首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning 你的标签出卖了你:垂直联合学习中的关系泄漏
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3208630
Pengyu Qiu, Xuhong Zhang, S. Ji, Tianyu Du, Yuwen Pu, Junfeng Zhou, Ting Wang
Vertical federated learning (VFL) is an emerging privacy-preserving paradigm that enables collaboration between companies. These companies have the same set of users but different features. One of them is interested in expanding new business or improving its current service with others’ features. For instance, an e-commerce company, who wants to improve its recommendation performance, can incorporate users’ preferences from another corporation such as a social media company through VFL. On the other hand, graph data is a powerful and sensitive type of data widely used in industry. Their leakage, e.g., the node leakage and/or the relation leakage, can cause severe privacy issues and financial loss. Therefore, protecting the security of graph data is important in practice. Though a line of work has studied how to learn with graph data in VFL, the privacy risks remain underexplored. In this paper, we perform the first systematic study on relation inference attacks to reveal VFL's risk of leaking samples’ relations. Specifically, we assume the adversary to be a semi-honest participant. Then, according to the adversary's knowledge level, we formulate three kinds of attacks based on different intermediate representations. Particularly, we design a novel numerical approximation method to handle VFL's encryption mechanism on the participant's representations. Extensive evaluations with four real-world datasets demonstrate the effectiveness of our attacks. For instance, the area under curve of relation inference can reach more than 90%, implying an impressive relation inference capability. Furthermore, we evaluate possible defenses to examine our attacks’ robustness. The results show that their impacts are limited. Our work highlights the need for advanced defenses to protect private relations and calls for more exploration of VFL's privacy and security issues.
垂直联合学习(VFL)是一种新兴的隐私保护模式,可以实现公司之间的协作。这些公司拥有相同的用户群,但功能不同。其中一家公司有兴趣扩大新业务或利用其他公司的功能改进现有服务。例如,一家电子商务公司想要提高其推荐性能,可以通过VFL整合来自另一家公司(如社交媒体公司)的用户偏好。另一方面,图形数据是一种在工业中广泛使用的强大而敏感的数据类型。它们的泄漏,例如节点泄漏和/或关系泄漏,可能会导致严重的隐私问题和财务损失。因此,保护图形数据的安全性在实践中具有重要意义。尽管已经有一系列工作研究了如何在VFL中使用图形数据进行学习,但隐私风险仍未得到充分挖掘。在本文中,我们对关系推理攻击进行了首次系统研究,以揭示VFL泄露样本关系的风险。具体来说,我们假设对手是一个半诚实的参与者。然后,根据对手的知识水平,我们基于不同的中间表示制定了三种攻击。特别地,我们设计了一种新的数值近似方法来处理VFL对参与者表示的加密机制。对四个真实世界数据集的广泛评估证明了我们攻击的有效性。例如,关系推理的曲线下面积可以达到90%以上,这意味着关系推理能力令人印象深刻。此外,我们评估了可能的防御,以检查我们的攻击的稳健性。结果表明,它们的影响是有限的。我们的工作强调了保护私人关系的先进防御的必要性,并呼吁对VFL的隐私和安全问题进行更多的探索。
{"title":"Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning","authors":"Pengyu Qiu, Xuhong Zhang, S. Ji, Tianyu Du, Yuwen Pu, Junfeng Zhou, Ting Wang","doi":"10.1109/TDSC.2022.3208630","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3208630","url":null,"abstract":"Vertical federated learning (VFL) is an emerging privacy-preserving paradigm that enables collaboration between companies. These companies have the same set of users but different features. One of them is interested in expanding new business or improving its current service with others’ features. For instance, an e-commerce company, who wants to improve its recommendation performance, can incorporate users’ preferences from another corporation such as a social media company through VFL. On the other hand, graph data is a powerful and sensitive type of data widely used in industry. Their leakage, e.g., the node leakage and/or the relation leakage, can cause severe privacy issues and financial loss. Therefore, protecting the security of graph data is important in practice. Though a line of work has studied how to learn with graph data in VFL, the privacy risks remain underexplored. In this paper, we perform the first systematic study on relation inference attacks to reveal VFL's risk of leaking samples’ relations. Specifically, we assume the adversary to be a semi-honest participant. Then, according to the adversary's knowledge level, we formulate three kinds of attacks based on different intermediate representations. Particularly, we design a novel numerical approximation method to handle VFL's encryption mechanism on the participant's representations. Extensive evaluations with four real-world datasets demonstrate the effectiveness of our attacks. For instance, the area under curve of relation inference can reach more than 90%, implying an impressive relation inference capability. Furthermore, we evaluate possible defenses to examine our attacks’ robustness. The results show that their impacts are limited. Our work highlights the need for advanced defenses to protect private relations and calls for more exploration of VFL's privacy and security issues.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3653-3668"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47099346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering 基于向量置换和移位排序的可取消指纹模板构造
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3213704
S. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang
The need for cancelable biometric techniques has seen a progressive rise due to the rapid deployment of biometric authentication systems. These techniques prevent compromising biometric data by generating and using their corresponding cancelable templates for user authentication. However, the non-invertible distance preserving transformation methods employed in various schemes are often vulnerable to information leakage since matching is performed in the transform domain. This paper proposed a non-invertible distance preserving scheme based on vector permutation and shift-order process. First, the dimension of feature vectors is reduced using kernelized principal component analysis before randomly permuting the extracted vector features. A shift-order process is then applied to the generated features to achieve non-invertibility and combat similarity correlation-based attacks. The generated hash codes are resilient to various security and privacy attacks such as ARM, masquerade, and brute-force preimage. Experimental evaluations conducted on eight fingerprint datasets from FVC2002, FVC2004, and FVC2006 reveal a high matching performance of the proposed method with better recognition accuracy than other existing state-of-the-art. The scheme also fulfills the revocability and unlinkability requirements of cancelable biometrics.
由于生物识别认证系统的快速部署,对可取消的生物识别技术的需求逐渐增加。这些技术通过生成和使用相应的可取消的用户身份验证模板来防止泄露生物识别数据。然而,各种方案采用的不可逆距离保持变换方法由于在变换域中进行匹配,容易造成信息泄露。提出了一种基于向量置换和移位阶过程的不可逆距离保持方案。首先,利用核主成分分析对特征向量进行降维,然后对提取的特征向量进行随机排列;然后对生成的特征应用移位顺序处理以实现不可逆性并对抗基于相似性相关的攻击。生成的哈希码可以抵御各种安全和隐私攻击,例如ARM、假面攻击和暴力预映像。在FVC2002、FVC2004和FVC2006 3个指纹数据集上进行的实验表明,该方法具有较高的匹配性能,识别精度优于现有方法。该方案还满足了可取消生物特征的可撤销性和不可链接性要求。
{"title":"Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering","authors":"S. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang","doi":"10.1109/TDSC.2022.3213704","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3213704","url":null,"abstract":"The need for cancelable biometric techniques has seen a progressive rise due to the rapid deployment of biometric authentication systems. These techniques prevent compromising biometric data by generating and using their corresponding cancelable templates for user authentication. However, the non-invertible distance preserving transformation methods employed in various schemes are often vulnerable to information leakage since matching is performed in the transform domain. This paper proposed a non-invertible distance preserving scheme based on vector permutation and shift-order process. First, the dimension of feature vectors is reduced using kernelized principal component analysis before randomly permuting the extracted vector features. A shift-order process is then applied to the generated features to achieve non-invertibility and combat similarity correlation-based attacks. The generated hash codes are resilient to various security and privacy attacks such as ARM, masquerade, and brute-force preimage. Experimental evaluations conducted on eight fingerprint datasets from FVC2002, FVC2004, and FVC2006 reveal a high matching performance of the proposed method with better recognition accuracy than other existing state-of-the-art. The scheme also fulfills the revocability and unlinkability requirements of cancelable biometrics.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3828-3844"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45347372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning 使用数据来源和度量学习的高级持续威胁检测
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3221789
Khandakar Ashrafi Akbar, Yigong Wang, G. Ayoade, Y. Gao, A. Singhal, L. Khan, B. Thuraisingham, Kangkook Jee
Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation-states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they leverage zero-day attacks and common benign tools. Furthermore, these attack campaigns are often prolonged to evade detection. We leverage an approach that uses a provenance graph to obtain execution traces of host nodes in order to detect anomalous behavior. By using the provenance graph, we extract features that are then used to train an online adaptive metric learning. Online metric learning is a deep learning method that learns a function to minimize the separation between similar classes and maximizes the separation between dis- similar instances. We compare our approach with baseline models and we show our method outperforms the baseline models by increasing detection accuracy on average by 11.3% and increases True positive rate (TPR) on average by 18.3%. We also show that our method outperforms several state-of-the-art models performances in comprehensive attack datasets in both binary and multi-class settings.
近年来,由于民族国家和复杂的公司对获取重要信息的兴趣增加,高级持续性威胁(APT)有所增加。通常,APT攻击更难以检测,因为它们利用零日攻击和常见的良性工具。此外,这些攻击活动通常会延长时间以逃避检测。我们利用一种方法,使用来源图来获取主机节点的执行痕迹,以检测异常行为。通过使用来源图,我们提取特征,然后用于训练在线自适应度量学习。在线度量学习是一种深度学习方法,它学习一个函数来最小化相似类之间的分离,最大化不相似实例之间的分离。我们将我们的方法与基线模型进行了比较,结果表明我们的方法优于基线模型,平均提高了11.3%的检测准确率,平均提高了18.3%的真阳性率(TPR)。我们还表明,在二进制和多类设置的综合攻击数据集中,我们的方法优于几种最先进的模型性能。
{"title":"Advanced Persistent Threat Detection Using Data Provenance and Metric Learning","authors":"Khandakar Ashrafi Akbar, Yigong Wang, G. Ayoade, Y. Gao, A. Singhal, L. Khan, B. Thuraisingham, Kangkook Jee","doi":"10.1109/TDSC.2022.3221789","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3221789","url":null,"abstract":"Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation-states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they leverage zero-day attacks and common benign tools. Furthermore, these attack campaigns are often prolonged to evade detection. We leverage an approach that uses a provenance graph to obtain execution traces of host nodes in order to detect anomalous behavior. By using the provenance graph, we extract features that are then used to train an online adaptive metric learning. Online metric learning is a deep learning method that learns a function to minimize the separation between similar classes and maximizes the separation between dis- similar instances. We compare our approach with baseline models and we show our method outperforms the baseline models by increasing detection accuracy on average by 11.3% and increases True positive rate (TPR) on average by 18.3%. We also show that our method outperforms several state-of-the-art models performances in comprehensive attack datasets in both binary and multi-class settings.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3957-3969"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43629804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol SofitMix:一个安全的离线支持的比特币兼容混合协议
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3213824
Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao
Privacy preservation is highly expected in the Bitcoin Network. However, only applying pseudonyms cannot completely ensure anonymity/unlinkability between payers and payees. Current approaches mainly depend on a mixer service, which obfuscates payer-payee relationships of transactions. While the mixer service improves transaction privacy, it still suffers from some severe security threats (e.g., DoS attack and collusion attack), and does not support effective and reliable off-chain payment in a parallel mode. In this article, we propose a mixing protocol for the Bitcoin Network based on zero-knowledge proof, called SofitMix. It is the first mixing protocol that can effectively resist both the DoS attack and the collusion attack. It can also support a set of parallel off-chain payments in a reliable way no matter whether some payers abort a transaction. We analyze and prove SofitMix security following the Universal Composability model with regard to fair exchange, unlinkability, collusion-resistance, DoS-resistance and Sybil-resistance. Through a proof-of-concept implementation, we demonstrate its validity and fairness. We also show its advance on off-chain payment reliability and DoS attack resistance, compared to TumbleBit.
比特币网络对隐私保护寄予厚望。然而,仅使用假名并不能完全确保付款人和收款人之间的匿名性/不可链接性。当前的方法主要依赖于混合器服务,它混淆了事务的付款人-收款人关系。虽然混合器服务提高了交易的隐私性,但它仍然受到一些严重的安全威胁(例如DoS攻击和共谋攻击),并且不支持并行模式下有效可靠的链下支付。在本文中,我们提出了一种基于零知识证明的比特币网络混合协议,称为SofitMix。它是第一个既能有效抵御DoS攻击又能有效抵御合谋攻击的混合协议。它还可以以可靠的方式支持一组并行的链下支付,无论一些支付方是否终止交易。从公平交换、不可链接性、抗共谋性、抗dos性和抗sybil性等方面分析并证明了SofitMix的安全性。通过概念验证实现,我们证明了其有效性和公平性。与TumbleBit相比,我们还展示了它在链下支付可靠性和抗DoS攻击方面的进步。
{"title":"SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol","authors":"Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao","doi":"10.1109/TDSC.2022.3213824","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3213824","url":null,"abstract":"Privacy preservation is highly expected in the Bitcoin Network. However, only applying pseudonyms cannot completely ensure anonymity/unlinkability between payers and payees. Current approaches mainly depend on a mixer service, which obfuscates payer-payee relationships of transactions. While the mixer service improves transaction privacy, it still suffers from some severe security threats (e.g., DoS attack and collusion attack), and does not support effective and reliable off-chain payment in a parallel mode. In this article, we propose a mixing protocol for the Bitcoin Network based on zero-knowledge proof, called SofitMix. It is the first mixing protocol that can effectively resist both the DoS attack and the collusion attack. It can also support a set of parallel off-chain payments in a reliable way no matter whether some payers abort a transaction. We analyze and prove SofitMix security following the Universal Composability model with regard to fair exchange, unlinkability, collusion-resistance, DoS-resistance and Sybil-resistance. Through a proof-of-concept implementation, we demonstrate its validity and fairness. We also show its advance on off-chain payment reliability and DoS attack resistance, compared to TumbleBit.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4311-4324"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42980939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security 基于分层块变长编码的云安全可逆数据隐藏
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3219843
Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-chen Chang
Reversible data hiding in encrypted images (RDHEI) can serve as a technical solution to secure data in applications that rely on cloud storage. The key features of an RDHEI scheme are reversibility, security, and data embedding rate. To enlarge the embedding rate, this paper proposes a novel RDHEI scheme based on the median edge detector (MED) and a new proposed hierarchical block variable length coding (HBVLC) technique. In our scheme, the image owner first predicts the pixel values of the carrier image with MED. Then, the prediction error array is sliced into bit-planes and encoded plane by plane. By leveraging the inherent features of the prediction error bit-planes, the image owner adaptively decomposes a bit-plane into blocks of different hierarchical levels based on its local smoothness and encodes the blocks with a variable length coding method. As a result, the carrier image is efficiently compressed to provide spare room for data embedding. The encoded carrier image is then processed with the conventional steps of an RDHEI technique. Experimental results show that the proposed scheme not only can restore the secret data and the carrier image without loss but also outperforms state-of-the-art methods in the embedding rate for images with various features.
隐藏在加密图像中的可逆数据(RDHEI)可以作为一种技术解决方案,在依赖云存储的应用程序中保护数据。RDHEI方案的关键特征是可逆性、安全性和数据嵌入率。为了提高嵌入率,本文提出了一种新的基于中值边缘检测器(MED)的RDHEI方案和一种新提出的分层块可变长度编码(HBVLC)技术。在我们的方案中,图像所有者首先用MED预测载波图像的像素值。然后,将预测误差阵列分割成位平面并逐平面编码。通过利用预测误差位平面的固有特征,图像所有者基于其局部平滑度将位平面自适应地分解为不同层次级别的块,并使用可变长度编码方法对块进行编码。结果,载体图像被有效地压缩以提供用于数据嵌入的空闲空间。编码的载体图像然后用RDHEI技术的常规步骤进行处理。实验结果表明,该方案不仅可以无损地恢复秘密数据和载体图像,而且在具有各种特征的图像的嵌入率方面优于现有技术。
{"title":"Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security","authors":"Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-chen Chang","doi":"10.1109/TDSC.2022.3219843","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3219843","url":null,"abstract":"Reversible data hiding in encrypted images (RDHEI) can serve as a technical solution to secure data in applications that rely on cloud storage. The key features of an RDHEI scheme are reversibility, security, and data embedding rate. To enlarge the embedding rate, this paper proposes a novel RDHEI scheme based on the median edge detector (MED) and a new proposed hierarchical block variable length coding (HBVLC) technique. In our scheme, the image owner first predicts the pixel values of the carrier image with MED. Then, the prediction error array is sliced into bit-planes and encoded plane by plane. By leveraging the inherent features of the prediction error bit-planes, the image owner adaptively decomposes a bit-plane into blocks of different hierarchical levels based on its local smoothness and encodes the blocks with a variable length coding method. As a result, the carrier image is efficiently compressed to provide spare room for data embedding. The encoded carrier image is then processed with the conventional steps of an RDHEI technique. Experimental results show that the proposed scheme not only can restore the secret data and the carrier image without loss but also outperforms state-of-the-art methods in the embedding rate for images with various features.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4199-4213"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46545638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Membership Inference Attacks Against Deep Learning Models via Logits Distribution 基于Logits分布的深度学习模型成员推断攻击
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3222880
Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, K. Sharif, Haibo Hu, Yuan-zhang Li
Deep Learning(DL) techniques have gained significant importance in the recent past due to their vast applications. However, DL is still prone to several attacks, such as the Membership Inference Attack (MIA), based on the memorability of training data. MIA aims at determining the presence of specific data in the training dataset of the model with substitute model of similar structure to the objective model. As MIA relies on the substitute model, they can be mitigated if the substitute model is not clear about the network structure of the objective model. To solve the challenge of shadow-model construction, this work presents L-Leaks, a member inference attack based on Logits. L-Leaks allow an adversary to use the substitute model's information to predict the presence of membership if the shadow and objective model are similar enough. Here, the substitute model is built by learning the logits of the objective model, hence making it similar enough. This results in the substitute model having sufficient confidence in the member samples of the objective model. The evaluation of the attack's success shows that the proposed technique can execute the attack more accurately than existing techniques. It also shows that the proposed MIA is significantly robust under different network models and datasets.
深度学习(DL)技术由于其广泛的应用,在最近的过去获得了显著的重要性。然而,深度学习仍然容易受到几种攻击,例如基于训练数据记忆性的隶属度推理攻击(MIA)。MIA旨在用与目标模型结构相似的替代模型确定模型训练数据集中是否存在特定数据。由于MIA依赖于替代模型,如果替代模型对目标模型的网络结构不清楚,则可以减轻MIA的影响。为了解决影子模型构建的挑战,本文提出了一种基于Logits的成员推理攻击L-Leaks。如果影子模型和客观模型足够相似,L-Leaks允许攻击者使用替代模型的信息来预测成员的存在。在这里,通过学习目标模型的逻辑来建立替代模型,从而使其足够相似。这使得替代模型对目标模型的成员样本具有足够的置信度。攻击成功的评估表明,与现有的攻击技术相比,该技术可以更准确地执行攻击。该方法在不同的网络模型和数据集下都具有显著的鲁棒性。
{"title":"Membership Inference Attacks Against Deep Learning Models via Logits Distribution","authors":"Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, K. Sharif, Haibo Hu, Yuan-zhang Li","doi":"10.1109/TDSC.2022.3222880","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3222880","url":null,"abstract":"Deep Learning(DL) techniques have gained significant importance in the recent past due to their vast applications. However, DL is still prone to several attacks, such as the Membership Inference Attack (MIA), based on the memorability of training data. MIA aims at determining the presence of specific data in the training dataset of the model with substitute model of similar structure to the objective model. As MIA relies on the substitute model, they can be mitigated if the substitute model is not clear about the network structure of the objective model. To solve the challenge of shadow-model construction, this work presents L-Leaks, a member inference attack based on Logits. L-Leaks allow an adversary to use the substitute model's information to predict the presence of membership if the shadow and objective model are similar enough. Here, the substitute model is built by learning the logits of the objective model, hence making it similar enough. This results in the substitute model having sufficient confidence in the member samples of the objective model. The evaluation of the attack's success shows that the proposed technique can execute the attack more accurately than existing techniques. It also shows that the proposed MIA is significantly robust under different network models and datasets.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3799-3808"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47469935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mangling Rules Generation With Density-Based Clustering for Password Guessing 基于密度聚类的密码猜测规则生成
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3217002
Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo
Rule-based password generation is one of the most effective and often employed techniques in the highly compute-intensive password recovery process. However, it is challenging to design and maintain a practical password mangling ruleset, which is a time-consuming task requiring specialized expertise. This paper therefore introduced MDBSCAN (Modified Density-Based Spatial Clustering of Applications with Noise), a novel density-based cluster approach in machine learning, to build an automatic password mangling rule generator. To evaluate the proposed method, cross-checks across 4 different real-world password datasets leaked from popular Internet services and applications are adopted. The results indicate that the proposed generator could produce high-quality mangling rules with a better hit rate and enhance current mangling rules by identifying hidden or omitted rules. The proposed approach also shows strong interpretability and computational efficiency. When examining the RockYou password dataset with the top 77 rules, the hit rate may rise by 11% to 104% proportionally to other well-known solutions. Furthermore, by combining the top 77 rules generated by MDBSCAN with those from other rulesets, 3–12.67% more real-world passwords can be retrieved.
基于规则的密码生成是高度计算密集型密码恢复过程中最有效和最常用的技术之一。然而,设计和维护一个实用的密码篡改规则集是具有挑战性的,这是一项耗时的任务,需要专门的专业知识。因此,本文引入一种新的基于密度的机器学习聚类方法MDBSCAN (Modified Density-Based Spatial Clustering of Applications with Noise)来构建自动密码篡改规则生成器。为了评估所提出的方法,对从流行的互联网服务和应用程序泄露的4个不同的真实世界密码数据集进行了交叉检查。结果表明,该生成器能够生成命中率较高的高质量纠错规则,并通过识别隐藏或遗漏的规则来增强现有纠错规则。该方法具有较强的可解释性和计算效率。当使用前77条规则检查RockYou密码数据集时,命中率可能会比其他知名解决方案高出11%至104%。此外,通过将MDBSCAN生成的前77条规则与来自其他规则集的规则相结合,可以检索到3-12.67%的真实密码。
{"title":"Mangling Rules Generation With Density-Based Clustering for Password Guessing","authors":"Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo","doi":"10.1109/TDSC.2022.3217002","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3217002","url":null,"abstract":"Rule-based password generation is one of the most effective and often employed techniques in the highly compute-intensive password recovery process. However, it is challenging to design and maintain a practical password mangling ruleset, which is a time-consuming task requiring specialized expertise. This paper therefore introduced MDBSCAN (Modified Density-Based Spatial Clustering of Applications with Noise), a novel density-based cluster approach in machine learning, to build an automatic password mangling rule generator. To evaluate the proposed method, cross-checks across 4 different real-world password datasets leaked from popular Internet services and applications are adopted. The results indicate that the proposed generator could produce high-quality mangling rules with a better hit rate and enhance current mangling rules by identifying hidden or omitted rules. The proposed approach also shows strong interpretability and computational efficiency. When examining the RockYou password dataset with the top 77 rules, the hit rate may rise by 11% to 104% proportionally to other well-known solutions. Furthermore, by combining the top 77 rules generated by MDBSCAN with those from other rulesets, 3–12.67% more real-world passwords can be retrieved.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3588-3600"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47537365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments 在云环境中实现高效且保密的神经网络训练和预测
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3208706
Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu
The neural network has been widely used to train predictive models for applications such as image processing, disease prediction, and face recognition. To produce more accurate models, powerful third parties (e.g., clouds) are usually employed to collect data from a large number of users, which however may raise concerns about user privacy. In this paper, we propose an Efficient and Privacy-preserving Neural Network scheme, named EPNN, to deal with the privacy issues in cloud-based neural networks. EPNN is designed based on a two-cloud model and techniques of data perturbation and additively homomorphic cryptosystem. This scheme enables two clouds to cooperatively perform neural network training and prediction in a privacy-preserving manner and significantly reduces the computation and communication overhead among participating entities. Through a detailed analysis, we demonstrate the security of EPNN. Extensive experiments based on real-world datasets show EPNN is more efficient than existing schemes in terms of computational costs and communication overhead.
神经网络已被广泛用于训练预测模型,用于图像处理、疾病预测和人脸识别等应用。为了产生更准确的模型,通常会使用强大的第三方(例如云)来收集大量用户的数据,但这可能会引起对用户隐私的担忧。为了解决基于云的神经网络中的隐私问题,本文提出了一种高效且保护隐私的神经网络方案——EPNN。EPNN是基于二云模型和数据摄动和加性同态密码系统技术设计的。该方案使两个云能够以保护隐私的方式协同进行神经网络训练和预测,显著降低了参与实体之间的计算和通信开销。通过详细的分析,证明了EPNN的安全性。基于真实数据集的大量实验表明,EPNN在计算成本和通信开销方面比现有方案更有效。
{"title":"Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments","authors":"Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu","doi":"10.1109/TDSC.2022.3208706","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3208706","url":null,"abstract":"The neural network has been widely used to train predictive models for applications such as image processing, disease prediction, and face recognition. To produce more accurate models, powerful third parties (e.g., clouds) are usually employed to collect data from a large number of users, which however may raise concerns about user privacy. In this paper, we propose an Efficient and Privacy-preserving Neural Network scheme, named EPNN, to deal with the privacy issues in cloud-based neural networks. EPNN is designed based on a two-cloud model and techniques of data perturbation and additively homomorphic cryptosystem. This scheme enables two clouds to cooperatively perform neural network training and prediction in a privacy-preserving manner and significantly reduces the computation and communication overhead among participating entities. Through a detailed analysis, we demonstrate the security of EPNN. Extensive experiments based on real-world datasets show EPNN is more efficient than existing schemes in terms of computational costs and communication overhead.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4245-4257"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47139531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Leaking Wireless ICs via Hardware Trojan-Infected Synchronization 通过硬件木马感染的同步泄漏无线ic
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3218507
Alan Rodrigo Diaz-Rizo, H. Aboushady, H. Stratigopoulos
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at leaking sensitive information within a legitimate transmission. The HT is hidden inside the transmitter modulating the sensitive information into the preamble of each transmitted frame which is used for the synchronization of the transmitter with the receiver. The data leakage does not affect synchronization and is imperceptible by the inconspicuous nominal receiver as it does not incur any performance penalty in the communication. A knowledgeable rogue receiver, however, can recover the data using signal processing that is too expensive and impractical to be used during run-time in nominal receivers. The HT mechanism is designed at circuit-level and is embedded entirely into the digital section of the RF transceiver having a tiny footprint. The proposed HT attack is demonstrated with measurements on a hardware platform. We demonstrate the stealthiness of the attack, i.e., its ability to evade defenses based on testing and run-time monitoring, and the robustness of the attack, i.e., the ability of the rogue receiver to recover the leaked information even under unfavorable channel conditions.
我们提出了一种无线集成电路(IC)中的硬件特洛伊木马(HT)攻击,旨在泄露合法传输中的敏感信息。HT隐藏在发射机内部,将敏感信息调制到每个发射帧的前导码中,该前导码用于发射机与接收机的同步。数据泄漏不影响同步,并且不明显的标称接收器是察觉不到的,因为它在通信中不会引起任何性能损失。然而,知识渊博的流氓接收器可以使用信号处理来恢复数据,该信号处理过于昂贵且不切实际,无法在标称接收器的运行时间内使用。HT机制是在电路级设计的,并且完全嵌入到RF收发器的数字部分中,具有微小的占地面积。所提出的HT攻击通过硬件平台上的测量进行了验证。我们展示了攻击的隐蔽性,即其基于测试和运行时监控规避防御的能力,以及攻击的稳健性,即流氓接收器即使在不利的信道条件下也能恢复泄漏信息的能力。
{"title":"Leaking Wireless ICs via Hardware Trojan-Infected Synchronization","authors":"Alan Rodrigo Diaz-Rizo, H. Aboushady, H. Stratigopoulos","doi":"10.1109/TDSC.2022.3218507","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3218507","url":null,"abstract":"We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at leaking sensitive information within a legitimate transmission. The HT is hidden inside the transmitter modulating the sensitive information into the preamble of each transmitted frame which is used for the synchronization of the transmitter with the receiver. The data leakage does not affect synchronization and is imperceptible by the inconspicuous nominal receiver as it does not incur any performance penalty in the communication. A knowledgeable rogue receiver, however, can recover the data using signal processing that is too expensive and impractical to be used during run-time in nominal receivers. The HT mechanism is designed at circuit-level and is embedded entirely into the digital section of the RF transceiver having a tiny footprint. The proposed HT attack is demonstrated with measurements on a hardware platform. We demonstrate the stealthiness of the attack, i.e., its ability to evade defenses based on testing and run-time monitoring, and the robustness of the attack, i.e., the ability of the rogue receiver to recover the leaked information even under unfavorable channel conditions.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3845-3859"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42319878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme 一种基于格的多级秘密共享方案的安全性
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3209011
Zhichao Yang, D. He, Longjiang Qu, Jianqiao Xu
In response to the threat posed by quantum computers, Pilaram and Eghlidos proposed the first lattice-based multi-stage secret sharing scheme which is the only post-quantum multi-stage secret sharing scheme. In this paper, we introduce an efficient attack on it and show that any adversary can easily reconstruct unrecovered secrets as long as it collects enough pseudo-secret shares. For the sake of complete, we further list two countermeasures to protect the scheme from such attack.
为了应对量子计算机带来的威胁,Pilaram和Eghlidos提出了第一个基于晶格的多级秘密共享方案,这是唯一的后量子多级秘密共享机制。在本文中,我们介绍了一种对它的有效攻击,并表明任何对手只要收集到足够的伪秘密共享,都可以很容易地重建未恢复的秘密。为了完整起见,我们进一步列出了两种保护方案免受此类攻击的对策。
{"title":"On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme","authors":"Zhichao Yang, D. He, Longjiang Qu, Jianqiao Xu","doi":"10.1109/TDSC.2022.3209011","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3209011","url":null,"abstract":"In response to the threat posed by quantum computers, Pilaram and Eghlidos proposed the first lattice-based multi-stage secret sharing scheme which is the only post-quantum multi-stage secret sharing scheme. In this paper, we introduce an efficient attack on it and show that any adversary can easily reconstruct unrecovered secrets as long as it collects enough pseudo-secret shares. For the sake of complete, we further list two countermeasures to protect the scheme from such attack.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4441-4442"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48254461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1