CYBER-DEFENCE FELLOWSHIPS: Ana-Maria Cretu

© 2025 EPFL
To promote research and education in cyber-defence, EPFL and the Cyber-Defence (CYD) Campus will soon launch a new call for Doctoral and Distinguished Postdoctoral Fellowships – A Talent Program for Cyber-Defence Research.
This month we introduce you to Ana-Maria Cretu, a CYD Distinguished Postdoctoral Fellowship recipient in the Security and Privacy Engineering Laboratory (SPRING) at EPFL.
- How did you find out about the CYD Fellowships and what motivated you to apply?
- What was your CYD Fellowship project about?
The goal of my CYD fellowship project was to study the privacy and security of emerging data-driven technologies such as generative AI and synthetic data. In my main lead-author project, I study whether it is possible to prevent harmful content generation by general-purpose image generative AI models. Recently, models such as DALL-E 2 and Stable Diffusion have achieved impressive capabilities in generating photorealistic images from natural language descriptions. However, they are also used to create photorealistic AI-generated child sexual abuse material of real and fictional children on an unprecedented scale. This has led to calls for technical approaches to prevent the generation of this harmful and illegal content. In this project, I am implementing and evaluating a defense called concept filtering. This project is the result of an interdisciplinary collaboration with researchers in security, computer vision, and online abuse from Switzerland, the US and Germany, which I am leading. I found this collaboration to be a very enriching experience from a professional standpoint. Apart from this big project, I am also working on several projects relating to the privacy of synthetic data and other machine learning applications.
- What were the advantages of conducting your master thesis project at the CYD Campus?
- Did you as a child dream of working in cyber-defence?
- What is driving you to pursue research in cyber-defence?
I was fortunate to study these topics -- the limits and privacy harms of data-driven technologies – during my doctoral thesis. For instance, I developed ML-based tools for automatically discovering privacy vulnerabilities in data releases, enabling more comprehensive auditing of these systems. I also evaluated the robustness of client-side scanning solutions for detecting illegal content in end-to-end-encrypted communications. Finally, I explored new threats and attack methods against machine learning models. Working on these projects has made me aware of the importance of rigorously evaluating claims made about the capabilities and privacy of data-driven technologies, and of developing tools and frameworks for making these evaluations more accessible to practitioners and policymakers.
- What is the most important lesson you have learned in your scientific career so far?
- What are you most proud of in your career to date?
I am proud of the contributions I made during my PhD work.
One of these contributions is developing the first automated method, along with an open source tool, to analyze the privacy of query-based systems. Modern privacy regulation, such as the European Union’s General Data Protection Regulation (GDPR) and Switzerland’s New Federal Act on Data Protection (nFDAP), impose strict limits on the sharing and use of personal data. Sharing de-identified record-level data has been shown repeatedly to not satisfy the definitions of anonymization of these laws, and has thus fallen out of favor. Query-based systems (QBS) are a popular alternative to record-level releases, where analysts are given access to the data through a controlled interface, i.e., they can query a dataset for aggregate statistics without directly accessing individual records. Ensuring that QBSes provide adequate privacy protection is however extremely challenging, and QBSs often implement complex combinations of defenses, making their privacy difficult to analyze. Yet, manually designing and implementing attacks against complex and expressive QBSes is a difficult and time-consuming process. To address this problem, I developed QuerySnout, the first automated method for discovering privacy vulnerabilities in QBSs. QuerySnout is a general method that combines evolutionary search techniques to explore the space of queries susceptible to privacy attacks using machine learning and to combine the answers to the queries in order to infer sensitive information about individuals. My work enabled for the first time the automated search for privacy attacks against QBSs, at the click of a button, making privacy evaluations more accessible to data practitioners.
Another contribution is proposing the first evaluation of robustness of perceptual hashing-based client-side scanning (PH-CSS) to adversarial evasion attacks. End-to-end-encrypted (E2EE) communications have been argued by law enforcement agencies to facilitate the sharing of Child Sexual Abuse Material (CSAM), by hiding the content of the communication. To address this concern, PH-CSS solutions have been proposed by governments, researchers, industry, and child safety organizations as the most promising solution that would not altogether remove E2EE. PH-CSS would indeed detect illegal content directly on the user's device before encryption. Given the pervasive scope of PH-CSS deployment, these regulations have been strongly criticized by privacy and security researchers. Our evaluation of PH-CSS solutions showed that they cannot reliably detect CSAM in the presence of adversaries, as bad actors can almost always imperceptibly modify an image to evade detection. The results of this evaluation have contributed critical evidence in the worldwide debate about whether CSS solutions can reliably detect illegal content such as CSAM, and are often referenced by researchers and policymakers. For instance, our paper was cited by Ofcom, the UK's communication regulator, in its report on perceptual hashing technologies, and by researchers in an open letter on the EU’s proposed Child Sexual Abuse Regulation.
- Outside the lab, what do you enjoy doing most?
- What were your expectations about the CYD Fellowships?
- Could you share some tips with future applicants who are considering applying for the CYD Fellowships?
I have two pieces of advice: to consider how your research proposal is relevant to the CYD, and to contact previous postdoctoral fellows to better understand the requirements of the CYD fellowship. To future applicants: do not hesitate to reach out if you have questions.