Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2023
- ArticleDecember 2023
Loss and Likelihood Based Membership Inference of Diffusion Models
AbstractRecent years have witnessed the tremendous success of diffusion models in data synthesis. However, when diffusion models are applied to sensitive data, they also give rise to severe privacy concerns. In this paper, we present a comprehensive study ...
- ArticleDecember 2023
VNGuard: Intrusion Detection System for In-Vehicle Networks
AbstractRecently, autonomous and connected vehicles have gained popularity, revolutionizing consumer mobility. On the other hand, they are also becoming new targets exposing new attack vectors and vulnerabilities that may lead to critical consequences. In ...
- ArticleDecember 2023
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection
AbstractUnix Shell is a powerful tool for system developers and engineers, but it poses serious security risks when used by cybercriminals to execute malicious scripts. These scripts can compromise servers, steal confidential data, or cause system ...
- ArticleDecember 2023
- ArticleDecember 2023
Withdrawable Signature: How to Call Off a Signature
AbstractDigital signatures are a cornerstone of security and trust in cryptography, providing authenticity, integrity, and non-repudiation. Despite their benefits, traditional digital signature schemes suffer from inherent immutability, offering no ...
- ArticleDecember 2023
On the Privacy-Preserving Infrastructure for Authenticated Key Exchange
AbstractPrivacy-preserving authenticated key exchange (PPAKE) protocols aim at providing both session key indistinguishability and party identifier hiding. Parties in PPAKEs usually interact with a public key infrastructure (PKI) or similar services for ...
- ArticleDecember 2023
Privacy-Preserving Medical Data Generation Using Adversarial Learning
AbstractOutstanding performance has been observed in a number of real-world applications such as speech processing and image classification using deep learning models. However, developing these kinds of models in sensitive domains such as healthcare ...
- ArticleDecember 2023
TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments
AbstractWe present TC4SE, a trusted channel mechanism suitable for secure enclave-based trusted execution environments, such as Intel SGX, that leverages the existing security properties provided by the TEE remote attestation scheme and Transport Layer ...
- ArticleDecember 2023
Certificate Reuse in Android Applications
AbstractThe widespread adoption of Android apps has led to increasing concerns about the concept of “recycled trust” derived from the reuse of digital certificates. Android app developers frequently depend on digital certificates to sign their ...
- ArticleDecember 2023
From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions
AbstractBrowser extensions allow users to customise and improve their web browsing experience. The Manifest protocol was introduced to mitigate the risk of accidental vulnerabilities in extensions, introduced by inexperienced developers. In Manifest V2, ...
- ArticleDecember 2023
Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks
AbstractIn this work, we investigate privacy risks associated with model inversion attribute inference attacks. Specifically, we explore a case in which a governmental institute aims to release a trained machine learning model to the public (i.e., for ...
- back-matterNovember 2023