799 research outputs found
Shining Light On Shadow Stacks
Control-Flow Hijacking attacks are the dominant attack vector against C/C++
programs. Control-Flow Integrity (CFI) solutions mitigate these attacks on the
forward edge,i.e., indirect calls through function pointers and virtual calls.
Protecting the backward edge is left to stack canaries, which are easily
bypassed through information leaks. Shadow Stacks are a fully precise mechanism
for protecting backwards edges, and should be deployed with CFI mitigations. We
present a comprehensive analysis of all possible shadow stack mechanisms along
three axes: performance, compatibility, and security. For performance
comparisons we use SPEC CPU2006, while security and compatibility are
qualitatively analyzed. Based on our study, we renew calls for a shadow stack
design that leverages a dedicated register, resulting in low performance
overhead, and minimal memory overhead, but sacrifices compatibility. We present
case studies of our implementation of such a design, Shadesmar, on Phoronix and
Apache to demonstrate the feasibility of dedicating a general purpose register
to a security monitor on modern architectures, and the deployability of
Shadesmar. Our comprehensive analysis, including detailed case studies for our
novel design, allows compiler designers and practitioners to select the correct
shadow stack design for different usage scenarios.Comment: To Appear in IEEE Security and Privacy 201
RobustCLEVR: A Benchmark and Framework for Evaluating Robustness in Object-centric Learning
Object-centric representation learning offers the potential to overcome
limitations of image-level representations by explicitly parsing image scenes
into their constituent components. While image-level representations typically
lack robustness to natural image corruptions, the robustness of object-centric
methods remains largely untested. To address this gap, we present the
RobustCLEVR benchmark dataset and evaluation framework. Our framework takes a
novel approach to evaluating robustness by enabling the specification of causal
dependencies in the image generation process grounded in expert knowledge and
capable of producing a wide range of image corruptions unattainable in existing
robustness evaluations. Using our framework, we define several causal models of
the image corruption process which explicitly encode assumptions about the
causal relationships and distributions of each corruption type. We generate
dataset variants for each causal model on which we evaluate state-of-the-art
object-centric methods. Overall, we find that object-centric methods are not
inherently robust to image corruptions. Our causal evaluation approach exposes
model sensitivities not observed using conventional evaluation processes,
yielding greater insight into robustness differences across algorithms. Lastly,
while conventional robustness evaluations view corruptions as
out-of-distribution, we use our causal framework to show that even training on
in-distribution image corruptions does not guarantee increased model
robustness. This work provides a step towards more concrete and substantiated
understanding of model performance and deterioration under complex corruption
processes of the real-world
Social runaway : fisherian elaboration (or reduction) of socially selected traits via indirect genetic effects
NWB was funded by fellowships from the UK Natural Environment Research Council [NE/G014906/1 and NE/L011255/1].Our understanding of the evolutionary stability of sociallyâselected traits is dominated by sexual selection models originating with R. A. Fisher, in which genetic covariance arising through assortative mating can trigger exponential, runaway trait evolution. To examine whether nonâreproductive, sociallyâselected traits experience similar dynamicsâsocial runawayâwhen assortative mating does not automatically generate a covariance, we modelled the evolution of sociallyâselected badge and donation phenotypes incorporating indirect genetic effects (IGEs) arising from the social environment. We establish a social runaway criterion based on the interaction coefficient, Ï, which describes social effects on badge and donation traits. Our models make several predictions. (1) IGEs can drive the original evolution of altruistic interactions that depend on receiver badges. (2) Donation traits are more likely to be susceptible to IGEs than badge traits. (3) Runaway dynamics in nonâsexual, social contexts can occur in the absence of a genetic covariance. (4) Traits elaborated by social runaway are more likely to involve reciprocal, but nonâsymmetrical, social plasticity. Models incorporating plasticity to the social environment via IGEs illustrate conditions favouring social runaway, describe a mechanism underlying the origins of costly traits such as altruism, and support a fundamental role for phenotypic plasticity in rapid social evolution.PostprintPeer reviewe
A Systematic Review of Robustness in Deep Learning for Computer Vision: Mind the gap?
Deep neural networks for computer vision are deployed in increasingly
safety-critical and socially-impactful applications, motivating the need to
close the gap in model performance under varied, naturally occurring imaging
conditions. Robustness, ambiguously used in multiple contexts including
adversarial machine learning, refers here to preserving model performance under
naturally-induced image corruptions or alterations.
We perform a systematic review to identify, analyze, and summarize current
definitions and progress towards non-adversarial robustness in deep learning
for computer vision. We find this area of research has received
disproportionately less attention relative to adversarial machine learning, yet
a significant robustness gap exists that manifests in performance degradation
similar in magnitude to adversarial conditions.
Toward developing a more transparent definition of robustness, we provide a
conceptual framework based on a structural causal model of the data generating
process and interpret non-adversarial robustness as pertaining to a model's
behavior on corrupted images corresponding to low-probability samples from the
unaltered data distribution. We identify key architecture-, data augmentation-,
and optimization tactics for improving neural network robustness. This
robustness perspective reveals that common practices in the literature
correspond to causal concepts. We offer perspectives on how future research may
mind this evident and significant non-adversarial robustness gap
From Generalization to Precision: Exploring SAM for Tool Segmentation in Surgical Environments
Purpose: Accurate tool segmentation is essential in computer-aided
procedures. However, this task conveys challenges due to artifacts' presence
and the limited training data in medical scenarios. Methods that generalize to
unseen data represent an interesting venue, where zero-shot segmentation
presents an option to account for data limitation. Initial exploratory works
with the Segment Anything Model (SAM) show that bounding-box-based prompting
presents notable zero-short generalization. However, point-based prompting
leads to a degraded performance that further deteriorates under image
corruption. We argue that SAM drastically over-segment images with high
corruption levels, resulting in degraded performance when only a single
segmentation mask is considered, while the combination of the masks overlapping
the object of interest generates an accurate prediction. Method: We use SAM to
generate the over-segmented prediction of endoscopic frames. Then, we employ
the ground-truth tool mask to analyze the results of SAM when the best single
mask is selected as prediction and when all the individual masks overlapping
the object of interest are combined to obtain the final predicted mask. We
analyze the Endovis18 and Endovis17 instrument segmentation datasets using
synthetic corruptions of various strengths and an In-House dataset featuring
counterfactually created real-world corruptions. Results: Combining the
over-segmented masks contributes to improvements in the IoU. Furthermore,
selecting the best single segmentation presents a competitive IoU score for
clean images. Conclusions: Combined SAM predictions present improved results
and robustness up to a certain corruption level. However, appropriate prompting
strategies are fundamental for implementing these models in the medical domain
- âŠ