SPARTA Results

A collection of demonstrators and publications

You can find the different demonstrators from SPARTA as well as a list of the submitted publications in SPARTA and their abstract.

SPARTA Publications

CFI: Control Flow Integrity or Control Flow Interruption?

Nicoló Maunero, Paolo Prinetto, Gianluca Roascio

Runtime memory vulnerabilities, especially present in widely used languages as C and C++, are exploited by attackers to corrupt code pointers and hijack the execution flow of a program running on a target system to force it to behave abnormally. This is the principle of modern Code Reuse Attacks (CRAs)...More>>

Domains: control, flow

WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs

Luca Demetrio, Gabriele Costa, Andrea Valenza and Giovanni Lagorio

Web Application Firewalls (WAFs) are plug-and-play security gateways that promise to enhance the security of a (potentially vulnerable) system with minimal cost and configuration. In recent years, machine learning-based WAFs are catching up with traditional, signature-based ones. They are competitive because they do not require predefined rules; instead, they infer...More>>

Domains:

Big Data Analytics for Intrusion Detection: An Overview

Luis Dias, Miguel Correia

Intrusion detection has become a problem of big data, with a semantic gap between vast security data sources and real knowledge about threats. The use of machine learning (ML) algorithms on big data has already been successfully applied in other domains. Hence, this approach is promising for dealing with cyber...More>>

Domains:

xMP: Selective Memory Protection for Kernel and User Space

Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, and Michalis Polychronakis

Attackers leverage memory corruption vulnerabil-ities to establish primitives forreadingfrom orwritingto theaddress space of a vulnerable process. These primitives formthe foundation for code-reuse and data-oriented attacks. Whilevarious defenses against the former class of attacks have proveneffective, mitigation of the latter remains an open problem.In this paper, we identify various shortcomings of...More>>

Domains:

OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms

Luís Dias, Hélder Reia, Rui Neves and Miguel Correia

The paper presents OutGene, an approach for streaming detection of malicious activity without previous knowledge about attacks or training data. OutGene uses clustering to aggregate hosts with similar behavior. To assist human analysts on pinpointing malicious clusters, we introduce the notion of genetic zoom, that consists in using a genetic...More>>

Domains:

A Privacy-Enhancing Framework for Internet of Things Services

Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny and Sara Ricci

The world has seen an influx of connected devices through both smart devices and smart cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent infrastructures and applications based on IoT can be beneficial to users only if essential private and secure features are assured. However,...More>>

Domains: privacy, iot

Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols

Guillaume Celosia, Mathieu Cunche

Apple Continuity protocols are the underlying network component of Apple Continuity services which allow seamless nearby applications such as activity and file transfer, device pairing and sharing a network connection. Those protocols rely on Bluetooth Low Energy (BLE) to exchange information between devices: Apple Continuity messages are embedded in the...More>>

Domains:

Experimental analysis of the laser-induced instruction skip fault model

Jean-Max Dutertre, Timothe ́ Riom, Olivier Potin, and Jean-Baptiste Rigaud

Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Several research works assessed a fault model that consists in a single instruction skip, i.e....More>>

Domains:

Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism

Guillaume Celosia, Mathieu Cunche

The Bluetooth Low Energy (BLE) protocol is being included in a growing number of connected objects such as fitness trackers and headphones. As part of the service discovery mechanism of BLE, devices announce themselves by broadcasting radio signals called advertisement packets that can be collected with off-the-shelf hardware and software....More>>

Domains: Bluetooth, Low, Energy;, Privacy;, Tracking;, Address, randomization.