Zobrazeno 1 - 10
of 206
pro vyhledávání: '"Sunar Berk"'
We introduce a new vulnerability that exploits fixed points in autoregressive models and use it to craft queries that never halt, i.e. an LLM output that does not terminate. More precisely, for what we call non-halting queries, the LLM never samples
Externí odkaz:
http://arxiv.org/abs/2410.06287
Autor:
Doröz Yarkın, Sunar Berk
Publikováno v:
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 66-83 (2020)
We propose a new FHE scheme F-NTRU that adopts the flattening technique proposed in GSW to derive an NTRU based scheme that (similar to GSW) does not require evaluation keys or key switching. Our scheme eliminates the decision small polynomial ratio
Externí odkaz:
https://doaj.org/article/fc14147351dc4d39b91ded5f4043f79a
Rowhammer is a security vulnerability that allows unauthorized attackers to induce errors within DRAM cells. To prevent fault injections from escalating to successful attacks, a widely accepted mitigation is implementing fault checks on instructions
Externí odkaz:
http://arxiv.org/abs/2406.06943
Since its inception, Rowhammer exploits have rapidly evolved into increasingly sophisticated threats compromising data integrity and the control flow integrity of victim processes. Nevertheless, it remains a challenge for an attacker to identify vuln
Externí odkaz:
http://arxiv.org/abs/2404.07878
In the past decade, many vulnerabilities were discovered in microarchitectures which yielded attack vectors and motivated the study of countermeasures. Further, architectural and physical imperfections in DRAMs led to the discovery of Rowhammer attac
Externí odkaz:
http://arxiv.org/abs/2309.02545
Autor:
Tol, M. Caner, Sunar, Berk
Security critical software, e.g., OpenSSL, comes with numerous side-channel leakages left unpatched due to a lack of resources or experts. The situation will only worsen as the pace of code development accelerates, with developers relying on Large La
Externí odkaz:
http://arxiv.org/abs/2308.13062
Bit-slicing is a software implementation technique that treats an N-bit processor datapath as N parallel single-bit datapaths. The natural spatial redundancy of bit-sliced software can be used to build countermeasures against implementation attacks.
Externí odkaz:
http://arxiv.org/abs/2204.06153
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected to be replaced by post-quantum schemes in the next decade in billions of devices. To facilitate the transition, NIST is running a standardization process which
Externí odkaz:
http://arxiv.org/abs/2203.00637
Hardware peripherals such as GPUs and FPGAs are commonly available in server-grade computing to accelerate specific compute tasks, from database queries to machine learning. CSPs have integrated these accelerators into their infrastructure and let te
Externí odkaz:
http://arxiv.org/abs/2202.11623
State-of-the-art deep neural networks (DNNs) have been proven to be vulnerable to adversarial manipulation and backdoor attacks. Backdoored models deviate from expected behavior on inputs with predefined triggers while retaining performance on clean
Externí odkaz:
http://arxiv.org/abs/2110.07683