Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1568–1583https://doi.org/10.1145/3634737.3637643Large botnets like Mirai, with 600,000 infected devices, prove that cyber criminals have recognized the potential of attacks against the fast-growing Internet of Things. Moreover, recent critical vulnerabilities like Ripple20 and Amnesia:33 show that ...
- research-articleJanuary 2023
I just wanted to track my steps! Blocking unwanted traffic of Fitbit devices
IoT '22: Proceedings of the 12th International Conference on the Internet of ThingsPages 96–103https://doi.org/10.1145/3567445.3567457The recent advent of wearable fitness trackers has fueled concerns in regards to the privacy they provide. In particular, previous works have indicated that the associated fitness apps may contact unexpected Internet destinations.
In this work we ...
- research-articleNovember 2021
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation
CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and PrivacyPages 3–14https://doi.org/10.1145/3462633.3483983Bump-in-the-wire (bump) devices can be used to protect critical endpoints in Industrial Control System (ICS) networks. However, bump devices cannot be used to authenticate incoming broadcast traffic, are complex to manage, and one bump is needed per ...
- research-articleDecember 2020
SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 542–555https://doi.org/10.1145/3427228.3427235Selectively allowing network traffic has emerged as a dominant approach for securing consumer IoT devices. However, determining what the allowed behavior of an IoT device should be remains an open challenge. Proposals to date have relied on ...
- research-articleMay 2020
CoLearn: enabling federated learning in MUD-compliant IoT edge networks
- Angelo Feraudo,
- Poonam Yadav,
- Vadim Safronov,
- Diana Andreea Popescu,
- Richard Mortier,
- Shiqiang Wang,
- Paolo Bellavista,
- Jon Crowcroft
EdgeSys '20: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and NetworkingPages 25–30https://doi.org/10.1145/3378679.3394528Edge computing and Federated Learning (FL) can work in tandem to address issues related to privacy and collaborative distributed learning in untrusted IoT environments. However, deployment of FL in resource-constrained IoT devices faces challenges ...
- short-paperDecember 2019
Tracking Down Sources of Spoofed IP Packets
CoNEXT '19 Companion: Proceedings of the 15th International Conference on emerging Networking EXperiments and TechnologiesPages 51–53https://doi.org/10.1145/3360468.3368175The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packets, which forms the basis for amplification denial-of-service (DoS) attacks. We propose techniques to identify networks that allow its ...
- research-articleDecember 2018
SENSS Against Volumetric DDoS Attacks
ACSAC '18: Proceedings of the 34th Annual Computer Security Applications ConferencePages 266–277https://doi.org/10.1145/3274694.3274717Volumetric distributed denial-of-service (DDoS) attacks can bring any network to a halt. Because of their distributed nature and high volume, the victim often cannot handle these attacks alone and needs help from upstream ISPs. Today's Internet has no ...
- research-articleDecember 2017
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense
ACSAC '17: Proceedings of the 33rd Annual Computer Security Applications ConferencePages 474–485https://doi.org/10.1145/3134600.3134644IP spoofing has been a persistent Internet security threat for decades. While research solutions exist that can help an edge network detect spoofed and reflected traffic, the sheer volume of such traffic requires handling further upstream.
We propose ...
- research-articleSeptember 2014
Per-user policy enforcement on mobile apps through network functions virtualization
- Amedeo Sapio,
- Yong Liao,
- Mario Baldi,
- Gyan Ranjan,
- Fulvio Risso,
- Alok Tongaonkar,
- Ruben Torres,
- Antonio Nucci
MobiArch '14: Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecturePages 37–42https://doi.org/10.1145/2645892.2645896Due to the increasing popularity of smartphones and tablets, mobile apps are becoming the preferred portals for users to access various network services in both residential and enterprise environments. Predominantly using generic HTTP or HTTPS protocols,...
- ArticleApril 2011
Entropy estimation for real-time encrypted traffic identification
TMA'11: Proceedings of the Third international conference on Traffic monitoring and analysisPages 164–171This paper describes a novel approach to classify network traffic into encrypted and unencrypted traffic. The classifier is able to operate in real-time as only the first packet of each flow is processed. The main metric used for classification is an ...
- research-articleJune 2010
Entropy-based traffic filtering to support real-time Skype detection
IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing ConferencePages 747–751https://doi.org/10.1145/1815396.1815568We propose a novel approach for real-time privacy preserving traffic filtering based on entropy estimation. The decision of the real-time classifier is based on the entropy of the payload from first packet of a flow. The aim of the classifier is to ...
- articleAugust 2009
Scalable network-layer defense against internet bandwidth-flooding attacks
IEEE/ACM Transactions on Networking (TON), Volume 17, Issue 4Pages 1284–1297https://doi.org/10.1109/TNET.2008.2007431In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic ...
- research-articleFebruary 2008
Realization of multiple access interface management and flow mobility in IPv6
MOBILWARE '08: Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and ApplicationsArticle No.: 26, Pages 1–8Internet capable mobile or portable devices are already a modern commodity while it is becoming more and more common that such devices are hosts to more than one wireless network interface. The aim of this work is to show from a user's perspective how ...