Aggregator
NDSS 2025 – URVFL: Undetectable Data Reconstruction Attack On Vertical Federated Learning
Session 5C: Federated Learning 1
Authors, Creators & Presenters: Duanyi Yao (Hong Kong University of Science and Technology), Songze Li (Southeast University), Xueluan Gong (Wuhan University), Sizai Hou (Hong Kong University of Science and Technology), Gaoning Pan (Hangzhou Dianzi University)
PAPER
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning
Vertical Federated Learning (VFL) is a collaborative learning paradigm designed for scenarios where multiple clients share disjoint features of the same set of data samples. Albeit a wide range of applications, VFL is faced with privacy leakage from data reconstruction attacks. These attacks generally fall into two categories: honest-but-curious (HBC), where adversaries steal data while adhering to the protocol; and malicious attacks, where adversaries breach the training protocol for significant data leakage. While most research has focused on HBC scenarios, the exploration of malicious attacks remains limited. Launching effective malicious attacks in VFL presents unique challenges: 1) Firstly, given the distributed nature of clients' data features and models, each client rigorously guards its privacy and prohibits direct querying, complicating any attempts to steal data; 2) Existing malicious attacks alter the underlying VFL training task, and are hence easily detected by comparing the received gradients with the ones received in honest training. To overcome these challenges, we develop URVFL, a novel attack strategy that evades current detection mechanisms. The key idea is to integrate a discriminator with auxiliary classifier that takes a full advantage of the label information and generates malicious gradients to the victim clients: on one hand, label information helps to better characterize embeddings of samples from distinct classes, yielding an improved reconstruction performance; on the other hand, computing malicious gradients with label information better mimics the honest training, making the malicious gradients indistinguishable from the honest ones, and the attack much more stealthy. Our comprehensive experiments demonstrate that URVFL significantly outperforms existing attacks, and successfully circumvents SOTA detection methods for malicious attacks. Additional ablation studies and evaluations on defenses further underscore the robustness and effectiveness of URVFL
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – URVFL: Undetectable Data Reconstruction Attack On Vertical Federated Learning appeared first on Security Boulevard.
DorkAgent: LLM-powered agent for automated Google Dorking in bug hunting & pentesting
GitHub: Threat Actor Usernames Scrape
«Звезда смерти», но добрая. Как работает технология передачи энергии с 35 000 км.
CVE-2025-4951 | Rapid7 AppSpider Pro 6.14.053/6.14.060 Configuration File ScanName cross site scripting
CVE-2025-53840 | Icinga DB Web up to 1.2.1 information disclosure
CVE-2023-53366 | Linux Kernel up to 6.1.15/6.2.2 iocore_0 allocation of resources (Nessus ID 265593)
CVE-2023-53367 | Linux Kernel up to 6.4.11 user_mappings memory leak (Nessus ID 265627)
CVE-2023-53368 | Linux Kernel up to 6.5.2 tracing ring_buffer.c rb_end_commit buffer overflow (Nessus ID 265675)
CVE-2022-50375 | Linux Kernel up to 5.4.219/5.10.149/5.15.74/5.19.16/6.0.2 tty fsl_lpuart denial of service (Nessus ID 265606 / WID-SEC-2025-2092)
CVE-2022-50376 | Linux Kernel up to 5.4.228/5.10.162/5.15.85/6.0.15/6.1.1 Orangefs memory leak (Nessus ID 265905 / WID-SEC-2025-2092)
CVE-2022-50379 | Linux Kernel up to 6.0.2 btrfs_quota_enable use after free (Nessus ID 265600 / WID-SEC-2025-2092)
CVE-2022-50378 | Linux Kernel up to 5.15.74/5.19.16/6.0.2 __list_del_entry_valid use after free (Nessus ID 265547 / WID-SEC-2025-2092)
CVE-2022-50380 | Linux Kernel up to 5.15.75 mm /proc/pid/smaps_rollup null pointer dereference (EUVD-2025-29987 / Nessus ID 265601)
Rethinking Security as Access Control Moves to the Edge
The convergence of physical and digital security is driving a shift toward software-driven, open-architecture edge computing. Access control has typically been treated as a physical domain problem — managing who can open which doors, using specialized systems largely isolated from broader enterprise IT. However, the boundary between physical and digital security is increasingly blurring. With..
The post Rethinking Security as Access Control Moves to the Edge appeared first on Security Boulevard.
Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority
OT oversight is an expensive industrial paradox. It’s hard to believe that an area can be simultaneously underappreciated, underfunded, and under increasing attack. And yet, with ransomware hackers knowing that downtime equals disaster and companies not monitoring in kind, this is an open and glaring hole across many ecosystems. Even a glance at the numbers..
The post Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority appeared first on Security Boulevard.
Backbase CISO: Defending Banking Apps at Runtime
There’s a major problem in application security: Organizations secure code before release, but attackers strike in production. This gap is exactly where runtime application security comes in.
The post Backbase CISO: Defending Banking Apps at Runtime appeared first on Security Boulevard.