Search Results for author: Ahmad-Reza Sadeghi

Found 22 papers, 5 papers with code

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

no code implementations10 Apr 2024 Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi

ChatFuzz achieves condition coverage rate of 75% in just 52 minutes compared to a state-of-the-art fuzzer, which requires a lengthy 30-hour window to reach a similar condition coverage.

Vulnerability Detection

One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

no code implementations12 Mar 2024 Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi

The core intuition behind RAGE is to exploit the correspondence between execution trace, execution graph, and execution embeddings to eliminate the unrealistic requirement of having access to a complete CFG.

DeepEclipse: How to Break White-Box DNN-Watermarking Schemes

no code implementations6 Mar 2024 Alessandro Pegoraro, Carlotta Segna, Kavita Kumari, Ahmad-Reza Sadeghi

Deep Learning (DL) models have become crucial in digital transformation, thus raising concerns about their intellectual property rights.

FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

no code implementations7 Dec 2023 Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

Existing defenses against poisoning attacks in FL have several limitations, such as relying on specific assumptions about attack types and strategies or data distributions or not sufficiently robust against advanced injection techniques and strategies and simultaneously maintaining the utility of the aggregated model.

Federated Learning Image Classification +3

DEMASQ: Unmasking the ChatGPT Wordsmith

1 code implementation8 Nov 2023 Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi

The potential misuse of ChatGPT and other Large Language Models (LLMs) has raised concerns regarding the dissemination of false information, plagiarism, academic dishonesty, and fraudulent activities.

Text Detection

To ChatGPT, or not to ChatGPT: That is the question!

no code implementations4 Apr 2023 Alessandro Pegoraro, Kavita Kumari, Hossein Fereidooni, Ahmad-Reza Sadeghi

The dataset serves as a reference to assess the performance of various techniques in detecting ChatGPT-generated content.

Text Detection

BayBFed: Bayesian Backdoor Defense for Federated Learning

no code implementations23 Jan 2023 Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

However, as these approaches directly operate on client updates, their effectiveness depends on factors such as clients' data distribution or the adversary's attack strategies.

backdoor defense Federated Learning +1

Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms

no code implementations17 Jan 2023 Pier Paolo Tricomi, Marco Chilese, Mauro Conti, Ahmad-Reza Sadeghi

Thanks to our interpretable approaches, we conclude by outlining guidelines for creating successful posts.

Marketing

FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

no code implementations21 Sep 2021 Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu

In the area of Internet of Things (IoT) voice assistants have become an important interface to operate smart speakers, smartphones, and even automobiles.

BAFFLE: TOWARDS RESOLVING FEDERATED LEARNING’S DILEMMA - THWARTING BACKDOOR AND INFERENCE ATTACKS

no code implementations1 Jan 2021 Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni

Recently, federated learning (FL) has been subject to both security and privacy attacks posing a dilemmatic challenge on the underlying algorithmic designs: On the one hand, FL is shown to be vulnerable to backdoor attacks that stealthily manipulate the global model output using malicious model updates, and on the other hand, FL is shown vulnerable to inference attacks by a malicious aggregator inferring information about clients’ data from their model updates.

Federated Learning Image Classification

V0LTpwn: Attacking x86 Processor Integrity from Software

no code implementations10 Dec 2019 Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi

We present V0LTpwn, a novel hardware-oriented but software-controlled attack that affects the integrity of computation in virtually any execution mode on modern x86 processors.

Cryptography and Security

Peek-a-Boo: I see your smart home activities, even encrypted!

no code implementations8 Aug 2018 Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac

It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices.

Cryptography and Security

DIoT: A Self-learning System for Detecting Compromised IoT Devices

no code implementations20 Apr 2018 Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, N. Asokan, Ahmad-Reza Sadeghi

Consequently, DIoT can cope with the emergence of new device types as well as new attacks.

Cryptography and Security

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

1 code implementation28 Jun 2017 Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader.

Cryptography and Security

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication

no code implementations20 Jun 2017 Yansong Gao, Said F. Al-Sarawi, Derek Abbott, Ahmad-Reza Sadeghi, Damith C. Ranasinghe

Physical unclonable functions (PUFs), as hardware security primitives, exploit manufacturing randomness to extract hardware instance-specific secrets.

Cryptography and Security

HardIDX: Practical and Secure Index with SGX

no code implementations14 Mar 2017 Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi

Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance.

Cryptography and Security

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

2 code implementations15 Nov 2016 Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.

Cryptography and Security

C-FLAT: Control-FLow ATtestation for Embedded Systems Software

1 code implementation25 May 2016 Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik

Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.