A mathematical model of the Mafia game (2013)

Mafia (also called Werewolf) is a party game. The participants are dividedinto two competing groups: citizens and a mafia. The objective is to eliminatethe opponent group. The game consists of two consecutive phases (day and night)and a certain set of actions (e.g. lynching durin … | Continue reading


@arxiv.org | 1 year ago

When Coding Style Survives Compilation: De-Anonymizing Programmers from Binaries

The ability to identify authors of computer programs based on their codingstyle is a direct threat to the privacy and anonymity of programmers. Whilerecent work found that source code can be attributed to authors with highaccuracy, attribution of executable binaries appears to be … | Continue reading


@arxiv.org | 1 year ago

Beware of Discarding Used SRAMs: Information Is Stored Permanently

Data recovery has long been a focus of the electronics industry for decadesby security experts, focusing on hard disk recovery, a type of non-volatilememory. Unfortunately, none of the existing research, neither from academia,industry, or government, have ever considered data rec … | Continue reading


@arxiv.org | 1 year ago

Multiscale modeling of brain network organization

A complete understanding of the brain requires an integrated description ofthe numerous scales of neural organization. It means studying the interplay ofgenes, synapses, and even whole brain regions which ultimately leads todifferent types of behavior, from perception to action, … | Continue reading


@arxiv.org | 1 year ago

One Bad Apple Can Spoil Your IPv6 Privacy

IPv6 is being more and more adopted, in part to facilitate the millions ofsmart devices that have already been installed at home. Unfortunately, we findthat the privacy of a substantial fraction of end-users is still at risk,despite the efforts by ISPs and electronic vendors to i … | Continue reading


@arxiv.org | 1 year ago

Simple Open-Vocabulary Object Detection with Vision Transformers

Combining simple architectures with large-scale pre-training has led tomassive improvements in image classification. For object detection,pre-training and scaling approaches are less well established, especially inthe long-tailed and open-vocabulary setting, where training data i … | Continue reading


@arxiv.org | 1 year ago

A summary of modern physics in one table

A compact summary of present fundamental physics is given and evaluated. Its9 lines contain both general relativity and the standard model of particlephysics. Their precise agreement with experiments, in combination with theirextreme simplicity and their internal consistency, sug … | Continue reading


@arxiv.org | 1 year ago

Wireless Agile Interconnects for Heterogeneous Multi-Chip Processors

The main design principles in computer architecture have recently shiftedfrom a monolithic scaling-driven approach to the development of heterogeneousarchitectures that tightly co-integrate multiple specialized processor andmemory chiplets. In such data-hungry multi-chip architec … | Continue reading


@arxiv.org | 1 year ago

An Open-Source Cultural Consensus Approach to Name-Based Gender Classification

Name-based gender classification has enabled hundreds of otherwise infeasiblescientific studies of gender. Yet, the lack of standardization, proliferationof ad hoc methods, reliance on paid services, understudied limitations, andconceptual debates cast a shadow over many applicat … | Continue reading


@arxiv.org | 1 year ago

Detection of Compiler- and Linker-Introduced Leakage

Cache template attacks demonstrated automated leakage of user input in sharedlibraries. However, for large binaries, the runtime is prohibitively high.Other automated approaches focused on cryptographic implementations and mediasoftware but are not directly applicable to user inp … | Continue reading


@arxiv.org | 1 year ago

Finding smart contract vulnerabilities with ConCert

We provide three detailed case studies of vulnerabilities in smart contracts,and show how property-based testing would have found them: 1. the Dexter1 token exchange; 2. the iToken; 3. the ICO of Brave's BAT token. The last example is, in fact, new, and was missed in the audi … | Continue reading


@arxiv.org | 1 year ago

CoqQ: Foundational Verification of Quantum Programs

CoqQ is a framework for reasoning about quantum programs in the Coq proofassistant. Its main components are: a deeply embedded quantum programminglanguage, in which classic quantum algorithms are easily expressed, and anexpressive program logic for proving properties of programs. … | Continue reading


@arxiv.org | 1 year ago

A Fast Text-Driven Approach for Generating Artistic Content

In this work, we propose a complete framework that generates visual art.Unlike previous stylization methods that are not flexible with style parameters(i.e., they allow stylization with only one style image, a single stylizationtext or stylization of a content image from a certai … | Continue reading


@arxiv.org | 1 year ago

Prompt-to-Prompt Image Editing with Cross Attention Control

Recent large-scale text-driven synthesis models have attracted much attentionthanks to their remarkable capabilities of generating highly diverse imagesthat follow given text prompts. Such text-based synthesis methods areparticularly appealing to humans who are used to verbally d … | Continue reading


@arxiv.org | 1 year ago

RDMA is Turing complete, we just did not know it yet

It is becoming increasingly popular for distributed systems to exploitoffload to reduce load on the CPU. Remote Direct Memory Access (RDMA) offload,in particular, has become popular. However, RDMA still requires CPUintervention for complex offloads that go beyond simple remote me … | Continue reading


@arxiv.org | 1 year ago

An Empirical Study on Production Dependencies in NPM

Modern software systems are often built by leveraging code written by othersin the form of libraries and packages to accelerate their development. Whilethere are many benefits to using third-party packages, software projects oftenbecome dependent on a large number of software pac … | Continue reading


@arxiv.org | 1 year ago

When modern graph neural networks do worse than classical greedy algorithms

The recent work ``Combinatorial Optimization with Physics-Inspired GraphNeural Networks'' [Nat Mach Intell 4 (2022) 367] introduces a physics-inspiredunsupervised Graph Neural Network (GNN) to solve combinatorial optimizationproblems on sparse graphs. To test the performances of … | Continue reading


@arxiv.org | 1 year ago

Large Language models and the reverse Turing test [pdf]

Large Language Models (LLMs) have been transformative. They are pre-trainedfoundational models that can be adapted with fine tuning to many differentnatural language tasks, each of which previously would have required a separatenetwork model. This is one step closer to the extrao … | Continue reading


@arxiv.org | 1 year ago

Overwatch: Learning Patterns in Code Edit Sequences

Integrated Development Environments (IDEs) provide tool support to automatemany source code editing tasks. Traditionally, IDEs use only the spatialcontext, i.e., the location where the developer is editing, to generatecandidate edit recommendations. However, spatial context alone … | Continue reading


@arxiv.org | 1 year ago

Firefly: A browser-based interactive 3D data visualization tool for large data

We present Firefly, a new browser-based interactive tool for visualizing 3Dparticle data sets. On a typical personal computer, Firefly can simultaneouslyrender and enable real-time interactions with > ~10 million particles, and caninteractively explore datasets with billions of p … | Continue reading


@arxiv.org | 1 year ago

Face Verification Bypass [pdf]

Face verification systems aim to validate the claimed identity using featurevectors and distance metrics. However, no attempt has been made to bypass sucha system using generated images that are constrained by the same featurevectors. In this work, we train StarGAN v2 to generate … | Continue reading


@arxiv.org | 1 year ago

Harmony Explained: Progress Towards a Scientific Theory of Music

Most music theory books are like medieval medical textbooks: they containunjustified superstition, non-reasoning, and funny symbols glorified by Latinphrases. How does music, in particular harmony, actually work, presented as areal, scientific theory of music? The core to our ap … | Continue reading


@arxiv.org | 1 year ago

A Retrospective on ICSE 2022

The 44th International Conference on Software Engineering (ICSE 2022) washeld in person from May 22 to May 27, 2022 in Pittsburgh, PA, USA. Here, wesummarize themes of research and the direction of research in the field ofsoftware engineering and testing that we observed at the c … | Continue reading


@arxiv.org | 1 year ago

Publicly verifiable quantum money from random lattices

Publicly verifiable quantum money is a protocol for the preparation ofquantum states that can be efficiently verified by any party for authenticitybut is computationally infeasible to counterfeit. We develop a cryptographicscheme for publicly verifiable quantum money based on Gau … | Continue reading


@arxiv.org | 1 year ago

A Hazard Analysis Framework for Code Synthesis Large Language Models

Codex, a large language model (LLM) trained on a variety of codebases,exceeds the previous state of the art in its capacity to synthesize andgenerate code. Although Codex provides a plethora of benefits, models that maygenerate code on such scale have significant limitations, ali … | Continue reading


@arxiv.org | 1 year ago

Fibre-optic cables could be used to spy on people a kilometre away

The optical fiber network has become a worldwide infrastructure. In additionto the basic functions in telecommunication, its sensing ability has attractedmore and more attention. In this paper, we discuss the risk of household fiberbeing used for eavesdropping and demonstrate its … | Continue reading


@arxiv.org | 1 year ago

The Importance of (Exponentially More) Computing Power

Denizens of Silicon Valley have called Moore's Law "the most important graphin human history," and economists have found that Moore's Law-powered I.T.revolution has been one of the most important sources of national productivitygrowth. But data substantiating these claims tend to … | Continue reading


@arxiv.org | 1 year ago

Efficient Training of Language Models to Fill in the Middle

We show that autoregressive language models can learn to infill text after weapply a straightforward transformation to the dataset, which simply moves aspan of text from the middle of a document to its end. While this dataaugmentation has garnered much interest in recent years, w … | Continue reading


@arxiv.org | 1 year ago

Learning and Inference in Sparse Coding Models with Langevin Dynamics

We describe a stochastic, dynamical system capable of inference and learningin a probabilistic latent variable model. The most challenging problem in suchmodels - sampling the posterior distribution over latent variables - isproposed to be solved by harnessing natural sources of … | Continue reading


@arxiv.org | 1 year ago

Exploring the Unprecedented Privacy Risks of the Metaverse

Thirty study participants playtested an innocent-looking "escape room" gamein virtual reality (VR). Behind the scenes, an adversarial program hadaccurately inferred over 25 personal data attributes, from anthropometrics likeheight and wingspan to demographics like age and gender, … | Continue reading


@arxiv.org | 1 year ago

Causal foundations of bias, disparity and fairness

The study of biases, such as gender or racial biases, is an important topicin the social and behavioural sciences. However, the concept of bias is notalways clearly defined in the literature. Definitions of bias are oftenambiguous, or definitions are not provided at all. To study … | Continue reading


@arxiv.org | 1 year ago

Mission to reach and operate at the focal region of the solar gravitational lens

We present initial results of an ongoing engineering study on the feasibilityof a space mission to the focal region of the solar gravitational lens (SGL).The mission goal is to conduct exoplanet imaging operations at heliocentricdistances in the range ~548-900 astronomical units … | Continue reading


@arxiv.org | 1 year ago

StockBot: Using LSTMs to Predict Stock Prices

The evaluation of the financial markets to predict their behaviour have beenattempted using a number of approaches, to make smart and profitable investmentdecisions. Owing to the highly non-linear trends and inter-dependencies, it isoften difficult to develop a statistical approa … | Continue reading


@arxiv.org | 1 year ago

Visualising Image Classification Models and Saliency Maps

This paper addresses the visualisation of image classification models, learntusing deep Convolutional Networks (ConvNets). We consider two visualisationtechniques, based on computing the gradient of the class score with respect tothe input image. The first one generates an image, … | Continue reading


@arxiv.org | 1 year ago

Security policy audits: Why and How

Information security isn't just about software and hardware -- it's at leastas much about policies and processes. But the research community overwhelminglyfocuses on the former over the latter, while gaping policy and process problemspersist. In this experience paper, we describe … | Continue reading


@arxiv.org | 1 year ago

Machine Learning Modeling to Evaluate the Value of Football Players

In most sports, especially football, most coaches and analysts search for keyperformance indicators using notational analysis. This method utilizes astatistical summary of events based on video footage and numerical records ofgoal scores. Unfortunately, this approach is now obsol … | Continue reading


@arxiv.org | 1 year ago

AI Feynman 2.0: Pareto-optimal symbolic regression exploiting graph modularity

We present an improved method for symbolic regression that seeks to fit datato formulas that are Pareto-optimal, in the sense of having the best accuracyfor a given complexity. It improves on the previous state-of-the-art bytypically being orders of magnitude more robust toward n … | Continue reading


@arxiv.org | 1 year ago

Mimetic Models: Ethical Implications of AI That Acts Like You

An emerging theme in artificial intelligence research is the creation ofmodels to simulate the decisions and behavior of specific people, in domainsincluding game-playing, text generation, and artistic expression. These modelsgo beyond earlier approaches in the way they are tailo … | Continue reading


@arxiv.org | 1 year ago

Ballooning Spiders: The Case for Electrostatic Flight

We consider general aspects of the physics underlying the flight of Gossamerspiders, also known as ballooning spiders. We show that existing observationsand the physics of spider silk in the presence of the Earth's staticatmospheric electric field indicate a potentially important … | Continue reading


@arxiv.org | 1 year ago

Embodied Carbon: The Dirty Secret of SSDs (8x More Than HDD)

Scalable Solid-State Drives (SSDs) have revolutionized the way we store andaccess our data across datacenters and handheld devices. Unfortunately, scalingtechnology can have a significant environmental impact. Across the globe, mostsemiconductor manufacturing use electricity that … | Continue reading


@arxiv.org | 1 year ago

On the Value of Wikipedia as a Gateway to the Web

By linking to external websites, Wikipedia can act as a gateway to the Web.To date, however, little is known about the amount of traffic generated byWikipedia's external links. We fill this gap in a detailed analysis of usagelogs gathered from Wikipedia users' client devices. Our … | Continue reading


@arxiv.org | 1 year ago

Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js

Prototype pollution is a dangerous vulnerability affecting prototype-basedlanguages like JavaScript and the Node.js platform. It refers to the ability ofan attacker to inject properties into an object's root prototype at runtime andsubsequently trigger the execution of legitimate … | Continue reading


@arxiv.org | 1 year ago

Drivable Volumetric Avatars Using Texel-Aligned Features

Photorealistic telepresence requires both high-fidelity body modeling andfaithful driving to enable dynamically synthesized appearance that isindistinguishable from reality. In this work, we propose an end-to-endframework that addresses two core challenges in modeling and driving … | Continue reading


@arxiv.org | 1 year ago

Crypto Giveaway Scam with YouTube Live Stream

This paper investigates the cryptocurrency giveaway scam with the YouTubelive stream carried out on 5/15/2022 and 5/16/2022. In this scam scheme, thescammer plays a recorded video of a famous person in a YouTube live streamannotated with a cryptocurrency giveaway announcement. In … | Continue reading


@arxiv.org | 1 year ago

Why do tree-based models still outperform deep learning on tabular data?

While deep learning has enabled tremendous progress on text and imagedatasets, its superiority on tabular data is not clear. We contribute extensivebenchmarks of standard and novel deep learning methods as well as tree-basedmodels such as XGBoost and Random Forests, across a larg … | Continue reading


@arxiv.org | 1 year ago

Securing name resolution in the IoT: DNS over CoAP

In this paper, we present the design, implementation, and analysis of DNSover CoAP (DoC), a new proposal for secure and privacy-friendly name resolutionof constrained IoT devices. We implement different design choices of DoC inRIOT, an open-source operating system for the IoT, ev … | Continue reading


@arxiv.org | 1 year ago

Formal Algorithms for Transformers

This document aims to be a self-contained, mathematically precise overview oftransformer architectures and algorithms (*not* results). It covers whattransformers are, how they are trained, what they are used for, their keyarchitectural components, and a preview of the most promin … | Continue reading


@arxiv.org | 1 year ago

Gaussian Blue Noise

Among the various approaches for producing point distributions with bluenoise spectrum, we argue for an optimization framework using Gaussian kernels.We show that with a wise selection of optimization parameters, this approachattains unprecedented quality, provably surpassing the … | Continue reading


@arxiv.org | 1 year ago