12 research outputs found

    The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions

    Full text link
    In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.Comment: 23 pages, 16 figures, 3 table

    On the Feasibility of Profiling Electric Vehicles through Charging Data

    Full text link
    Electric vehicles (EVs) represent the long-term green substitute for traditional fuel-based vehicles. To encourage EV adoption, the trust of the end-users must be assured. In this work, we focus on a recently emerging privacy threat of profiling and identifying EVs via the analog electrical data exchanged during the EV charging process. The core focus of our work is to investigate the feasibility of such a threat at scale. To this end, we first propose an improved EV profiling approach that outperforms the state-of-the-art EV profiling techniques. Next, we exhaustively evaluate the performance of our improved approach to profile EVs in real-world settings. In our evaluations, we conduct a series of experiments including 25032 charging sessions from 530 real EVs, sub-sampled datasets with different data distributions, etc. Our results show that even with our improved approach, profiling and individually identifying the growing number of EVs is not viable in practice; at least with the analog charging data utilized throughout the literature. We believe that our findings from this work will further foster the trust of potential users in the EV ecosystem, and consequently, encourage EV adoption.Comment: This is an extended version of our paper in VehicleSec 2023 (co-located with NDSS Symposium 2023), San Diego, C

    A Survey of Layer-Two Blockchain Protocols

    Full text link
    After the success of the Bitcoin blockchain, came several cryptocurrencies and blockchain solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low transaction rates and high transaction processing latencies, which hinder blockchains' scalability. An entire class of solutions, called Layer-1 scalability solutions, have attempted to incrementally improve such limitations by adding/modifying fundamental blockchain attributes. Recently, a completely different class of works, called Layer-2 protocols, have emerged to tackle the blockchain scalability issues using unconventional approaches. Layer-2 protocols improve transaction processing rates, periods, and fees by minimizing the use of underlying slow and costly blockchains. In fact, the main chain acts just as an instrument for trust establishment and dispute resolution among Layer-2 participants, where only a few transactions are dispatched to the main chain. Thus, Layer-2 blockchain protocols have the potential to transform the domain. However, rapid and discrete developments have resulted in diverse branches of Layer-2 protocols. In this work, we systematically create a broad taxonomy of such protocols and implementations. We discuss each Layer-2 protocol class in detail and also elucidate their respective approaches, salient features, requirements, etc. Moreover, we outline the issues related to these protocols along with a comparative discussion. Our thorough study will help further systematize the knowledge dispersed in the domain and help the readers to better understand the field of Layer-2 protocols.Comment: 21 pages, 15 figures, 2 table

    BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration

    Full text link
    Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetooth Low-Energy (BLE) variant aims at improving power consumption on battery-constrained devices. BLE-enabled devices broadcast information (e.g., as beacons) to nearby devices via advertisements. Unfortunately, such functionality can become a double-edged sword at the hands of attackers. In this paper, we primarily show how an attacker can exploit BLE advertisements to exfiltrate information from BLE-enable devices. In particular, our attack establishes a communication medium between two devices without requiring any prior authentication or pairing. We develop a proof-of-concept attack framework on the Android ecosystem and assess its performance via a thorough set of experiments. Our results indicate that such an exfiltration attack is indeed possible though with a low data rate. Nevertheless, we also demonstrate potential use cases and enhancements to our attack that can further its severeness. Finally, we discuss possible countermeasures to prevent such an attack.Comment: 20 pages, 6 figure

    Improving Password Guessing via Representation Learning

    Get PDF
    Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. In this paper, we introduce a deep generative model representation learning approach for password guessing. We show that an abstract password representation naturally offers compelling and versatile properties that can be used to open new directions in the extensively studied, and yet presently active, password guessing field. These properties can establish novel password generation techniques that are neither feasible nor practical with the existing probabilistic and non-probabilistic approaches. Based on these properties, we introduce:(1) A general framework for conditional password guessing that can generate passwords with arbitrary biases; and (2) an Expectation Maximization-inspired framework that can dynamically adapt the estimated password distribution to match the distribution of the attacked password set.Comment: This paper appears in the proceedings of the 42nd IEEE Symposium on Security and Privacy (Oakland) S&P 202

    Security and Privacy Implications of Cryptocurrencies

    Get PDF
    Le criptovalute sono valute digitali basate sulla crittografia. A differenza delle tradizionali valute legali emesse da sistemi bancari centralizzati, le criptovalute sono decentralizzate e mantenute attraverso meccanismi di consenso distribuito. Nel novembre 2008 Satoshi Nakamoto ha introdotto la prima criptovaluta veramente funzionale: il Bitcoin. Dopo alcuni anni passati nell’ombra, Bitcoin guadagnò rapidamente notorietà, creando un'economia da miliardi di dollari. Sull’onda del successo di Bitcoin il mercato ha visto nascere diverse altre criptovalute. A settembre 2019 si sono registrate più di 2500 criptovalute attive per un mercato di oltre 250 miliardi di Dollari e quasi 50 miliardi di Dollari di volume giornaliero. Ogni criptovaluta ha un funzionamento peculiare a seconda del proprio obiettivo: alcune si focalizzano sulla limitazione del numero di transazioni, altre sulle prestazioni. Ogni criptovaluta garantisce un certo livello di anonimato dell'utente. Al livello più basso, gli utenti rimangono pseudo-anonimi, ovvero le identità reali del pagatore e del beneficiario rimangono nascoste. I criminali informatici hanno sfruttato l'anonimato offerto dalle criptovalute per perpetrare vari reati, come il riciclaggio di denaro e il finanziamento del terrorismo. Questa tesi indaga sulle implicazioni di sicurezza e privacy delle criptovalute e si compone di tre parti che trattano di recenti ed importanti problematiche relative a: (i) Bitcoin; (ii) Algorand; e (iii) Cryptominers. Nella prima parte di questa tesi, studiamo due questioni relative al Bitcoin che rivestono un'importanza significativa in questa era di criptovalute. In particolare, ci concentriamo sull’aumento allarmante delle campagne ransomware e sui problemi di privacy relativi alle app di Bitcoin wallet per smartphone. Abbiamo quindi condotto uno studio completo e longitudinale sui recenti attacchi di ransomware e riportando l'impatto economico riscontrato sui pagamenti in Bitcoin. Abbiamo inoltre condotto un lavoro per l’identificazione di attività sensibili sulle app di Bitcoin wallet. Queste app sono comunemente utilizzate per l'invio, la ricezione e il trading di Bitcoin. La seconda parte di questa tesi si concentra su Algorand. Algorand è un protocollo di consenso blockchain democratico che ha il potenziale ridisegnare il futuro della tecnologia blockchain. Questo è il primo studio formale proposto per Algorand. Nella nostra analisi di sicurezza, presentiamo un attacco realmente attuabile su Algorand nonché possibili contromisure. Nella terza parte di questa tesi, esploriamo il covert cryptomining. La richiesta di cryptomining è aumentata drasticamente con la crescente popolarità delle criptovalute. Parallelamente alle legittime richieste di crittografia, la covert cryptomining è emersa come un mezzo per gli attori malintenzionati per ottenere incentivi finanziari. Le criptovalute come Monero hanno ulteriormente aggravato la situazione, consentendo anche agli utenti ingenui di effettuare cryptomining tramite un'applicazione browser. Considerando la gravità del problema, proponiamo due soluzioni efficienti per rilevare la covert cryptomining in diversi scenari realistici.Cryptocurrencies are cryptography-based digital currencies. In contrast to the traditional fiat currencies that are issued by centralized banking systems, cryptocurrencies are decentralized and maintained through distributed consensus mechanisms. The first truly functional cryptocurrency, i.e., Bitcoin, was introduced in November 2008 by Satoshi Nakamoto. Within a few years of its quiet launch, Bitcoin flourished to make a billion-dollar economy. After the massive success of Bitcoin, several other cryptocurrencies have been introduced to the market. As of September 2019, there are over 2500 active cryptocurrencies with more than 250 billion dollars total market capitalization and nearly 50 billion dollars daily volume. Different cryptocurrencies work differently and aim to achieve different goals, e.g., some cryptocurrencies focus on limiting transaction throughput while others concentrate on performance. However, each cryptocurrency ensures a certain level of user anonymity. At the lowest level, users remain pseudo-anonymous, i.e., the real identities of payer and payee remain obscure. Consequently, cybercriminals have exploited the anonymity offered by cryptocurrencies in various crimes, including money laundering and terror financing. Moreover, cryptocurrencies bring several other severe concerns. This thesis investigates the security and privacy implications of cryptocurrencies. This thesis is composed of three logical parts that focus on recently thriving, prominent, and severe concerns related to: (i) Bitcoin; (ii) Algorand; and(iii) Cryptominers. In the first part of this thesis, we investigate two issues related to Bitcoin that hold significant importance in this era of cryptocurrencies. In particular, we focus on alarmingly increasing ransomware campaigns and the privacy concerns related to smartphone-based Bitcoin wallet apps. For the former, we present our comprehensive and longitudinal study on the recent ransomware attacks and report the economic impact of such ransomware from the Bitcoin payment perspective. For the latter, we present our work on identifying sensitive user activities on Bitcoin wallet apps that are commonly used for sending, receiving, and trading Bitcoin. The second part of this thesis focuses on Algorand. Algorand is a truly democratic blockchain consensus protocol that has the potential to shape the future of blockchain technology. To the best of our knowledge, it is the first formal study on Algorand. In our security analysis, we propose a practically feasible attack on Algorand and its possible countermeasures. In the third part of this thesis, we explore covert cryptomining. The demand for cryptomining has increased drastically with the increasing popularity of cryptocurrencies. In parallel to legitimate cryptomining demands, covert cryptomining has emerged as a utility for malicious actors to gain financial incentives. Cryptocurrencies, such as Monero, have further aggravated the situation by enabling even naive users to mine via a browser application. Considering the severity of the issue, we propose two efficient solutions to detect covert cryptomining under different real-world scenarios

    A Comprehensive and Effective Mechanism for DDoS Detection in SDN

    No full text

    On the economic significance of ransomware campaigns: A Bitcoin transactions perspective

    No full text
    Bitcoin cryptocurrency system enables users to transact securely and pseudo-anonymously by using an arbitrary number of aliases (Bitcoin addresses). Cybercriminals exploit these characteristics to commit immutable and presumably untraceable monetary fraud, especially via ransomware; a type of malware that encrypts files of the infected system and demands ransom for decryption. In this paper, we present our comprehensive study on all recent ransomware and report the economic impact of such ransomware from the Bitcoin payment perspective. We also present a lightweight framework to identify, collect, and analyze Bitcoin addresses managed by the same user or group of users (cybercriminals, in this case), which includes a novel approach for classifying a payment as ransom. To verify the correctness of our framework, we compared our findings on CryptoLocker ransomware with the results presented in the literature. Our results align with the results found in the previous works except for the final valuation in USD. The reason for this discrepancy is that we used the average Bitcoin price on the day of each ransom payment whereas the authors of the previous studies used the Bitcoin price on the day of their evaluation. Furthermore, for each investigated ransomware, we provide a holistic view of its genesis, development, the process of infection and execution, and characteristic of ransom demands. Finally, we also release our dataset that contains a detailed transaction history of all the Bitcoin addresses we identified for each ransomware.Comment: 24 page

    Panorama: Real-time bird's eye view of an OpenFlow network

    No full text
    corecore