Share This Author
Semantics of programming languages - structures and techniques
- Carl A. Gunter
- Computer ScienceFoundations of computing
- 1 May 1993
Semantics of Programming Languages exposes the basic motivations and philosophy underlying the applications of semantic techniques in computer science. It introduces the mathematical theory of…
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Novel techniques are developed that address a key technical challenge: integrating the commands into a song in a way that can be effectively recognized by ASR through the air, in the presence of background noise, while not being detected by a human listener.
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
The research identifies 8 potential attack vectors of Intel SGX, and highlights the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs can be done through combining both cache and cross-enclave DRAM channels.
Detecting AI Trojans Using Meta Neural Analysis
- Xiaojun Xu, Qi Wang, Huichen Li, N. Borisov, Carl A. Gunter, Bo Li
- Computer ScienceIEEE Symposium on Security and Privacy (SP)
- 8 October 2019
A Meta Neural Trojan Detection pipeline that does not make assumptions on the attack strategies and only needs black-box access to models is introduced and achieves 97% detection AUC score and significantly outperforms existing detection approaches.
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
This paper develops techniques that reduce the complexity of the inference of global properties of the training data, such as the environment in which the data was produced, or the fraction of the data that comes from a certain class, as applied to white-box Fully Connected Neural Networks (FCNNs).
Dynamic Searchable Encryption via Blind Storage
- Muhammad Naveed, M. Prabhakaran, Carl A. Gunter
- Computer ScienceIEEE Symposium on Security and Privacy
- 18 May 2014
A new dynamic SSE scheme is presented that is simpler and more efficient than existing schemes while revealing less information to the server than prior schemes, achieving fully adaptive security against honest-but-curious servers.
A Reference Model for Requirements and Specifications
A new form of refinement is introduced, which is pivotal to defining the desired soundness and consistency properties precisely and represents it in higher-order logic and some of its key mathematical ramifications are determined.
Formal verification of standards for distance vector routing protocols
This work shows how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols, and develops verification techniques suited to routing protocols generally.
Privacy APIs: access control techniques to analyze and verify legal privacy policies
- M.J. May, Carl A. Gunter, I. Lee
- Computer Science19th IEEE Computer Security Foundations Workshop…
- 5 July 2006
This paper describes techniques to formalize regulatory privacy rules and how to exploit this formalization to analyze the rules automatically and validate the usefulness of the formalism by using the SPIN model checker to verify properties that distinguish the two versions of HIPAA.