secure

Title: Face Anti-Spoofing from the Perspective of Data Sampling. (arXiv:2208.13164v1 [cs.CV])

Title: Categorical composable cryptography: extended version. (arXiv:2208.13232v1 [cs.CR])

Title: DP-PSI: Private and Secure Set Intersection. (arXiv:2208.13249v1 [cs.CR])

Title: Incrementality Bidding and Attribution. (arXiv:2208.12809v1 [cs.LG])

security

Title: Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda. (arXiv:2208.12875v1 [cs.CR])

Title: Fat Pointers for Temporal Memory Safety of C. (arXiv:2208.12900v1 [cs.CR])

In this paper, we propose a temporal memory safety solution that is both efficient and comprehensive. Specifically, we extend Checked C, a spatially-safe extension to C, with temporally-safe pointers. These are implemented by combining two techniques: fat pointers and dynamic key-lock checks. We show that the fat-pointer solution significantly improves running time and memory overhead compared to the disjoint-metadata approach that provides the same level of protection. With empirical program data and hands-on experience porting real-world applications, we also show that our solution is practical in terms of backward compatibility -- one of the major complaints about fat pointers.

Title: An Automated Analyzer for Financial Security of Ethereum Smart Contracts. (arXiv:2208.12960v1 [cs.CR])

We evaluate FASVERIF on a vulnerabilities dataset of 548 contracts by comparing it with other automatic tools. Our evaluation shows that FASVERIF greatly outperforms the representative tools using different technologies, with respect to accuracy and coverage of types of vulnerabilities.

Title: SoK: Decentralized Finance (DeFi) Incidents. (arXiv:2208.13035v1 [cs.CR])

In this paper, we introduce a common reference frame to systematically evaluate and compare DeFi incidents. We investigate 77 academic papers, 30 audit reports, and 181 real-world incidents. Our open data reveals several gaps between academia and the practitioners' community. For example, few academic papers address "price oracle attacks" and "permissonless interactions", while our data suggests that they are the two most frequent incident types (15% and 10.5% correspondingly). We also investigate potential defenses, and find that: (i) 103 (56%) of the attacks are not executed atomically, granting a rescue time frame for defenders; (ii) SoTA bytecode similarity analysis can at least detect 31 vulnerable/23 adversarial contracts; and (iii) 33 (15.3%) of the adversaries leak potentially identifiable information by interacting with centralized exchanges.

Title: Information Security Management in High Quality IS Journals: A Review and Research Agenda. (arXiv:2208.13087v1 [cs.CR])

Title: IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks. (arXiv:2208.13343v1 [cs.CR])

Title: Lateral Movement Detection Using User Behavioral Analysis. (arXiv:2208.13524v1 [cs.CR])

Title: MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code. (arXiv:2208.13583v1 [cs.CR])

Title: Spatio-Temporal Wind Speed Forecasting using Graph Networks and Novel Transformer Architectures. (arXiv:2208.13585v1 [cs.LG])

Title: Virtual Control Group: Measuring Hidden Performance Metrics. (arXiv:2208.12941v1 [cs.LG])

privacy

Title: On GANs perpetuating biases for face verification. (arXiv:2208.13061v1 [cs.CV])

Title: NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language. (arXiv:2208.13361v1 [cs.CR])

At the core, NL2GDPR is a privacy-centric information extraction model, appended with a GDPR policy finder and a policy generator. We perform a comprehensive study to grasp the challenges in extracting privacy-centric information and generating privacy policies, while exploiting optimizations for this specific task. With NL2GDPR, we can achieve 92.9%, 95.2%, and 98.4% accuracy in correctly identifying GDPR policies related to personal data storage, process, and share types, respectively. To the best of our knowledge, NL2GDPR is the first tool that allows a developer to automatically generate GDPR compliant policies, with only the need of entering the natural language for describing the app features. Note that other non-GDPR-related features might be integrated with the generated features to build a complex app.

Title: RL-DistPrivacy: Privacy-Aware Distributed Deep Inference for low latency IoT systems. (arXiv:2208.13032v1 [cs.LG])

Title: FedEgo: Privacy-preserving Personalized Federated Graph Learning with Ego-graphs. (arXiv:2208.13685v1 [cs.LG])

protect

Title: An Access Control Method with Secret Key for Semantic Segmentation Models. (arXiv:2208.13135v1 [cs.CV])

Title: A Note on Copy-Protection from Random Oracles. (arXiv:2208.12884v1 [cs.CR])

defense

attack

Title: Anti-Retroactive Interference for Lifelong Learning. (arXiv:2208.12967v1 [cs.CV])

Title: Self-Supervised Face Presentation Attack Detection with Dynamic Grayscale Snippets. (arXiv:2208.13070v1 [cs.CV])

Title: Living-off-the-Land Abuse Detection Using Natural Language Processing and Supervised Learning. (arXiv:2208.12836v1 [cs.CR])

Title: ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. (arXiv:2208.12897v1 [cs.CR])

In this paper, we play the role of a realistic adversary and question the efficacy of HT detection techniques by developing an automated, scalable, and practical attack framework, ATTRITION, using reinforcement learning (RL). ATTRITION evades eight detection techniques across two HT detection categories, showcasing its agnostic behavior. ATTRITION achieves average attack success rates of $47\times$ and $211\times$ compared to randomly inserted HTs against state-of-the-art HT detection techniques. We demonstrate ATTRITION's ability to evade detection techniques by evaluating designs ranging from the widely-used academic suites to larger designs such as the open-source MIPS and mor1kx processors to AES and a GPS module. Additionally, we showcase the impact of ATTRITION-generated HTs through two case studies (privilege escalation and kill switch) on the mor1kx processor. We envision that our work, along with our released HT benchmarks and models, fosters the development of better HT detection techniques.

Title: TrojViT: Trojan Insertion in Vision Transformers. (arXiv:2208.13049v1 [cs.LG])

Title: Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies. (arXiv:2208.13182v1 [cs.LG])

Title: Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning. (arXiv:2208.13663v1 [cs.LG])

Title: Demystifying Arch-hints for Model Extraction: An Attack in Unified Memory System. (arXiv:2208.13720v1 [cs.CR])

Title: What Does the Gradient Tell When Attacking the Graph Structure. (arXiv:2208.12815v1 [cs.LG])

robust

Title: Semantic Clustering of a Sequence of Satellite Images. (arXiv:2208.13504v1 [cs.CV])

Title: Towards Robust Face Recognition with Comprehensive Search. (arXiv:2208.13600v1 [cs.CV])

Title: Open-Set Semi-Supervised Object Detection. (arXiv:2208.13722v1 [cs.CV])

Title: Adversarial Robustness for Tabular Data through Cost and Utility Awareness. (arXiv:2208.13058v1 [cs.LG])

Title: Generalization In Multi-Objective Machine Learning. (arXiv:2208.13499v1 [cs.LG])

Title: Categorical semantics of compositional reinforcement learning. (arXiv:2208.13687v1 [cs.AI])

Title: Overparameterized (robust) models from computational constraints. (arXiv:2208.12926v1 [cs.LG])

Title: BOBA: Byzantine-Robust Federated Learning with Label Skewness. (arXiv:2208.12932v1 [cs.LG])

Title: Shaken, and Stirred: Long-Range Dependencies Enable Robust Outlier Detection with PixelCNN++. (arXiv:2208.13579v1 [cs.LG])

biometric

Title: Artificial Neural Networks for Finger Vein Recognition: A Survey. (arXiv:2208.13341v1 [cs.CV])

steal

extraction

Title: Minimal Feature Analysis for Isolated Digit Recognition for varying encoding rates in noisy environments. (arXiv:2208.13100v1 [cs.CL])

Title: Light-YOLOv5: A Lightweight Algorithm for Improved YOLOv5 in Complex Fire Scenarios. (arXiv:2208.13422v1 [cs.CV])

Title: A Multi-Format Transfer Learning Model for Event Argument Extraction via Variational Information Bottleneck. (arXiv:2208.13017v1 [cs.CL])

Title: Supporting Medical Relation Extraction via Causality-Pruned Semantic Dependency Forest. (arXiv:2208.13472v1 [cs.CL])

Title: Learning a General Clause-to-Clause Relationships for Enhancing Emotion-Cause Pair Extraction. (arXiv:2208.13549v1 [cs.CL])

membership infer

federate

Title: A Federated Learning-enabled Smart Street Light Monitoring Application: Benefits and Future Challenges. (arXiv:2208.12996v1 [cs.CV])

Title: Federated Zero-Shot Learning with Mid-Level Semantic Knowledge Transfer. (arXiv:2208.13465v1 [cs.CV])

Title: Network-Level Adversaries in Federated Learning. (arXiv:2208.12911v1 [cs.CR])

Title: Towards Federated Learning against Noisy Labels via Local Self-Regularization. (arXiv:2208.12807v1 [cs.LG])

Title: Abnormal Local Clustering in Federated Learning. (arXiv:2208.12813v1 [cs.LG])

Title: Federated Learning of Large Models at the Edge via Principal Sub-Model Training. (arXiv:2208.13141v1 [cs.LG])

Title: Tensor Decomposition based Personalized Federated Learning. (arXiv:2208.12959v1 [cs.LG])

Title: Federated Sparse Training: Lottery Aware Model Compression for Resource Constrained Edge. (arXiv:2208.13092v1 [cs.LG])

fair

Title: Towards Explaining Demographic Bias through the Eyes of Face Recognition Models. (arXiv:2208.13400v1 [cs.CV])

Title: CIRCLe: Color Invariant Representation Learning for Unbiased Classification of Skin Lesions. (arXiv:2208.13528v1 [cs.CV])

interpretability

Title: Interpreting Black-box Machine Learning Models for High Dimensional Datasets. (arXiv:2208.13405v1 [cs.LG])

exlainability

watermark