Top 10 Arxiv Papers Today in Cryptography And Security


2.016 Mikeys
#1. Connecting Lyapunov Control Theory to Adversarial Attacks
Arash Rahnama, Andre T. Nguyen, Edward Raff
Significant work is being done to develop the math and tools necessary to build provable defenses, or at least bounds, against adversarial attacks of neural networks. In this work, we argue that tools from control theory could be leveraged to aid in defending against such attacks. We do this by example, building a provable defense against a weaker adversary. This is done so we can focus on the mechanisms of control theory, and illuminate its intrinsic value.
more | pdf | html
Figures
None.
Tweets
arxivml: "Connecting Lyapunov Control Theory to Adversarial Attacks", Arash Rahnama, Andre T. Nguyen, Edward Raff https://t.co/loBAGrcm14
EdwardRaffML: Amazing @ArashRahnamaPhD and @AndreNguyen16 show how to connect adversarial attacks to control theory https://t.co/vAr0a7cdoB Purpose is to show a rich literature of already existing tools can help us understand and analyze adversarial robustness using a toy adversary. 1/4
Memoirs: Connecting Lyapunov Control Theory to Adversarial Attacks. https://t.co/INT6HejD3E
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.013 Mikeys
#2. Decentralized & Collaborative AI on Blockchain
Justin D. Harris, Bo Waggoner
Machine learning has recently enabled large advances in artificial intelligence, but these tend to be highly centralized. The large datasets required are generally proprietary; predictions are often sold on a per-query basis; and published models can quickly become out of date without effort to acquire more data and re-train them. We propose a framework for participants to collaboratively build a dataset and use smart contracts to host a continuously updated model. This model will be shared publicly on a blockchain where it can be free to use for inference. Ideal learning problems include scenarios where a model is used many times for similar input such as personal assistants, playing games, recommender systems, etc. In order to maintain the model's accuracy with respect to some test set we propose both financial and non-financial (gamified) incentive structures for providing good data. A free and open source implementation for the Ethereum blockchain is provided at https://github.com/microsoft/0xDeCA10B.
more | pdf | html
Figures
Tweets
SciFi: Decentralized & Collaborative AI on Blockchain. https://t.co/0t8VsCHUEN
arxivml: "Decentralized & Collaborative AI on Blockchain", Justin D. Harris, Bo Waggoner https://t.co/hGbdZ0BERJ
arxiv_cshc: Decentralized & Collaborative AI on Blockchain https://t.co/cs3zzOPjfx
arxiv_cshc: Decentralized & Collaborative AI on Blockchain https://t.co/cs3zzP6U75
jusharris: @jrdothoughts 👌🏻Great post! I ❤the way you used the word "democratized", you perfectly captured the essence of this project. BTW we analyze 3 incentive mechanisms and you can check them out in detail in our just released paper: https://t.co/IUHUqbfaqy
Github

Decentralized & Collaborative AI on Blockchain

Repository: 0xDeCA10B
User: microsoft
Language: Python
Stargazers: 21
Subscribers: 5
Forks: 2
Open Issues: 0
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 7066
Unqiue Words: 2243

2.003 Mikeys
#3. Helen: Maliciously Secure Coopetitive Learning for Linear Models
Wenting Zheng, Raluca Ada Popa, Joseph E. Gonzalez, Ion Stoica
Many organizations wish to collaboratively train machine learning models on their combined datasets for a common benefit (e.g., better medical research, or fraud detection). However, they often cannot share their plaintext datasets due to privacy concerns and/or business competition. In this paper, we design and build Helen, a system that allows multiple parties to train a linear model without revealing their data, a setting we call coopetitive learning. Compared to prior secure training systems, Helen protects against a much stronger adversary who is malicious and can compromise m-1 out of m parties. Our evaluation shows that Helen can achieve up to five orders of magnitude of performance improvement when compared to training using an existing state-of-the-art secure multi-party computation framework.
more | pdf | html
Figures
Tweets
arxiv_org: Helen: Maliciously Secure Coopetitive Learning for Linear Models. https://t.co/9ErHqdStS9 https://t.co/Jzi9tE2FqZ
arxivml: "Helen: Maliciously Secure Coopetitive Learning for Linear Models", Wenting Zheng, Raluca Ada Popa, Joseph E. Gonza… https://t.co/FTTweVrDCl
Memoirs: Helen: Maliciously Secure Coopetitive Learning for Linear Models. https://t.co/YkV9jdXntd
juancarlosvigol: RT @arxiv_org: Helen: Maliciously Secure Coopetitive Learning for Linear Models. https://t.co/9ErHqdStS9 https://t.co/Jzi9tE2FqZ
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 19499
Unqiue Words: 4069

2.0 Mikeys
#4. Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems
Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer
Recently, a number of deep learning-based anomaly detection algorithms were proposed to detect attacks in dynamic industrial control systems. The detectors operate on measured sensor data, leveraging physical process models learned a priori. Evading detection by such systems is challenging, as an attacker needs to manipulate a constrained number of sensor readings in real-time with realistic perturbations according to the current state of the system. In this work, we propose a number of evasion attacks (with different assumptions on the attacker's knowledge), and compare the attacks' cost and efficiency against replay attacks. In particular, we show that a replay attack on a subset of sensor values can be detected easily as it violates physical constraints. In contrast, our proposed attacks leverage manipulated sensor readings that observe learned physical constraints of the system. Our proposed white box attacker uses an optimization approach with a detection oracle, while our black box attacker uses an autoencoder (or a...
more | pdf | html
Figures
None.
Tweets
BrundageBot: Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems. Erba, Taormina, Galelli, Pogliani, Carminati, Zanero, and Tippenhauer https://t.co/qNdQYECUoc
arxiv_cs_LG: Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems. Erba, Taormina, Galelli, Pogliani, Carminati, Zanero, and Tippenhauer https://t.co/azFBuPyBrL
Memoirs: Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems. https://t.co/by0ujt0b2z
arxivml: "Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control… https://t.co/f61oHsSmoY
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 7
Total Words: 13837
Unqiue Words: 3319

2.0 Mikeys
#5. Dynamic Malware Analysis with Feature Engineering and Feature Learning
Zhaoqi Zhang, Panpan Qi, Wei Wang
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time behaviour (e.g., system API calls) for malware detection. This technique has been proven to be effective against various code obfuscation techniques and newly released ("zero-day") malware. However, existing works typically only consider the API name while ignoring the arguments, or require complex feature engineering operations and expert knowledge to process the arguments. In this paper, we propose a novel and low-cost feature extraction approach, and an effective deep neural network architecture for accurate and fast malware detection. Specifically, the feature representation approach utilizes a feature hashing trick to encode the API call arguments associated with the API name. The deep neural network architecture applies multiple Gated-CNNs (convolutional neural networks) to transform the extracted features of each API call. The outputs are further processed through LSTM (long-short term memory networks) to learn the sequential...
more | pdf | html
Figures
Tweets
arxivml: "Dynamic Malware Analysis with Feature Engineering and Feature Learning", Zhaoqi Zhang, Panpan Qi, Wei Wang https://t.co/eTEEQlnVRf
arxiv_cs_LG: Dynamic Malware Analysis with Feature Engineering and Feature Learning. Zhaoqi Zhang, Panpan Qi, and Wei Wang https://t.co/UHD6KoHfGP
Memoirs: Dynamic Malware Analysis with Feature Engineering and Feature Learning. https://t.co/igRdWusrHA
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 7597
Unqiue Words: 2363

1.999 Mikeys
#6. Inductive Analysis of the Internet Protocol TLS
Lawrence C. Paulson
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning beliefs or finiteness. All the obvious security goals can be proved; session resumption appears to be secure even if old session keys have been compromised. The proofs suggest minor changes to simplify the analysis. TLS, even at an abstract level, is much more complicated than most protocols that researchers have verified. Session keys are negotiated rather than distributed, and the protocol has many optional parts. Nevertheless, the resources needed to verify TLS are modest: six man-weeks of effort and three minutes of processor time.
more | pdf | html
Figures
None.
Tweets
bigflywth: A 20-year-old paper was put on arXiv today. https://t.co/V6oZWdDh6M
arxiv_cslo: Inductive Analysis of the Internet Protocol TLS https://t.co/pc2bSTlpU9
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 1
Total Words: 0
Unqiue Words: 0

1.997 Mikeys
#7. GIDS: GAN based Intrusion Detection System for In-Vehicle Network
Eunbi Seo, Hyun Min Song, Huy Kang Kim
A Controller Area Network (CAN) bus in the vehicles is an efficient standard bus enabling communication between all Electronic Control Units (ECU). However, CAN bus is not enough to protect itself because of lack of security features. To detect suspicious network connections effectively, the intrusion detection system (IDS) is strongly required. Unlike the traditional IDS for Internet, there are small number of known attack signatures for vehicle networks. Also, IDS for vehicle requires high accuracy because any false-positive error can seriously affect the safety of the driver. To solve this problem, we propose a novel IDS model for in-vehicle networks, GIDS (GAN based Intrusion Detection System) using deep-learning model, Generative Adversarial Nets. GIDS can learn to detect unknown attacks using only normal data. As experiment result, GIDS shows high detection accuracy for four unknown attacks.
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

1.997 Mikeys
#8. On the challenges of data provenance in the Internet of Things
Mahmoud Elkhodr, Zuhaib Bari Mufti
The IoT is described as a smart interactive environment where devices communicate together ubiquitously sometimes in the background, performing functions on behalf of the users and offering many advanced services to them. Examples range from simple smart home applications such as ambient intelligence and remote controlling functionalities to more advanced smart cities setups. A smart IoT city for instance will encompass a network of many interconnected networks where various sensors and actuators distributed across many areas of the city share information, create knowledge and trigger actuation events. In such a dynamic and rich environment, it is vital for security to trace the source of data and verify its origin. This where data provenance in the IoT come to play. This work attempts to explore requirements and applications of data provenance in the IoT and the challenges pertaining to its realisation.
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 5229
Unqiue Words: 1795

1.997 Mikeys
#9. An Overview of Attacks and Defences on Intelligent Connected Vehicles
Mahdi Dibaei, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu
Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) bus are the most significant parts of in-vehicle security. Besides, with the development of 4G LTE and 5G remote communication technologies for vehicle-toeverything (V2X) communications, the security of inter-vehicle communications is another potential problem. After giving a short introduction to the architecture of next-generation vehicles including driverless and intelligent vehicles, this review paper identifies a few major security attacks on the intelligent connected vehicles. Based on these attacks, we provide a comprehensive survey of available defences against these attacks and classify them into four categories, i.e....
more | pdf | html
Figures
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 12
Total Words: 31652
Unqiue Words: 7147

1.997 Mikeys
#10. A New Distribution Version of Boneh-Goh-Nissim Cryptosystem: Security and performance analysis
Oualid Benamara, Fatiha Merazka
The aim of this paper is to provide two distributed versions of the Boneh-Goh-Nissim Cryptosystem (BGNC). We give a proof of the semantic security for the first one. This guaranties that our algorithm is semantically secure in the contest of active non-adaptive adversaries. Furthermore, we prove that the second version of our distributed scheme is computationally more efficient than the ElGamal destributed elliptic curve cryptosystem (EDECC) and secure under the Subgroup Decision problem (SDP) assumption.
more | pdf | html
Figures
None.
Tweets
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 0
Unqiue Words: 0

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 160,434 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 160,434 papers.