Vehicular social networking (VSN), as a novel communication paradigm, exploits opportunistic encounters among vehicles for mobile social networking, collaborative content dissemination, and to provide a variety of services for users and their vehicles. VSNs promise to solve problems such as the ever‐increasing number of road accidents, or traffic congestion, by...More>>
Publications & Demonstrators
All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA
Publications
Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan
For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in...More>>
Self-secured PUF: Protecting the Loop PUF by Masking
Tebelmann, L., Danger, J. L., & Pehl, M.
Physical Unclonable Functions (PUFs) provide means to gen-erate chip individual keys, especially for low-cost applications such as theInternet of Things (IoT). They are intrinsically robust against reverseengineering, and more cost-effective than non-volatile memory (NVM).For several PUF primitives, countermeasures have been proposed to mit-igate side-channel weaknesses. However, most mitigation techniques re-quire...More>>
Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware DetectionNeural Networks
Damaševičius, Robertas; Venčkauskas, Algimantas; Toldinas, Jevgenijus; Grigaliūnas, Šarūnas
The security of information is among the greatest challenges facing organizations and institutions. Cybercrime has risen in frequency and magnitude in recent years, with new ways to steal, change and destroy information or disable information systems appearing every day. Among the types of penetration into the information systems where confidential...More>>
Information Sharing in Cyber Defence Exercises
Eduardas Kutka, Aušrius Juozapavičius, Linas Bukauskas, Agnė Brilingaitė
Availability and easy access to sophisticated cyber penetration testing tools enable exploitation of vulnerabilities in different systems globally. Repetitive nature and recognisable signatures of attacks raise demand for effective information sharing. Timely warnings about cyber incidents in other systems make it possible to identify related attacks locally. International cyber community...More>>
Machine Learning for Driver Detection through CAN bus
Fabio Martinelli, Francesco Mercaldo, Antonella Santone
In last years vehicular network safety and security are attracting interest from both industries and researchers. In this paper, starting from a set of features gathered from the in-vehicle CAN bus, we show how machine learning algorithms can be useful to discriminate between the car owner and impostors. Furthermore, we...More>>
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini
Android currently represents the most widespread operating system focused on mobile devices. It is not surprising that the majority of malware is created to perpetrate attacks targeting mobile devices equipped with this operating systems. In the mobile malware landscape, there exists a plethora of malware families exhibiting different malicious behaviors....More>>
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources
Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone
The role of remote resources, such as the ones provided by Cloud infrastructures, is of paramount importance for the implementation of cost effective, yet reliable software systems to provide services to third parties. Cost effectiveness is a direct consequence of a correct estimation of resource usage, to be able to...More>>
Visualizing the outcome of dynamic analysis of Android malware with VizMal
Andrea De Lorenzo, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Antonella Santone
Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of the effort is on the identification as malware or non-malware of an entire sample. There are no...More>>