-
State Machine Mutation-based Testing Framework for Wireless Communication Protocols
Authors:
Syed Md Mukit Rashid,
Tianwei Wu,
Kai Tu,
Abdullah Al Ishtiaq,
Ridwanul Hasan Tanvir,
Yilu Dong,
Omar Chowdhury,
Syed Rafiul Hussain
Abstract:
This paper proposes Proteus, a protocol state machine, property-guided, and budget-aware automated testing approach for discovering logical vulnerabilities in wireless protocol implementations. Proteus maintains its budget awareness by generating test cases (i.e., each being a sequence of protocol messages) that are not only meaningful (i.e., the test case mostly follows the desirable protocol flo…
▽ More
This paper proposes Proteus, a protocol state machine, property-guided, and budget-aware automated testing approach for discovering logical vulnerabilities in wireless protocol implementations. Proteus maintains its budget awareness by generating test cases (i.e., each being a sequence of protocol messages) that are not only meaningful (i.e., the test case mostly follows the desirable protocol flow except for some controlled deviations) but also have a high probability of violating the desirable properties. To demonstrate its effectiveness, we evaluated Proteus in two different protocol implementations, namely 4G LTE and BLE, across 23 consumer devices (11 for 4G LTE and 12 for BLE). Proteus discovered 25 unique issues, including 112 instances. Affected vendors have positively acknowledged 14 vulnerabilities through 5 CVEs.
△ Less
Submitted 2 October, 2024; v1 submitted 4 September, 2024;
originally announced September 2024.
-
Exploration of new 212 MAB phases: M2AB2 (M=Mo, Ta; A=Ga, Ge) via DFT calculations
Authors:
A. K. M Naim Ishtiaq,
Md Nasir Uddin,
Md. Rasel Rana,
Shariful Islam,
Noor Afsary,
Karimul Hoque,
Md. Ashraf Ali
Abstract:
The recently developed MAB phases, an extension of the MAX phase, have sparked interest in research among scientists because of their better thermo-mechanical properties. In this paper, we have explored four new MAB phases M2AB2 (M=Mo, Ta and A=Ga, Ge) and studied the elastic, electronic, thermal, and optical properties to predict the possible applications. The stability of the new phases has been…
▽ More
The recently developed MAB phases, an extension of the MAX phase, have sparked interest in research among scientists because of their better thermo-mechanical properties. In this paper, we have explored four new MAB phases M2AB2 (M=Mo, Ta and A=Ga, Ge) and studied the elastic, electronic, thermal, and optical properties to predict the possible applications. The stability of the new phases has been confirmed by calculating formation energy (Ef), formation enthalpy (H), phonon dispersion curve (PDC), and elastic constant (Cij). The study reveals that M2AB2 (M=Mo, Ta and A=Ga, Ge) exhibit significantly higher elastic constants, elastic moduli, and Vickers hardness values than their counterpart 211 borides. Higher Vickers hardness values of Ta2AB2 (A=Ga, Ge) than Mo2AB2 (A=Ga, Ge) have been explained based on the values of the bond overlap population. The analysis of the density of states and electronic band structure revealed the metallic nature of the borides under examination. The thermodynamic characteristics of M2AB2 (M=Mo, Ta and A=Ga, Ge) under high temperatures (0 to 1000 K) are investigated using the quasi-harmonic Debye model. Critical thermal properties such as melting temperature (Tm), Gruneisen parameter, minimum thermal conductivity (Kmin), Debye temperature, and others are also computed. Compared with 211 MAX phases, the 212 phases exhibit higher values of Debye temperature and Tm, along with a lower value of Kmin. These findings suggest that the studied compounds exhibit superior thermal properties that are suitable for practical applications. The optical characteristics have been examined, and the reflectance spectrum indicates that the materials have the potential to mitigate solar heating across various energy regions.
△ Less
Submitted 30 August, 2024;
originally announced August 2024.
-
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications
Authors:
Abdullah Al Ishtiaq,
Sarkar Snigdha Sarathi Das,
Syed Md Mukit Rashid,
Ali Ranjbar,
Kai Tu,
Tianwei Wu,
Zhezheng Song,
Weixuan Wang,
Mujtahid Akon,
Rui Zhang,
Syed Rafiul Hussain
Abstract:
In this paper, we present Hermes, an end-to-end framework to automatically generate formal representations from natural language cellular specifications. We first develop a neural constituency parser, NEUTREX, to process transition-relevant texts and extract transition components (i.e., states, conditions, and actions). We also design a domain-specific language to translate these transition compon…
▽ More
In this paper, we present Hermes, an end-to-end framework to automatically generate formal representations from natural language cellular specifications. We first develop a neural constituency parser, NEUTREX, to process transition-relevant texts and extract transition components (i.e., states, conditions, and actions). We also design a domain-specific language to translate these transition components to logical formulas by leveraging dependency parse trees. Finally, we compile these logical formulas to generate transitions and create the formal model as finite state machines. To demonstrate the effectiveness of Hermes, we evaluate it on 4G NAS, 5G NAS, and 5G RRC specifications and obtain an overall accuracy of 81-87%, which is a substantial improvement over the state-of-the-art. Our security analysis of the extracted models uncovers 3 new vulnerabilities and identifies 19 previous attacks in 4G and 5G specifications, and 7 deviations in commercial 4G basebands.
△ Less
Submitted 11 October, 2023; v1 submitted 6 October, 2023;
originally announced October 2023.
-
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries
Authors:
Afifa Ishtiaq,
Arash Asadi,
Ladan Khaloopour,
Waqar Ahmed,
Vahid Jamali,
Matthias Hollick
Abstract:
The high directionality of millimeter-wave (mmWave) communication systems has proven effective in reducing the attack surface against eavesdropping, thus improving the physical layer security. However, even with highly directional beams, the system is still exposed to eavesdropping against adversaries located within the main lobe. In this paper, we propose \acrshort{BSec}, a solution to protect th…
▽ More
The high directionality of millimeter-wave (mmWave) communication systems has proven effective in reducing the attack surface against eavesdropping, thus improving the physical layer security. However, even with highly directional beams, the system is still exposed to eavesdropping against adversaries located within the main lobe. In this paper, we propose \acrshort{BSec}, a solution to protect the users even from adversaries located in the main lobe. The key feature of BeamSec are: (i) Operating without the knowledge of eavesdropper's location/channel; (ii) Robustness against colluding eavesdropping attack and (iii) Standard compatibility, which we prove using experiments via our IEEE 802.11ad/ay-compatible 60 GHz phased-array testbed. Methodologically, BeamSec first identifies uncorrelated and diverse beam-pairs between the transmitter and receiver by analyzing signal characteristics available through standard-compliant procedures. Next, it encodes the information jointly over all selected beam-pairs to minimize information leakage. We study two methods for allocating transmission time among different beams, namely uniform allocation (no knowledge of the wireless channel) and optimal allocation for maximization of the secrecy rate (with partial knowledge of the wireless channel). Our experiments show that \acrshort{BSec} outperforms the benchmark schemes against single and colluding eavesdroppers and enhances the secrecy rate by 79.8% over a random paths selection benchmark.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Comparative Study of Q-Learning and NeuroEvolution of Augmenting Topologies for Self Driving Agents
Authors:
Arhum Ishtiaq,
Maheen Anees,
Sara Mahmood,
Neha Jafry
Abstract:
Autonomous driving vehicles have been of keen interest ever since automation of various tasks started. Humans are prone to exhaustion and have a slow response time on the road, and on top of that driving is already quite a dangerous task with around 1.35 million road traffic incident deaths each year. It is expected that autonomous driving can reduce the number of driving accidents around the worl…
▽ More
Autonomous driving vehicles have been of keen interest ever since automation of various tasks started. Humans are prone to exhaustion and have a slow response time on the road, and on top of that driving is already quite a dangerous task with around 1.35 million road traffic incident deaths each year. It is expected that autonomous driving can reduce the number of driving accidents around the world which is why this problem has been of keen interest for researchers. Currently, self-driving vehicles use different algorithms for various sub-problems in making the vehicle autonomous. We will focus reinforcement learning algorithms, more specifically Q-learning algorithms and NeuroEvolution of Augment Topologies (NEAT), a combination of evolutionary algorithms and artificial neural networks, to train a model agent to learn how to drive on a given path. This paper will focus on drawing a comparison between the two aforementioned algorithms.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Quantum Machine Learning: Fad or Future?
Authors:
Arhum Ishtiaq,
Sara Mahmood
Abstract:
For the last few decades, classical machine learning has allowed us to improve the lives of many through automation, natural language processing, predictive analytics and much more. However, a major concern is the fact that we're fast approach the threshold of the maximum possible computational capacity available to us by the means of classical computing devices including CPUs, GPUs and Applicatio…
▽ More
For the last few decades, classical machine learning has allowed us to improve the lives of many through automation, natural language processing, predictive analytics and much more. However, a major concern is the fact that we're fast approach the threshold of the maximum possible computational capacity available to us by the means of classical computing devices including CPUs, GPUs and Application Specific Integrated Circuits (ASICs). This is due to the exponential increase in model sizes which now have parameters in the magnitude of billions and trillions, requiring a significant amount of computing resources across a significant amount of time, just to converge one single model. To observe the efficacy of using quantum computing for certain machine learning tasks and explore the improved potential of convergence, error reduction and robustness to noisy data, this paper will look forth to test and verify the aspects in which quantum machine learning can help improve over classical machine learning approaches while also shedding light on the likely limitations that have prevented quantum approaches to become the mainstream. A major focus will be to recreate the work by Farhi et al and conduct experiments using their theory of performing machine learning in a quantum context, with assistance from the Tensorflow Quantum documentation.
△ Less
Submitted 20 June, 2021;
originally announced June 2021.
-
CoDesc: A Large Code-Description Parallel Dataset
Authors:
Masum Hasan,
Tanveer Muttaqueen,
Abdullah Al Ishtiaq,
Kazi Sajeed Mehrab,
Md. Mahim Anjum Haque,
Tahmid Hasan,
Wasi Uddin Ahmad,
Anindya Iqbal,
Rifat Shahriyar
Abstract:
Translation between natural language and source code can help software development by enabling developers to comprehend, ideate, search, and write computer programs in natural language. Despite growing interest from the industry and the research community, this task is often difficult due to the lack of large standard datasets suitable for training deep neural models, standard noise removal method…
▽ More
Translation between natural language and source code can help software development by enabling developers to comprehend, ideate, search, and write computer programs in natural language. Despite growing interest from the industry and the research community, this task is often difficult due to the lack of large standard datasets suitable for training deep neural models, standard noise removal methods, and evaluation benchmarks. This leaves researchers to collect new small-scale datasets, resulting in inconsistencies across published works. In this study, we present CoDesc -- a large parallel dataset composed of 4.2 million Java methods and natural language descriptions. With extensive analysis, we identify and remove prevailing noise patterns from the dataset. We demonstrate the proficiency of CoDesc in two complementary tasks for code-description pairs: code summarization and code search. We show that the dataset helps improve code search by up to 22\% and achieves the new state-of-the-art in code summarization. Furthermore, we show CoDesc's effectiveness in pre-training--fine-tuning setup, opening possibilities in building pretrained language models for Java. To facilitate future research, we release the dataset, a data processing tool, and a benchmark at \url{https://github.com/csebuetnlp/CoDesc}.
△ Less
Submitted 29 May, 2021;
originally announced May 2021.
-
Model Compression
Authors:
Arhum Ishtiaq,
Sara Mahmood,
Maheen Anees,
Neha Mumtaz
Abstract:
With time, machine learning models have increased in their scope, functionality and size. Consequently, the increased functionality and size of such models requires high-end hardware to both train and provide inference after the fact. This paper aims to explore the possibilities within the domain of model compression, discuss the efficiency of combining various levels of pruning and quantization,…
▽ More
With time, machine learning models have increased in their scope, functionality and size. Consequently, the increased functionality and size of such models requires high-end hardware to both train and provide inference after the fact. This paper aims to explore the possibilities within the domain of model compression, discuss the efficiency of combining various levels of pruning and quantization, while proposing a quality measurement metric to objectively decide which combination is best in terms of minimizing the accuracy delta and maximizing the size reduction factor.
△ Less
Submitted 4 September, 2021; v1 submitted 20 May, 2021;
originally announced May 2021.
-
BERT2Code: Can Pretrained Language Models be Leveraged for Code Search?
Authors:
Abdullah Al Ishtiaq,
Masum Hasan,
Md. Mahim Anjum Haque,
Kazi Sajeed Mehrab,
Tanveer Muttaqueen,
Tahmid Hasan,
Anindya Iqbal,
Rifat Shahriyar
Abstract:
Millions of repetitive code snippets are submitted to code repositories every day. To search from these large codebases using simple natural language queries would allow programmers to ideate, prototype, and develop easier and faster. Although the existing methods have shown good performance in searching codes when the natural language description contains keywords from the code, they are still fa…
▽ More
Millions of repetitive code snippets are submitted to code repositories every day. To search from these large codebases using simple natural language queries would allow programmers to ideate, prototype, and develop easier and faster. Although the existing methods have shown good performance in searching codes when the natural language description contains keywords from the code, they are still far behind in searching codes based on the semantic meaning of the natural language query and semantic structure of the code. In recent years, both natural language and programming language research communities have created techniques to embed them in vector spaces. In this work, we leverage the efficacy of these embedding models using a simple, lightweight 2-layer neural network in the task of semantic code search. We show that our model learns the inherent relationship between the embedding spaces and further probes into the scope of improvement by empirically analyzing the embedding methods. In this analysis, we show that the quality of the code embedding model is the bottleneck for our model's performance, and discuss future directions of study in this area.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.