@article{SegoviaGarciaACMCSurv, title = {A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems}, author = {Mariana Segovia-Ferreira and Jose Rubio-Hernan and Ana Rosa Cavalli and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1145/3652953}, doi = {10.1145/3652953}, issn = {0360-0300}, year = {2024}, date = {2024-03-01}, journal = {ACM Comput. Surv.}, publisher = {Association for Computing Machinery}, keywords = {}, pubstate = {published}, tppubtype = {article} } @misc{loth2024blessing, title = {Blessing or curse? A survey on the Impact of Generative AI on Fake News}, author = {Alexander Loth and Martin Kappes and Marc-Oliver Pahl}, year = {2024}, date = {2024-01-01}, keywords = {L2I}, pubstate = {published}, tppubtype = {misc} } @inproceedings{ceur-ws3329barbeau, title = {Resilience via Blackbox Self-Piloting Plants}, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Christian L\"{u}bben and Marc-Oliver Pahl and Lars W\"{u}strich}, editor = {Gurvan Guernic}, url = {https://ceur-ws.org/Vol-3329/paper-02.pdf}, year = {2023}, date = {2023-01-01}, booktitle = {Proceedings of the 29th Computer \& Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), Rennes, France, November 15-16, 2022.}, volume = {3329}, pages = {35--46}, publisher = {CEUR-WS.org}, series = {CEUR Workshop Proceedings}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{larsen2023multipath, title = {Multipath neural networks for anomaly detection in cyber-physical systems}, author = {Rapha\"{e}l MJI Larsen and Marc-Oliver Pahl and Gouenou Coatrieux}, year = {2023}, date = {2023-01-01}, journal = {Annals of Telecommunications}, volume = {78}, number = {3-4}, pages = {149\textendash167}, publisher = {Springer International Publishing Cham}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{delcombel2023cybercopters, title = {Cybercopters Swarm: Immersive analytics for alerts classification based on periodic data}, author = {Nicolas Delcombel and Thierry Duval and Marc-Oliver Pahl}, year = {2023}, date = {2023-01-01}, journal = {Frontiers in Virtual Reality}, volume = {4}, pages = {1156656}, publisher = {Frontiers}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pop2023performance, title = {Performance Comparison of UDP and TCP for Different CoAP Load Profiles}, author = {David Pop and Erkin Kirdan and Marc-Oliver Pahl}, year = {2023}, date = {2023-01-01}, booktitle = {NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lubben2023distributed, title = {Distributed device-specific anomaly detection using deep feed-forward neural networks}, author = {Christian L\"{u}bben and Marc-Oliver Pahl}, year = {2023}, date = {2023-01-01}, booktitle = {NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash9}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{wustrich2023network, title = {Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF}, author = {Lars W\"{u}strich and Markus Schacherbauer and Markus Budeus and Dominik Freiherr von K\"{u}n\ssberg and Sebastian Gallenm\"{u}ller and Marc-Oliver Pahl and Georg Carle}, year = {2023}, date = {2023-01-01}, booktitle = {Proceedings of the 1st Workshop on eBPF and Kernel Extensions}, pages = {8\textendash14}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lavaur:hal-03831515, title = {Federated Learning as enabler for Collaborative Security between not Fully-Trusting Distributed Parties}, author = {L\'{e}o Lavaur and Benjamin Cost\'{e} and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, url = {https://imt-atlantique.hal.science/hal-03831515}, year = {2022}, date = {2022-11-01}, booktitle = {C\&ESAR 2022 - 29th Computer \& Electronics Security Application Rendezvous}, pages = {1-16}, address = {Rennes, France}, keywords = {Federated learning ; cybersecurity ; intrusion detection ; distributed trust}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{segovia2022secrypt, title = {Switched-based Control Testbed to Assure Cyber-physical Resilience by Design}, author = {Mariana Segovia and Jose Rubio-Hernan and Ana Cavalli and Joaquin Garcia-Alfaro}, issn = {2184-7711}, year = {2022}, date = {2022-07-01}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), Lisbon, Portugal}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{meraneh2022secrypt, title = {Blind Side Channel On The Elephant LFSR}, author = {Awaleh Houssein-Meraneh and Christophe Clavier and H\'{e}l\`{e}ne Le-Bouder and Julien Maillard and Ga\"{e}lle Thomas}, issn = {2184-7711}, year = {2022}, date = {2022-07-01}, urldate = {2022-07-01}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), Lisbon, Portugal}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{chaitou2022secrypt, title = {Threats to adversarial training for IDSs and mitigation}, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, issn = {2184-7711}, year = {2022}, date = {2022-07-01}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography (Secrypt 2022), Lisbon, Portugal}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Lavaur2022.tnsm, title = {The Evolution of Federated Learning-based Intrusion Detection and Mitigation: a Survey}, author = {Leo Lavaur and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, url = {https://ieeexplore.ieee.org/document/9780571}, doi = {10.1109/TNSM.2022.3177512}, year = {2022}, date = {2022-05-24}, urldate = {2022-05-24}, journal = {IEEE Transactions on Network and Service Management}, publisher = {IEEE}, series = {Special Issue on Network Security Management}, abstract = {In 2016, Google introduced the concept of Federated Learning (FL), enabling collaborative Machine Learning (ML). FL does not share local data but ML models, offering applications in diverse domains. This paper focuses on the application of FL to Intrusion Detection Systems (IDSs). There, common criteria to compare existing solutions are missing. In particular, this survey shows: (i) how FL-based IDSs are used in different domains; (ii) what differences exist between architectures; (iii) the state of the art of FL-based IDS. With a structured literature survey, this work identifies the relevant state of the art in FL\textendashbased intrusion detection from its creation in 2016 until 2021. It provides a reference architecture and a taxonomy to serve as guidelines to compare and design FL- based IDSs. Both are validated with the existing works. Finally, it identifies research directions for the application of FL to intrusion detection systems.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{222179, title = {Resource tradeoffs for TLS-secured MQTT-based IoT Management}, author = {Valentin Dimov and Erkin Kirdan and Marc-Oliver Pahl}, url = {http://XXXXX/222179.pdf}, year = {2022}, date = {2022-04-01}, booktitle = {NOMS 2022 Workshops - Manage-IoT 2022 ()}, abstract = {Transport Layer Security (TLS) is an established Internet security standard. TLS offers a variety of configuration options that affect resource consumption. For deployments of constrained devices in the Internet of Things (IoT), it is crucial to optimize TLSs resource consumption. This study examines how the TLS cryptographic algorithms, so-called cipher suites, affect an MQTT applications resource consumption. MQTT is a popular protocol for IoT. We construct a model application using the Mosquitto MQTT broker and client library. We measure the consumption of CPU cycles, memory, and network bandwidth with the IANA-recommended TLS 1.2 and TLS 1.3 cipher suites. We test and compare different variants for the key exchange, server authentication, client authentication, and symmetric encryption algorithms, as well as recommended elliptic curves for elliptic curve cryptography (ECC) algorithms. We identify ECDHE key exchange with the x25519 curve and mutual PSK authentication as the best handshake performance. Ed25519 provides the best performance among the certificate authentication options. The effect of choosing a faster symmetric cipher on CPU costs depends on message size. Changing symmetric ciphers does not affect the performance for 100 B messages, but more differences are observed for 10 kB messages. Overall, the findings show that resource consumption can be optimized by choosing the cipher suite and adjusting the length and rate of MQTT messages. Optimized resource consumption enables reliable management of MQTT-based IoT.}, keywords = {Case Studies, Testbeds and Practical Experiences; Internet of Things (IoT); Applications and case studies; Sensor networks}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{222206, title = {Continuous Microservice Re-Placement in the IoT}, author = {Christian L\"{u}bben and Simon Sch\"{a}ffner and Marc-Oliver Pahl}, url = {http://XXXXX/222206.pdf}, year = {2022}, date = {2022-04-01}, booktitle = {NOMS 2022 Workshops - Manage-IoT 2022 ()}, abstract = {The Internet of Things (IoT) consists of constraint devices. There is a continuous increase in processing power and a recent trend towards microservice architectures. Both make it possible to place IoT microservices on the distributed edge nodes of an IoT site. The identification of a suitable placement of services creates an open challenge. The IoT sets special demands due to its heterogeneous, and often constraint resources. This paper presents a service placement strategy that is adapted to the IoT. It assesses the differences between the IoT and previous service placement problem domains. The results show that the presented service placement strategy outperforms existing ones from other domains. This particularly holds for the optimization of the overall system performance.}, keywords = {Internet of Things (IoT)}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{220803, title = {Optimal Access Control Deployment in Network Function Virtualization}, author = {Manel Smine and David Espes and Marc-Oliver Pahl}, url = {http://XXXXX/220803.pdf}, year = {2022}, date = {2022-04-01}, booktitle = {NOMS 2022 - Full and short papers ()}, abstract = {Network function virtualization (NFV) yields numerous advantages, specifically the ability to provide a cost-efficient alternative to hardware-based functionalities on software platforms to break the vendor lock-in problem. However, these advantages come at the cost of several security issues. These threats can be leveraged by controlling the information that flows between the different components that compose NFV services. We propose an approach allowing an optimal deployment of access control policies on NFV services. The proposed approach allows to find the best possible trade-offs between the impact in terms of latency resulting from the deployment of the access control policy and the used resources. In contrast to existing approaches, our solution prevents an insider adversary who compromises one or more unknown VNF(s) to go around the access control policy. We experimentally evaluate the return solutions according to the size of the NFV service, the size of the policy to be deployed and the number of physical servers that host the VNF service.}, keywords = {Accounting, Configuration, Network virtualization; FCAPS: Fault, Performance and Security Management; Cybersystems, Security and Reliability in Network Softwarization and Management; Network security; Policybased management}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{221053, title = {Autonomous convergence mechanisms for collaborative crowd-sourced data-modeling}, author = {Christian L\"{u}bben and Marc-Oliver Pahl}, url = {http://XXXXX/221053.pdf}, year = {2022}, date = {2022-04-01}, booktitle = {NOMS 2022 - Full and short papers ()}, abstract = {Interoperability remains a central challenge of the Internet of Things (IoT). Standardized data representation can solve this problem. Data model convergence prevents redundancy and fosters reuse. The growth of the IoT demands a high number of data models. Collaborative approaches allow the creation of numerous data models. The question to investigate is: Can assisted distributed model creation improve model convergence? This paper presents an approach to unify IoT data models during creation. It analyzes existing models to find similarities to a new model candidate. Similar models shall be reused or extended to prevent information redundancy. Challenges are the accuracy of the similarity analysis and scalability. The evaluation shows linear scalability and high accuracy using a data set containing 1200 automatically converted data models from today's most relevant IoT data modeling initiatives: Project Haystack, IoTSchema, and BrickSchema.}, keywords = {Internet of Things (IoT); Data service management; IT service management; Distributed management}, pubstate = {published}, tppubtype = {inproceedings} } @article{segovia2022, title = {Design, Modeling and Implementation of Digital Twins}, author = {Mariana Segovia and Joaquin Garcia-Alfaro and Kranakis}, url = {https://doi.org/10.3390/s22145396}, year = {2022}, date = {2022-01-01}, journal = {Sensors}, volume = {22}, number = {14}, pages = {5396}, publisher = {Multidisciplinary Digital Publishing Institute}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{wustrich2022ac, title = {AC/DCIM: Acoustic Channels for Data Center Infrastructure Monitoring}, author = {Lars W\"{u}strich and Sebastian Gallenm\"{u}ller and Marc-Oliver Pahl and Georg Carle}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash5}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{lavaur2022evolution, title = {The evolution of federated learning-based intrusion detection and mitigation: a survey}, author = {L\'{e}o Lavaur and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, year = {2022}, date = {2022-01-01}, journal = {IEEE Transactions on Network and Service Management}, volume = {19}, number = {3}, pages = {2309\textendash2332}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{dimov2022resource, title = {Resource tradeoffs for TLS-secured MQTT-based IoT Management}, author = {Valentin Dimov and Erkin Kirdan and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lubben2022continuous, title = {Continuous Microservice Re-Placement in the IoT}, author = {Christian L\"{u}bben and Simon Sch\"{a}ffner and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{smine2022optimal, title = {Optimal Access Control Deployment in Network Function Virtualization}, author = {Manel Smine and David Espes and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash9}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lubben2022autonomous, title = {Autonomous convergence mechanisms for collaborative crowd-sourced data-modeling}, author = {Christian L\"{u}bben and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash5}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{varga2022proceedings, title = {Proceedings of the 18th IEEE/IFIP Network Operations and Management Symposium (NOMS 2022)}, author = {Pal Varga and Lisandro Zambenedetti Granville and Alex Galis and Noura Limam and Prosper Chemouil and J\'{e}r\^{o}me Fran\c{c}ois and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{hmamouche2022key, title = {Key Attack Strategies Against Black-Box DNNs}, author = {Yassine Hmamouche and Yehya Nasser and Amer Baghdadi and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {GDR-SOC2}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lavaur2022federated, title = {Federated Learning as enabler for Collaborative Security between not Fully-Trusting Distributed Parties}, author = {L\'{e}o Lavaur and Benjamin Cost\'{e} and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, year = {2022}, date = {2022-01-01}, booktitle = {C\&ESAR 2022-29th Computer \& Electronics Security Application Rendezvous}, pages = {1\textendash16}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{barbeau2022resilience, title = {Resilience via Blackbox Self-Piloting Plants}, author = {Michel Barbeau and Joaquin Garcia-alfaro and Christian L\"{u}bben and Marc-Oliver Pahl and W\"{u}strich Lars}, year = {2022}, date = {2022-01-01}, booktitle = {Computer \& Electronics Security Application Rendezvous, co-located with the 7th European Cyber Week (ECW 2022), CEUR Workshop Proceedings}, volume = {3329}, number = {1}, pages = {35\textendash46}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{suleymanov2022securing, title = {Securing coap with dtls and oscore}, author = {Emil Suleymanov and Erkin Kirdan and Marc-Oliver Pahl}, year = {2022}, date = {2022-01-01}, booktitle = {2022 6th Cyber Security in Networking Conference (CSNet)}, pages = {1\textendash7}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{mattos20222022, title = {2022 6th Cyber Security in Networking Conference (CSNet)}, author = {Diogo MF Mattos and Marc Oliver Pahl and Carol Fung and Marcelo G Rubinstein}, year = {2022}, date = {2022-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{goncalves2022qoe, title = {QoE Management of HTTP/2 traffic in Software-Defined Wide Area Networks}, author = {Helio Henrique Goncalves Guardabaxo and Gustavo Sousa Pavani and P Varga and LZ Granville and A Galis and I Godor and N Limam and P Chemouil and J Francois and M Pahl and others}, year = {2022}, date = {2022-01-01}, booktitle = {PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022}, pages = {5}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @workshop{Delcombel2021, title = {CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks}, author = {Nicolas Delcombel and Alexandre Kabil and Thierry Duval and Marc-Oliver Pahl}, year = {2021}, date = {2021-08-06}, urldate = {2021-08-06}, abstract = {this paper aims to asses the usefulness of 3D interactive interfaces to display periodic signals in a network. Past research has shown that 2D data visualization simplifies alerts classification. Including those drawn by periodicity based Intrusion Detection Systems. However, 2D visualisations have limitations such as screen space availability. This is why we created CyberCopter, a prototype that uses a 3D helical representation to highlight periodic patterns in a dataset. We tested CyberCopter usability and efficiency in a fraud detection scenario. It scored 77 at the SUS questionnaire which demonstrates an acceptable usability}, howpublished = {VR4Sec: 1st International Workshop on Security for XR and XR for Security}, keywords = {Cybersecurity, Security, Virtual reality, Visual analytics, Visualization, Visualization application domains}, pubstate = {published}, tppubtype = {workshop} } @workshop{KabilVR4Sec21, title = {Training and Data Analysis use cases for Cybersecurity through Mixed Reality Applications}, author = {Alexandre Kabil and Thierry Duval and Marc-Oliver Pahl}, year = {2021}, date = {2021-08-06}, urldate = {2021-08-06}, abstract = {In this paper, we will discuss our point of view of the use of Mixed Environments for Cybersecurity, especially for training and data analysis purposes. We will argue that Collaborative Mixed Environments could merge training and analysis approaches by providing users several points of view on cyber situations.}, howpublished = {VR4Sec: 1st International Workshop on Security for XR and XR for Security}, keywords = {}, pubstate = {published}, tppubtype = {workshop} } @inproceedings{Lavaur2021.gtsslr, title = {Federated Security Approaches for IT and OT}, author = {Leo Lavaur and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, year = {2021}, date = {2021-05-11}, urldate = {2021-05-11}, pages = {2}, abstract = {The Internet of Things has begun to spread over a variety of domains, including industry and finance. It represents an increasing threat for both IT and OT. The lack of collaboration results in the same attacks targeting different organizations one after the other. Often employed as an answer to this problem, cyber threat-intelligence sharing induces its own set of challenges: trust, privacy, and traceability.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{213227, title = {Cyber-Physical Anomaly Detection for ICS}, author = {Lars Wuestrich and Lukas Schr\"{o}der and Marc-Oliver Pahl}, url = {http://xxxxx/213227.pdf}, year = {2021}, date = {2021-05-01}, booktitle = {IFIP/IEEE International Symposium on Integrated Network Management co-located with IM}, abstract = {Industrial Control Systems (ICS) are complex systems made up of many components with different tasks. For a safe and secure operation, each device needs to carry out its tasks correctly. To monitor a system and ensure the correct behavior of systems anomaly detection systems are used. Models of expected behavior often rely only on cyber or physical features for anomaly detection. We propose an anomaly detection system that combines both types of features to create a dynamic fingerprint of an ICS. We present how such a system can be designed and which challenges need to be overcome for a successful implementation.}, keywords = {and Dependability, Data and device security, Other aspects relevant to manage IoT systems., resilience, Security and Privacy, Survivability, Validation and Verification of data and functional}, pubstate = {published}, tppubtype = {inproceedings} } @article{navas2021physical, title = {Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming}, author = {Renzo E Navas and Fr\'{e}d\'{e}ric Cuppens and Nora Boulahia Cuppens and Laurent Toutain and Georgios Z Papadopoulos}, year = {2021}, date = {2021-01-01}, journal = {Computer Networks}, volume = {187}, pages = {107751}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{dernaika2021posteriori, title = {A Posteriori Analysis of Policy Temporal Compliance}, author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud}, year = {2021}, date = {2021-01-01}, booktitle = {Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers 15}, pages = {133--148}, organization = {Springer International Publishing}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Navas2021, title = {MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT}, author = {Renzo E Navas and Frederic Cuppens and Nora Boulahia Cuppens and Laurent Toutain and Georgios Z Papadopoulos}, doi = {10.1109/JIOT.2020.3040358}, issn = {23274662}, year = {2021}, date = {2021-01-01}, journal = {IEEE Internet of Things Journal}, volume = {8}, number = {10}, pages = {7818--7832}, abstract = {Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving target defense (MTD) is a cyberdefense paradigm, successfully implemented in conventional systems, that could improve IoT security. Objective: Identify and synthesize existing MTD techniques for IoT and validate the feasibility of MTD as a cybersecurity paradigm suitable for IoT systems. Method: We use a systematic literature review method to search and analyze existing MTD for IoT techniques up to July 2020. We evaluated the existing techniques in terms of security foundations and real-world deployability using the evidence they provide. We define and use entropy-related metrics to categorize them. This is the first MTD survey to use Shannon's entropy metric empirically. Results: Thirty-two distinct MTD for IoT techniques exist: 54% are Network-layer-based, 50% present strong evidence about their real-world deployment, and 64% have weak security foundations. Conclusion: MTD for IoT is a feasible cyberdefense approach. A variety of proposals exist, with evidence about their implementation and evaluation. Nevertheless, the MTD for IoT state of the art is still immature: the security foundations of most existing proposals are weak. Novel techniques should prioritize providing convincing security foundations and real-world deployment evidence.}, keywords = {Cyber security, entropy, Internet of Things (IoT), metrics, moving target defense (MTD), Systematic literature review}, pubstate = {published}, tppubtype = {article} } @inproceedings{bender2021open, title = {Open-source mqtt evaluation}, author = {Melvin Bender and Erkin Kirdan and Marc-Oliver Pahl and Georg Carle}, year = {2021}, date = {2021-01-01}, booktitle = {2021 IEEE 18th Annual Consumer Communications \& Networking Conference (CCNC)}, pages = {1\textendash4}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2021priority, title = {A Priority-Based Domain Type Enforcement for Exception Management}, author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers}, volume = {12637}, pages = {65}, organization = {Springer Nature}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{muhlbauer2021feature, title = {Feature-based comparison of open source OPC-UA implementations}, author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc-Oliver Pahl and Karl Waedt}, year = {2021}, date = {2021-01-01}, publisher = {Gesellschaft f\"{u}r Informatik, Bonn}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2021pipeline, title = {Pipeline for crowdsourced iot data-modeling with ai-supported convergence}, author = {Marc-Oliver Pahl and Florian Bauer and Christian L\"{u}ubben}, year = {2021}, date = {2021-01-01}, booktitle = {2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)}, pages = {702\textendash706}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{paiho2021towards, title = {Towards cross-commodity energy-sharing communities\textendashA review of the market, regulatory, and technical situation}, author = {Satu Paiho and Jussi Kiljander and Roope Sarala and Hanne Siikavirta and Olli Kilkki and Arpit Bajpai and Markus Duchon and Marc-Oliver Pahl and Lars W\"{u}strich and Christian L\"{u}bben and others}, year = {2021}, date = {2021-01-01}, journal = {Renewable and Sustainable Energy Reviews}, volume = {151}, pages = {111568}, publisher = {Pergamon}, keywords = {}, pubstate = {published}, tppubtype = {article} } @book{lncs12637, title = {Foundations and Practice of Security, 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1--3, 2020, Revised Selected Papers}, author = {Gabriela Nicolescu and Assia Tria and Jose M. Fernandez and Jean-Yves Marion and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-70881-8}, doi = {10.1007/978-3-030-70881-8}, year = {2021}, date = {2021-01-01}, publisher = {Springer}, series = {LNCS 12637}, keywords = {}, pubstate = {published}, tppubtype = {book} } @article{barbeau2021resilience, title = {Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics}, author = {Michel Barbeau and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/ACCESS.2021.3066108}, doi = {10.1109/ACCESS.2021.3066108}, year = {2021}, date = {2021-01-01}, journal = {IEEE Access}, volume = {9}, pages = {46462--46475}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @book{lncs12528, title = {Risks and Security of Internet and Systems, 15th International Conference, CRiSIS 2020, Paris, France, November 4--6, 2020, Revised Selected Papers}, author = {Joaquin Garcia-Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, url = {https://doi.org/10.1007/978-3-030-68887-5}, doi = {10.1007/978-3-030-68887-5}, year = {2021}, date = {2021-01-01}, publisher = {Springer}, series = {LNCS 12528}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{barbeau2021metrics, title = {Metrics to enhance the resilience of cyber-physical systems}, author = {Michel Barbeau and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/TrustCom50675.2020.00156}, doi = {10.1109/TrustCom50675.2020.00156}, year = {2021}, date = {2021-01-01}, booktitle = {2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)}, pages = {1167--1172}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{9565553, title = {Detecting and Preventing Faked Mixed Reality}, author = {Fabian Kilger and Alexandre Kabil and Volker Tippmann and Gudrun Klinker and Marc-Oliver Pahl}, doi = {10.1109/MIPR51284.2021.00074}, year = {2021}, date = {2021-01-01}, booktitle = {2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)}, pages = {399-405}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{smine2021priority, title = {A priority-based domain type enforcement for exception management}, author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1\textendash3, 2020, Revised Selected Papers 13}, pages = {65\textendash81}, organization = {Springer International Publishing}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{wustrich2021cyber, title = {Cyber-physical anomaly detection for ICS}, author = {Lars W\"{u}strich and Lukas Schr\"{o}der and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)}, pages = {950\textendash955}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kilger2021detecting, title = {Detecting and Preventing Faked Mixed Reality}, author = {Fabian Kilger and Alexandre Kabil and Volker Tippmann and Gudrun Klinker and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)}, pages = {399\textendash405}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{delcombel2021cybercopter, title = {CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks}, author = {Nicolas Delcombel and Alexandre Kabil and Thierry Duval and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {VR4Sec 2021 (Security for XR and XR for Security)}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kabil2021training, title = {Training and Data Analysis use cases for Cybersecurity through Mixed Reality Applications}, author = {Alexandre Kabil and Thierry Duval and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {VR4Sec 2021 (Security for XR and XR for Security)}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{larsen2021authenticating, title = {Authenticating IDS autoencoders using multipath neural networks}, author = {Rapha\"{e}l MJI Larsen and Marc-Oliver Pahl and Gouenou Coatrieux}, year = {2021}, date = {2021-01-01}, booktitle = {2021 5th Cyber Security in Networking Conference (CSNet)}, pages = {1\textendash9}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lavaur2021federated, title = {Federated security approaches for IT and OT}, author = {L\'{e}o Lavaur and Marc-Oliver Pahl and Yann Busnel and Fabien Autrel}, year = {2021}, date = {2021-01-01}, booktitle = {SSLR 2021-Journ\'{e}e th\'{e}matique du GT sur la S\'{e}curit\'{e} des Syst\`{e}mes, Logiciels et R\'{e}seaux}, pages = {1\textendash2}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lubben2021advances, title = {Advances in ml-based anomaly detection for the iot}, author = {Christian L\"{u}bben and Marc-Oliver Pahl}, year = {2021}, date = {2021-01-01}, booktitle = {2021 5th Cyber Security in Networking Conference (CSNet)}, pages = {18\textendash22}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{barbeau2021quantum, title = {The quantum what? advantage, utopia or threat?}, author = {Michel Barbeau and Erwan Beurier and Joaquin Garcia-alfaro and Randy Kuang and Marc-Oliver Pahl and Dominique Pastor}, year = {2021}, date = {2021-01-01}, journal = {Digitale Welt}, volume = {5}, number = {1}, pages = {34\textendash39}, keywords = {}, pubstate = {published}, tppubtype = {article} } @misc{pahl2021decentralized, title = {Decentralized Cross-commodity Energy Management (DECENT): Abschlussbericht: F\"{o}rderungszeitraum von/bis: 1.9. 2018-31.03. 2021}, author = {Marc-Oliver Pahl and Lars W\"{u}strich and Christian L\"{u}bben}, year = {2021}, date = {2021-01-01}, publisher = {Technische Universit\"{a}t M\"{u}nchen}, keywords = {}, pubstate = {published}, tppubtype = {misc} } @article{segovia2020switched, title = {Switched-based Resilient Control of Cyber-Physical Systems}, author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/ACCESS.2020.3039879}, doi = {10.1109/ACCESS.2020.3039879}, year = {2020}, date = {2020-11-01}, journal = {IEEE Access}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{Bourget2020b, title = {PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis}, author = {Edwin Bourget and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens-Boulahia}, url = {https://dl.acm.org/doi/10.1145/3384941.3409590}, doi = {10.1145/3384941.3409590}, isbn = {9781450376082}, year = {2020}, date = {2020-10-01}, booktitle = {Proceedings of the 6th ACM on Cyber-Physical System Security Workshop}, pages = {30--41}, publisher = {ACM}, address = {New York, NY, USA}, abstract = {The recent and increasing interconnection of industrial systems with information technologies creates a new paradigm in which new challenges arise. Being able to provide an explanation when accidents and attacks strike the system is one of them. This article presents an event model designed to provide useful and relevant information for diagnosis of safety and security events. We provide a means for system experts to model elementary events that are automatically recombined in complex and complete scenarios. We specifically focus on the ability to represent countermeasures and sequences of events, recurrent problems in the literature. We also introduce a means to precisely measure the wear of components, an important feature for the model to obtain accurate values. We showcase the use of our model for diagnosis purposes on a cyber-physical system testbed.}, keywords = {countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security}, pubstate = {published}, tppubtype = {inproceedings} } @book{lncs12056, title = {Foundations and Practice of Security}, author = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-45371-8}, doi = {10.1007/978-3-030-45371-8}, year = {2020}, date = {2020-04-01}, publisher = {Springer}, series = {LNCS 12056}, keywords = {}, pubstate = {published}, tppubtype = {book} } @book{lncs11981, title = {Computer Security, ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26--27, 2019, Revised Selected Papers}, author = {Apostolos Fournaris and Manos Athanatos and Konstantinos Lampropoulos and Sotiris Ioannidis and George Hatzivasilis and Ernesto Damiani and Habtamu Abie and Silvio Ranise and Luca Verderame and Alberto Siena and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-42051-2}, doi = {10.1007/978-3-030-42051-2}, year = {2020}, date = {2020-02-01}, publisher = {Springer}, series = {LNCS 11981}, keywords = {}, pubstate = {published}, tppubtype = {book} } @book{lncs11980, title = {Computer Security, ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26--27, 2019 Revised Selected Papers}, author = {Sokratis Katsikas and Frederic Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie Anton and Stefanos Gritzalis and Frank Pallas and Jorg Pohle and Angela Sasse and Weizhi Meng and Steven Furnell and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-42048-2}, doi = {10.1007/978-3-030-42048-2}, year = {2020}, date = {2020-02-01}, publisher = {Springer}, series = {LNCS 11980}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{segovia2019cybericps, title = {Reflective Attenuation of Cyber-Physical Attacks}, author = {Mariana Segovia and Ana Cavalli and Nora Cuppens and Jose Rubio-Hernan and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-42048-2_2}, doi = {10.1007/978-3-030-42048-2_2}, year = {2020}, date = {2020-02-01}, booktitle = {5th Workshop on the Security of Industrial Control Systems \& of Cyber-Physical Systems (CyberICPS 2019), 24th European Symposium on Research in Computer Security (ESORICS 2019), vol 11980}, pages = {19--34}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{moussaileb2020watch, title = {Watch out! Doxware on the way $\ldots$}, author = {Routa Moussaileb and Renzo E Navas and Nora Cuppens}, year = {2020}, date = {2020-01-01}, journal = {Journal of information security and applications}, volume = {55}, pages = {102668}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{dernaika2020accountability, title = {Accountability in the A Posteriori Access Control: A Requirement and a Mechanism}, author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud}, year = {2020}, date = {2020-01-01}, booktitle = {International Conference on the Quality of Information and Communications Technology}, pages = {332--342}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Lubben2020, title = {Using Deep Learning to Replace Domain Knowledge}, author = {Christian Lubben and Marc Oliver Pahl and Mohammad Irfan Khan}, doi = {10.1109/ISCC50000.2020.9219567}, issn = {15301346}, year = {2020}, date = {2020-01-01}, journal = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2020-July}, abstract = {Complex problems like the prediction of future behavior of a system are usually solved by using domain knowledge. This knowledge comes with a certain expense which can be monetary costs or efforts to generate it. We want to decrease this cost while using state of the art machine learning and prediction methods. Our aim is to replace the domain knowledge and create a black-box solution that offers automatic reasoning and accurate predictions. Our guiding example is packet scheduling optimization in Vehicle to Vehicle (V2V) communication. Within the evaluation, we compare the prediction quality of a labour-intense whitebox approach with the presented fully-automated blackbox approach. To ease the measurement process we propose a framework design which allows easy exchange of predictors. The results show the successful design of our framework as well as superior accuracy of the black box approach.}, keywords = {ANN, deep learning, network traffic prediction, V2V, V2X}, pubstate = {published}, tppubtype = {article} } @article{Bkakria2020, title = {Pattern Matching on Encrypted Data}, author = {Anis Bkakria and Nora Cuppens and Frdric Cuppens}, year = {2020}, date = {2020-01-01}, journal = {IACR Cryptol}, pages = {1--28}, keywords = {pattern matching, searchable encryption}, pubstate = {published}, tppubtype = {article} } @inproceedings{Kabil2020b, title = {Alert characterization by non-expert users in a cybersecurity virtual environment: A usability study}, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens}, doi = {10.1007/978-3-030-58465-8_6}, issn = {16113349}, year = {2020}, date = {2020-01-01}, booktitle = {Lecture Notes in Computer Science}, volume = {12242 LNCS}, pages = {82--101}, abstract = {Although cybersecurity is a domain where data analysis and training are considered of the highest importance, few virtual environments for cybersecurity are specifically developed, while they are used efficiently in other domains to tackle these issues. By taking into account cyber analysts' practices and tasks, we have proposed the 3D Cyber Common Operational Picture model (3D CyberCOP), that aims at mediating analysts' activities into a Collaborative Virtual Environment (CVE), in which users can perform alert analysis scenarios. In this article, we present a usability study we have performed with non-expert users. We have proposed three virtual environments (a graph-based, an office-based, and the coupling of the two previous ones) in which users should perform a simplified alert analysis scenario based on the WannaCry ransomware. In these environments, users must switch between three views (alert, cyber and physical ones) which all contain different kinds of data sources. These data have to be used to perform the investigations and to determine if alerts are due to malicious activities or if they are caused by false positives. We have had 30 users, with no prior knowledge in cybersecurity. They have performed very well at the cybersecurity task and they have managed to interact and navigate easily. SUS usability scores were above 70 for the three environments and users have shown a preference towards the coupled environment, which was considered more practical and useful.}, keywords = {Cyber security, Usability study, Virtual reality}, pubstate = {published}, tppubtype = {inproceedings} } @article{Moussaileb2020, title = {Ransomware Network Traffic Analysis for Pre-encryption Alert}, author = {Routa Moussaileb and Nora Cuppens and Jean Louis Lanet and H\'{e}l\`{e}ne Le Bouder}, doi = {10.1007/978-3-030-45371-8_2}, issn = {16113349}, year = {2020}, date = {2020-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12056 LNCS}, pages = {20--38}, abstract = {Cyber Security researchers are in an ongoing battle against ransomware attacks. Some exploits begin with social engineering methods to install payloads on victims' computers, followed by a communication with command and control servers for data exchange. To scale down these attacks, scientists should shed light on the danger of those rising intrusions to prevent permanent data loss. To join this arm race against malware, we propose in this paper an analysis of various ransomware families based on the collected system and network logs from a computer. We delve into malicious network traffic generated by these samples to perform a packet level detection. Our goal is to reconstruct ransomware's full activity to check if its network communication is distinguishable from benign traffic. Then, we examine if the first packet sent occurs before data's encryption to alert the administrators or afterwards. We aim to define the first occurrence of the alert raised by malicious network traffic and where it takes place in a ransomware workflow. Logs collected are available at http://serveur2.seres.rennes.telecom-bretagne.eu/data/RansomwareData/.}, keywords = {Machine learning, Network traffic, Ransomware}, pubstate = {published}, tppubtype = {article} } @article{Muhlbauer2020, title = {Open-Source OPC UA Security and Scalability}, author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc Oliver Pahl and Georg Carle}, doi = {10.1109/ETFA46521.2020.9212091}, issn = {19460759}, year = {2020}, date = {2020-01-01}, journal = {IEEE International Conference on Emerging Technologies and Factory Automation, ETFA}, volume = {2020-Septe}, pages = {262--269}, abstract = {OPC UA is widely adopted for remote-control in industrial environments. It has a central role for industrial control systems as it enables remote management. Compromising OPC UA can lead to compromising entire production facilities. Consequently, OPC UA requires a high level of security. Major commercial OPC UA implementations have compliance certificates ensuring that their security models obey the specification. However, open-source OPC UA implementations that have wide deployment mostly lack these certificates. In this work, we investigate the security models of the four most commonly used open-source implementations: open62541, node-opcua, UA-.NETStandard, and python-opcua. Furthermore, their scalabilities for the number of clients and OPC UA nodes are also analyzed.}, keywords = {OPC UA, open-source, scalability, Security}, pubstate = {published}, tppubtype = {article} } @inproceedings{wustrich2020extensible, title = {An extensible IoT Security Taxonomy}, author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald}, doi = {10.1109/ISCC50000.2020.9219584}, year = {2020}, date = {2020-01-01}, booktitle = {IEEE ISCC 2020}, abstract = {Security is essential in the Internet of Things (IoT). IoT threat classifications are often non-intuitive to use. Identifying relevant properties of an attack is difficult and requires reading details of the attack. We therefore propose a simple-to-use naming scheme for IoT threat classification. It is based on the affected layers and the affected security goals. We evaluate the usefulness of the chosen approach by applying it to common IoT threats.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Navas2020, title = {IANVS: A Moving Target Defense Framework for a Resilient Internet of Things}, author = {Renzo E Navas and Hr{a}kon Sandaker and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens and Laurent Toutain and Georgios Z Papadopoulos}, doi = {10.1109/ISCC50000.2020.9219728}, issn = {15301346}, year = {2020}, date = {2020-01-01}, journal = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2020-July}, abstract = {The Internet of Things (IoT) is more and more present in fundamental aspects of our societies and personal life. Billions of objects now have access to the Internet. This networking capability allows for new beneficial services and applications. However, it is also the entry-point for a wide variety of cyber-attacks that target these devices. The security measures present in real IoT systems lag behind those of the standard Internet. Security is sometimes completely absent. Moving Target Defense (MTD) is a 10-year-old cyber-defense paradigm. It proposes to randomize components of a system. Reasonably, an attacker will have a higher cost attacking an MTD-version of a system compared with a static-version of it. Even if MTD has been successfully applied to standard systems, its deployment for IoT is still lacking. In this paper, we propose a generic MTD framework suitable for IoT systems: IANVS (pronounced Janus). Our framework has a modular design. Its components can be adapted according to the specific constraints and requirements of a particular IoT system. We use it to instantiate two concrete MTD strategies. One that targets the UDP port numbers (port-hopping), and another a CoAP resource URI. We implement our proposal on real hardware using Pycom LoPy4 nodes. We expose the nodes to a remote Denial-of-Service attack and evaluate the effectiveness of the IANVS-based port-hopping MTD proposal.}, keywords = {attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher}, pubstate = {published}, tppubtype = {article} } @article{Smine2020, title = {Network functions virtualization access control as a service}, author = {Manel Smine and David Espes and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens}, doi = {10.1007/978-3-030-49669-2_6}, issn = {16113349}, year = {2020}, date = {2020-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12122 LNCS}, number = {1}, pages = {100--117}, abstract = {NFV is an important innovation in networking. It has many advantages such as saving investment cost, optimizing resource consumption, improving operational efficiency and simplifying network service lifecycle management. NFV environments introduce new security challenges and issues since new types of threats and vulnerabilities are inevitably introduced (e.g. security policy and regular compliance failure, vulnerabilities in VNF softwares, malicious insiders, etc.). The impact of these threats can be mitigated by enforcing security policies over deployed network services. In this paper, we introduce an access control as a service model for NFV services. The proposed approach can deploy several kinds of access control model policies (e.g. RBAC, ORBAC, ABAC, etc.) for NFV services and can be easily scaled.}, keywords = {Access control, Domain type enforcement (DTE), Network Functions Virtualization (NFV), Policy enforcement}, pubstate = {published}, tppubtype = {article} } @article{Cledel2020, title = {Resilience properties and metrics: how far have we gone?}, author = {Thomas Cl\'{e}del and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens and Romain Dagnas}, doi = {10.20517/jsss.2020.08}, year = {2020}, date = {2020-01-01}, journal = {Journal of Surveillance, Security and Safety}, pages = {119--139}, keywords = {0, 2020, 4, adaptation, any medium or format, as long as you, by, creative commons attribution 4, creativecommons, distribution and reproduction in, even commercially, for any purpose, https, ing, international license, is licensed under a, licenses, measurement, metrics, open access this article, org, resilience, s, shar, survey, the author, which permits unrestricted use}, pubstate = {published}, tppubtype = {article} } @inproceedings{Piccoli2020, title = {Group Key Management in constrained IoT Settings}, author = {A Piccoli and M-O Pahl and L W\"{u}strich}, doi = {10.1109/ISCC50000.2020.9219619}, issn = {15301346}, year = {2020}, date = {2020-01-01}, booktitle = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2020-July}, abstract = {textcopyright 2020 IEEE. The Internet of Things (IoT) enables software to orchestrate physical spaces. Due to the increased impact, IoT communication in factories, households, or critical infrastructures has to be highly secured. Besides point-to-point communication, group communication is frequently used in the IoT. Securing it typically requires the exchange of cryptographic keys. Several protocols have been proposed for such Group Key Management (GKM). They vary in their targeted settings, in their Key Distribution Model, Architecture Model, Reliability Properties, and Protocol Overhead. This paper surveys existing GKM mechanisms, analyzes their suitability for constrained IoT settings, and identifies open issues that require further research.}, keywords = {autonomous management, constrained nodes, group key management, IoT, reliability, Security}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{piccoli2020ensuring, title = {Ensuring consistency for asynchronous Group-Key management in the industrial IoT}, author = {Alessandro Piccoli and Marc-Oliver Pahl and Steffen Fries and Tolga Sel}, year = {2020}, date = {2020-01-01}, booktitle = {2020 16th International Conference on Network and Service Management (CNSM)}, pages = {1\textendash5}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Pahl2020, title = {A Mixed-Interaction Critical Infrastructure Honeypot}, author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun}, year = {2020}, date = {2020-01-01}, journal = {European Cyber Week CAESAR, 2020, Rennes, France}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2020ilab, title = {iLab@ Home: Hands-On Networking Classes without Lab Access}, author = {Marc-Oliver Pahl}, year = {2020}, date = {2020-01-01}, booktitle = {Sigcomm 2020 Education}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @techreport{sharma2020anonymousTechRep, title = {Anonymous proof-of-asset transactions using designated blind signatures}, author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro}, url = {https://arxiv.org/pdf/2009.13978}, year = {2020}, date = {2020-01-01}, journal = {arXiv preprint arXiv:2009.13978}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @inproceedings{sharma2020anonymous, title = {Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures}, author = {Neetu Sharma and Rajeev Anand Sahu and Vishal Saraswat and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-70881-8_9}, doi = {10.1007/978-3-030-70881-8_9}, year = {2020}, date = {2020-01-01}, booktitle = {Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers}, volume = {12637}, pages = {137--146}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{segovia2020nca, title = {Cyber-Resilience Evaluation of Cyber-Physical Systems}, author = {Mariana Segovia and Jose Rubio-Hernan and Ana R Cavalli and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/NCA51143.2020.9306741}, doi = {10.1109/NCA51143.2020.9306741}, year = {2020}, date = {2020-01-01}, booktitle = {2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)}, pages = {1--8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @techreport{segovia2020ncaTechRep, title = {Cyber-Resilience Evaluation of Cyber-Physical Systems (Technical Report)}, author = {Mariana Segovia and Jose Rubio-Hernan and Ana Cavalli and Joaquin Garcia-Alfaro}, url = {https://arxiv.org/abs/2009.06927}, year = {2020}, date = {2020-01-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @book{CSNet2020, title = {2020 4th Cyber Security in Networking Conference, CSNet 2020}, author = {Romain Laborde and Nadjib Aitsaadi and Solange Ghernaouti and Abdelmalek Benzekri and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/CSNet50428.2020}, doi = {10.1109/CSNet50428.2020}, isbn = {978-1-6654-0458-7}, year = {2020}, date = {2020-01-01}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {book} } @book{lncs12484, title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology}, author = {Joaquin Garcia-Alfaro and Guillermo Navarro-Arribas and Jordi Herrera-Joancomarti}, url = {https://link.springer.com/book/10.1007/978-3-030-66172-4}, doi = {10.1007/978-3-030-66172-4}, year = {2020}, date = {2020-01-01}, publisher = {Springer}, series = {LNCS 12484}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{barbeau2020geocaching, title = {Geocaching-Inspired Navigation for Micro Aerial Vehicles with Fallible Place Recognition}, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis}, url = {https://doi.org/10.1007/978-3-030-61746-2_5}, doi = {10.1007/978-3-030-61746-2_5}, year = {2020}, date = {2020-01-01}, booktitle = {International Conference on Ad-Hoc Networks and Wireless}, pages = {55--70}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{gonzalez2020stateful, title = {Stateful RORI-based countermeasure selection using hypergraphs}, author = {Gustavo Gonzalez-Granadillo and Elena Doynikova and Joaquin Garcia-Alfaro and Igor Kotenko and Andrey Fedorchenko}, url = {https://doi.org/10.1016/j.jisa.2020.102562}, doi = {10.1016/j.jisa.2020.102562}, year = {2020}, date = {2020-01-01}, journal = {Journal of Information Security and Applications}, volume = {54}, pages = {102562}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{faraj2020taxonomy, title = {Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things}, author = {Omair Faraj and David Meg'ias and Abdel-Mehsen Ahmad and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1145/3407023.3407048}, doi = {10.1145/3407023.3407048}, year = {2020}, date = {2020-01-01}, booktitle = {Proceedings of the 15th International Conference on Availability, Reliability and Security}, pages = {1--10}, publisher = {ACM}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pamies2020real, title = {A Real-Time Query Log Protection Method for Web Search Engines}, author = {David P`amies-Estrems and Jordi Castell`a-Roca and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/ACCESS.2020.2992012}, doi = {10.1109/ACCESS.2020.2992012}, year = {2020}, date = {2020-01-01}, journal = {IEEE Access}, volume = {8}, pages = {87393--87413}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{perez2020lockdown, title = {Lockdown: Balance availability attack against lightning network channels}, author = {Cristina P\'{e}rez-Sol`a and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomart'i and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-51280-4_14}, doi = {10.1007/978-3-030-51280-4_14}, year = {2020}, date = {2020-01-01}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {245--263}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{piccoli2020group, title = {Group key management in constrained IoT settings}, author = {Alessandro Piccoli and Marc-Oliver Pahl and Lars W\"{u}strich}, year = {2020}, date = {2020-01-01}, booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{wustrich2020towards, title = {Towards an extensible IoT security taxonomy}, author = {Lars W\"{u}strich and Marc-Oliver Pahl and Stefan Liebald}, year = {2020}, date = {2020-01-01}, booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{muhlbauer2020open, title = {Open-source OPC UA security and scalability}, author = {Nikolas M\"{u}hlbauer and Erkin Kirdan and Marc-Oliver Pahl and Georg Carle}, year = {2020}, date = {2020-01-01}, booktitle = {2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}, volume = {1}, pages = {262\textendash269}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{lubben2020using, title = {Using deep learning to replace domain knowledge}, author = {Christian L\"{u}bben and Marc-Oliver Pahl and Mohammad Irfan Khan}, year = {2020}, date = {2020-01-01}, booktitle = {2020 IEEE Symposium on Computers and Communications (ISCC)}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pahl2020mixed, title = {A mixed-interaction critical infrastructure honeypot}, author = {Marc-Oliver Pahl and Alexandre Kabil and Edwin Bourget and Matthieu Gay and Paul-Emmanuel Brun}, year = {2020}, date = {2020-01-01}, journal = {European Cyber Week CAESAR}, keywords = {}, pubstate = {published}, tppubtype = {article} } @book{lncs11737, title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2019 and DPM 2019)}, author = {Cristina P\'{e}rez-Sol`a and Guillermo Navarro-Arribas and Alex Biryukov and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-31500-9}, doi = {10.1007/978-3-030-31500-9}, year = {2019}, date = {2019-09-01}, publisher = {Springer}, series = {LNCS 11737}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{Pahl, title = {Multi-Tenant IoT Service Management towards an IoT App Economy}, author = {Marc-Oliver Pahl}, year = {2019}, date = {2019-04-08}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, pages = {1--4}, publisher = {IFIP/IEEE}, organization = {IFIP/IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{BarbeauInfocom2019, title = {Geocaching-inspired Resilient Path Planning for Drone Swarms}, author = {M. Barbeau and J. Garcia-Alfaro and E. Kranakis}, url = {https://doi.org/10.1109/INFCOMW.2019.8845318}, doi = {10.1109/INFCOMW.2019.8845318}, issn = {null}, year = {2019}, date = {2019-04-01}, booktitle = {IEEE Conference on Computer Communications (IEEE INFOCOM 2019) Workshops}, pages = {620-625}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{segovia2018fps, title = {A Study on Mitigation Techniques for SCADA-driven Cyber-Physical Systems}, author = {Mariana Segovia and Anna R. Cavalli and Nora Cuppens and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-18419-3_17}, doi = {10.1007/978-3-030-18419-3_17}, year = {2019}, date = {2019-04-01}, booktitle = {Foundations and Practice of Security (FPS 2018)}, pages = {257--264}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Kabil2019, title = {Why should we use 3D Collaborative Virtual Environments for Cyber Security?}, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and Gerard Le Comte and Yoran Halgand and Christophe Ponchel}, doi = {10.1109/3DCVE.2018.8637109}, isbn = {9781538651322}, year = {2019}, date = {2019-01-01}, journal = {2018 IEEE 4th VR International Workshop on 3D Collaborative Virtual Environments, 3DCVE 2018}, pages = {3--5}, abstract = {Cyber Security data analysis is an important growing domain: more and more data visualization systems are offered to operators in order to improve their threat detection performances or facilitate suspect behaviors characterization. As today Cyber Security trend is to regroup employees in structures such as Security Operations Center (SOC) or Computer Emergency Response Team (CERT), collaborative approach seems to be relevant in this context. We think that 3D Collaborative Virtual Environments (3DCVE) can be used in order to improve users Cyber Situational Awareness, as they can allow them to have a better understanding of a cyber situation by mediating interactions towards them and also by providing different points of view of the same data, on different scales.}, keywords = {Collaborative interaction, Human computer interaction (HCI), Human-centered computing, Interaction paradigms, Visual analytics, Visualization, Visualization application domains}, pubstate = {published}, tppubtype = {article} } @article{Dernaika2019, title = {Semantic mediation for a posteriori log analysis}, author = {Farah Dernaika and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Olivier Raynaud}, doi = {10.1145/3339252.3340104}, isbn = {9781450371643}, year = {2019}, date = {2019-01-01}, journal = {ACM International Conference Proceeding Series}, abstract = {The a posteriori access control mode consists in monitoring actions performed by users, to detect possible violations of the security policy and to apply sanctions or reparations. In general, logs are among the first data sources that information security specialists consult for forensics when they suspect that something went wrong. One difficult challenge we face when analyzing logs, is the multiple log file formats. However, normalizing logs in one format needs a lot of processing especially because log files usually contain a high volume of data. Our study proposes then to tackle this problem, by leaving the different log formats as they are, and retrieving information from logs by querying them. A semantic mediator makes it possible to inter-operate various sources of information without modifying their internal functioning. It can be responsible for locating data sources, to transmit queries to each source, or from one source to another, to retrieve the queries responses and possibly send them back to other sources. To the best of our knowledge, semantic mediation techniques have been used to share information from heterogeneous data sources, but they were never used in the context of log analysis.}, keywords = {Access Policy, Logs, Query Rewriting, Semantic Mediation}, pubstate = {published}, tppubtype = {article} } @inproceedings{Cledel2019d, title = {Managing the Overestimation of Resilience}, author = {Thomas Cl\'{e}del and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens}, url = {https://doi.org/10.1145/3339252.3340333}, doi = {10.1145/3339252.3340333}, isbn = {9781450371643}, year = {2019}, date = {2019-01-01}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, series = {ARES '19}, abstract = {The more services and functionalities are expected from contemporary systems, the more difficult it is to protect every part of them, to secure every access point or to watch on every connection and message. It is currently considered that security is less and less likely to be flawless and that some part or sub-system can fail or be under attack. In this case, what matters is the impact, not only on the affected part but on the whole system, of the failure or the attack. Resilience is the key property that describes systems' ability to handle these situations but only few metrics exist to evaluate systems' resilience. Some among them aim at predicting systems' resilience by considering systems' configurations and compositions, without considering a specific threat. However this kind of approach can be biased for some systems' configurations because of inaccuracies in the resilience evaluation model. One of these inaccuracies, called the double counting problem, is described in this article and a solution is given to limit its impact on the evaluation of resilience.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Bkakria2019, title = {Optimal Distribution of Privacy Budget in Differential Privacy}, author = {Anis Bkakria and Aimilia Tasidou and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Fatma Bouattour and Feten Ben Fredj}, doi = {10.1007/978-3-030-12143-3_18}, issn = {16113349}, year = {2019}, date = {2019-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {11391 LNCS}, pages = {222--236}, abstract = {Privacy budget management plays an important role when applying differential privacy, as it sets an upper limit in the ability to utilise the private database. In this paper, we explore the possibility of extending the total allocated privacy budget, taking into consideration the data consumer characteristics and the data utilisation context. To this end, we first study the problem of privacy budget distribution in adaptive multi-data consumer differential privacy use cases. Then, we present an extension of the classic differential privacy formal model that allows taking into consideration data consumers' information disclosure risk when distributing the privacy budget among them. Finally, we define a method that allows to optimally distribute a given privacy budget among a private database's data consumers.}, keywords = {Differential privacy, Information disclosure risk, Privacy budget distribution}, pubstate = {published}, tppubtype = {article} } @article{Pahl2019c, title = {VSL: A Data-Centric Internet of Things Overlay}, author = {Marc-Oliver Pahl and Stefan Liebald and Christian L\"{u}bben}, url = {https://s2labs.org/download/publications/2019-03_NetSys_Demo_VSL.pdf%0Ahttps://www.netsys2019.org/proceedings/}, year = {2019}, date = {2019-01-01}, journal = {International Conference on Networked Systems 2019 (NetSys)}, pages = {1--3}, abstract = {Data-centric service-oriented designs are promising for overcoming the current IoT silos. The Virtual State Layer (VSL) is a data-centric middleware that securely unifies the access to distributed heterogeneous IoT components. The VSL solves key challenge of today's IoT: reducing the complexity, enabling interoperability, and providing security-by-design. The described practical setting enables the interactive exploration of a data- centric middleware including a live performance evaluation.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Khan2019, title = {Deep Learning-aided Resource Orchestration for Vehicular Safety Communication C-ITS Decentralized Congestion Control ( DCC )}, author = {Irfan Khan and Fran\c{c}ois-xavier Aubet}, year = {2019}, date = {2019-01-01}, number = {April}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Pahl2019, title = {Giving IoT services an identity and changeable attributes}, author = {Marc Oliver Pahl and Lorenzo Donini}, isbn = {9783903176157}, year = {2019}, date = {2019-01-01}, journal = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019}, number = {section II}, pages = {455--461}, abstract = {The Internet of Things (IoT) pervades our surroundings. It softwarizes our physical environments. Software controls devices that interface their physical environments. The IoT is often privacy, safety, and security critical. Consequently, it requires adequate mechanisms for securing its services. For reasons such as heterogeneity, complexity, and lack of deployment there is little research on IoT service security.Our work creates a base for IoT service security. We give IoT services secure identities and attributes. Using site-local X.509v3 certificates with short lifetimes, we show how service attributes can securely be changed at runtime. This enables enforcing security policies even on distributed, loosely coupled IoT nodes. Our central mechanisms are pinning certificates to service executables, and autonomously managing the short certificate lifetimes. We assess the resulting renewal traffic and power consumption. textcopyright 2019 IFIP.}, keywords = {Autonomous service management, Certificates, IoT, Metadata, Microservices, Security, Unattended nodes, X.509}, pubstate = {published}, tppubtype = {article} } @article{Pahl2019b, title = {Machine-learning based IoT data caching}, author = {Marc Oliver Pahl and Stefan Liebald and Lars Wustrich}, isbn = {9783903176157}, year = {2019}, date = {2019-01-01}, journal = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019}, pages = {9--12}, abstract = {he Internet of Things (IoT) continuously produces big amounts of data. Data-centric middleware can therefore help reducing the complexity when orchestrating distributed Things. With its heterogeneity and resource limitations, IoT applications can lack performance, scalability, or resilience. Caching can help overcoming the limitations. We are currently working on establishing data caching within IoT middleware. The paper presents fundamentals of caching, major challenges, relevant state of the art, and a description of our current approaches. We show directions of using machine learning for caching in the IoT.}, keywords = {Caching, Data-centric, Internet of Things, Machine learning}, pubstate = {published}, tppubtype = {article} } @article{Pahl2019a, title = {Information-Centric IoT Middleware Overlay: VSL}, author = {Marc-Oliver Pahl and Stefan Liebald}, url = {https://s2labs.org/download/publications/2019-03_NetSys_Designing_a_Data-Centric_Internet_of_Things.pdf%0Ahttps://www.netsys2019.org/proceedings/}, isbn = {9781728105680}, year = {2019}, date = {2019-01-01}, journal = {International Conference on Networked Systems 2019 (NetSys)}, abstract = {The heart of the Internet of Things (IoT) is data. IoT services processes data from sensors that interface their physical surroundings, and from other software such as Internet weather databases. They produce data to control physical environments via actuators, and offer data to other services. More recently, service-centric designs for managing the IoT have been proposed. Data-centric or name-based communica- tion architectures complement these developments very well. Especially for edge-based or site-local installations, data-centric Internet architectures can be implemented already today, as they do not require any changes at the core. We present the Virtual State Layer (VSL), a site-local data- centric architecture for the IoT. Special features of our solution are full separation of logic and data in IoT services, offering the data-centric VSL interface directly to developers, which significantly reduces the overall system complexity, explicit data modeling, a semantically-rich data item lookup, stream connec- tions between services, and security-by-design. We evaluate our solution regarding usability, performance, scalability, resilience, energy efficiency, and security.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{ahmad2019tuning, title = {Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications}, author = {Abdel-Mehsen Ahmad and Michel Barbeau and Joaquin Garcia-Alfaro and Jamil Kassem and Evangelos Kranakis}, url = {http://dx.doi.org/10.1002/ett.3712}, doi = {10.1002/ett.3712}, year = {2019}, date = {2019-01-01}, journal = {Transactions on Emerging Telecommunications Technologies}, volume = {30}, number = {12}, pages = {e3712}, publisher = {Wiley Online Library}, keywords = {}, pubstate = {published}, tppubtype = {article} } @techreport{barbeau2019qualityArxiv, title = {Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles (with Detailed Simulations)}, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis and Fillipe Santos}, url = {https://arxiv.org/pdf/1906.09505}, year = {2019}, date = {2019-01-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @inproceedings{barbeau2019fakingArxiv, title = {Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks (pre-print)}, author = {Michel Barbeau and Joaquin Garcia-Alfaro}, url = {https://arxiv.org/pdf/1907.03038}, year = {2019}, date = {2019-01-01}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{barbeau2019quality, title = {Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles}, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis and Fillipe Santos}, url = {https://doi.org/10.1109/GCWkshps45667.2019.9024394}, doi = {10.1109/GCWkshps45667.2019.9024394}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IEEE Globecom Workshops (GC Wkshps)}, pages = {1--6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{barbeau2019faking, title = {Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks}, author = {Michel Barbeau and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/GCWkshps45667.2019.9024550}, doi = {10.1109/GCWkshps45667.2019.9024550}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IEEE Globecom Workshops (GC Wkshps)}, pages = {1--6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{kaaniche2019anonymous, title = {Anonymous certification for E-assessment opinion polls}, author = {Nesrine Kaaniche and Chistophe Kiennert and Maryline Laurent and Joaquin Garcia-Alfaro}, url = {https://dx.doi.org/10.1007/s12652-019-01545-2}, doi = {10.1007/s12652-019-01545-2}, year = {2019}, date = {2019-01-01}, journal = {Journal of Ambient Intelligence and Humanized Computing}, pages = {1--15}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{torraChoquetMDAI2019, title = {Towards an Adaptive Defuzzification: Using Numerical Choquet Integral}, author = {Vicen\c{c} Torra and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-26773-5_11}, doi = {10.1007/978-3-030-26773-5_11}, year = {2019}, date = {2019-01-01}, booktitle = {International Conference on Modeling Decisions for Artificial Intelligence}, pages = {113--125}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{HerreraAsiaCCS2019, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, author = {Jordi Herrera-Joancomart\'{i} and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina P\'{e}rez-Sol\`{a} and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1145/3321705.3329812}, doi = {10.1145/3321705.3329812}, isbn = {9781450367523}, year = {2019}, date = {2019-01-01}, booktitle = {2019 ACM Asia Conference on Computer and Communications Security}, pages = {602--612}, publisher = {Association for Computing Machinery}, address = {Auckland, New Zealand}, series = {Asia CCS'19}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @techreport{barbeau2019next, title = {Next Generation Resilient Cyber-Physical Systems}, author = {Michel Barbeau and Georg Carle and Joaquin Garcia-Alfaro and Vicen\c{c} Torra}, url = {https://arxiv.org/abs/1907.08849}, year = {2019}, date = {2019-01-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @techreport{iacr-2019-328, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, author = {Jordi Herrera-Joancomarti and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Cristina Perez-Sola and Joaquin Garcia-Alfaro}, url = {https://eprint.iacr.org/2019/328}, year = {2019}, date = {2019-01-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @book{lncs11358, title = {11th International Symposium, FPS 2018, Montreal, Canada, November 13-15, 2018, Revised Papers}, author = {Nur Zincir-Heywood and Guillaume Bonfante and Mourad Debbabi and Joaquin Garcia-Alfaro}, year = {2019}, date = {2019-01-01}, publisher = {Springer}, series = {LNCS 11358}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{khan2019deep, title = {Deep learning-aided resource orchestration for vehicular safety communication}, author = {Mohammad Irfan Khan and Fran\c{c}ois-Xavier Aubet and Marc-Oliver Pahl and Je\'{r}\^{o}me H\"{a}rri}, year = {2019}, date = {2019-01-01}, booktitle = {2019 Wireless Days (WD)}, pages = {1\textendash8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019giving, title = {Giving IoT services an identity and changeable attributes}, author = {Marc-Oliver Pahl and Lorenzo Donini}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, pages = {455\textendash461}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019designing, title = {Designing a Data-Centric internet of things}, author = {Marc-Oliver Pahl and Stefan Liebald}, year = {2019}, date = {2019-01-01}, booktitle = {2019 International Conference on Networked Systems (NetSys)(NetSys’ 19)}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019multi, title = {Multi-tenant iot service management towards an iot app economy}, author = {Marc-Oliver Pahl}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, pages = {1\textendash4}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019vsl, title = {VSL: A data-centric internet of things overlay}, author = {Marc-Oliver Pahl and Stefan Liebald and Christian L\"{u}bben}, year = {2019}, date = {2019-01-01}, booktitle = {2019 International Conference on Networked Systems (NetSys)}, pages = {1\textendash3}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019modular, title = {A modular distributed iot service discovery}, author = {Marc-Oliver Pahl and Stefan Liebald}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, pages = {448\textendash454}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019machine, title = {Machine-learning based IoT data caching}, author = {Marc-Oliver Pahl and Stefan Liebald and Lars W\"{u}strich}, year = {2019}, date = {2019-01-01}, booktitle = {2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)}, pages = {9\textendash12}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2019information, title = {Information-centric iot middleware overlay: Vsl}, author = {Marc-Oliver Pahl and Stefan Liebald}, year = {2019}, date = {2019-01-01}, booktitle = {2019 International Conference on Networked Systems (NetSys)}, pages = {1\textendash8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{seeger2019rule, title = {Rule-based translation of application-level QoS constraints into SDN configurations for the IoT}, author = {Jan Seeger and Arne Br\"{o}ring and Marc-Oliver Pahl and Ermin Sakic}, year = {2019}, date = {2019-01-01}, booktitle = {2019 European Conference on Networks and Communications (EuCNC)}, pages = {432\textendash437}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pahl2019taming, title = {Taming the Internet of Things: DS2OS-a secure data-centric service-oriented approach}, author = {Marc-Oliver Pahl}, year = {2019}, date = {2019-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{von2019generalized, title = {A generalized tdoa/toa model for tof positioning}, author = {Maximilian Tschirschnitz and Marcel Wagner and Marc-Oliver Pahl and Georg Carle}, year = {2019}, date = {2019-01-01}, booktitle = {2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, pages = {1\textendash8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{von2019clock, title = {Clock error analysis of common time of flight based positioning methods}, author = {Maximilian Tschirschnitz and Marcel Wagner and Marc-Oliver Pahl and Georg Carle}, year = {2019}, date = {2019-01-01}, booktitle = {2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN)}, pages = {1\textendash8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{rice2019telecommunication, title = {TELECOMMUNICATION AND NETWORK ENGINEERING EDUCATION}, author = {Michael Rice and Mike McLernon and Luiz Carlos Branquinho Caixeta Ferreira and Omar Carvalho Branquinho and Pedro Rinaldo Chaves and Paulo Cardieri and Fabiano Fruett and Michel Daoud Yacoub and Ali Fatih Demir and Berker Pek\"{o}z and others}, year = {2019}, date = {2019-01-01}, journal = {IEEE Communications Magazine}, pages = {2}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{pahl2019learning, title = {Learning by teaching: Professional skills and new technologies for university education}, author = {Marc-Oliver Pahl}, year = {2019}, date = {2019-01-01}, journal = {IEEE Communications Magazine}, volume = {57}, number = {11}, pages = {74\textendash80}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{Foley2018b, title = {Science hackathons for cyberphysical system security research putting CPS testbed platforms to good use}, author = {Simon N Foley and Stephane Grunenwald and Fabien Autrel and Jose Rubio Hernan and Edwin Bourget and Alexandre Kabil and Thomas Cl\'{e}del and Rapha\"{e}l Larsen and Vivien M Rooney and Kristen Vanhulst}, doi = {10.1145/3264888.3264897}, issn = {15437221}, year = {2018}, date = {2018-10-01}, booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, pages = {102--107}, publisher = {Association for Computing Machinery}, abstract = {A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @techreport{segoviaCNIoct2018, title = {Techniques de reflexion pour attenuer les attaques cyber-physiques contre les systemes SCADA}, author = {Mariana Segovia and Anna R. Cavalli and Nora Cuppens and Joaquin Garcia-Alfaro}, url = {https://www.chairecyber-cni.org/actualites/tattenuer-les-attaques-cyber-physiques-contre-les-systemes-scada/}, year = {2018}, date = {2018-10-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @article{compeleceng2018, title = {Introduction to the special section on critical systems modelling and security (third edition)}, author = {Joaquin Garcia-Alfaro and Gregorio Martinez-Perez}, doi = {10.1016/j.compeleceng.2018.10.008}, year = {2018}, date = {2018-10-01}, journal = {Computers \& Electrical Engineering}, volume = {71}, pages = {1040-1042}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{mona2018, title = {Doppler effect in the acoustic ultra low frequency band for wireless underwater networks}, author = {Abdel-Mehsen Ahmad and Jamil Kassem and Michel Barbeau and Steven Porretta and Joaquin Garcia-Alfaro and Evangelos Kranakis}, doi = {10.1007/s11036-018-1036-9}, year = {2018}, date = {2018-10-01}, journal = {Mobile Networks \& Applications}, volume = {23}, number = {5}, pages = {1282-1292}, keywords = {}, pubstate = {published}, tppubtype = {article} } @book{lncs11025, title = {Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2018 and DPM 2018)}, author = {Joaquin Garcia-Alfaro and Jordi Herrera-Joancomarti and Giovanni Livraga and Ruben Rios}, url = {https://www.springer.com/de/book/9783030003043}, doi = {10.1007/978-3-030-00305-0}, year = {2018}, date = {2018-09-01}, publisher = {Springer}, series = {LNCS 11025}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{pamies2018dpm, title = {Lifelogging Protection Scheme for Internet-based Personal Assistants}, author = {David Pamies-Estrems and Nesrine Kaaniche and Maryline Laurent and Jordi Castella-Roca and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-030-00305-0_31}, doi = {10.1007/978-3-030-00305-0_31}, year = {2018}, date = {2018-09-01}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology (CBT 2018 and DPM 2018)}, pages = {1--10}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{itlcpsdn, title = {Cyber-physical architecture assisted by programmable networking}, author = {Jose Rubio-Hernan and Rishikesh Sahay and Luca De Cicco and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1002/itl2.44}, doi = {10.1002/itl2.44}, year = {2018}, date = {2018-07-01}, journal = {Internet technology letters}, volume = {1}, number = {4}, pages = {e44-1-e44-7}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{ETTTrubio, title = {Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems}, author = {Jose Rubio-Hernan and Luca De Cicco and Joaquin Garcia-Alfaro}, doi = {10.1002/ett.3209}, year = {2018}, date = {2018-07-01}, journal = {Transactions on emerging telecommunications technologies}, volume = {9}, number = {7}, pages = {e3209-1-e3209-17}, keywords = {}, pubstate = {published}, tppubtype = {article} } @techreport{rubioCNIoct2018, title = {Resilience programmable pour des systemes cyber-physiques}, author = {Joaquin Jose Garcia-Alfaro Rubio-Hernan}, url = {https://www.chairecyber-cni.org/actualites/resilience-programmable-pour-des-systemes-cyber-physiques/}, year = {2018}, date = {2018-06-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @article{Gonzalez2018FGCS, title = {Dynamic Risk Management Response System to handle cyber threats}, author = {Gustavo Gonzalez-Granadillo and Samuel Dubus and Alexander Motzek and Joaquin Garcia-Alfaro and Ender Alvarez and Matteo Merialso and Serge Papillon and Herv\'{e} Debar}, url = {http://dx.doi.org/10.1016/j.future.2017.05.043}, doi = {10.1016/j.future.2017.05.043}, year = {2018}, date = {2018-06-01}, journal = {Future Generation Computer Systems}, volume = {83}, issue = {1}, pages = {535--552}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Gonzalez2018ITL, title = {Hypergraph-driven Mitigation of Cyber-Attacks}, author = {Gustavo Gonzalez-Granadillo and Elena Doynikova and Igor Kotenko and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1002/itl2.38}, doi = {10.1002/itl2.38}, year = {2018}, date = {2018-05-01}, journal = {Internet Technology Letters}, volume = {1}, issue = {3}, pages = {e38-1-e38-6}, publisher = {Wiley}, keywords = {}, pubstate = {published}, tppubtype = {article} } @techreport{rubioCNIfeb2018, title = {These sur la securite des systemes cyber-physiques industriels}, author = {Jose Rubio-Hernan and Luca De Cicco and Garcia-Alfaro Joaquin}, url = {https://www.chairecyber-cni.org/actualites/these-securite-systemes-cyber-physiques-industriels/}, year = {2018}, date = {2018-02-01}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } @inproceedings{kome2018certificate, title = {A Certificate-Less Key Exchange Protocol for IoT}, author = {Ivan Marco Lobe Kome and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Vincent Frey}, year = {2018}, date = {2018-01-01}, booktitle = {International Conference on Risks and Security of Internet and Systems}, pages = {65--79}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{cledel2018towards, title = {Towards the evaluation of end-to-end resilience through external consistency}, author = {Thomas Cl\'{e}del and Simon N Foley and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens and Yvon Kermarrec and Fr\'{e}d\'{e}ric Dubois and Youssef Laarouchi and G\'{e}rard Le Comte}, year = {2018}, date = {2018-01-01}, booktitle = {International Symposium on Cyberspace Safety and Security}, pages = {99--114}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{smine2018effectiveness, title = {Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense}, author = {Manel Smine and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens}, year = {2018}, date = {2018-01-01}, booktitle = {International Conference on Risks and Security of Internet and Systems}, pages = {158--171}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @techreport{Kabil2018b, title = {3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training 3D Cy-berCOP: a Collaborative Platform for Cybersecurity 3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training}, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and G\'{e}rard Le Comte and Yoran Halgand and Christophe Ponchel}, url = {https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-}, year = {2018}, date = {2018-01-01}, pages = {176--183}, abstract = {Although Immersive Analytics solutions are now developed in order to ease data analysis, cyber security systems are still using classical graphical representations and are not harnessing yet the potential of virtual reality systems and collaborative virtual environments. 3D Col-laborative Virtual Environments (3DCVE) can be used in order to merge learning and data analysis approaches, as they can allow users to have a better understanding of a cyber situation by mediating interactions towards them and also by providing different points of view of the same data, on different scales. So we propose a 3D Cyber Common Operational Picture (3D CyberCOP) that will allow operators to face together a situation by using immersive and non immersive visualizations and by collaborating through user-defined roles. After visiting French Security Operations Centers (SOCs), we have defined a collaborative interaction model and some use-cases, to assess of the effectiveness of our solution.}, keywords = {Collaborative, Cybersecurity {textperiodcentered}, Interaction {textperiodcentered}, Reality, Virtual}, pubstate = {published}, tppubtype = {techreport} } @article{LeBouder2018, title = {Theoretical security evaluation of the human semantic authentication protocol}, author = {H\'{e}l\`{e}ne Le Bouder and Ga\"{e}l Thomas and Edwin Bourget and Mariem Graa and Nora Cuppens and Jean Louis Lanet}, doi = {10.5220/0006841703320339}, isbn = {9789897583193}, year = {2018}, date = {2018-01-01}, journal = {ICETE 2018 - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications}, volume = {2}, pages = {332--339}, abstract = {Using a secret password or a PIN (Personal Identification Number) code is a common way to authenticate a user. Unfortunately this protection does not resist an attacker that can eavesdrop on the user (shoulder surfing attack). The Human Semantic Authentication (HSA) protocol proposes a solution against this attack. The main idea is to have concept passwords and to propose images that the user must correctly select in order to authenticate. A concept can be represented by different pictures, so one observation is not enough to retrieve the secret. In this paper, the security/efficiency trade-off in the HSA protocol is evaluated. A probabilistic approach is used. Under the assumption that the picture/concept database is known to the attacker, we show that HSA is barely more resistant to shoulder surfing attacks than a PIN code. More precisely we show that the probability to retrieve the secret concept password increases rapidly with the number of observations. Moreover the constraints on the size of the picture/concept database are very difficult to satisfy in practice.}, keywords = {Authentication, Dynamic Password, Graphical Password, Human Semantic Authentication Protocol, PIN Code, Shoulder Surfing Attack}, pubstate = {published}, tppubtype = {article} } @article{Navas2018, title = {Demo: Do not trust your neighbors! a small iot platform illustrating a man-in-the-middle attack}, author = {Renzo E Navas and H\'{e}l\`{e}ne Le Bouder and Nora Cuppens and Fr\'{e}d\'{e}ric Cuppens and Georgios Z Papadopoulos}, doi = {10.1007/978-3-030-00247-3_11}, issn = {16113349}, year = {2018}, date = {2018-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {11104 LNCS}, pages = {120--125}, abstract = {This demonstration defines a small IoT wireless network that uses TI CC2538-OpenMote as hardware platform and state-of-the-art IETF network standards such as 6LoWPAN, RPL, and CoAP implemented by ContikiOS. The IoT nodes are controlled from outside the IoT network using end-to-end connectivity provided by IPv6-CoAP messages. We implement a man-in-the-middle attack that disrupts the normal behavior of the system. Our attack leverages on the inherent hierarchical routing topology of RPL-based IoT networks. The demonstration aims at highlighting the need for end-to-end source-authentication and authorization enforcement of information even inside a trusted IoT network. We also provide some insights on how these services can be offered in a IoT-friendly way.}, keywords = {CoAP, E2E security, IoT, IPv6, MITM attack, RPL}, pubstate = {published}, tppubtype = {article} } @book{Rivas2018, title = {for Industry 4.0}, author = {Alberto Rivas and Javier J Mart and Javier Prieto and Alfonso Gonz}, isbn = {9783319952048}, year = {2018}, date = {2018-01-01}, booktitle = {2018 First International Conference on Artificial Intelligence for Industries (AI4I)}, volume = {1}, number = {February}, pages = {537--548}, keywords = {case-based reasoning system, semantic analysis}, pubstate = {published}, tppubtype = {book} } @article{Bkakria2018, title = {Real-time detection and reaction to activity hijacking attacks in android smartphones (short paper)}, author = {Anis Bkakria and Mariem Graa and Nora Cuppens-Boulahia and Frederic Cuppens and Jean Louis Lanet}, doi = {10.1109/PST.2017.00037}, isbn = {9781538624876}, year = {2018}, date = {2018-01-01}, journal = {Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017}, pages = {253--258}, publisher = {IEEE}, abstract = {Most Android users are required to communicate sensitive data (passwords, usernames, security codes, and credit card numbers) with applications. Hacker can launch phishing attacks to compromise user data confidentiality. He/She stealthily injects into the foreground a hijacking Activity at the right timing to acquire private information. In this paper, we propose an effective approach that uses the similarity between launched Activities in order to detect and reacts to hijacking attacks during runtime time. We demonstrate the effectiveness of our solution by quantifying the number of false positives that can be generated by our system. We observe that, in the worst case, our solution generates 4.2% of false positives and incurs only 0.39% performance overhead on a CPU-bound micro-benchmark.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Rooney2018, title = {What users want: Adapting qualitative research methods to security policy elicitation}, author = {Vivien M Rooney and Simon N Foley}, doi = {10.1007/978-3-319-72817-9_15}, issn = {16113349}, year = {2018}, date = {2018-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10683 LNCS}, pages = {229--249}, abstract = {Recognising that the codes uncovered during a Grounded Theory analysis of semi-structured interview data can be interpreted as policy attributes, this paper describes how a Qualitative Research-based methodology can be extended to elicit Attribute Based Access Control style policies. In this methodology, user-participants are interviewed, and machine-learning is used to build a Bayesian Network based policy from the subsequent (Grounded Theory) analysis of the interview data.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{bkakria2018linking, title = {Linking differential identifiability with differential privacy}, author = {Anis Bkakria and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens}, year = {2018}, date = {2018-01-01}, booktitle = {International Conference on Information and Communications Security}, pages = {232--247}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Kome2018, title = {CoAP Enhancement for a better IoT centric protocol: CoAP 2.0}, author = {Marco Lobe Kome and Frederic Cuppens and Nora Cuppens-Boulahia and Vincent Frey}, doi = {10.1109/IoTSMS.2018.8554494}, isbn = {9781538695852}, year = {2018}, date = {2018-01-01}, journal = {2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018}, pages = {139--146}, publisher = {IEEE}, abstract = {The need to connect things is skyrocketing and the Internet of Things is drawing a clear pattern of the need for smarter things. We are proposing an upgrade of Constrained Application Protocol (CoAP) built upon the 3 main networking needs of a connecting thing: The discovery, the synchronous and asynchronous communications and the publish/subscribe. CoAP 2.0 as we call it, will allow building smart things independently of the use-case, with a single protocol, fewer lines of codes and with less impact on the memory.}, keywords = {CoAP, Discovery, IoT, Publish/Subscribe, Security}, pubstate = {published}, tppubtype = {article} } @inproceedings{Kabil2018i, title = {From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform}, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and G\'{e}rard Le Comte and Yoran Halgand and Christophe Ponchel}, editor = {Vinod Ganapathy and Trent Jaeger and R K Shyamasundar}, url = {https://doi.org/10.1007/978-3-030-05171-6_14}, doi = {10.1007/978-3-030-05171-6_14}, year = {2018}, date = {2018-01-01}, booktitle = {Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings}, volume = {11281}, pages = {272--287}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, abstract = {Although collaborative practices between cyber organizations are well documented, managing activities within these organizations is still challenging as cyber operators tasks are very demanding and usually done individually. As human factors studies in cyber environments are still difficult to perform, tools and collaborative practices are evolving slowly and training is always required to increase teamwork efficiency. Contrary to other research fields, cyber security is not harnessing yet the capabilities of Collaborative Virtual Environments (CVE) which can be used both for immersive and interactive data visualization and serious gaming for training. In order to tackle cyber security teamwork issues, we propose a 3D CVE called the 3D Cyber Common Operational Picture, which aims at taking advantage of CVE practices to enhance cyber collaborative activities. Based on four Security Operations Centers (SOCs) visits we have made in different organizations, we have designed a cyber collaborative activity model which has been used as a reference to design our 3D CyberCOP platform features, such as asymetrical collaboration, mutual awareness and roles specialization. Our approach can be adapted to several use cases, and we are currently developing a cyber incident analysis scenario based on an event-driven architecture, as a proof of concept.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Rooney2018b, title = {What You Can Change and What You Can't: Human Experience in Computer Network Defenses}, author = {Vivien M Rooney and Simon N Foley}, doi = {10.1007/978-3-030-03638-6_14}, issn = {16113349}, year = {2018}, date = {2018-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {11252 LNCS}, pages = {219--235}, abstract = {The work of Computer Network Defense conducted, for instance, in Security Operations Centers and by Computer Security Incident Teams, is dependent not alone on technology, but also on people. Understanding how people experience these environments is an essential component toward achieving optimal functioning. This paper describes a qualitative research study on the human experience of working in these environments. Using Grounded Theory, a psychological understanding of the experience is developed. Results suggest that positive and negative aspects of the work are either amenable or not amenable to change. Areas of tension are identified, and posited as the focus for improving experience. For this purpose, psychological theories of Social Identity Theory, Relational Dialectics, and Cognitive Dissonance, provide a way of understanding and interpreting these components of Computer Network Defence work, and can be used to assess the experience of staff.}, keywords = {CSIRT Human experience, psychology, Security, SOC}, pubstate = {published}, tppubtype = {article} } @article{Foley2018a, title = {A grounded theory approach to security policy elicitation}, author = {Simon Foley}, url = {https://doi.org/10.1108/ICS-12-2017-0086}, doi = {10.1108/ICS-12-2017-0086}, year = {2018}, date = {2018-01-01}, volume = {26}, number = {4}, pages = {454--471}, publisher = {Emerald Publishing Limited}, abstract = {Purpose In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person's feelings and needs provides a means to elicit their security needs.Design/methodology/approach Recognizing that the codes uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed and machine learning is used to build a Bayesian network-based policy from the subsequent (grounded theory) analysis of the interview data.Findings Using a running example - based on a social psychology research study centered around photograph sharing - the paper demonstrates that in principle, qualitative research techniques can be used in a systematic manner to elicit security policy requirements.Originality/value While in principle qualitative research techniques can be used to elicit user requirements, the originality of this paper is a systematic methodology and its mapping into what is actionable, that is, providing a means to generate a machine-interpretable security policy at the end of the elicitation process.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{Rooney2018a, title = {An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice}, author = {Vivien M Rooney and Simon N Foley}, url = {https://doi.org/10.1145/3285002.3285003}, doi = {10.1145/3285002.3285003}, isbn = {9781450365970}, year = {2018}, date = {2018-01-01}, booktitle = {Proceedings of the New Security Paradigms Workshop}, pages = {64--79}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, series = {NSPW '18}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Pahl2018c, title = {Securing IoT microservices with certificates}, author = {Marc Oliver Pahl and Lorenzo Donini}, doi = {10.1109/NOMS.2018.8406189}, isbn = {9781538634165}, year = {2018}, date = {2018-01-01}, journal = {IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018}, pages = {1--5}, abstract = {The Internet of Things (IoT) consists of distributed computing nodes. With increasing processor power such nodes can be used as hosts for microservices. IoT services routinely processes security critical data that affects the privacy, safety, and security of users. However, suitable security mechanisms remain missing. Fundamental open challenges are the authentication of services, securing the metadata of services, and validating the correct functioning of security mechanisms on distributed entities under different authorities. In this paper we present a certificate- based methodology for authenticating services, securely adding information to their executables, and validating the correct functioning of distributed entities of our design. We add X.509 certificates with extended attributes to the service executables. By introducing different trust anchors, services and their metadata are protected through their entire life cycle from developers to the computing nodes running them. Our solution enables distributed nodes to verify the security properties locally. It enables reliably changing certificate properties across the distributed IoT nodes. It features autonomous certificate management. We evaluate the traffic caused by our autonomous certificate management process quantitatively. The presented solution is churn tolerant and applicable to diverse distributed systems.}, keywords = {Autonomous certificate management, Certificates, IoT, Microservices, Security, Unattended nodes, X.509}, pubstate = {published}, tppubtype = {article} } @article{Pahl2018b, title = {Graph-based IoT microservice security}, author = {Marc Oliver Pahl and Fran\c{c}ois Xavier Aubet and Stefan Liebald}, doi = {10.1109/NOMS.2018.8406118}, isbn = {9781538634165}, year = {2018}, date = {2018-01-01}, journal = {IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018}, pages = {1--3}, abstract = {The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of Microservices ($mu$S). The $mu$Ss inherently process data that affects the privacy, safety, and security of its users. IoT service security is a key challenge. Most state of the art providing IoT system security is policy based. We showcase a graph-based access control that runs as module on IoT nodes, or in the network. Our solution intercepts and firewalls inter-service communication. It automatically creates a model of legitimate communication relationships. The model is interactively updated via a simple-to-understand interface. Our solution adds inevitable IoT security to existing IoT systems .}, keywords = {Autonomous service management, firewall, IoT, Mi-croservices, Passive monitoring, Security, Unattended nodes}, pubstate = {published}, tppubtype = {article} } @incollection{duffany2018computer, title = {Computer Security}, author = {Jeffrey L Duffany}, doi = {10.1007/978-3-319-58424-9_1}, isbn = {9783319584249}, year = {2018}, date = {2018-01-01}, booktitle = {Computer and Network Security Essentials}, pages = {3--20}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {incollection} } @inproceedings{Gonzalezares2018, title = {A pyramidal-based model to compute the impact of cyber security events}, author = {Gustavo Gonzalez-Granadillo and Jose Rubio-Hernan and Joaquin Garcia-Alfaro}, editor = {ACM}, url = {https://doi.org/10.1145/3230833.3230847}, doi = {10.1145/3230833.3230847}, year = {2018}, date = {2018-01-01}, booktitle = {13th International Conference on Availability, Reliability and Security (ARES 2018)}, pages = {1--10}, address = {New York}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{lncs10694, title = {12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers}, author = {Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Jean-Louis Lanet and Axel Legay and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-319-76687-4}, doi = {10.1007/978-3-319-76687-4}, year = {2018}, date = {2018-01-01}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {book} } @book{fps2017, title = {10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, author = {Abdessamad Imine and Jose-M. Fernandez and Jean-Yves Marion and Luigi Logrippo and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1007/978-3-319-75650-9}, doi = {10.1007/978-3-319-75650-9}, year = {2018}, date = {2018-01-01}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {book} } @article{Rubio17ETT, title = {Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems}, author = {Jose Rubio-Hernan and Luca De Cicco and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1002/ett.3209}, doi = {10.1002/ett.3209}, year = {2018}, date = {2018-01-01}, journal = {Transactions on Emerging Telecommunications Technologies}, volume = {32}, number = {9}, pages = {1--17}, publisher = {Wiley}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2018graph, title = {Graph-based IoT microservice security}, author = {Marc-Oliver Pahl and Fran\c{c}ois-Xavier Aubet and Stefan Liebald}, year = {2018}, date = {2018-01-01}, booktitle = {NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash3}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{aubet2018graph, title = {Graph-based anomaly detection for iot microservices}, author = {Fran\c{c}ois-Xavier Aubet and Marc-Oliver Pahl and Stefan Liebald and Mohammad Reza Norouzian}, year = {2018}, date = {2018-01-01}, journal = {Measurements}, volume = {120}, number = {140}, pages = {160}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2018securing, title = {Securing IoT microservices with certificates}, author = {Marc-Oliver Pahl and Lorenzo Donini}, year = {2018}, date = {2018-01-01}, booktitle = {NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash5}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2018machine, title = {Machine learning as a reusable microservice}, author = {Marc-Oliver Pahl and Markus Loipfinger}, year = {2018}, date = {2018-01-01}, booktitle = {NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium}, pages = {1\textendash7}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2018all, title = {All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection}, author = {Marc-Oliver Pahl and Fran\c{c}ois-Xavier Aubet}, year = {2018}, date = {2018-01-01}, booktitle = {2018 14th International Conference on Network and Service Management (CNSM)}, pages = {72\textendash80}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @misc{pahl2018ds2os, title = {DS2OS traffic traces, 2018}, author = {MO Pahl and FX Aubet}, year = {2018}, date = {2018-01-01}, keywords = {}, pubstate = {published}, tppubtype = {misc} } @article{aubet2018ds2os, title = {DS2OS traffic traces}, author = {FX Aubet and MO Pahl}, year = {2018}, date = {2018-01-01}, journal = {Retrieved April}, volume = {23}, pages = {2022}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{porretta2017wuwnet, title = {Learning to Communicate Underwater (An exploration of Limited Mobility Agents in Underwater Acoustic Sensor Networks)}, author = {Steven Porretta and Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis}, url = {https://doi.org/10.1145/3148675.3148709}, doi = {10.1145/3148675.3148709}, year = {2017}, date = {2017-11-01}, booktitle = {12th ACM International Conference on Underwater Networks \& Systems, WUWNet'17, Nov 6-8, 2017, Halifax}, pages = {1--5}, publisher = {ACM}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kiennert2017nordsec, title = {Anonymous Certification for an e-Assessment Framework}, author = {Christophe Kiennert and Nesrine Kaaniche and Maryline Laurent and Pierre-Olivier Rocher and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-319-70290-2_5}, doi = {10.1007/978-3-319-70290-2_5}, year = {2017}, date = {2017-11-01}, booktitle = {22nd Nordic Conference on Secure IT Systems (NordSec 2017) Tartu, Estonia}, pages = {70--85}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{gonzalez2017fps, title = {Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric}, author = {Gustavo Gonzalez-Granadillo and Elena Doynikova and Igor Kotenko and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-319-75650-9_19}, doi = {10.1007/978-3-319-75650-9_19}, year = {2017}, date = {2017-10-01}, booktitle = {Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723}, pages = {293--302}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{gonzalez2017crisis, title = {Towards a Security Event Data Taxonomy}, author = {Gustavo Gonzalez-Granadillo and Jose Rubio-Hernan and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1007/978-3-319-76687-4_3}, doi = {10.1007/978-3-319-76687-4_3}, year = {2017}, date = {2017-09-01}, booktitle = {12th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2017), Dinard, France}, pages = {29--45}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kassem2017adhocnets, title = {Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band}, author = {Abdel Ahmad and Michel Barbeau and Joaquin Garcia-Alfaro and Jamil Kassem and Evangelos Kranakis and Steven Porretta}, url = {https://doi.org/10.1007/978-3-319-74439-1_1}, doi = {10.1007/978-3-319-74439-1_1}, year = {2017}, date = {2017-09-01}, booktitle = {9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada}, pages = {3--12}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kranakis2017adhocnets, title = {The Sound of Communication in Underwater Acoustic Sensor Networks}, author = {Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis and Steven Porretta}, url = {https://doi.org/10.1007/978-3-319-74439-1_2}, doi = {10.1007/978-3-319-74439-1_2}, year = {2017}, date = {2017-09-01}, booktitle = {9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada}, pages = {13--23}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Motzek2017EurasipPareto, title = {Selection of Pareto-efficient Response Plans based on Financial and Operational Assessments}, author = {Alexander Motzek and Gustavo Gonzalez-Granadillo and Herv\'{e} Debar and Joaquin Garcia-Alfaro and Ralf M\"{o}ller}, url = {https://dx.doi.org/10.1186/s13635-017-0063-6}, doi = {10.1186/s13635-017-0063-6}, year = {2017}, date = {2017-07-01}, journal = {EURASIP Journal on Information Security}, volume = {2017}, issue = {12}, pages = {1--22}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{rubio2017EurasipWatermak, title = {On the use of Watermark-based Schemes to Detect Cyber-Physical Attacks}, author = {Jose Rubio-Hernan and Luca De Cicco and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1186/s13635-017-0060-9}, doi = {10.1186/s13635-017-0060-9}, year = {2017}, date = {2017-06-01}, journal = {EURASIP Journal on Information Security}, volume = {2017}, issue = {8}, pages = {1--25}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{garcia2017introductionCEESI, title = {Introduction to the special section on critical systems modelling and security}, author = {Joaquin Garcia-Alfaro and Gregorio Martinez-Perez}, url = {http://dx.doi.org/10.1016/j.compeleceng.2017.05.027}, doi = {10.1016/j.compeleceng.2017.05.027}, year = {2017}, date = {2017-04-01}, journal = {Computers and Electrical Engineering}, volume = {59}, pages = {73--75}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @phdthesis{Pays2020, title = {Cyber-r\'{e}silience des infrastructures critiques Analyse pr\'{e}ventive des d\'{e}faillances d ' origine malveillante}, author = {Thomas C L\'{E}DEL}, year = {2017}, date = {2017-01-01}, school = {IMT Atlantique}, keywords = {}, pubstate = {published}, tppubtype = {phdthesis} } @book{foley2017computer, title = {Computer Security--ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I}, author = {Simon N Foley and Dieter Gollmann and Einar Snekkenes}, year = {2017}, date = {2017-01-01}, volume = {10492}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{ismail2017game, title = {A game theoretical model for optimal distribution of network security resources}, author = {Ziad Ismail and Christophe Kiennert and Jean Leneutre and Lin Chen}, year = {2017}, date = {2017-01-01}, booktitle = {International Conference on Decision and Game Theory for Security}, pages = {234--255}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{kome2017discovery, title = {Discovery and registration protocol}, author = {Marco Lobe Kome and Mariem Graa and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Vincent Frey}, year = {2017}, date = {2017-01-01}, booktitle = {International Conference on Information Systems Security}, pages = {243--262}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Foley2017, title = {Getting security objectives wrong: A cautionary tale of an industrial control system}, author = {Simon N Foley}, doi = {10.1007/978-3-319-71075-4_3}, issn = {16113349}, year = {2017}, date = {2017-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10476 LNCS}, pages = {18--29}, abstract = {We relate a story about an Industrial Control System in order to illustrate that simple security objectives can be deceptive: there are many things that can and do go wrong when deploying the system. Rather than trying to define security explicitly, this paper takes the position that one should consider the security of a system by comparing it against others whose security we consider to be acceptable: Alice is satisfied if her system is no less secure than Bob's system.}, keywords = {cyber physical system, firewall, ind, SCADA, Security}, pubstate = {published}, tppubtype = {article} } @article{Foley2017a, title = {Getting security objectives wrong: A cautionary tale of an industrial control system}, author = {Simon N Foley}, doi = {10.1007/978-3-319-71075-4_3}, issn = {16113349}, year = {2017}, date = {2017-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10476 LNCS}, pages = {18--29}, abstract = {We relate a story about an Industrial Control System in order to illustrate that simple security objectives can be deceptive: there are many things that can and do go wrong when deploying the system. Rather than trying to define security explicitly, this paper takes the position that one should consider the security of a system by comparing it against others whose security we consider to be acceptable: Alice is satisfied if her system is no less secure than Bob's system.}, keywords = {cyber physical system, firewall, ind, SCADA, Security}, pubstate = {published}, tppubtype = {article} } @article{Pieczul2017, title = {Developer-centered security and the symmetry of ignorance}, author = {Olgierd Pieczul and Simon Foley and Mary Ellen Zurko}, doi = {10.1145/3171533.3171539}, isbn = {9781450363846}, year = {2017}, date = {2017-01-01}, journal = {ACM International Conference Proceeding Series}, pages = {46--56}, abstract = {In contemporary software development anybody can become a developer, sharing, building and interacting with software components and services in a virtual free for all. In this environment, it is not feasible to expect these developers to be expert in every security detail of the software they use, and we discuss how difficult it can be to build secure software. In this respect, the practical challenges of the emerging paradigm of developer-centered security are explored, where developers would be required to consider security from the perspective of those other developers who use their software. We question whether current user-centered security techniques are adequate for this task and suggest that new thinking will be required. Two directions - symmetry of ignorance and security archaeology - are offered as a new way to consider this challenge.}, keywords = {•Security and privacy Usability in security and p, Software security engineering}, pubstate = {published}, tppubtype = {article} } @article{Kabil2017, title = {CyberCOP3D : Visualisation Collaborative et Immersive pour la cybers\'{e}curit\'{e} To cite this version : HAL Id : hal-01577868 CyberCOP3D : Visualisation Collaborative et Immersive pour la cybers\'{e}curit\'{e} Immersive Collaborative Visualization for Cyber S\'{e}curity}, author = {Alexandre Kabil and Alexandre Kabil and Cybercopd Visualisation Collaborative and I M T Atlantique and Alexandre Kabil}, year = {2017}, date = {2017-01-01}, keywords = {a, collaborative visualization, common operational, Cyber security, des pratiques, ectuer, fonction des donn{\'{e}}es et, human, n de disposer d, nous allons e, un cas d, utilisation r{\'{e}}el}, pubstate = {published}, tppubtype = {article} } @article{Kome2017, title = {DIscovery and registration protocol: For device and person identity management in IoT}, author = {Marco Lobe Kome and Mariem Graa and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Vincent Frey}, doi = {10.1007/978-3-319-72598-7_15}, issn = {16113349}, year = {2017}, date = {2017-01-01}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {10717 LNCS}, pages = {243--262}, abstract = {With connected things, one service can be used with more than one device, all sharing the same user identity. In this context, the need to figure out whether the service is being used through a desktop computer, a smartphone, or a more constrained device is essential in order to better manage user identity. Given that constrained devices are less tamper resistant, they are more vulnerable to attacks than other appliances. We identified two challenges which make it difficult to apply robusts security mechanisms: the limited resources available on devices and the sharing of a user's identity with the device. To address these challenges, we propose, a DIscovery and REgistration (DIRE) protocol that ensures secure device and person identities management. Our protocol has been formally proven and implemented. The runtime of the whole protocol is short and the code the device must embed is lightweight. As a result of our experiment, we produced a command line client for a user, a device firmware and a server handling the filiation of a user and its devices.}, keywords = {Identity management, IoT, MQTT, OAuth, Security}, pubstate = {published}, tppubtype = {article} } @article{Pahl2017a, title = {The iLab Concept: Making Teaching Better, at Scale}, author = {Marc Oliver Pahl}, doi = {10.1109/MCOM.2017.1700394}, issn = {01636804}, year = {2017}, date = {2017-01-01}, journal = {IEEE Communications Magazine}, volume = {55}, number = {11}, pages = {178--185}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Gonzalez17IEEEACCESS, title = {Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances}, author = {Gustavo Gonzalez-Granadillo and Jose Rubio-Hernan and Joaquin Garcia-Alfaro}, url = {https://doi.org/10.1109/ACCESS.2017.2740402}, doi = {10.1109/ACCESS.2017.2740402}, year = {2017}, date = {2017-01-01}, journal = {IEEE Access}, volume = {6}, pages = {8810--8828}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{gonzalez2017polytope, title = {A polytope-based approach to measure the impact of events against critical infrastructures}, author = {Gustavo Gonzalez-Granadillo and Joaquin Garcia-Alfaro and Herv\'{e} Debar}, url = {http://dx.doi.org/10.1016/j.jcss.2016.02.004}, doi = {10.1016/j.jcss.2016.02.004}, year = {2017}, date = {2017-01-01}, journal = {Journal of Computer and System Sciences}, volume = {83}, number = {1}, pages = {3--21}, publisher = {Elsevier}, keywords = {}, pubstate = {published}, tppubtype = {article} } @phdthesis{Manuel2018, title = {Detection of attacks against cyber-physical industrial systems. (D\'{e}tection des attaques contre les syst\`{e}mes cyber-physiques industriels)}, author = {Jos\'{e} Manuel Rubio-Hern\'{a}n}, url = {https://tel.archives-ouvertes.fr/tel-01688047}, year = {2017}, date = {2017-01-01}, school = {Telecom \& Management SudParis, France}, keywords = {}, pubstate = {published}, tppubtype = {phdthesis} } @article{pahl2017ilab, title = {The ilab concept: Making teaching better, at scale}, author = {Marc-Oliver Pahl}, year = {2017}, date = {2017-01-01}, journal = {IEEE Communications Magazine}, volume = {55}, number = {11}, pages = {178\textendash185}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{rubio2016event, title = {Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks}, author = {Jose Rubio-Hernan and Luca De Cicco and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1007/978-3-319-47560-8_1}, doi = {10.1007/978-3-319-47560-8_1}, year = {2016}, date = {2016-11-01}, booktitle = {21st Nordic Conference on Secure IT Systems (NordSec 2016)}, pages = {3--19}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{gonzalez2016towards, title = {Towards an Automated and Dynamic Risk Management Response System}, author = {Gustavo Gonzalez-Granadillo and Ender Alvarez and Alexander Motzek and Matteo Merialdo and Joaquin Garcia-Alfaro and Herv\'{e} Debar}, url = {http://dx.doi.org/10.1007/978-3-319-47560-8_3}, doi = {10.1007/978-3-319-47560-8_3}, year = {2016}, date = {2016-11-01}, booktitle = {21st Nordic Conference on Secure IT Systems (NordSec 2016)}, pages = {37--53}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{garcia2016CyberICPS, title = {Security of Cyber-Physical Systems. From Theory to Testbeds and Validation}, author = {Jose Rubio-Hernan and Juan Rodolfo-Mejias and Garcia-Alfaro Joaquin}, url = {https://doi.org/10.1007/978-3-319-61437-3_1}, doi = {10.1007/978-3-319-61437-3_1}, year = {2016}, date = {2016-09-01}, booktitle = {2nd Workshop on the Security of Industrial Control Systems \& Cyber-Physical Systems (CyberICPS 2016)}, pages = {3--18}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{gonzalezn, title = {An n-sided polygonal model to calculate the impact of cyber security events}, author = {Gustavo Gonzalez-Granadillo and Joaquin Garcia-Alfaro and Herv\'{e} Debar}, url = {http://dx.doi.org/10.1007/978-3-319-54876-0_7}, doi = {10.1007/978-3-319-54876-0_7}, year = {2016}, date = {2016-09-01}, booktitle = {11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016}, pages = {87--102}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{raid2016, title = {Research in Attacks, Intrusions, and Defenses (19th International Symposium, RAID 2016)}, author = {Fabien Monrose and Marc Dacier and Gregory Blanc and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1007/978-3-319-45719-2}, doi = {10.1007/978-3-319-45719-2}, year = {2016}, date = {2016-09-01}, volume = {9854}, series = {Lecture Notes in Computer Science}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{gonzalez2016considering, title = {Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms}, author = {Gustavo Gonz\'{a}lez-Granadillo and Jose Rubio-Hernan and Joaquin Garcia-Alfaro and Herv\'{e} Debar}, url = {https://doi.org/10.1109/TrustCom.2016.0082}, doi = {10.1109/TrustCom.2016.0082}, year = {2016}, date = {2016-08-01}, booktitle = {Trustcom/BigDataSE/ISPA, 2016 IEEE}, pages = {340--348}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{granadillo2016selection, title = {Selection of mitigation actions based on financial and operational impact assessments}, author = {Gustavo Gonzalez Granadillo and Alexander Motzek and Joaquin Garcia-Alfaro and Herv\'{e} Debar}, url = {http://dx.doi.org/10.1109/ARES.2016.3}, doi = {10.1109/ARES.2016.3}, year = {2016}, date = {2016-08-01}, booktitle = {Availability, Reliability and Security (ARES), 2016 11th International Conference on}, pages = {137--146}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{rubio2016revisiting, title = {Revisiting a watermark-based detection scheme to handle cyber-physical attacks}, author = {Jos\'{e} Rubio-Hern\'{a}n and Luca De Cicco and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1109/ARES.2016.2}, doi = {10.1109/ARES.2016.2}, year = {2016}, date = {2016-08-01}, booktitle = {Availability, Reliability and Security (ARES), 2016 11th International Conference on}, pages = {21--28}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{atc2016, title = {13th Annual International Conference on Advanced and Trusted Computing (ATC'2016)}, author = {D. El Baz and J. Bougeois and B. Defude and Z. Zhou and G. Han and J. Garcia-Alfaro}, url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7814735}, doi = {10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0191}, year = {2016}, date = {2016-07-01}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{ahvar2016cacev, title = {CACEV: a Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds}, author = {Ehsan Ahvar and Shohreh Ahvar and Zolt\'{a}n Ad\'{a}m Mann and Noel Crespi and Joaquin Garcia-Alfaro and Roch Glitho}, url = {http://dx.doi.org/10.1109/SCC.2016.43}, doi = {10.1109/SCC.2016.43}, year = {2016}, date = {2016-07-01}, booktitle = {Services Computing (SCC), 2016 IEEE International Conference on}, pages = {275--282}, publisher = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{Ismail2016, title = {A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures}, author = {Ziad Ismail and Jean Leneutre and David Bateman and Lin Chen}, doi = {10.1007/978-3-319-47413-7_10}, year = {2016}, date = {2016-03-01}, pages = {159--171}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{fps2015, title = {Foundations and Practice of Security; 8th International Symposium, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected}, author = {Joaquin Garcia-Alfaro and Evangelos Kranakis and Guillaume Bonfante}, url = {http://dx.doi.org/10.1007/978-3-319-30303-1}, doi = {10.1007/978-3-319-30303-1}, year = {2016}, date = {2016-03-01}, volume = {9482}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, keywords = {}, pubstate = {published}, tppubtype = {book} } @article{Pahl2016a, title = {Distributed smart space orchestration}, author = {Marc Oliver Pahl and Georg Carle and Gudrun Klinker}, doi = {10.1109/NOMS.2016.7502936}, isbn = {9781509002238}, year = {2016}, date = {2016-01-01}, journal = {Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium}, pages = {979--984}, abstract = {A programming abstraction for pervasive computing is introduced. It is based on context models and a novel concept that is called Virtual Context. An extensive requirements analysis for a real-world deployment of pervasive computing is presented. It is the base for an assessment of relevant state of the art that reveals the missing of a suitable programming abstraction. The work introduces a collaborative ontology for smart spaces, the concepts Virtual Context and micro-middleware, and, based on the former, a self- managing service management framework for smart spaces. The implementation of the concepts is quantitatively and qualitatively evaluated.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @book{fps2016, title = {Foundations and Practice of Security; 9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, author = {Fr\'{e}d\'{e}ric Cuppens and Wang Lingyu and Nora Cuppens-Boulahia and Nadia Tawbi and Joaquin Garcia-Alfaro}, url = {http://dx.doi.org/10.1007/978-3-319-51966-1}, doi = {10.1007/978-3-319-51966-1}, year = {2016}, date = {2016-01-01}, publisher = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {book} } @inproceedings{pahl2016distributed, title = {Distributed smart space orchestration}, author = {Marc-Oliver Pahl and Georg Carle and Gudrun Klinker}, year = {2016}, date = {2016-01-01}, booktitle = {NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium}, pages = {979\textendash984}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{bergstrom2015information, title = {Information classification enablers}, author = {Erik Bergstr\"{o}m and Rose-Mharie r{A}hlfeldt}, year = {2015}, date = {2015-01-01}, booktitle = {International Symposium on Foundations and Practice of Security}, pages = {268--276}, organization = {Springer}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{Cuppens-boulahia2015, title = {Security of Industrial Control Systems and Cyber Physical Systems, First Workshop, Cyber ICS 2015 and First Workshop, WOS-CPS 2015 Vienna}, author = {Adrien B\'{e}cue and Nora Cuppens-Boulahia and Fr\'{e}d\'{e}ric Cuppens and Sokratis Katsikas and Costas Lambrinoudakis}, isbn = {9783319403847}, year = {2015}, date = {2015-01-01}, keywords = {}, pubstate = {published}, tppubtype = {book} } @article{Pahl2015a, title = {Data-centric service-oriented management of things}, author = {Marc Oliver Pahl}, doi = {10.1109/INM.2015.7140326}, isbn = {9783901882760}, year = {2015}, date = {2015-01-01}, journal = {Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015}, pages = {484--490}, abstract = {With the Internet of Things, more and more devices become remotely manageable. The amount and heterogeneity of managed devices make the task of implementing management functionality challenging. Future Pervasive Computing scenarios require implementing a plethora of services to provide management functionality. With growing demand on services, reducing the emerging complexity becomes increasingly important. A simple-to-use programming model for implementing complex management scenarios is essential to enable developers to create the growing amount of required management software at high quality. The paper presents how data-centric mechanisms, as known from network management, can be utilized to create a service-oriented architecture (SOA) for management services. The resulting shift of complexity from access functionality towards data structures introduces new flexibility and facilitates the programming of management applications significantly. This is evaluated with a user study on the reference implementation.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2015data, title = {Data-centric service-oriented management of things}, author = {Marc-Oliver Pahl}, year = {2015}, date = {2015-01-01}, booktitle = {2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)}, pages = {484\textendash490}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @book{Lopez2014, title = {Risks and Security}, author = {Javier Lopez and Bruno Crispo Eds and David Hutchison}, isbn = {9783319171265}, year = {2014}, date = {2014-01-01}, keywords = {}, pubstate = {published}, tppubtype = {book} } @article{Pahl2014, title = {Crowdsourced context-modeling as key to future smart spaces}, author = {Marc Oliver Pahl and Georg Carle}, doi = {10.1109/NOMS.2014.6838362}, isbn = {9781479909131}, year = {2014}, date = {2014-01-01}, journal = {IEEE/IFIP NOMS 2014 - IEEE/IFIP Network Operations and Management Symposium: Management in a Software Defined World}, abstract = {Managing smart spaces with software requires the acquisition and processing of context information about a space. To be usable for exchanging information, a context representation has to be structured with a context model. Existing context-modeling techniques usually require experts and lack support for collaborative distributed creation, which prevents a crowdsourced development in a distributed collaborative way by non-experts. To facilitate context modeling, this paper presents a hybrid meta model that combines features from key-value, markup, object oriented, and ontology based context-modeling approaches. An architecture is introduced that allows the dynamic collaborative extension and crowdsourced convergence of context models.}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2014crowdsourced, title = {Crowdsourced context-modeling as key to future smart spaces}, author = {Marc-Oliver Pahl and Georg Carle}, year = {2014}, date = {2014-01-01}, booktitle = {2014 IEEE Network Operations and Management Symposium (NOMS)}, pages = {1\textendash8}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{shrestha2014convergence, title = {Convergence Mechanisms for a Smart Space App Store}, author = {Bibek Shrestha and Marc-Oliver Pahl and Benjamin Hof}, year = {2014}, date = {2014-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{shrestha2014final, title = {Final Talk Convergence Mechanisms for a Smart Space App Store}, author = {Bibek Shrestha and Marc-Oliver Pahl and Benjamin Hof}, year = {2014}, date = {2014-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Pahl2013, title = {The missing layer-Virtualizing smart spaces}, author = {Marc Oliver Pahl and Georg Carle}, doi = {10.1109/PerComW.2013.6529471}, isbn = {9781467350778}, year = {2013}, date = {2013-01-01}, journal = {2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2013}, pages = {139--144}, abstract = {With the Virtual State Layer (VSL), an abstraction for software-based orchestration of smart spaces is presented. The aim of the VSL is to ease the programming of orchestration software while not limiting its functionality. textcopyright 2013 IEEE.}, keywords = {app store, autonomous computing, distributed computing, smart space}, pubstate = {published}, tppubtype = {article} } @article{Pahl2013a, title = {Taking smart space users into the development loop: an architecture for community based software development for smart spaces}, author = {Marc-Oliver Pahl and Georg Carle}, isbn = {9783901882562}, year = {2013}, date = {2013-01-01}, journal = {Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication}, pages = {793--800}, abstract = {Smart spaces need driver services to connect accessed hardware and orchestration services to realize scenarios. There is a problem of scale in software development for smart spaces because it is done by few. It is also problematic that those few decide about what is supported and developed. We propose to provide users with tools for community based development of driver and orchestration services. We analyze the requirements for a middleware framework to allow distributed development. We present necessary extensions that promote community based development: (1) a repository for interface definitions, (2) App Store and App Manager, and (3) multi-dimensional ratings. Finally we present how smart space software development can be facilitated using our Distributed Smart Space Orchestration System (DS2OS).}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2013missing, title = {The missing layer\textemdashVirtualizing smart spaces}, author = {Marc-Oliver Pahl and Georg Carle}, year = {2013}, date = {2013-01-01}, booktitle = {2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)}, pages = {139\textendash144}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2013taking, title = {Taking smart space users into the development loop}, author = {Marc-Oliver Pahl and Georg Carle}, year = {2013}, date = {2013-01-01}, booktitle = {UbiComp 2013 Adjunct (HomeSys 2013)}, pages = {793\textendash800}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @inproceedings{pahl2013enabling, title = {Enabling sustainable smart neighborhoods}, author = {Marc-Oliver Pahl and Heiko Niedermayer and Holger Kinkelin and Georg Carle}, year = {2013}, date = {2013-01-01}, booktitle = {2013 Sustainable Internet and ICT for Sustainability (SustainIT)}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pahl2013ilab, title = {The iLab experience-a blended learning hands-on course concept}, author = {Marc-Oliver Pahl}, year = {2013}, date = {2013-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{pahl2011one, title = {One Cloud for All-Virtual Revolution?}, author = {Marc-Oliver Pahl}, year = {2011}, date = {2011-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{niedermayer2010using, title = {On using home networks and cloud computing for a future internet of things}, author = {Heiko Niedermayer and Ralph Holz and Marc-Oliver Pahl and Georg Carle}, year = {2010}, date = {2010-01-01}, booktitle = {Future Internet-FIS 2009: Second Future Internet Symposium, FIS 2009, Berlin, Germany, September 1-3, 2009 2}, pages = {70\textendash80}, organization = {Springer Berlin Heidelberg}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pahl2010automatic, title = {Automatic control and Management Platform (ACMP)}, author = {Marc-Oliver Pahl and Georg Carle}, year = {2010}, date = {2010-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{pahl2010authone, title = {AutHoNe-Autonomic Networking}, author = {Marc-Oliver Pahl and Andreas M\"{u}ller and Mario Schuster and Thomas Luckenbach and Christoph Niedermeier and Juergen Reichmann}, year = {2010}, date = {2010-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{Pahl2009, title = {Knowledge-based middleware for future home networks}, author = {Marc Oliver Pahl and Andreas M\"{u}ller and Georg Carle and Christoph Niedermeier and Mario Schuster}, doi = {10.1109/WD.2009.5449684}, isbn = {9781424456604}, year = {2009}, date = {2009-01-01}, journal = {2009 2nd IFIP Wireless Days, WD 2009}, abstract = {Humans are lazy. They want to get as much support and assistance in their daily life as possible. To provide sophisticated digital butler functionality a system has to monitor the humans and their environment to understand their desires. It has to control all devices to translate the deduced wills into actions. To provide an integrated intelligent environment to the residents it is necessary to overcome the borders of different manufacturers, devices and access technologies. A management and control middleware is needed that shields users as well as high level management services from the technical details of the network of devices by providing a standardized, resilient and secure communication channel. We present a knowledge-based middleware as base for that purpose in this paper. The novel approach is the transparent connection of highly heterogeneous home devices by requiring only very limited functionality per device. Our design allows the desired high autonomicity in a secure and efficient way}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{pahl2009knowledge, title = {Knowledge-based middleware for future home networks}, author = {Marc-Oliver Pahl and Andreas M\"{u}ller and Georg Carle and Christoph Niedermeier and Mario Schuster}, year = {2009}, date = {2009-01-01}, booktitle = {2009 2nd IFIP Wireless Days (WD)}, pages = {1\textendash6}, organization = {IEEE}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{luckenbach2009autonomic, title = {An autonomic home networking infrastructure}, author = {Thomas Luckenbach and Mario Schuster and Marc-Oliver Pahl}, year = {2009}, date = {2009-01-01}, journal = {ERCIM News}, volume = {2009}, number = {77}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{carle2008autonomic, title = {Autonomic Home Networks in the BMBF project AutHoNe}, author = {Georg Carle and Holger Kinkelin and Andreas M\"{u}ller and Heiko Niedermayer and Marc-Oliver Pahl and Alexander K\"{o}nig and Thomas Luckenbach and Klaus Scholl and Mario Schuster and Lasse Thiem and others}, year = {2008}, date = {2008-01-01}, booktitle = {8th W\"{u}rzburg Workshop on IP (EuroView 2008)}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{pahl2008spy360, title = {spy360. net-Webcampanoramen bis 360 Grad in HDR}, author = {Marc-Oliver Pahl}, year = {2008}, date = {2008-01-01}, keywords = {}, pubstate = {published}, tppubtype = {article} } @inproceedings{Bourget2018, title = {Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes}, author = {Edwin Bourget and Fr\'{e}d\'{e}ric Cuppens and Nora Cuppens-Boulahia and Samuel Dubus and Simon N Foley and Youssef Laarouchi}, url = {https://doi.org/10.1007/978-3-319-95729-6_3}, doi = {10.1007/978-3-319-95729-6_3}, pages = {38--47}, abstract = {Diagnosing accidental and malicious events in an industrial control system requires an event model with specific capacities. Most models are dedicated to either safety or security but rarely both. And the latter are developed for objectives other than diagnosis and therefore unfit for this task. In this paper, we propose an event model considering both safety and security events, usable in real-time, with a probabilistic measure of on-going and future events. This model is able to replace alerts in the context of more global scenarios, including with reinforcements or conflicts between safety and security. The model is then used to provide an analysis of some of the security and safety events in the Taum Sauk Hydroelectric Power Station.}, keywords = {}, pubstate = {published}, tppubtype = {inproceedings} } @article{Moussaileb, title = {Ransomware ' s Early Mitigation Mechanisms}, author = {Routa Moussaileb and Benjamin Bouget and Nora Cuppens}, isbn = {9781450364485}, keywords = {File Syste, file system tra-, Intrusion Detection System, Ransomware}, pubstate = {published}, tppubtype = {article} } @proceedings{garcia2017CEESI, title = {Special section on critical systems modelling and security}, editor = {Joaquin Garcia-Alfaro and Gregorio Martinez-Perez}, volume = {47}, pages = {73--200}, publisher = {Elsevier}, series = {Computers and Electrical Engineering}, keywords = {}, pubstate = {published}, tppubtype = {proceedings} } @article{pahlmigration, title = {Migration eines Praktikums auf eine eLearning-Plattform}, author = {Marc-Oliver Pahl}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{akyazitechnical, title = {Technical Program Committee of CBDCom 2019}, author = {Ugur Akyazi and Wenqiang Cui and Ilknur Donmez and Luca Foschini and Yan Gao and Lorena Gonz\'{a}lez-Manzano and Biao Han and Shi-Jinn Horng and Daqing Hou and Chih-Wei Yi and others}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{pahlilab, title = {iLab@ Home: Hands-On Networking Classes without physical Lab Access}, author = {Marc-Oliver Pahl}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{awalehdetection, title = {Detection and Defense of Cyber-Physical Attacks}, author = {HOUSSEIN MERANEH Awaleh and Marc-Oliver Pahl and H\'{e}l\`{e}ne Le Bouder}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{nowakformalization, title = {Formalization of network properties for resilient DLTs}, author = {Stefan Nowak and Marc-Oliver Pahl and Romaric Ludinard}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{schaeffertakuya, title = {Takuya Asaka, Tokyo Metropolitan University, Japan Thomas Clausen, \'{E}cole Polytechnique, France Tiago Cruz, University of Coimbra, Portugal Wei Zhao, Anhui University of Technology (Xiushan), China}, author = {Alberto Schaeffer-Filho and Aldri Santos and Artur Janicki and Carol Fung and Chafika Benzaid and Dianne Medeiros and Diogo Mattos and ENSIAS Driss Bouzidi and Morocco Farah Kandah and Igor Moraes and others}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{mattosmessage, title = {Message from the TPC Chairs}, author = {Diogo Menezes Ferrazani Mattos and Marc Oliver Pahl and France Carol Fung}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{martignonalberto, title = {Alberto Schaeffer-Filho, Universidade Federal do Rio Grande do Sul, Brazil Andr\'{e}s Murillo, Universidad de los Andes, Colombia Eduardo Cerqueira, Universidade Federal do Par\'{a} \& University of California, Los Angeles, Brazil}, author = {Fabio Martignon and Farid Benbadis and France Hassine Moungla and France Descartes and Jocelyne Elias and Lu\'{i}s Henrique Costa and Marc-Oliver Pahl and France Marcelo Carvalho and Marcelo Rubinstein and Maurizio Naldi and others}, keywords = {}, pubstate = {published}, tppubtype = {article} } @article{hongnavigation, title = {Navigation Bar}, author = {Youshi Hong and J\'{e}r\^{o}me Fran\c{c}ois and Lisandro Zambenedetti Granville and Ken Christensen and Gilbert Held and Guy Pujolle and Ehab S Al-Shaer and Lillykutty Jacob and Roberto Riggio and Shingo Ata and others}, keywords = {}, pubstate = {published}, tppubtype = {article} }