A generalized efficiency mismatch attack to bypass detection-scrambling
countermeasure
- URL: http://arxiv.org/abs/2101.03969v1
- Date: Thu, 7 Jan 2021 05:02:24 GMT
- Title: A generalized efficiency mismatch attack to bypass detection-scrambling
countermeasure
- Authors: M A Ruhul Fatin, Shihan Sajeed
- Abstract summary: We show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables.
Our result and methodology could be used to security-certify a free-space quantum communication receiver against all types of detector-efficiency-mismatch type attacks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The ability of an eavesdropper to compromise the security of a quantum
communication system by changing the angle of the incoming light is well-known.
Randomizing the role of the detectors has been proposed to be an efficient
countermeasure to this type of attack. Here we show that the proposed
countermeasure can be bypassed if the attack is generalized by including more
attack variables. Using the experimental data from existing literature, we show
how randomization effectively prevents the initial attack but fails to do so
when Eve generalizes her attack strategy. Our result and methodology could be
used to security-certify a free-space quantum communication receiver against
all types of detector-efficiency-mismatch type attacks.
Related papers
- Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and Defense on Model Adaptation [120.42853706967188]
We explore the potential backdoor attacks on model adaptation launched by well-designed poisoning target data.
We propose a plug-and-play method named MixAdapt, combining it with existing adaptation algorithms.
arXiv Detail & Related papers (2024-01-11T16:42:10Z) - DALA: A Distribution-Aware LoRA-Based Adversarial Attack against
Language Models [64.79319733514266]
Adversarial attacks can introduce subtle perturbations to input data.
Recent attack methods can achieve a relatively high attack success rate (ASR)
We propose a Distribution-Aware LoRA-based Adversarial Attack (DALA) method.
arXiv Detail & Related papers (2023-11-14T23:43:47Z) - Fight Fire with Fire: Combating Adversarial Patch Attacks using
Pattern-randomized Defensive Patches [12.947503245230866]
We propose a novel and general methodology for defending adversarial attacks.
We inject two types of defensive patches, canary and woodpecker, into the input to proactively probe or weaken potential adversarial patches.
The effectiveness and practicality of the proposed method are demonstrated through comprehensive experiments.
arXiv Detail & Related papers (2023-11-10T15:36:57Z) - Kick Bad Guys Out! Conditionally Activated Anomaly Detection in Federated Learning with Zero-Knowledge Proof Verification [22.078088272837068]
Federated Learning (FL) systems are susceptible to adversarial attacks.
Current defense methods are often impractical for real-world FL systems.
We propose a novel anomaly detection strategy that is designed for real-world FL systems.
arXiv Detail & Related papers (2023-10-06T07:09:05Z) - Randomized ancillary qubit overcomes detector-control and
intercept-resend hacking of quantum key distribution [1.0323063834827415]
General class of attacks adopting the use of faked-state photons.
A legitimate user, Bob, uses a polarization randomizer at his gateway to distort an ancillary polarization of a phase-encoded photon.
We demonstrate theoretically and experimentally that, using commercial off-the-shelf detectors, it can be made impossible for Eve to avoid triggering the alert.
arXiv Detail & Related papers (2022-10-03T19:44:35Z) - Versatile Weight Attack via Flipping Limited Bits [68.45224286690932]
We study a novel attack paradigm, which modifies model parameters in the deployment stage.
Considering the effectiveness and stealthiness goals, we provide a general formulation to perform the bit-flip based weight attack.
We present two cases of the general formulation with different malicious purposes, i.e., single sample attack (SSA) and triggered samples attack (TSA)
arXiv Detail & Related papers (2022-07-25T03:24:58Z) - Illusory Attacks: Information-Theoretic Detectability Matters in Adversarial Attacks [76.35478518372692]
We introduce epsilon-illusory, a novel form of adversarial attack on sequential decision-makers.
Compared to existing attacks, we empirically find epsilon-illusory to be significantly harder to detect with automated methods.
Our findings suggest the need for better anomaly detectors, as well as effective hardware- and system-level defenses.
arXiv Detail & Related papers (2022-07-20T19:49:09Z) - Zero-Query Transfer Attacks on Context-Aware Object Detectors [95.18656036716972]
Adversarial attacks perturb images such that a deep neural network produces incorrect classification results.
A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check.
We present the first approach for generating context-consistent adversarial attacks that can evade the context-consistency check.
arXiv Detail & Related papers (2022-03-29T04:33:06Z) - Certifiers Make Neural Networks Vulnerable to Availability Attacks [70.69104148250614]
We show for the first time that fallback strategies can be deliberately triggered by an adversary.
In addition to naturally occurring abstains for some inputs and perturbations, the adversary can use training-time attacks to deliberately trigger the fallback.
We design two novel availability attacks, which show the practical relevance of these threats.
arXiv Detail & Related papers (2021-08-25T15:49:10Z) - Detector blinding attacks on counterfactual quantum key distribution [0.0]
Counterfactual quantum key distribution protocols allow two sides to establish a common secret key.
Part of the quantum state used to establish each bit never leaves the transmitting side, which hinders some attacks.
We present two attacks that use this ability to compromise the security of counterfactual quantum key distribution.
arXiv Detail & Related papers (2020-11-05T07:41:39Z) - Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses [0.0]
We propose the first computational security model considering superposition attacks for multiparty protocols.
We show that our new security model is satisfiable by proving the security of the well-known One-Time-Pad protocol.
We use this newly imparted knowledge to construct the first concrete protocol for Secure Two-Party Computation that is resistant to superposition attacks.
arXiv Detail & Related papers (2020-07-01T18:00:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.