Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Kaya, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06124  [pdf, other

    cs.CR

    Demystifying Behavior-Based Malware Detection at Endpoints

    Authors: Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David Wagner, Tudor Dumitras

    Abstract: Machine learning is widely used for malware detection in practice. Prior behavior-based detectors most commonly rely on traces of programs executed in controlled sandboxes. However, sandbox traces are unavailable to the last line of defense offered by security vendors: malware detection at endpoints. A detector at endpoints consumes the traces of programs running on real-world hosts, as sandbox an… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: https://malwaredetectioninthewild.github.io

  2. arXiv:2303.13372  [pdf, other

    cs.CR cs.LG

    DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

    Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras

    Abstract: Machine Learning (ML) models have been utilized for malware detection for over two decades. Consequently, this ignited an ongoing arms race between malware authors and antivirus systems, compelling researchers to propose defenses for malware-detection models against evasion attacks. However, most if not all existing defenses against evasion attacks suffer from sizable performance degradation and/o… ▽ More

    Submitted 2 October, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  3. arXiv:2212.03777  [pdf, other

    cs.HC math.NA

    Leveraging Priority Thresholds to Improve Equitable Housing Access for Unhoused-at-Risk Youth

    Authors: Yaren Bilge Kaya, Kayse Lee Maass

    Abstract: Approximately 4.2 million youth and young adults experience homelessness each year in the United States and lack of basic necessities puts this population at high-risk of being trafficked or exploited. Although all runaway and homeless youth (RHY) are at risk of being victims of human trafficking, certain racial, ethnic, and gender groups are disproportionately affected. Motivated by these facts,… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  4. arXiv:2110.13541  [pdf, other

    cs.LG cs.CR

    Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes

    Authors: Sanghyun Hong, Michael-Andrei Panaitescu-Liess, Yiğitcan Kaya, Tudor Dumitraş

    Abstract: Quantization is a popular technique that $transforms$ the parameter representation of a neural network from floating-point numbers into lower-precision ones ($e.g.$, 8-bit integers). It reduces the memory footprint and the computational cost at inference, facilitating the deployment of resource-hungry models. However, the parameter perturbations caused by this transformation result in… ▽ More

    Submitted 11 November, 2021; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Accepted to NeurIPS 2021 [Poster]

  5. arXiv:2010.02432  [pdf, other

    cs.LG cs.CR

    A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference

    Authors: Sanghyun Hong, Yiğitcan Kaya, Ionuţ-Vlad Modoranu, Tudor Dumitraş

    Abstract: Recent increases in the computational demands of deep neural networks (DNNs), combined with the observation that most input samples require only simple models, have sparked interest in $input$-$adaptive$ multi-exit architectures, such as MSDNets or Shallow-Deep Networks. These architectures enable faster inferences and could bring DNNs to low-power devices, e.g., in the Internet of Things (IoT). H… ▽ More

    Submitted 25 February, 2021; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: Accepted to ICLR 2021 [Spotlight]; First two authors contributed equally

  6. arXiv:2006.05336  [pdf, other

    cs.LG stat.ML

    On the Effectiveness of Regularization Against Membership Inference Attacks

    Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras

    Abstract: Deep learning models often raise privacy concerns as they leak information about their training data. This enables an adversary to determine whether a data point was in a model's training set by conducting a membership inference attack (MIA). Prior work has conjectured that regularization techniques, which combat overfitting, may also mitigate the leakage. While many regularization mechanisms exis… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

    Comments: Pre-print. 10 pages, 1 figure, 8 tables

  7. arXiv:2002.11497  [pdf, other

    cs.CR cs.LG

    On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping

    Authors: Sanghyun Hong, Varun Chandrasekaran, Yiğitcan Kaya, Tudor Dumitraş, Nicolas Papernot

    Abstract: Machine learning algorithms are vulnerable to data poisoning attacks. Prior taxonomies that focus on specific scenarios, e.g., indiscriminate or targeted, have enabled defenses for the corresponding subset of known attacks. Yet, this introduces an inevitable arms race between adversaries and defenders. In this work, we study the feasibility of an attack-agnostic defense relying on artifacts that a… ▽ More

    Submitted 27 February, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

  8. arXiv:2002.06776  [pdf, other

    cs.CR cs.LG

    How to 0wn NAS in Your Spare Time

    Authors: Sanghyun Hong, Michael Davinroy, Yiğitcan Kaya, Dana Dachman-Soled, Tudor Dumitraş

    Abstract: New data processing pipelines and novel network architectures increasingly drive the success of deep learning. In consequence, the industry considers top-performing architectures as intellectual property and devotes considerable computational resources to discovering such architectures through neural architecture search (NAS). This provides an incentive for adversaries to steal these novel archite… ▽ More

    Submitted 25 February, 2021; v1 submitted 17 February, 2020; originally announced February 2020.

    Comments: Accepted to ICLR 2020 [Poster]; Our code is available at https://github.com/sanghyun-hong/How-to-0wn-NAS-in-Your-Spare-Time

  9. arXiv:1906.01017  [pdf, other

    cs.CR cs.LG

    Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks

    Authors: Sanghyun Hong, Pietro Frigo, Yiğitcan Kaya, Cristiano Giuffrida, Tudor Dumitraş

    Abstract: Deep neural networks (DNNs) have been shown to tolerate "brain damage": cumulative changes to the network's parameters (e.g., pruning, numerical perturbations) typically result in a graceful degradation of classification accuracy. However, the limits of this natural resilience are not well understood in the presence of small adversarial changes to the DNN parameters' underlying memory representati… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

    Comments: Accepted to USENIX Security Symposium (USENIX) 2019

  10. arXiv:1810.07052  [pdf, other

    cs.LG cs.CV stat.ML

    Shallow-Deep Networks: Understanding and Mitigating Network Overthinking

    Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras

    Abstract: We characterize a prevalent weakness of deep neural networks (DNNs)---overthinking---which occurs when a DNN can reach correct predictions before its final layer. Overthinking is computationally wasteful, and it can also be destructive when, by the final layer, a correct prediction changes into a misclassification. Understanding overthinking requires studying how each prediction evolves during a D… ▽ More

    Submitted 8 May, 2019; v1 submitted 16 October, 2018; originally announced October 2018.

    Comments: Accepted to ICML2019. Source code here: www.shallowdeep.network

  11. arXiv:1810.03487  [pdf, other

    cs.CR cs.LG

    Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks

    Authors: Sanghyun Hong, Michael Davinroy, Yiǧitcan Kaya, Stuart Nevans Locke, Ian Rackow, Kevin Kulda, Dana Dachman-Soled, Tudor Dumitraş

    Abstract: Recent work has introduced attacks that extract the architecture information of deep neural networks (DNN), as this knowledge enhances an adversary's capability to conduct black-box attacks against the model. This paper presents the first in-depth security analysis of DNN fingerprinting attacks that exploit cache side-channels. First, we define the threat model for these attacks: our adversary doe… ▽ More

    Submitted 31 January, 2020; v1 submitted 8 October, 2018; originally announced October 2018.

  12. arXiv:1803.06975  [pdf, other

    cs.CR cs.LG

    Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

    Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş

    Abstract: Recent results suggest that attacks against supervised machine learning systems are quite effective, while defenses are easily bypassed by new attacks. However, the specifications for machine learning systems currently lack precise adversary definitions, and the existing attacks make diverse, potentially unrealistic assumptions about the strength of the adversary who launches them. We propose the… ▽ More

    Submitted 8 March, 2019; v1 submitted 19 March, 2018; originally announced March 2018.

  13. arXiv:1105.0355  [pdf

    cs.NE

    A Novel Crossover Operator for Genetic Algorithms: Ring Crossover

    Authors: Yılmaz Kaya, Murat Uyar, Ramazan Tek\D{j}n

    Abstract: The genetic algorithm (GA) is an optimization and search technique based on the principles of genetics and natural selection. A GA allows a population composed of many individuals to evolve under specified selection rules to a state that maximizes the "fitness" function. In that process, crossover operator plays an important role. To comprehend the GAs as a whole, it is necessary to understand the… ▽ More

    Submitted 2 May, 2011; originally announced May 2011.

    Comments: 5 pages, 3 fgigures