Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 138, Pages 1–8https://doi.org/10.1145/3538969.3544896While more organizations have been trying to move their infrastructure to the cloud in recent years, there have been significant challenges in the identity management in the hybrid cloud. This paper showcases a novel identity and access management ...
- research-articleAugust 2022
Disruptive Quantum Safe Technologies
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 41, Pages 1–8https://doi.org/10.1145/3538969.3544484The advances in quantum computation are leading to higher computation capabilities, which is expected to reshape the cybersecurity environment. Quantum computers are expected to break most of the public-key security schemes, like RSA, Diffie-Hellman or ...
- research-articleAugust 2022
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 74, Pages 1–7https://doi.org/10.1145/3538969.3544483This paper investigates methods to secure Remote Terminal Units (RTUs) which are the building blocks of a smart grid systems - the next generation version to replace the power grid systems that are being used today. RTUs are identified as the heart of ...
- research-articleAugust 2022
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 109, Pages 1–8https://doi.org/10.1145/3538969.3544478In incident management, response and recovery actions are designed to effectively mitigate ongoing or future cyberattacks. A security playbook consists of a pipeline of instructions to document necessary response and recovery actions to deal with a ...
- research-articleAugust 2022
Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 131, Pages 1–9https://doi.org/10.1145/3538969.3544474Increasingly evident safety risks due to attacks on safety-critical devices are causing new requirements for authentication of these devices’ human operators. These requirements have now extended to medical devices. However, authentication may also ...
-
- research-articleAugust 2022
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion
- Georgios Agrafiotis,
- Eftychia Makri,
- Ioannis Flionis,
- Antonios Lalas,
- Konstantinos Votis,
- Dimitrios Tzovaras
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 59, Pages 1–7https://doi.org/10.1145/3538969.3544473Traffic categorization is considered of paramount importance in the network security sector, as well as the first stage in network anomaly detection, or in a network-based intrusion detection system (IDS). This paper introduces an artificial ...
- research-articleAugust 2022
Data Acquisition on a Large Darknet Marketplace
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 53, Pages 1–6https://doi.org/10.1145/3538969.3544472Darknet marketplaces in the Tor network are popular places to anonymously buy and sell various kinds of illegal goods. Previous research on marketplaces ranged from analyses of type, availability and quality of goods to methods for identifying users. ...
- research-articleAugust 2022
Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 47, Pages 1–9https://doi.org/10.1145/3538969.3544471Currently, digital media content is increasingly being used by cybercriminals for nefarious purposes. Such objects can be used, e.g., to covertly transfer malicious code to the infected host or to exfiltrate sensitive information from the secured ...
- research-articleAugust 2022
Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 64, Pages 1–9https://doi.org/10.1145/3538969.3544470The popularity, variety, and number of Internet of Things (IoT) devices and solutions have been increasing significantly with each passing year. This diversity of devices, and limited computational, memory, and battery resources make it difficult to ...
- research-articleAugust 2022
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit
- Luca Caviglione,
- Martin Grabowski,
- Kai Gutberlet,
- Adrian Marzecki,
- Marco Zuppelli,
- Andreas Schaffhauser,
- Wojciech Mazurczyk
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 46, Pages 1–7https://doi.org/10.1145/3538969.3544469An increasing trend exploits steganography to conceal payloads in digital images, e.g., to drop malicious executables or to retrieve configuration files. Due to the very attack-specific nature of the exploited hiding mechanisms, developing general ...
- research-articleAugust 2022
Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 126, Pages 1–8https://doi.org/10.1145/3538969.3544467Times of crisis have long been combined with an increase in cybercrime, exploiting the general instability; therefore, in such times, systems and infrastructures face greater exposure to vulnerabilities. On top of that, the COVID-19 crisis has increased ...
- research-articleAugust 2022
Limitations of Web Cryptojacking Detection: A Practical Evaluation
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 52, Pages 1–6https://doi.org/10.1145/3538969.3544466Cryptojacking is one of the new threats that emerged several years ago with the growing popularity and increasing value of cryptocurrencies. In essence, it is a malicious technique where the attacker parasites on the victim’s resources like CPU time, ...
- research-articleAugust 2022
All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 139, Pages 1–6https://doi.org/10.1145/3538969.3544464Access control languages are traditionally based on centralized trust models when achieving their security goals. One important reason for a lack of decentralized trust models for access control has been difficulties in referring to and accessing ...
- research-articleAugust 2022
MetaSEnD: A Security Enabled Development Life Cycle Meta-Model
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 152, Pages 1–10https://doi.org/10.1145/3538969.3544463The growing adoption of IT infrastructures determined a high heterogeneity of software systems. As matter of fact, the software is prone to vulnerabilities and cybersecurity problems, which are challenging to manage during the software lifecycle. The ...
- research-articleAugust 2022
Modelling privacy harms of compromised personal medical data - beyond data breach
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 133, Pages 1–9https://doi.org/10.1145/3538969.3544462What harms and consequences do patients experience after a medical data breach? This article aims at the improvement of privacy impact analysis for data breaches that involve personal medical data. The article has two major findings. First, scientific ...
- research-articleAugust 2022
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 90, Pages 1–7https://doi.org/10.1145/3538969.3544460In the past years Internet of Things (IoT) has received increasing attention by academia and industry due to the potential use in several human activities; however, IoT devices are vulnerable to various types of attacks. Many existing intrusion ...
- research-articleAugust 2022
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 91, Pages 1–8https://doi.org/10.1145/3538969.3544458Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber threats can be identified using knowledge organized into various formats, enumerations, and knowledge bases. This paper studies the current challenges of ...
- research-articleAugust 2022
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 50, Pages 1–10https://doi.org/10.1145/3538969.3544455Challenge-response authentication is an essential and omnipresent network service. Thus, it is a lucrative target for attackers to transport covert information. We present two covert channels in nonce-based network authentication that allow the ...
- research-articleAugust 2022
An Investigation of PSA Certified
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 97, Pages 1–8https://doi.org/10.1145/3538969.3544452PSA (Platform Security Architecture) Certified is a security certification scheme for IoT hardware, software, and devices. The scheme is composed of security certification (PSA Certified Level 1/2/3) and functional API certification (PSA Certified ...
- research-articleAugust 2022
Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 124, Pages 1–9https://doi.org/10.1145/3538969.3544450Twitter is one of the popular social network platforms used by both humans and bots to share information, and to distribute misinformation or disinformation. The goal of this research is to explore state-of-the-art Twitter bot detection systems: ...