Skip to main content

Showing 1–17 of 17 results for author: Russello, G

  1. arXiv:2406.01080  [pdf, other

    cs.CR cs.DC cs.LG

    No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning

    Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello

    Abstract: Federated learning allows several clients to train one machine learning model jointly without sharing private data, providing privacy protection. However, traditional federated learning is vulnerable to poisoning attacks, which can not only decrease the model performance, but also implant malicious backdoors. In addition, direct submission of local model parameters can also lead to the privacy lea… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2310.14848  [pdf, other

    cs.LG cs.CR

    Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey

    Authors: Zhibo Xing, Zijian Zhang, Jiamou Liu, Ziang Zhang, Meng Li, Liehuang Zhu, Giovanni Russello

    Abstract: With the rapid advancement of artificial intelligence technology, the usage of machine learning models is gradually becoming part of our daily lives. High-quality models rely not only on efficient optimization algorithms but also on the training and learning processes built upon vast amounts of data and computational power. However, in practice, due to various challenges such as limited computatio… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  3. arXiv:2310.03292  [pdf, other

    cs.CR cs.AI

    SoK: Access Control Policy Generation from High-level Natural Language Requirements

    Authors: Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello

    Abstract: Administrator-centered access control failures can cause data breaches, putting organizations at risk of financial loss and reputation damage. Existing graphical policy configuration tools and automated policy generation frameworks attempt to help administrators configure and generate access control policies by avoiding such failures. However, graphical policy configuration tools are prone to huma… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: 35 pages

  4. arXiv:2309.17124  [pdf, other

    cs.CR

    Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication

    Authors: Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello

    Abstract: A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to classify its data using a tree model from a model owner (MO) and only reveals an inference result to the FO. This paper proposes Mostree, a PDTE protocol secure in the presence of malicious parties with sublinear communication. We design Mostree in the three-party honest-majority setting, where an (untrusted)… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

    Comments: This paper has been accepted by ACSAC2023

  5. arXiv:2307.12010  [pdf, other

    cs.CR

    CryptoMask : Privacy-preserving Face Recognition

    Authors: Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui, Giovanni Russello

    Abstract: Face recognition is a widely-used technique for identification or verification, where a verifier checks whether a face image matches anyone stored in a database. However, in scenarios where the database is held by a third party, such as a cloud server, both parties are concerned about data privacy. To address this concern, we propose CryptoMask, a privacy-preserving face recognition system that em… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 18 pages,3 figures, accepted by ICICS2023

  6. arXiv:2305.00645  [pdf, other

    cs.CR

    GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

    Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello

    Abstract: Decision tree (DT) is a widely used machine learning model due to its versatility, speed, and interpretability. However, for privacy-sensitive applications, outsourcing DT training and inference to cloud platforms raise concerns about data privacy. Researchers have developed privacy-preserving approaches for DT training and inference using cryptographic primitives, such as Secure Multi-Party Compu… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  7. arXiv:2304.05590  [pdf, other

    cs.CR

    Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

    Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar

    Abstract: Since the concern of privacy leakage extremely discourages user participation in sharing data, federated learning has gradually become a promising technique for both academia and industry for achieving collaborative learning without leaking information about the local data. Unfortunately, most federated learning solutions cannot efficiently verify the execution of each participant's local machine… ▽ More

    Submitted 24 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  8. arXiv:2304.00664  [pdf, other

    cs.HC cs.CR

    What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility

    Authors: Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle Lottridge, Giovanni Russello

    Abstract: Phishing is one of the most prevalent social engineering attacks that targets both organizations and individuals. It is crucial to understand how email presentation impacts users' reactions to phishing attacks. We speculated that the device and email presentation may play a role, and, in particular, that how links are shown might influence susceptibility. Collaborating with the IT Services unit of… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 12 pages, 3 figures

  9. Scalable Private Decision Tree Evaluation with Sublinear Communication

    Authors: Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello

    Abstract: Private decision tree evaluation (PDTE) allows a decision tree holder to run a secure protocol with a feature provider. By running the protocol, the feature provider will learn a classification result. Nothing more is revealed to either party. In most existing PDTE protocols, the required communication grows exponentially with the tree's depth $d$, which is highly inefficient for large trees. This… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  10. EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE

    Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello

    Abstract: The classification service over a stream of data is becoming an important offering for cloud providers, but users may encounter obstacles in providing sensitive data due to privacy concerns. While Trusted Execution Environments (TEEs) are promising solutions for protecting private data, they remain vulnerable to side-channel attacks induced by data-dependent access patterns. We propose a Privacy-p… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

    Comments: 15 pages, 12 figures

  11. arXiv:2202.07905  [pdf, other

    cs.CR cs.CY cs.HC

    SoK: Human-Centered Phishing Susceptibility

    Authors: Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle Lottridge, Giovanni Russello

    Abstract: Phishing is recognised as a serious threat to organisations and individuals. While there have been significant technical advances in blocking phishing attacks, people remain the last line of defence after phishing emails reach their email client. Most of the existing literature on this subject has focused on the technical aspects related to phishing. However, the factors that cause humans to be su… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 13 pages of content, 2 figures, 18 pages in total

  12. arXiv:2011.02607  [pdf, ps, other

    cs.CR

    Towards a Theory of Special-purpose Program Obfuscation

    Authors: Muhammad Rizwan Asghar, Steven Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig

    Abstract: Most recent theoretical literature on program obfuscation is based on notions like Virtual Black Box (VBB) obfuscation and indistinguishability Obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are s… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: A full version of our TrustCom 2020 work

  13. arXiv:1909.11624  [pdf, other

    cs.CR

    Privacy-preserving Searchable Databases with Controllable Leakage

    Authors: Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D Galbraith, Giovanni Russello

    Abstract: Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data from CSPs. Unfortunately, most of them leak sensitive information, from which the CSPs could still infer the content of queries and records by mounti… ▽ More

    Submitted 26 September, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: 16 pages, 6 figures, Journal

  14. arXiv:1711.00546  [pdf, other

    cs.CY

    A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources

    Authors: Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie

    Abstract: The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patient's health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professiona… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 5 pages, The 13th IEEE International Conference on eScience - Safe Data Workshop

  15. arXiv:1309.2869  [pdf, other

    cs.CY

    ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems

    Authors: Muhammad Rizwan Asghar, Giovanni Russello

    Abstract: The notion of patient's consent plays a major role in granting access to medical data. In typical healthcare systems, consent is captured by a form that the patient has to fill in and sign. In e-Health systems, the paper-form consent is being replaced by the integration of the notion of consent in the mechanisms that regulate the access to the medical data. This helps in empowering the patient wit… ▽ More

    Submitted 11 September, 2013; originally announced September 2013.

    Comments: The final version of this paper has been published at POLICY 2012

  16. arXiv:1308.3489  [pdf, other

    cs.CR

    ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. Th… ▽ More

    Submitted 15 August, 2013; originally announced August 2013.

    Comments: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.4828

  17. arXiv:1306.4828  [pdf, other

    cs.CR

    ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: The final version of this paper has been published at ARES 2011