1 |
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities
|
|
|
|
In: IEEE Transactions on Industrial Informatics ; https://hal.archives-ouvertes.fr/hal-03456142 ; IEEE Transactions on Industrial Informatics, 2021, 14 (30), pp.1 (2021)
|
|
BASE
|
|
Show details
|
|
2 |
Statistical ZAPs from Group-Based Assumptions
|
|
|
|
In: TCC 2021 - Theory of Cryptography Conference ; https://hal.archives-ouvertes.fr/hal-03374562 ; TCC 2021 - Theory of Cryptography Conference, Nov 2021, Raleigh, United States (2021)
|
|
BASE
|
|
Show details
|
|
3 |
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
|
|
|
|
In: https://hal.archives-ouvertes.fr/hal-03445994 ; 2021 (2021)
|
|
BASE
|
|
Show details
|
|
4 |
Enhancing Speech Privacy with Slicing
|
|
|
|
In: https://hal.inria.fr/hal-03369137 ; 2021 (2021)
|
|
BASE
|
|
Show details
|
|
5 |
Introducing the VoicePrivacy initiative
|
|
|
|
In: INTERSPEECH 2020 ; https://hal.inria.fr/hal-02562199 ; INTERSPEECH 2020, Oct 2020, Shanghai, China (2020)
|
|
BASE
|
|
Show details
|
|
6 |
Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols
|
|
|
|
In: DISC 2020 - 34th International Symposium on Distributed Computing ; https://hal.inria.fr/hal-02166432 ; DISC 2020 - 34th International Symposium on Distributed Computing, Oct 2020, Freiburg / Virtual, Germany (2020)
|
|
BASE
|
|
Show details
|
|
7 |
Private Protocols for U-Statistics in the Local Model and Beyond
|
|
|
|
In: AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics ; https://hal.inria.fr/hal-02310236 ; AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics, Aug 2020, Palermo, Italy (2020)
|
|
BASE
|
|
Show details
|
|
8 |
The Conflict Notion and its Static Detection: a Formal Survey
|
|
|
|
In: https://hal.archives-ouvertes.fr/hal-02169360 ; [Research Report] IMT Atlantique. 2019 (2019)
|
|
BASE
|
|
Show details
|
|
9 |
MASSE: Modular Automated Syntactic Signature Extraction
|
|
|
|
In: RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information ; https://hal.inria.fr/hal-02159947 ; RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1 (2019)
|
|
BASE
|
|
Show details
|
|
10 |
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
|
|
|
|
In: IEEE Symposium on Security and Privacy (S&P) 2019 ; https://hal.inria.fr/hal-01974962 ; IEEE Symposium on Security and Privacy (S&P) 2019, May 2019, San Francisco, United States (2019)
|
|
Abstract:
International audience ; We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks that are supported by streamlined performance analyses. As an introduction to this viewpoint, we first present a general reduction from reconstruction with known queries to PAC learning. Then, we directly address the problem of ϵ-approximate database reconstruction (ϵ-ADR) from range query leakage, giving attacks whose query cost scales only with the relative error ϵ, and is independent of the size of the database, or the number N of possible values of data items. This already goes significantly beyond the state of the art for such attacks, as represented by Kellaris et al. (ACM CCS 2016) and Lacharité et al. (IEEE S&P 2018). We also study the new problem of ϵ-approximate order reconstruction (ϵ-AOR), where the adversary is tasked with reconstructing the order of records, except for records whose values are approximately equal. We show that as few as O(ϵ^-1 log ϵ^-1) uniformly random range queries suffice. Our analysis relies on an application of learning theory to PQ-trees, special data structures tuned to compactly record certain ordering constraints. We then show that when an auxiliary distribution is available, ϵ-AOR can be enhanced to achieve ϵ-ADR; using real data, we show that devastatingly small numbers of queries are needed to attain very accurate database reconstruction. Finally, we generalize from ranges to consider what learning theory tells us about the impact of access pattern leakage for other classes of queries, focusing on prefix and suffix queries. We illustrate this with both concrete attacks for prefix queries and with a general lower bound for all query classes.
|
|
Keyword:
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
|
|
URL: https://hal.inria.fr/hal-01974962 https://hal.inria.fr/hal-01974962/document https://hal.inria.fr/hal-01974962/file/2019-011.pdf
|
|
BASE
|
|
Hide details
|
|
11 |
Sequence Covering for Efficient Host-Based Intrusion Detection
|
|
|
|
In: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.archives-ouvertes.fr/hal-01653650 ; IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩ ; https://ieeexplore.ieee.org/document/8454473 (2019)
|
|
BASE
|
|
Show details
|
|
12 |
The DEEPSEC prover
|
|
|
|
In: CAV 2018 - 30th International Conference on Computer Aided Verification ; https://hal.inria.fr/hal-01763138 ; CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom (2018)
|
|
BASE
|
|
Show details
|
|
13 |
Specification-Based Protocol Obfuscation
|
|
|
|
In: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ; https://hal.inria.fr/hal-01848573 ; DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩ (2018)
|
|
BASE
|
|
Show details
|
|
14 |
Tutorial: an Overview of Malware Detection and Evasion Techniques
|
|
|
|
In: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation ; https://hal.inria.fr/hal-01964222 ; ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23 (2018)
|
|
BASE
|
|
Show details
|
|
15 |
Taint-Based Return Oriented Programming
|
|
|
|
In: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications ; https://hal.inria.fr/hal-01848575 ; SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2018, Rennes, France. pp.1-30 ; https://www.sstic.org/2018/ (2018)
|
|
BASE
|
|
Show details
|
|
16 |
Modular Software Fault Isolation as Abstract Interpretation
|
|
|
|
In: SAS 2018 - 25th International Static Analysis Symposium ; https://hal.inria.fr/hal-01894116 ; SAS 2018 - 25th International Static Analysis Symposium, Aug 2018, Freiburg, Germany. pp.166-186, ⟨10.1007/978-3-319-99725-4_12⟩ (2018)
|
|
BASE
|
|
Show details
|
|
17 |
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
|
|
|
|
In: Lecture Notes in Computer Science ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice ; https://hal.archives-ouvertes.fr/hal-01802720 ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩ (2017)
|
|
BASE
|
|
Show details
|
|
18 |
MASSE: Modular Automated Syntactic Signature Extraction
|
|
|
|
In: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE ; https://hal.inria.fr/hal-01629035 ; ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Oct 2017, Toulouse, France. pp.1-2 (2017)
|
|
BASE
|
|
Show details
|
|
19 |
Dependent Event Types
|
|
|
|
In: Logic, Language, Information, and Computation ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017) ; https://hal.archives-ouvertes.fr/hal-01913662 ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017), Jul 2017, London, United Kingdom. pp. 216-228 (2017)
|
|
BASE
|
|
Show details
|
|
20 |
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
|
|
|
|
In: ISSN: 2474-1558 ; Foundations and Trends® in Privacy and Security ; https://hal.inria.fr/hal-01423760 ; Foundations and Trends® in Privacy and Security , Now publishers inc, 2016, 1 (1-2), pp.1 - 135. ⟨10.1561/3300000004⟩ (2016)
|
|
BASE
|
|
Show details
|
|
|
|