Search Results for author: Dinuka Sahabandu

Found 6 papers, 1 papers with code

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

no code implementations12 Feb 2024 Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors.

LDL: A Defense for Label-Based Membership Inference Attacks

no code implementations3 Dec 2022 Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs).

Game of Trojans: A Submodular Byzantine Approach

no code implementations13 Jul 2022 Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

The results show that (i) with Submodular Trojan algorithm, the adversary needs to embed a Trojan trigger into a very small fraction of samples to achieve high accuracy on both Trojan and clean samples, and (ii) the MM Trojan algorithm yields a trained Trojan model that evades detection with probability 1.

A Natural Language Processing Approach for Instruction Set Architecture Identification

no code implementations13 Apr 2022 Dinuka Sahabandu, Sukarno Mertoguno, Radha Poovendran

Empirical evaluations show that using our byte-level features in ML-based ISA identification results in an 8% higher accuracy than the state-of-the-art features based on byte-histograms and byte pattern signatures.

Malware Detection

A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

no code implementations3 Aug 2021 Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran

In this paper, we study the controlled islanding problem of a power system under disturbances introduced by a malicious adversary.

Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

1 code implementation24 Jul 2020 Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

Our game model has imperfect information as the players do not have information about the actions of the opponent.

Computer Science and Game Theory Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.