Spanning attack: reinforce black-box attacks with unlabeled data
نویسندگان
چکیده
منابع مشابه
Query-limited Black-box Attacks to Classifiers
We study black-box attacks on machine learning classifiers where each query to the model incurs some cost or risk of detection to the adversary. We focus explicitly on minimizing the number of queries as a major objective. Specifically, we consider the problem of attacking machine learning classifiers subject to a budget of feature modification cost while minimizing the number of queries, where...
متن کاملCube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bits or IV bits). The cryptanalyst is allowed to tweak the polynomials by choosing arbitrary values for the public variables, and his goal is to solve the resultant system of polynomial equations in terms of their commo...
متن کاملConstrained Black Box Optimization with Data Analysis
This paper presents the design of and test results for an algorithm solving constrained black box optimization problems globally using mainly methods from data analysis. A particular focus is put on constraints: in addition to bound constraints, we also handle black box inequality and equality constraints. In particular, our algorithm is able to handle equality constraints given in implicit for...
متن کاملBlack-Box Side-Channel Attacks Highlight the Importance of Countermeasures
This paper presents a side-channel analysis of the bitstream encryption mechanism provided by Xilinx Virtex FPGAs. This work covers our results analyzing the Virtex-4 and Virtex-5 family showing that the encryption mechanism can be completely broken with moderate effort. The presented results provide an overview of a practical real-world analysis and should help practitioners to judge the neces...
متن کاملAn Efficient Black-box Technique for Defeating Web Application Attacks
Over the past few years, injection vulnerabilities have become the primary target for remote exploits. SQL injection, command injection, and cross-site scripting are some of the popular attacks that exploit these vulnerabilities. Taint-tracking has emerged as one of the most promising approaches for defending against these exploits, as it supports accurate detection (and prevention) of popular ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Machine Learning
سال: 2020
ISSN: 0885-6125,1573-0565
DOI: 10.1007/s10994-020-05916-1