Skip to main content

Showing 1–21 of 21 results for author: Jadliwala, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16212  [pdf, other

    cs.CR cs.CV cs.LG

    An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

    Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

    Abstract: Deepfake or synthetic images produced using deep generative models pose serious risks to online platforms. This has triggered several research efforts to accurately detect deepfake images, achieving excellent performance on publicly available deepfake datasets. In this work, we study 8 state-of-the-art detectors and argue that they are far from being ready for deployment due to two recent developm… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE S&P 2024; 19 pages, 10 figures

  2. arXiv:2404.07139  [pdf, other

    cs.AI cs.GT

    Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also be exploited to carry out privacy threats such as membership inference attacks (MIA). Existing works have only analyzed MIA in a single "what if" interaction scenario between an adversary and the target ML model; thus, it does not discern the factors impacting the capab… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02659

  3. arXiv:2401.07035  [pdf, other

    cs.SE

    Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph

    Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manual, Murtuza Jadliwala, Peyman Najafirad

    Abstract: Open Source Software (OSS) security and resilience are worldwide phenomena hampering economic and technological innovation. OSS vulnerabilities can cause unauthorized access, data breaches, network disruptions, and privacy violations, rendering any benefits worthless. While recent deep-learning techniques have shown great promise in identifying and localizing vulnerabilities in source code, it is… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  4. arXiv:2311.02288  [pdf, other

    cs.CR cs.HC cs.SD eess.AS

    OverHear: Headphone based Multi-sensor Keystroke Inference

    Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala

    Abstract: Headphones, traditionally limited to audio playback, have evolved to integrate sensors like high-definition microphones and accelerometers. While these advancements enhance user experience, they also introduce potential eavesdropping vulnerabilities, with keystroke inference being our concern in this work. To validate this threat, we developed OverHear, a keystroke inference framework that leverag… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  5. arXiv:2307.08550  [pdf, other

    cs.CR

    TorMult: Introducing a Novel Tor Bandwidth Inflation Attack

    Authors: Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala

    Abstract: The Tor network is the most prominent system for providing anonymous communication to web users, with a daily user base of 2 million users. However, since its inception, it has been constantly targeted by various traffic fingerprinting and correlation attacks aiming at deanonymizing its users. A critical requirement for these attacks is to attract as much user traffic to adversarial relays as poss… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  6. arXiv:2303.06037  [pdf, other

    eess.SP cs.HC

    SkinSense: Efficient Vibration-based Communications Over Human Body Using Motion Sensors

    Authors: Raveen Wijewickrama, Sameer Anis Dohadwalla, Anindya Maiti, Murtuza Jadliwala, Sashank Narain

    Abstract: Recent growth in popularity of mobile and wearable devices has re-ignited the need for reliable and stealthy communication side-channels to enable applications such as secret/PIN sharing, co-location proofs and user authentication. Existing short-range wireless radio technology such as Bluetooth/BLE and NFC, although mature and robust, is prone to eavesdropping, jamming and/or interference, and is… ▽ More

    Submitted 7 February, 2023; originally announced March 2023.

  7. arXiv:2301.09508  [pdf, other

    cs.LG cs.AI

    BayBFed: Bayesian Backdoor Defense for Federated Learning

    Authors: Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) allows participants to jointly train a machine learning model without sharing their private data with others. However, FL is vulnerable to poisoning attacks such as backdoor attacks. Consequently, a variety of defenses have recently been proposed, which have primarily utilized intermediary states of the global model (i.e., logits) or distance of the local models (i.e., L2-n… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  8. Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users

    Authors: Mohd Sabra, Nisha Vinayaga Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala

    Abstract: Virtual Reality (VR) is an exciting new consumer technology which offers an immersive audio-visual experience to users through which they can navigate and interact with a digitally represented 3D space (i.e., a virtual world) using a headset device. By (visually) transporting users from the real or physical world to exciting and realistic virtual spaces, VR systems can enable true-to-life and more… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

  9. arXiv:2202.02659   

    cs.GT cs.LG

    A Game-theoretic Understanding of Repeated Explanations in ML Models

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory. In this game, a malicious end-user must strategically decide when to stop querying and attempt to compromise the system, while… ▽ More

    Submitted 22 August, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: The problem statement has been changed. Thus, the whole paper has been updated. As a result, the previous analysis and the experimental results are inaccurate

  10. arXiv:2010.12078  [pdf, other

    cs.CR cs.CV cs.HC

    Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

    Authors: Mohd Sabra, Anindya Maiti, Murtuza Jadliwala

    Abstract: Due to recent world events, video calls have become the new norm for both personal and professional remote communication. However, if a participant in a video call is not careful, he/she can reveal his/her private information to others in the call. In this paper, we design and evaluate an attack framework to infer one type of such private information from the video stream of a call -- keystrokes,… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

  11. arXiv:2002.06531  [pdf, other

    cs.CR

    On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains

    Authors: Tayebeh Rajab, Mohammad Hossein Manshaei, Mohammad Dakhilalian, Murtuza Jadliwala, Mohammad Ashiqur Rahman

    Abstract: Bitcoin's single leader consensus protocol (Nakamoto consensus) suffers from significant transaction throughput and network scalability issues due to the computational requirements of it Proof-of-Work (PoW) based leader selection strategy. To overcome this, committee-based approaches (e.g., Elastico) that partition the outstanding transaction set into shards and (randomly) select multiple committe… ▽ More

    Submitted 16 February, 2020; originally announced February 2020.

  12. arXiv:2001.01387  [pdf, other

    cs.CR

    Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems

    Authors: Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala

    Abstract: Micromobility vehicles are gaining popularity due to their portable nature, and their ability to serve short distance urban commutes better than traditional modes of transportation. Most of these vehicles, offered by various micromobility service providers around the world, are shareable and can be rented (by-the-minute) by riders, thus eliminating the need of owning and maintaining a personal veh… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  13. arXiv:1911.03356  [pdf, other

    cs.CR cs.GT

    On Incentive Compatible Role-based Reward Distribution in Algorand

    Authors: Mehdi Fooladgar, Mohammad Hossein Manshaei, Murtuza Jadliwala, Mohammad Ashiqur Rahman

    Abstract: Algorand is a recent, open-source public or permissionless blockchain system that employs a novel proof-of-stake byzantine consensus protocol to efficiently scale the distributed transaction agreement problem to billions of users. In addition to being more democratic and energy-efficient, compared to popular protocols such as Bitcoin, Algorand also touts a much high transaction throughput. This pa… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  14. arXiv:1908.05846  [pdf, other

    cs.CY

    Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing

    Authors: Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama, Greg P. Griffin

    Abstract: The popularity and proliferation of electric scooters (e-scooters) as a micromobility solution in our cities and urban communities has been rapidly rising. Rent-by-the-minute pricing and a healthy competition between micromobility service providers is also benefiting riders with low trip costs. However, an unprepared urban infrastructure, combined with uncertain operation policies and poor regulat… ▽ More

    Submitted 22 July, 2020; v1 submitted 16 August, 2019; originally announced August 2019.

  15. arXiv:1904.13352  [pdf, other

    cs.GT cs.CR

    Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

    Authors: Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei

    Abstract: Abuse of zero-permission sensors on-board mobile and wearable devices to infer users' personal context and information is a well-known privacy threat that has received significant attention. Efforts towards protection mechanisms that prevent or limit the success of such threats, however, have been ad-hoc so far and have primarily focused on designing threat-specific customized defense mechanisms.… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  16. arXiv:1811.04797  [pdf, other

    cs.HC

    A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables

    Authors: Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore

    Abstract: Distracted pedestrians, like distracted drivers, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. Mitigating such hazards to pedestrian safety requires employment of pedestrian safety systems and applications that are effective in detecting them. Designing such frameworks is possible with the availab… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1710.03755

  17. arXiv:1809.07307  [pdf, other

    cs.GT

    A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains

    Authors: Mohammad Hossein Manshaei, Murtuza Jadliwala, Anindya Maiti, Mahdi Fooladgar

    Abstract: Low transaction throughput and poor scalability are significant issues in public blockchain consensus protocols such as Bitcoins. Recent research efforts in this direction have proposed shard-based consensus protocols where the key idea is to split the transactions among multiple committees (or shards), which then process these shards or set of transactions in parallel. Such a parallel processing… ▽ More

    Submitted 24 September, 2018; v1 submitted 19 September, 2018; originally announced September 2018.

  18. arXiv:1808.07814  [pdf, other

    cs.CR

    Light Ears: Information Leakage via Smart Lights

    Authors: Anindya Maiti, Murtuza Jadliwala

    Abstract: Modern Internet-enabled smart lights promise energy efficiency and many additional capabilities over traditional lamps. However, these connected lights create a new attack surface, which can be maliciously used to violate users' privacy and security. In this paper, we design and evaluate novel attacks that take advantage of light emitted by modern smart bulbs in order to infer users' private data… ▽ More

    Submitted 23 August, 2018; originally announced August 2018.

  19. arXiv:1710.03755  [pdf, other

    cs.HC

    Towards a Practical Pedestrian Distraction Detection Framework using Wearables

    Authors: Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore

    Abstract: Pedestrian safety continues to be a significant concern in urban communities and pedestrian distraction is emerging as one of the main causes of grave and fatal accidents involving pedestrians. The advent of sophisticated mobile and wearable devices, equipped with high-precision on-board sensors capable of measuring fine-grained user movements and context, provides a tremendous opportunity for des… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

  20. arXiv:1710.03656  [pdf, other

    cs.CR

    Side-Channel Inference Attacks on Mobile Keypads using Smartwatches

    Authors: Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic

    Abstract: Smartwatches enable many novel applications and are fast gaining popularity. However, the presence of a diverse set of on-board sensors provides an additional attack surface to malicious software and services on these devices. In this paper, we investigate the feasibility of key press inference attacks on handheld numeric touchpads by using smartwatch motion sensors as a side-channel. We consider… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

  21. arXiv:1710.00217  [pdf, other

    cs.CR

    Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel

    Authors: Anindya Maiti, Ryan Heard, Mohd Sabra, Murtuza Jadliwala

    Abstract: Wrist-wearables such as smartwatches and fitness bands are equipped with a variety of high-precision sensors that support novel contextual and activity-based applications. The presence of a diverse set of on-board sensors, however, also expose an additional attack surface which, if not adequately protected, could be potentially exploited to leak private user information. In this paper, we investig… ▽ More

    Submitted 26 September, 2018; v1 submitted 30 September, 2017; originally announced October 2017.