首页 > 最新文献

arXiv - CS - Cryptography and Security最新文献

英文 中文
BACKRUNNER: Mitigating Smart Contract Attacks in the Real World BACKRUNNER:缓解现实世界中的智能合约攻击
Pub Date : 2024-09-10 DOI: arxiv-2409.06213
Chaofan Shou, Yuanyu Ke, Yupeng Yang, Qi Su, Or Dadosh, Assaf Eli, David Benchimol, Doudou Lu, Daniel Tong, Dex Chen, Zoey Tan, Jacob Chia, Koushik Sen, Wenke Lee
Billions of dollars have been lost due to vulnerabilities in smart contracts.To counteract this, researchers have proposed attack frontrunning protectionsdesigned to preempt malicious transactions by inserting "whitehat" transactionsahead of them to protect the assets. In this paper, we demonstrate thatexisting frontrunning protections have become ineffective in real-worldscenarios. Specifically, we collected 158 recent real-world attack transactionsand discovered that 141 of them can bypass state-of-the-art frontrunningprotections. We systematically analyze these attacks and show how inherentlimitations of existing frontrunning techniques hinder them from protectingvaluable assets in the real world. We then propose a new approach involving 1)preemptive hijack, and 2) attack backrunning, which circumvent the existinglimitations and can help protect assets before and after an attack. Ourapproach adapts the exploit used in the attack to the same or similar contractsbefore and after the attack to safeguard the assets. We conceptualize adaptingexploits as a program repair problem and apply established techniques toimplement our approach into a full-fledged framework, BACKRUNNER. Running onprevious attacks in 2023, BACKRUNNER can successfully rescue more than $410M.In the real world, it has helped rescue over $11.2M worth of assets in 28separate incidents within two months.
为了应对这种情况,研究人员提出了攻击前置保护措施,旨在通过在恶意交易之前插入 "白帽 "交易来阻止恶意交易,从而保护资产。在本文中,我们证明了现有的前置保护措施在现实世界场景中已经失效。具体来说,我们收集了最近真实世界中的 158 个攻击交易,发现其中 141 个可以绕过最先进的前置运行保护。我们对这些攻击进行了系统分析,并展示了现有前置运行技术的固有局限性如何阻碍它们保护现实世界中的宝贵资产。然后,我们提出了一种新方法,涉及 1)抢先劫持和 2)攻击回跑,这两种方法规避了现有的限制,有助于在攻击前后保护资产。我们的方法将攻击中使用的漏洞利用程序调整为攻击前后相同或相似的合约,以保护资产。我们将调整漏洞利用概念化为程序修复问题,并应用成熟的技术将我们的方法实现为一个完整的框架--BACKRUNNER。在现实世界中,它已在两个月内的 28 起独立事件中帮助拯救了价值超过 1120 万美元的资产。
{"title":"BACKRUNNER: Mitigating Smart Contract Attacks in the Real World","authors":"Chaofan Shou, Yuanyu Ke, Yupeng Yang, Qi Su, Or Dadosh, Assaf Eli, David Benchimol, Doudou Lu, Daniel Tong, Dex Chen, Zoey Tan, Jacob Chia, Koushik Sen, Wenke Lee","doi":"arxiv-2409.06213","DOIUrl":"https://doi.org/arxiv-2409.06213","url":null,"abstract":"Billions of dollars have been lost due to vulnerabilities in smart contracts.\u0000To counteract this, researchers have proposed attack frontrunning protections\u0000designed to preempt malicious transactions by inserting \"whitehat\" transactions\u0000ahead of them to protect the assets. In this paper, we demonstrate that\u0000existing frontrunning protections have become ineffective in real-world\u0000scenarios. Specifically, we collected 158 recent real-world attack transactions\u0000and discovered that 141 of them can bypass state-of-the-art frontrunning\u0000protections. We systematically analyze these attacks and show how inherent\u0000limitations of existing frontrunning techniques hinder them from protecting\u0000valuable assets in the real world. We then propose a new approach involving 1)\u0000preemptive hijack, and 2) attack backrunning, which circumvent the existing\u0000limitations and can help protect assets before and after an attack. Our\u0000approach adapts the exploit used in the attack to the same or similar contracts\u0000before and after the attack to safeguard the assets. We conceptualize adapting\u0000exploits as a program repair problem and apply established techniques to\u0000implement our approach into a full-fledged framework, BACKRUNNER. Running on\u0000previous attacks in 2023, BACKRUNNER can successfully rescue more than $410M.\u0000In the real world, it has helped rescue over $11.2M worth of assets in 28\u0000separate incidents within two months.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TERD: A Unified Framework for Safeguarding Diffusion Models Against Backdoors TERD:防范扩散模型后门的统一框架
Pub Date : 2024-09-09 DOI: arxiv-2409.05294
Yichuan Mo, Hui Huang, Mingjie Li, Ang Li, Yisen Wang
Diffusion models have achieved notable success in image generation, but theyremain highly vulnerable to backdoor attacks, which compromise their integrityby producing specific undesirable outputs when presented with a pre-definedtrigger. In this paper, we investigate how to protect diffusion models fromthis dangerous threat. Specifically, we propose TERD, a backdoor defenseframework that builds unified modeling for current attacks, which enables us toderive an accessible reversed loss. A trigger reversion strategy is furtheremployed: an initial approximation of the trigger through noise sampled from aprior distribution, followed by refinement through differential multi-stepsamplers. Additionally, with the reversed trigger, we propose backdoordetection from the noise space, introducing the first backdoor input detectionapproach for diffusion models and a novel model detection algorithm thatcalculates the KL divergence between reversed and benign distributions.Extensive evaluations demonstrate that TERD secures a 100% True Positive Rate(TPR) and True Negative Rate (TNR) across datasets of varying resolutions. TERDalso demonstrates nice adaptability to other Stochastic Differential Equation(SDE)-based models. Our code is available at https://github.com/PKU-ML/TERD.
扩散模型在图像生成方面取得了显著的成就,但它们仍然极易受到后门攻击的影响,这种攻击会在出现预定义触发时产生特定的不良输出,从而破坏其完整性。在本文中,我们研究了如何保护扩散模型免受这种危险威胁。具体来说,我们提出了 TERD--一种后门防御框架,它为当前的攻击建立了统一的模型,使我们能够预测可访问的反向损失。此外,我们还采用了一种触发器还原策略:通过从先前分布中采样的噪声对触发器进行初始近似,然后通过差分多步采样器进行细化。此外,利用反向触发器,我们提出了从噪声空间进行后门输入检测的方法,为扩散模型引入了第一种后门输入检测方法,以及一种计算反向分布和良性分布之间 KL 发散的新型模型检测算法。TERD 还能很好地适应其他基于随机微分方程(SDE)的模型。我们的代码见 https://github.com/PKU-ML/TERD。
{"title":"TERD: A Unified Framework for Safeguarding Diffusion Models Against Backdoors","authors":"Yichuan Mo, Hui Huang, Mingjie Li, Ang Li, Yisen Wang","doi":"arxiv-2409.05294","DOIUrl":"https://doi.org/arxiv-2409.05294","url":null,"abstract":"Diffusion models have achieved notable success in image generation, but they\u0000remain highly vulnerable to backdoor attacks, which compromise their integrity\u0000by producing specific undesirable outputs when presented with a pre-defined\u0000trigger. In this paper, we investigate how to protect diffusion models from\u0000this dangerous threat. Specifically, we propose TERD, a backdoor defense\u0000framework that builds unified modeling for current attacks, which enables us to\u0000derive an accessible reversed loss. A trigger reversion strategy is further\u0000employed: an initial approximation of the trigger through noise sampled from a\u0000prior distribution, followed by refinement through differential multi-step\u0000samplers. Additionally, with the reversed trigger, we propose backdoor\u0000detection from the noise space, introducing the first backdoor input detection\u0000approach for diffusion models and a novel model detection algorithm that\u0000calculates the KL divergence between reversed and benign distributions.\u0000Extensive evaluations demonstrate that TERD secures a 100% True Positive Rate\u0000(TPR) and True Negative Rate (TNR) across datasets of varying resolutions. TERD\u0000also demonstrates nice adaptability to other Stochastic Differential Equation\u0000(SDE)-based models. Our code is available at https://github.com/PKU-ML/TERD.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Quality Estimation of True Random Bit-streams 真实随机比特流的高效质量估计
Pub Date : 2024-09-09 DOI: arxiv-2409.05543
Cesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia
Generating random bit streams is required in various applications, mostnotably cyber-security. Ensuring high-quality and robust randomness is crucialto mitigate risks associated with predictability and system compromise. Truerandom numbers provide the highest unpredictability levels. However, potentialbiases in the processes exploited for the random number generation must becarefully monitored. This paper reports the implementation and characterizationof an on-line procedure for the detection of anomalies in a true random bitstream. It is based on the NIST Adaptive Proportion and Repetition Count tests,complemented by statistical analysis relying on the Monobit and RUNS. Theprocedure is firmware implemented and performed simultaneously with the bitstream generation, and providing as well an estimate of the entropy of thesource. The experimental validation of the approach is performed upon the bitstreams generated by a quantum, silicon-based entropy source.
在各种应用中都需要生成随机比特流,其中最重要的是网络安全。确保高质量和稳健的随机性对于降低与可预测性和系统破坏相关的风险至关重要。真正的随机数具有最高的不可预测性。但是,必须对随机数生成过程中可能存在的偏差进行仔细监测。本文报告了用于检测真实随机比特流异常的在线程序的实施和特性。该程序基于 NIST 自适应比例和重复计数测试,并辅以 Monobit 和 RUNS 统计分析。该程序由固件实现,与比特流生成同时进行,并提供源熵的估计值。该方法通过硅基量子熵源生成的比特流进行实验验证。
{"title":"Efficient Quality Estimation of True Random Bit-streams","authors":"Cesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia","doi":"arxiv-2409.05543","DOIUrl":"https://doi.org/arxiv-2409.05543","url":null,"abstract":"Generating random bit streams is required in various applications, most\u0000notably cyber-security. Ensuring high-quality and robust randomness is crucial\u0000to mitigate risks associated with predictability and system compromise. True\u0000random numbers provide the highest unpredictability levels. However, potential\u0000biases in the processes exploited for the random number generation must be\u0000carefully monitored. This paper reports the implementation and characterization\u0000of an on-line procedure for the detection of anomalies in a true random bit\u0000stream. It is based on the NIST Adaptive Proportion and Repetition Count tests,\u0000complemented by statistical analysis relying on the Monobit and RUNS. The\u0000procedure is firmware implemented and performed simultaneously with the bit\u0000stream generation, and providing as well an estimate of the entropy of the\u0000source. The experimental validation of the approach is performed upon the bit\u0000streams generated by a quantum, silicon-based entropy source.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethereum Fraud Detection via Joint Transaction Language Model and Graph Representation Learning 通过联合交易语言模型和图表示学习检测以太坊欺诈
Pub Date : 2024-09-09 DOI: arxiv-2409.07494
Yifan Jia, Yanbin Wang, Jianguo Sun, Yiwei Liu, Zhang Sheng, Ye Tian
Ethereum faces growing fraud threats. Current fraud detection methods,whether employing graph neural networks or sequence models, fail to considerthe semantic information and similarity patterns within transactions. Moreover,these approaches do not leverage the potential synergistic benefits ofcombining both types of models. To address these challenges, we proposeTLMG4Eth that combines a transaction language model with graph-based methods tocapture semantic, similarity, and structural features of transaction data inEthereum. We first propose a transaction language model that converts numericaltransaction data into meaningful transaction sentences, enabling the model tolearn explicit transaction semantics. Then, we propose a transaction attributesimilarity graph to learn transaction similarity information, enabling us tocapture intuitive insights into transaction anomalies. Additionally, weconstruct an account interaction graph to capture the structural information ofthe account transaction network. We employ a deep multi-head attention networkto fuse transaction semantic and similarity embeddings, and ultimately proposea joint training approach for the multi-head attention network and the accountinteraction graph to obtain the synergistic benefits of both.
以太坊面临着日益严重的欺诈威胁。目前的欺诈检测方法,无论是采用图神经网络还是序列模型,都没有考虑到交易中的语义信息和相似性模式。此外,这些方法也没有充分利用结合两种模型的潜在协同优势。为了应对这些挑战,我们提出了将交易语言模型与基于图的方法相结合的交易语言模型4Eth,以捕捉以太坊中交易数据的语义、相似性和结构特征。我们首先提出了一种交易语言模型,它能将数字交易数据转换为有意义的交易句子,从而使该模型能够学习明确的交易语义。然后,我们提出交易属性相似性图来学习交易相似性信息,使我们能够捕捉到交易异常的直观洞察力。此外,我们还构建了账户交互图,以捕捉账户交易网络的结构信息。我们采用深度多头注意力网络来融合交易语义和相似性嵌入,并最终提出了多头注意力网络和账户交互图的联合训练方法,以获得两者的协同优势。
{"title":"Ethereum Fraud Detection via Joint Transaction Language Model and Graph Representation Learning","authors":"Yifan Jia, Yanbin Wang, Jianguo Sun, Yiwei Liu, Zhang Sheng, Ye Tian","doi":"arxiv-2409.07494","DOIUrl":"https://doi.org/arxiv-2409.07494","url":null,"abstract":"Ethereum faces growing fraud threats. Current fraud detection methods,\u0000whether employing graph neural networks or sequence models, fail to consider\u0000the semantic information and similarity patterns within transactions. Moreover,\u0000these approaches do not leverage the potential synergistic benefits of\u0000combining both types of models. To address these challenges, we propose\u0000TLMG4Eth that combines a transaction language model with graph-based methods to\u0000capture semantic, similarity, and structural features of transaction data in\u0000Ethereum. We first propose a transaction language model that converts numerical\u0000transaction data into meaningful transaction sentences, enabling the model to\u0000learn explicit transaction semantics. Then, we propose a transaction attribute\u0000similarity graph to learn transaction similarity information, enabling us to\u0000capture intuitive insights into transaction anomalies. Additionally, we\u0000construct an account interaction graph to capture the structural information of\u0000the account transaction network. We employ a deep multi-head attention network\u0000to fuse transaction semantic and similarity embeddings, and ultimately propose\u0000a joint training approach for the multi-head attention network and the account\u0000interaction graph to obtain the synergistic benefits of both.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"166 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Differential Privacy Against Timing Attacks 针对定时攻击的差异隐私框架
Pub Date : 2024-09-09 DOI: arxiv-2409.05623
Zachary Ratliff, Salil Vadhan
The standard definition of differential privacy (DP) ensures that amechanism's output distribution on adjacent datasets is indistinguishable.However, real-world implementations of DP can, and often do, reveal informationthrough their runtime distributions, making them susceptible to timing attacks.In this work, we establish a general framework for ensuring differentialprivacy in the presence of timing side channels. We define a new notion oftiming privacy, which captures programs that remain differentially private toan adversary that observes the program's runtime in addition to the output. Ourframework enables chaining together component programs that are timing-stablefollowed by a random delay to obtain DP programs that achieve timing privacy.Importantly, our definitions allow for measuring timing privacy and outputprivacy using different privacy measures. We illustrate how to instantiate ourframework by giving programs for standard DP computations in the RAM and WordRAM models of computation. Furthermore, we show how our framework can berealized in code through a natural extension of the OpenDP ProgrammingFramework.
差分隐私(DP)的标准定义确保了一个机制在相邻数据集上的输出分布是不可区分的。然而,DP在现实世界中的实现可能而且经常会通过其运行时分布泄露信息,从而使它们容易受到定时攻击。在这项工作中,我们建立了一个通用框架,用于在存在定时侧信道的情况下确保差分隐私。我们定义了一个新的定时隐私概念,它捕捉了对除了观察程序运行时间外还观察程序输出的对手保持不同隐私的程序。重要的是,我们的定义允许使用不同的隐私度量方法来测量时序隐私和输出隐私。我们通过给出 RAM 和 WordRAM 计算模型中标准 DP 计算的程序,说明了如何将我们的框架实例化。此外,我们还展示了如何通过对 OpenDP 编程框架的自然扩展,在代码中实现我们的框架。
{"title":"A Framework for Differential Privacy Against Timing Attacks","authors":"Zachary Ratliff, Salil Vadhan","doi":"arxiv-2409.05623","DOIUrl":"https://doi.org/arxiv-2409.05623","url":null,"abstract":"The standard definition of differential privacy (DP) ensures that a\u0000mechanism's output distribution on adjacent datasets is indistinguishable.\u0000However, real-world implementations of DP can, and often do, reveal information\u0000through their runtime distributions, making them susceptible to timing attacks.\u0000In this work, we establish a general framework for ensuring differential\u0000privacy in the presence of timing side channels. We define a new notion of\u0000timing privacy, which captures programs that remain differentially private to\u0000an adversary that observes the program's runtime in addition to the output. Our\u0000framework enables chaining together component programs that are timing-stable\u0000followed by a random delay to obtain DP programs that achieve timing privacy.\u0000Importantly, our definitions allow for measuring timing privacy and output\u0000privacy using different privacy measures. We illustrate how to instantiate our\u0000framework by giving programs for standard DP computations in the RAM and Word\u0000RAM models of computation. Furthermore, we show how our framework can be\u0000realized in code through a natural extension of the OpenDP Programming\u0000Framework.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CipherDM: Secure Three-Party Inference for Diffusion Model Sampling CipherDM:扩散模型采样的安全三方推论
Pub Date : 2024-09-09 DOI: arxiv-2409.05414
Xin Zhao, Xiaojun Chen, Xudong Chen, He Li, Tingyu Fan, Zhendong Zhao
Diffusion Models (DMs) achieve state-of-the-art synthesis results in imagegeneration and have been applied to various fields. However, DMs sometimesseriously violate user privacy during usage, making the protection of privacyan urgent issue. Using traditional privacy computing schemes like SecureMulti-Party Computation (MPC) directly in DMs faces significant computation andcommunication challenges. To address these issues, we propose CipherDM, thefirst novel, versatile and universal framework applying MPC technology to DMsfor secure sampling, which can be widely implemented on multiple DM basedtasks. We thoroughly analyze sampling latency breakdown, find time-consumingparts and design corresponding secure MPC protocols for computing nonlinearactivations including SoftMax, SiLU and Mish. CipherDM is evaluated on populararchitectures (DDPM, DDIM) using MNIST dataset and on SD deployed by diffusers.Compared to direct implementation on SPU, our approach improves running time byapproximately 1.084times sim 2.328times, and reduces communication costs byapproximately 1.212times sim 1.791times.
扩散模型(Diffusion Models,DMs)在图像生成方面达到了最先进的合成效果,并已被应用于各个领域。然而,DM 有时会在使用过程中严重侵犯用户隐私,因此隐私保护成为一个亟待解决的问题。在 DM 中直接使用安全多方计算(MPC)等传统隐私计算方案面临着巨大的计算和通信挑战。为了解决这些问题,我们提出了 CipherDM,这是第一个将多方计算技术应用于 DMs 以实现安全采样的新颖、通用和普遍的框架,可以在多个基于 DM 的任务中广泛实施。我们深入分析了采样延迟分解,找到了耗时部分,并设计了相应的安全 MPC 协议,用于计算包括 SoftMax、SiLU 和 Mish 在内的非线性活动。与直接在SPU上实现相比,我们的方法将运行时间缩短了约1.084倍(sim 2.328倍),并将通信成本降低了约1.212倍(sim 1.791倍)。
{"title":"CipherDM: Secure Three-Party Inference for Diffusion Model Sampling","authors":"Xin Zhao, Xiaojun Chen, Xudong Chen, He Li, Tingyu Fan, Zhendong Zhao","doi":"arxiv-2409.05414","DOIUrl":"https://doi.org/arxiv-2409.05414","url":null,"abstract":"Diffusion Models (DMs) achieve state-of-the-art synthesis results in image\u0000generation and have been applied to various fields. However, DMs sometimes\u0000seriously violate user privacy during usage, making the protection of privacy\u0000an urgent issue. Using traditional privacy computing schemes like Secure\u0000Multi-Party Computation (MPC) directly in DMs faces significant computation and\u0000communication challenges. To address these issues, we propose CipherDM, the\u0000first novel, versatile and universal framework applying MPC technology to DMs\u0000for secure sampling, which can be widely implemented on multiple DM based\u0000tasks. We thoroughly analyze sampling latency breakdown, find time-consuming\u0000parts and design corresponding secure MPC protocols for computing nonlinear\u0000activations including SoftMax, SiLU and Mish. CipherDM is evaluated on popular\u0000architectures (DDPM, DDIM) using MNIST dataset and on SD deployed by diffusers.\u0000Compared to direct implementation on SPU, our approach improves running time by\u0000approximately 1.084times sim 2.328times, and reduces communication costs by\u0000approximately 1.212times sim 1.791times.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Post-Quantum Cryptography on Embedded Systems: A Performance Analysis 评估嵌入式系统上的后量子密码学:性能分析
Pub Date : 2024-09-09 DOI: arxiv-2409.05298
Ben Dong, Qian Wang
The National Institute of Standards and Technology (NIST) has finalized theselection of post-quantum cryptographic (PQC) algorithms for use in the era ofquantum computing. Despite their integration into TLS protocol for keyestablishment and signature generation, there is limited study on profilingthese newly standardized algorithms in resource-constrained communicationsystems. In this work, we integrate PQC into both TLS servers and clients builtupon embedded systems. Additionally, we compare the performance overhead of PQCpairs to currently used non-PQC schemes.
美国国家标准与技术研究院(NIST)最终确定了在量子计算时代使用的后量子加密(PQC)算法。尽管这些算法已集成到 TLS 协议中用于密钥建立和签名生成,但在资源受限的通信系统中对这些新标准化算法进行剖析的研究还很有限。在这项工作中,我们将 PQC 集成到嵌入式系统的 TLS 服务器和客户端中。此外,我们还比较了 PQC 对与当前使用的非 PQC 方案的性能开销。
{"title":"Evaluating Post-Quantum Cryptography on Embedded Systems: A Performance Analysis","authors":"Ben Dong, Qian Wang","doi":"arxiv-2409.05298","DOIUrl":"https://doi.org/arxiv-2409.05298","url":null,"abstract":"The National Institute of Standards and Technology (NIST) has finalized the\u0000selection of post-quantum cryptographic (PQC) algorithms for use in the era of\u0000quantum computing. Despite their integration into TLS protocol for key\u0000establishment and signature generation, there is limited study on profiling\u0000these newly standardized algorithms in resource-constrained communication\u0000systems. In this work, we integrate PQC into both TLS servers and clients built\u0000upon embedded systems. Additionally, we compare the performance overhead of PQC\u0000pairs to currently used non-PQC schemes.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy of Miscompressions: Preparing Image Forensics for Neural Compression 错误压缩分类学:为神经压缩图像取证做准备
Pub Date : 2024-09-09 DOI: arxiv-2409.05490
Nora Hofer, Rainer Böhme
Neural compression has the potential to revolutionize lossy imagecompression. Based on generative models, recent schemes achieve unprecedentedcompression rates at high perceptual quality but compromise semantic fidelity.Details of decompressed images may appear optically flawless but semanticallydifferent from the originals, making compression errors difficult or impossibleto detect. We explore the problem space and propose a provisional taxonomy ofmiscompressions. It defines three types of 'what happens' and has a binary'high impact' flag indicating miscompressions that alter symbols. We discusshow the taxonomy can facilitate risk communication and research intomitigations.
神经压缩有可能彻底改变有损图像压缩。基于生成模型,最近的方案以高感知质量实现了前所未有的压缩率,但却损害了语义保真度。我们对问题空间进行了探索,并提出了压缩错误的临时分类法。它定义了三种 "发生了什么 "的类型,并有一个二进制的 "高影响 "标志,表示改变符号的压缩错误。我们讨论了该分类法如何促进风险交流和监控研究。
{"title":"A Taxonomy of Miscompressions: Preparing Image Forensics for Neural Compression","authors":"Nora Hofer, Rainer Böhme","doi":"arxiv-2409.05490","DOIUrl":"https://doi.org/arxiv-2409.05490","url":null,"abstract":"Neural compression has the potential to revolutionize lossy image\u0000compression. Based on generative models, recent schemes achieve unprecedented\u0000compression rates at high perceptual quality but compromise semantic fidelity.\u0000Details of decompressed images may appear optically flawless but semantically\u0000different from the originals, making compression errors difficult or impossible\u0000to detect. We explore the problem space and propose a provisional taxonomy of\u0000miscompressions. It defines three types of 'what happens' and has a binary\u0000'high impact' flag indicating miscompressions that alter symbols. We discuss\u0000how the taxonomy can facilitate risk communication and research into\u0000mitigations.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Homomorphically Encrypted Convolutional Neural Network Without Rotation 无需旋转的高效同态加密卷积神经网络
Pub Date : 2024-09-08 DOI: arxiv-2409.05205
Sajjad Akherati, Xinmiao Zhang
Privacy-preserving neural network (NN) inference can be achieved by utilizinghomomorphic encryption (HE), which allows computations to be directly carriedout over ciphertexts. Popular HE schemes are built over large polynomial rings.To allow simultaneous multiplications in the convolutional (Conv) andfully-connected (FC) layers, multiple input data are mapped to coefficients inthe same polynomial, so are the weights of NNs. However, ciphertext rotationsare necessary to compute the sums of products and/or incorporate the outputs ofdifferent channels into the same polynomials. Ciphertext rotations have muchhigher complexity than ciphertext multiplications and contribute to themajority of the latency of HE-evaluated Conv and FC layers. This paper proposesa novel reformulated server-client joint computation procedure and a new filtercoefficient packing scheme to eliminate ciphertext rotations without affectingthe security of the HE scheme. Our proposed scheme also leads to substantialreductions on the number of coefficient multiplications needed and thecommunication cost between the server and client. For various plain-20classifiers over the CIFAR-10/100 datasets, our design reduces the running timeof the Conv and FC layers by 15.5% and the communication cost between clientand server by more than 50%, compared to the best prior design.
利用同构加密(HE)可以实现保护隐私的神经网络(NN)推理,它允许直接在密码文本上进行计算。为了允许卷积层(Conv)和全连接层(FC)同时进行乘法运算,多个输入数据被映射为同一个多项式的系数,神经网络的权重也是如此。但是,为了计算乘积之和和/或将不同通道的输出纳入相同的多项式,需要对密文进行旋转。密文旋转的复杂度远高于密文乘法,是造成 HE 评估 Conv 和 FC 层延迟的主要原因。本文提出了一种新颖的重构服务器-客户端联合计算程序和一种新的滤波器高效打包方案,在不影响 HE 方案安全性的情况下消除了密文旋转。我们提出的方案还大大减少了所需的系数乘法次数以及服务器和客户端之间的通信成本。对于 CIFAR-10/100 数据集上的各种普通 20 分类器,与之前的最佳设计相比,我们的设计将 Conv 层和 FC 层的运行时间减少了 15.5%,将客户端与服务器之间的通信成本减少了 50%以上。
{"title":"Efficient Homomorphically Encrypted Convolutional Neural Network Without Rotation","authors":"Sajjad Akherati, Xinmiao Zhang","doi":"arxiv-2409.05205","DOIUrl":"https://doi.org/arxiv-2409.05205","url":null,"abstract":"Privacy-preserving neural network (NN) inference can be achieved by utilizing\u0000homomorphic encryption (HE), which allows computations to be directly carried\u0000out over ciphertexts. Popular HE schemes are built over large polynomial rings.\u0000To allow simultaneous multiplications in the convolutional (Conv) and\u0000fully-connected (FC) layers, multiple input data are mapped to coefficients in\u0000the same polynomial, so are the weights of NNs. However, ciphertext rotations\u0000are necessary to compute the sums of products and/or incorporate the outputs of\u0000different channels into the same polynomials. Ciphertext rotations have much\u0000higher complexity than ciphertext multiplications and contribute to the\u0000majority of the latency of HE-evaluated Conv and FC layers. This paper proposes\u0000a novel reformulated server-client joint computation procedure and a new filter\u0000coefficient packing scheme to eliminate ciphertext rotations without affecting\u0000the security of the HE scheme. Our proposed scheme also leads to substantial\u0000reductions on the number of coefficient multiplications needed and the\u0000communication cost between the server and client. For various plain-20\u0000classifiers over the CIFAR-10/100 datasets, our design reduces the running time\u0000of the Conv and FC layers by 15.5% and the communication cost between client\u0000and server by more than 50%, compared to the best prior design.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natias: Neuron Attribution based Transferable Image Adversarial Steganography 纳蒂亚斯基于神经元归因的可转移图像对抗隐写术
Pub Date : 2024-09-08 DOI: arxiv-2409.04968
Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu
Image steganography is a technique to conceal secret messages within digitalimages. Steganalysis, on the contrary, aims to detect the presence of secretmessages within images. Recently, deep-learning-based steganalysis methods haveachieved excellent detection performance. As a countermeasure, adversarialsteganography has garnered considerable attention due to its ability toeffectively deceive deep-learning-based steganalysis. However, steganalystsoften employ unknown steganalytic models for detection. Therefore, the abilityof adversarial steganography to deceive non-target steganalytic models, knownas transferability, becomes especially important. Nevertheless, existingadversarial steganographic methods do not consider how to enhancetransferability. To address this issue, we propose a novel adversarialsteganographic scheme named Natias. Specifically, we first attribute the outputof a steganalytic model to each neuron in the target middle layer to identifycritical features. Next, we corrupt these critical features that may be adoptedby diverse steganalytic models. Consequently, it can promote thetransferability of adversarial steganography. Our proposed method can beseamlessly integrated with existing adversarial steganography frameworks.Thorough experimental analyses affirm that our proposed technique possessesimproved transferability when contrasted with former approaches, and it attainsheightened security in retraining scenarios.
图像隐写术是一种在数字图像中隐藏秘密信息的技术。而隐写分析则旨在检测图像中是否存在秘密信息。最近,基于深度学习的隐写分析方法取得了卓越的检测性能。作为一种对策,对抗式隐写术因其能够有效欺骗基于深度学习的隐分析而备受关注。然而,隐写分析师往往使用未知的隐写分析模型进行检测。因此,对抗性隐写术欺骗非目标隐写分析模型的能力(即可转移性)变得尤为重要。然而,现有的对抗隐写方法并没有考虑如何增强可转移性。为了解决这个问题,我们提出了一种名为 Natias 的新型对抗隐写方案。具体来说,我们首先将隐写分析模型的输出归属于目标中间层的每个神经元,以识别关键特征。接下来,我们破坏这些可能被不同隐写模型采用的关键特征。因此,它可以提高对抗性隐写术的可转移性。我们提出的方法可以与现有的对抗式隐写术框架无缝集成。全面的实验分析表明,与以前的方法相比,我们提出的技术具有更高的可移植性,并且在再训练场景中实现了更高的安全性。
{"title":"Natias: Neuron Attribution based Transferable Image Adversarial Steganography","authors":"Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu","doi":"arxiv-2409.04968","DOIUrl":"https://doi.org/arxiv-2409.04968","url":null,"abstract":"Image steganography is a technique to conceal secret messages within digital\u0000images. Steganalysis, on the contrary, aims to detect the presence of secret\u0000messages within images. Recently, deep-learning-based steganalysis methods have\u0000achieved excellent detection performance. As a countermeasure, adversarial\u0000steganography has garnered considerable attention due to its ability to\u0000effectively deceive deep-learning-based steganalysis. However, steganalysts\u0000often employ unknown steganalytic models for detection. Therefore, the ability\u0000of adversarial steganography to deceive non-target steganalytic models, known\u0000as transferability, becomes especially important. Nevertheless, existing\u0000adversarial steganographic methods do not consider how to enhance\u0000transferability. To address this issue, we propose a novel adversarial\u0000steganographic scheme named Natias. Specifically, we first attribute the output\u0000of a steganalytic model to each neuron in the target middle layer to identify\u0000critical features. Next, we corrupt these critical features that may be adopted\u0000by diverse steganalytic models. Consequently, it can promote the\u0000transferability of adversarial steganography. Our proposed method can be\u0000seamlessly integrated with existing adversarial steganography frameworks.\u0000Thorough experimental analyses affirm that our proposed technique possesses\u0000improved transferability when contrasted with former approaches, and it attains\u0000heightened security in retraining scenarios.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Cryptography and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1