Picture for Berk Sunar

Berk Sunar

Non-Halting Queries: Exploiting Fixed Points in LLMs

Add code
Oct 08, 2024
Figure 1 for Non-Halting Queries: Exploiting Fixed Points in LLMs
Figure 2 for Non-Halting Queries: Exploiting Fixed Points in LLMs
Figure 3 for Non-Halting Queries: Exploiting Fixed Points in LLMs
Figure 4 for Non-Halting Queries: Exploiting Fixed Points in LLMs
Viaarxiv icon

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Add code
Aug 24, 2023
Viaarxiv icon

An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware

Add code
Oct 14, 2021
Figure 1 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 2 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 3 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 4 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Viaarxiv icon

FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings

Add code
Jun 25, 2020
Figure 1 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 2 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 3 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 4 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Viaarxiv icon

FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning

Add code
Jul 08, 2019
Figure 1 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 2 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 3 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 4 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Viaarxiv icon

Undermining User Privacy on Mobile Devices Using AI

Add code
Nov 27, 2018
Figure 1 for Undermining User Privacy on Mobile Devices Using AI
Figure 2 for Undermining User Privacy on Mobile Devices Using AI
Figure 3 for Undermining User Privacy on Mobile Devices Using AI
Figure 4 for Undermining User Privacy on Mobile Devices Using AI
Viaarxiv icon