The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications...
Passive operating system fingerprinting reveals valuable information to the defenders of heterogeneous private networks; at the same time, attackers can use fingerprinting to reconnoiter networks, so defenders need obfuscation techniques to foil them. We present an effective approach for passive fingerprinting that uses data features from TLS as well as the TCP/IP and HTTP protocols in a multi-session...
We address security and trust in the context of a commercial IP camera. We take a hands-on approach, as we not only define abstract vulnerabilities, but we actually implement the attacks on a real camera. We then discuss the nature of the attacks and the root cause; we propose a formal model of trust that can be used to address the vulnerabilities by explicitly constraining compositionality for trust...
Cyber attacks are a critical threat to government infrastructure, commercial enterprises and personal devices. When belligerents attack cyber systems, they need to spread laterally to reach high value targets and communicate with their command and control sites. Intuitively, a layered defense including intrusion detection systems will limit the adversary's exploitation of the target. We apply lessons...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
We study the secure storage of the output of a data source on a public database. We consider a rather large class of data sources. In order to prevent unauthorized users from learning the output of the data source we make use of the output of a biometric source or a physical unclonable function (PUF). As we regard the output of the PUF source as a resource, we are interested in the smallest possible...
Attacks authored by state sponsored actors, criminal outfits, ideological enclaves and recreational hackers continue to trouble public and private cyber systems. In order to create and/or maintain an advantage over their adversaries, cyber defenders must pursue novel ways to detect, attribute and respond to offensive operations. Linkography is a topic that has been explored for decades that has found...
The database-driven CRN has emerged as a promising solution for the spectrum scarcity issue. However, it also raises severe privacy concerns. Although there are some existing works on this topic, they are far from practical due to their restrict on particular database structures or extremely heavy computation and communication overhead. To address these issues, in this paper we develop two practical...
Fundamental limits of covert communication have been studied for different models of scalar channels. It was shown that, over n independent channel uses, O(√n) bits can transmitted reliably over a public channel while achieving an arbitrarily low probability of detection (LPD) by other stations. This result is well known as the square-root law and even to achieve this diminishing rate of covert communication,...
Future automated vehicles will rely on V2V communication to exchange information about their motion states and take corresponding control actions, to enhance road safety and efficiency. Evaluating the trustworthiness of such data in a VANET is critical as malicious vehicles may inject false data which will undermine the benefits of V2V communication and lead to severe consequences, such as collisions...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
The described proof-of-concept demonstrates, how manifest manipulation enables dynamic ad insertion and flexible over-the-top streaming workflows including ondemand-to-live services across a multitude of devices and platforms via MPEG-DASH, HLS and hybrid TV environments like HbbTV. Content manipulation and dynamic ad insertion is realized through non-video-intrusive technologies operating on manifest...
In this work, we examine an access scope, a concept in authorization management broadly applied for the specification of access constraints in web service integrations. By analyzing a typical use-case of cross-organizational cloud service automation, we show the suboptimal capabilities of static, coarse-grained and inflexible scopes that negatively impact security and management of service integrations...
Today geolocation data is used extensively in multiple applications and devices. GPS trajectory data can reveal political, religious affiliations, personal habits, shopping preferences etc. It threatens large number of users who use location-based services on their devices, because they are afraid of revealing their locations and concerned about being tracked. Multiple approaches have been proposed...
In this paper, we study a wireless cooperative secure transmission system with the help of a friendly cooperative jammer Chad to interfere a potential malicious eavesdropper Eve. For imperfect channel estimation, we continue to follow the optimal power allocation and the maximum secrecy rate design of the perfect channel. Considering channel estimation scenario in the actual communication environment,...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
Traditional deception-based cyber defenses often undertake reactive strategies that utilize decoy systems or services for attack detection and information gathering. Unfortunately, the effectiveness of these defense mechanisms has been largely constrained by the low decoy fidelity, the poor scalability of decoy platform, and the static decoy configurations, which allow the attackers to identify and...
Cyber-Physical Systems (CPSs) are ubiquitous in power systems, transport and medical systems, and critical infrastructures. Current protocols and applications allow significant changes to a system to take place within a short time or small network footprint, which can be exploited by attackers to cause a great impact on the physical systems. This paper proposes adaptive Commensurate Response (CR)...
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to...
Accurate Channel State Information (CSI) is a key requirement for massive MIMO to achieve multi-fold increases in throughput and secrecy rate. Consequently, an adversary targeting the channel sounding process has the potential to significantly degrade performance. In this paper, we first present and model the Pilot Distortion Attack, a simple but devastating jamming strategy in which the adversary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.