Dear all,
We have submitted the paper „Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process“ to the 24th International Conference ELECTRONICS 2020
Abstract: Visual Analytics uses data visualization methods for enabling compelling analysis of data by engaging graphical and visual representation. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. In this paper, we present a survey of the visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody’s Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process.
This paper is still under evaluation.
If it gets accepted, we will acknowledge SPARTA.
Best,
Algimantas Venčkauskas
Kauno technologijos universitetas
Dear All,
We submitted Sparta paper (attached) to a journal in January 2020.
Title: Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
By: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Maryline Laurent
Maryline Laurent
Professor, Télécom SudParis
Head of R3S team, CNRS UMR5157 SAMOVAR lab
Cofounder of the chair Values and Policies of Personal Information
9 rue Charles Fourier, 91011 EVRY
+33 (0)160764442
Dear all,
we plan to submit the survey paper “Security and Privacy Protection for
Intelligent Infrastructures in the Post-Quantum Era” to the journal IEEE
COMMUNICATIONS SURVEYS & TUTORIALS.
Please find the compressed manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
we plan to submit the paper “Privacy ABCs: Now Ready for Your Wallets!”
to Workshop on Privacy in the Electronic Society which is held in
conjunction with the ACM CCS conference.
Please find the manuscript version in the attachment. The paper is in
line with WP6 - Task 6.5 Privacy-by-Design and does not contain any
sensitive information.
If the paper will be accepted and no objections will be raised by diss.
committee, we would like to acknowledge to SPARTA.
Thank you.
Best regards,
Lukas Malina
--
doc. Ing. Lukáš Malina, Ph.D.
E-mail: malina(a)feec.vutbr.cz
Brno University of Technology
Faculty of Electrical Engineering and Communication
Department of Telecommunications
Technicka 12
616 00 Brno
Czech Republic
Dear all,
UNamur wrote a paper titled "GDPR and Automated individual
decision-making: Fair processing v. Fair result". In order to respect
the deadline set by the GA, please find enclosed the complete draft of
the publication.
If the dissemination committee raises no objections, we would like to
acknowledge SPARTA.
Best regards,
Manon
--
MANON KNOCKAERT
Chercheuse
Centre de Recherches Information, Droit et Société
T. +32 (0)81 724 798
F. +32 (0)81 725 202
manon.knockaert(a)unamur.be <mailto:manon.knockaert@unamur.be>
http://www.unamur.be
Université de Namur
Rue de Bruxelles 61 - 5000 Namur
Belgique
Let's respect the environment together.
Only print this message if necessary!
Dear All,
we have submitted a research paper entitled “SEkey: A Distributed Hardware-based Key Management System" to the 18th IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS-2020) that will be held online from September 4th to 7th.
In the paper we describe the design and development of a cryptographic key management system that leverage on the characteristics and functionalities of the SEcube Open Security Platform.
Please find the pre-final version of our paper attached to this email.
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project.
Best regards,
Nicolò MAUNERO
Politecnico di Torino - Dipartimento di Automatica e Informatica
CINI - Laboratorio Nazionale Cybersecurity
Sede di Torino c/o LINKS - Leading Innovation & Knowledge for Society
Via Pier Carlo Boggio 61, I-10129 Torino - Italy
Tel: +39 334 2555532
nicolo.maunero(a)polito.it <mailto:nicolo.maunero@polito.it>
Skype: nicolo.maunero
Dear All,
we submitted the paper /Multiscale Snapshots: Visual Analysis of
Temporal Summaries in Dynamic Graphs/ to the IEEE Transactions on
Visualization and Computer Graphics (TVCG). We request to acknowledge
SPARTA if the paper is accepted.
* Abstract: "The overview-driven visual analysis of large-scale
dynamic graphs poses a major challenge. We propose Multiscale
Snapshots, a visual analytics approach to analyze temporal summaries
of dynamic graphs at multiple temporal scales. First, we recursively
generate temporal summaries to abstract overlapping sequences of
graphs into compact snapshots. Second, we apply graph embeddings to
the snapshots to learn low-dimensional representations of each
sequence of graphs to speed up specific analytical tasks (e.g.,
similarity search). Third, we visualize the evolving data from a
coarse to fine-granular snapshots to semi-automatically analyze
temporal states, trends, and outliers. The approach enables to
discover similar temporal summaries (e.g., recurring states),
reduces the temporal data to speed up automatic analysis, and to
explore both structural and temporal properties of a dynamic graph.
We demonstrate the usefulness of our approach by a quantitative
evaluation and the application to a real-world dataset."
Best Regards,
Eren Cakmak
--
Research Associate
Department of Computer and Information Science
Data Analysis and Visualization Group
78457 Konstanz, Germany
Website: http://infovis.uni.kn/~cakmak
Phone: +49 (0)7531 88 2507
Room: D334
Dear All,
we have submitted a research paper entitled "Hardware-based
Capture-the-Flag Challenges" to the 18th IEEE EAST-WEST DESIGN & TEST
SYMPOSIUM (EWDTS-2020) that will be held online from September 4th to 7th.
The paper has been written in four hands together with Prof. Paolo Prinetto
(in cc).
In the paper, we focus on hardware-based CTF challenges, providing a formal
definition and an original comprehensive taxonomy. We also tell our
experiences gathered in preparing and delivering several hardware-based
challenges in significant events and training courses.
Please find the pre-final version of our paper attached to this email.
If the dissemination committee raises no objections, we would like to
acknowledge the SPARTA project.
Best Regards,
*Gianluca ROASCIO*
*CINI* - Laboratorio Nazionale Cybersecurity
Sede di Torino c/o LINKS - Leading Innovation & Knowledge for Society
Via Pier Carlo Boggio 61, I-10129 Torino TO - Italy
Tel: +39 334 3762427
gianluca.roascio(a)consorzio-cini.it
Skype: gianluca.roascio
www.consorzio-cini.it
Dear all,
we would like to belatedly register two publications.
SPARTA had been acknowledged in both.
They have already been added to the Spreadsheet of publications.
**Backstabber's Knife Collection: A Review of Open Source Software
Supply Chain Attacks**
Ohm, M., Plate, H., Sykosch, A., Meier, M. (2020, July)
17th International Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment (p. 23). Springer.
Abstract:
A software supply chain attack is characterized by the injection of
malicious code into a software package in order to compromise dependent
systems further down the chain. Recent years saw a number of supply
chain attacks that leverage the increasing use of open source during
software development, which is facilitated by dependency managers that
automatically resolve, download and install hundreds of open source
packages throughout the software life cycle. Even though many approaches
for detection and discovery of vulnerable packages exist, no prior work
has focused on malicious packages. This paper presents a dataset as well
as analysis of 174 malicious software packages that were used in
real-world attacks on open source software supply chains and which were
distributed via the popular package repositories npm, PyPI, and
RubyGems. Those packages, dating from November 2015 to November 2019,
were manually collected and analyzed. This work is meant to facilitate
the future development of preventive and detective safeguards by open
source and research communities.
**Towards Detection of Software Supply Chain Attacks by Forensic Artifacts**
Ohm, M., Sykosch, A., Meier, M. (2020, August)
15th International Conference on Availability, Reliability and Security.
ACM.
Abstract:
Third-party dependencies may introduce security risks to the software
supply chain and hence yield harm to their dependent software. There are
many known cases of malicious open source packages posing risks to
developers and end users. However, while efforts are made to detect
vulnerable open source packages, malicious packages are not yet
considered explicitly. In order to tackle this problem we perform an
exploratory case study on previously occurred attacks on the software
supply chain with respect to observable artifacts created. Based on
gained insights, we propose Buildwatch, a framework for dynamic analysis
of software and its third-party dependencies. We noticed that malicious
packages introduce a significant amount of new artifacts during
installation when compared to benign versions of the same package. The
paper presents a first analysis of observable artifacts of malicious
packages as well as a possible mitigation strategy that might lead to
more insight in long term.
Best regards,
Marc Ohm
--
--------------------------------------------------------------------
Marc-Philipp Ohm, M.Sc. | Tel. : +49 228 73-60531
Computer Science 4 | Email : ohm(a)cs.uni-bonn.de
University of Bonn | Web : https://net.cs.uni-bonn.de
Endenicher Allee 19a | Office: I.015
53115 Bonn, Germany | PGP ID: 0x9156D1B6
Dear all,
We have submitted a research paper entitled "Privacy Enhancing Technologies for solving the Privacy-Personalization Paradox" that has been very recently accepted to the highly ranked Journal of Network and Computer Applications 2020. The file which is 1.5Mo is temporary available on: https://filesender.renater.fr/?s=download&token=efafad0d-72ac-420b-b466-e0e… <https://filesender.renater.fr/?s=download&token=efafad0d-72ac-420b-b466-e0e…>
Abstract:
Personal data are often collected and processed in a decen- tralized fashion, within different contexts. For instance, with the emer- gence of distributed applications, several providers are usually correlat- ing their records, and providing personalized services to their clients. Collected data include geographical and indoor positions of users, their movement patterns as well as sensor-acquired data that may reveal users’ physical conditions, habits and interests. Consequently, this may lead to undesired consequences such as unsolicited advertisement and even to discrimination and stalking. To protect users’ privacy, several tech- niques emerged, referred to as Privacy Enhancing Technologies, PETs for short, aiming at providing privacy preserving personalized ser- vices i.e., recommendation services, web-search systems and pervasive applications.This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity it considers three categories of per- sonalized services. After presenting the main features of PETs with illustrative examples, the paper points out which PETs best fit each person- alized service category. Then, it discusses some of the inter-disciplinary privacy challenges that may slow down the adoption of these techniques, namely: technical, social, legal and economic concerns. Finally, it pro- vides recommendations and highlights several research directions.
Please find the pre-final version of our paper attached to this email.
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project.
Best regards,
Maryline Laurent
—
Professor, Télécom SudParis, Institut Polytechnique de Paris
Director of RST department
Cofounder of the chair Values and Policies of Personal Information
9 rue Charles Fourier, 91011 EVRY
+33 (0)160764442