Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Solihin, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.07308  [pdf, other

    cs.CR cs.DC

    BoostCom: Towards Efficient Universal Fully Homomorphic Encryption by Boosting the Word-wise Comparisons

    Authors: Ardhi Wiratama Baskara Yudha, Jiaqi Xue, Qian Lou, Huiyang Zhou, Yan Solihin

    Abstract: Fully Homomorphic Encryption (FHE) allows for the execution of computations on encrypted data without the need to decrypt it first, offering significant potential for privacy-preserving computational operations. Emerging arithmetic-based FHE schemes (ar-FHE), like BGV, demonstrate even better performance in word-wise comparison operations over non-arithmetic FHE (na-FHE) schemes, such as TFHE, esp… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: To be appeared on PACT 2024

  2. arXiv:2406.18725  [pdf, other

    cs.LG cs.CL

    Jailbreaking LLMs with Arabic Transliteration and Arabizi

    Authors: Mansour Al Ghanim, Saleh Almohaimeed, Mengxin Zheng, Yan Solihin, Qian Lou

    Abstract: This study identifies the potential vulnerabilities of Large Language Models (LLMs) to 'jailbreak' attacks, specifically focusing on the Arabic language and its various forms. While most research has concentrated on English-based prompt manipulation, our investigation broadens the scope to investigate the Arabic language. We initially tested the AdvBench benchmark in Standardized Arabic, finding t… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 14 pages, 4 figures

  3. arXiv:2309.05941  [pdf

    cs.CR

    Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks

    Authors: Mnassar Alyami, Abdulmajeed Alghamdi, Mohammed Alkhowaiter, Cliff Zou, Yan Solihin

    Abstract: Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high data overhead because it relies on adding noise to the data. This paper proposes a more data-efficient approach that randomizes packet sizes without ad… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: 15 pages, 4 figures, to appear in Sensors 2023

  4. arXiv:2303.08886  [pdf, other

    cs.CR

    vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

    Authors: Qian Lou, Muhammad Santriaji, Ardhi Wiratama Baskara Yudha, Jiaqi Xue, Yan Solihin

    Abstract: Fully homomorphic encryption (FHE) is a powerful encryption technique that allows for computation to be performed on ciphertext without the need for decryption. FHE will thus enable privacy-preserving computation and a wide range of applications, such as secure cloud computing on sensitive medical and financial data, secure machine learning, etc. Prior research in FHE has largely concentrated on i… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 8 pages, 5 figures

  5. arXiv:2205.14526  [pdf, other

    cs.LG cs.AI

    Group-wise Reinforcement Feature Generation for Optimal and Explainable Representation Space Reconstruction

    Authors: Dongjie Wang, Yanjie Fu, Kunpeng Liu, Xiaolin Li, Yan Solihin

    Abstract: Representation (feature) space is an environment where data points are vectorized, distances are computed, patterns are characterized, and geometric structures are embedded. Extracting a good representation space is critical to address the curse of dimensionality, improve model generalization, overcome data sparsity, and increase the availability of classic models. Existing literature, such as fea… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

    Comments: KDD 2022

  6. arXiv:2204.03289  [pdf, other

    cs.OS

    Persistent Memory Objects: Fast and Easy Crash Consistency for Persistent Memory

    Authors: Derrick Greenspan, Naveed Ul Mustafa, Zoran Kolega, Mark Heinrich, Yan Solihin

    Abstract: DIMM-compatible persistent memory unites memory and storage. Prior works utilize persistent memory either by combining the filesystem with direct access on memory mapped files or by managing it as a collection of objects while abolishing the POSIX abstraction. In contrast, we propose retaining the POSIX abstraction and extending it to provide support for persistent memory, using Persistent Memory… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: 12 pages, 15 figures

  7. arXiv:2010.14687  [pdf, other

    cs.LG

    MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs

    Authors: Jonathan Ponader, Sandip Kundu, Yan Solihin

    Abstract: The increased use of Convolutional Neural Networks (CNN) in mission critical systems has increased the need for robust and resilient networks in the face of both naturally occurring faults as well as security attacks. The lack of robustness and resiliency can lead to unreliable inference results. Current methods that address CNN robustness require hardware modification, network modification, or ne… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 12 pages

  8. arXiv:2006.16345  [pdf, other

    cs.CR cs.AR

    SeMPE: Secure Multi Path Execution Architecture for Removing Conditional Branch Side Channels

    Authors: Andrea Mondelli, Paul Gazzillo, Yan Solihin

    Abstract: One of the most prevalent source of side channel vulnerabilities is the secret-dependent behavior of conditional branches (SDBCB). The state-of-the-art solution relies on Constant-Time Expressions, which require high programming effort and incur high performance overheads. In this paper, we propose SeMPE, an approach that relies on architecture support to eliminate SDBCB without requiring much pro… ▽ More

    Submitted 29 July, 2020; v1 submitted 29 June, 2020; originally announced June 2020.

    Comments: This paper is currently under submission. We arXiv our paper to establish credit for inventing this work

  9. arXiv:2003.04693  [pdf, other

    cs.CR

    Streamlining Integrity Tree Updates for Secure Persistent Non-Volatile Memory

    Authors: Alexander Freij, Shougang Yuan, Huiyang Zhou, Yan Solihin

    Abstract: Emerging non-volatile main memory (NVMM) is rapidly being integrated into computer systems. However, NVMM is vulnerable to potential data remanence and replay attacks. Established security models including split counter mode encryption and Bonsai Merkle tree (BMT) authentication have been introduced against such data integrity attacks. However, these security methods are not readily compatible w… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 13 pages, 12 figures

  10. arXiv:1904.12661  [pdf, other

    cs.DC

    Exploring Memory Persistency Models for GPUs

    Authors: Zhen Lin, Mohammad Alshboul, Yan Solihin, Huiyang Zhou

    Abstract: Given its high integration density, high speed, byte addressability, and low standby power, non-volatile or persistent memory is expected to supplement/replace DRAM as main memory. Through persistency programming models (which define durability ordering of stores) and durable transaction constructs, the programmer can provide recoverable data structure (RDS) which allows programs to recover to a c… ▽ More

    Submitted 24 April, 2019; originally announced April 2019.

    Comments: 18 pages, 16 figures