Patents by Inventor Giorgia Azzurra Marson
Giorgia Azzurra Marson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11977626Abstract: A method for securing a genuine machine learning model against adversarial samples includes the steps of attaching a trigger to a sample to be classified and classifying the sample with the trigger attached using a backdoored model that has been backdoored using the trigger. In a further step, it is determined whether an output of the backdoored model is the same as a backdoor class of the backdoored model, and/or an outlier detection method is applied to logits compared to honest logits that were computed using a genuine sample. These steps are repeated using different triggers and backdoored models respectively associated therewith. It is compared a number of times that an output of the backdoored models is not the same as the respective backdoor class, and/or a difference determined by applying the outlier detection method, against one or more thresholds so as to determine whether the sample is adversarial.Type: GrantFiled: June 9, 2021Date of Patent: May 7, 2024Assignee: NEC CORPORATIONInventors: Sebastien Andreina, Giorgia Azzurra Marson, Ghassan Karame
-
Publication number: 20240129125Abstract: A method for performing a privacy-preserving membership test includes performing an oblivious pseudo-random function (OPRF) protocol to determine a pseudo-random function (PRF) result based on an input from a proving device and a PRF key. The input indicates a user identity of a user associated with the providing device. The method further includes determining whether the user belongs to a verifier list associated with a verifier device based on testing membership of the user using the verifier list and the PRF result.Type: ApplicationFiled: March 2, 2023Publication date: April 18, 2024Inventors: Giorgia Azzurra Marson, Wenting Li, Ghassan Karame
-
Publication number: 20240007857Abstract: A method for secure chain division of a satellite chain by a validator node of a permission-based blockchain system includes executing, by communicating with a set of validator nodes of an original satellite chain of the blockchain system, a validator assignment scheme that splits the set of validator nodes of the original satellite chain into subsets of validator nodes of child chains of the original satellite chain, and running, by communicating with the validator nodes of the respective subsets, a reconfiguration protocol to set up the respective child chains and sending, to an identity management component that maintains identity information of all members of the blockchain system in a registry, a configuration update to record the division of the original satellite chain and corresponding creation of the child chains.Type: ApplicationFiled: April 22, 2021Publication date: January 4, 2024Inventors: Sebastien ANDREINA, Giorgia Azzurra MARSON, Lorenzo ALLUMINIO, Ghassan KARAME
-
Patent number: 11836643Abstract: A method for performing federated learning includes initializing, by a server, a global model G0. The server shares G0 with a plurality of participants (N) using a secure communications channel. The server selects n out of N participants, according to filtering criteria, to contribute training for a round r. The server partitions the selected participants n into s groups and informs each participant about the other participants belonging to the same group. The server obtains aggregated group updates AU1, . . . , AUg from each group and compares the aggregated group updates and identifies suspicious aggregated group updates. The server combines the aggregated group updates by excluding the updates identified as suspicious, to obtain an aggregated update Ufinal. The server derives a new global model Gr from the previous model Gr-1 and the aggregated update Ufinal and shares Gr with the plurality of participants.Type: GrantFiled: March 8, 2019Date of Patent: December 5, 2023Assignee: NEC CORPORATIONInventors: Kumar Sharad, Ghassan Karame, Giorgia Azzurra Marson
-
Publication number: 20230344619Abstract: A method for registering a mining computing entity (MCE) with a trusted execution environment entity (TEEE) in a blockchain of a distributed blockchain consensus network (DBCN), based on a proof-of-stake protocol, includes determining public signing information, secret signing information, and a registration timestamp and determining public account information and secret account information for a virtual wallet of the blockchain. The method further includes generating attestation information based on signing integrity information and hashing the public signing information and the public account information, and based on the attestation information, obtaining, from an attestation providing entity (APE), proving information. The method also includes sending, to the blockchain, a registration transaction that is signed with the secret account information, and registering the MCE to the blockchain.Type: ApplicationFiled: June 30, 2023Publication date: October 26, 2023Inventors: Ghassan Karame, Wenting Li, Giorgia Azzurra Marson, Jens-Matthias Bohli, Sebastien Andreina
-
Patent number: 11736271Abstract: A method for registering a mining computing entity (MCE) with a trusted execution environment entity (TEEE) in a blockchain of a distributed blockchain consensus network (DBCN), based on a proof-of-stake protocol, includes providing public signing and corresponding secret signing information and trusted time information by the TEEE of the MCE, providing public and secret account information for a virtual wallet of the blockchain by the MCE, and generating integrity information by the TEEE. The method further includes generating attestation information by signing the integrity information, hashed public signing information and public account information, computing proving information, by an attestation providing entity (APE), by attesting the attestation information, and sending a transaction to the blockchain, signed with the secret account information, the transaction including the public signing information and the proving information.Type: GrantFiled: September 21, 2018Date of Patent: August 22, 2023Assignee: NEC CORPORATIONInventors: Ghassan Karame, Wenting Li, Giorgia Azzurra Marson, Jens-Matthias Bohli, Sebastien Andreina
-
Patent number: 11616804Abstract: A method detects model-poisoning attempts in a federated learning system. The federated learning system includes a server orchestrating with clients to train a machine-learning model. The method includes receiving, by the server, results of a poisoning detection analysis. The poisoning detection analysis includes at least one of an analysis of class-specific misclassification rates or an analysis of activation clustering of a current state of the machine-learning model.Type: GrantFiled: October 23, 2019Date of Patent: March 28, 2023Assignee: NEC CORPORATIONInventors: Ghassan Karame, Giorgia Azzurra Marson, Helen Moellering
-
Patent number: 11470053Abstract: A computer-implemented method of instantiating a machine learning model with a host processing system is provided. The host processing system includes a trusted execution environment (TEE) and an untrusted processing system (UPS). The method includes: preparing, with the host processing system, a compiler encoding an architecture of the machine learning model; receiving, from a client processing system, source data; and producing, with the compiler, software based on the received source data and model parameters stored on the host processing system. The software includes an untrusted software component for performance on the UPS and a trusted software component for performance on the TEE. The untrusted software component and the trusted software component are configured to, when performed in concert, instantiate the machine learning model.Type: GrantFiled: October 14, 2019Date of Patent: October 11, 2022Assignee: NEC CORPORATIONInventors: Ghassan Karame, Giorgia Azzurra Marson, Helen Moellering
-
Publication number: 20220292185Abstract: A method for securing a genuine machine learning model against adversarial samples includes the steps of attaching a trigger to a sample to be classified and classifying the sample with the trigger attached using a backdoored model that has been backdoored using the trigger. In a further step, it is determined whether an output of the backdoored model is the same as a backdoor class of the backdoored model, and/or an outlier detection method is applied to logits compared to honest logits that were computed using a genuine sample. These steps are repeated using different triggers and backdoored models respectively associated therewith. It is compared a number of times that an output of the backdoored models is not the same as the respective backdoor class, and/or a difference determined by applying the outlier detection method, against one or more thresholds so as to determine whether the sample is adversarial.Type: ApplicationFiled: June 9, 2021Publication date: September 15, 2022Inventors: Sebastien ANDREINA, Giorgia Azzurra MARSON, Ghassan KARAME
-
Publication number: 20220245243Abstract: A method for securing a genuine machine learning model against adversarial samples includes receiving a sample, as well as receiving a classification of the sample using the genuine machine learning model or classifying the sample using the genuine machine learning model. The sample is classified using a plurality of backdoored models, which are each a backdoored version of the genuine machine learning model. The classification of the sample using the genuine machine learning model is compared to each of the classifications of the sample using the backdoored models to determine a number of the backdoored models outputting a different class than the genuine machine learning model. The number of the backdoored models outputting a different class than the genuine machine learning model is compared against a predetermined threshold so as to determine whether the sample is an adversarial sample.Type: ApplicationFiled: April 27, 2021Publication date: August 4, 2022Inventors: Sebastien Andreina, Giorgia Azzurra Marson, Fulvio di Girolamo, Ghassan Karame
-
Publication number: 20210399900Abstract: A method prevents posterior-corruption long-range attacks in a proof of stake blockchain protocol in a blockchain network. The method includes: generating, by a blockchain node associated with a TEE device, a signing key pair, including a public key and a private key; remotely-attesting, by the blockchain node, a trusted enclave application, including generating an attestation certificate; and issuing, by the blockchain node, a registration transaction to distribute the attestation certificate; the registration transaction specifying an amount of mining stake purchased by the blockchain validator. Once the registration transaction is confirmed, the TEE device becomes enabled for mining blocks in the blockchain network.Type: ApplicationFiled: September 1, 2021Publication date: December 23, 2021Inventors: Sebastien Andreina, Ghassan Karame, Wenting Li, Giorgia Azzurra Marson
-
Publication number: 20210112038Abstract: A computer-implemented method of instantiating a machine learning model with a host processing system is provided. The host processing system includes a trusted execution environment (TEE) and an untrusted processing system (UPS). The method includes: preparing, with the host processing system, a compiler encoding an architecture of the machine learning model; receiving, from a client processing system, source data; and producing, with the compiler, software based on the received source data and model parameters stored on the host processing system. The software includes an untrusted software component for performance on the UPS and a trusted software component for performance on the TEE. The untrusted software component and the trusted software component are configured to, when performed in concert, instantiate the machine learning model.Type: ApplicationFiled: October 14, 2019Publication date: April 15, 2021Inventors: Ghassan Karame, Giorgia Azzurra Marson, Helen Moellering
-
Publication number: 20210051169Abstract: A method detects model-poisoning attempts in a federated learning system. The federated learning system includes a server orchestrating with clients to train a machine-learning model. The method includes receiving, by the server, results of a poisoning detection analysis. The poisoning detection analysis includes at least one of an analysis of class-specific misclassification rates or an analysis of activation clustering of a current state of the machine-learning model.Type: ApplicationFiled: October 23, 2019Publication date: February 18, 2021Inventors: Ghassan Karame, Giorgia Azzurra Marson, Helen Moellering
-
Publication number: 20200285980Abstract: A method for performing federated learning includes initializing, by a server, a global model G0. The server shares G0 with a plurality of participants (N) using a secure communications channel. The server selects n out of N participants, according to filtering criteria, to contribute training for a round r. The server partitions the selected participants n into s groups and informs each participant about the other participants belonging to the same group. The server obtains aggregated group updates AU1, . . . , AUg from each group and compares the aggregated group updates and identifies suspicious aggregated group updates. The server combines the aggregated group updates by excluding the updates identified as suspicious, to obtain an aggregated update Ufinal. The server derives a new global model Gr from the previous model Gr-1 and the aggregated update Ufinal and shares Gr with the plurality of participants.Type: ApplicationFiled: March 8, 2019Publication date: September 10, 2020Inventors: Kumar Sharad, Ghassan Karame, Giorgia Azzurra Marson
-
Publication number: 20200228318Abstract: The present invention relates to a method for registering a mining computing entity, ‘MCE’ with a trusted execution environment entity, ‘TEEE’ in a blockchain of a distributed blockchain consensus network, ‘DBCN’, based on a proof-of-stake protocol, said method comprising the steps of —Providing public signing and corresponding secret signing information and trusted time information by said TEEE of said MCE, —Providing public and secret account information for a virtual wallet of said blockchain by said MCE, —Generating integrity information by said TEEE, —Generating attestation information by signing said integrity information, hashed public signing information and public account information, —Computing proving information, by an attestation providing entity, ‘APE’, by attesting said attestation information, —Sending a transaction to said blockchain, signed with said secret account information, wherein said transaction including said public signing information and said proving information, —Verifying said trType: ApplicationFiled: September 21, 2018Publication date: July 16, 2020Inventors: Ghassan Karame, Wenting Li, Giorgia Azzurra Marson, Jens-Matthias Bohli, Sebastien Andreina
-
Publication number: 20200106623Abstract: A method prevents posterior-corruption long-range attacks in a proof of stake blockchain protocol on a blockchain network. The method includes: generating, by a blockchain node, a fresh key pair, having a fresh public key to be included into a transaction and a fresh private key to be used for signing a next transaction; generating, by the blockchain node, the transaction having as an input an overall stake associated to an account of the blockchain node, and as an output a transfer stake to be transferred to a second node's public key, and a remaining account stake to be transferred to the fresh public key; signing, by the blockchain node, the transaction with a previous private key; and broadcasting, by the blockchain node, the generated transaction to the blockchain network.Type: ApplicationFiled: August 30, 2019Publication date: April 2, 2020Inventors: Sebastien Andreina, Ghassan Karame, Wenting Li, Giorgia Azzurra Marson