Amos Treiber

ORCID: 0000-0002-2998-8855
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Speech Recognition and Synthesis
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Music and Audio Processing
  • Speech and Audio Processing
  • Adversarial Robustness in Machine Learning
  • Cryptographic Implementations and Security
  • Stochastic Gradient Optimization Techniques
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Cloud Data Security Solutions
  • Biometric Identification and Security
  • Imbalanced Data Classification Techniques
  • Network Security and Intrusion Detection
  • Advanced Data Storage Technologies
  • Authorship Attribution and Profiling
  • Distributed systems and fault tolerance

Technical University of Darmstadt
2018-2024

Brown University
2023

Université Mohammed VI Polytechnique
2023

Polytechnic University
2023

Carnegie Mellon University
2023

Speech recordings are a rich source of personal, sensitive data that can be used to support plethora diverse applications, from health profiling biometric recognition. It is therefore essential speech adequately protected so they cannot misused. Such protection, in the form privacy-preserving technologies, required ensure that: (i) profiles given individual (e.g., across different service operators) unlinkable; (ii) leaked, encrypted information irreversible, and (iii) references renewable....

10.1016/j.csl.2019.06.001 article EN cc-by Computer Speech & Language 2019-06-08

An encrypted search algorithm (ESA) allows a user to encrypt its data while preserving the ability over it. As all practical solutions leak some information, cryptanalysis plays an important role in area of search. Starting with work Islam et al. (NDSS'12), many attacks have been proposed that exploit different leakage profiles under various assumptions. While these improve our understanding leakage, it can sometimes be difficult draw definite conclusions about their performance. This is due...

10.1109/eurosp53844.2022.00014 article EN 2022-06-01

Encrypted search algorithms (ESAs) enable private on encrypted data and can be constructed from a variety of cryptographic primitives. All knownsub-linear ESA leak information and, therefore, the design leakage attacks is an important way to ascertain whether given profile exploitable in practice. Recently,Oya Kerschbaum(Usenix '22) presented attack called IHOP that targets query equality pattern which reveals if when two queries are for same keyword sequence dependent queries. In this work,...

10.56553/popets-2024-0025 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-10-22

Pushes for increased power of Law Enforcement (LE) data retention and centralized storage result in legal challenges with protection law courts-and possible violations the right to privacy. This is motivated by a desire better cooperation exchange between LE Agencies (LEAs), which difficult due regulations, was identified as main factor major public security failures, frequent criticism LE. Secure Multi-Party Computation (MPC) often seen technological means solve privacy conflicts where...

10.1145/3559613.3563192 article EN 2022-11-01

In many voice biometrics applications there is a requirement to preserve privacy, not least because of the recently enforced General Data Protection Regulation (GDPR).Though progress in bringing privacy preservation lagging behind developments other communities, recent years have seen rapid progress, with secure computation mechanisms such as homomorphic encryption being applied successfully speaker recognition.Even so, computational overhead incurred by processing speech data encrypted...

10.21437/interspeech.2019-2638 preprint EN Interspeech 2022 2019-09-13

In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems customers with timely, informed, customized inferences to aid their decision, while at same time utilizing appropriate security protection mechanisms AI models. Additionally, such should also use Privacy-Enhancing Technologies (PETs) protect customers' data any time. To approach subject, start by introducing...

10.48550/arxiv.2008.04449 preprint EN other-oa arXiv (Cornell University) 2020-01-01

AI algorithms, and machine learning (ML) techniques in particular, are increasingly important to individuals' lives, but have caused a range of privacy concerns addressed by, e.g., the European GDPR. Using cryptographic techniques, it is possible perform inference tasks remotely on sensitive client data privacy-preserving way: server learns nothing about input model predictions, while ML (which often considered intellectual property might contain traces data). While such solutions relatively...

10.48550/arxiv.2002.00801 preprint EN other-oa arXiv (Cornell University) 2020-01-01

The ubiquitous deployment of machine learning (ML) technologies has certainly improved many applications but also raised challenging privacy concerns, as sensitive client data is usually processed remotely at the discretion a service provider. Therefore, privacy-preserving (PPML) aims providing using techniques such secure multi-party computation (SMPC).

10.1145/3411501.3419417 article EN 2020-11-04

Encrypted Search Algorithms (ESAs) are a technique to encrypt data while the user can still search over it. ESAs protect privacy and ensure security of sensitive stored on remote storage. Originally, were used in context documents that consist keywords. The encrypts documents, sends them server is able for keywords, without exposing information about plaintext. idea has also been applied relational databases, where queries (similar SQL statements) be privately executed an encrypted database....

10.1145/3689938.3694776 article EN 2024-11-19

Privacy-preserving scalar product (PPSP) protocols are an important building block for secure computation tasks in various applications. Lu et al. (TPDS'13) introduced a PPSP protocol that does not rely on cryptographic assumptions and is used wide range of publications to date. In this comment paper, we show al.'s insecure should be used. We describe specific attacks against it and, using impossibility results Impagliazzo Rudich (STOC'89), inherently cannot fixed without relying at least...

10.1109/tpds.2019.2939313 article EN IEEE Transactions on Parallel and Distributed Systems 2019-09-03

The well-defined information leakage of Encrypted Search Algorithms (ESAs) is predominantly analyzed by crafting so-called attacks. These attacks utilize adversarially known auxiliary data and the observed to attack an ESA instance built on a user's data. Known-data require be subset In contrast, sampled-data merely rely that is, in some sense, statistically close hence reflect much more realistic scenario where stems from publicly available source instead private

10.1145/3605763.3625243 article EN 2023-11-23

Oblivious RAM is a cryptographic primitive that embodies one of the cornerstones privacy-preserving technologies for database protection. While any (ORAM) construction offers access pattern hiding, there does not seem to be safe against potential leakage due knowledge about number accesses performed by client. Such constitutes privacy violation, as client data may stored in domain specific fashion. In this work, we examine considering an adversary can probe server stores ORAM database, and...

10.1145/3267323.3268963 article EN 2018-01-15

In many voice biometrics applications there is a requirement to preserve privacy, not least because of the recently enforced General Data Protection Regulation (GDPR). Though progress in bringing privacy preservation lagging behind developments other communities, recent years have seen rapid progress, with secure computation mechanisms such as homomorphic encryption being applied successfully speaker recognition. Even so, computational overhead incurred by processing speech data encrypted...

10.48550/arxiv.1907.03454 preprint EN cc-by arXiv (Cornell University) 2019-01-01
Coming Soon ...