no code implementations • 29 Sep 2021 • Yannick Merkli, Pavol Bielik, Petar Tsankov, Martin Vechev
Our results show that our method effectively reduces robust and inaccurate samples by up to 97. 28%.
no code implementations • 13 Aug 2021 • Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel
In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications.
1 code implementation • NeurIPS 2021 • Chengyuan Yao, Pavol Bielik, Petar Tsankov, Martin Vechev
Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defense's inner workings or approaches based on an ensemble of fixed attacks, none of which may be effective for the specific defense at hand.
1 code implementation • 2 Sep 2020 • Nick Baumann, Samuel Steffen, Benjamin Bichsel, Petar Tsankov, Martin Vechev
Recent work introduces zkay, a system for specifying and enforcing data privacy in smart contracts.
Programming Languages Cryptography and Security
3 code implementations • 4 Jun 2018 • Petar Tsankov, Andrei Dan, Dana Drachsler Cohen, Arthur Gervais, Florian Buenzli, Martin Vechev
To address this problem, we present Securify, a security analyzer for Ethereum smart contracts that is scalable, fully automated, and able to prove contract behaviors as safe/unsafe with respect to a given property.
Cryptography and Security