Search Results

Lifting Network Protocol Implementation to Precise Format Specification with Security Applications

1 code implementation19 May 2023

It is well-known that static analysis does not rely on any input packets and can achieve high coverage by scanning every piece of code.

Cryptography and Security Programming Languages

Advancing Protocol Diversity in Network Security Monitoring

3 code implementations23 Jun 2021

Second, we evaluate the performance of data structures to be used for protocol dispatching, implement the proposed design into the popular open-source NSM Zeek and assess its impact on the monitor performance.

Networking and Internet Architecture

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

1 code implementation1 Mar 2024

This paper pays a special attention to the implementation of such non-linear functions in semi-honest model with two-party settings, for which SIRNN is the current state-of-the-art.

Cryptography and Security

Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS

7 code implementations2 Mar 2011

Internet applications increasingly employ TCP not as a stream abstraction, but as a substrate for application-level transports, a use that converts TCP's in-order semantics from a convenience blessing to a performance curse.

Networking and Internet Architecture Performance

CrypTFlow: Secure TensorFlow Inference

4 code implementations16 Sep 2019

Finally, to provide malicious secure MPC protocols, our third component, Aramis, is a novel technique that uses hardware with integrity guarantees to convert any semi-honest MPC protocol into an MPC protocol that provides malicious security.

NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode

3 code implementations24 Dec 2015

Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments.

Other Computer Science

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System

1 code implementation3 Mar 2021

In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports.

Cryptography and Security Networking and Internet Architecture

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

2 code implementations28 Jul 2022

The growing adoption of the Internet of Things (IoT) has brought a significant increase in attacks targeting those devices.

Cryptography and Security

Secure Distributed Training at Scale

3 code implementations21 Jun 2021

Training such models requires a lot of computational resources (e. g., HPC clusters) that are not available to small research groups and independent researchers.

Distributed Optimization Image Classification +1

CrypTFlow2: Practical 2-Party Secure Inference

1 code implementation13 Oct 2020

We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep Neural Networks (DNNs) using secure 2-party computation.