Search Results for author: Ivan Martinovic

Found 11 papers, 8 papers with code

Widen The Backdoor To Let More Attackers In

no code implementations9 Oct 2021 Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, Nigel Shadbolt

As collaborative learning and the outsourcing of data collection become more common, malicious actors (or agents) which attempt to manipulate the learning process face an additional obstacle as they compete with each other.

Backdoor Attack

Signal Injection Attacks against CCD Image Sensors

1 code implementation19 Aug 2021 Sebastian Köhler, Richard Baker, Ivan Martinovic

Since cameras have become a crucial part in many safety-critical systems and applications, such as autonomous vehicles and surveillance, a large body of academic and non-academic work has shown attacks against their main component - the image sensor.

Autonomous Vehicles

MalPhase: Fine-Grained Malware Detection Using Network Flow Data

no code implementations1 Jun 2021 Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic

Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms.

Denoising Malware Detection

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors

1 code implementation25 Jan 2021 Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic

We validate our model against empirical data collected on two separate cameras, showing that by simply using information from the camera's datasheet the adversary can accurately predict the injected distortion size and optimize their attack accordingly.

object-detection Object Detection

Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020

1 code implementation26 Oct 2020 Henry Turner, Giulio Lovisotto, Ivan Martinovic

In this paper, we present a Distribution-Preserving Voice Anonymization technique, as our submission to the VoicePrivacy Challenge 2020.

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations

1 code implementation8 Jul 2020 Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic

Research into adversarial examples (AE) has developed rapidly, yet static adversarial patches are still the main technique for conducting attacks in the real world, despite being obvious, semi-permanent and unmodifiable once deployed.

Object Detection Traffic Sign Recognition

Seeing Red: PPG Biometrics Using Smartphone Cameras

1 code implementation15 Apr 2020 Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic

PPG signals are obtained by recording a video from the camera as users are resting their finger on top of the camera lens.

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband

2 code implementations12 Feb 2020 James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

However, status-quo services are often unencrypted by default and vulnerable to eavesdropping attacks.

Cryptography and Security Networking and Internet Architecture Performance

Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning

1 code implementation10 Dec 2019 Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni

Demand for smartwatches has taken off in recent years with new models which can run independently from smartphones and provide more useful features, becoming first-class mobile platforms.

Classi-Fly: Inferring Aircraft Categories from Open Data using Machine Learning

no code implementations30 Jul 2019 Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic

Classi-Fly obtains the correct aircraft category with an accuracy of over 88%, demonstrating that it can improve the meta data necessary for applications working with air traffic communication.

BIG-bench Machine Learning Stock Market Prediction +1

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

1 code implementation22 May 2019 Giulio Lovisotto, Simon Eberz, Ivan Martinovic

In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.