Dear all,
we are submitting the paper “Towards Privacy and Secure IoT Services
Based on Privacy-Enhancing Technologies” to International Workshop on
Secure Internet of Things 2019 (SIOT) in conjunction with ESORICS 2019.
Please find the paper in the attachment. The paper is in line with WP6
research program (Task 6.5 Privacy-by-Design) and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA. To be noted that
Author Notification date is August 10th, 2019 and Camera Ready date is
September 10th, 2019.
I would be pleased to provide any further information.
Thank you.
Best regards,
Lukas Malina
(BUT)
--
Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
Sorry for the delayed notification. We have submitted a paper with the
following title and abstract:
Title: "xMP: Selective Memory Protection for Kernel and User Space"
Abstract: Attackers leverage memory corruption vulnerabilities to
establish primitives for reading from or writing to the address space of
the vulnerable process. These primitives form the foundation for
code-reuse and data-oriented attacks. While various defenses against the
former class of attacks have proven effective, mitigation of the latter
remains an open problem. In this paper, we identify various shortcomings
of the x86 architecture regarding memory isolation, and leverage
virtualization to build an effective defense against data-oriented
attacks. We implement xMP, which consists of (in-guest) selective memory
protection primitives that equip VMs with the ability to isolate
sensitive data in user or kernel space into disjoint protection domains.
We interface the Xen altp2m subsystem with the Linux memory management
system, lending VMs the flexibility to define custom policies. Contrary
to conventional approaches, xMP takes advantage of virtualization
extensions, but after initialization, it does not require any hypervisor
intervention. To ensure the integrity of in-kernel management
information, and pointers to sensitive data within protection domains,
xMP protects pointers with HMACs bound to an immutable context, so that
integrity validation succeeds only in the right context. We have applied
xMP to fortify the page tables and process credentials of the Linux
kernel, as well as sensitive data in various user-space applications.
Overall, our evaluation shows that xMP introduces minimal overhead for
real-world workloads and applications, and offers effective protection
against data-oriented attacks.
Once this paper gets accepted, we will acknowledge SPARTA.
Best,
~Sergej
--
Sergej Proskurin, M.Sc.
Wissenschaftlicher Mitarbeiter
Technische Universität München
Fakultät für Informatik
Lehrstuhl für Sicherheit in der Informatik
Boltzmannstraße 3
85748 Garching (bei München)
Tel. +49 (0)89 289-18592
Fax +49 (0)89 289-18579
Dear All,
Our paper for IDEAL (info/notification below) is accepted :-).
We will send/upload to svn the final version soon.
The paper will be published in Nov.
Regards,
prof. Michal Choras
-------------------------- Wiadomość oryginalna --------------------------
Temat: Re: [SPARTA - bodies.dissemination-committee] Submission
Od: mchoras(a)itti.com.pl
Data: 1 Sierpnia 2019, 11:01 am, Cz
Do: Bodies.dissemination-committee(a)internal.sparta.eu
Kopia: "bodies.dissemination-committee(a)internal.sparta.eu"
<bodies.dissemination-committee(a)internal.sparta.eu>
--------------------------------------------------------------------------
Dear All,
We submitted Sparta and Safair relevant paper for IDEAL'19 which is well
known ML conference.
Title:
The feasibility of Deep learning use for adversarial model extraction in
The cybersecurity domain.
By: Pawlicki, Choras and Kozik.
If accepted we will acknowledge SPARTA.
Greetings from holidays in Italy.
Regards,
Prof. Michal Choras
> Dear all,
>
> We have submitted the paper ?A Secure Self-Authenticable Data Transfer
> Protocol for Wireless Medical Sensor Networks?
>
> Abstract: Development of IoT (The Internet of Things) introduces many new
> challenges. As IoT devices are getting smaller and smaller the problems of
> so called ?constrained devices? arise. The traditional Internet protocols
> are not very well suited for constrained devices comprising localized
> network nodes with tens devices primarily communicating with each other
> (e. g. various sensors in Body Area Network communicating with each
> other). These devices have very limited memory, processing and power
> resources so traditional security protocols and architectures doesn?t fit
> well also. To address these challenges the fog computing paradigm is used
> in which all constrained devices or ?End Nodes? primarily communicate only
> with less constrained ?Fog Node? device, which collects all data,
> processes it and communicates with the outside world. A new lightweight
> secure self-authenticable transfer protocol (SSATP) for communications
> between ?Fog End? devices and ?Fog Nodes? is presented in this paper. The
> primary target of the proposed protocol is to use it as a secure transport
> for CoAP in place of UDP and DTLS which are traditional choices in this
> scenario. SSATP uses modified header fields of standard UDP packets to
> transfer additional protocol handling and data flow management information
> as well as user data authentication information. The optional redundant
> data may be used to provide increased resistance to data losses when
> protocol is used in unreliable networks. The results of experiments
> presented in this paper show that SSATP is better choice than UDP with
> DTLS in the cases where CoAP block transfer mode is used and/or in lossy
> networks.
>
> This paper is still under evaluation.
> If it gets accepted, we will acknowledge SPARTA.
>
> Best,
> Algimantas Venčkauskas
> Kauno technologijos universitetas
> --
> bodies.dissemination-committee mailing list
> bodies.dissemination-committee(a)server.sparta.eu
> http://server.sparta.eu/cgi-bin/mailman/listinfo/bodies.dissemination-commi…
>
Dear all,
we have submitted the paper "Benchmarking UAQ Solvers"
to the 15th ACM ASIA Conference on Computer and Communications Security
(ACM ASIACCS 2020).
Abstract: The User Authorization Query (UAQ) Problem is key in systems
offering permission level user-system interaction, where the system
automatically determines the roles that need to be activated in order to
enable the requested permissions. Finding a solution to the problem amounts
to determining an optimum set of roles to activate in a given session in
order to obtain some permissions while satisfying a collection of
authorization constraints, most notably Dynamic Mutually-Exclusive Roles
(DMER) constraints. Even if the UAQ Problem is NP-hard, a number of
techniques to solve the UAQ problem have been put forward along with
encouraging experimental results based on different sets of synthetic
benchmarks. We propose a methodology for designing parametric benchmarks
for the UAQ problem and introduce and make publicly available a novel suite
of parametric benchmarks that allows for the systematic assessment of UAQ
solvers over a number of relevant dimensions. By running three prominent
UAQ solvers against our benchmarks we provide a comprehensive and
comparative analysis of unprecedented breadth from which it can be
concluded that currently available benchmarks are not adequate to the task
and that the reduction to PMaxSAT is currently the most effective approach
to tackling the UAQ problem.
If it gets accepted, we will acknowledge SPARTA.
Note: Since ASIACCS employs a double-blind reviewing process, the version
we submitted has been appropriately anonymized.
For this reason, please keep the attached version of this paper and this
message as strictly confidential.
Best Regards,
Alessandro
--
Prof. Alessandro Armando
DIBRIS, Università di Genova
Viale Causa 13
16145 - Genova
email: alessandro.armando(a)unige.it
phone: +39 3281003201
--
--
Le informazioni contenute nella presente comunicazione sono di natura
privata e come tali sono da considerarsi riservate ed indirizzate
esclusivamente ai destinatari indicati e per le finalità strettamente
legate al relativo contenuto. Se avete ricevuto questo messaggio per
errore, vi preghiamo di eliminarlo e di inviare una comunicazione
all’indirizzo e-mail del mittente.
--
The information transmitted is
intended only for the person or entity to which it is addressed and may
contain confidential and/or privileged material. If you received this in
error, please contact the sender and delete the material.
Dear Sirs,
We are wiling to submit the attached paper to EWDTS 2019 conference. The
full paper submission deadline is on Saturday, August 31st.
The paper has been written by me, Paolo Prinetto and Nicolò Maunero (in cc).
Moreover, we are willing to participate as well to PHISIC 2019 Workshop in
October with a talk and a poster presentation, you can find the abstract in
attachment.
Thank you for your attention.
Best Regards,
--
*Gianluca ROASCIO*
*CINI* - Consorzio Interuniversitario Nazionale per l’Informatica
Ricercatore - Laboratorio Nazionale Cybersecurity
Sede di Torino c/o LINKS - Leading Innovation & Knowledge for Society
Via Pier Carlo Boggio 61, I-10129 Torino TO - Italy
Phone: +39 334 3762427
gianluca.roascio(a)consorzio-cini.it
Skype: gianluca.roascio
www.consorzio-cini.it
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campai…>
Mail
priva di virus. www.avast.com
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campai…>
<#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
Dear all,
we plan to submit a paper to the ARES conference (3rd International
Workshop on Security and Forensics of IoT, dealine April 30, 2019). The
paper presents a secure Publish/Subscribe Protocol for Internet of
Things. Our proposal enhances the security and privacy of users using
MQTT-based services in IoT. Therefore, this paper is in line with WP6
that is focusing on security and privacy protection in IoT.
Please find a final version of our submission (for the first round of
double blind review) attached to this email.
Additional sensitive information in the final version is not expected.
Please let me know if
you have further questions.
Thank you very much!
Best regards,
Lukas Malina
(BUT, WP6 Task 6.5)
--
Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
We have submitted the paper „A Secure Self-Authenticable Data Transfer Protocol for Wireless Medical Sensor Networks“
Abstract: Development of IoT (The Internet of Things) introduces many new challenges. As IoT devices are getting smaller and smaller the problems of so called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens devices primarily communicating with each other (e. g. various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing and power resources so traditional security protocols and architectures doesn’t fit well also. To address these challenges the fog computing paradigm is used in which all constrained devices or “End Nodes” primarily communicate only with less constrained “Fog Node” device, which collects all data, processes it and communicates with the outside world. A new lightweight secure self-authenticable transfer protocol (SSATP) for communications between “Fog End” devices and “Fog Nodes” is presented in this paper. The primary target of the proposed protocol is to use it as a secure transport for CoAP in place of UDP and DTLS which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is better choice than UDP with DTLS in the cases where CoAP block transfer mode is used and/or in lossy networks.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas