Aggregator
Submit #749986: EFM iptime A6004MX 14.18.2 Authentication Bypass & Arbitrary File Upload leading to RCE [Accepted]
CVE-2026-2549 | zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1 BookController.java access control
CVE-2026-2548 | WAYOS FBM-220G 24.10.19 rc sub_40F820 upnp_waniface/upnp_ssdp_interval/upnp_max_age command injection
Submit #749873: https://github.com/zhanghuanhao/LibrarySystem LibrarySystem v1.1.1 Improper Access Control [Accepted]
CVE-2026-2547 | LigeroSmart up to 6.1.26 /otrs/index.pl AgentDashboard Subaction cross site scripting (Issue 284)
CVE-2026-2546 | LigeroSmart up to 6.1.26 /otrs/index.pl SortBy cross site scripting (Issue 283)
CVE-2026-2545 | LigeroSmart up to 6.1.26 index.pl?Action=AgentTicketSearch Profile cross site scripting (Issue 282)
Submit #749802: WAYOS FBM220G and others 24.10.19 Command Injection [Accepted]
Как обезвредить врага без стрельбы? Выжечь глаза и датчики: новые ИИ-платформы бьют лазером точно в уязвимые места
Submit #749788: LigeroSmart LigeroSmart / OTRS 6.1.27 Cross-Site Scripting (XSS) – Reflected Subaction parameter [Accepted]
Submit #749784: LigeroSmart LigeroSmart (OTRS-based platform) 6.1.27 Cross-Site Scripting (XSS) - Reflected XSS [Accepted]
Submit #749758: LigeroSmart 6.1.26 Cross-Site Scripting (XSS) - Reflected XSS [Accepted]
NDSS 2025 – Diffence: Fencing Membership Privacy With Diffusion Models
Session 12C: Membership Inference
Authors, Creators & Presenters:
PAPER
Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Deep learning models, while achieving remarkable performances across various tasks, are vulnerable to membership inference attacks (MIAs), wherein adversaries identify if a specific data point was part of the model's training set. This susceptibility raises substantial privacy concerns, especially when models are trained on sensitive datasets. Although various defenses have been proposed, there is still substantial room for improvement in the privacy-utility trade-off. In this work, we introduce a novel defense framework against MIAs by leveraging generative models. The key intuition of our defense is to *remove the differences between member and non-member inputs*, which is exploited by MIAs, by re-generating input samples before feeding them to the target model. Therefore, our defense, called Diffence, works *pre inference*, which is unlike prior defenses that are either training-time (modify the model) or post-inference time (modify the model's output). A unique feature of Diffence is that it works on input samples only, without modifying the training or inference phase of the target model. Therefore, it can be cascaded with other defense mechanisms as we demonstrate through experiments. Diffence is specifically designed to preserve the model's prediction labels for each sample, thereby not affecting accuracy. Furthermore, we have empirically demonstrated that it does not reduce the usefulness of the confidence vectors. Through extensive experimentation, we show that Diffence can serve as a robust plug-n-play defense mechanism, enhancing membership privacy without compromising model utility--both in terms of accuracy and the usefulness of confidence vectors--across standard and defended settings. For instance, Diffence reduces MIA attack accuracy against an undefended model by 15.8% and attack AUC by 14.0% on average across three datasets, all without impacting model utility. By integrating Diffence with prior defenses, we can achieve new state-of-the-art performances in the privacy-utility trade-off. For example, when combined with the state-of-the-art SELENA defense it reduces attack accuracy by 9.3%, and attack AUC by 10.0%. Diffence achieves this by imposing a negligible computation overhead, adding only 57ms to the inference time per sample processed on average.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Diffence: Fencing Membership Privacy With Diffusion Models appeared first on Security Boulevard.
CVE-2026-2544 | yued-fe LuLu UI up to 3.0.0 run.js child_process.exec os command injection
SecWiki News 2026-02-15 Review
更多最新文章,请访问SecWiki