Dear all,
We have submitted the paper „Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process“ to the 24th International Conference ELECTRONICS 2020
Abstract: Visual Analytics uses data visualization methods for enabling compelling analysis of data by engaging graphical and visual representation. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. In this paper, we present a survey of the visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody’s Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Dear Dissemination Committee,
we have about to publish a paper for which we would like to acknowledge
the SPARTA project.
Please, find the version that we plan to submit in attachment and a
brief description of the content, the venue and the relation with the
activities of WP6 below.
Please let us know if you have any objections or comments.
Best regards
Gabriele Costa
===
Title: WAF-A-MoLE: Evading Web Application Firewalls through Adversarial
Machine Learning
Venue: ACM Symposium on Applied Computing
Relationship with SPARTA: The paper presents a a technique to evade
machine learning-based web application firewalls (WAFs). This work shows
that ML WAFs are not reliable in discriminating between attack payloads
and harmless traffic. The activity is related to the identification and
evaluation of the state-of-the-art technologies adopted in the IIs.
Dear All,
We plan to submit Sparta and Safair relevant SOTA type of paper (draft
attached) for the DisA workshop (I co-organize) at ICCS 2020 in Amsterdam:
http://disa.kssk.pwr.edu.pl/https://www.iccs-meeting.org/iccs2020/
Title: Machine Learning - the results are not the only thing that matters!
What about security, explainability and fairness?
By: Choras, Pawlicki, Puchalski and Kozik.
The paper uses ITTI text relevant for D7.2.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
-------------------------- Wiadomość oryginalna --------------------------
Temat: [SPARTA - bodies.dissemination-committee] Request for SPARTA
acknowledgment in accepted paper
Od: "Gabriele Costa" <gabriele.costa(a)imtlucca.it>
Data: 27 Listopada 2019, 3:48 pm, Śr
Do: bodies.dissemination-committee(a)internal.sparta.eu
--------------------------------------------------------------------------
Dear Dissemination Committee,
we have about to publish a paper for which we would like to acknowledge
the SPARTA project.
Please, find the version that we plan to submit in attachment and a
brief description of the content, the venue and the relation with the
activities of WP6 below.
Please let us know if you have any objections or comments.
Best regards
Gabriele Costa
===
Title: WAF-A-MoLE: Evading Web Application Firewalls through Adversarial
Machine Learning
Venue: ACM Symposium on Applied Computing
Relationship with SPARTA: The paper presents a a technique to evade
machine learning-based web application firewalls (WAFs). This work shows
that ML WAFs are not reliable in discriminating between attack payloads
and harmless traffic. The activity is related to the identification and
evaluation of the state-of-the-art technologies adopted in the IIs.
--
bodies.dissemination-committee mailing list
bodies.dissemination-committee(a)server.sparta.eu
http://server.sparta.eu/cgi-bin/mailman/listinfo/bodies.dissemination-commi…
Dear All,
we submitted the paper "Towards Visual Debugging for Multi-Target Time
Series Classification" to the**ACM IUI 2020. We request to acknowledge
SPARTA if the paper is accepted.
Abstract:
* Multi-target classification of multivariate time series data poses a
challenge in many real-world applications (e.g., predictive
maintenance). Machine learning methods, such as random forests and
neural networks, support training these classifiers.
However, the debugging and analysis of possible misclassifications
remain challenging due to the often complex relations between
targets, classes, and the multivariate time series data. We propose
a model-agnostic visual debugging workflow
for multi-target time series classification that enables the
examination of relations between targets, partially correct
predictions, potential confusions, and the classified time series
data. The workflow, as well as the prototype, aims to foster an
in-depth analysis of multi-target classification results to identify
potential causes of mispredictions visually. We demonstrate the
usefulness of the workflow in the field of predictive maintenance in
a usage scenario to show how users can
iteratively explore and identify critical classes, as well as,
relationships between targets.
Best Regards,
Eren Cakmak
--
Research Associate
Department of Computer and Information Science
Data Analysis and Visualization Group
78457 Konstanz, Germany
Website: http://infovis.uni.kn/~cakmak
Phone: +49 (0)7531 88 2507
Room: D334
Dear All,
We submitted Sparta/Safair relevant paper (attached) to IJCNN conference.
Title: Achieving Explainability of Intrusion Detection System by Hybrid
Oracle-Explainer Approach
By: Szczepanski, Choras, Pawlicki, Kozik.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
Dear All,
We submitted Sparta/Safair relevant paper (attached) to FGCS (Elsevier).
Title: Defending Network Intrusion Detection Systems against Adversarial
Evasion Attacks
By: Pawlicki, Choras, Kozik.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
Dear Dissemination Committee,
we are about to publish a paper for which we would like to acknowledge the
SPARTA project.
Please, find the version that we plan to submit in attachment and a brief
description of the content, the venue and the relation with the activities
of WP6 below.
Please let me know if you have any objections or comments.
Best regards
Letterio Galletta
===
Title: Provably Secure Isolation for Interruptible Enclaved Execution on
Small Microprocessors
Venue: 33rd IEEE Computer Security Foundations Symposium
Relationship with SPARTA: The paper studies the problem of extending a
microprocessor that supports enclaved execution with new features but
without breaking its security guarantees. In particular, the paper proposes
a design for interruptible enclaves, and proves that they do not open the
way to new attacks. Finally, we implemented our design on Sancus, a
platform for developing IoT systems and evaluated its cost in terms of
performance and hardware size.
Dear All,
we are planning on submitting a paper to the
ECCWS conference (19th European Conference on Cyber Warfare and Security 25
- 26 June 2020, Chester, UK).
We request to acknowledge SPARTA if the paper is accepted.
Here is the title and abstract of the paper:
Title:
*Information Sharing in Cyber Defence Exercises*
Abstract
Availability and easy access to sophisticated cyber penetration testing
tools enable ex-
ploitation of vulnerabilities in different systems globally. Cyber attacks
are executed
by various actors – from script kiddies to state organisations. Repetitive
nature and
recognisable signatures of attacks raise demand for effective information
sharing. Timely
warnings about cyber incidents in other systems make it possible to
identify related at-
tacks locally. Early identification could save a substantial amount of
money and time.
International cyber community supports several commercial and open-source
threat in-
formation sharing platforms. Efficient use of these systems depends both on
the quality
of submitted information and the ability of the security specialist to
receive, interpret,
and integrate indicators of compromise into local defence systems. Business
stakeholders
tend to emphasise the importance of threat hunters, while the
information-sharing aspect
is overlooked. Therefore, there is a need for professionals who can assess
risk levels of
cyber incidents in a broad context and share concise information with team
members,
superiors, relevant institutions, and community. The complex nature of
cyber attacks
raised the popularity of live cyber defence exercises (CDX), where
cybersecurity special-
ists are trained using simulated real-life scenarios. However, the
exercises are mostly
oriented towards the development of technical competences.
This paper addresses the problem of proper development of information
sharing com-
petence during the CDX. We performed a case study of two annual
international CDX.
Research data were collected using several techniques. First, the
participants filled in pre-
event and post-event questionnaires. Additionally, each defending team was
continuously
observed by a dedicated evaluation team member. Finally, incident reports
in short and
long forms were gathered. We distinguished challenges related to internal
team collabora-
tion, information sharing among the teams, and reporting to relevant
authorities. Based
on the findings, we present a methodology to integrate information sharing
into the plan-
ning and execution of CDX. The methodology encompasses activities, scoring
strategies,
scenario recommendations, tools, and communication-encouragement
components. The
presented enhancement creates an observable added value to the CDX training
event.
Keywords:
Cyber defence exercises, incident information sharing, indicators of
compromise, collaborative defence
Sincerely,
*Dr. Aušrius Juozapavičius*
*Head of **Department of Defence Technologies*
*The General Jonas **Ž**emaitis Military Academy of Lithuania*
*Tel.: +370 5 210** 3555*
*[image: cid:image005.png@01D1E813.C5E9EDC0]* <http://www.lka.lt/>*[image:
cid:image006.png@01D1E813.C5E9EDC0]*
<https://www.facebook.com/KaroAkademija/>*[image:
cid:image007.png@01D1E813.C5E9EDC0]*
<https://www.youtube.com/channel/UCwDc7dsEQFc4lIakZqbSiig>
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper.
This paper has been recently accepted at the ICISSP 2020 conference.
This paper is related to our research activities performed in WP11 Mapping of International and national cybersecurity certification initiatives.
Authors: Christophe Ponsard, Jeremy Grandclaudon and Nicolas Point
Title: Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
Best regards,
--
Jeremy GrandclaudonSenior R&D EngineerSoftware and System EngineeringCentre of Excellence in Information
and Communication Technologies (CETIC)Aeropole
Avenue Jean Mermoz 28
6041 Charleroi (Belgium)Mobile : +32 473 49 11 70www.cetic.be
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper.
This paper has been recently accepted at The WebConf 2020 conference (formerly WWW).
This paper is related to our research activities performed in WP5 Cape.
Authors: Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé and Jacques Klein
Title: MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
--
Prof. Jacques Klein
Chief Scientist
University of Luxembourg - SnT
00352 46 66 44 56 00 / Gsm: 0033 6 06 47 62 54
https://jacquesklein2302.github.io/