Network, Information and Computer Security Lab
NICS Lab is an international leading Security research group led by Javier Lopez, Full Professor of the Computer Science Department at University of Malaga. NICS is composed of 20 persons, including faculty members, post-doc researchers, top PhD students, and technical and management staff, all belonging to a major research group GISUM, being distributed on two different locations, the Ada Byron Research Building at the extension of Campus Teatinos and the Computer Science Department at Campus Teatinos.
The research activities of the group started back in 1994, when Prof. Lopez published his first research work on electronic mail security in Local Area Networks, followed by others on probabilistic primality tests for public keys, and public-key directories security based on Neural Networks. Since then, NICS members have published over 300 publications, among them more than 60 journal publications with impact factor (ISI-ranked).
Additionally, NICS members have participated in more than 50 security research projects at international and national level, funded by V, VI and VII European Frameworks Programmes as well as by different Ministries in Spain, Japan, Norway and Singapore.
NICS Lab actively participates in international committees and Working Groups in the Security area, as well as in the organization of multiple international conferences and workshops. Moreover, NICS is particularly dynamic in the exchange of researchers with other research institutions, having signed official scientific and technical cooperation agreements in US with NIST (Information Technology Laboratory, Computer Security Division), and in Singapore with I2R (Cryptography & Security Department).
Over the years, NICS members have been especially active in technology transfer to companies like ATOS Origin, HP Labs, Telefonica, France Telecom, Siemens, Indra, Banesto, Orange, Endesa, Sermepa and Telvent, as well as to public entities like the Spanish Ministry of Defense, the Andalusian Government, and RedIRIS (Spanish advanced communications network for academic and R+D Centres).
last news
last publications
Carmen Fernandez-Gago, Davide Ferraris, Rodrigo Roman, Javier Lopez
Trust interoperability in the Internet of Things Journal Article Forthcoming
In: Internet of Things, vol. 26, Forthcoming.
@article{FerIoT24,
title = {Trust interoperability in the Internet of Things},
author = {Carmen Fernandez-Gago and Davide Ferraris and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/FerIoT24.pdf},
doi = {https://doi.org/10.1016/j.iot.2024.101226},
year = {2024},
date = {2024-12-31},
urldate = {2024-12-31},
journal = {Internet of Things},
volume = {26},
abstract = {The Internet of Things (IoT) is a paradigm where entities or things are interconnected, often in heterogeneous contexts. As the interconnection happens, things establish collaborations with others, sometimes under uncertainty. Although trust can help us overcome this uncertainty, things might not be able to process the information about trust coming from other things: each thing could have its own trust model, which means its own way to understand and measure trust. If new trust relationships are to be established, it would be desirable to have a mechanism of interoperability that allows the things to process the information about the other things in terms of trust. In this paper, we describe an interoperability framework for tackling the trust interoperability issues in IoT, depending on the different types of trust models that might co-exist in the same IoT scenario.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {article}
}
Daniel Morales, Isaac Agudo, Javier Lopez
Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain Journal Article Forthcoming
In: IEEE Communications Magazine, Forthcoming, ISSN: 1558-1896.
@article{morales2024commag,
title = {Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain},
author = {Daniel Morales and Isaac Agudo and Javier Lopez},
url = {/wp-content/papers/morales2024commag.pdf},
doi = {10.1109/MCOM.001.2300839},
issn = {1558-1896},
year = {2024},
date = {2024-09-03},
urldate = {2024-09-03},
journal = {IEEE Communications Magazine},
abstract = {Blockchain technologies have introduced a compelling paradigm for a new understanding of security through decentralized networks and consensus mechanisms. However, they need all data to be public, which may be unacceptable for use cases such as biometric data processing or sensitive monetary transactions. Therefore, confidentiality is identified as a need in blockchain. Additionally, blockchain can contribute to confidential applications by providing publicly verifiable mechanisms, therefore enhancing security. This work presents a framework for cost-effective and publicly verifiable confidential computations in blockchain, by relying on secure multi-party computation committees and zero-knowledge proofs. Our framework supports arbitrary computations on confidential data enforced by smart contracts. Additionally, staking, incentives, and cheat identification are provided as solutions to enhance trust. We also provide a technical solution to embed secure multi-party computations within smart contracts by using the Promise programming pattern. Finally, a cost analysis is provided to justify the feasibility of the framework compared to other solutions.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {article}
}
Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Sotiropoulos Aristeidis, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities Conference Forthcoming
4th International Workshop on Advances on Privacy Preserving Technologies and Solutions(IWAPS) , Forthcoming.
@conference{Alcaraz2024a,
title = {SYNAPSE - An Integrated Cyber Security Risk \& Resilience Management Platform, With Holistic Situational Awareness, Incident Response \& Preparedness Capabilities},
author = {Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Sotiropoulos Aristeidis, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko},
url = {https://www.ares-conference.eu/iwaps},
year = {2024},
date = {2024-07-31},
urldate = {2024-07-31},
booktitle = {4th International Workshop on Advances on Privacy Preserving Technologies and Solutions(IWAPS) },
abstract = {In an era of escalating cyber threats, the imperative for robust and comprehensive cybersecurity measures has never been more pressing. To address this challenge, SYNAPSE presents a pioneering approach by conceptualising, designing, and delivering an Integrated Cyber Security Risk \& Resilience Management Platform. This platform embodies a holistic framework, synthesising key elements of situational awareness, incident response, and preparedness (i.e., cyber range), augmented by advanced AI capabilities. Through its holistic approach, SYNAPSE aims to elevate cyber resilience by not only mitigating threats but also fostering a culture of proactive defence, informed decision-making, and collaborative response within organisations and across industries.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {conference}
}
Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou
DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control Journal Article
In: International Journal of Critical Infrastructure Protection, vol. 45, iss. 100678, pp. 100678, 2024, ISSN: 1874-5482.
@article{SYRMAKESIS2024100678,
title = {DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control},
author = {Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D. Hatziargyriou},
url = {https://www.sciencedirect.com/science/article/pii/S1874548224000192?dgcid=rss_sd_all},
doi = {https://doi.org/10.1016/j.ijcip.2024.100678},
issn = {1874-5482},
year = {2024},
date = {2024-07-01},
urldate = {2024-01-01},
journal = {International Journal of Critical Infrastructure Protection},
volume = {45},
issue = {100678},
pages = {100678},
abstract = {In power systems, generation must be maintained in constant equilibrium with consumption. A key indicator for this balance is the frequency of the power grid. The load frequency control (LFC) system is responsible for maintaining the frequency close to its nominal value and the power deviation of tie-lines at their scheduled levels. However, the remote communication system of LFC exposes it to several cyber threats. A successful cyberattack against LFC attempts to affect the field measurements that are transferred though its remote control loop. In this work, a data-driven, attack recovery method is proposed against denial of service and false data injection attacks, called DAR-LFC. For this purpose, a deep neural network is developed that generates estimations of the area control error (ACE) signal. When a cyberattack against the LFC occurs, the proposed estimator can temporarily compute and replace the affected ACE, mitigating the effects of the cyberattacks. The effectiveness and the scalability of the DAR-LFC is verified on a single and a two area LFC simulations in MATLAB/Simulink.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Cristina Alcaraz, Javier Lopez
Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems Journal Article
In: IEEE Network Magazine, vol. 37, no. 2, pp. 302-308, 2023, ISSN: 0890-8044.
@article{Alcaraz2023a,
title = {Protecting Digital Twin Networks for 6G-enabled Industry 5.0 Ecosystems},
author = {Cristina Alcaraz and Javier Lopez},
url = {/wp-content/papers/Alcaraz2023a.pdf
https://ieeexplore.ieee.org/abstract/document/10239369},
doi = {10.1109/MNET.004.2200529},
issn = {0890-8044},
year = {2023},
date = {2023-12-31},
urldate = {2023-12-31},
journal = {IEEE Network Magazine},
volume = {37},
number = {2},
pages = {302-308},
publisher = {IEEE},
abstract = {New industrial paradigms, such as the Industrial Internet of Things (IIoT) and Industry 5.0, are emerging in industrial contexts with the aim of fostering quality in operational processes. With the expected launch of 6G in the coming years, IIoT networks in Industry 5.0 ecosystems can leverage 6G technology and its support for training machine learning models using Digital Twins (DTs), embedded in DT Networks (DTNs), to transparently and continuously optimize their communications. Unfortunately, the use of these technologies, in turn, intensifies the attack surface and poses a serious threat to the new goals of Industry 5.0, such as improving the user experience, sustainability and resilience. This article therefore proposes a layered protection framework for 6G-enabled IIoT environments, where not only DTs and DTNs are fully protected, but also the whole 6G ecosystem, complying with the expected goals of Industry 5.0. To achieve this, the framework identifies for each protection layer a set of security and privacy services to subsequently relate them to existing computing infrastructures (cloud, edge, edge-cloud) and provide the best approach for future IIoT deployments.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Davide Ferraris, Carmen Fernandez-Gago, Rodrigo Roman, Javier Lopez
A Survey on IoT Trust Model Frameworks Journal Article
In: The Journal of Supercomputing, 2023.
@article{surveyIoTrust2023,
title = {A Survey on IoT Trust Model Frameworks},
author = {Davide Ferraris and Carmen Fernandez-Gago and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/surveyIoTrust2023.pdf},
doi = {10.1007/s11227-023-05765-4},
year = {2023},
date = {2023-11-17},
urldate = {2023-11-17},
journal = {The Journal of Supercomputing},
abstract = {Trust can be considered as a multidisciplinary concept, which is strongly related to the context and it falls in different fields such as Philosophy, Psychology or Computer Science. Trust is fundamental in every relationship, because without it, an entity will not interact with other entities. This aspect is very important especially in the Internet of Things (IoT), where many entities produced by different vendors and created for different purposes have to interact among them through the internet often under uncertainty. Trust can overcome this uncertainty, creating a strong basis to ease the process of interaction among these entities. We believe that considering trust in the IoT is fundamental, and in order to implement it in any IoT entity, it is fundamental to consider it through the whole System Development Life Cycle. In this paper, we propose an analysis of different works that consider trust for the IoT. We will focus especially on the analysis of frameworks that have been developed in order to include trust in the IoT. We will make a classification of them providing a set of parameters that we believe are fundamental in order to properly consider trust in the IoT. Thus, we will identify important aspects to be taken into consideration when developing frameworks that implement trust in the IoT, finding gaps and proposing possible solutions.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Daniel Morales, Isaac Agudo, Javier Lopez
Integration of MPC into Besu through an extended private transaction model Proceedings Article
In: IEEE International Conference on Metaverse Computing, Networking and Applications, pp. 266-273, IEEE Computer Society IEEE, Kyoto, Japan, 2023.
@inproceedings{morales2023metacom,
title = {Integration of MPC into Besu through an extended private transaction model},
author = {Daniel Morales and Isaac Agudo and Javier Lopez},
url = {/wp-content/papers/morales2023metacom.pdf},
doi = {10.1109/MetaCom57706.2023.00056},
year = {2023},
date = {2023-06-01},
urldate = {2023-06-01},
booktitle = {IEEE International Conference on Metaverse Computing, Networking and Applications},
pages = {266-273},
publisher = {IEEE},
address = {Kyoto, Japan},
organization = {IEEE Computer Society},
abstract = {In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds, but there are other applications where privacy is even more important, especially in permissioned blockchains.
Permissioned blockchain platforms, such as Hyperledger Besu or Hyperledger Fabric, already include the concept of private transactions, which essentially defines a sub-group of the blockchain where their participants share some private data.
We want to go one step ahead and propose an extended model for private transactions where the different participants can have a separated view of the same transaction, allowing the integration of Multi-party Computation protocols in the blockchain.
Our work extends Hyperledger Besu’s design for private transactions, offering better security properties and a finer grain customization. We cover two specific MPC examples, Private Set Intersection and Byzantine Fault-Tolerant Random Number Generation, and propose a mechanism to run them using smart contract interfaces.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Permissioned blockchain platforms, such as Hyperledger Besu or Hyperledger Fabric, already include the concept of private transactions, which essentially defines a sub-group of the blockchain where their participants share some private data.
We want to go one step ahead and propose an extended model for private transactions where the different participants can have a separated view of the same transaction, allowing the integration of Multi-party Computation protocols in the blockchain.
Our work extends Hyperledger Besu’s design for private transactions, offering better security properties and a finer grain customization. We cover two specific MPC examples, Private Set Intersection and Byzantine Fault-Tolerant Random Number Generation, and propose a mechanism to run them using smart contract interfaces.
Cristina Alcaraz, Jesus Cumplido, Alicia Triviño
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0 Journal Article
In: International Journal of Information Security, 2023, ISSN: 1615-5262.
@article{Alcaraz2023b,
title = {OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0},
author = {Cristina Alcaraz and Jesus Cumplido and Alicia Trivi\~{n}o},
url = {/wp-content/papers/Alcaraz2023b.pdf
https://link.springer.com/article/10.1007/s10207-023-00698-8},
doi = {10.1007/s10207-023-00698-8},
issn = {1615-5262},
year = {2023},
date = {2023-05-05},
urldate = {2023-05-05},
journal = {International Journal of Information Security},
publisher = {Springer},
address = {Springer Verlag},
abstract = {Undoubtedly, Industry 4.0 in the energy sector improves the conditions for automation, generation and distribution of energy, increasing the rate of electric vehicle manufacturing in recent years. As a result, more grid-connected charging infrastructures are being installed, whose charging stations (CSs) can follow standardized architectures, such as the one proposed by the open charge point protocol (OCPP). The most recent version of this protocol is v.2.0.1, which includes new security measures at device and communication level to cover those security issues identified in previous versions. Therefore, this paper analyzes OCPP-v2.0.1 to determine whether the new functions may still be susceptible to specific cyber and physical threats, and especially when CSs may be connected to microgrids. To formalize the study, we first adapted the well-known threat analysis methodology, STRIDE, to identify and classify threats in terms of control and energy, and subsequently we combine it with DREAD for risk assessment. The analyses indicate that, although OCPP-v2.0.1 has evolved, potential security risks still remain, requiring greater protection in the future.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Daniel Morales, Isaac Agudo, Javier Lopez
Private set intersection: A systematic literature review Journal Article
In: Computer Science Review, vol. 49, no. 100567, 2023, ISSN: 1574-0137.
@article{morales2023psi,
title = {Private set intersection: A systematic literature review},
author = {Daniel Morales and Isaac Agudo and Javier Lopez},
url = {/wp-content/papers/morales2023psi.pdf
https://www.sciencedirect.com/science/article/pii/S1574013723000345},
doi = {10.1016/j.cosrev.2023.100567},
issn = {1574-0137},
year = {2023},
date = {2023-05-01},
urldate = {2023-05-01},
journal = {Computer Science Review},
volume = {49},
number = {100567},
publisher = {Elsevier},
address = {ScienceDirect},
abstract = {Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute a function on their private inputs, obtaining the output at the end and nothing more. In this work, we focus on a particular SMPC problem named Private Set Intersection (PSI). The challenge in PSI is how two or more parties can compute the intersection of their private input sets, while the elements that are not in the intersection remain private. This problem has attracted the attention of many researchers because of its wide variety of applications, contributing to the proliferation of many different approaches. Despite that, current PSI protocols still require heavy cryptographic assumptions that may be unrealistic in some scenarios. In this paper, we perform a Systematic Literature Review of PSI solutions, with the objective of analyzing the main scenarios where PSI has been studied and giving the reader a general taxonomy of the problem together with a general understanding of the most common tools used to solve it. We also analyze the performance using different metrics, trying to determine if PSI is mature enough to be used in realistic scenarios, identifying the pros and cons of each protocol and the remaining open problems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Kouichi Sakurai
Current Perspectives on Securing Critical Infrastructures’ Supply Chains Journal Article
In: IEEE Security & Privacy, vol. 21, no. 4, pp. 29-38, 2023, ISSN: 1540-7993.
BibTeX | Links:
@article{Roman2023a,
title = {Current Perspectives on Securing Critical Infrastructures’ Supply Chains},
author = {Rodrigo Roman and Cristina Alcaraz and Javier Lopez and Kouichi Sakurai},
url = {/wp-content/papers/Roman2023a.pdf},
doi = {10.1109/MSEC.2023.3247946},
issn = {1540-7993},
year = {2023},
date = {2023-03-08},
urldate = {2023-03-08},
journal = {IEEE Security \& Privacy},
volume = {21},
number = {4},
pages = {29-38},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Antonio Muñoz, Ruben Rios, Rodrigo Roman, Javier Lopez
A survey on the (in)security of Trusted Execution Environments Journal Article
In: Computers & Security, pp. 103-180, 2023, ISSN: 0167-4048.
@article{MUNOZ2023103180,
title = {A survey on the (in)security of Trusted Execution Environments},
author = {Antonio Mu\~{n}oz and Ruben Rios and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/MUNOZ2023103180.pdf
https://www.sciencedirect.com/science/article/pii/S0167404823000901},
doi = {10.1016/j.cose.2023.103180},
issn = {0167-4048},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
journal = {Computers \& Security},
pages = {103-180},
publisher = {Elsevier},
address = {In Press},
abstract = {As the number of security and privacy attacks continue to grow around the world, there is an ever increasing need to protect our personal devices. As a matter of fact, more and more manufactures are relying on Trusted Execution Environments (TEEs) to shield their devices. In particular, ARM TrustZone (TZ) is being widely used in numerous embedded devices, especially smartphones, and this technology is the basis for secure solutions both in industry and academia. However, as shown in this paper, TEE is not bullet-proof and it has been successfully attacked numerous times and in very different ways. To raise awareness among potential stakeholders interested in this technology, this paper provides an extensive analysis and categorization of existing vulnerabilities in TEEs and highlights the design flaws that led to them. The presented vulnerabilities, which are not only extracted from existing literature but also from publicly available exploits and databases, are accompanied by some effective countermeasures to reduce the likelihood of new attacks. The paper ends with some appealing challenges and open issues.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Antonio Muñoz, Carmen Fernandez-Gago, Roberto Lopez-Villa
A Test Environment for Wireless Hacking in Domestic IoT Scenarios Journal Article
In: Mobile Networks and Applications, 2022, ISSN: 1383-469X.
BibTeX | Links:
@article{munoz2022,
title = {A Test Environment for Wireless Hacking in Domestic IoT Scenarios},
author = {Antonio Mu\~{n}oz and Carmen Fernandez-Gago and Roberto Lopez-Villa},
url = {/wp-content/papers/munoz2022.pdf},
doi = {10.1007/s11036-022-02046-x},
issn = {1383-469X},
year = {2022},
date = {2022-10-01},
urldate = {2022-10-01},
journal = {Mobile Networks and Applications},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Jesus Cumplido, Cristina Alcaraz, Javier Lopez
Collaborative anomaly detection system for charging stations Proceedings Article
In: The 27th European Symposium on Research in Computer Security (ESORICS 2022), pp. 716–736, Springer, Cham Springer, Cham, 2022.
@inproceedings{Alcaraz2022c,
title = {Collaborative anomaly detection system for charging stations},
author = {Jesus Cumplido and Cristina Alcaraz and Javier Lopez},
url = {/wp-content/papers/Alcaraz2022c.pdf},
doi = {10.1007/978-3-031-17146-8_35},
year = {2022},
date = {2022-09-01},
urldate = {2022-09-01},
booktitle = {The 27th European Symposium on Research in Computer Security (ESORICS 2022)},
volume = {13555},
pages = {716\textendash736},
publisher = {Springer, Cham},
organization = {Springer, Cham},
abstract = {In recent years, the deployment of charging infrastructures has been increasing exponentially due to the high energy demand of electric vehicles, forming complex charging networks. These networks pave the way for the emergence of new unknown threats in both the energy and transportation sectors. Economic damages and energy theft are the most frequent risks in these environments. Thus, this paper aims to present a solution capable of accurately detecting unforeseen events and possible fraud threats that arise during charging sessions at charging stations through the current capabilities of the Machine Learning (ML) algorithms. However, these algorithms have the drawback of not fitting well in large networks and generating a high number of false positives and negatives, mainly due to the mismatch with the distribution of data over time. For that reason, a Collaborative Anomaly Detection System for Charging Stations (here referred to as CADS4CS) is proposed as an optimization measure. CADS4CS has a central analysis unit that coordinates a group of independent anomaly detection systems to provide greater accuracy using a voting algorithm. In addition, CADS4CS has the feature of continuously retraining ML models in a collaborative manner to ensure that they are adjusted to the distribution of the data. To validate the approach, different use cases and practical studies are addressed to demonstrate the effectiveness and efficiency of the solution.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamá, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz, Christos Xenakis
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform Journal Article
In: SENSORS, vol. 22, iss. 6527, no. 17, 2022, ISSN: 1424-8220.
@article{suciu2022samgrid,
title = {SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform},
author = {George Suciu and Aristeidis Farao and Giorgio Bernardinetti and Ivan Palam\'{a} and Mari-Anais Sachian and Alexandru Vulpe and Marius-Constantin Vochin and Pavel Muresan and Michail Bampatsikos and Antonio Mu\~{n}oz and Christos Xenakis},
url = {/wp-content/papers/suciu2022samgrid.pdf
https://www.mdpi.com/1424-8220/22/17/6527},
doi = {10.3390/s22176527},
issn = {1424-8220},
year = {2022},
date = {2022-08-30},
urldate = {2022-08-30},
journal = {SENSORS},
volume = {22},
number = {17},
issue = {6527},
abstract = {IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents a hierarchical architecture composed of different licensing entities that manage access to different resources within a network infrastructure. They are conducted on the basis of well-drawn policy rules. At the same time, the security side of these resources is also placed through a context awareness module. Together with this technology, IoT is used and Blockchain is enabled (for network consolidation, as well as the transparency with which to monitor the platform). The ultimate goal is to implement a secure and scalable security platform for the Smart Grid. The paper presents the work undertaken in the SealedGRID project and the steps taken for implementing security policies specifically tailored to the Smart Grid, based on advanced concepts such as Opinion Dynamics and Smart Grid-related Attribute-based Access Control.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Luca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz
Configuration vulnerability in SNORT for Windows operating systems Proceedings Article
In: 2022 IEEE International Conference on Cyber Security and Resilience (IEEE CSR), pp. 82-89, IEEE IEEE, https://www.ieee-csr.org, 2022, ISBN: 978-1-6654-9952-1.
@inproceedings{1990,
title = {Configuration vulnerability in SNORT for Windows operating systems},
author = {Luca Faramondi and Marta Grassi and Simone Guarino and Roberto Setola and Cristina Alcaraz},
url = {https://ieeexplore.ieee.org/document/9850309},
doi = {10.1109/CSR54599.2022.9850309},
isbn = {978-1-6654-9952-1},
year = {2022},
date = {2022-08-01},
urldate = {2022-08-01},
booktitle = {2022 IEEE International Conference on Cyber Security and Resilience (IEEE CSR)},
pages = {82-89},
publisher = {IEEE},
address = {https://www.ieee-csr.org},
organization = {IEEE},
abstract = {Cyber-attacks against Industrial Control Systems (ICS) can lead to catastrophic events which can be prevented by the use of security measures such as the Intrusion Prevention Systems (IPS). In this work we experimentally demonstrate how to exploit the configuration vulnerabilities of SNORT one of the most adopted IPSs to significantly degrade the effectiveness of the IPS and consequently allowing successful cyber-attacks. We illustrate how to design a batch script able to retrieve and modify the configuration files of SNORT in order to disable its ability to detect and block Denial of Service (DoS) and ARP poisoning-based Man-In-The-Middle (MITM) attacks against a Programmable Logic Controller (PLC) in an ICS network. Experimental tests performed on a water distribution testbed show that, despite the presence of IPS, the DoS and ARP spoofed packets reach the destination causing respectively the disconnection of the PLC from the ICS network and the modification of packets payload.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Daniel Morales, Isaac Agudo, Javier Lopez
Real-time Crowd Counting based on Wearable Ephemeral IDs Proceedings Article
In: 19th International Conference on Security and Cryptography (SECRYPT 2022), pp. 249-260, Scitepress Scitepress, Lisbon, 2022, ISSN: 2184-7711.
@inproceedings{morales2022cc,
title = {Real-time Crowd Counting based on Wearable Ephemeral IDs},
author = {Daniel Morales and Isaac Agudo and Javier Lopez},
url = {/wp-content/papers/morales2022cc.pdf},
doi = {10.5220/0011327200003283},
issn = {2184-7711},
year = {2022},
date = {2022-07-01},
urldate = {2022-07-01},
booktitle = {19th International Conference on Security and Cryptography (SECRYPT 2022)},
pages = {249-260},
publisher = {Scitepress},
address = {Lisbon},
organization = {Scitepress},
abstract = {Crowd Counting is a very interesting problem aiming at counting people typically based on density averages and/or aerial images. This is very useful to prevent crowd crushes, especially on urban environments with high crowd density, or to count people in public demonstrations. In addition, in the last years, it has become of paramount importance for pandemic management. For those reasons, giving users automatic mechanisms to anticipate high risk situations is essential. In this work, we analyze ID-based Crowd Counting, and propose a real-time Crowd Counting system based on the Ephemeral ID broadcast by contact tracing applications on wearable devices. We also performed some simulations that show the accuracy of our system in different situations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Verification and Validation Methods for a Trust-by-Design Framework for the IoT Proceedings Article
In: 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’22), pp. 183-194, Springer Springer, Newark, NJ, USA, 2022, ISBN: 978-3-031-10683-5.
BibTeX | Links:
@inproceedings{1981,
title = {Verification and Validation Methods for a Trust-by-Design Framework for the IoT},
author = {Davide Ferraris and Carmen Fernandez-Gago and Javier Lopez},
url = {/wp-content/papers/1981.pdf
https://link.springer.com/chapter/10.1007/978-3-031-10684-2_11, },
doi = {10.1007/978-3-031-10684-2_11},
isbn = {978-3-031-10683-5},
year = {2022},
date = {2022-07-01},
urldate = {2022-07-01},
booktitle = {36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’22)},
volume = {13383},
pages = {183-194},
publisher = {Springer},
address = {Newark, NJ, USA},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Davide Ferraris, Carmen Fernandez-Gago, Javier Lopez
Novel Approaches for the Development of Trusted IoT Entities Proceedings Article
In: 37th International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2022, pp. 215-230, Springer Springer, Copenhagen, 2022, ISSN: 1868-4238.
BibTeX | Links:
@inproceedings{1980,
title = {Novel Approaches for the Development of Trusted IoT Entities},
author = {Davide Ferraris and Carmen Fernandez-Gago and Javier Lopez},
url = {/wp-content/papers/1980.pdf
https://link.springer.com/content/pdf/10.1007%2F978-3-031-06975-8_13, },
doi = {10.1007/978-3-031-06975-8},
issn = {1868-4238},
year = {2022},
date = {2022-06-01},
urldate = {2022-06-01},
booktitle = {37th International Conference on ICT Systems Security and Privacy Protection \textendash IFIP SEC 2022},
pages = {215-230},
publisher = {Springer},
address = {Copenhagen},
organization = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou
Classifying resilience approaches for protecting smart grids against cyber threats Journal Article
In: International Journal of Information Security, vol. 21, pp. 1189–1210, 2022, ISSN: 1615-5262.
@article{Syrmakesis2022,
title = {Classifying resilience approaches for protecting smart grids against cyber threats},
author = {Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D. Hatziargyriou},
url = {/wp-content/papers/Syrmakesis2022.pdf
https://link.springer.com/content/pdf/10.1007/s10207-022-00594-7.pdf},
doi = {https://doi.org/10.1007/s10207-022-00594-7},
issn = {1615-5262},
year = {2022},
date = {2022-05-01},
urldate = {2022-05-01},
journal = {International Journal of Information Security},
volume = {21},
pages = {1189\textendash1210},
publisher = {Springer},
address = {Springer Verlag},
abstract = {Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature. While preventing or detecting cyber attacks is a well-studied field of research, making SG more resilient against such threats is a challenging task. This paper provides a classification of the proposed cyber resilience methods against cyber attacks for SG. This classification includes a set of studies that propose cyber-resilient approaches to protect SG and related cyber-physical systems against unforeseen anomalies or deliberate attacks. Each study is briefly analyzed and is associated with the proper cyber resilience technique which is given by the National Institute of Standards and Technology in the Special Publication 800-160. These techniques are also linked to the different states of the typical resilience curve. Consequently, this paper highlights the most critical challenges for achieving cyber resilience, reveals significant cyber resilience aspects that have not been sufficiently considered yet and, finally, proposes scientific areas that should be further researched in order to enhance the cyber resilience of SG.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martin Ochoa
Constrained Proximity Attacks on Mobile Targets Journal Article
In: ACM Transactions on Privacy and Security (TOPS), vol. 25, no. 10, pp. 1 - 29, 2022, ISSN: 2471-2566.
@article{rios2022cpa,
title = {Constrained Proximity Attacks on Mobile Targets},
author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Martin Ochoa},
url = {/wp-content/papers/rios2022cpa.pdf},
doi = {10.1145/3498543},
issn = {2471-2566},
year = {2022},
date = {2022-05-01},
urldate = {2022-05-01},
journal = {ACM Transactions on Privacy and Security (TOPS)},
volume = {25},
number = {10},
pages = {1 - 29},
publisher = {Association for Computer Machinery (ACM)},
abstract = {Proximity attacks allow an adversary to uncover the location of a victim by repeatedly issuing queries with fake location data. These attacks have been mostly studied in scenarios where victims remain static and there are no constraints that limit the actions of the attacker. In such a setting, it is not difficult for the attacker to locate a particular victim and quantifying the effort for doing so is straightforward. However, it is far more realistic to consider scenarios where potential victims present a particular mobility pattern. In this paper, we consider abstract (constrained and unconstrained) attacks on services that provide location information on other users in the proximity. We derive strategies for constrained and unconstrained attackers, and show that when unconstrained they can practically achieve success with theoretically optimal effort. We then propose a simple yet effective constraint that may be employed by a proximity service (for example, running in the cloud or using a suitable two-party protocol) as countermeasure to increase the effort for the attacker several orders of magnitude both in simulated and real-world cases.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Cristina Alcaraz, Javier Lopez
Digital Twin: A Comprehensive Survey of Security Threats Journal Article
In: IEEE Communications Surveys & Tutorials, vol. 24, no. thirdquarter 2022, pp. 1475 - 1503, 2022, ISSN: 1553-877X.
@article{Alcaraz2022b,
title = {Digital Twin: A Comprehensive Survey of Security Threats},
author = {Cristina Alcaraz and Javier Lopez},
url = {/wp-content/papers/Alcaraz2022b.pdf
https://ieeexplore.ieee.org/document/9765576},
doi = {10.1109/COMST.2022.3171465},
issn = {1553-877X},
year = {2022},
date = {2022-04-01},
urldate = {2022-04-01},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {24},
number = {thirdquarter 2022},
pages = {1475 - 1503},
publisher = {IEEE},
address = {IEEE},
abstract = {Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and optimizing the production and distribution processes. In this streamline, the digital twin (DT) is one of the most cutting-edge technologies of Industry 4.0, providing simulation capabilities to forecast, optimize and estimate states and configurations. In turn, these technological capabilities are encouraging industrial stakeholders to invest in the new paradigm, though an increased focus on the risks involved is really needed. More precisely, the deployment of a DT is based on the composition of technologies such as cyber-physical systems, the Industrial Internet of Things, edge computing, virtualization infrastructures, artificial intelligence and big data. However, the confluence of all these technologies and the implicit interaction with the physical counterpart of the DT in the real world generate multiple security threats that have not yet been sufficiently studied. In that context, this paper analyzes the current state of the DT paradigm and classifies the potential threats associated with it, taking into consideration its functionality layers and the operational requirements in order to achieve a more complete and useful classification. We also provide a preliminary set of security recommendations and approaches that can help to ensure the appropriate and trustworthy use of a DT.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai
Learning multi-party adversarial encryption and its application to secret sharing Journal Article
In: IEEE Access, 2022, ISSN: 2169-3536.
@article{ishak22,
title = {Learning multi-party adversarial encryption and its application to secret sharing},
author = {Ishak Meraouche and Sabyasachi Dutta and Sraban Kumar Mohanty and Isaac Agudo and Kouichi Sakurai},
url = {/wp-content/papers/ishak22.pdf},
doi = {10.1109/ACCESS.2022.3223430},
issn = {2169-3536},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {IEEE Access},
publisher = {IEEE},
abstract = {Neural networks based cryptography has seen a significant growth since the introduction of adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to build neural networks that can learn encryption. The encryption has been proven weak at first but many follow up works have shown that the neural networks can be made to learn the One Time Pad (OTP) and produce perfectly secure ciphertexts. To the best of our knowledge, existing works only considered communications between two or three parties. In this paper, we show how multiple neural networks in an adversarial setup can remotely synchronize and establish a perfectly secure communication in the presence of different attackers eavesdropping their communication. As an application, we show how to build Secret Sharing Scheme based on this perfectly secure multi-party communication. The results show that it takes around 45,000 training steps for 4 neural networks to synchronize and reach equilibria. When reaching equilibria, all the neural networks are able to communicate between each other and the attackers are not able to break the ciphertexts exchanged between them.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Ruben Rios, Jose A. Onieva, Rodrigo Roman, Javier Lopez
Personal IoT Privacy Control at the Edge Journal Article
In: IEEE Security & Privacy, vol. 20, pp. 23 - 32, 2022, ISSN: 1540-7993.
@article{rios2022pmec,
title = {Personal IoT Privacy Control at the Edge},
author = {Ruben Rios and Jose A. Onieva and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/rios2022pmec.pdf},
doi = {10.1109/MSEC.2021.3101865},
issn = {1540-7993},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {IEEE Security \& Privacy},
volume = {20},
pages = {23 - 32},
publisher = {IEEE},
abstract = {This article introduces a privacy manager for IoT data based on Edge Computing. This poses the advantage that privacy is enforced before data leaves the control of the user, who is provided with a tool to express data sharing preferences based on a novel context-aware privacy language.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Francesco Flammini, Cristina Alcaraz, Emanuele Bellini, Stefano Marrone, Javier Lopez, Andrea Bondavalli
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives Journal Article
In: IEEE Transactions on Emerging Topics in Computing, 2022, ISSN: 2168-6750.
@article{Flamini2022,
title = {Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives},
author = {Francesco Flammini and Cristina Alcaraz and Emanuele Bellini and Stefano Marrone and Javier Lopez and Andrea Bondavalli},
url = {/wp-content/papers/Flamini2022.pdf
https://ieeexplore.ieee.org/abstract/document/9979717/authors$#$authors},
doi = {10.1109/TETC.2022.3227113},
issn = {2168-6750},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {IEEE Transactions on Emerging Topics in Computing},
publisher = {IEEE},
abstract = {The class of Trustworthy Autonomous Systems (TAS) includes cyber-physical systems leveraging on self-x technologies that make them capable to learn, adapt to changes, and reason under uncertainties in possibly critical applications and evolving environments. In the last decade, there has been a growing interest in enabling artificial intelligence technologies, such as advanced machine learning, new threats, such as adversarial attacks, and certification challenges, due to the lack of sufficient explainability. However, in order to be trustworthy, those systems also need to be dependable, secure, and resilient according to well-established taxonomies, methodologies, and tools. Therefore, several aspects need to be addressed for TAS, ranging from proper taxonomic classification to the identification of research opportunities and challenges. Given such a context, in this paper address relevant taxonomies and research perspectives in the field of TAS. We start from basic definitions and move towards future perspectives, regulations, and emerging technologies supporting development and operation of TAS.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}