Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Tranco: A research-oriented top sites ranking hardened against manipulation

VL Pochat, T Van Goethem… - arxiv preprint arxiv …, 2018 - arxiv.org
In order to evaluate the prevalence of security and privacy practices on a representative
sample of the Web, researchers rely on website popularity rankings such as the Alexa list …

Rendered insecure: GPU side channel attacks are practical

H Naghibijouybari, A Neupane, Z Qian… - Proceedings of the …, 2018 - dl.acm.org
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Bluethunder: A 2-level directional predictor based side-channel attack against sgx

T Huo, X Meng, W Wang, C Hao, P Zhao… - IACR Transactions on …, 2020 - incs.ub.rub.de
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE)
implemented in recent Intel commodity processors. By isolating the memory of security …

{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage

P Cronin, X Gao, C Yang, H Wang - 30th USENIX Security Symposium …, 2021 - usenix.org
Touchscreen-based mobile devices such as smartphones and tablets are used daily by
billions of people for productivity and entertainment. This paper uncovers a new security …

Df-sca: Dynamic frequency side channel attacks are practical

DR Dipta, B Gulmezoglu - Proceedings of the 38th Annual Computer …, 2022 - dl.acm.org
The arm race between hardware security engineers and side-channel researchers has
become more competitive with more sophisticated attacks and defenses in the last decade …

[PDF][PDF] Statistical privacy for streaming traffic

X Zhang, J Hamm, MK Reiter, Y Zhang - … of the 26th ISOC Symposium on …, 2019 - par.nsf.gov
Machine learning empowers traffic-analysis attacks that breach users' privacy from their
encrypted traffic. Recent advances in deep learning drastically escalate such threats. One …

Magneticspy: Exploiting magnetometer in mobile devices for website and application fingerprinting

N Matyunin, Y Wang, T Arul, K Kullmann… - Proceedings of the 18th …, 2019 - dl.acm.org
Recent studies have shown that aggregate CPU usage and power consumption traces on
smartphones can leak information about applications running on the system or websites …

DNN model architecture fingerprinting attack on CPU-GPU edge devices

K Patwari, SM Hafiz, H Wang… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Embedded systems for edge computing are getting more powerful, and some are equipped
with a GPU to enable on-device deep neural network (DNN) learning tasks such as image …