Our Publications
Here you find our publications.
2021
Kilger, Fabian; Kabil, Alexandre; Tippmann, Volker; Klinker, Gudrun; Pahl, Marc-Oliver
Detecting and Preventing Faked Mixed Reality Proceedings Article
In: 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 399–405, IEEE 2021.
BibTeX | Tags:
@inproceedings{kilger2021detecting,
title = {Detecting and Preventing Faked Mixed Reality},
author = {Fabian Kilger and Alexandre Kabil and Volker Tippmann and Gudrun Klinker and Marc-Oliver Pahl},
year = {2021},
date = {2021-01-01},
booktitle = {2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)},
pages = {399\textendash405},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Wüstrich, Lars; Schröder, Lukas; Pahl, Marc-Oliver
Cyber-physical anomaly detection for ICS Proceedings Article
In: 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 950–955, IEEE 2021.
BibTeX | Tags:
@inproceedings{wustrich2021cyber,
title = {Cyber-physical anomaly detection for ICS},
author = {Lars W\"{u}strich and Lukas Schr\"{o}der and Marc-Oliver Pahl},
year = {2021},
date = {2021-01-01},
booktitle = {2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)},
pages = {950\textendash955},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Smine, Manel; Espes, David; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Pahl, Marc-Oliver
A priority-based domain type enforcement for exception management Proceedings Article
In: Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers 13, pp. 65–81, Springer International Publishing 2021.
BibTeX | Tags:
@inproceedings{smine2021priority,
title = {A priority-based domain type enforcement for exception management},
author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Marc-Oliver Pahl},
year = {2021},
date = {2021-01-01},
booktitle = {Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1\textendash3, 2020, Revised Selected Papers 13},
pages = {65\textendash81},
organization = {Springer International Publishing},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Kilger, Fabian; Kabil, Alexandre; Tippmann, Volker; Klinker, Gudrun; Pahl, Marc-Oliver
Detecting and Preventing Faked Mixed Reality Proceedings Article
In: 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 399-405, 2021.
@inproceedings{9565553,
title = {Detecting and Preventing Faked Mixed Reality},
author = {Fabian Kilger and Alexandre Kabil and Volker Tippmann and Gudrun Klinker and Marc-Oliver Pahl},
doi = {10.1109/MIPR51284.2021.00074},
year = {2021},
date = {2021-01-01},
booktitle = {2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)},
pages = {399-405},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Barbeau, Michel; Cuppens, Frédéric; Cuppens, Nora; Dagnas, Romain; Garcia-Alfaro, Joaquin
Metrics to enhance the resilience of cyber-physical systems Proceedings Article
In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1167–1172, IEEE 2021.
@inproceedings{barbeau2021metrics,
title = {Metrics to enhance the resilience of cyber-physical systems},
author = {Michel Barbeau and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/TrustCom50675.2020.00156},
doi = {10.1109/TrustCom50675.2020.00156},
year = {2021},
date = {2021-01-01},
booktitle = {2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)},
pages = {1167--1172},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Garcia-Alfaro, Joaquin; Leneutre, Jean; Cuppens, Nora; Yaich, Reda
Springer, 2021.
@book{lncs12528,
title = {Risks and Security of Internet and Systems, 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers},
author = {Joaquin Garcia-Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich},
url = {https://doi.org/10.1007/978-3-030-68887-5},
doi = {10.1007/978-3-030-68887-5},
year = {2021},
date = {2021-01-01},
publisher = {Springer},
series = {LNCS 12528},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Barbeau, Michel; Cuppens, Frédéric; Cuppens, Nora; Dagnas, Romain; Garcia-Alfaro, Joaquin
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics Journal Article
In: IEEE Access, vol. 9, pp. 46462–46475, 2021.
@article{barbeau2021resilience,
title = {Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics},
author = {Michel Barbeau and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/ACCESS.2021.3066108},
doi = {10.1109/ACCESS.2021.3066108},
year = {2021},
date = {2021-01-01},
journal = {IEEE Access},
volume = {9},
pages = {46462--46475},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nicolescu, Gabriela; Tria, Assia; Fernandez, Jose M.; Marion, Jean-Yves; Garcia-Alfaro, Joaquin
Springer, 2021.
@book{lncs12637,
title = {Foundations and Practice of Security, 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers},
author = {Gabriela Nicolescu and Assia Tria and Jose M. Fernandez and Jean-Yves Marion and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-70881-8},
doi = {10.1007/978-3-030-70881-8},
year = {2021},
date = {2021-01-01},
publisher = {Springer},
series = {LNCS 12637},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
2020
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana R; Garcia-Alfaro, Joaquin
Switched-based Resilient Control of Cyber-Physical Systems Journal Article
In: IEEE Access, 2020.
@article{segovia2020switched,
title = {Switched-based Resilient Control of Cyber-Physical Systems},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/ACCESS.2020.3039879},
doi = {10.1109/ACCESS.2020.3039879},
year = {2020},
date = {2020-11-01},
journal = {IEEE Access},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article
In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.
Abstract | Links | BibTeX | Tags: countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security
@inproceedings{Bourget2020b,
title = {PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis},
author = {Edwin Bourget and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens-Boulahia},
url = {https://dl.acm.org/doi/10.1145/3384941.3409590},
doi = {10.1145/3384941.3409590},
isbn = {9781450376082},
year = {2020},
date = {2020-10-01},
booktitle = {Proceedings of the 6th ACM on Cyber-Physical System Security Workshop},
pages = {30--41},
publisher = {ACM},
address = {New York, NY, USA},
abstract = {The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This article presents an event model designed to provide useful and relevant information for diagnosis of safety and security events. We provide a means for system experts to model elementary events that are automatically recombined in complex and complete scenarios. We specifically focus on the ability to represent countermeasures and sequences of events, recurrent problems in the literature. We also introduce a means to precisely measure the wear of components, an important feature for the model to obtain accurate values. We showcase the use of our model for diagnosis purposes on a cyber-physical system testbed.},
keywords = {countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Benzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin
Foundations and Practice of Security Book
Springer, 2020.
@book{lncs12056,
title = {Foundations and Practice of Security},
author = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-45371-8},
doi = {10.1007/978-3-030-45371-8},
year = {2020},
date = {2020-04-01},
publisher = {Springer},
series = {LNCS 12056},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Segovia, Mariana; Cavalli, Ana; Cuppens, Nora; Rubio-Hernan, Jose; Garcia-Alfaro, Joaquin
Reflective Attenuation of Cyber-Physical Attacks Proceedings Article
In: 5th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980, pp. 19–34, Springer, 2020.
@inproceedings{segovia2019cybericps,
title = {Reflective Attenuation of Cyber-Physical Attacks},
author = {Mariana Segovia and Ana Cavalli and Nora Cuppens and Jose Rubio-Hernan and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42048-2_2},
doi = {10.1007/978-3-030-42048-2_2},
year = {2020},
date = {2020-02-01},
booktitle = {5th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980},
pages = {19--34},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Katsikas, Sokratis; Cuppens, Frederic; Cuppens, Nora; Lambrinoudakis, Costas; Kalloniatis, Christos; Mylopoulos, John; Anton, Annie; Gritzalis, Stefanos; Pallas, Frank; Pohle, Jorg; Sasse, Angela; Meng, Weizhi; Furnell, Steven; Garcia-Alfaro, Joaquin
Springer, 2020.
@book{lncs11980,
title = {Computer Security, ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26--27, 2019 Revised Selected Papers},
author = {Sokratis Katsikas and Frederic Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie Anton and Stefanos Gritzalis and Frank Pallas and Jorg Pohle and Angela Sasse and Weizhi Meng and Steven Furnell and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42048-2},
doi = {10.1007/978-3-030-42048-2},
year = {2020},
date = {2020-02-01},
publisher = {Springer},
series = {LNCS 11980},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Fournaris, Apostolos; Athanatos, Manos; Lampropoulos, Konstantinos; Ioannidis, Sotiris; Hatzivasilis, George; Damiani, Ernesto; Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Siena, Alberto; Garcia-Alfaro, Joaquin
Springer, 2020.
@book{lncs11981,
title = {Computer Security, ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26--27, 2019, Revised Selected Papers},
author = {Apostolos Fournaris and Manos Athanatos and Konstantinos Lampropoulos and Sotiris Ioannidis and George Hatzivasilis and Ernesto Damiani and Habtamu Abie and Silvio Ranise and Luca Verderame and Alberto Siena and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-42051-2},
doi = {10.1007/978-3-030-42051-2},
year = {2020},
date = {2020-02-01},
publisher = {Springer},
series = {LNCS 11981},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Navas, Renzo E; Sandaker, Håkon; Cuppens, Frédéric; Cuppens, Nora; Toutain, Laurent; Papadopoulos, Georgios Z
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher
@article{Navas2020,
title = {IANVS: A Moving Target Defense Framework for a Resilient Internet of Things},
author = {Renzo E Navas and Hr{a}kon Sandaker and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Laurent Toutain and Georgios Z Papadopoulos},
doi = {10.1109/ISCC50000.2020.9219728},
issn = {15301346},
year = {2020},
date = {2020-01-01},
journal = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the Internet. This networking capability allows for new beneficial services and applications. However, it is also the entry-point for a wide variety of cyber-attacks that target these devices. The security measures present in real IoT systems lag behind those of the standard Internet. Security is sometimes completely absent. Moving Target Defense (MTD) is a 10-year-old cyber-defense paradigm. It proposes to randomize components of a system. Reasonably, an attacker will have a higher cost attacking an MTD-version of a system compared with a static-version of it. Even if MTD has been successfully applied to standard systems, its deployment for IoT is still lacking. In this paper, we propose a generic MTD framework suitable for IoT systems: IANVS (pronounced Janus). Our framework has a modular design. Its components can be adapted according to the specific constraints and requirements of a particular IoT system. We use it to instantiate two concrete MTD strategies. One that targets the UDP port numbers (port-hopping), and another a CoAP resource URI. We implement our proposal on real hardware using Pycom LoPy4 nodes. We expose the nodes to a remote Denial-of-Service attack and evaluate the effectiveness of the IANVS-based port-hopping MTD proposal.},
keywords = {attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher},
pubstate = {published},
tppubtype = {article}
}
Smine, Manel; Espes, David; Cuppens-Boulahia, Nora; Cuppens, Frédéric
Network functions virtualization access control as a service Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12122 LNCS, no. 1, pp. 100–117, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Access control, Domain type enforcement (DTE), Network Functions Virtualization (NFV), Policy enforcement
@article{Smine2020,
title = {Network functions virtualization access control as a service},
author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens},
doi = {10.1007/978-3-030-49669-2_6},
issn = {16113349},
year = {2020},
date = {2020-01-01},
journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {12122 LNCS},
number = {1},
pages = {100--117},
abstract = {NFV is an important innovation in networking. It has many advantages such as saving investment cost, optimizing resource consumption, improving operational efficiency and simplifying network service lifecycle management. NFV environments introduce new security challenges and issues since new types of threats and vulnerabilities are inevitably introduced (e.g. security policy and regular compliance failure, vulnerabilities in VNF softwares, malicious insiders, etc.). The impact of these threats can be mitigated by enforcing security policies over deployed network services. In this paper, we introduce an access control as a service model for NFV services. The proposed approach can deploy several kinds of access control model policies (e.g. RBAC, ORBAC, ABAC, etc.) for NFV services and can be easily scaled.},
keywords = {Access control, Domain type enforcement (DTE), Network Functions Virtualization (NFV), Policy enforcement},
pubstate = {published},
tppubtype = {article}
}
Clédel, Thomas; Cuppens, Nora; Cuppens, Frédéric; Dagnas, Romain
Resilience properties and metrics: how far have we gone? Journal Article
In: Journal of Surveillance, Security and Safety, pp. 119–139, 2020.
Links | BibTeX | Tags: 0, 2020, 4, adaptation, any medium or format, as long as you, by, creative commons attribution 4, creativecommons, distribution and reproduction in, even commercially, for any purpose, https, ing, international license, is licensed under a, licenses, measurement, metrics, open access this article, org, resilience, s, shar, survey, the author, which permits unrestricted use
@article{Cledel2020,
title = {Resilience properties and metrics: how far have we gone?},
author = {Thomas Cl\'{e}del and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens and Romain Dagnas},
doi = {10.20517/jsss.2020.08},
year = {2020},
date = {2020-01-01},
journal = {Journal of Surveillance, Security and Safety},
pages = {119--139},
keywords = {0, 2020, 4, adaptation, any medium or format, as long as you, by, creative commons attribution 4, creativecommons, distribution and reproduction in, even commercially, for any purpose, https, ing, international license, is licensed under a, licenses, measurement, metrics, open access this article, org, resilience, s, shar, survey, the author, which permits unrestricted use},
pubstate = {published},
tppubtype = {article}
}
Pérez-Sol`a, Cristina; Ranchal-Pedrosa, Alejandro; Herrera-Joancomart'i, Jordi; Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin
Lockdown: Balance availability attack against lightning network channels Proceedings Article
In: International Conference on Financial Cryptography and Data Security, pp. 245–263, Springer 2020.
@inproceedings{perez2020lockdown,
title = {Lockdown: Balance availability attack against lightning network channels},
author = {Cristina P\'{e}rez-Sol`a and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomart'i and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-51280-4_14},
doi = {10.1007/978-3-030-51280-4_14},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on Financial Cryptography and Data Security},
pages = {245--263},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
P`amies-Estrems, David; Castell`a-Roca, Jordi; Garcia-Alfaro, Joaquin
A Real-Time Query Log Protection Method for Web Search Engines Journal Article
In: IEEE Access, vol. 8, pp. 87393–87413, 2020.
@article{pamies2020real,
title = {A Real-Time Query Log Protection Method for Web Search Engines},
author = {David P`amies-Estrems and Jordi Castell`a-Roca and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/ACCESS.2020.2992012},
doi = {10.1109/ACCESS.2020.2992012},
year = {2020},
date = {2020-01-01},
journal = {IEEE Access},
volume = {8},
pages = {87393--87413},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Faraj, Omair; Meg'ias, David; Ahmad, Abdel-Mehsen; Garcia-Alfaro, Joaquin
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things Proceedings Article
In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–10, ACM, 2020.
@inproceedings{faraj2020taxonomy,
title = {Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things},
author = {Omair Faraj and David Meg'ias and Abdel-Mehsen Ahmad and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1145/3407023.3407048},
doi = {10.1145/3407023.3407048},
year = {2020},
date = {2020-01-01},
booktitle = {Proceedings of the 15th International Conference on Availability, Reliability and Security},
pages = {1--10},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Gonzalez-Granadillo, Gustavo; Doynikova, Elena; Garcia-Alfaro, Joaquin; Kotenko, Igor; Fedorchenko, Andrey
Stateful RORI-based countermeasure selection using hypergraphs Journal Article
In: Journal of Information Security and Applications, vol. 54, pp. 102562, 2020.
@article{gonzalez2020stateful,
title = {Stateful RORI-based countermeasure selection using hypergraphs},
author = {Gustavo Gonzalez-Granadillo and Elena Doynikova and Joaquin Garcia-Alfaro and Igor Kotenko and Andrey Fedorchenko},
url = {https://doi.org/10.1016/j.jisa.2020.102562},
doi = {10.1016/j.jisa.2020.102562},
year = {2020},
date = {2020-01-01},
journal = {Journal of Information Security and Applications},
volume = {54},
pages = {102562},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Barbeau, Michel; Garcia-Alfaro, Joaquin; Kranakis, Evangelos
Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition Proceedings Article
In: International Conference on Ad-Hoc Networks and Wireless, pp. 55–70, Springer 2020.
@inproceedings{barbeau2020geocaching,
title = {Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition},
author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis},
url = {https://doi.org/10.1007/978-3-030-61746-2_5},
doi = {10.1007/978-3-030-61746-2_5},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on Ad-Hoc Networks and Wireless},
pages = {55--70},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Garcia-Alfaro, Joaquin; Navarro-Arribas, Guillermo; Herrera-Joancomarti, Jordi
Data Privacy Management, Cryptocurrencies and Blockchain Technology Book
Springer, 2020.
@book{lncs12484,
title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology},
author = {Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Jordi Herrera-Joancomarti},
url = {https://link.springer.com/book/10.1007/978-3-030-66172-4},
doi = {10.1007/978-3-030-66172-4},
year = {2020},
date = {2020-01-01},
publisher = {Springer},
series = {LNCS 12484},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Laborde, Romain; Aitsaadi, Nadjib; Ghernaouti, Solange; Benzekri, Abdelmalek; Garcia-Alfaro, Joaquin
2020 4th Cyber Security in Networking Conference, CSNet 2020 Book
IEEE, 2020, ISBN: 978-1-6654-0458-7.
@book{CSNet2020,
title = {2020 4th Cyber Security in Networking Conference, CSNet 2020},
author = {Romain Laborde and Nadjib Aitsaadi and Solange Ghernaouti and Abdelmalek Benzekri and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/CSNet50428.2020},
doi = {10.1109/CSNet50428.2020},
isbn = {978-1-6654-0458-7},
year = {2020},
date = {2020-01-01},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana; Garcia-Alfaro, Joaquin
Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report) Technical Report
2020.
@techreport{segovia2020ncaTechRep,
title = {Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report)},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana Cavalli and Joaquin Garcia-Alfaro},
url = {https://arxiv.org/abs/2009.06927},
year = {2020},
date = {2020-01-01},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Segovia, Mariana; Rubio-Hernan, Jose; Cavalli, Ana R; Garcia-Alfaro, Joaquin
Cyber-Resilience Evaluation of Cyber-Physical Systems Proceedings Article
In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), pp. 1–8, IEEE 2020.
@inproceedings{segovia2020nca,
title = {Cyber-Resilience Evaluation of Cyber-Physical Systems},
author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1109/NCA51143.2020.9306741},
doi = {10.1109/NCA51143.2020.9306741},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)},
pages = {1--8},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sharma, Neetu; Sahu, Rajeev Anand; Saraswat, Vishal; Garcia-Alfaro, Joaquin
Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures Proceedings Article
In: Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers, pp. 137–146, Springer, 2020.
@inproceedings{sharma2020anonymous,
title = {Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures},
author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-70881-8_9},
doi = {10.1007/978-3-030-70881-8_9},
year = {2020},
date = {2020-01-01},
booktitle = {Foundations and Practice of Security - 13th International Symposium,
FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected
Papers},
volume = {12637},
pages = {137--146},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sharma, Neetu; Sahu, Rajeev Anand; Saraswat, Vishal; Garcia-Alfaro, Joaquin
Anonymous proof-of-asset transactions using designated blind signatures Technical Report
2020.
@techreport{sharma2020anonymousTechRep,
title = {Anonymous proof-of-asset transactions using designated blind signatures},
author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro},
url = {https://arxiv.org/pdf/2009.13978},
year = {2020},
date = {2020-01-01},
journal = {arXiv preprint arXiv:2009.13978},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
Piccoli, A; Pahl, M-O; Wüstrich, L
Group Key Management in constrained IoT Settings Proceedings Article
In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: autonomous management, constrained nodes, group key management, IoT, reliability, Security
@inproceedings{Piccoli2020,
title = {Group Key Management in constrained IoT Settings},
author = {A Piccoli and M-O Pahl and L W\"{u}strich},
doi = {10.1109/ISCC50000.2020.9219619},
issn = {15301346},
year = {2020},
date = {2020-01-01},
booktitle = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {textcopyright 2020 IEEE. The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, in their Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead. This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.},
keywords = {autonomous management, constrained nodes, group key management, IoT, reliability, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Moussaileb, Routa; Navas, Renzo E; Cuppens, Nora
Watch out! Doxware on the way $łdots$ Journal Article
In: Journal of information security and applications, vol. 55, pp. 102668, 2020.
BibTeX | Tags:
@article{moussaileb2020watch,
title = {Watch out! Doxware on the way $\ldots$},
author = {Routa Moussaileb and Renzo E Navas and Nora Cuppens},
year = {2020},
date = {2020-01-01},
journal = {Journal of information security and applications},
volume = {55},
pages = {102668},
publisher = {Elsevier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Dernaika, Farah; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Raynaud, Olivier
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism Proceedings Article
In: International Conference on the Quality of Information and Communications Technology, pp. 332–342, Springer 2020.
BibTeX | Tags:
@inproceedings{dernaika2020accountability,
title = {Accountability in the A Posteriori Access Control: A Requirement and a Mechanism},
author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud},
year = {2020},
date = {2020-01-01},
booktitle = {International Conference on the Quality of Information and Communications Technology},
pages = {332--342},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lubben, Christian; Pahl, Marc Oliver; Khan, Mohammad Irfan
Using Deep Learning to Replace Domain Knowledge Journal Article
In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.
Abstract | Links | BibTeX | Tags: ANN, deep learning, network traffic prediction, V2V, V2X
@article{Lubben2020,
title = {Using Deep Learning to Replace Domain Knowledge},
author = {Christian Lubben and Marc Oliver Pahl and Mohammad Irfan Khan},
doi = {10.1109/ISCC50000.2020.9219567},
issn = {15301346},
year = {2020},
date = {2020-01-01},
journal = {Proceedings - IEEE Symposium on Computers and Communications},
volume = {2020-July},
abstract = {Complex problems like the prediction of future behavior of a system are usually solved by using domain knowledge. This knowledge comes with a certain expense which can be monetary costs or efforts to generate it. We want to decrease this cost while using state of the art machine learning and prediction methods. Our aim is to replace the domain knowledge and create a black-box solution that offers automatic reasoning and accurate predictions. Our guiding example is packet scheduling optimization in Vehicle to Vehicle (V2V) communication. Within the evaluation, we compare the prediction quality of a labour-intense whitebox approach with the presented fully-automated blackbox approach. To ease the measurement process we propose a framework design which allows easy exchange of predictors. The results show the successful design of our framework as well as superior accuracy of the black box approach.},
keywords = {ANN, deep learning, network traffic prediction, V2V, V2X},
pubstate = {published},
tppubtype = {article}
}
Bkakria, Anis; Cuppens, Nora; Cuppens, Frdric
Pattern Matching on Encrypted Data Journal Article
In: IACR Cryptol, pp. 1–28, 2020.
BibTeX | Tags: pattern matching, searchable encryption
@article{Bkakria2020,
title = {Pattern Matching on Encrypted Data},
author = {Anis Bkakria and Nora Cuppens and Frdric Cuppens},
year = {2020},
date = {2020-01-01},
journal = {IACR Cryptol},
pages = {1--28},
keywords = {pattern matching, searchable encryption},
pubstate = {published},
tppubtype = {article}
}
Kabil, Alexandre; Duval, Thierry; Cuppens, Nora
Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study Proceedings Article
In: Lecture Notes in Computer Science, pp. 82–101, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Cyber security, Usability study, Virtual reality
@inproceedings{Kabil2020b,
title = {Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study},
author = {Alexandre Kabil and Thierry Duval and Nora Cuppens},
doi = {10.1007/978-3-030-58465-8_6},
issn = {16113349},
year = {2020},
date = {2020-01-01},
booktitle = {Lecture Notes in Computer Science},
volume = {12242 LNCS},
pages = {82--101},
abstract = {Although cybersecurity is a domain where data analysis and training are considered of the highest importance, few virtual environments for cybersecurity are specifically developed, while they are used efficiently in other domains to tackle these issues. By taking into account cyber analysts' practices and tasks, we have proposed the 3D Cyber Common Operational Picture model (3D CyberCOP), that aims at mediating analysts' activities into a Collaborative Virtual Environment (CVE), in which users can perform alert analysis scenarios. In this article, we present a usability study we have performed with non-expert users. We have proposed three virtual environments (a graph-based, an office-based, and the coupling of the two previous ones) in which users should perform a simplified alert analysis scenario based on the WannaCry ransomware. In these environments, users must switch between three views (alert, cyber and physical ones) which all contain different kinds of data sources. These data have to be used to perform the investigations and to determine if alerts are due to malicious activities or if they are caused by false positives. We have had 30 users, with no prior knowledge in cybersecurity. They have performed very well at the cybersecurity task and they have managed to interact and navigate easily. SUS usability scores were above 70 for the three environments and users have shown a preference towards the coupled environment, which was considered more practical and useful.},
keywords = {Cyber security, Usability study, Virtual reality},
pubstate = {published},
tppubtype = {inproceedings}
}
Moussaileb, Routa; Cuppens, Nora; Lanet, Jean Louis; Bouder, Hélène Le
Ransomware Network Traffic Analysis for Pre-encryption Alert Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12056 LNCS, pp. 20–38, 2020, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Machine learning, Network traffic, Ransomware
@article{Moussaileb2020,
title = {Ransomware Network Traffic Analysis for Pre-encryption Alert},
author = {Routa Moussaileb and Nora Cuppens and Jean Louis Lanet and H\'{e}l\`{e}ne Le Bouder},
doi = {10.1007/978-3-030-45371-8_2},
issn = {16113349},
year = {2020},
date = {2020-01-01},
journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {12056 LNCS},
pages = {20--38},
abstract = {Cyber Security researchers are in an ongoing battle against ransomware attacks. Some exploits begin with social engineering methods to install payloads on victims' computers, followed by a communication with command and control servers for data exchange. To scale down these attacks, scientists should shed light on the danger of those rising intrusions to prevent permanent data loss. To join this arm race against malware, we propose in this paper an analysis of various ransomware families based on the collected system and network logs from a computer. We delve into malicious network traffic generated by these samples to perform a packet level detection. Our goal is to reconstruct ransomware's full activity to check if its network communication is distinguishable from benign traffic. Then, we examine if the first packet sent occurs before data's encryption to alert the administrators or afterwards. We aim to define the first occurrence of the alert raised by malicious network traffic and where it takes place in a ransomware workflow. Logs collected are available at http://serveur2.seres.rennes.telecom-bretagne.eu/data/RansomwareData/.},
keywords = {Machine learning, Network traffic, Ransomware},
pubstate = {published},
tppubtype = {article}
}
Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc Oliver; Carle, Georg
Open-Source OPC UA Security and Scalability Journal Article
In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.
Abstract | Links | BibTeX | Tags: OPC UA, open-source, scalability, Security
@article{Muhlbauer2020,
title = {Open-Source OPC UA Security and Scalability},
author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc Oliver Pahl and Georg Carle},
doi = {10.1109/ETFA46521.2020.9212091},
issn = {19460759},
year = {2020},
date = {2020-01-01},
journal = {IEEE International Conference on Emerging Technologies and Factory Automation, ETFA},
volume = {2020-Septe},
pages = {262--269},
abstract = {OPC UA is widely adopted for remote-control in industrial environments. It has a central role for industrial control systems as it enables remote management. Compromising OPC UA can lead to compromising entire production facilities. Consequently, OPC UA requires a high level of security. Major commercial OPC UA implementations have compliance certificates ensuring that their security models obey the specification. However, open-source OPC UA implementations that have wide deployment mostly lack these certificates. In this work, we investigate the security models of the four most commonly used open-source implementations: open62541, node-opcua, UA-.NETStandard, and python-opcua. Furthermore, their scalabilities for the number of clients and OPC UA nodes are also analyzed.},
keywords = {OPC UA, open-source, scalability, Security},
pubstate = {published},
tppubtype = {article}
}
Wüstrich, Lars; Pahl, Marc-Oliver; Liebald, Stefan
An extensible IoT Security Taxonomy Proceedings Article
In: IEEE ISCC 2020, 2020.
Abstract | Links | BibTeX | Tags:
@inproceedings{wustrich2020extensible,
title = {An extensible IoT Security Taxonomy},
author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald},
doi = {10.1109/ISCC50000.2020.9219584},
year = {2020},
date = {2020-01-01},
booktitle = {IEEE ISCC 2020},
abstract = {Security is essential in the Internet of Things (IoT). IoT threat classifications are often non-intuitive to use. Identifying relevant properties of an attack is difficult and requires reading details of the attack. We therefore propose a simple-to-use naming scheme for IoT threat classification. It is based on the affected layers and the affected security goals. We evaluate the usefulness of the chosen approach by applying it to common IoT threats.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pahl, Marc-Oliver; Kabil, Alexandre; Bourget, Edwin; Gay, Matthieu; Brun, Paul-Emmanuel
A mixed-interaction critical infrastructure honeypot Journal Article
In: European Cyber Week CAESAR, 2020.
BibTeX | Tags:
@article{pahl2020mixed,
title = {A mixed-interaction critical infrastructure honeypot},
author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun},
year = {2020},
date = {2020-01-01},
journal = {European Cyber Week CAESAR},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Lübben, Christian; Pahl, Marc-Oliver; Khan, Mohammad Irfan
Using deep learning to replace domain knowledge Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{lubben2020using,
title = {Using deep learning to replace domain knowledge},
author = {Christian L\"{u}bben and Marc-Oliver Pahl and Mohammad Irfan Khan},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc-Oliver; Carle, Georg
Open-source OPC UA security and scalability Proceedings Article
In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 262–269, IEEE 2020.
BibTeX | Tags:
@inproceedings{muhlbauer2020open,
title = {Open-source OPC UA security and scalability},
author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc-Oliver Pahl and Georg Carle},
year = {2020},
date = {2020-01-01},
booktitle = {2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)},
volume = {1},
pages = {262\textendash269},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Piccoli, Alessandro; Pahl, Marc-Oliver; Wüstrich, Lars
Group key management in constrained IoT settings Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{piccoli2020group,
title = {Group key management in constrained IoT settings},
author = {Alessandro Piccoli and Marc-Oliver Pahl and Lars W\"{u}strich},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Piccoli, Alessandro; Pahl, Marc-Oliver; Fries, Steffen; Sel, Tolga
Ensuring consistency for asynchronous Group-Key management in the industrial IoT Proceedings Article
In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–5, IEEE 2020.
BibTeX | Tags:
@inproceedings{piccoli2020ensuring,
title = {Ensuring consistency for asynchronous Group-Key management in the industrial IoT},
author = {Alessandro Piccoli and Marc-Oliver Pahl and Steffen Fries and Tolga Sel},
year = {2020},
date = {2020-01-01},
booktitle = {2020 16th International Conference on Network and Service Management (CNSM)},
pages = {1\textendash5},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pahl, Marc-Oliver
iLab@ Home: Hands-On Networking Classes without Lab Access Proceedings Article
In: Sigcomm 2020 Education, 2020.
BibTeX | Tags:
@inproceedings{pahl2020ilab,
title = {iLab@ Home: Hands-On Networking Classes without Lab Access},
author = {Marc-Oliver Pahl},
year = {2020},
date = {2020-01-01},
booktitle = {Sigcomm 2020 Education},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Wüstrich, Lars; Pahl, Marc-Oliver; Liebald, Stefan
Towards an extensible IoT security taxonomy Proceedings Article
In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1–6, IEEE 2020.
BibTeX | Tags:
@inproceedings{wustrich2020towards,
title = {Towards an extensible IoT security taxonomy},
author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald},
year = {2020},
date = {2020-01-01},
booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)},
pages = {1\textendash6},
organization = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pahl, Marc-Oliver; Kabil, Alexandre; Bourget, Edwin; Gay, Matthieu; Brun, Paul-Emmanuel
A Mixed-Interaction Critical Infrastructure Honeypot Journal Article
In: European Cyber Week CAESAR, 2020, Rennes, France, 2020.
BibTeX | Tags:
@article{Pahl2020,
title = {A Mixed-Interaction Critical Infrastructure Honeypot},
author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun},
year = {2020},
date = {2020-01-01},
journal = {European Cyber Week CAESAR, 2020, Rennes, France},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2019
Pérez-Sol`a, Cristina; Navarro-Arribas, Guillermo; Biryukov, Alex; Garcia-Alfaro, Joaquin
Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2019 and DPM 2019) Book
Springer, 2019.
@book{lncs11737,
title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2019 and DPM 2019)},
author = {Cristina P\'{e}rez-Sol`a and Guillermo Navarro-Arribas and Alex Biryukov and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-31500-9},
doi = {10.1007/978-3-030-31500-9},
year = {2019},
date = {2019-09-01},
publisher = {Springer},
series = {LNCS 11737},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Pahl, Marc-Oliver
Multi-Tenant IoT Service Management towards an IoT App Economy Proceedings Article
In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1–4, IFIP/IEEE IFIP/IEEE, 2019.
BibTeX | Tags:
@inproceedings{Pahl,
title = {Multi-Tenant IoT Service Management towards an IoT App Economy},
author = {Marc-Oliver Pahl},
year = {2019},
date = {2019-04-08},
booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)},
pages = {1--4},
publisher = {IFIP/IEEE},
organization = {IFIP/IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Segovia, Mariana; Cavalli, Anna R.; Cuppens, Nora; Garcia-Alfaro, Joaquin
A Study on Mitigation Techniques for SCADA-driven Cyber-Physical Systems Proceedings Article
In: Foundations and Practice of Security (FPS 2018), pp. 257–264, Springer, 2019.
@inproceedings{segovia2018fps,
title = {A Study on Mitigation Techniques for SCADA-driven Cyber-Physical Systems},
author = {Mariana Segovia and Anna R. Cavalli and Nora Cuppens and Joaquin Garcia-Alfaro},
url = {https://doi.org/10.1007/978-3-030-18419-3_17},
doi = {10.1007/978-3-030-18419-3_17},
year = {2019},
date = {2019-04-01},
booktitle = {Foundations and Practice of Security (FPS 2018)},
pages = {257--264},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Barbeau, M.; Garcia-Alfaro, J.; Kranakis, E.
Geocaching-inspired Resilient Path Planning for Drone Swarms Proceedings Article
In: IEEE Conference on Computer Communications (IEEE INFOCOM 2019) Workshops, pp. 620-625, 2019, ISSN: null.
@inproceedings{BarbeauInfocom2019,
title = {Geocaching-inspired Resilient Path Planning for Drone Swarms},
author = {M. Barbeau and J. Garcia-Alfaro and E. Kranakis},
url = {https://doi.org/10.1109/INFCOMW.2019.8845318},
doi = {10.1109/INFCOMW.2019.8845318},
issn = {null},
year = {2019},
date = {2019-04-01},
booktitle = {IEEE Conference on Computer Communications (IEEE INFOCOM 2019) Workshops},
pages = {620-625},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Bkakria, Anis; Tasidou, Aimilia; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Bouattour, Fatma; Fredj, Feten Ben
Optimal Distribution of Privacy Budget in Differential Privacy Journal Article
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11391 LNCS, pp. 222–236, 2019, ISSN: 16113349.
Abstract | Links | BibTeX | Tags: Differential privacy, Information disclosure risk, Privacy budget distribution
@article{Bkakria2019,
title = {Optimal Distribution of Privacy Budget in Differential Privacy},
author = {Anis Bkakria and Aimilia Tasidou and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Fatma Bouattour and Feten Ben Fredj},
doi = {10.1007/978-3-030-12143-3_18},
issn = {16113349},
year = {2019},
date = {2019-01-01},
journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {11391 LNCS},
pages = {222--236},
abstract = {Privacy budget management plays an important role when applying differential privacy, as it sets an upper limit in the ability to utilise the private database. In this paper, we explore the possibility of extending the total allocated privacy budget, taking into consideration the data consumer characteristics and the data utilisation context. To this end, we first study the problem of privacy budget distribution in adaptive multi-data consumer differential privacy use cases. Then, we present an extension of the classic differential privacy formal model that allows taking into consideration data consumers' information disclosure risk when distributing the privacy budget among them. Finally, we define a method that allows to optimally distribute a given privacy budget among a private database's data consumers.},
keywords = {Differential privacy, Information disclosure risk, Privacy budget distribution},
pubstate = {published},
tppubtype = {article}
}