no code implementations • 9 Oct 2021 • Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, Nigel Shadbolt
As collaborative learning and the outsourcing of data collection become more common, malicious actors (or agents) which attempt to manipulate the learning process face an additional obstacle as they compete with each other.
1 code implementation • 19 Aug 2021 • Sebastian Köhler, Richard Baker, Ivan Martinovic
Since cameras have become a crucial part in many safety-critical systems and applications, such as autonomous vehicles and surveillance, a large body of academic and non-academic work has shown attacks against their main component - the image sensor.
no code implementations • 1 Jun 2021 • Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic
Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms.
1 code implementation • 25 Jan 2021 • Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic
We validate our model against empirical data collected on two separate cameras, showing that by simply using information from the camera's datasheet the adversary can accurately predict the injected distortion size and optimize their attack accordingly.
1 code implementation • 26 Oct 2020 • Henry Turner, Giulio Lovisotto, Ivan Martinovic
In this paper, we present a Distribution-Preserving Voice Anonymization technique, as our submission to the VoicePrivacy Challenge 2020.
1 code implementation • 8 Jul 2020 • Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic
Research into adversarial examples (AE) has developed rapidly, yet static adversarial patches are still the main technique for conducting attacks in the real world, despite being obvious, semi-permanent and unmodifiable once deployed.
1 code implementation • 15 Apr 2020 • Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic
PPG signals are obtained by recording a video from the camera as users are resting their finger on top of the camera lens.
2 code implementations • 12 Feb 2020 • James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
However, status-quo services are often unencrypted by default and vulnerable to eavesdropping attacks.
Cryptography and Security Networking and Internet Architecture Performance
1 code implementation • 10 Dec 2019 • Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni
Demand for smartwatches has taken off in recent years with new models which can run independently from smartphones and provide more useful features, becoming first-class mobile platforms.
no code implementations • 30 Jul 2019 • Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic
Classi-Fly obtains the correct aircraft category with an accuracy of over 88%, demonstrating that it can improve the meta data necessary for applications working with air traffic communication.
1 code implementation • 22 May 2019 • Giulio Lovisotto, Simon Eberz, Ivan Martinovic
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.
Cryptography and Security