Publications & Demonstrators

All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA

Publications

Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism

Guillaume Celosia, Mathieu Cunche

The Bluetooth Low Energy (BLE) protocol is being included in a growing number of connected objects such as fitness trackers and headphones. As part of the service discovery mechanism of BLE, devices announce themselves by broadcasting radio signals called advertisement packets that can be collected with off-the-shelf hardware and software....More>>

Domains: Bluetooth, Low, Energy;, Privacy;, Tracking;, Address, randomization.

Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile

Guillaume Celosia, Mathieu Cunche

Bluetooth Low Energy (BLE) is a short range wireless technology included in many consumer devices such as smartphones, earphones and wristbands. As part of the Attribute (ATT) protocol, discover- able BLE devices expose a data structure called Generic Attribute (GATT) profile that describes supported features using concepts of services and...More>>

Domains:

Automated Security Analysis of IoT Software Updates

Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo

IoT devices often operate unsupervised in ever-changing environments for several years. Therefore, they need to be updated on a regular basis. Current approaches for software updates on IoT, like the recent SUIT proposal, focus on granting integrity and confidentiality but do not analyze the content of the software update, especially...More>>

Domains: IoT

TSNSCHED: Automated Schedule Generation for Time Sensitive Networking

Aellison Cassimiro T. dos Santos, Ben Schneider and Vivek Nigam

Time Sensitive Networking (TSN) is a set of standards enabling high performance deterministic communication using different scheduling mechanisms. Due to the size of industrial networks, configuring TSN networks is challenging to be done manually. We present TSNsched, a tool for automatic generation of schedules for TSN. TSNsched takes as input...More>>

Domains:

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain

Michał Choraś, Marek Pawlicki, Rafał Kozik

Machine learning algorithms found their way into a surprisingly wide range of applications, providing utility and allowing for insights gathered from data in a way never before possible. Those tools, however, have not been developed with security in mind. A deployed algorithm can meet a multitude of risks in the...More>>

Domains:

On Computer - Aided Techniques for Supporting Safety and Security Co-Engineering

Vivek Nigam, Antonaneta Kondeva, Carmen Carlan and Harald Ruess

With the increasing system interconnectivity, cyber-attacks on safety-critical systems can lead to catastrophic events.This calls for a better safety and security integration. Indeed, asafety assessment contains security relevant information, such as,key safety hazards, that shall not be triggered by cyber-attacks.Guidelines, such as, SAE J3061 and ED202A, already recommendto exchange information...More>>

Domains: safety, security, co-engineering, ED202A, at-tack, trees, FTA

Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review

Abasi-amefon O. Affia, Raimundas Matulevičius, Alexander Nolte

Automotive industries are maximizing cooperative interactions between vehicular sensors and infrastructure components to make intelligent decisions in its application (i.e traffic management, naviga- tion, or autonomous driving services). This cooperative behaviour also extends to security. With more connected and cooperative components of vehicular intelligent transportation systems (ITS), the possibility of...More>>

Domains: test, automotive

Privacy-preserving and yet Robust Collaborative Filtering Recommender as a Service

Qiang Tang

Collaborative filtering recommenders provide effective personalization services at the cost of sacrificing the privacy of their end users. Due to the increasing concerns from the society and stricter privacy regulations, it is an urgent research challenge to design privacy-preserving and yet robust recommenders which offer recommendation services to privacy-aware users....More>>

Domains: privacy

Visual Analytics for Cyber Security Domain: State-of-the-Art and Challenges

Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius, Vaidas Jukavičius

Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the information visualization methods for facilitating effective analysis of data by employing visual and graphical representation. In cyber security domain, Effective visualization of the data allows to infer valuable insights that enable domain analysts to...More>>

Domains: