Skip to main content

Showing 1–44 of 44 results for author: Oprea, A

  1. arXiv:2407.08159  [pdf, other

    cs.CR cs.LG

    Model-agnostic clean-label backdoor mitigation in cybersecurity environments

    Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Alina Oprea

    Abstract: The training phase of machine learning models is a delicate step, especially in cybersecurity contexts. Recent research has surfaced a series of insidious training-time attacks that inject backdoors in models designed for security classification tasks without altering the training labels. With this work, we propose new techniques that leverage insights in cybersecurity threat models to effectively… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 14 pages, 8 figures

  2. arXiv:2405.20539  [pdf, other

    cs.LG cs.CR

    SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents

    Authors: Ethan Rathbun, Christopher Amato, Alina Oprea

    Abstract: Reinforcement learning (RL) is an actively growing field that is seeing increased usage in real-world, safety-critical applications -- making it paramount to ensure the robustness of RL algorithms against adversarial attacks. In this work we explore a particularly stealthy form of training-time attacks against RL -- backdoor poisoning. Here the adversary intercepts the training of an RL agent with… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 23 pages, 14 figures, NeurIPS

  3. arXiv:2405.20485  [pdf, other

    cs.CR cs.CL cs.LG

    Phantom: General Trigger Attacks on Retrieval Augmented Language Generation

    Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Retrieval Augmented Generation (RAG) expands the capabilities of modern large language models (LLMs) in chatbot applications, enabling developers to adapt and personalize the LLM output without expensive training or fine-tuning. RAG systems use an external knowledge database to retrieve the most relevant documents for a given query, providing this context to the LLM generator. While RAG achieves i… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2402.16982  [pdf, other

    cs.CR cs.PL

    Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting

    Authors: Lisa Oakley, Steven Holtzen, Alina Oprea

    Abstract: Programmatically generating tight differential privacy (DP) bounds is a hard problem. Two core challenges are (1) finding expressive, compact, and efficient encodings of the distributions of DP algorithms, and (2) state space explosion stemming from the multiple quantifiers and relational properties of the DP definition. We address the first challenge by developing a method for tight privacy and… ▽ More

    Submitted 29 February, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  5. arXiv:2310.09266  [pdf, other

    cs.CR cs.CL cs.LG

    User Inference Attacks on Large Language Models

    Authors: Nikhil Kandpal, Krishna Pillutla, Alina Oprea, Peter Kairouz, Christopher A. Choquette-Choo, Zheng Xu

    Abstract: Fine-tuning is a common and effective method for tailoring large language models (LLMs) to specialized tasks and applications. In this paper, we study the privacy implications of fine-tuning LLMs on user data. To this end, we consider a realistic threat model, called user inference, wherein an attacker infers whether or not a user's data was used for fine-tuning. We design attacks for performing u… ▽ More

    Submitted 23 February, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: v2 contains experiments on additional datasets and differential privacy

  6. arXiv:2310.03838  [pdf, other

    cs.LG

    Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning

    Authors: Harsh Chaudhari, Giorgio Severi, Alina Oprea, Jonathan Ullman

    Abstract: The integration of machine learning (ML) in numerous critical applications introduces a range of privacy concerns for individuals who provide their datasets for model training. One such privacy risk is Membership Inference (MI), in which an attacker seeks to determine whether a particular data sample was included in the training dataset of a model. Current state-of-the-art MI attacks capitalize on… ▽ More

    Submitted 16 January, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: To appear at International Conference on Learning Representations (ICLR) 2024

  7. arXiv:2309.01614  [pdf, other

    cs.LG cs.CR

    Dropout Attacks

    Authors: Andrew Yuan, Alina Oprea, Cheng Tan

    Abstract: Dropout is a common operator in deep learning, aiming to prevent overfitting by randomly dropping neurons during training. This paper introduces a new family of poisoning attacks against neural networks named DROPOUTATTACK. DROPOUTATTACK attacks the dropout operator by manipulating the selection of neurons to drop instead of selecting them uniformly at random. We design, implement, and evaluate fo… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  8. arXiv:2306.01655  [pdf, other

    cs.CR cs.LG

    Poisoning Network Flow Classifiers

    Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer

    Abstract: As machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary's capabilities are constra… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: 14 pages, 8 figures

  9. arXiv:2306.01181  [pdf, other

    cs.LG cs.CR

    TMI! Finetuned Models Leak Private Information from their Pretraining Data

    Authors: John Abascal, Stanley Wu, Alina Oprea, Jonathan Ullman

    Abstract: Transfer learning has become an increasingly popular technique in machine learning as a way to leverage a pretrained model trained for one task to assist with building a finetuned model for a related task. This paradigm has been especially popular for $\textit{privacy}$ in machine learning, where the pretrained model is considered public, and only the data for finetuning is considered sensitive. H… ▽ More

    Submitted 21 March, 2024; v1 submitted 1 June, 2023; originally announced June 2023.

  10. arXiv:2305.18447  [pdf, other

    cs.LG cs.CR cs.IT math.ST

    Unleashing the Power of Randomization in Auditing Differentially Private ML

    Authors: Krishna Pillutla, Galen Andrew, Peter Kairouz, H. Brendan McMahan, Alina Oprea, Sewoong Oh

    Abstract: We present a rigorous methodology for auditing differentially private machine learning algorithms by adding multiple carefully designed examples called canaries. We take a first principles approach based on three key components. First, we introduce Lifted Differential Privacy (LiDP) that expands the definition of differential privacy to handle randomized datasets. This gives us the freedom to desi… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  11. arXiv:2302.03098  [pdf, other

    cs.LG cs.CR

    One-shot Empirical Privacy Estimation for Federated Learning

    Authors: Galen Andrew, Peter Kairouz, Sewoong Oh, Alina Oprea, H. Brendan McMahan, Vinith M. Suriyakumar

    Abstract: Privacy estimation techniques for differentially private (DP) algorithms are useful for comparing against analytical bounds, or to empirically measure privacy loss in settings where known analytical bounds are not tight. However, existing privacy auditing techniques usually make strong assumptions on the adversary (e.g., knowledge of intermediate model iterates or the training data distribution),… ▽ More

    Submitted 18 April, 2024; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: Final revision, oral presentation at ICLR 2024

  12. arXiv:2301.09732  [pdf, other

    cs.LG cs.CR

    Backdoor Attacks in Peer-to-Peer Federated Learning

    Authors: Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets. While federated learning (FL) mitigates to some extent these privacy risks, it relies on a trusted aggregation server for training a shared global model. Recently, new distributed learning architectures based on Peer-to-Peer Federated Learning (P2PFL) offer advanta… ▽ More

    Submitted 25 June, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  13. arXiv:2210.03239  [pdf, other

    cs.CR

    Bad Citrus: Reducing Adversarial Costs with Model Distances

    Authors: Giorgio Severi, Will Pearce, Alina Oprea

    Abstract: Recent work by Jia et al., showed the possibility of effectively computing pairwise model distances in weight space, using a model explanation technique known as LIME. This method requires query-only access to the two models under examination. We argue this insight can be leveraged by an adversary to reduce the net cost (number of queries) of launching an evasion campaign against a deployed model.… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  14. arXiv:2208.12911  [pdf, other

    cs.CR cs.LG cs.NI

    Network-Level Adversaries in Federated Learning

    Authors: Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru

    Abstract: Federated learning is a popular strategy for training models on distributed, sensitive data, while preserving data privacy. Prior work identified a range of security threats on federated learning protocols that poison the data or the model. However, federated learning is a networked system where the communication between clients and server plays a critical role for the learning task performance. W… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: 12 pages. Appearing at IEEE CNS 2022

  15. arXiv:2208.12348  [pdf, other

    cs.LG cs.CR

    SNAP: Efficient Extraction of Private Properties with Poisoning

    Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

    Abstract: Property inference attacks allow an adversary to extract global properties of the training dataset from a machine learning model. Such attacks have privacy implications for data owners sharing their datasets to train machine learning models. Several existing approaches for property inference attacks against deep neural networks have been proposed, but they all rely on the attacker training a large… ▽ More

    Submitted 21 June, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 28 pages, 16 figures

  16. Black-box Attacks Against Neural Binary Function Detection

    Authors: Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William Robertson

    Abstract: Binary analyses based on deep neural networks (DNNs), or neural binary analyses (NBAs), have become a hotly researched topic in recent years. DNNs have been wildly successful at pushing the performance and accuracy envelopes in the natural language and image processing domains. Thus, DNNs are highly promising for solving binary analysis problems that are typically hard due to a lack of complete in… ▽ More

    Submitted 31 July, 2023; v1 submitted 24 August, 2022; originally announced August 2022.

    Comments: 16 pages

    Journal ref: The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), October 16-18, 2023

  17. arXiv:2208.03276  [pdf, other

    cs.CR math.DS stat.AP

    Modeling Self-Propagating Malware with Epidemiological Models

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has recently resulted in large financial losses and high social impact, with well-known campaigns such as WannaCry and Colonial Pipeline being able to propagate rapidly on the Internet and cause service disruptions. To date, the propagation behavior of SPM is still not well understood, resulting in the difficulty of defending against these cyber threats. To address t… ▽ More

    Submitted 3 August, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

  18. arXiv:2206.13594  [pdf, other

    cs.CR math.DS math.SP stat.AP

    Cyber Network Resilience against Self-Propagating Malware Attacks

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of developing cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that a… ▽ More

    Submitted 8 October, 2022; v1 submitted 27 June, 2022; originally announced June 2022.

    Comments: 20 pages

  19. arXiv:2205.11459  [pdf, other

    cs.CR cs.LG

    CELEST: Federated Learning for Globally Coordinated Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson

    Abstract: The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat detection, a federated machine learning framework for global threat detection over HTTP, which is one of the most commonly used protocols for malware… ▽ More

    Submitted 16 March, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  20. arXiv:2205.09986  [pdf, other

    cs.CR cs.LG

    SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

    Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea

    Abstract: Secure multiparty computation (MPC) has been proposed to allow multiple mutually distrustful data owners to jointly train machine learning (ML) models on their combined data. However, by design, MPC protocols faithfully compute the training functionality, which the adversarial ML community has shown to leak private information and can be tampered with in poisoning attacks. In this work, we argue t… ▽ More

    Submitted 8 September, 2022; v1 submitted 20 May, 2022; originally announced May 2022.

  21. arXiv:2205.06369  [pdf, other

    cs.LG cs.CR

    How to Combine Membership-Inference Attacks on Multiple Updated Models

    Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu

    Abstract: A large body of research has shown that machine learning models are vulnerable to membership inference (MI) attacks that violate the privacy of the participants in the training data. Most MI research focuses on the case of a single standalone model, while production machine-learning platforms often update models over time, on data that often shifts in distribution, giving the attacker more informa… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: 31 pages, 9 figures

  22. arXiv:2205.01992  [pdf, other

    cs.LG cs.AI cs.CR

    Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

    Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli

    Abstract: The success of machine learning is fueled by the increasing availability of computing power and large training datasets. The training data is used to learn new models or update existing ones, assuming that it is sufficiently representative of the data that will be encountered at test time. This assumption is challenged by the threat of poisoning, an attack that manipulates the training data to com… ▽ More

    Submitted 9 March, 2023; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 35 pages, Accepted at ACM Computing Surveys

  23. arXiv:2112.13798  [pdf, other

    cs.CR

    PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

    Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan

    Abstract: Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques, and can evade existing detection mechanisms. We propose PORTFILER (PORT-Level Network Traffic ProFILER), a new machine learning system applied to ne… ▽ More

    Submitted 24 May, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021

  24. Living-Off-The-Land Command Detection Using Active Learning

    Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt

    Abstract: In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly common evasive method is to hide the malicious activity behind a benign program by using tools that are already installed on user computers. These programs are usually part of the operating system distrib… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 14 pages, published in RAID 2021

  25. arXiv:2110.02125  [pdf, other

    cs.CR cs.FL cs.LG eess.SY

    Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems

    Authors: Lisa Oakley, Alina Oprea, Stavros Tripakis

    Abstract: Probabilistic model checking is a useful technique for specifying and verifying properties of stochastic systems including randomized protocols and reinforcement learning models. Existing methods rely on the assumed structure and probabilities of certain system transitions. These assumptions may be incorrect, and may even be violated by an adversary who gains control of system components. In thi… ▽ More

    Submitted 31 July, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: To Appear, 35th IEEE Computer Security Foundations Symposium (2022)

  26. arXiv:2104.11636  [pdf, other

    cs.CR

    Collaborative Information Sharing for ML-Based Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson

    Abstract: Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat sharing platforms cannot easily adapt to emerging attack patterns. At the same time, enterprises started to adopt machine learning-based threat detection… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 5 figures. To be published in AI4CS-SDM2021

  27. arXiv:2104.10034  [pdf, other

    cs.CR

    On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

    Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea

    Abstract: Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be meaningfully trained, tested, and evaluated. Synthetically produced data containing fabricated or merged network traffic is of limited value as it is… ▽ More

    Submitted 27 May, 2022; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 4+2 pages, 3 figures, 1 table, for AI4CS-SDM21

  28. arXiv:2012.07805  [pdf, other

    cs.CR cs.CL cs.LG

    Extracting Training Data from Large Language Models

    Authors: Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin Raffel

    Abstract: It has become common to publish large (billion parameter) language models that have been trained on private datasets. This paper demonstrates that in such settings, an adversary can perform a training data extraction attack to recover individual training examples by querying the language model. We demonstrate our attack on GPT-2, a language model trained on scrapes of the public Internet, and ar… ▽ More

    Submitted 15 June, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  29. arXiv:2006.14026  [pdf, other

    cs.LG cs.CR stat.ML

    Subpopulation Data Poisoning Attacks

    Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea

    Abstract: Machine learning systems are deployed in critical settings, but they might fail in unexpected ways, impacting the accuracy of their predictions. Poisoning attacks against machine learning induce adversarial modification of data used by a machine learning algorithm to selectively change its output when it is deployed. In this work, we introduce a novel data poisoning attack called a \emph{subpopula… ▽ More

    Submitted 12 May, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: May12 update: add sever + backdoor defenses, comparison to witches' brew attack, better comparison to related work, transferability of representations for cmatch

  30. arXiv:2006.11928  [pdf, other

    cs.CR cs.LG

    With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models

    Authors: Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian

    Abstract: With the rise of third parties in the machine learning pipeline, the service provider in "Machine Learning as a Service" (MLaaS), or external data contributors in online learning, or the retraining of existing models, the need to ensure the security of the resulting machine learning models has become an increasingly important topic. The security community has demonstrated that without transparency… ▽ More

    Submitted 19 May, 2021; v1 submitted 21 June, 2020; originally announced June 2020.

    Comments: Accepted to IEEE Transactions on Information Forensics and Security (TIFS) 2021

  31. arXiv:2006.07709  [pdf, other

    cs.CR cs.LG

    Auditing Differentially Private Machine Learning: How Private is Private SGD?

    Authors: Matthew Jagielski, Jonathan Ullman, Alina Oprea

    Abstract: We investigate whether Differentially Private SGD offers better privacy in practice than what is guaranteed by its state-of-the-art analysis. We do so via novel data poisoning attacks, which we show correspond to realistic privacy attacks. While previous work (Ma et al., arXiv 2019) proposed this connection between differential privacy and data poisoning as a defense against data poisoning, our us… ▽ More

    Submitted 13 June, 2020; originally announced June 2020.

  32. arXiv:2003.01031  [pdf, other

    cs.CR cs.LG

    Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

    Authors: Giorgio Severi, Jim Meyer, Scott Coull, Alina Oprea

    Abstract: Training pipelines for machine learning (ML) based malware classification often rely on crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study the susceptibility of feature-based ML malware classifiers to backdoor poisoning attacks, specifically focusing on challenging "clean label" attacks where attackers do not control the sample labeling process. We propos… ▽ More

    Submitted 10 January, 2021; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: 18 pages, 5 figures. To appear in USENIX Security 2021

  33. arXiv:1909.10480  [pdf, other

    cs.CR cs.LG

    FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments

    Authors: Alesia Chernikova, Alina Oprea

    Abstract: As advances in Deep Neural Networks (DNNs) demonstrate unprecedented levels of performance in many critical applications, their vulnerability to attacks is still an open question. We consider evasion attacks at testing time against Deep Learning in constrained environments, in which dependencies between features need to be satisfied. These situations may arise naturally in tabular data or may be t… ▽ More

    Submitted 14 June, 2022; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: 35 pages

  34. arXiv:1908.01928  [pdf, other

    cs.CR

    AppMine: Behavioral Analytics for Web Application Vulnerability Detection

    Authors: Indranil Jana, Alina Oprea

    Abstract: Web applications in widespread use have always been the target of large-scale attacks, leading to massive disruption of services and financial loss, as in the Equifax data breach. It has become common practice to deploy web application in containers like Docker for better portability and ease of deployment. We design a system called AppMine for lightweight monitoring of web applications running in… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  35. arXiv:1908.00592  [pdf, other

    cs.CR

    The House That Knows You: User Authentication Based on IoT Data

    Authors: Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh

    Abstract: Home-based Internet of Things (IoT) devices have gained in popularity and many households have become 'smart' by using devices such as smart sensors, locks, and voice-based assistants. Traditional authentication methods such as passwords, biometrics or multi-factor (using SMS or email) are either not applicable in the smart home setting, or they are inconvenient as they break the natural flow of i… ▽ More

    Submitted 27 December, 2021; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 11 pages, 5 figures

  36. arXiv:1907.04846  [pdf, other

    cs.CR cs.LG stat.ML

    On Designing Machine Learning Models for Malicious Network Traffic Classification

    Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad

    Abstract: Machine learning (ML) started to become widely deployed in cyber security settings for shortening the detection cycle of cyber attacks. To date, most ML-based systems are either proprietary or make specific choices of feature representations and machine learning models. The success of these techniques is difficult to assess as public benchmark datasets are currently unavailable. In this paper, we… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  37. QFlip: An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game

    Authors: Lisa Oakley, Alina Oprea

    Abstract: A rise in Advanced Persistent Threats (APTs) has introduced a need for robustness against long-running, stealthy attacks which circumvent existing cryptographic security guarantees. FlipIt is a security game that models attacker-defender interactions in advanced scenarios such as APTs. Previous work analyzed extensively non-adaptive strategies in FlipIt, but adaptive strategies rise naturally in p… ▽ More

    Submitted 20 December, 2019; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: Outstanding Student Paper award

    Journal ref: Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science, vol 11836. Springer, Cham. pp 364-384

  38. arXiv:1904.07370  [pdf, other

    cs.LG cs.CR stat.ML

    Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction

    Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim

    Abstract: Deep Neural Networks (DNNs) have tremendous potential in advancing the vision for self-driving cars. However, the security of DNN models in this context leads to major safety implications and needs to be better understood. We consider the case study of steering angle prediction from camera images, using the dataset from the 2014 Udacity challenge. We demonstrate for the first time adversarial test… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: Preprint of the work accepted for publication at the IEEE Workshop on the Internet of Safe Things, San Francisco, CA, USA, May 23, 2019

  39. arXiv:1904.04475  [pdf, other

    cs.CR cs.AI cs.DB cs.DS

    Private Hierarchical Clustering and Efficient Approximation

    Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos

    Abstract: In collaborative learning, multiple parties contribute their datasets to jointly deduce global machine learning models for numerous predictive tasks. Despite its efficacy, this learning paradigm fails to encompass critical application domains that involve highly sensitive data, such as healthcare and security analytics, where privacy risks limit entities to individually train models using only the… ▽ More

    Submitted 1 October, 2021; v1 submitted 9 April, 2019; originally announced April 2019.

    Journal ref: CCSW 2021

  40. arXiv:1812.02696  [pdf, other

    cs.LG cs.DS cs.GT stat.ML

    Differentially Private Fair Learning

    Authors: Matthew Jagielski, Michael Kearns, Jieming Mao, Alina Oprea, Aaron Roth, Saeed Sharifi-Malvajerdi, Jonathan Ullman

    Abstract: Motivated by settings in which predictive models may be required to be non-discriminatory with respect to certain attributes (such as race), but even collecting the sensitive attribute may be forbidden or restricted, we initiate the study of fair learning under the constraint of differential privacy. We design two learning algorithms that simultaneously promise differential privacy and equalized o… ▽ More

    Submitted 31 May, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

  41. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  42. arXiv:1804.00308  [pdf, other

    cs.CR cs.GT cs.LG

    Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

    Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li

    Abstract: As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms. In this paper, we perform the first systematic study of poisoning attacks and their countermeasures for linear regression models. In poisoning attacks, attackers deliberately influence the training data to manipulate the re… ▽ More

    Submitted 28 September, 2021; v1 submitted 1 April, 2018; originally announced April 2018.

    Comments: Preprint of the work accepted for publication at the 39th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 21-23, 2018; Sept 28 '21 update: add citation to trimmed losses

  43. arXiv:1608.02257  [pdf, other

    cs.LG cs.CR stat.ML

    Robust High-Dimensional Linear Regression

    Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea

    Abstract: The effectiveness of supervised learning techniques has made them ubiquitous in research and practice. In high-dimensional settings, supervised learning commonly relies on dimensionality reduction to improve performance and identify the most important factors in predicting outcomes. However, the economic importance of learning has made it a natural target for adversarial manipulation of training d… ▽ More

    Submitted 9 August, 2016; v1 submitted 7 August, 2016; originally announced August 2016.

  44. arXiv:1411.5005  [pdf, ps, other

    cs.CR

    Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data

    Authors: Alina Oprea, Zhou Li, Ting-Fang Yen, Sang Chin, Sumayah Alrwais

    Abstract: Recent years have seen the rise of more sophisticated attacks including advanced persistent threats (APTs) which pose severe risks to organizations and governments by targeting confidential proprietary information. Additionally, new malware strains are appearing at a higher rate than ever before. Since many of these malware are designed to evade existing security products, traditional defenses dep… ▽ More

    Submitted 24 November, 2014; v1 submitted 18 November, 2014; originally announced November 2014.