Skip to main content

Showing 1–22 of 22 results for author: Chatzikokolakis, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.03831  [pdf, other

    cs.CR

    Tor circuit fingerprinting defenses using adaptive padding

    Authors: George Kadianakis, Theodoros Polyzos, Mike Perry, Kostas Chatzikokolakis

    Abstract: Online anonymity and privacy has been based on confusing the adversary by creating indistinguishable network elements. Tor is the largest and most widely deployed anonymity system, designed against realistic modern adversaries. Recently, researchers have managed to fingerprint Tor's circuits -- and hence the type of underlying traffic -- simply by capturing and analyzing traffic traces. In this wo… ▽ More

    Submitted 11 January, 2022; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 17 pages

  2. arXiv:2102.03236  [pdf, other

    cs.LG math.OC

    Exact Optimization of Conformal Predictors via Incremental and Decremental Learning

    Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Martin Jaggi

    Abstract: Conformal Predictors (CP) are wrappers around ML models, providing error guarantees under weak assumptions on the data distribution. They are suitable for a wide range of problems, from classification and regression to anomaly detection. Unfortunately, their very high computational complexity limits their applicability to large datasets. In this work, we show that it is possible to speed up a CP c… ▽ More

    Submitted 5 October, 2021; v1 submitted 5 February, 2021; originally announced February 2021.

  3. arXiv:2012.12060  [pdf, other

    cs.CR cs.AI cs.GT cs.IT econ.TH

    Information Leakage Games: Exploring Information as a Utility Function

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information. To this end, one must be able to reason about potential attacks and their interplay with possible defenses. In this paper, we propose a game-theoretic framework to formalize strategies of attacker and defender in the context of information leakage, and provide a… ▽ More

    Submitted 28 January, 2022; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: The journal version of GameSec'17 paper (arXiv:1705.05030), accepted in ACM Transactions on Privacy and Security (TOPS)

    Journal ref: ACM Trans. Priv. Secur. 25, 3, Article 20 (August 2022), pp. 1-36

  4. Bayes Security: A Not So Average Metric

    Authors: Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso

    Abstract: Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this paper, we study Bayes security, a security metric inspired by the cryptographic advantage. Similarly to DP, Bayes security i) is independent of an… ▽ More

    Submitted 20 February, 2024; v1 submitted 6 November, 2020; originally announced November 2020.

  5. arXiv:2005.04399  [pdf, other

    cs.CR cs.LG stat.ML

    Estimating g-Leakage via Machine Learning

    Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida

    Abstract: This paper considers the problem of estimating the information leakage of a system in the black-box scenario. It is assumed that the system's internals are unknown to the learner, or anyway too complicated to analyze, and the only available information are pairs of input-output data samples, possibly obtained by submitting queries to the system or provided by a third party. Previous research has m… ▽ More

    Submitted 24 November, 2021; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: This is the extended version of the paper which will appear in the Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Virtual Event, USA

  6. arXiv:1904.01059  [pdf, other

    cs.LG stat.ML

    Optimal Obfuscation Mechanisms via Machine Learning

    Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: We consider the problem of obfuscating sensitive information while preserving utility, and we propose a machine learning approach inspired by the generative adversarial networks paradigm. The idea is to set up two nets: the generator, that tries to produce an optimal obfuscation mechanism to protect the data, and the classifier, that tries to de-obfuscate the data. By letting the two nets compete… ▽ More

    Submitted 25 October, 2020; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: Preprint version of a paper that will appear on the Proceedings of the IEEE 33rd Computer Security Foundations Symposium, CSF 2020

  7. F-BLEAU: Fast Black-box Leakage Estimation

    Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: We consider the problem of measuring how much a system reveals about its secret inputs. We work under the black-box setting: we assume no prior knowledge of the system's internals, and we run the system for choices of secrets and measure its leakage from the respective outputs. Our goal is to estimate the Bayes risk, from which one can derive some of the most popular leakage measures (e.g., min-en… ▽ More

    Submitted 27 October, 2020; v1 submitted 4 February, 2019; originally announced February 2019.

    Journal ref: In 2019 IEEE Symposium on Security and Privacy (SP), pp. 835-852. IEEE, 2019

  8. arXiv:1805.01456  [pdf, other

    cs.CR

    Metric-based local differential privacy for statistical applications

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Anna Pazii

    Abstract: Local differential privacy (LPD) is a distributed variant of differential privacy (DP) in which the obfuscation of the sensitive information is done at the level of the individual records, and in general it is used to sanitize data that are collected for statistical purposes. LPD has the advantage it does not need to assume a trusted third party. On the other hand LDP in general requires more nois… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

  9. arXiv:1803.10042  [pdf, other

    cs.CR cs.GT cs.IT cs.LO

    A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choi… ▽ More

    Submitted 21 May, 2018; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: Published in the journal Entropy, an extended version of POST'18 conference paper (arXiv:1802.10465)

    Journal ref: Entropy 2018, 20(5), 382

  10. arXiv:1802.10465  [pdf, ps, other

    cs.CR cs.GT cs.IT cs.LO

    Leakage and Protocol Composition in a Game-Theoretic Perspective

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: In the inference attacks studied in Quantitative Information Flow (QIF), the adversary typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic cho… ▽ More

    Submitted 30 March, 2018; v1 submitted 27 February, 2018; originally announced February 2018.

    Comments: POST'18 conference paper (An extended version of this paper with proofs can be found in arXiv:1803.10042). This paper extends one half of the unpublished v1 of arXiv:1705.05030, while v2 of arXiv:1705.05030 extends the other half and is published in GameSec'17

    Journal ref: Proceedings of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol.10804, pp. 134-159, 2018

  11. arXiv:1710.05524  [pdf, other

    cs.CR

    Trading Optimality for Performance in Location Privacy

    Authors: Konstantinos Chatzikokolakis, Serge Haddad, Ali Kassem, Catuscia Palamidessi

    Abstract: Location-Based Services (LBSs) provide invaluable aid in the everyday activities of many individuals, however they also pose serious threats to the user' privacy. There is, therefore, a growing interest in the development of mechanisms to protect location privacy during the use of LBSs. Nowadays, the most popular methods are probabilistic, and the so-called optimal method achieves an optimal trade… ▽ More

    Submitted 16 October, 2017; originally announced October 2017.

  12. Information Leakage Games

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

    Abstract: We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the im… ▽ More

    Submitted 21 August, 2017; v1 submitted 14 May, 2017; originally announced May 2017.

    Journal ref: Proc. GameSec'17, Lecture Notes in Computer Science, Vol.10575, pp.437-457, 2017; Extended journal version: ACM Transactions on Privacy and Security (TOPS), Vol.25, No.3:20, pp.1-36, 2022

  13. On the Compositionality of Quantitative Information Flow

    Authors: Yusuke Kawamoto, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: Information flow is the branch of security that studies the leakage of information due to correlation between secrets and observables. Since in general such correlation cannot be avoided completely, it is important to quantify the leakage. The most followed approaches to defining appropriate measures are those based on information theory. In particular, one of the most successful approaches is the… ▽ More

    Submitted 14 August, 2017; v1 submitted 1 November, 2016; originally announced November 2016.

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 3 (August 15, 2017) lmcs:2199

  14. Constructing elastic distinguishability metrics for location privacy

    Authors: Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati

    Abstract: With the increasing popularity of hand-held devices, location-based applications and services have access to accurate and real-time location information, raising serious privacy concerns for their users. The recently introduced notion of geo-indistinguishability tries to address this problem by adapting the well-known concept of differential privacy to the area of location-based systems. Although… ▽ More

    Submitted 21 May, 2015; v1 submitted 2 March, 2015; originally announced March 2015.

  15. Optimal Geo-Indistinguishable Mechanisms for Location Privacy

    Authors: Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to construct a mechanism that minimizes the service quality loss, using linear programming techniques. In addition we show that, under certain conditions, such mechanism also provides optimal privacy in th… ▽ More

    Submitted 24 August, 2014; v1 submitted 20 February, 2014; originally announced February 2014.

    Comments: 13 pages

    ACM Class: C.2.0; K.4.1

  16. arXiv:1311.4008  [pdf, other

    cs.CR

    A Predictive Differentially-Private Mechanism for Mobility Traces

    Authors: Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati

    Abstract: With the increasing popularity of GPS-enabled hand-held devices, location-based applications and services have access to accurate and real-time location information, raising serious privacy concerns for their millions of users. Trying to address these issues, the notion of geo-indistinguishability was recently introduced, adapting the well-known concept of Differential Privacy to the area of locat… ▽ More

    Submitted 16 June, 2014; v1 submitted 15 November, 2013; originally announced November 2013.

  17. Geo-Indistinguishability: Differential Privacy for Location-Based Systems

    Authors: Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: The growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious privacy concerns. In this paper we study geo-indistinguishability, a formal notion of privacy for location-based systems that protects the user's exact location, while allowing approximate information - ty… ▽ More

    Submitted 20 February, 2014; v1 submitted 10 December, 2012; originally announced December 2012.

    Comments: 15 pages

    ACM Class: C.2.0; K.4.1

    Journal ref: Proceedings of the 2013 ACM SIGSAC conference on Computer and Communications Security (CCS'13), ACM, pp. 901-914, 2013

  18. On the relation between Differential Privacy and Quantitative Information Flow

    Authors: Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries. The idea is that a randomized query satisfies differential privacy if the likelihood of obtaining a certain answer for a database $x$ is not too different from the likelihood of obtain… ▽ More

    Submitted 30 September, 2011; originally announced September 2011.

    Journal ref: 38th International Colloquium on Automata, Languages and Programming - ICALP 2011 6756 (2011) 60-76

  19. Differential Privacy: on the trade-off between Utility and Information Leakage

    Authors: Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi

    Abstract: Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by e^epsilon. In the field of information flow there is a similar concern for controlling information leakage,… ▽ More

    Submitted 25 August, 2011; v1 submitted 27 March, 2011; originally announced March 2011.

    Comments: 30 pages; HAL repository

    Report number: inria-00580122

    Journal ref: Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST'11), Springer, LNCS 7140, pp. 39-54, 2011

  20. arXiv:1102.5161   

    cs.CR cs.LO

    Proceedings 8th International Workshop on Security Issues in Concurrency

    Authors: Konstantinos Chatzikokolakis, Véronique Cortier

    Abstract: This volume contains the proceedings of the 8th Workshop on Security Issues in Concurrency (SecCo 2010). The workshop was held in Paris, France on August 30th, 2010, as a satellite workshop of CONCUR'10. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on commo… ▽ More

    Submitted 25 February, 2011; originally announced February 2011.

    Journal ref: EPTCS 51, 2011

  21. arXiv:1012.4250  [pdf, ps, other

    cs.IT cs.CR cs.DB

    Differential Privacy versus Quantitative Information Flow

    Authors: Mário S. Alvim, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi

    Abstract: Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e^ε. In the fields of anonymity and information flow there is a similar concern for controlling info… ▽ More

    Submitted 20 December, 2010; originally announced December 2010.

  22. arXiv:0705.3503  [pdf, ps, other

    cs.CR cs.LO

    Making Random Choices Invisible to the Scheduler

    Authors: Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to solve the nondeterminism. It has been observed that for certain applications, notably those in security, the scheduler needs to be restricted so not to reveal the outcome of the protocol's random choices, or otherwise the model of… ▽ More

    Submitted 24 May, 2007; originally announced May 2007.

    ACM Class: D.1.3; D.2.4; D.3.2; D.4.6; F.1.2; F.3.2; F.3.3