Dear All,
We submitted Sparta/Safair relevant paper (attached) to FGCS (Elsevier).
Title: Defending Network Intrusion Detection Systems against Adversarial
Evasion Attacks
By: Pawlicki, Choras, Kozik.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
Dear Dissemination Committee,
we are about to publish a paper for which we would like to acknowledge the
SPARTA project.
Please, find the version that we plan to submit in attachment and a brief
description of the content, the venue and the relation with the activities
of WP6 below.
Please let me know if you have any objections or comments.
Best regards
Letterio Galletta
===
Title: Provably Secure Isolation for Interruptible Enclaved Execution on
Small Microprocessors
Venue: 33rd IEEE Computer Security Foundations Symposium
Relationship with SPARTA: The paper studies the problem of extending a
microprocessor that supports enclaved execution with new features but
without breaking its security guarantees. In particular, the paper proposes
a design for interruptible enclaves, and proves that they do not open the
way to new attacks. Finally, we implemented our design on Sancus, a
platform for developing IoT systems and evaluated its cost in terms of
performance and hardware size.
Dear All,
we are planning on submitting a paper to the
ECCWS conference (19th European Conference on Cyber Warfare and Security 25
- 26 June 2020, Chester, UK).
We request to acknowledge SPARTA if the paper is accepted.
Here is the title and abstract of the paper:
Title:
*Information Sharing in Cyber Defence Exercises*
Abstract
Availability and easy access to sophisticated cyber penetration testing
tools enable ex-
ploitation of vulnerabilities in different systems globally. Cyber attacks
are executed
by various actors – from script kiddies to state organisations. Repetitive
nature and
recognisable signatures of attacks raise demand for effective information
sharing. Timely
warnings about cyber incidents in other systems make it possible to
identify related at-
tacks locally. Early identification could save a substantial amount of
money and time.
International cyber community supports several commercial and open-source
threat in-
formation sharing platforms. Efficient use of these systems depends both on
the quality
of submitted information and the ability of the security specialist to
receive, interpret,
and integrate indicators of compromise into local defence systems. Business
stakeholders
tend to emphasise the importance of threat hunters, while the
information-sharing aspect
is overlooked. Therefore, there is a need for professionals who can assess
risk levels of
cyber incidents in a broad context and share concise information with team
members,
superiors, relevant institutions, and community. The complex nature of
cyber attacks
raised the popularity of live cyber defence exercises (CDX), where
cybersecurity special-
ists are trained using simulated real-life scenarios. However, the
exercises are mostly
oriented towards the development of technical competences.
This paper addresses the problem of proper development of information
sharing com-
petence during the CDX. We performed a case study of two annual
international CDX.
Research data were collected using several techniques. First, the
participants filled in pre-
event and post-event questionnaires. Additionally, each defending team was
continuously
observed by a dedicated evaluation team member. Finally, incident reports
in short and
long forms were gathered. We distinguished challenges related to internal
team collabora-
tion, information sharing among the teams, and reporting to relevant
authorities. Based
on the findings, we present a methodology to integrate information sharing
into the plan-
ning and execution of CDX. The methodology encompasses activities, scoring
strategies,
scenario recommendations, tools, and communication-encouragement
components. The
presented enhancement creates an observable added value to the CDX training
event.
Keywords:
Cyber defence exercises, incident information sharing, indicators of
compromise, collaborative defence
Sincerely,
*Dr. Aušrius Juozapavičius*
*Head of **Department of Defence Technologies*
*The General Jonas **Ž**emaitis Military Academy of Lithuania*
*Tel.: +370 5 210** 3555*
*[image: cid:image005.png@01D1E813.C5E9EDC0]* <http://www.lka.lt/>*[image:
cid:image006.png@01D1E813.C5E9EDC0]*
<https://www.facebook.com/KaroAkademija/>*[image:
cid:image007.png@01D1E813.C5E9EDC0]*
<https://www.youtube.com/channel/UCwDc7dsEQFc4lIakZqbSiig>
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper.
This paper has been recently accepted at the ICISSP 2020 conference.
This paper is related to our research activities performed in WP11 Mapping of International and national cybersecurity certification initiatives.
Authors: Christophe Ponsard, Jeremy Grandclaudon and Nicolas Point
Title: Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
Best regards,
--
Jeremy GrandclaudonSenior R&D EngineerSoftware and System EngineeringCentre of Excellence in Information
and Communication Technologies (CETIC)Aeropole
Avenue Jean Mermoz 28
6041 Charleroi (Belgium)Mobile : +32 473 49 11 70www.cetic.be
Dear all,
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project on the attached paper.
This paper has been recently accepted at The WebConf 2020 conference (formerly WWW).
This paper is related to our research activities performed in WP5 Cape.
Authors: Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé and Jacques Klein
Title: MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
--
Prof. Jacques Klein
Chief Scientist
University of Luxembourg - SnT
00352 46 66 44 56 00 / Gsm: 0033 6 06 47 62 54
https://jacquesklein2302.github.io/
Dear All,
We plan to submit Sparta relevant paper (attached) for the CLD2 workshop
at ICCS 2020 in Amsterdam.
Title:
By: Pawlicki, Choras, Kozik and Holubowicz.
If accepted we plan to acknowledge SPARTA.
Kind Regards,
Prof. Michal Choras
Dear Dissemination Committee,
we have about to publish four papers for which we would like to
acknowledge the SPARTA project.
Please, find the versions that we plan to submit in attachment and a
brief description of the content, the venue and the relation with the
activities of WP6 below.
Please let us know if you have any objections or comments.
Best regards
Gabriele Costa
===
Title: Natural Projection as Partial Model Checking
Venue: Journal of Automated Reasoning
Relationship with SPARTA: The paper presents a theoretical result
showing that partial model checking and natural projection are
equivalent. Based on this result we developed an algorithm and a tool
for the automatic synthesis of controllers and sub-modules. This
technique is well integrated in WP6 and, in particular, in Task 6.3 as
it may serve as for the generation of orchestrators directly from high
level security policies.
Title: WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs
Venue: SoftwareX
Relationship with SPARTA: The paper presents a tool for automatically
generating adversarial attacks able to bypass ML-based web application
firewalls (WAFs). WAFs are often deployed in modern II as a line of
protection against injection attacks. This work shows that using ML for
this purpose is not secure in general. The activity is related to the
identification and evaluation of the state-of-the-art technologies
adopted in the IIs.
Title: A Survey on Multi-Factor Authentication for Online Banking in the
Wild
Venue: Computers and Security
Relationship with SPARTA: The paper presents a survey on the
multi-factor authentication platforms used by a number of banks
worldwide. Also, we carried out a systematic review of regulations and
guidelines and we evaluated how the MFA solutions cope with them. This
activity is strongly related to WP6 as we carried out an in depth
evaluation of the service infrastructures used for implementing the
authentication of customers in the bank sector.
Title: Building Next Generation Cyber Ranges with CRACK
Venue: Computers and Security
Relationship with SPARTA: The paper introduces a virtual infrastructure
implementing a cyber range. Its purpose is to run virtual
infrastructures where security training exercises can be executed. The
technology developed for this purpose is the same that will support the
orchestration framework that CINI will provide in Task 6.3
===
Dear all,
we have submitted a research paper entitled "Automated Security Analysis of IoT Software Updates" that has been accepted in the 13th WISTP International Conference on Information Security Theory and Practice (http://www.wistp.org/program/).
The paper presents a new automated software analysis framework for systematically verifying the security of IoT applications contained in software updates w.r.t. a given security policy.
Therefore, this paper is in line with WP6 and, in particular, with Task 6.1 on Securing Operating System Software.
Please find the prefinal version of our paper attached to this email.
If the dissemination committee raises no objections, we would like to acknowledge the SPARTA project.
Best regards,
Luca Verderame
--
Luca Verderame
*************************************************
Computer Security Lab
DIBRIS - University of Genova
Via Dodecaneso, 35, 16146, Genova, Italy.
**************************************************
--
The information transmitted is intended for the person or entity to which it is addressed and may contain confidential and/or privileged material.
Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited.
If you received this in error, please contact the sender and delete the material from any computer.
Dear Sirs,
me, Gianluca Roascio and Paolo Prinetto, are submitting the paper “A FPGA-base Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems” to the International Symposium on Hardware Oriented Security and Trust (HOST) 2020
Please find the paper in attachment.
If the paper will be accepted and no objections will be raised by diss. committee, we would like to acknowledge SPARTA.
The notification of acceptance is on Jan 30.
Best regards,
Nicolò Maunero
Dear all,
I am happy to announce that our review paper "Towards Formal Methods of IoT Application Layer
Protocols" is accepted at 12th CMI Conference 2019: CYBERSECURITY AND PRIVACY.
Organizer and venue: Center for Communication, Media and Information technologies (CMI) at Dept. of Electronic Systems, Aalborg University, Copenhagen, Denmark (https://www.conf.cmi.aau.dk/12th+CMI+conference+2019/).
The paper is co-authored by Katharina Hofer-Schmitz and Branka Stojanovic (from the JOANNEUM RESEARCH DIGITAL).
We will acknowledge the SPARTA project in the camera ready copy.
The paper is in attachment.
Best regards,
Branka Stojanovic
--
Dr. Branka Stojanovic
CISSP, Senior Researcher
Cyber Security and Defence Competence Group
DIGITAL - Institute for Information and Communication Technologies
JOANNEUM RESEARCH Forschungsgesellschaft mbH
Steyrergasse 17, 8010 Graz, AUSTRIA
phone: +43-316-876-5701
web: http://www.joanneum.at/digital
e-mail: branka.stojanovic(a)joanneum.at<mailto:branka.stojanovic@joanneum.at>