secure

Title: SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. (arXiv:2209.00685v1 [cs.CR])

Title: Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach. (arXiv:2209.00778v1 [cs.CR])

Title: CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems. (arXiv:2209.00813v1 [cs.CR])

Current RA schemes require verifier to explicitly initiate RA, based on some unclear criteria. Thus, in case of prover's compromise, verifier only learns about it late, upon the next RA instance. While sufficient for compromise detection, some applications would benefit from a more proactive, prevention-based approach. To this end, we construct CASU: Compromise Avoidance via Secure Updates. CASU is an inexpensive hardware/software co-design enforcing: (i) runtime software immutability, thus precluding any illegal software modification, and (ii) authenticated updates as the sole means of modifying software. In CASU, a successful RA instance serves as a proof of successful update, and continuous subsequent software integrity is implicit, due to the runtime immutability guarantee. This obviates the need for RA in between software updates and leads to unobtrusive integrity assurance with guarantees akin to those of prior RA techniques, with better overall performance.

Title: Automatic Detection of Speculative Execution Combinations. (arXiv:2209.01179v1 [cs.CR])

In this paper we develop a framework for reasoning about composed speculative semantics that capture speculation due to different mechanisms and implement it as part of the Spectector verification tool. We implement novel semantics for speculating over store and return instructions and combine them with the semantics for speculating over branches. Our framework yields speculative semantics for speculating over any combination of those instructions that are secure by construction, i.e., we obtain these security guarantees for free. The implementation of our novel semantics in Spectector let us verify existing codebases that are vulnerable to Spectre v1, Spectre v4, and Spectre v5 vulnerabilities as well as new snippets that are only vulnerable to their compositions.

security

Title: A Low-Cost Multi-Agent System for Physical Security in Smart Buildings. (arXiv:2209.00741v1 [cs.CR])

Title: Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?. (arXiv:2209.00812v1 [cs.CR])

Title: Tweaking Metasploit to Evade Encrypted C2 Traffic Detection. (arXiv:2209.00943v1 [cs.CR])

Title: Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid. (arXiv:2209.01105v1 [cs.CR])

Title: Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure. (arXiv:2209.01129v1 [cs.CR])

privacy

Title: Domain Adaptation from Scratch. (arXiv:2209.00830v1 [cs.CL])

Title: Property inference attack; Graph neural networks; Privacy attacks and defense; Trustworthy machine learning. (arXiv:2209.01100v1 [cs.LG])

In this work, we perform the first systematic study of group property inference attacks (GPIA) against GNNs. First, we consider a taxonomy of threat models under both black-box and white-box settings with various types of adversary knowledge, and design six different attacks for these settings. We evaluate the effectiveness of these attacks through extensive experiments on three representative GNN models and three real-world graphs. Our results demonstrate the effectiveness of these attacks whose accuracy outperforms the baseline approaches. Second, we analyze the underlying factors that contribute to GPIA's success, and show that the target model trained on the graphs with or without the target property represents some dissimilarity in model parameters and/or model outputs, which enables the adversary to infer the existence of the property. Further, we design a set of defense mechanisms against the GPIA attacks, and demonstrate that these mechanisms can reduce attack accuracy effectively with small loss on GNN model accuracy.

Title: An Introduction to Machine Unlearning. (arXiv:2209.00939v1 [cs.LG])

protect

defense

attack

Title: Universal Fourier Attack for Time Series. (arXiv:2209.00757v1 [cs.CR])

Title: TypoSwype: An Imaging Approach to Detect Typo-Squatting. (arXiv:2209.00783v1 [cs.CR])

Title: Spatio-Temporal Attack Course-of-Action (COA) Search Learning for Scalable and Time-Varying Networks. (arXiv:2209.00862v1 [cs.CR])

robust

Title: Structure-Preserving Graph Representation Learning. (arXiv:2209.00793v1 [cs.LG])

Title: Vision-Language Adaptive Mutual Decoder for OOV-STR. (arXiv:2209.00859v1 [cs.CV])

Title: Contrastive Semantic-Guided Image Smoothing Network. (arXiv:2209.00977v1 [cs.CV])

Title: Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition. (arXiv:2209.01115v1 [cs.CV])

Title: Back-to-Bones: Rediscovering the Role of Backbones in Domain Generalization. (arXiv:2209.01121v1 [cs.CV])

Title: Temporal Conditional VAE for Distributional Drift Adaptation in Multivariate Time Series. (arXiv:2209.00654v1 [cs.LG])

Title: Normalization effects on deep neural networks. (arXiv:2209.01018v1 [cs.LG])

Title: Revisiting Outer Optimization in Adversarial Training. (arXiv:2209.01199v1 [cs.LG])

biometric

steal

extraction

Title: Structural Bias for Aspect Sentiment Triplet Extraction. (arXiv:2209.00820v1 [cs.CL])

Title: Entity Graph Extraction from Legal Acts -- a Prototype for a Use Case in Policy Design Analysis. (arXiv:2209.00944v1 [cs.CL])

Title: Extend and Explain: Interpreting Very Long Language Models. (arXiv:2209.01174v1 [cs.CL])

membership infer

federate

Title: Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. (arXiv:2209.00721v1 [cs.CR])

Title: Proceedings of the 2022 XCSP3 Competition. (arXiv:2209.00917v1 [cs.AI])

fair

Title: Exploring traditional machine learning for identification of pathological auscultations. (arXiv:2209.00672v1 [cs.LG])

Title: A Discussion of Discrimination and Fairness in Insurance Pricing. (arXiv:2209.00858v1 [cs.LG])

interpretability

exlainability

watermark