261 research outputs found

    QuerySnout: automating the discovery of attribute inference attacks against query-based systems

    Get PDF
    Although query-based systems (QBS) have become one of the main solutions to share data anonymously, building QBSes that robustly protect the privacy of individuals contributing to the dataset is a hard problem. Theoretical solutions relying on differential privacy guarantees are difficult to implement correctly with reasonable accuracy, while ad-hoc solutions might contain unknown vulnerabilities. Evaluating the privacy provided by QBSes must thus be done by evaluating the accuracy of a wide range of privacy attacks. However, existing attacks against QBSes require time and expertise to develop, need to be manually tailored to the specific systems attacked, and are limited in scope. In this paper, we develop QuerySnout, the first method to automatically discover vulnerabilities in query-based systems. QuerySnout takes as input a target record and the QBS as a black box, analyzes its behavior on one or more datasets, and outputs a multiset of queries together with a rule to combine answers to them in order to reveal the sensitive attribute of the target record. QuerySnout uses evolutionary search techniques based on a novel mutation operator to find a multiset of queries susceptible to lead to an attack, and a machine learning classifier to infer the sensitive attribute from answers to the queries selected. We showcase the versatility of QuerySnout by applying it to two attack scenarios (assuming access to either the private dataset or to a different dataset from the same distribution), three real-world datasets, and a variety of protection mechanisms. We show the attacks found by QuerySnout to consistently equate or outperform, sometimes by a large margin, the best attacks from the literature. We finally show how QuerySnout can be extended to QBSes that require a budget, and apply QuerySnout to a simple QBS based on the Laplace mechanism. Taken together, our results show how powerful and accurate attacks against QBSes can already be found by an automated system, allowing for highly complex QBSes to be automatically tested "at the pressing of a button". We believe this line of research to be crucial to improve the robustness of systems providing privacy-preserving access to personal data in theory and in practice

    Electrical and galvanomagnetic properties of AuAl2+6%Cu intermetallic compounds at low temperatures

    Full text link
    The AuAl2 intermetallic compounds are of substantial interest in view of their application potential. The investigated intermetallics AuAl 2+6%Cu were prepared from fine powders of AuAl2 and Cu by vacuum sputtering on a glass substrate and consisted of films with a thickness of about one micrometer. The films were annealed. The temperature and field dependence of the electroresistivity, the magnetoresistivity and the Hall effect of AuAl2+6%Cu films were measured in the temperature interval from 4.2 to 100 K and at magnetic fields of up to 15 T. We demonstrate that the temperature dependence of the electroresistivity has a minimum at T = 20 K and a metallic behavior above this temperature. The magnetoresistivity is very small (less then 1%), positive at low temperatures and negative above 12 K. The Hall coefficient is positive, which corresponds to the holes in a one zone model with a charge carrier concentration of about 1.6 1020 cm-3. © Published under licence by IOP Publishing Ltd

    Interaction data are identifiable even across long periods of time

    Get PDF
    Fine-grained records of people’s interactions, both offline and online, are collected at large scale. These data contain sensitive information about whom we meet, talk to, and when. We demonstrate here how people’s interaction behavior is stable over long periods of time and can be used to identify individuals in anonymous datasets. Our attack learns the profile of an individual using geometric deep learning and triplet loss optimization. In a mobile phone metadata dataset of more than 40k people, it correctly identifies 52% of individuals based on their 2-hop interaction graph. We further show that the profiles learned by our method are stable over time and that 24% of people are still identifiable after 20 weeks. Our results suggest that people with well-balanced interaction graphs are more identifiable. Applying our attack to Bluetooth close-proximity networks, we show that even 1-hop interaction graphs are enough to identify people more than 26% of the time. Our results provide strong evidence that disconnected and even re-pseudonymized interaction data can be linked together making them personal data under the European Union’s General Data Protection Regulation

    Migration and Localization of Metal Atoms on Strained Graphene

    Get PDF
    Reconstructed point defects in graphene are created by electron irradiation and annealing. By applying electron microscopy and density functional theory, it is shown that the strain field around these defects reaches far into the unperturbed hexagonal network and that metal atoms have a high affinity to the nonperfect and strained regions of graphene. Metal atoms are attracted by reconstructed defects and bonded with energies of about 2 eV. The increased reactivity of the distorted π-electron system in strained graphene allows us to attach metal atoms and to tailor the properties of graphene.Peer reviewe

    Proteomic analysis of plasma exosomes from cystic echinococcosis patients provides in vivo support for distinct immune response profiles in active vs inactive infection and suggests potential biomarkers

    Get PDF
    The reference diagnostic method of human abdominal Cystic Echinococcosis (CE) is imaging, particularly ultrasound, supported by serology when imaging is inconclusive. However, current diagnostic tools are neither optimal nor widely available. The availability of a test detecting circulating biomarkers would considerably improve CE diagnosis and cyst staging (active vs inactive), as well as treatments and follow-up of patients. Exosomes are extracellular vesicles involved in intercellular communication, including immune system responses, and are a recognized source of biomarkers. With the aim of identifying potential biomarkers, plasma pools from patients infected by active or inactive CE, as well as from control subjects, were processed to isolate exosomes for proteomic label-free quantitative analysis. Results were statistically processed and subjected to bioinformatics analysis to define distinct features associated with parasite viability. First, a few parasite proteins were identified that were specifically associated with either active or inactive CE, which represent potential biomarkers to be validated in further studies. Second, numerous identified proteins of human origin were common to active and inactive CE, confirming an overlap of several immune response pathways. However, a subset of human proteins specific to either active or inactive CE, and central in the respective protein-protein interaction networks, were identified. These include the Src family kinases Src and Lyn, and the immune-suppressive cytokine TGF-β in active CE, and Cdc42 in inactive CE. The Src and Lyn Kinases were confirmed as potential markers of active CE in totally independent plasma pools. In addition, insights were obtained on immune response profiles: largely consistent with previous evidence, our observations hint to a Th1/Th2/regulatory immune environment in patients with active CE and a Th1/inflammatory environment with a component of the wound healing response in the presence of inactive CE. Of note, our results were obtained for the first time from the analysis of samples obtained in vivo from a well-characterized, large cohort of human subjects
    corecore