DE eng

Search in the Catalogues and Directories

Page: 1 2
Hits 1 – 20 of 34

1
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities
In: IEEE Transactions on Industrial Informatics ; https://hal.archives-ouvertes.fr/hal-03456142 ; IEEE Transactions on Industrial Informatics, 2021, 14 (30), pp.1 (2021)
BASE
Show details
2
Statistical ZAPs from Group-Based Assumptions
In: TCC 2021 - Theory of Cryptography Conference ; https://hal.archives-ouvertes.fr/hal-03374562 ; TCC 2021 - Theory of Cryptography Conference, Nov 2021, Raleigh, United States (2021)
BASE
Show details
3
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
In: https://hal.archives-ouvertes.fr/hal-03445994 ; 2021 (2021)
BASE
Show details
4
Enhancing Speech Privacy with Slicing
In: https://hal.inria.fr/hal-03369137 ; 2021 (2021)
BASE
Show details
5
Introducing the VoicePrivacy initiative
In: INTERSPEECH 2020 ; https://hal.inria.fr/hal-02562199 ; INTERSPEECH 2020, Oct 2020, Shanghai, China (2020)
BASE
Show details
6
Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols
In: DISC 2020 - 34th International Symposium on Distributed Computing ; https://hal.inria.fr/hal-02166432 ; DISC 2020 - 34th International Symposium on Distributed Computing, Oct 2020, Freiburg / Virtual, Germany (2020)
BASE
Show details
7
Private Protocols for U-Statistics in the Local Model and Beyond
In: AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics ; https://hal.inria.fr/hal-02310236 ; AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics, Aug 2020, Palermo, Italy (2020)
BASE
Show details
8
The Conflict Notion and its Static Detection: a Formal Survey
In: https://hal.archives-ouvertes.fr/hal-02169360 ; [Research Report] IMT Atlantique. 2019 (2019)
BASE
Show details
9
MASSE: Modular Automated Syntactic Signature Extraction
In: RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information ; https://hal.inria.fr/hal-02159947 ; RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1 (2019)
BASE
Show details
10
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
In: IEEE Symposium on Security and Privacy (S&P) 2019 ; https://hal.inria.fr/hal-01974962 ; IEEE Symposium on Security and Privacy (S&P) 2019, May 2019, San Francisco, United States (2019)
Abstract: International audience ; We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses. As an introduction to this viewpoint, we first present a general reduction from reconstruction with known queries to PAC learning. Then, we directly address the problem of ϵ-approximate database reconstruction (ϵ-ADR) from range query leakage, giving attacks whose query cost scales only with the relative error ϵ, and is independent of the size of the database, or the number N of possible values of data items. This already goes significantly beyond the state of the art for such attacks, as represented by Kellaris et al. (ACM CCS 2016) and Lacharité et al. (IEEE S&P 2018). We also study the new problem of ϵ-approximate order reconstruction (ϵ-AOR), where the adversary is tasked with reconstructing the order of records, except for records whose values are approximately equal. We show that as few as O(ϵ^-1 log ϵ^-1) uniformly random range queries suffice. Our analysis relies on an application of learning theory to PQ-trees, special data structures tuned to compactly record certain ordering constraints. We then show that when an auxiliary distribution is available, ϵ-AOR can be enhanced to achieve ϵ-ADR; using real data, we show that devastatingly small numbers of queries are needed to attain very accurate database reconstruction. Finally, we generalize from ranges to consider what learning theory tells us about the impact of access pattern leakage for other classes of queries, focusing on prefix and suffix queries. We illustrate this with both concrete attacks for prefix queries and with a general lower bound for all query classes.
Keyword: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
URL: https://hal.inria.fr/hal-01974962
https://hal.inria.fr/hal-01974962/document
https://hal.inria.fr/hal-01974962/file/2019-011.pdf
BASE
Hide details
11
Sequence Covering for Efficient Host-Based Intrusion Detection
In: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.archives-ouvertes.fr/hal-01653650 ; IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩ ; https://ieeexplore.ieee.org/document/8454473 (2019)
BASE
Show details
12
The DEEPSEC prover
In: CAV 2018 - 30th International Conference on Computer Aided Verification ; https://hal.inria.fr/hal-01763138 ; CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom (2018)
BASE
Show details
13
Specification-Based Protocol Obfuscation
In: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ; https://hal.inria.fr/hal-01848573 ; DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩ (2018)
BASE
Show details
14
Tutorial: an Overview of Malware Detection and Evasion Techniques
In: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation ; https://hal.inria.fr/hal-01964222 ; ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23 (2018)
BASE
Show details
15
Taint-Based Return Oriented Programming
In: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications ; https://hal.inria.fr/hal-01848575 ; SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2018, Rennes, France. pp.1-30 ; https://www.sstic.org/2018/ (2018)
BASE
Show details
16
Modular Software Fault Isolation as Abstract Interpretation
In: SAS 2018 - 25th International Static Analysis Symposium ; https://hal.inria.fr/hal-01894116 ; SAS 2018 - 25th International Static Analysis Symposium, Aug 2018, Freiburg, Germany. pp.166-186, ⟨10.1007/978-3-319-99725-4_12⟩ (2018)
BASE
Show details
17
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
In: Lecture Notes in Computer Science ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice ; https://hal.archives-ouvertes.fr/hal-01802720 ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩ (2017)
BASE
Show details
18
MASSE: Modular Automated Syntactic Signature Extraction
In: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE ; https://hal.inria.fr/hal-01629035 ; ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Oct 2017, Toulouse, France. pp.1-2 (2017)
BASE
Show details
19
Dependent Event Types
In: Logic, Language, Information, and Computation ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017) ; https://hal.archives-ouvertes.fr/hal-01913662 ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017), Jul 2017, London, United Kingdom. pp. 216-228 (2017)
BASE
Show details
20
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
In: ISSN: 2474-1558 ; Foundations and Trends® in Privacy and Security ; https://hal.inria.fr/hal-01423760 ; Foundations and Trends® in Privacy and Security , Now publishers inc, 2016, 1 (1-2), pp.1 - 135. ⟨10.1561/3300000004⟩ (2016)
BASE
Show details

Page: 1 2

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
34
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern