theresa Stadler, Bogdan Kulynych, Michael C. Gastpar, Nicolas Papernot, Carmela Troncoso

    Abstract: The promise of least-privilege learning -- to find feature representations that are useful for a learning task but prevent inference of any sensitive information unrelated to this task -- is highly appealing. However, so far this concept has only been stated informally. It thus remains an open question whether and how we can achieve this goal. In this work, we provide the first formalisation of th… ▽ More

    Submitted 26 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  9. arXiv:2308.02907  [pdf, other

    cs.CR

    Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution

    Authors: Kasra EdalatNejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso

    Abstract: Humanitarian organizations provide aid to people in need. To use their limited budget efficiently, their distribution processes must ensure that legitimate recipients cannot receive more aid than they are entitled to. Thus, it is essential that recipients can register at most once per aid program. Taking the International Committee of the Red Cross's aid distribution registration process as a use… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  10. arXiv:2306.04064  [pdf, other

    cs.LG

    Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings

    Authors: Klim Kireev, Maksym Andriushchenko, Carmela Troncoso, Nicolas Flammarion

    Abstract: Research on adversarial robustness is primarily focused on image and text data. Yet, many scenarios in which lack of robustness can result in serious risks, such as fraud detection, medical diagnosis, or recommender systems often do not rely on images or text but instead on tabular data. Adversarial robustness in tabular data poses two serious challenges. First, tabular datasets often contain cate… ▽ More

    Submitted 13 December, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

  11. arXiv:2303.17343  [pdf, other

    cs.CR

    Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution

    Authors: Boya Wang, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso

    Abstract: Humanitarian aid-distribution programs help bring physical goods to people in need. Traditional paper-based solutions to support aid distribution do not scale to large populations and are hard to secure. Existing digital solutions solve these issues, at the cost of collecting large amount of personal information. This lack of privacy can endanger recipients' safety and harm their dignity. In colla… ▽ More

    Submitted 19 May, 2023; v1 submitted 30 March, 2023; originally announced March 2023.

    Comments: Full version with proofs corresponding to accepted IEEE S&P 2023 conference version

  12. arXiv:2303.03829  [pdf, other

    cs.LG cs.CR

    Can Decentralized Learning be more robust than Federated Learning?

    Authors: Mathilde Raynal, Dario Pasquini, Carmela Troncoso

    Abstract: Decentralized Learning (DL) is a peer--to--peer learning approach that allows a group of users to jointly train a machine learning model. To ensure correctness, DL should be robust, i.e., Byzantine users must not be able to tamper with the result of the collaboration. In this paper, we introduce two \textit{new} attacks against DL where a Byzantine user can: make the network converge to an arbitra… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  13. arXiv:2302.14517  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Arbitrary Decisions are a Hidden Cost of Differentially Private Training

    Authors: Bogdan Kulynych, Hsiang Hsu, Carmela Troncoso, Flavio P. Calmon

    Abstract: Mechanisms used in privacy-preserving machine learning often aim to guarantee differential privacy (DP) during model training. Practical DP-ensuring training methods use randomization when fitting model parameters to privacy-sensitive data (e.g., adding Gaussian noise to clipped gradients). We demonstrate that such randomization incurs predictive multiplicity: for a given input example, the output… ▽ More

    Submitted 15 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: To appear in ACM FAccT 2023

  14. arXiv:2301.07628  [pdf, other

    cs.CR cs.LG

    Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

    Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso

    Abstract: We introduce the concept of "universal password model" -- a password model that, once pre-trained, can automatically adapt its guessing strategy based on the target system. To achieve this, the model does not need to access any plaintext passwords from the target credentials. Instead, it exploits users' auxiliary information, such as email addresses, as a proxy signal to predict the underlying pas… ▽ More

    Submitted 13 March, 2024; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: Appearing in the proceedings of the 45th IEEE Symposium on Security and Privacy S&P 2024

  15. arXiv:2208.13058  [pdf, other

    cs.LG cs.CR

    Adversarial Robustness for Tabular Data through Cost and Utility Awareness

    Authors: Klim Kireev, Bogdan Kulynych, Carmela Troncoso

    Abstract: Many safety-critical applications of machine learning, such as fraud or abuse detection, use data in tabular domains. Adversarial examples can be particularly damaging for these applications. Yet, existing works on adversarial robustness primarily focus on machine-learning models in image and text domains. We argue that, due to the differences between tabular data and images or text, existing thre… ▽ More

    Submitted 24 February, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

    Comments: The first two authors contributed equally. To appear in the proceedings of NDSS 2023

  16. arXiv:2208.12370  [pdf, other

    cs.CR

    COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

    Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: As third-party cookie blocking is becoming the norm in browsers, advertisers and trackers have started to use first-party cookies for tracking. We conduct a differential measurement study on 10K websites with third-party cookies allowed and blocked. This study reveals that first-party cookies are used to store and exfiltrate identifiers to known trackers even when third-party cookies are blocked.… ▽ More

    Submitted 27 November, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

  17. arXiv:2207.14071  [pdf, other

    cs.CR

    Verifiable Encodings for Secure Homomorphic Analytics

    Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux

    Abstract: Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphi… ▽ More

    Submitted 4 June, 2024; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: update appendices

  18. arXiv:2206.07009  [pdf, other

    cs.CR

    Private Collection Matching Protocols

    Authors: Kasra EdalatNejad, Mathilde Raynal, Wouter Lueks, Carmela Troncoso

    Abstract: We introduce Private Collection Matching (PCM) problems, in which a client aims to determine whether a collection of sets owned by a server matches their interests. Existing privacy-preserving cryptographic primitives cannot solve PCM problems efficiently without harming privacy. We propose a modular framework that enables designers to build privacy-preserving PCM systems that output one bit: whet… ▽ More

    Submitted 14 December, 2022; v1 submitted 14 June, 2022; originally announced June 2022.

  19. arXiv:2205.08443  [pdf, other

    cs.CR cs.LG

    On the (In)security of Peer-to-Peer Decentralized Machine Learning

    Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso

    Abstract: In this work, we carry out the first, in-depth, privacy analysis of Decentralized Learning -- a collaborative machine learning framework aimed at addressing the main limitations of federated learning. We introduce a suite of novel attacks for both passive and active decentralized adversaries. We demonstrate that, contrary to what is claimed by decentralized learning proposers, decentralized learni… ▽ More

    Submitted 10 November, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: IEEE S&P'23 (Previous title: "On the Privacy of Decentralized Machine Learning") + Fixed error in neighbors-discovery trick

  20. arXiv:2203.07806  [pdf, other

    cs.CR

    You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses

    Authors: Sandra Siby, Ludovic Barman, Christopher Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso

    Abstract: Website fingerprinting (WF) is a well-know threat to users' web privacy. New internet standards, such as QUIC, include padding to support defenses against WF. Previous work only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when u… ▽ More

    Submitted 15 December, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

  21. Bugs in our Pockets: The Risks of Client-Side Scanning

    Authors: Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso

    Abstract: Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hinde… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 46 pages, 3 figures

    Journal ref: Journal of Cybersecurity, 10(1), 2024

  22. arXiv:2107.11309  [pdf, other

    cs.CR

    WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking

    Authors: Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso

    Abstract: Millions of web users directly depend on ad and tracker blocking tools to protect their privacy. However, existing ad and tracker blockers fall short because of their reliance on trivially susceptible advertising and tracking content. In this paper, we first demonstrate that the state-of-the-art machine learning based ad and tracker blockers, such as AdGraph, are susceptible to adversarial evasion… ▽ More

    Submitted 17 August, 2021; v1 submitted 23 July, 2021; originally announced July 2021.

  23. arXiv:2103.11958  [pdf, other

    cs.CR cs.CY

    Preliminary Analysis of Potential Harms in the Luca Tracing System

    Authors: Theresa Stadler, Wouter Lueks, Katharina Kohls, Carmela Troncoso

    Abstract: In this document, we analyse the potential harms a large-scale deployment of the Luca system might cause to individuals, venues, and communities. The Luca system is a digital presence tracing system designed to provide health departments with the contact information necessary to alert individuals who have visited a location at the same time as a SARS-CoV-2-positive person. Multiple regional health… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  24. arXiv:2012.12927  [pdf

    cs.CY

    Towards a common performance and effectiveness terminology for digital proximity tracing applications

    Authors: Justus Benzler, Dan Bogdanov, Göran Kirchner, Wouter Lueks, Raquel Lucas, Rui Oliveira, Bart Preneel, Marcel Salathe, Carmela Troncoso, Viktor von Wyl

    Abstract: Digital proximity tracing (DPT) for Sars-CoV-2 pandemic mitigation is a complex intervention with the primary goal to notify app users about possible risk exposures to infected persons. Policymakers and DPT operators need to know whether their system works as expected in terms of speed or yield (performance) and whether DPT is making an effective contribution to pandemic mitigation (also in compar… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

  25. arXiv:2011.07018  [pdf, other

    cs.LG cs.CR

    Synthetic Data -- Anonymisation Groundhog Day

    Authors: Theresa Stadler, Bristena Oprisanu, Carmela Troncoso

    Abstract: Synthetic data has been advertised as a silver-bullet solution to privacy-preserving data publishing that addresses the shortcomings of traditional anonymisation techniques. The promise is that synthetic data drawn from generative models preserves the statistical properties of the original dataset but, at the same time, provides perfect protection against privacy attacks. In this work, we present… ▽ More

    Submitted 24 January, 2022; v1 submitted 13 November, 2020; originally announced November 2020.

  26. Bayes Security: A Not So Average Metric

    Authors: Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso

    Abstract: Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this paper, we study Bayes security, a security metric inspired by the cryptographic advantage. Similarly to DP, Bayes security i) is independent of an… ▽ More

    Submitted 20 February, 2024; v1 submitted 6 November, 2020; originally announced November 2020.

  27. arXiv:2007.08613  [pdf, other

    cs.SE

    Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign

    Authors: Blagovesta Kostova, Seda Gürses, Carmela Troncoso

    Abstract: Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer. Academic privacy engineering literature typically abstracts away such c… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  28. arXiv:2005.14645  [pdf, other

    cs.CR

    DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists

    Authors: Kasra EdalatNejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso

    Abstract: Investigative journalists collect large numbers of digital documents during their investigations. These documents can greatly benefit other journalists' work. However, many of these documents contain sensitive information. Hence, possessing such documents can endanger reporters, their stories, and their sources. Consequently, many documents are used only for single, local, investigations. We pre… ▽ More

    Submitted 30 July, 2020; v1 submitted 29 May, 2020; originally announced May 2020.

    Journal ref: USENIX Security Symposium 2020: 1911-1927

  29. arXiv:2005.12273  [pdf

    cs.CR cs.CY

    Decentralized Privacy-Preserving Proximity Tracing

    Authors: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers , et al. (9 additional authors not shown)

    Abstract: This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 46 pages, 6 figures, first published 3 April 2020 on https://github.com/DP-3T/documents where companion documents and code can be found

  30. arXiv:2005.11189  [pdf, other

    cs.CR

    VoteAgain: A scalable coercion-resistant voting system

    Authors: Wouter Lueks, Iñigo Querejeta-Azurmendi, Carmela Troncoso

    Abstract: The strongest threat model for voting systems considers coercion resistance: protection against coercers that force voters to modify their votes, or to abstain. Existing remote voting systems either do not provide this property; require an expensive tallying phase; or burden users with the need to store cryptographic key material and with the responsibility to deceive their coercers. We propose Vo… ▽ More

    Submitted 1 June, 2020; v1 submitted 22 May, 2020; originally announced May 2020.

    Comments: 21 pages, 11 figures, to be published in Usenix Security 2020

    ACM Class: G.2; E.3; E.4

  31. zksk: A Library for Composable Zero-Knowledge Proofs

    Authors: Wouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, Carmela Troncoso

    Abstract: Zero-knowledge proofs are an essential building block in many privacy-preserving systems. However, implementing these proofs is tedious and error-prone. In this paper, we present zksk, a well-documented Python library for defining and computing sigma protocols: the most popular class of zero-knowledge proofs. In zksk, proofs compose: programmers can convert smaller proofs into building blocks that… ▽ More

    Submitted 10 November, 2019; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: Appears in 2019 Workshop on Privacy in the Electronic Society (WPES'19)

  32. arXiv:1910.10036  [pdf, other

    cs.CR

    Filter Design for Delay-Based Anonymous Communications

    Authors: Simon Oya, Fernando Pérez-González, Carmela Troncoso

    Abstract: In this work, we address the problem of designing delay-based anonymous communication systems. We consider a timed mix where an eavesdropper wants to learn the communication pattern of the users, and study how the mix must delay the messages so as to increase the adversary's estimation error. We show the connection between this problem and a MIMO system where we want to design the coloring filter… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: 2016

  33. Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks

    Authors: Simon Oya, Carmela Troncoso, Fernando Pérez-González

    Abstract: High-latency anonymous communication systems prevent passive eavesdroppers from inferring communicating partners with certainty. However, disclosure attacks allow an adversary to recover users' behavioral profiles when communications are persistent. Understanding how the system parameters affect the privacy of the users against such attacks is crucial. Earlier work in the area analyzes the perform… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  34. A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

    Authors: Fernando Pérez-González, Carmela Troncoso, Simon Oya

    Abstract: Mixes, relaying routers that hide the relation between incoming and outgoing messages, are the main building block of high-latency anonymous communication networks. A number of so-called disclosure attacks have been proposed to effectively de-anonymize traffic sent through these channels. Yet, the dependence of their success on the system parameters is not well-understood. We propose the Least Squ… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

  35. Meet the Family of Statistical Disclosure Attacks

    Authors: Simon Oya, Carmela Troncoso, Fernando Pérez-González

    Abstract: Disclosure attacks aim at revealing communication patterns in anonymous communication systems, such as conversation partners or frequency. In this paper, we propose a framework to compare between the members of the statistical disclosure attack family. We compare different variants of the Statistical Disclosure Attack (SDA) in the literature, together with two new methods; as well as show their re… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

  36. arXiv:1906.09682  [pdf, other

    cs.CR

    Encrypted DNS --> Privacy? A Traffic Analysis Perspective

    Authors: Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

    Abstract: Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations such as Google and Cloudflare are deploying recently standardized protocols that encrypt DNS traffic between end users and recursive resolvers such a… ▽ More

    Submitted 6 October, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  37. arXiv:1906.00389  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Disparate Vulnerability to Membership Inference Attacks

    Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso

    Abstract: A membership inference attack (MIA) against a machine-learning model enables an attacker to determine whether a given data record was part of the model's training data or not. In this paper, we provide an in-depth study of the phenomenon of disparate vulnerability against MIAs: unequal success rate of MIAs against different population subgroups. We first establish necessary and sufficient conditio… ▽ More

    Submitted 16 September, 2021; v1 submitted 2 June, 2019; originally announced June 2019.

    Comments: To appear in Privacy-Enhancing Technologies Symposium (PETS) 2022. This version has an updated authors list

  38. arXiv:1902.07456  [pdf, other

    cs.CR

    Measuring Membership Privacy on Aggregate Location Time-Series

    Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro

    Abstract: While location data is extremely valuable for various applications, disclosing it prompts serious threats to individuals' privacy. To limit such concerns, organizations often provide analysts with aggregate time-series that indicate, e.g., how many people are in a location at a time interval, rather than raw individual traces. In this paper, we perform a measurement study to understand Membership… ▽ More

    Submitted 27 April, 2020; v1 submitted 20 February, 2019; originally announced February 2019.

    Journal ref: Presented at ACM SIGMETRICS 2020 and published in the Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Vol. 2, No. 4, Article 36, June 2020

  39. arXiv:1901.04923  [pdf, other

    cs.CR

    On (The Lack Of) Location Privacy in Crowdsourcing Applications

    Authors: Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso

    Abstract: Crowdsourcing enables application developers to benefit from large and diverse datasets at a low cost. Specifically, mobile crowdsourcing (MCS) leverages users' devices as sensors to perform geo-located data collection. The collection of geolocated data raises serious privacy concerns for users. Yet, despite the large research body on location privacy-preserving mechanisms (LPPMs), MCS developers… ▽ More

    Submitted 5 June, 2019; v1 submitted 15 January, 2019; originally announced January 2019.

    Comments: restructure and new title

  40. arXiv:1811.11293  [pdf, other

    cs.CY cs.LG

    Questioning the assumptions behind fairness solutions

    Authors: Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses

    Abstract: In addition to their benefits, optimization systems can have negative economic, moral, social, and political effects on populations as well as their environments. Frameworks like fairness have been proposed to aid service providers in addressing subsequent bias and discrimination during data collection and algorithm design. However, recent reports of neglect, unresponsiveness, and malevolence cast… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Presented at Critiquing and Correcting Trends in Machine Learning (NeurIPS 2018 Workshop), Montreal, Canada. This is a short version of arXiv:1806.02711

  41. arXiv:1810.10939  [pdf, other

    cs.LG cs.CR stat.ML

    Evading classifiers in discrete domains with provable optimality guarantees

    Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso

    Abstract: Machine-learning models for security-critical applications such as bot, malware, or spam detection, operate in constrained discrete domains. These applications would benefit from having provable guarantees against adversarial examples. The existing literature on provable adversarial robustness of models, however, exclusively focuses on robustness to gradient-based attacks in domains such as images… ▽ More

    Submitted 1 July, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: NeurIPS 2018 Workshop on Security in Machine Learning

  42. arXiv:1809.04415  [pdf, other

    cs.CR

    Rethinking Location Privacy for Unknown Mobility Behaviors

    Authors: Simon Oya, Carmela Troncoso, Fernando Pérez-González

    Abstract: Location Privacy-Preserving Mechanisms (LPPMs) in the literature largely consider that users' data available for training wholly characterizes their mobility patterns. Thus, they hardwire this information in their designs and evaluate their privacy properties with these same data. In this paper, we aim to understand the impact of this decision on the level of privacy these LPPMs may offer in real… ▽ More

    Submitted 23 May, 2019; v1 submitted 12 September, 2018; originally announced September 2018.

  43. arXiv:1809.03390  [pdf, other

    cs.CR

    Tandem: Securing Keys by Using a Central Server While Preserving Privacy

    Authors: Wouter Lueks, Brinda Hampiholi, Greg Alpár, Carmela Troncoso

    Abstract: Users' devices, e.g., smartphones or laptops, are typically incapable of securely storing and processing cryptographic keys. We present Tandem, a novel set of protocols for securing cryptographic keys with support from a central server. Tandem uses one-time-use key-share tokens to preserve users' privacy with respect to a malicious central server. Additionally, Tandem enables users to block their… ▽ More

    Submitted 13 July, 2020; v1 submitted 10 September, 2018; originally announced September 2018.

    Comments: As published in PoPETs 2020.3

  44. POTs: Protective Optimization Technologies

    Authors: Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses

    Abstract: Algorithmic fairness aims to address the economic, moral, social, and political impact that digital systems have on populations through solutions that can be applied by service providers. Fairness frameworks do so, in part, by mapping these problems to a narrow definition and assuming the service providers can be trusted to deploy countermeasures. Not surprisingly, these decisions limit fairness f… ▽ More

    Submitted 26 January, 2020; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: Appears in Conference on Fairness, Accountability, and Transparency (FAT* 2020). Bogdan Kulynych and Rebekah Overdorf contributed equally to this work. Version v1/v2 by Seda Gürses, Rebekah Overdorf, and Ero Balsa was presented at HotPETS 2018 and at PiMLAI 2018

  45. arXiv:1805.04494  [pdf, other

    cs.CR

    Under the Underground: Predicting Private Interactions in Underground Forums

    Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy

    Abstract: Underground forums where users discuss, buy, and sell illicit services and goods facilitate a better understanding of the economy and organization of cybercriminals. Prior work has shown that in particular private interactions provide a wealth of information about the cybercriminal ecosystem. Yet, those messages are seldom available to analysts, except when there is a leak. To address this problem… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  46. arXiv:1802.08415  [pdf, other

    cs.CR

    TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

    Authors: Chen Chen, Daniele E. Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso

    Abstract: Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

  47. arXiv:1711.04992  [pdf, other

    stat.ML cs.LG

    Feature importance scores and lossless feature pruning using Banzhaf power indices

    Authors: Bogdan Kulynych, Carmela Troncoso

    Abstract: Understanding the influence of features in machine learning is crucial to interpreting models and selecting the best features for classification. In this work we propose the use of principles from coalitional game theory to reason about importance of features. In particular, we propose the use of the Banzhaf power index as a measure of influence of features on the outcome of a classifier. We show… ▽ More

    Submitted 3 December, 2017; v1 submitted 14 November, 2017; originally announced November 2017.

    Comments: Presented at NIPS 2017 Symposium on Interpretable Machine Learning

  48. arXiv:1709.06318  [pdf, other

    cs.CR

    Is Geo-Indistinguishability What You Are Looking for?

    Authors: Simon Oya, Carmela Troncoso, Fernando Pérez-González

    Abstract: Since its proposal in 2013, geo-indistinguishability has been consolidated as a formal notion of location privacy, generating a rich body of literature building on this idea. A problem with most of these follow-up works is that they blindly rely on geo-indistinguishability to provide location privacy, ignoring the numerical interpretation of this privacy guarantee. In this paper, we provide an alt… ▽ More

    Submitted 19 September, 2017; originally announced September 2017.

  49. arXiv:1708.06145  [pdf, other

    cs.CR

    Knock Knock, Who's There? Membership Inference on Aggregate Location Data

    Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro

    Abstract: Aggregate location data is often used to support smart services and applications, e.g., generating live traffic maps or predicting visits to businesses. In this paper, we present the first study on the feasibility of membership inference attacks on aggregate location time-series. We introduce a game-based definition of the adversarial task, and cast it as a classification problem where machine lea… ▽ More

    Submitted 29 November, 2017; v1 submitted 21 August, 2017; originally announced August 2017.

    Journal ref: Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)

  50. ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Authors: Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso

    Abstract: The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The dec… ▽ More

    Submitted 12 October, 2018; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18)