Skip to main content

Showing 1–13 of 13 results for author: Oren, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01423  [pdf, other

    cs.LG cs.AI

    Value Improved Actor Critic Algorithms

    Authors: Yaniv Oren, Moritz A. Zanger, Pascal R. van der Vaart, Matthijs T. J. Spaan, Wendelin Bohmer

    Abstract: Many modern reinforcement learning algorithms build on the actor-critic (AC) framework: iterative improvement of a policy (the actor) using policy improvement operators and iterative approximation of the policy's value (the critic). In contrast, the popular value-based algorithm family employs improvement operators in the value update, to iteratively improve the value function directly. In this wo… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2310.17623  [pdf, other

    cs.CL cs.LG

    Proving Test Set Contamination in Black Box Language Models

    Authors: Yonatan Oren, Nicole Meister, Niladri Chatterji, Faisal Ladhak, Tatsunori B. Hashimoto

    Abstract: Large language models are trained on vast amounts of internet data, prompting concerns and speculation that they have memorized public benchmarks. Going from speculation to proof of contamination is challenging, as the pretraining data used by proprietary models are often not publicly accessible. We show that it is possible to provide provable guarantees of test set contamination in language model… ▽ More

    Submitted 23 November, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

  3. arXiv:2210.13455  [pdf, other

    cs.LG cs.AI

    E-MCTS: Deep Exploration in Model-Based Reinforcement Learning by Planning with Epistemic Uncertainty

    Authors: Yaniv Oren, Matthijs T. J. Spaan, Wendelin Böhmer

    Abstract: One of the most well-studied and highly performing planning approaches used in Model-Based Reinforcement Learning (MBRL) is Monte-Carlo Tree Search (MCTS). Key challenges of MCTS-based MBRL methods remain dedicated deep exploration and reliability in the face of the unknown, and both challenges can be alleviated through principled epistemic uncertainty estimation in the predictions of MCTS. We pre… ▽ More

    Submitted 30 August, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: Submitted to NeurIPS 2023, accepted to EWRL 2023

  4. DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Authors: Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom

    Abstract: Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification to improve security. In this paper, we report on a new technique that can significantly extend the tracking time of fingerprint-based tracking methods… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: Network and Distributed System Security Symposium, Feb 2022, San Diego, United States

  5. arXiv:2103.04952  [pdf, other

    cs.CR

    Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

    Authors: Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

    Abstract: The "eternal war in cache" has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out attacks. To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying ou… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  6. arXiv:1909.02060  [pdf, other

    cs.CL cs.LG stat.ML

    Distributionally Robust Language Modeling

    Authors: Yonatan Oren, Shiori Sagawa, Tatsunori B. Hashimoto, Percy Liang

    Abstract: Language models are generally trained on data spanning a wide range of topics (e.g., news, reviews, fiction), but they might be applied to an a priori unknown target distribution (e.g., restaurant reviews). In this paper, we first show that training on text outside the test distribution can degrade test performance when using standard maximum likelihood (MLE) training. To remedy this without the k… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: Camera ready version for EMNLP

  7. arXiv:1908.02524  [pdf, other

    cs.CR

    Cross-Router Covert Channels

    Authors: Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren

    Abstract: Many organizations protect secure networked devices from non-secure networked devices by assigning each class of devices to a different logical network. These two logical networks, commonly called the host network and the guest network, use the same router hardware, which is designed to isolate the two networks in software. In this work we show that logical network isolation based on host and gu… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: Presented at WOOT 2019 - https://orenlab.sise.bgu.ac.il/p/CrossRouter

  8. arXiv:1905.04691  [pdf, other

    cs.CR

    Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

    Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren

    Abstract: Position sensors, such as the gyroscope, the magnetometer and the accelerometer, are found in a staggering variety of devices, from smartphones and UAVs to autonomous robots. Several works have shown how adversaries can mount spoofing attacks to remotely corrupt or even completely control the outputs of these sensors. With more and more critical applications relying on sensor readings to make impo… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    ACM Class: B.8.1; K.6.5

  9. arXiv:1812.01194  [pdf, other

    stat.ML cs.LG

    A Retrieve-and-Edit Framework for Predicting Structured Outputs

    Authors: Tatsunori B. Hashimoto, Kelvin Guu, Yonatan Oren, Percy Liang

    Abstract: For the task of generating complex outputs such as source code, editing existing outputs can be easier than generating complex outputs from scratch. With this motivation, we propose an approach that first retrieves a training example based on the input (e.g., natural language description) and then edits it to the desired output (e.g., code). Our contribution is a computationally efficient method f… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

    Comments: To appear, NeurIPS 2018

  10. arXiv:1811.07153  [pdf, other

    cs.CR cs.LG

    Robust Website Fingerprinting Through the Cache Occupancy Channel

    Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom

    Abstract: Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the Tor… ▽ More

    Submitted 21 February, 2019; v1 submitted 17 November, 2018; originally announced November 2018.

  11. arXiv:1805.04850  [pdf, other

    cs.CR

    Shattered Trust: When Replacement Smartphone Components Attack

    Authors: Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren

    Abstract: Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party manufacturers and not by the phone vendors themselves. Third-party driver source code to support these components is integrated into the vendor's source code. In contrast to 'pluggable' drivers, such as USB or network drivers, the… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

    Comments: Presented in WOOT 17', 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17) - 2017

  12. arXiv:1709.08878  [pdf, other

    cs.CL cs.AI cs.LG cs.NE stat.ML

    Generating Sentences by Editing Prototypes

    Authors: Kelvin Guu, Tatsunori B. Hashimoto, Yonatan Oren, Percy Liang

    Abstract: We propose a new generative model of sentences that first samples a prototype sentence from the training corpus and then edits it into a new sentence. Compared to traditional models that generate from scratch either left-to-right or by first sampling a latent sentence vector, our prototype-then-edit model improves perplexity on language modeling and generates higher quality outputs according to hu… ▽ More

    Submitted 7 September, 2018; v1 submitted 26 September, 2017; originally announced September 2017.

    Comments: 14 pages, Transactions of the Association for Computational Linguistics (TACL), 2018

  13. arXiv:1502.07373  [pdf, other

    cs.CR cs.NI

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript

    Authors: Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis

    Abstract: We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extr… ▽ More

    Submitted 1 March, 2015; v1 submitted 25 February, 2015; originally announced February 2015.