This paper considers improving the confidentiality of the next generation of wireless communications by using the watermark-based blind physical layer security (WBPLSec) in Visible Light Communications (VLCs). Since the growth of wireless applications and service, the demand for a secure and fast data transfer connection requires new technology solutions...More>>
Publications & Demonstrators
All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA
Publications
Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
Christophe Ponsard, Jeremy Grandclaudon and Nicolas Point
Increasing the maturity of SMEs with respect to cybersecurity threats is crucial as they are less prepared and less resilient. They are also increasingly exposed and targeted by malicious actors. Providing support means ensuring an effective ecosystem is available to help companies all along the process. Resources have to be...More>>
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé and Jacques Klein
Advertisement drives the economy of the mobile app ecosystem. As a key component in the mobile ad business model, mobile ad content has been overlooked by the research community, which poses a number of threats, e.g., propagating malware and undesirable contents. To understand the practice of these devious ad behaviors,...More>>
A Survey on Multi-Factor Authentication for Online Banking in the Wild
Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone
In recent years, the usage of online banking services has considerably increased. To protect the sensitive resources managed by these services against attackers, banks have started adopting Multi-Factor Authentication (MFA). To date, a variety of MFA solutions have been implemented by banks, leveraging different designs and features and providing a...More>>
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs
Luca Demetrio, Gabriele Costa, Andrea Valenza and Giovanni Lagorio
Web Application Firewalls (WAFs) are plug-and-play security gateways that promise to enhance the security of a (potentially vulnerable) system with minimal cost and configuration. In recent years, machine learning-based WAFs are catching up with traditional, signature-based ones. They are competitive because they do not require predefined rules; instead, they infer...More>>
Big Data Analytics for Intrusion Detection: An Overview
Luis Dias, Miguel Correia
Intrusion detection has become a problem of big data, with a semantic gap between vast security data sources and real knowledge about threats. The use of machine learning (ML) algorithms on big data has already been successfully applied in other domains. Hence, this approach is promising for dealing with cyber...More>>
xMP: Selective Memory Protection for Kernel and User Space
Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, and Michalis Polychronakis
Attackers leverage memory corruption vulnerabil-ities to establish primitives forreadingfrom orwritingto theaddress space of a vulnerable process. These primitives formthe foundation for code-reuse and data-oriented attacks. Whilevarious defenses against the former class of attacks have proveneffective, mitigation of the latter remains an open problem.In this paper, we identify various shortcomings of...More>>
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms
Luís Dias, Hélder Reia, Rui Neves and Miguel Correia
The paper presents OutGene, an approach for streaming detection of malicious activity without previous knowledge about attacks or training data. OutGene uses clustering to aggregate hosts with similar behavior. To assist human analysts on pinpointing malicious clusters, we introduce the notion of genetic zoom, that consists in using a genetic...More>>
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny and Sara Ricci
The world has seen an influx of connected devices through both smart devices and smart cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent infrastructures and applications based on IoT can be beneficial to users only if essential private and secure features are assured. However,...More>>