no code implementations • 30 May 2024 • Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea
In this work, we propose new attack surfaces for an adversary to compromise a victim's RAG system, by injecting a single malicious document in its knowledge database.
no code implementations • 4 Aug 2023 • Nasimeh Heydaribeni, Ruisi Zhang, Tara Javidi, Cristina Nita-Rotaru, Farinaz Koushanfar
We theoretically prove the robustness of our algorithm against data and model poisoning attacks in a decentralized linear regression setting.
no code implementations • 18 Jul 2023 • Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh
Adaptive Cruise Control (ACC) is a widely used driver assistance technology for maintaining the desired speed and safe distance to the leading vehicle.
1 code implementation • International Conference on Networked Systems 2023 • Max von Hippel, Cristina Nita-Rotaru, Kenneth L. McMillan, Lenore Zuck
We present a formal description of the algorithm, and study its properties.
no code implementations • 23 Jan 2023 • Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea
Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets.
1 code implementation • 27 Aug 2022 • Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru
Federated learning is a popular strategy for training models on distributed, sensitive data, while preserving data privacy.
3 code implementations • IEEE Security and Privacy 2022 • Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru
We show the generalizability of our FSM extraction by using the RFCs for six different protocols: BGPv4, DCCP, LTP, PPTP, SCTP and TCP.
3 code implementations • 2 Apr 2020 • Max von Hippel, Cole Vick, Stavros Tripakis, Cristina Nita-Rotaru
Distributed protocols should be robust to both benign malfunction (e. g. packet loss or delay) and attacks (e. g. message replay) from internal or external adversaries.
Cryptography and Security Formal Languages and Automata Theory
no code implementations • 15 Apr 2019 • Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim
Deep Neural Networks (DNNs) have tremendous potential in advancing the vision for self-driving cars.
no code implementations • 10 Oct 2018 • Samuel Jero, Maria Leonor Pacheco, Dan Goldwasser, Cristina Nita-Rotaru
Grammar-based fuzzing is a technique used to find software vulnerabilities by injecting well-formed inputs generated following rules that encode application semantics.
no code implementations • 8 Sep 2018 • Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli
Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model.
1 code implementation • 1 Apr 2018 • Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li
As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms.