Category: Publications

Home / Publications
Post

Towards Reverse Engineering Reversible Logic

Samah Mohamed Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one mapping; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in...

Post

A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks

Zhiheng Xu and Quanyan Zhu To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the...

Post

Electric power dependent dynamic tariffs for water distribution systems

Varghese Kurian, Juntao Chen and Quanyan Zhu Peak time water demands cause significant burden to the utility providers in terms of pumping loads. Its coincidence with the peak hours of electricity consumption makes the situation worse. In this paper, we bring forth the requirement as well as the viability of implementing time-varying tariffs in the ‘smart...

Post

Optimizing Mission Critical Data Dissemination in Massive IoT Networks

Muhammad Junaid Farooq , Hesham ElSawy , Quanyan Zhu  and Mohamed-Slim Alouini. Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching...

Post

Physical Intrusion Games – Optimizing Surveillance by Simulation and Game Theory

Stefan Rass , Ali Alshawish , Mohamed Amine Abid , Stefan Schauer , Quanyan Zhu and Hermann de Meer. The protection of cyber-physical networks is a topic of increasing importance. The evolution of IT (cyber) systems that control and supervise the underlying physical system has grown over decades, whereas security has not become a concern until quite recently. Advanced persistent threats (APTs) have proven to...

Post

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems

Aditi Roy, Nasir Memon and Arun Ross This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the...

Post

X-Platform Phishing: Abusing Trust for Targeted Attacks

Hossein Siadati, Toan Nguyen and Nasir D. Memon Anti-phishing techniques intended to reduce the delivery rate of phishing emails, and anti-phishing trainings meant to decrease the phishing click-through rates. This paper presents the X-Platform Phishing Attack, a deceptive phishing attack with an alarmingly high delivery and click-through rates, and highlights a subset of the challenges...

Post

Tools for Automated Analysis of Cybercriminal Markets

Sadia Afroz, Rebecca Sorla Portnoff, Greg Durrett, Jonathan Kummerfeld, Damon McCoy, Kirill Levchenko, and Vern Paxson Underground forums are widely used by criminals to buy and sell a host of stolen items, datasets, resources, and criminal services. These forums contain important resources for understanding cybercrime. However, the number of forums, their size, and the domain...

Post

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering

Nektarios Georgios Tsoutsos, Homer Gamil and Michail Maniatakos As 3D printing becomes more ubiquitous, traditional centralized process chains are transformed to a distributed manufacturing model, where each step of the process can be outsourced to different parties. Despite the countless benefits of this revolutionary technology, outsourcing parts of the process to potentially untrusted parties raises...

Post

Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism

Mohamed El Massad, Jun Zhang, Siddharth Garg, and Mahesh V. Tripunitara Chip designers outsource chip fabrication to external foundries, but at the risk of IP theft. Logic locking, a promising solution to mitigate this threat, adds extra logic gates (key gates) and inputs (key bits) to the chip so that it functions correctly only when...