Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Future-proofing Secure V2V Communication against Clogging DoS Attacks
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 94, Pages 1–8https://doi.org/10.1145/3664476.3670932Clogging Denial of Service (DoS) attacks have disrupted or disabled various networks, in spite of security mechanisms. External adversaries can severely harm networks, especially when high-overhead security mechanisms are deployed in resource-...
- research-articleJuly 2024
A Model-based Approach for Assessing the Security of Cyber-Physical Systems
- Hugo Teixeira De Castro,
- Ahmed Hussain,
- Gregory Blanc,
- Jamal El Hachem,
- Dominique Blouin,
- Jean Leneutre,
- Panos Papadimitratos
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 121, Pages 1–10https://doi.org/10.1145/3664476.3670470Cyber-Physical Systems (CPSs) complexity has been continuously increasing to support new life-impacting applications, such as Internet of Things (IoT) devices or Industrial Control Systems (ICSs). These characteristics introduce new critical security ...
- short-paperMay 2024
Over-the-Air Runtime Wi-Fi MAC Address Re-randomization
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 8–13https://doi.org/10.1145/3643833.3656122Medium Access Control (MAC) address randomization is a key component for privacy protection in Wi-Fi networks. Current proposals periodically change the mobile device MAC addresses when it disconnects from the Access Point (AP). This way frames cannot be ...
- proceedingNovember 2023
WPES '23: Proceedings of the 22nd Workshop on Privacy in the Electronic Society
We are excited to welcome you to the 22nd Workshop on Privacy in the Electronic Society (WPES'23). The WPES workshop has a long-standing tradition of showcasing work from academia, industry, and government presenting novel research on theoretical and ...
- abstractNovember 2023
WPES '23: 22nd Workshop on Privacy in the Electronic Society
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3645–3647https://doi.org/10.1145/3576915.3624019These proceedings contain the papers selected for inclusion in the technical program for the 22st ACM Workshop on Privacy in the Electronic Society (ACM WPES 2023), held in conjunction with the 30th ACM Conference on Computer and Communication Security (...
-
- research-articleOctober 2023
Thwarting code-reuse and side-channel attacks in embedded systems
AbstractEmbedded devices are increasingly present in our everyday life. They often process critical information, and hence, rely on cryptographic protocols to achieve security. However, embedded devices remain particularly vulnerable to ...
- ArticleMarch 2024
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy
Computer Security. ESORICS 2023 International WorkshopsPages 474–493https://doi.org/10.1007/978-3-031-54204-6_28AbstractMobile crowdsensing (MCS) leverages smart devices for diverse data collection tasks, ranging from noise measurements to traffic congestion levels. However, with security and privacy a prerequisite for deployment, creating a diverse ecosystem, ...
- research-articleDecember 2022
Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective
AbstractWhile recent research on intelligent transportation systems including vehicular communication systems has focused on technical aspects, little research work has been conducted on drivers’ privacy perceptions and preferences. ...
- research-articleMay 2022
Attack Impact and Misbehavior Detection in Vehicular Platoons
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 45–59https://doi.org/10.1145/3507657.3528552Cooperative Adaptive Cruise Control, a promising Vehicular Ad-hoc Network application, automates transportation and improves efficiency. Vehicles form a platoon, following a leader, with their controllers automatically adjusting velocity, based on ...
- research-articleMay 2022
Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 73–84https://doi.org/10.1145/3507657.3528538Location-based services (LBS) increasingly rely on participatory or crowd-sensed data: users voluntarily contribute data about their whereabouts and points of interest (POIs) and allow the LBS to capture the dynamically changing environment, e.g., how ...
- research-articleNovember 2021
HarvestPrint: Securing Battery-free Backscatter Tags through Fingerprinting
HotNets '21: Proceedings of the 20th ACM Workshop on Hot Topics in NetworksPages 178–184https://doi.org/10.1145/3484266.3487388Backscatter enables wireless transmissions at dramatically lower power compared to mainstream Internet of Things (IoT) transmitters. This significantly improves battery life or even eliminates the need of batteries for backscatter-based 'tags' operating ...
- research-articleSeptember 2021
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency
IEEE/ACM Transactions on Networking (TON), Volume 30, Issue 1Pages 354–367https://doi.org/10.1109/TNET.2021.3113370Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: <italic>uniform load distribution</italic> of the incoming ...
- demonstrationJune 2021
Relay/replay attacks on GNSS signals
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 380–382https://doi.org/10.1145/3448300.3468256Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon for positioning and timing. Detection and prevention of attacks against GNSS have been researched over the last decades, but many of these attacks and countermeasures were ...
- posterJune 2021
Detecting GNSS misbehaviour with high-precision clocks
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 389–391https://doi.org/10.1145/3448300.3468254To mitigate spoofing attacks targeting global navigation satellite systems (GNSS) receivers, one promising method is to rely on alternative time sources, such as network-based synchronization, in order to detect clock offset discrepancies caused by GNSS ...
- ArticleFebruary 2020
A high-speed load-balancer design with guaranteed per-connection-consistency
- Tom Barbette,
- Chen Tang,
- Haoran Yao,
- Dejan Kostić,
- Gerald Q. Maguire,
- Panagiotis Papadimitratos,
- Marco Chiesa
NSDI'20: Proceedings of the 17th Usenix Conference on Networked Systems Design and ImplementationPages 667–684Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: uniform load distribution of the incoming connections ...
- research-articleSeptember 2019
Resilient Privacy Protection for Location-Based Services through Decentralization
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 4Article No.: 21, Pages 1–36https://doi.org/10.1145/3319401Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS ...
- research-articleJuly 2019
DoS-resilient cooperative beacon verification for vehicular communication systems
AbstractAuthenticated safety beacons in Vehicular Communication (VC) systems ensure awareness among neighboring vehicles. However, the verification of beacon signatures introduces significant processing overhead for resource-constrained ...
- research-articleMay 2019
Scaling pseudonymous authentication for large mobile systems
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 174–184https://doi.org/10.1145/3317549.3323410The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used ...
- research-articleOctober 2018
The Symmetric Two-Hop Channel with an Untrusted Relay
2018 International Symposium on Information Theory and Its Applications (ISITA)Pages 673–677https://doi.org/10.23919/ISITA.2018.8664257We study, using information-theoretic security methods, the so-called symmetric two-hop channel with an untrusted relay. In this model, a source wants to send its message reliably and securely to the destination through an honest but curious relay. The ...
- research-articleOctober 2018
On the Capacity of State-Dependent Gaussian Z-Interference Channel
2018 International Symposium on Information Theory and Its Applications (ISITA)Pages 653–657https://doi.org/10.23919/ISITA.2018.8664256We study the State-Dependent Gaussian Z-Interference Channel (SDG-ZIC), with two senders transmitting two independent messages through a Gaussian Z-interference channel with the same state. Transmitter 1 interferes with receiver 2, while transmitter 2 ...