Category: Publications

Home / Publications
Post

Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs

Tao Zhang and Quanyan Zhu Vehicular ad hoc network (VANET) is an enabling technology in modern transportation systems for providing safety and valuable information, and yet vulnerable to a number of attacks from passive eavesdropping to active interfering. Intrusion detection systems (IDSs) are important devices that can mitigate the threats by detecting malicious behaviors. Furthermore,...

Post

On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

Muhammad Junaid Farooq, Student Member, IEEE and Quanyan Zhu The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness...

Post

Optimal Active Social Network De-anonymization Using Information Thresholds

Farhad Shirani, Siddharth Garg and Elza Erkip. In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker’s website, and the attacker uses the victim’s browser history to query her social media activity for the purpose of de-anonymization using the...

Post

The Cyber and Critical Infrastructures Nexus: Interdependencies, Dependencies and Their Impacts on Public Services

Rae Zimmerman Critical infrastructures (CI) provide fundamental services in ways that are essential to the social and economic fabric of society. These infrastructures are apparently becoming increasingly interconnected with one another (Saidi et al. 2018: 1), and these interconnections appear in the form of interdependencies and dependencies. Information technologies or information and communications technologies (ICT)...

Post

A Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems

Fei Miao, Quanyan Zhu, Miroslav Pajic and George J. Pappas In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks. With the increasingly integrated properties of cyber-physical systems (CPS) today, security is a challenge for critical infrastructures. Though resilient control and...

Post

TERMinator Suite: Benchmarking Privacy-Preserving Architectures

Dimitris Mouris, Nektarios Georgios Tsoutsos, and Michail Maniatakos Security and privacy are fundamental objectives characterizing contemporary cloud computing. Despite the wide adoption of encryption for protecting data in transit and at rest, data in use remains unencrypted inside cloud processors and memories, as computation is not applicable on encrypted values. This limitation introduces security risks,...

Post

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Jeffrey Pawlick, Edward Colbert and Quanyan Zhu. Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool...

Post

Image Carving with Missing Headers and Missing Fragments

Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun and Nasir Memon Although some remarkable advancements have been made in image carving, even in the presence of fragmentation, existing methods are not effective when parts (fragments) of an image are missing. This paper addresses this problem and proposes a PRNU (Photo Response Non-Uniformity)-based image carving method....

Post

Evolution of Logic Locking

Muhammad Yasin and Ozgur Sinanoglu The globalization of integrated circuit (IC) supply chain and the emergence of threats, such as intellectual property (IP) piracy, reverse engineering, and hardware Trojans, have forced semiconductor companies to revisit the trust in the supply chain. Logic locking is emerging as a popular and effective countermeasure against these threats. Over...

Post

Seeded Graph Matching: Efficient Algorithms and Theoretical Guarantees

Farhad Shirani, Siddharth Garg, and Elza Erkip In this paper, a new information theoretic framework for graph matching is introduced. Using this framework, the graph isomorphism and seeded graph matching problems are studied. The maximum degree algorithm for graph isomorphism is analyzed and sufficient conditions for successful matching are rederived using type analysis. Furthermore, a...