secure

Title: PMFault: Faulting and Bricking Server CPUs through Management Interfaces. (arXiv:2301.05538v1 [cs.CR])

In this paper, using the case study of the widely used Supermicro X11SSL motherboard, we show how remotely exploitable software weaknesses in the BMC (or other processors with PMBus access) can be used to access the PMBus and then perform hardware-based fault injection attacks on the main CPU. The underlying weaknesses include insecure firmware encryption and signing mechanisms, a lack of authentication for the firmware upgrade process and the IPMI KCS control interface, as well as the motherboard design (with the PMBus connected to the BMC and SMBus by default).

First, we show that undervolting through the PMBus allows breaking the integrity guarantees of SGX enclaves, bypassing Intel's countermeasures against previous undervolting attacks like Plundervolt/V0ltPwn. Second, we experimentally show that overvolting outside the specified range has the potential of permanently damaging Intel Xeon CPUs, rendering the server inoperable. We assess the impact of our findings on other server motherboards made by Supermicro and ASRock.

Our attacks, dubbed PMFault, can be carried out by a privileged software adversary and do not require physical access to the server motherboard or knowledge of the BMC login credentials.

We responsibly disclosed the issues reported in this paper to Supermicro and discuss possible countermeasures at different levels. To the best of our knowledge, the 12th generation of Supermicro motherboards, which was designed before we reported PMFault to Supermicro, is not vulnerable.

Title: Threat Models over Space and Time: A Case Study of E2EE Messaging Applications. (arXiv:2301.05653v1 [cs.CR])

security

Title: Security-Aware Approximate Spiking Neural Networks. (arXiv:2301.05264v1 [cs.CR])

Title: An RTL Implementation of the Data Encryption Standard (DES). (arXiv:2301.05530v1 [cs.CR])

privacy

protect

Title: The 2022 n2c2/UW Shared Task on Extracting Social Determinants of Health. (arXiv:2301.05571v1 [cs.CL])

Materials and Methods: The task used the Social History Annotated Corpus (SHAC), which consists of clinical text with detailed event-based annotations for SDOH events such as alcohol, drug, tobacco, employment, and living situation. Each SDOH event is characterized through attributes related to status, extent, and temporality. The task includes three subtasks related to information extraction (Subtask A), generalizability (Subtask B), and learning transfer (Subtask C). In addressing this task, participants utilized a range of techniques, including rules, knowledge bases, n-grams, word embeddings, and pretrained language models (LM).

Results: A total of 15 teams participated, and the top teams utilized pretrained deep learning LM. The top team across all subtasks used a sequence-to-sequence approach achieving 0.901 F1 for Subtask A, 0.774 F1 Subtask B, and 0.889 F1 for Subtask C.

Conclusions: Similar to many NLP tasks and domains, pretrained LM yielded the best performance, including generalizability and learning transfer. An error analysis indicates extraction performance varies by SDOH, with lower performance achieved for conditions, like substance use and homelessness, that increase health risks (risk factors) and higher performance achieved for conditions, like substance abstinence and living with family, that reduce health risks (protective factors).

defense

attack

Title: On the feasibility of attacking Thai LPR systems with adversarial examples. (arXiv:2301.05506v1 [cs.CR])

robust

Title: Multi-Target Landmark Detection with Incomplete Images via Reinforcement Learning and Shape Prior. (arXiv:2301.05392v1 [cs.CV])

Title: Towards Single Camera Human 3D-Kinematics. (arXiv:2301.05435v1 [cs.CV])

Title: CLIP the Gap: A Single Domain Generalization Approach for Object Detection. (arXiv:2301.05499v1 [cs.CV])

Title: RCPS: Rectified Contrastive Pseudo Supervision for Semi-Supervised Medical Image Segmentation. (arXiv:2301.05500v1 [cs.CV])

Title: Deep learning-based approaches for human motion decoding in smart walkers for rehabilitation. (arXiv:2301.05575v1 [cs.CV])

Title: It's Just a Matter of Time: Detecting Depression with Time-Enriched Multimodal Transformers. (arXiv:2301.05453v1 [cs.CL])

Title: Learning to Control and Coordinate Hybrid Traffic Through Robot Vehicles at Complex and Unsignalized Intersections. (arXiv:2301.05294v1 [cs.LG])

Our method is also robust against both blackout events and sudden RV percentage drops, and enjoys excellent generalizablility, which is illustrated by its successful deployment in two unseen intersections.

biometric

steal

extraction

membership infer

federate

fair

interpretability

Title: Reworking geometric morphometrics into a methodology of transformation grids. (arXiv:2301.05623v1 [cs.CV])

For analyses of comparisons involving gradients at large geometric scale, this paper argues for replacement of all the Procrustes conventions by a version of my two-point registration of 1986 (originally Francis Galton's of 1907). The choice of the two points interacts with another non-Procrustes concern, interpretability of the grid lines of a coordinate system deformed according to a fitted polynomial trend rather than an interpolating thin-plate spline.

The paper works two examples using previously published cranial data; there result new findings pertinent to the interpretation of both of these classic data sets.

A concluding discussion suggests that the current toolkit of geometric morphometrics, centered on Procrustes shape coordinates and thin-plate splines, is too restricted to suit many of the interpretive purposes of evolutionary and developmental biology.

Title: From stage to page: language independent bootstrap measures of distinctiveness in fictional speech. (arXiv:2301.05659v1 [cs.CL])

explainability

watermark

diffusion

Title: Neural Image Compression with a Diffusion-Based Decoder. (arXiv:2301.05489v1 [cs.CV])

Title: In BLOOM: Creativity and Affinity in Artificial Lyrics and Art. (arXiv:2301.05402v1 [cs.CL])