Dear all,
we are submitting the paper “Towards Privacy and Secure IoT Services
Based on Privacy-Enhancing Technologies” to International Workshop on
Secure Internet of Things 2019 (SIOT) in conjunction with ESORICS 2019.
Please find the paper in the attachment. The paper is in line with WP6
research program (Task 6.5 Privacy-by-Design) and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA. To be noted that
Author Notification date is August 10th, 2019 and Camera Ready date is
September 10th, 2019.
I would be pleased to provide any further information.
Thank you.
Best regards,
Lukas Malina
(BUT)
--
Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
Sorry for the delayed notification. We have submitted a paper with the
following title and abstract:
Title: "xMP: Selective Memory Protection for Kernel and User Space"
Abstract: Attackers leverage memory corruption vulnerabilities to
establish primitives for reading from or writing to the address space of
the vulnerable process. These primitives form the foundation for
code-reuse and data-oriented attacks. While various defenses against the
former class of attacks have proven effective, mitigation of the latter
remains an open problem. In this paper, we identify various shortcomings
of the x86 architecture regarding memory isolation, and leverage
virtualization to build an effective defense against data-oriented
attacks. We implement xMP, which consists of (in-guest) selective memory
protection primitives that equip VMs with the ability to isolate
sensitive data in user or kernel space into disjoint protection domains.
We interface the Xen altp2m subsystem with the Linux memory management
system, lending VMs the flexibility to define custom policies. Contrary
to conventional approaches, xMP takes advantage of virtualization
extensions, but after initialization, it does not require any hypervisor
intervention. To ensure the integrity of in-kernel management
information, and pointers to sensitive data within protection domains,
xMP protects pointers with HMACs bound to an immutable context, so that
integrity validation succeeds only in the right context. We have applied
xMP to fortify the page tables and process credentials of the Linux
kernel, as well as sensitive data in various user-space applications.
Overall, our evaluation shows that xMP introduces minimal overhead for
real-world workloads and applications, and offers effective protection
against data-oriented attacks.
Once this paper gets accepted, we will acknowledge SPARTA.
Best,
~Sergej
--
Sergej Proskurin, M.Sc.
Wissenschaftlicher Mitarbeiter
Technische Universität München
Fakultät für Informatik
Lehrstuhl für Sicherheit in der Informatik
Boltzmannstraße 3
85748 Garching (bei München)
Tel. +49 (0)89 289-18592
Fax +49 (0)89 289-18579
Dear all,
we plan to submit a paper to the ARES conference (3rd International
Workshop on Security and Forensics of IoT, dealine April 30, 2019). The
paper presents a secure Publish/Subscribe Protocol for Internet of
Things. Our proposal enhances the security and privacy of users using
MQTT-based services in IoT. Therefore, this paper is in line with WP6
that is focusing on security and privacy protection in IoT.
Please find a final version of our submission (for the first round of
double blind review) attached to this email.
Additional sensitive information in the final version is not expected.
Please let me know if
you have further questions.
Thank you very much!
Best regards,
Lukas Malina
(BUT, WP6 Task 6.5)
--
Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
We have submitted the paper „A Secure Self-Authenticable Data Transfer Protocol for Wireless Medical Sensor Networks“
Abstract: Development of IoT (The Internet of Things) introduces many new challenges. As IoT devices are getting smaller and smaller the problems of so called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens devices primarily communicating with each other (e. g. various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing and power resources so traditional security protocols and architectures doesn’t fit well also. To address these challenges the fog computing paradigm is used in which all constrained devices or “End Nodes” primarily communicate only with less constrained “Fog Node” device, which collects all data, processes it and communicates with the outside world. A new lightweight secure self-authenticable transfer protocol (SSATP) for communications between “Fog End” devices and “Fog Nodes” is presented in this paper. The primary target of the proposed protocol is to use it as a secure transport for CoAP in place of UDP and DTLS which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is better choice than UDP with DTLS in the cases where CoAP block transfer mode is used and/or in lossy networks.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Dear Sirs,
We are wiling to submit the attached paper to EWDTS 2019 conference.
The paper has been written by me, Paolo Prinetto and Gianluca Roascio (in cc).
Moreover, we are willing to participate as well to PHISIC 2019 Workshop with a talk and a poster presentation, you can find the abstract in attachment.
Thank you for your attention.
Best Regards,
Nicolò Maunero
Hello,
my apologies for spamming the list, but I am not sure who administrates it.
I would like to be removed from this mailing list.
Best wishes,
Dominique.
Dear all,
We just got the information that our paper has been accepted to FMCAD.
It is about a tool for generating automatically schedules for Time
Sensitive Networks (TSN). More information below.
We will acknowledge SPARTA for the final version.
TSNsched: Automated Schedule Generation for Time Sensitive Networking
Time Sensitive Networking (TSN) is a set of standards enabling high
performance deterministic communication using time scheduling. Due to the
size of industrial networks, configuring TSN networks is challenging to be
done manually. We present TSNsched, a tool for automatic generation of
schedules for TSN. TSNsched takes as input the logical topology of a net-
work, expressed as flows, and outputs schedules for TSN switches by using
an SMT-solver. The generated schedule guarantees the desired network
performance (specified in terms of latency and jitter), if such schedules
exist. TSNsched supports unicast and multicast flows, such as, in Publish
Subscribe networks; can combine existing variants of TSN scheduling
problems, and reason about the best-effort and priority TSN traffic.
TSNsched can be run as a standalone tool and also allows rapid prototyping
with the available JAVA API. We evaluate TSNsched on a number of
realistic-size network topologies. TSNsched can generate high performance
schedules, with average latency less than 1000μs, and average jitter less
than 20μs, for TSN networks, with up to 73 subscribers and up to 10
multicast flows.
Best,
Vivek Nigam
--
fortiss · Landesforschungsinstitut des Freistaats Bayern
An-Institut Technische Universität München
Guerickestraße 25
80805 München
Germany
Tel.: +49 (89) 3603522 527
Fax: +49 (89) 3603522 50
E-Mail: nigam(a)fortiss.org
http://www.fortiss.org
Amtsgericht München: HRB: 176633
USt-IdNr.: DE263907002, Steuer-Nr.: 143/237/25900
Rechtsform: gemeinnützige GmbH
Sitz der Gesellschaft: München
Geschäftsführer: Dr. Harald Rueß, Thomas Vallon
Vorsitzender des Aufsichtsrats: Dr. Manfred Wolter
Dear Sir or Madam,
I belong to IMT and I am personally involved in WP6 task 6.2.
We just wrote and submitted a paper to the 2019 FDTC workshop (http://conferenze.dei.polimi.it/FDTC19/index.html).
We carried out part of this research through our participation to T6.2.
I am very sorry we did not send you the paper before submission as I shall have done.
This won’t happen again, from now on I will be very careful to comply with the SPARTA dissemination process.
I hope it won’t be an issue to be able to acknowledge this work as part of SPARTA.
Please find the paper in attachment. It describes an extension of the laser fault injection model. In my opinion, it does not contain any sensitive information.
I would be pleased to provide any further information.
I’m looking forward your authorization,
With my best regards,
Jean-Max Dutertre
--------------------------------------------------------------
Jean-Max Dutertre
Head of the SAS dpt.
Professor
Secure Architectures and Systems department - SAS
Ecole Nationale Supérieure des Mines de Saint-Etienne
Centre Microélectronique de Provence - Campus Georges Charpak Provence
880, av. de Mimet
13541 Gardanne, France
Bureau A.2.23
Tel : +33 (0)4 42 61 67 36
Fax : +33 (0)4 42 61 65 92
E-mail: dutertre(a)emse.fr <mailto:dutertre@emse.fr>
Web : www.emse.fr/~dutertre <http://www.emse.fr/~dutertre>
--------------------------------------------------------------