Skip to main content

Showing 1–46 of 46 results for author: Kerschbaum, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02437  [pdf, other

    cs.CR cs.LG

    FastLloyd: Federated, Accurate, Secure, and Tunable $k$-Means Clustering with Differential Privacy

    Authors: Abdulrahman Diaa, Thomas Humphries, Florian Kerschbaum

    Abstract: We study the problem of privacy-preserving $k$-means clustering in the horizontally federated setting. Existing federated approaches using secure computation, suffer from substantial overheads and do not offer output privacy. At the same time, differentially private (DP) $k$-means algorithms assume a trusted central curator and do not extend to federated settings. Naively combining the secure and… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  2. arXiv:2402.14937  [pdf, other

    cs.LG cs.CR

    SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge

    Authors: Lucas Fenaux, Florian Kerschbaum

    Abstract: Adversarial examples are malicious inputs to machine learning models that trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study and formalization of adversary knowledge when mounting attacks. This has yielded a complex space of attack research with hard-to-compare threat models and attacks. We focus on the image classific… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  3. arXiv:2312.00157  [pdf, other

    cs.LG cs.CR cs.CV

    Universal Backdoor Attacks

    Authors: Benjamin Schneider, Nils Lukas, Florian Kerschbaum

    Abstract: Web-scraped datasets are vulnerable to data poisoning, which can be used for backdooring deep image classifiers during training. Since training on large datasets is expensive, a model is trained once and re-used many times. Unlike adversarial examples, backdoor attacks often target specific classes rather than any class learned by the model. One might expect that targeting many classes through a n… ▽ More

    Submitted 19 January, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: Accepted for publication at ICLR 2024

  4. arXiv:2310.14565  [pdf, other

    cs.CR

    PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting

    Authors: Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Two parties with private data sets can find shared elements using a Private Set Intersection (PSI) protocol without revealing any information beyond the intersection. Circuit PSI protocols privately compute an arbitrary function of the intersection - such as its cardinality, and are often employed in an unbalanced setting where one party has more data than the other. Existing protocols are either… ▽ More

    Submitted 18 August, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

  5. Differentially Private Data Generation with Missing Data

    Authors: Shubhankar Mohapatra, Jianqiao Zong, Florian Kerschbaum, Xi He

    Abstract: Despite several works that succeed in generating synthetic data with differential privacy (DP) guarantees, they are inadequate for generating high-quality synthetic data when the input data has missing values. In this work, we formalize the problems of DP synthetic data with missing values and propose three effective adaptive strategies that significantly improve the utility of the synthetic data… ▽ More

    Submitted 30 May, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: 18 pages, 9 figures, 2 tables

    Journal ref: PVLDB Volume 17, 2024

  6. arXiv:2309.16952  [pdf, other

    cs.CR cs.LG

    Leveraging Optimization for Adaptive Attacks on Image Watermarks

    Authors: Nils Lukas, Abdulrahman Diaa, Lucas Fenaux, Florian Kerschbaum

    Abstract: Untrustworthy users can misuse image generators to synthesize high-quality deepfakes and engage in unethical activities. Watermarking deters misuse by marking generated content with a hidden message, enabling its detection using a secret watermarking key. A core security property of watermarking is robustness, which states that an attacker can only evade detection by substantially degrading image… ▽ More

    Submitted 20 January, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: ICLR'24

  7. arXiv:2309.06496  [pdf, other

    cs.CR

    Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption

    Authors: Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum

    Abstract: As machine learning as a service continues gaining popularity, concerns about privacy and intellectual property arise. Users often hesitate to disclose their private information to obtain a service, while service providers aim to protect their proprietary models. Decision trees, a widely used machine learning model, are favoured for their simplicity, interpretability, and ease of training. In this… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  8. Identifying and Mitigating the Security Risks of Generative AI

    Authors: Clark Barrett, Brad Boyd, Elie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang

    Abstract: Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, such as large language models (LLMs) and diffusion models, have shown remarkable capabilities (e.g., in-context learning, code-completion, and text-to-image generation and editing). However, GenAI can be used just as well… ▽ More

    Submitted 28 December, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Journal ref: Foundations and Trends in Privacy and Security 6 (2023) 1-52

  9. arXiv:2308.10718  [pdf, other

    cs.CR cs.CV

    Backdooring Textual Inversion for Concept Censorship

    Authors: Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang

    Abstract: Recent years have witnessed success in AIGC (AI Generated Content). People can make use of a pre-trained diffusion model to generate images of high quality or freely modify existing pictures with only prompts in nature language. More excitingly, the emerging personalization techniques make it feasible to create specific-desired images with only a few images as references. However, this induces sev… ▽ More

    Submitted 23 August, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

  10. arXiv:2306.08538  [pdf, other

    cs.CR cs.LG

    Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

    Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Machine Learning as a Service (MLaaS) is an increasingly popular design where a company with abundant computing resources trains a deep neural network and offers query access for tasks like image classification. The challenge with this design is that MLaaS requires the client to reveal their potentially sensitive queries to the company hosting the model. Multi-party computation (MPC) protects the… ▽ More

    Submitted 16 April, 2024; v1 submitted 14 June, 2023; originally announced June 2023.

    Comments: To appear at USENIX Security 2024

  11. arXiv:2305.09671  [pdf, other

    cs.CR cs.LG

    Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deep image classification models trained on vast amounts of web-scraped data are susceptible to data poisoning - a mechanism for backdooring models. A small number of poisoned samples seen during training can severely undermine a model's integrity during inference. Existing work considers an effective defense as one that either (i) restores a model's integrity through repair or (ii) detects an att… ▽ More

    Submitted 29 June, 2023; v1 submitted 7 May, 2023; originally announced May 2023.

    Comments: Preprint

  12. arXiv:2304.07361  [pdf, other

    cs.LG cs.CR

    PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deepfakes refer to content synthesized using deep generators, which, when misused, have the potential to erode trust in digital media. Synthesizing high-quality deepfakes requires access to large and complex generators only a few entities can train and provide. The threat is malicious users that exploit access to the provided model and generate harmful deepfakes without risking detection. Watermar… ▽ More

    Submitted 7 November, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: USENIX Security 2023

  13. arXiv:2303.09043  [pdf, ps, other

    cs.CR

    HE is all you need: Compressing FHE Ciphertexts using Additive HE

    Authors: Rasoul Akhavan Mahdavi, Abdulrahman Diaa, Florian Kerschbaum

    Abstract: Homomorphic Encryption (HE) is a commonly used tool for building privacy-preserving applications. However, in scenarios with many clients and high-latency networks, communication costs due to large ciphertext sizes are the bottleneck. In this paper, we present a new compression technique that uses an additive homomorphic encryption scheme with small ciphertexts to compress large homomorphic cipher… ▽ More

    Submitted 28 July, 2024; v1 submitted 15 March, 2023; originally announced March 2023.

  14. arXiv:2211.10752  [pdf, other

    cs.CV

    Towards Robust Dataset Learning

    Authors: Yihan Wu, Xinda Li, Florian Kerschbaum, Heng Huang, Hongyang Zhang

    Abstract: Adversarial training has been actively studied in recent computer vision research to improve the robustness of models. However, due to the huge computational cost of generating adversarial samples, adversarial training methods are often slow. In this paper, we study the problem of learning a robust dataset such that any classifier naturally trained on the dataset is adversarially robust. Such a da… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

  15. arXiv:2211.07026  [pdf, other

    cs.CR

    Comprehension from Chaos: Towards Informed Consent for Private Computation

    Authors: Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum

    Abstract: Private computation, which includes techniques like multi-party computation and private query execution, holds great promise for enabling organizations to analyze data they and their partners hold while maintaining data subjects' privacy. Despite recent interest in communicating about differential privacy, end users' perspectives on private computation have not previously been studied. To fill thi… ▽ More

    Submitted 23 August, 2023; v1 submitted 13 November, 2022; originally announced November 2022.

  16. arXiv:2209.13913  [pdf, other

    cs.CR

    Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection

    Authors: Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi

    Abstract: In a Private section intersection (PSI) protocol, Alice and Bob compute the intersection of their respective sets without disclosing any element not in the intersection. PSI protocols have been extensively studied in the literature and are deployed in industry. With state-of-the-art protocols achieving optimal asymptotic complexity, performance improvements are rare and can only improve complexi… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  17. arXiv:2205.02130  [pdf, other

    cs.CR cs.CL cs.LG

    The Limits of Word Level Differential Privacy

    Authors: Justus Mattern, Benjamin Weggenmann, Florian Kerschbaum

    Abstract: As the issues of privacy and trust are receiving increasing attention within the research community, various attempts have been made to anonymize textual data. A significant subset of these approaches incorporate differentially private mechanisms to perturb word embeddings, thus replacing individual words in a sentence. While these methods represent very important contributions, have various advan… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  18. arXiv:2204.07877  [pdf, other

    cs.CR cs.LG

    Assessing Differentially Private Variational Autoencoders under Membership Inference

    Authors: Daniel Bernau, Jonas Robl, Florian Kerschbaum

    Abstract: We present an approach to quantify and compare the privacy-accuracy trade-off for differentially private Variational Autoencoders. Our work complements previous work in two aspects. First, we evaluate the the strong reconstruction MI attack against Variational Autoencoders under differential privacy. Second, we address the data scientist's challenge of setting privacy parameter epsilon, which stee… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

  19. arXiv:2202.07569  [pdf, other

    cs.CR

    Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators

    Authors: Rasoul Akhavan Mahdavi, Florian Kerschbaum

    Abstract: Equality operators are an essential building block in tasks over secure computation such as private information retrieval. In private information retrieval (PIR), a user queries a database such that the server does not learn which element is queried. In this work, we propose \emph{equality operators for constant-weight codewords}. A constant-weight code is a collection of codewords that share the… ▽ More

    Submitted 16 February, 2022; v1 submitted 15 February, 2022; originally announced February 2022.

  20. arXiv:2110.05524  [pdf, other

    cs.CR

    Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference

    Authors: Jiaxiang Liu, Simon Oya, Florian Kerschbaum

    Abstract: Differentially private training algorithms provide protection against one of the most popular attacks in machine learning: the membership inference attack. However, these privacy algorithms incur a loss of the model's classification accuracy, therefore creating a privacy-utility trade-off. The amount of noise that differential privacy requires to provide strong theoretical protection guarantees in… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

  21. arXiv:2110.04180  [pdf, other

    cs.CR

    IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization

    Authors: Simon Oya, Florian Kerschbaum

    Abstract: Effective query recovery attacks against Searchable Symmetric Encryption (SSE) schemes typically rely on auxiliary ground-truth information about the queries or dataset. Query recovery is also possible under the weaker statistical auxiliary information assumption, although statistical-based attacks achieve lower accuracy and are not considered a serious threat. In this work we present IHOP, a stat… ▽ More

    Submitted 31 May, 2022; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: 18 pages

  22. arXiv:2108.04974  [pdf, other

    cs.CR cs.LG

    SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)

    Authors: Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum

    Abstract: Deep Neural Network (DNN) watermarking is a method for provenance verification of DNN models. Watermarking should be robust against watermark removal attacks that derive a surrogate model that evades provenance verification. Many watermarking schemes that claim robustness have been proposed, but their robustness is only validated in isolation against a relatively small set of attacks. There is no… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  23. arXiv:2107.12407  [pdf, other

    cs.CR

    Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics

    Authors: Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum

    Abstract: Key-value data is a naturally occurring data type that has not been thoroughly investigated in the local trust model. Existing local differentially private (LDP) solutions for computing statistics over key-value data suffer from the inherent accuracy limitations of each user adding their own noise. Multi-party computation (MPC) maintains better accuracy than LDP and similarly does not require a tr… ▽ More

    Submitted 30 August, 2022; v1 submitted 26 July, 2021; originally announced July 2021.

  24. arXiv:2103.05792  [pdf, other

    cs.CR cs.DB

    Equi-Joins Over Encrypted Data for Series of Queries

    Authors: Masoumeh Shafieinejad, Suraj Gupta, Jin Yang Liu, Koray Karabina, Florian Kerschbaum

    Abstract: Encryption provides a method to protect data outsourced to a DBMS provider, e.g., in the cloud. However, performing database operations over encrypted data requires specialized encryption schemes that carefully balance security and performance. In this paper, we present a new encryption scheme that can efficiently perform equi-joins over encrypted data with better security than the state-of-the-ar… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures, 6 tables

  25. arXiv:2103.05173  [pdf, other

    cs.DB cs.CR

    PCOR: Private Contextual Outlier Release via Differentially Private Search

    Authors: Masoumeh Shafieinejad, Florian Kerschbaum, Ihab F. Ilyas

    Abstract: Outlier detection plays a significant role in various real world applications such as intrusion, malfunction, and fraud detection. Traditionally, outlier detection techniques are applied to find outliers in the context of the whole dataset. However, this practice neglects contextual outliers, that are not outliers in the whole dataset but in some specific neighborhoods. Contextual outliers are par… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  26. arXiv:2103.02913  [pdf, other

    cs.CR cs.LG

    Quantifying identifiability to choose and audit $ε$ in differentially private deep learning

    Authors: Daniel Bernau, Günther Eibl, Philip W. Grassal, Hannah Keller, Florian Kerschbaum

    Abstract: Differential privacy allows bounding the influence that training data records have on a machine learning model. To use differential privacy in machine learning, data scientists must choose privacy parameters $(ε,δ)$. Choosing meaningful privacy parameters is key, since models trained with weak privacy parameters might result in excessive privacy leakage, while strong privacy parameters might overl… ▽ More

    Submitted 20 July, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

  27. arXiv:2102.09651  [pdf, other

    cs.CR

    Obfuscated Access and Search Patterns in Searchable Encryption

    Authors: Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum

    Abstract: Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its encrypted data to a cloud server while maintaining the ability to search over it and retrieve matched documents. Most existing SSE schemes leak which documents are accessed per query, i.e., the so-called access pattern, and thus are vulnerable to attacks that can recover the database or the queried keywords. Curren… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

    Comments: To be published at Network and Distributed Systems Security (NDSS) Symposium 2021, 21-24 February 2021, San Diego, CA, USA

  28. arXiv:2010.12112  [pdf, other

    cs.CR cs.LG

    Investigating Membership Inference Attacks under Data Dependencies

    Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum

    Abstract: Training machine learning models on privacy-sensitive data has become a popular practice, driving innovation in ever-expanding fields. This has opened the door to new attacks that can have serious privacy implications. One such attack, the Membership Inference Attack (MIA), exposes whether or not a particular data point was used to train a model. A growing body of literature uses Differentially Pr… ▽ More

    Submitted 14 June, 2023; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: IEEE 36th Computer Security Foundations Symposium (CSF)

  29. arXiv:2010.03465  [pdf, other

    cs.CR

    Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

    Authors: Simon Oya, Florian Kerschbaum

    Abstract: Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server. These schemes focus on hiding the access pattern, which refers to the set of documents that match the client's queries. This provides protection against current attacks that largely depend on this leakage to succeed. However… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 16 pages. 11 figures. To appear at Proceedings of the 30th USENIX Security Symposium (August 11-13, 2021, Vancouver, B.C., Canada)

  30. arXiv:2003.09481  [pdf, other

    cs.DB cs.CR cs.DS

    Efficient Oblivious Database Joins

    Authors: Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila

    Abstract: A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client's encrypted data. One of the major obstacles to such a goa… ▽ More

    Submitted 15 December, 2020; v1 submitted 20 March, 2020; originally announced March 2020.

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), 13(11): 2132-2145, 2020

  31. arXiv:2002.05097  [pdf, other

    cs.CR

    EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves

    Authors: Benny Fuhry, Jayanth Jain H A, Florian Kerschbaum

    Abstract: Data confidentiality is an important requirement for clients when outsourcing databases to the cloud. Trusted execution environments, such as Intel SGX, offer an efficient, hardware-based solution to this cryptographic problem. Existing solutions are not optimized for column-oriented, in-memory databases and pose impractical memory requirements on the enclave. We present EncDBDB, a novel approach… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  32. arXiv:1912.11328  [pdf, other

    cs.CR cs.LG

    Assessing differentially private deep learning with Membership Inference

    Authors: Daniel Bernau, Philip-William Grassal, Jonas Robl, Florian Kerschbaum

    Abstract: Attacks that aim to identify the training data of public neural networks represent a severe threat to the privacy of individuals participating in the training data set. A possible protection is offered by anonymization of the training data or training function with differential privacy. However, data scientists can choose between local and central differential privacy and need to select meaningful… ▽ More

    Submitted 26 May, 2020; v1 submitted 24 December, 2019; originally announced December 2019.

  33. arXiv:1912.00888  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Neural Network Fingerprinting by Conferrable Adversarial Examples

    Authors: Nils Lukas, Yuxuan Zhang, Florian Kerschbaum

    Abstract: In Machine Learning as a Service, a provider trains a deep neural network and gives many users access. The hosted (source) model is susceptible to model stealing attacks, where an adversary derives a surrogate model from API access to the source model. For post hoc detection of such attacks, the provider needs a robust method to determine whether a suspect model is a surrogate of their model. We p… ▽ More

    Submitted 20 January, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

  34. arXiv:1910.14268  [pdf, other

    cs.CR cs.LG stat.ML

    RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks

    Authors: Tianhao Wang, Florian Kerschbaum

    Abstract: Watermarking of deep neural networks (DNN) can enable their tracing once released by a data owner. In this paper, we generalize white-box watermarking algorithms for DNNs, where the data owner needs white-box access to the model to extract the watermark. White-box watermarking algorithms have the advantage that they do not impact the accuracy of the watermarked model. We propose Robust whIte-box G… ▽ More

    Submitted 13 February, 2021; v1 submitted 31 October, 2019; originally announced October 2019.

    Comments: WebConf'21 (Full Paper)

  35. arXiv:1909.08362  [pdf, other

    cs.CR

    Non-Interactive Private Decision Tree Evaluation

    Authors: Anselme Tueno, Yordan Boev, Florian Kerschbaum

    Abstract: Decision trees are a powerful prediction model with many applications in statistics, data mining, and machine learning. In some settings, the model and the data to be classified may contain sensitive information belonging to different parties. In this paper, we, therefore, address the problem of privately evaluating a decision tree on private data. This scenario consists of a server holding a priv… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  36. arXiv:1909.08347  [pdf, other

    cs.CR

    Secure Computation of the kth-Ranked Element in a Star Network

    Authors: Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi

    Abstract: We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties. The kth-ranked element (e.g., minimum, maximum, median) is of particular interest in benchmarking, which allows a company to compare its own key performance indicator to the statistics of its peer group. The individual integers are sensitive data, yet the kth-ranked… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  37. arXiv:1906.07745  [pdf, other

    cs.LG cs.CR stat.ML

    On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

    Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum

    Abstract: Obtaining the state of the art performance of deep learning models imposes a high cost to model generators, due to the tedious data preparation and the substantial processing requirements. To protect the model from unauthorized re-distribution, watermarking approaches have been introduced in the past couple of years. We investigate the robustness and reliability of state-of-the-art deep neural net… ▽ More

    Submitted 25 November, 2019; v1 submitted 18 June, 2019; originally announced June 2019.

  38. arXiv:1805.00904  [pdf, other

    cs.CR cs.IR

    SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining

    Authors: Benjamin Weggenmann, Florian Kerschbaum

    Abstract: Text mining and information retrieval techniques have been developed to assist us with analyzing, organizing and retrieving documents with the help of computers. In many cases, it is desirable that the authors of such documents remain anonymous: Search logs can reveal sensitive details about a user, critical articles or messages about a company or government might have severe or fatal consequences… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

    Comments: This report is an extended version of our SIGIR'18 paper

  39. arXiv:1802.01138  [pdf, other

    cs.CR

    Secure Range Queries for Multiple Users

    Authors: Anselme Tueno, Florian Kerschbaum

    Abstract: Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. Moreover, it does not require any change to the database management system, because comparison operates on ciphertexts as on plaintexts. This makes order-preserving encryption schemes very suitable for data outsourcing in cloud computing scenarios. However, all order-preserving e… ▽ More

    Submitted 4 February, 2018; originally announced February 2018.

  40. arXiv:1710.00390  [pdf, other

    cs.CR

    Computation on Encrypted Data using Data Flow Authentication

    Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden

    Abstract: Encrypting data before sending it to the cloud protects it against hackers and malicious insiders, but requires the cloud to compute on encrypted data. Trusted (hardware) modules, e.g., secure enclaves like Intel's SGX, can very efficiently run entire programs in encrypted memory. However, it already has been demonstrated that software vulnerabilities give an attacker ample opportunity to insert a… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

  41. arXiv:1709.09314  [pdf, other

    cs.CR

    An Efficiently Searchable Encrypted Data Structure for Range Queries

    Authors: Florian Kerschbaum, Anselme Tueno

    Abstract: At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption. These plaintext guessing attacks have been further improved in subsequent work, e.g. by Grubbs et al. in 2016. Such cryptanalysis is crucially important to sharpen our understanding of the implications of security models. In this paper we present an efficie… ▽ More

    Submitted 26 September, 2017; originally announced September 2017.

  42. arXiv:1703.04583  [pdf, other

    cs.CR

    HardIDX: Practical and Secure Index with SGX

    Authors: Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi

    Abstract: Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that are not specifically tailored to the hardware architecture, and are rarely well analyzed for their security (e.g., the impact of side channels).… ▽ More

    Submitted 14 March, 2017; originally announced March 2017.

  43. arXiv:1405.0205  [pdf, other

    cs.CR

    Inference Control for Privacy-Preserving Genome Matching

    Authors: Florian Kerschbaum, Martin Beck, Dagmar Schönfeld

    Abstract: Privacy is of the utmost importance in genomic matching. Therefore a number of privacy-preserving protocols have been presented using secure computation. Nevertheless, none of these protocols prevents inferences from the result. Goodrich has shown that this resulting information is sufficient for an effective attack on genome databases. In this paper we present an approach that can detect and miti… ▽ More

    Submitted 1 May, 2014; originally announced May 2014.

    Comments: 20 pages, 4 figures

  44. arXiv:1209.5208  [pdf, other

    cs.CR

    Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity

    Authors: Martin Beck, Florian Kerschbaum

    Abstract: Consider two parties who want to compare their strings, e.g., genomes, but do not want to reveal them to each other. We present a system for privacy-preserving matching of strings, which differs from existing systems by providing a deterministic approximation instead of an exact distance. It is efficient (linear complexity), non-interactive and does not involve a third party which makes it particu… ▽ More

    Submitted 12 February, 2013; v1 submitted 24 September, 2012; originally announced September 2012.

    Comments: 6 pages, 4 figures

  45. arXiv:1102.4602  [pdf, other

    cs.CR cs.GT

    Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions

    Authors: Michael T. Goodrich, Florian Kerschbaum

    Abstract: In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main ideas behind our techniques are to use randomization and various schemes to escrow reputations scores until appropriate external events occur. Depending on the degree of utility and privacy needed, th… ▽ More

    Submitted 24 July, 2011; v1 submitted 22 February, 2011; originally announced February 2011.

    Comments: Longer version of a paper appearing in ACM Conference on Data and Application Security and Privacy (CODASPY) 2011

  46. arXiv:1012.2248  [pdf, other

    cs.CR

    Plug-in privacy for Smart Metering billing

    Authors: Marek Jawurek, Martin Johns, Florian Kerschbaum

    Abstract: Traditional electricity meters are replaced by Smart Meters in customers' households. Smart Meters collects fine-grained utility consumption profiles from customers, which in turn enables the introduction of dynamic, time-of-use tariffs. However, the fine-grained usage data that is compiled in this process also allows to infer the inhabitant's personal schedules and habits. We propose a privacy-pr… ▽ More

    Submitted 1 March, 2011; v1 submitted 10 December, 2010; originally announced December 2010.