from 1st March to 31st May

Publications & Demonstrators

All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA


SI‐AKAV: Secure integrated authentication and key agreement for cellular‐connected IoT devices in vehicular social networks

Alireza Esfahani, Jérémie Decouchant, Marcus Völp, Shahid Mumtaz, Kostromitin Konstantin Igorevich

Vehicular social networking (VSN), as a novel communication paradigm, exploits opportunistic encounters among vehicles for mobile social networking, collaborative content dissemination, and to provide a variety of services for users and their vehicles. VSNs promise to solve problems such as the ever‐increasing number of road accidents, or traffic congestion, by...More>>

Domains: Vehicular, social, networking

Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan

For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in...More>>

Domains: Security, privacy, →, Privacy-preserving, protocols, Management, querying, of, encrypted, data,

Self-secured PUF: Protecting the Loop PUF by Masking

Tebelmann, L., Danger, J. L., & Pehl, M.

Physical Unclonable Functions (PUFs) provide means to gen-erate chip individual keys, especially for low-cost applications such as theInternet of Things (IoT). They are intrinsically robust against reverseengineering, and more cost-effective than non-volatile memory (NVM).For several PUF primitives, countermeasures have been proposed to mit-igate side-channel weaknesses. However, most mitigation techniques re-quire...More>>

Domains: Physically, Unclonable, Function, Side-Channel, Analysis, RO, PUF, Loop, Masking, Countermeasure, IoT

Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware DetectionNeural Networks

Damaševičius, Robertas; Venčkauskas, Algimantas; Toldinas, Jevgenijus; Grigaliūnas, Šarūnas

The security of information is among the greatest challenges facing organizations and institutions. Cybercrime has risen in frequency and magnitude in recent years, with new ways to steal, change and destroy information or disable information systems appearing every day. Among the types of penetration into the information systems where confidential...More>>

Domains: Neural, Networks, Machine, Learning, Malware

Information Sharing in Cyber Defence Exercises

Eduardas Kutka, Aušrius Juozapavičius, Linas Bukauskas, Agnė Brilingaitė

Availability and easy access to sophisticated cyber penetration testing tools enable exploitation of vulnerabilities in different systems globally. Repetitive nature and recognisable signatures of attacks raise demand for effective information sharing. Timely warnings about cyber incidents in other systems make it possible to identify related attacks locally. International cyber community...More>>

Domains: cyber, defence, exercises, incident, information, sharing, indicators, of, compromise, collaborative

Machine Learning for Driver Detection through CAN bus

Fabio Martinelli, Francesco Mercaldo, Antonella Santone

In last years vehicular network safety and security are attracting interest from both industries and researchers. In this paper, starting from a set of features gathered from the in-vehicle CAN bus, we show how machine learning algorithms can be useful to discriminate between the car owner and impostors. Furthermore, we...More>>

Domains: Automated, vehicles, Machine, Learning

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini

Android currently represents the most widespread operating system focused on mobile devices. It is not surprising that the majority of malware is created to perpetrate attacks targeting mobile devices equipped with this operating systems. In the mobile malware landscape, there exists a plethora of malware families exhibiting different malicious behaviors....More>>

Domains: Android

Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources

Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone

The role of remote resources, such as the ones provided by Cloud infrastructures, is of paramount importance for the implementation of cost effective, yet reliable software systems to provide services to third parties. Cost effectiveness is a direct consequence of a correct estimation of resource usage, to be able to...More>>

Domains: Security, Generative, Adversarial, Networks, Deep, learning, Cloud, Serverless, Software, services, Microservices, Energy, attacks

Visualizing the outcome of dynamic analysis of Android malware with VizMal

Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone

Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of the effort is on the identification as malware or non-malware of an entire sample. There are no...More>>

Domains: Malware, analysisAndroidMachine, learningMultiple, instance, learningLSTM-RNNSecurity