Skip to main content

Showing 1–17 of 17 results for author: Deng, R H

  1. arXiv:2404.13860  [pdf, other

    cs.LG cs.CR

    Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning

    Authors: Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng

    Abstract: A Model Inversion (MI) attack based on Generative Adversarial Networks (GAN) aims to recover the private training data from complex deep learning models by searching codes in the latent space. However, they merely search a deterministic latent space such that the found latent code is usually suboptimal. In addition, the existing distributional MI schemes assume that an attacker can access the stru… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  2. arXiv:2401.01568  [pdf, other

    cs.CR cs.NI

    A Survey of Protocol Fuzzing

    Authors: Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng

    Abstract: Communication protocols form the bedrock of our interconnected world, yet vulnerabilities within their implementations pose significant security threats. Recent developments have seen a surge in fuzzing-based research dedicated to uncovering these vulnerabilities within protocol implementations. However, there still lacks a systematic overview of protocol fuzzing for answering the essential questi… ▽ More

    Submitted 3 January, 2024; v1 submitted 3 January, 2024; originally announced January 2024.

  3. arXiv:2309.15406  [pdf, ps, other

    cs.CR

    SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers

    Authors: Bowen Zhao, Weiquan Deng, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Robert H. Deng

    Abstract: Secure outsourced computation is critical for cloud computing to safeguard data confidentiality and ensure data usability. Recently, secure outsourced computation schemes following a twin-server architecture based on partially homomorphic cryptosystems have received increasing attention. The Secure Outsourced Computation on Integers (SOCI) [1] toolkit is the state-of-the-art among these schemes wh… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  4. arXiv:2302.12150  [pdf, other

    cs.CR cs.AI cs.DB

    A Survey of Secure Computation Using Trusted Execution Environments

    Authors: Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng

    Abstract: As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols. We first propose a taxonomy that classifies secure computation protocols into thre… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  5. arXiv:2210.10244  [pdf, other

    cs.CR

    Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

    Authors: Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng

    Abstract: Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  6. arXiv:2210.03014  [pdf, other

    cs.CR

    EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry

    Authors: Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino

    Abstract: Modern smart TVs often communicate with their remote controls (including those smart phone simulated ones) using multiple wireless channels (e.g., Infrared, Bluetooth, and Wi-Fi). However, this multi-channel remote control communication introduces a new attack surface. An inherent security flaw is that remote controls of most smart TVs are designed to work in a benign environment rather than an ad… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  7. arXiv:2207.04637  [pdf, other

    cs.CR

    SIMC 2.0: Improved Secure ML Inference Against Malicious Clients

    Authors: Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H. Deng

    Abstract: In this paper, we study the problem of secure ML inference against a malicious client and a semi-trusted server such that the client only learns the inference output while the server learns nothing. This problem is first formulated by Lehmkuhl \textit{et al.} with a solution (MUSE, Usenix Security'21), whose performance is then substantially improved by Chandran et al.'s work (SIMC, USENIX Securit… ▽ More

    Submitted 27 October, 2022; v1 submitted 11 July, 2022; originally announced July 2022.

  8. arXiv:2207.04620  [pdf, other

    cs.CR

    Hercules: Boosting the Performance of Privacy-preserving Federated Learning

    Authors: Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng

    Abstract: In this paper, we address the problem of privacy-preserving federated neural network training with $N$ users. We present Hercules, an efficient and high-precision training framework that can tolerate collusion of up to $N-1$ users. Hercules follows the POSEIDON framework proposed by Sav et al. (NDSS'21), but makes a qualitative leap in performance with the following contributions: (i) we design a… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

  9. arXiv:2106.14253  [pdf, other

    cs.CR

    An efficient and secure scheme of verifiable computation for Intel SGX

    Authors: Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng

    Abstract: Cloud computing offers resource-constrained users big-volume data storage and energy-consuming complicated computation. However, owing to the lack of full trust in the cloud, the cloud users prefer privacy-preserving outsourced data computation with correctness verification. However, cryptography-based schemes introduce high computational costs to both the cloud and its users for verifiable comput… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

  10. arXiv:2009.10918  [pdf, other

    cs.CR

    Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud

    Authors: Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

    Abstract: Federated learning has become prevalent in medical diagnosis due to its effectiveness in training a federated model among multiple health institutions (i.e. Data Islands (DIs)). However, increasingly massive DI-level poisoning attacks have shed light on a vulnerability in federated learning, which inject poisoned data into certain DIs to corrupt the availability of the federated model. Previous wo… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

  11. arXiv:2005.11688  [pdf, other

    cs.CR

    Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata

    Authors: Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong

    Abstract: In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the nondeterministic transition characteristic of NFA to flexibly represent the medical model, which includes illness states, treatment methods and state transitions caused by exerting d… ▽ More

    Submitted 26 May, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

    Comments: The full version of the paper accepted by IEEE Transactions on Cloud Computing

  12. arXiv:2005.11527  [pdf, other

    cs.CR cs.SE

    When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid

    Authors: Daoyuan Wu, Debin Gao, Robert H. Deng, Rocky K. C. Chang

    Abstract: Widely-used Android static program analysis tools, e.g., Amandroid and FlowDroid, perform the whole-app inter-procedural analysis that is comprehensive but fundamentally difficult to handle modern (large) apps. The average app size has increased three to four times over five years. In this paper, we explore a new paradigm of targeted inter-procedural analysis that can skip irrelevant code and focu… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

  13. arXiv:2005.08997  [pdf, other

    cs.CR

    VerifyTL: Secure and Verifiable Collaborative Transfer Learning

    Authors: Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng

    Abstract: Getting access to labelled datasets in certain sensitive application domains can be challenging. Hence, one often resorts to transfer learning to transfer knowledge learned from a source domain with sufficient labelled data to a target domain with limited labelled data. However, most existing transfer learning techniques only focus on one-way transfer which brings no benefit to the source domain.… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

  14. arXiv:1909.12540  [pdf, ps, other

    cs.CR

    Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud

    Authors: Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang

    Abstract: In this paper, we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud, which we refer to as LightCom. Using LightCom, a user can securely achieve the outsource data storage and fast secure data processing in a single cloud server different from the existing multi-server outsourced computation model. Specifically, we first present a general secure… ▽ More

    Submitted 27 September, 2019; originally announced September 2019.

  15. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks

    Authors: Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li

    Abstract: This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack method is based on an inter-keystroke timing dictionary built from a human cognitive model whose parameters can be determined by a small amount of training data on any users (not necessarily the target victims). Our attacks can thus be potentially launched on a large scale in real-world settings. We i… ▽ More

    Submitted 17 October, 2018; originally announced October 2018.

    Comments: 16 pages, 9 figures

    Journal ref: Computers & Security, vol. 80, pp. 90-107, 2018

  16. arXiv:1801.04372  [pdf, other

    cs.CR

    SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

    Authors: Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng

    Abstract: Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is also introduced. By hijacking a vulnerable component in victim apps, an attack app can escalate its privilege for operations originally prohibited. Many prior studies have been performed… ▽ More

    Submitted 12 January, 2018; originally announced January 2018.

    Comments: This is the extended technical report version of our SCLib paper accepted by ACM CODASPY 2018 (http://www.ycheng.org/codaspy/2018/accepted.html)

  17. arXiv:1609.03322  [pdf, other

    cs.CR

    SecComp: Towards Practically Defending Against Component Hijacking in Android Applications

    Authors: Daoyuan Wu, Debin Gao, Yingjiu Li, Robert H. Deng

    Abstract: Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is also introduced. By hijacking a vulnerable component in victim apps, an attack app can escalate its privilege for originally prohibited operations. Many prior studies have been performed… ▽ More

    Submitted 12 September, 2016; v1 submitted 12 September, 2016; originally announced September 2016.

    Comments: This is a technical report on Android security from Singapore Management University