{"title":"SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data","authors":"Devante Gray, M. Mehrnezhad, R. Shafik","doi":"10.1109/eurospw55150.2022.00014","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00014","url":null,"abstract":"Sensing technologies are becoming ever more ubiquitous in society and increasingly finding their way into important and intimate aspects of our lives such as Industrial Internet of Things (IIOT) and Smart Homes. Accordingly, it's vital to fingerprint these sensors and devices enabling the detection of any malicious or malfunctioning sensors that may be present. The aim of this paper is to provide a simple and lightweight means of fingerprinting motion sensors, and by extension the devices these sensors reside in. To generate our fingerprints, we use the data produced by motion sensors (more specifically, the gyroscope) during the calibration process on start-up. Subsequently, we employ the use of a novel form of quantisation, and various signal processing techniques on this sensor data to generate our sensor fingerprints. Our results show that such calibration data is fingerprintable, and we demonstrate the effectiveness of a potential use case of our fingerprints: identification, where we are able to uniquely identify a sensor with a 0 % EER and 38-bits of entropy.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gastón García González, S. Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, P. Casas
{"title":"DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders","authors":"Gastón García González, S. Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, P. Casas","doi":"10.1109/eurospw55150.2022.00035","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00035","url":null,"abstract":"Due to its unsupervised nature, anomaly detection plays a central role in cybersecurity, in particular on the detection of unknown attacks. A major source of cybersecurity data comes in the form of multivariate time-series (MTS), representing the temporal evolution of multiple, usually correlated measurements. Despite the many approaches available in the literature for time-series anomaly detection, the automatic detection of abnormal events in MTS remains a complex problem. In this paper we introduce DC-VAE, a novel approach to anomaly detection in MTS, leveraging convolutional neural networks (CNNs) and variational auto encoders (VAEs). DC-VAE detects anomalies in time-series data, exploiting temporal information without sacrificing computational and memory resources. In particular, instead of using recursive neural networks, large causal filters, or many layers, DC-VAE relies on dilated convolutions (dc) to capture long and short term phenomena in the data, avoiding complex and less-efficient deep architectures, simplifying learning. We evaluate dc-vae on the detection of anoma-lies on a large-scale, multi-dimensional network monitoring dataset collected at an operational mobile internet service provider (isp), where anomalous events were manually labeled during a time span of 7-months, at a five-minutes granularity. Results show the main properties and advantages introduced by VAEs for time-series anomaly detection, as well as the out-performance of dilated convolutions as compared to standard VAEs for time-series modeling.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Information Security: From Formal Curriculum to Organisational Awareness","authors":"P. Delport, J. V. Niekerk, Rayne Reid","doi":"10.1109/eurospw55150.2022.00055","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00055","url":null,"abstract":"Many organisations responded to the recent global pandemic by moving operations online. This has led to increased exposure to information security-related risks. There is thus an increased need to ensure organisational information security awareness programs are up to date and relevant to the needs of the intended target audience. The advent of online educational providers has similarly placed increased pressure on the formal educational sector to ensure course content is updated to remain relevant. Such processes of academic reflection and review should consider formal curriculum standards and guidelines in order to ensure wide relevance. This paper presents a case study of the review of an Introduction to Information Security course. This review is informed by the Information Security and Assurance knowledge area of the ACM/IEEE Computer Science 2013 curriculum standard. The paper presents lessons learned during this review process to serve as a guide for future reviews of this nature. The authors assert that these lessons learned can also be of value during the review of organisational information security awareness programs.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128558598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AWS EC2 Public Cloud Cyber Range Deployment","authors":"R. Beuran, Zhe Zhang, Yasuo Tan","doi":"10.1109/EuroSPW55150.2022.00051","DOIUrl":"https://doi.org/10.1109/EuroSPW55150.2022.00051","url":null,"abstract":"Cybersecurity training activities require specialized environments, typically called cyber ranges, to make it possible for trainees to acquire not only security knowledge, but also practical security skills. However, the setup of these training environments is a tedious task, which hinders the wider use of cyber ranges for security training. In its turn, this has a negative impact on the development of the cybersecurity workforce that is exceedingly necessary in our network-centric society. In this paper we introduce our approach of using the Amazon Web Services (AWS) Elastic Compute Cloud (EC2) public cloud for cyber range deployment, thus making it possible to conduct cybersecurity training activities at scale and at a relatively low cost. Our system was implemented by extending the functionality of the cyber range instantiation system CyRIS that is available as open source on GitHub. We evaluated our implementation from several perspectives, demonstrating that public cloud deployment can provide similar functionality and performance compared to local server or private cloud deployment, while avoiding the high purchase and management costs associated to those.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arianna Rossi, M. Arenas, Emre Kocyigit, Moad Hani
{"title":"Challenges of protecting confidentiality in social media data and their ethical import","authors":"Arianna Rossi, M. Arenas, Emre Kocyigit, Moad Hani","doi":"10.1109/eurospw55150.2022.00066","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00066","url":null,"abstract":"This article discusses the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open-source package developed to pseudonymize personal and confidential information (i.e., personal names, companies, and locations) contained in such data. Its goal is to facilitate compliance with EU data protection obligations and the upholding of research ethics principles like the respect for the autonomy, privacy and dignity of research participants, the social responsibility of researchers, and scientific integrity. We discuss the limitations of the pseudonymizer package, their ethical import, and the additional security measures that should be adopted to protect the confidentiality of the data.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fai Ben Salamah, Marco A. Palomino, M. Papadaki, S. Furnell
{"title":"The Importance of the Job Role in Social Media Cybersecurity Training","authors":"Fai Ben Salamah, Marco A. Palomino, M. Papadaki, S. Furnell","doi":"10.1109/eurospw55150.2022.00054","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00054","url":null,"abstract":"Social media has become embedded in our everyday lives, personal activities and the workplace. Thus, educating users on emerging cybersecurity challenges for social media has become imperative. As such, we have investigated the feasibility of an awareness-raising and adaptive cybersecurity training system. Our investigation is aided by a questionnaire, which was administered online using Google Forms. We collected answers from 641 employees from a variety of sectors: education, healthcare, leadership and management, arts, entertainment, police and the military. We found that a one-size-fits-all training approach is highly ineffective, as people's understanding and knowledge can vary greatly. Thus, we have proceeded to identify the factors that influence the success of any given approach. Information such as gender, age, education level, job roles, and training preferences seem essential considerations for developing a robust training strategy. Our investigation concludes that “job role” is the most significant factor associated with people's preferences and perceptions in cybersecurity training. Also, people appear to be in favour of adaptive training. Moreover, a mixed delivery approach is likely to be welcomed.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood","authors":"Daniel W. Woods, Lukas Walter","doi":"10.1109/eurospw55150.2022.00021","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00021","url":null,"abstract":"Across both the public and private sector, cyberse-curity decisions could be informed by estimates of the likelihood of different types of exploitation and the corresponding harms. Law enforcement should focus on investigating and disrupting those cybercrimes that are relatively more frequent, all else being equal. Similarly, firms should account for the likelihood of different forms of cyber incident when tailoring risk management policies. This paper reviews the quantitative evidence available for both cybercrime victimi-sation and cyber risk likelihood, providing a bridge between the academic fields of criminology and cybersecurity. We extract estimates from 48 studies conducted by a mix of academics, statistical institutes, and cybersecurity vendors using a range of data sources including victim surveys, case-control studies, and the insurance market. The victimisation estimates are categorised into: cyber attack; malware; ran-somware; fraudulent email; online banking fraud; online sales fraud; unauthorised access; Denial of Service; and identity theft. For each category, we display all estimates in the years 2017–2021. Our review shows: (i) firms face higher victimisation rates than individuals, which increases in the number of employees; (ii) global surveys reveal a consistent relative ranking of countries in ransomware victimisation; (iii) although trends could be identified within studies that collect longitudinal data, these trends tended to contradict each other when compared across studies; and (iv) broad categories with unclear consequences (e.g. malware and fraudulent emails) displayed higher variance and average values than categories associated with specific outcomes (e.g. identity theft or online banking fraud). We discuss the outlook for cybercrime and cyber risk research.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful","authors":"Markku-Juhani O. Saarinen","doi":"10.1109/EuroSPW55150.2022.00011","DOIUrl":"https://doi.org/10.1109/EuroSPW55150.2022.00011","url":null,"abstract":"When it comes to cryptographic random number generation, poor understanding of the security requirements and “mythical aura” of black-box statistical testing frequently leads it to be used as a substitute for cryptanalysis. To make things worse, a seemingly standard document, NIST SP 800–22, describes 15 statistical tests and suggests that they can be used to evaluate random and pseudorandom number generators in cryptographic applications. The Chi-nese standard GM/T 0005–2012 describes similar tests. These documents have not aged well. The weakest pseudorandom number generators will easily pass these tests, promoting false confidence in insecure systems. We strongly suggest that SP 800–22 be withdrawn by NIST; we consider it to be not just irrelevant but actively harmful. We illustrate this by discussing the “reference generators” contained in the SP 800–22 document itself. None of these generators are suitable for modern cryptography, yet they pass the tests. For future development, we suggest focusing on stochastic modeling of entropy sources instead of model-free statistical tests. Random bit generators should also be reviewed for potential asymmetric backdoors via trapdoor one-way functions, and for security against quantum computing attacks.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121977750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programmatic Description Language for Cyber Range Topology Creation","authors":"Andrea Dalla Costa, Jarkko Kuusijärvi","doi":"10.1109/eurospw55150.2022.00048","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00048","url":null,"abstract":"Cyber Ranges are becoming a fundamental part of cybersecurity training and preparations, since they allow testing different scenarios in a safe, isolated and repro-ducible environment. We can expect to see cyber ranges used even more in cybersecurity trainings and testing of various system deployments, which also means increasing amount of scenarios to be developed. It is beneficial to make the scenario development/generation easier and faster for the human operators and automated generation alike to support the different use cases requirements. This paper analyses the currently available open-source and/or research community solutions for defining topologies for cyber ranges and presents the enhanced description language developed. The description language aims to sim-plify the scenario creation process for large networks with features that support quick and easy specification of the initial topology. This paper describes the enhanced features that enable the language to describe topologies in a compact form and presents initial test topology creation in lab settings deployed in OpenStack environment.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gianluca Roascio, Samuele Yves Cerini, P. Prinetto
{"title":"Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges","authors":"Gianluca Roascio, Samuele Yves Cerini, P. Prinetto","doi":"10.1109/eurospw55150.2022.00057","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00057","url":null,"abstract":"In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts becomes critical in every organization and at multiple levels. However, classical and theory-oriented training seems to lack effectiveness and power of attraction, while professional selection and training processes based on cybersecurity gamification are being successfully experimented, among which Capture-the-Flag (CTF) competitions certainly stand out. Nevertheless, careful analysis reveals that such initiatives have a major shortcoming in addressing security issues when training people to tackle hardware-related security issues. Several motivations can be identified, including the inadequate technical knowledge of the White Teams charged of the challenges preparations, and the evident logistic problems posed by the availability of real hardware devices when the numbers of trainees significantly scales up. This paper presents a platform able to provide as a service hardware-based CTF challenges and exercises, involving circuits and chips that can be physically connected to a server or simulated, to deal with topics such as hardware bugs, flaws and backdoors, vulnerabilities in test infrastructures, and side-channel attacks. The platform is presented from a technical perspective, and data for deducting related efficiency, stability and scalability are offered.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}