{"title":"Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testing","authors":"D. Granata, M. Rak, Giovanni Salzillo","doi":"10.1109/CSR51186.2021.9527969","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527969","url":null,"abstract":"Over the years, the automotive industry has experienced a great progress in the electronics and information technology. To offer an easier and safer driving experience, vehicles started to incorporate more and more complex electronic components, also known as Electronic Control Units (ECUs), whereas the communication between different control units is demanded to a single CAN-Bus network or to multiple on-board wired networks. However, the automotive protocols have been designed without consider any security measures. Thus, modern vehicles are exposed to multiple classes of threats and cyber-attacks. Today, the security evaluation of current automotive standards and implementations requires expensive emulation systems (e.g. hardware-in-the-loop simulations), or real vehicles to conduct accurate security-tests. This work presents HybridgeCAN, a low-cost computer-to-vehicle testbed to simulate vehicles control units and communications over a hybrid CAN Bus network. We introduce the challenges that need to be addressed and overcome to create a hybrid automotive test system, with a special focus on security testing.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133808529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Boot","authors":"Sergey Ostrikov","doi":"10.1109/CSR51186.2021.9527940","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527940","url":null,"abstract":"As security continues to permeate embedded systems, it remains largely at odds with other performance metrics such as speed. Time-critical computing systems need to meet strict timing requirements and often cannot afford to add security checks. The impact of these checks is particularly evident before the systems are configured to run at full speed, or during booting. This paper describes a method that allows to speed up the boot process by relying on seemingly unorthodox infrastructure in nonvolatile memories. The additional infrastructure requires positive confirmation—which can be deferred and come after booting— for the system to continue performing application-specific actions. In the event of failure to provide confirmation, the infrastructure initiates a recovery process.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cainã Figueiredo, João Gabriel Lopes, R. Azevedo, Gerson Zaverucha, D. Menasché, Leandro Pfleger De Aguiar
{"title":"Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach","authors":"Cainã Figueiredo, João Gabriel Lopes, R. Azevedo, Gerson Zaverucha, D. Menasché, Leandro Pfleger De Aguiar","doi":"10.1109/CSR51186.2021.9527984","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527984","url":null,"abstract":"Data on software vulnerabilities, products and exploits is typically collected from multiple non-structured sources. Valuable information, e.g., on which products are affected by which exploits, is conveyed by matching data from those sources, i.e., through their relations. In this paper, we leverage this simple albeit unexplored observation to introduce a statistical relational learning (SRL) approach for the analysis of vulnerabilities, products and exploits. In particular, we focus on the problem of determining the existence of an exploit for a given product, given information about the relations between products and vulnerabilities, and vulnerabilities and exploits, focusing on Industrial Control Systems (ICS), the National Vulnerability Database and ExploitDB. Using RDN-Boost, we were able to reach an AUC ROC of 0.83 and an AUC PR of 0.69 for the problem at hand. To reach that performance, we indicate that it is instrumental to include textual features, e.g., extracted from the description of vulnerabilities, as well as structured information, e.g., about product categories. In addition, using interpretable relational regression trees we report simple rules that shed insight on factors impacting the weaponization of ICS products.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124851884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Security of Key Derivation Functions in Password-based Cryptography","authors":"Gaurav Kodwani, Shashank Arora, P. Atrey","doi":"10.1109/CSR51186.2021.9527961","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527961","url":null,"abstract":"Most common user authentication methods use some form of password or a combination of passwords. However, encryption schemes are generally not directly compatible with user passwords and thus, Password-Based Key Derivation Functions (PBKDFs) are used to convert user passwords into cryptographic keys. In this paper, we analyze the theoretical security of PBKDF2 and present two vulnerabilities, γ-collision and δ-collision. Using AES-128 as our exemplar, we show that due to γ-collision, text encrypted with one user password can be decrypted with γ 1 different passwords. We also provide a proof that finding− a collision in the derived key for AES-128 requires δ lesser calls to PBKDF2 than the known Birthday attack. Due to this, it is possible to break password-based AES-128 in O(264) calls, which is equivalent to brute-forcing DES.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Exfiltration: Methods and Detection Countermeasures","authors":"James King, G. Bendiab, N. Savage, S. Shiaeles","doi":"10.1109/CSR51186.2021.9527962","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527962","url":null,"abstract":"Data exfiltration is of increasing concern throughout the world. The number of incidents and capabilities of data exfiltration attacks are growing at an unprecedented rate. However, such attack vectors have not been deeply explored in the literature. This paper aims to address this gap by implementing a data exfiltration methodology, detailing some data exfiltration methods. Groups of exfiltration methods are incorporated into a program that can act as a testbed for owners of any network that stores sensitive data. The implemented methods are tested against the well-known network intrusion detection system Snort, where all of them have been successfully evaded detection by its community rule sets. Thus, in this paper, we have developed new countermeasures to prevent and detect data exfiltration attempts using these methods.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Panagiotidis, Christos Angelidis, Ioannis Karalis, Georges Spyropoulos, Angelos Liapis
{"title":"Act Proactively: An Intrusion Prediction Approach for Cyber Security","authors":"P. Panagiotidis, Christos Angelidis, Ioannis Karalis, Georges Spyropoulos, Angelos Liapis","doi":"10.1109/CSR51186.2021.9527920","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527920","url":null,"abstract":"Despite the multitude of approaches proposed for intrusion detection, cyberattacks are still a timeless issue for the research community and industry as they cause various devastating effects to companies and organisations. There are limited intrusion prediction approaches in the literature, as the main bulk of methods focuses on cyberattack detection rather than prediction, which would allow the defenders (attack’s targets) to restrain/stop the attack. This work aims to identify known DoS and Probe attack patterns at their very beginning. Specifically, we use machine learning algorithms to predict the malicious packets of DoS and Probe attacks, raising the defender’s awareness to act proactively and stop the attack. To the best of our knowledge, this is the first time that time series analysis and machine learning techniques are used to model the intrusion prediction problem effectively. An extensive experimental study confirms the efficacy of the proposed approach according to multiple evaluation measures.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, S. Tjoa, F. Marulli, F. Mercaldo
{"title":"Towards Resilient Artificial Intelligence: Survey and Research Issues","authors":"Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, S. Tjoa, F. Marulli, F. Mercaldo","doi":"10.1109/CSR51186.2021.9527986","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527986","url":null,"abstract":"Artificial intelligence (AI) systems are becoming critical components of today’s IT landscapes. Their resilience against attacks and other environmental influences needs to be ensured just like for other IT assets. Considering the particular nature of AI, and machine learning (ML) in particular, this paper provides an overview of the emerging field of resilient AI and presents research issues the authors identify as potential future work.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Tomur, Utku Gülen, Elif Ustundag Soykan, M. Ersoy, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak
{"title":"SoK: Investigation of Security and Functional Safety in Industrial IoT","authors":"E. Tomur, Utku Gülen, Elif Ustundag Soykan, M. Ersoy, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak","doi":"10.1109/CSR51186.2021.9527921","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527921","url":null,"abstract":"There has been an increasing popularity of industrial usage of Internet of Things (IoT) technologies in parallel to advancements in connectivity and automation. Security vulnerabilities in industrial systems, which are considered less likely to be exploited in conventional closed settings, have now started to be a major concern with Industrial IoT. One of the critical components of any industrial control system turning into a target for attackers is functional safety. This vital function is not originally designed to provide protection against malicious intentional parties but only accidents and errors. In this paper, we explore a generic IoT-based smart manufacturing use-case from a combined perspective of security and functional safety, which are indeed tightly correlated. Our main contribution is the presentation of a taxonomy of threats targeting directly the critical safety function in industrial IoT applications. Besides, based on this taxonomy, we identified particular attack scenarios that might have severe impact on physical assets like manufacturing equipment, even human life and cyber-assets like availability of Industrial IoT application. Finally, we recommend some solutions to mitigate such attacks based mainly on industry standards and advanced security features of mobile communication technologies.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards anomaly detection in smart grids by combining Complex Events Processing and SNMP objects","authors":"M. Itria, Enrico Schiavone, Nicola Nostro","doi":"10.1109/CSR51186.2021.9527928","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527928","url":null,"abstract":"This paper describes the architecture and the fundamental methodology of an anomaly detector, which by continuously monitoring Simple Network Management Protocol data and by processing it as complex-events, is able to timely recognize patterns of faults and relevant cyber-attacks. This solution has been applied in the context of smart grids, and in particular as part of a security and resilience component of the Information and Communication Technologies (ICT) Gateway, a middleware-based architecture that correlates and fuses measurement data from different sources (e.g., Inverters, Smart Meters) to provide control coordination and to enable grid observability applications. The detector has been evaluated through experiments, where we selected some representative anomalies that can occur on the ICT side of the energy distribution infrastructure: non-malicious faults (indicated by patterns in the system resources usage), as well as effects of typical cyber-attacks directed to the smart grid infrastructure. The results show that the detection is promisingly fast and efficient.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning on knowledge graphs for context-aware security monitoring","authors":"J. Garrido, D. Dold, Johannes Frank","doi":"10.1109/CSR51186.2021.9527927","DOIUrl":"https://doi.org/10.1109/CSR51186.2021.9527927","url":null,"abstract":"Machine learning techniques are gaining attention in the context of intrusion detection due to the increasing amounts of data generated by monitoring tools, as well as the sophistication displayed by attackers in hiding their activity. However, existing methods often exhibit important limitations in terms of the quantity and relevance of the generated alerts. Recently, knowledge graphs are finding application in the cybersecurity domain, showing the potential to alleviate some of these drawbacks thanks to their ability to seamlessly integrate data from multiple domains using human-understandable vocabularies. We discuss the application of machine learning on knowledge graphs for intrusion detection and experimentally evaluate a link-prediction method for scoring anomalous activity in industrial systems. After initial unsupervised training, the proposed method is shown to produce intuitively well-calibrated and interpretable alerts in a diverse range of scenarios, hinting at the potential benefits of relational machine learning on knowledge graphs for intrusion detection purposes.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}