Share This Author
Provable data possession at untrusted stores
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data.
Random key predistribution schemes for sensor networks
- Haowen Chan, A. Perrig, D. Song
- Computer Science, MathematicsSymposium on Security and Privacy, .
- 11 May 2003
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Practical techniques for searches on encrypted data
- D. Song, D. Wagner, A. Perrig
- Computer Science, MathematicsProceeding IEEE Symposium on Security and…
- 14 May 2000
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Advances and Open Problems in Federated Learning
Motivated by the explosive growth in FL research, this paper discusses recent advances and presents an extensive collection of open problems and challenges.
Efficient authentication and signing of multicast streams over lossy channels
- A. Perrig, R. Canetti, J. Tygar, D. Song
- Computer ScienceProceeding IEEE Symposium on Security and…
- 14 May 2000
This work proposes two efficient schemes, TESLA and EMSS, for secure lossy multicast streams, and offers sender authentication, strong loss robustness, high scalability and minimal overhead at the cost of loose initial time synchronization and slightly delayed authentication.
The TESLA Broadcast Authentication Protocol
The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss.
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
This work considers a new type of attacks, called backdoor attacks, where the attacker's goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor.
Android permissions demystified
Stowaway, a tool that detects overprivilege in compiled Android applications, is built and finds that about one-third of applications are overprivileged.
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
- M. Frank, R. Biedert, Eugene Ma, I. Martinovic, D. Song
- Computer ScienceIEEE Transactions on Information Forensics and…
- 26 July 2012
A classification framework that learns the touch behavior of a user during an enrollment phase and is able to accept or reject the current user by monitoring interaction with the touch screen is proposed.
Delving into Transferable Adversarial Examples and Black-box Attacks
This work is the first to conduct an extensive study of the transferability over large models and a large scale dataset, and it is also theFirst to study the transferabilities of targeted adversarial examples with their target labels.