Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Dmitrienko, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.17049  [pdf, other

    cs.CR

    SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection

    Authors: Moritz Finke, Alexandra Dmitrienko, Jasper Stang

    Abstract: Product lifecycle tracing is increasingly in the focus of regulators and producers, as shown with the initiative of the Digital Product Pass. Likewise, new methods of counterfeit detection are developed that are, e.g., based on Physical Unclonable Functions (PUFs). In order to ensure trust and integrity of product lifecycle data, multiple existing supply chain tracing systems are built on blockcha… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

  2. arXiv:2408.14829  [pdf, other

    cs.CV

    Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning

    Authors: Moritz Finke, Alexandra Dmitrienko

    Abstract: Facial recognition systems have become an integral part of the modern world. These methods accomplish the task of human identification in an automatic, fast, and non-interfering way. Past research has uncovered high vulnerability to simple imitation attacks that could lead to erroneous identification and subsequent authentication of attackers. Similar to face recognition, imitation attacks can als… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

  3. arXiv:2403.06581  [pdf, other

    cs.CR

    DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification

    Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko

    Abstract: The surge in popularity of machine learning (ML) has driven significant investments in training Deep Neural Networks (DNNs). However, these models that require resource-intensive training are vulnerable to theft and unauthorized use. This paper addresses this challenge by introducing DNNShield, a novel approach for DNN protection that integrates seamlessly before training. DNNShield embeds unique… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 18 pages, 11 figures, 6 tables

  4. arXiv:2312.16533  [pdf, other

    cs.CR

    Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study

    Authors: Christoph Sendner, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko

    Abstract: Ethereum smart contracts, which are autonomous decentralized applications on the blockchain that manage assets often exceeding millions of dollars, have become primary targets for cyberattacks. In 2023 alone, such vulnerabilities led to substantial financial losses exceeding a billion of US dollars. To counter these threats, various tools have been developed by academic and commercial entities to… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

  5. FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

    Authors: Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) is a collaborative learning paradigm allowing multiple clients to jointly train a model without sharing their training data. However, FL is susceptible to poisoning attacks, in which the adversary injects manipulated model updates into the federated model aggregation process to corrupt or destroy predictions (untargeted poisoning) or implant hidden functionalities (targeted… ▽ More

    Submitted 16 January, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. 16 pages, 8 figures, 12 tables, 1 algorithm, 3 equations

  6. arXiv:2310.16453  [pdf, other

    cs.LG

    ClearMark: Intuitive and Robust Model Watermarking via Transposed Model Training

    Authors: Torsten Krauß, Jasper Stang, Alexandra Dmitrienko

    Abstract: Due to costly efforts during data acquisition and model training, Deep Neural Networks (DNNs) belong to the intellectual property of the model creator. Hence, unauthorized use, theft, or modification may lead to legal repercussions. Existing DNN watermarking methods for ownership proof are often non-intuitive, embed human-invisible marks, require trust in algorithmic assessment that lacks human-un… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: 20 pages, 18 figures, 4 tables

  7. arXiv:2307.08550  [pdf, other

    cs.CR

    TorMult: Introducing a Novel Tor Bandwidth Inflation Attack

    Authors: Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala

    Abstract: The Tor network is the most prominent system for providing anonymous communication to web users, with a daily user base of 2 million users. However, since its inception, it has been constantly targeted by various traffic fingerprinting and correlation attacks aiming at deanonymizing its users. A critical requirement for these attacks is to attract as much user traffic to adversarial relays as poss… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  8. arXiv:2307.08549  [pdf, other

    cs.CR

    G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts

    Authors: Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar

    Abstract: Due to the immutable and decentralized nature of Ethereum (ETH) platform, smart contracts are prone to security risks that can result in financial loss. While existing machine learning-based vulnerability detection algorithms achieve high accuracy at the contract level, they require developers to manually inspect source code to locate bugs. To this end, we present G-Scan, the first end-to-end fine… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  9. arXiv:2307.08547  [pdf, other

    cs.CR

    Metadata-based Malware Detection on Android using Machine Learning

    Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko

    Abstract: In the digitized world, smartphones and their apps play an important role. To name just a few examples, some apps offer possibilities for entertainment, others for online banking, and others offer support for two-factor authentication. Therefore, with smartphones also, sensitive information is shared; thus, they are a desirable target for malware. The following technical report gives an overview o… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  10. arXiv:2306.03600  [pdf, other

    cs.LG

    Avoid Adversarial Adaption in Federated Learning by Multi-Metric Investigations

    Authors: Torsten Krauß, Alexandra Dmitrienko

    Abstract: Federated Learning (FL) facilitates decentralized machine learning model training, preserving data privacy, lowering communication costs, and boosting model performance through diversified data sources. Yet, FL faces vulnerabilities such as poisoning attacks, undermining model integrity with both untargeted performance degradation and targeted backdoor attacks. Preventing backdoors proves especial… ▽ More

    Submitted 8 September, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: 25 pages, 14 figures, 23 tables, 11 equations

  11. arXiv:2302.02740  [pdf, other

    cs.CR

    AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

    Authors: Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Mobile applications are widely used for online services sharing a large amount of personal data online. One-time authentication techniques such as passwords and physiological biometrics (e.g., fingerprint, face, and iris) have their own advantages but also disadvantages since they can be stolen or emulated, and do not prevent access to the underlying device, once it is unlocked. To address these c… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 16 pages, 7 figures

  12. arXiv:2210.07714  [pdf, other

    cs.CR cs.LG

    CrowdGuard: Federated Backdoor Detection in Federated Learning

    Authors: Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) is a promising approach enabling multiple clients to train Deep Neural Networks (DNNs) collaboratively without sharing their local training data. However, FL is susceptible to backdoor (or targeted poisoning) attacks. These attacks are initiated by malicious clients who seek to compromise the learning process by introducing specific behaviors into the learned model that can… ▽ More

    Submitted 22 August, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. Phillip Rieger and Torsten Krauß contributed equally to this contribution. 19 pages, 8 figures, 5 tables, 4 algorithms, 5 equations

  13. arXiv:2204.08175  [pdf, other

    cs.LG

    Usage of specific attention improves change point detection

    Authors: Anna Dmitrienko, Evgenia Romanenkova, Alexey Zaytsev

    Abstract: The change point is a moment of an abrupt alteration in the data distribution. Current methods for change point detection are based on recurrent neural methods suitable for sequential data. However, recent works show that transformers based on attention mechanisms perform better than standard recurrent models for many tasks. The most benefit is noticeable in the case of longer sequences. In this p… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

  14. arXiv:2202.06698  [pdf, other

    cs.CR

    Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges

    Authors: Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti

    Abstract: The COVID-19 pandemic has caused many countries to deploy novel digital contact tracing (DCT) systems to boost the efficiency of manual tracing of infection chains. In this paper, we systematically analyze DCT solutions and categorize them based on their design approaches and architectures. We analyze them with regard to effectiveness, security, privacy, and ethical aspects and compare prominent s… ▽ More

    Submitted 26 October, 2022; v1 submitted 14 February, 2022; originally announced February 2022.

    Comments: A core part of this paper is to be published in IEEE Transactions on Emerging Topics in Computing, DOI: 10.1109/TETC.2022.3216473

  15. arXiv:2103.12607  [pdf, other

    cs.CR cs.LG

    ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

    Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar

    Abstract: Ethereum smart contracts are automated decentralized applications on the blockchain that describe the terms of the agreement between buyers and sellers, reducing the need for trusted intermediaries and arbitration. However, the deployment of smart contracts introduces new attack vectors into the cryptocurrency systems. In particular, programming flaws in smart contracts can be and have already bee… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 17 pages, 10 figures, 5 tables, 5 equations, 2 listings

  16. arXiv:2006.05914  [pdf, other

    cs.CR cs.CY

    Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

    Authors: Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl

    Abstract: Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy, the so-called "Google/Apple Proposal", which we abbreviate by "GAP". We demonstrate that in real-world scenarios the current GAP design is vulnerable to (i) profiling and possibly de-anonymizing infected persons, and (ii) relay-based wormhole… ▽ More

    Submitted 6 November, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

  17. arXiv:1907.06775  [pdf, ps, other

    cs.CR cs.DB

    Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences

    Authors: Lukas Iffländer, Alexandra Dmitrienko, Christoph Hagen, Michael Jobst, Samuel Kounev

    Abstract: Ransomware is an emerging threat which imposed a \$ 5 billion loss in 2017 and is predicted to hit \$ 11.5 billion in 2019. While initially targeting PC (client) platforms, ransomware recently made the leap to server-side databases - starting in January 2017 with the MongoDB Apocalypse attack, followed by other attack waves targeting a wide range of DB types such as MongoDB, MySQL, ElasticSearch,… ▽ More

    Submitted 15 July, 2019; originally announced July 2019.

  18. DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

    Authors: Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi

    Abstract: Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks. In this paper, we propo… ▽ More

    Submitted 23 September, 2019; v1 submitted 28 September, 2017; originally announced September 2017.

    Journal ref: Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC 2019)

  19. arXiv:1702.07521  [pdf, other

    cs.CR

    Software Grand Exposure: SGX Cache Attacks Are Practical

    Authors: Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi

    Abstract: Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache… ▽ More

    Submitted 24 February, 2017; originally announced February 2017.