Runtime memory vulnerabilities, especially present in widely used languages as C and C++, are exploited by attackers to corrupt code pointers and hijack the execution flow of a program running on a target system to force it to behave abnormally. This is the principle of modern Code Reuse Attacks (CRAs)...More>>
Publications & Demonstrators
All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA
CFI: Control Flow Integrity or Control Flow Interruption?
Nicoló Maunero, Paolo Prinetto, Gianluca Roascio
Machine Learning – The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Michał Choraś, Marek Pawlicki, Damian Puchalski, Rafał Kozik
Recent advances in machine learning (ML) and the surge in computational power have opened the way to the proliferation of ML and Artificial Intelligence (AI) in many domains and applications. Still, apart from achieving good accuracy and results, there are many challenges that need to be discussed in order to...More>>
On the Impact of Network Data Balancing in Cybersecurity Applications
Marek Pawlicki, Michał ChoraśRafał, KozikWitold Hołubowicz
Machine learning methods are now widely used to detect a wide range of cyberattacks. Nevertheless, the commonly used algorithms come with challenges of their own - one of them lies in network dataset characteristics. The dataset should be well-balanced in terms of the number of malicious data samples vs. benign...More>>
ModelSpeX: Model Specification Using Explainable Artificial Intelligence Methods
Schlegel, Udo; Cakmak, Eren; Keim, Daniel A.
Abstract Explainable artificial intelligence (XAI) methods aim to reveal the non-transparent decision-making mechanisms of black-box models. The evaluation of insight generated by such XAI methods remains challenging as the applied techniques depend on many factors (e.g., parameters and human interpretation). We propose ModelSpeX, a visual analytics workflow to interactively extract...More>>
Defending Network Intrusion Detection Systems against Adversarial Evasion Attacks
Marek Pawlicki; Michał Choraś; Rafał Kozik
Intrusion Detection and the ability to detect attacks is a crucial aspect to ensure cybersecurity. However, what if an IDS (Intrusion Detection System) itself is attacked; in other words what defends the defender? In this work, the focus is on countering attacks on machine learning-based cyberattack detectors. In principle, we...More>>
LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion
Damasevicius, Robertas; Venckauskas, Algimantas; Grigaliunas, Sarunas; Toldinas, Jevgenijus; Morkevicius, Nerijus; Aleliunas, Tautvydas; Smuikys, Paulius.
Network intrusion detection is one of the main problems in ensuring the security of modern computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In order to develop efficient network-intrusion-detection methods, realistic and up-to-date network flow datasets are required. Despite several recent efforts, there is still a lack of...More>>
Privacy-Preserving Contact Tracing: current solutions and open questions
The COVID-19 pandemic has posed a unique challenge for the world to find solutions, ranging from vaccines to ICT solutions to slow down the virus spreading. Due to the highly contagious nature of the virus, social distancing is one fundamental measure which has already adopted by many countries. At the...More>>
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory,or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features,...More>>
Natural Projection as Partial Model Checking
Costa, G.; Galletta, L.; Degano, P.; Basin, D.; Bodei, C.
Verifying the correctness of a system as a whole requires establishing that it satisfies a global specification. When it does not, it would be helpful to determine which modules are incorrect. As a consequence, specification decomposition is a relevant problem from both a theoretical and practical point of view. Until...More>>