skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation [Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation]
Award ID(s):
1718109
PAR ID:
10209298
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications
Page Range / eLocation ID:
485 to 496
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
  2. Abstract Hornworts are a deeply diverged lineage of bryophytes and a sister lineage to mosses and liverworts. Hornworts have an array of unique features that can be leveraged to illuminate not only the early evolution of land plants, but also alternative paths for nitrogen and carbon assimilation via cyanobacterial symbiosis and a pyrenoid-based CO2-concentrating mechanism (CCM), respectively. Despite this, hornworts are one of the few plant lineages with limited available genetic tools. Here we report an efficient biolistics method for generating transient expression and stable transgenic lines in the model hornwort, Anthoceros agrestis. An average of 569 (±268) cells showed transient expression per bombardment, with green fluorescent protein expression observed within 48–72 h. A total of 81 stably transformed lines were recovered across three separate experiments, averaging six lines per bombardment. We followed the same method to transiently transform nine additional hornwort species, and obtained stable transformants from one. This method was further used to verify the localization of Rubisco and Rubisco activase in pyrenoids, which are central proteins for CCM function. Together, our biolistics approach offers key advantages over existing methods as it enables rapid transient expression and can be applied to widely diverse hornwort species. 
    more » « less
  3. We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a preshared password to authenticate each other and establish a session key. SRP aims to resist dictionary attacks, not store plaintext-equivalent passwords on the server, avoid patent infringement, and avoid export controls by not using encryption. Formal analysis of SRP is challenging in part because existing tools provide no simple way to reason about its use of the mathematical expression “v + g b mod q”. Modeling v + g b as encryption, we complete an exhaustive study of all possible execution sequences of SRP. Ignoring possible algebraic attacks, this analysis detects no major structural weakness, and in particular no leakage of any secrets. We do uncover one notable weakness of SRP, which follows from its design constraints. It is possible for a malicious server to fake an authentication session with a client, without the client’s participation. This action might facilitate an escalation of privilege attack, if the client has higher privileges than does the server. We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA. 
    more » « less
  4. Neural networks (NNs) enable precise modeling of complicated geophysical phenomena but can be sensitive to small input changes. In this work, we present a new method for analyzing this instability in NNs. We focus our analysis on adversarial examples, test‐time inputs with carefully crafted human‐imperceptible perturbations that expose the worst‐case instability in a model's predictions. Our stability analysis is based on a low‐rank expansion of NNs on a fixed input, and we apply our analysis to a NN model for tsunami early warning which takes geodetic measurements as the input and forecasts tsunami waveforms. The result is an improved description of local stability that explains adversarial examples generated by a standard gradient‐based algorithm, and allows the generation of other comparable examples. Our analysis can predict whether noise in the geodetic input will produce an unstable output, and identifies a potential approach to filtering the input that enable more robust forecasting 
    more » « less