Quantcast
Channel: Latest Results
Browsing latest articles
Browse All 28 View Live

Formal Aspects of Security and Trust

View Article



Preface of Special Issue on “Computer Security: Foundations and Automated...

View Article

Model-based qualitative risk assessment for availability of IT infrastructures

AbstractFor today’s organisations, having a reliable information system is crucial to safeguard enterprise revenues (think of on-line banking, reservations for e-tickets etc.). Such a system must often...

View Article

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis...

AbstractIn recent years we have witnessed several complex and high-impact attacks specifically targeting “binary” protocols (RPC, Samba and, more recently, RDP). These attacks could not be detected by...

View Article

Risk and Business Goal Based Security Requirement and Countermeasure...

AbstractCompanies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security” but...

View Article


Formal Aspects of Security and Trust

View Article

The POLIPO Security Framework

AbstractSystems of systems are dynamic coalitions of distributed, autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of...

View Article

Policy Administration in Tag-Based Authorization

AbstractTag-Based Authorization (TBA) is a hybrid access control model that combines the ease of use of extensional access control models with the expressivity of logic-based formalisms. The main...

View Article


Linking Unlinkability

AbstractUnlinkability is a privacy property of crucial importance for several systems (such as RFID or voting systems). Informally, unlinkability states that, given two events/items in a system, an...

View Article


On Emulation-Based Network Intrusion Detection Systems

AbstractEmulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an...

View Article

Hunting the Unknown

AbstractData leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue...

View Article

Experimental Validation of a Risk Assessment Method

Abstract[Context and motivation] It is desirable that requirement engineering methods are reliable, that is, that methods can be repeated with the same results. Risk assessments methods, however, often...

View Article

Towards Useful Anomaly Detection for Back Office Networks

AbstractIn this paper we present a protocol-aware anomaly detection framework specifically designed for back office networks together with a new automatic method for feature selection that allows to...

View Article


$$\mu $$ Shield

AbstractEmbedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical...

View Article

Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin...

AbstractInput/Output is the mechanism through which Programmable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of...

View Article


From Intrusion Detection to Software Design

AbstractI believe the single most important reason why we are so helpless against cyber-attackers is that present systems are not supervisable. This opinion is developed in years spent working on...

View Article

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks

AbstractIn smart buildings, cyber-physical components (e.g., controllers, sensors, and actuators) communicate with each other using network protocols such as BACnet. Many of these devices are now...

View Article


Leveraging Semantics for Actionable Intrusion Detection in Building...

AbstractIn smart buildings, physical components (e.g., controllers, sensors, and actuators) are interconnected and communicate with each other using network protocols such as BACnet. Many smart...

View Article

A Matter of Life and Death: Analyzing the Security of Healthcare Networks

AbstractHealthcare Delivery Organizations (HDOs) are complex institutions where a broad range of devices are interconnected. This inter-connectivity brings security concerns and we are observing an...

View Article

Demonstration of new attacks on three healthcare network protocols in a lab...

AbstractHealthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected medical devices which can deliver health...

View Article
Browsing latest articles
Browse All 28 View Live




Latest Images