Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation
Abstract
References
Index Terms
- Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation
Recommendations
Encrypted-Input Obfuscation of Image Classifiers
Data and Applications Security and Privacy XXXVAbstractWe consider the problem of protecting image classifiers simultaneously from inspection attacks (i.e., attacks that have read access to all details in the program’s code) and black-box attacks (i.e., attacks where have input/output access to the ...
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferenceIn this paper, we present a generic, query-efficient black-box attack against API call-based machine learning malware classifiers. We generate adversarial examples by modifying the malware’s API call sequences and non-sequential features (printable ...
Black-box obfuscation for d-CNFs
ITCS '14: Proceedings of the 5th conference on Innovations in theoretical computer scienceWe show how to securely obfuscate a new class of functions: conjunctions of NC0d circuits. These are functions of the form C(→/x) = ∧mi=1 C1(→/x), where each C1 is a boolean NC0d circuits circuit, whose output bit is only a function of d = O(1) bits of ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 166Total Downloads
- Downloads (Last 12 months)39
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in