Khaled Baqer, Danny Yuxing Huang, Damon McCoy, and Nicholas Weaver In this paper, we present an empirical study of a recent spam campaign (a “stress test”) that resulted in a DoS attack on Bitcoin. The goal of our investigation being to understand the methods spammers used and impact on Bitcoin users.
Category: Publications
Secure and resilient distributed machine learning under adversarial environments
Rui Zhang and Quanyan Zhu Machine learning algorithms, such as support vector machines (SVMs), neutral networks, and decision trees (DTs) have been widely used in data processing for estimation and detection. They can be used to classify samples based on a model built from training data. However, under the assumption that training and testing samples...
FACID: A trust-based collaborative decision framework for intrusion detection networks
Carol J. Fung and Quanyan Zhu Computer systems evolve to be more complex and vulnerable. Cyber attacks have also grown to be more sophisticated and harder to detect. Intrusion detection is the process of monitoring and identifying unauthorized system access or manipulation. It becomes increasingly difficult for a single intrusion detection system (IDS) to detect all...
Proposed NY Cybersecurity Regulation: A Giant Leap Backward?
Judith Germano Mid-November marked the end of the comment period for New York’s “first in nation” proposed cybersecurity legislation for financial institutions. As the hot topic of the day, many regulators and government officials have felt compelled to take a stand on cybersecurity. It seems counterintuitive to set out to protect constituents by inaction. But...
Guest Editorial: Special Issue on Secure and Trustworthy Computing
Ozgur Sinanoglu and Ramesh Karri There is a growing concern regarding the trustworthiness and reliability of the hardware underlying all information systems on which modern society is reliant. Trustworthy and reliable semiconductor supply chain, hardware components, and platforms are essential to all critical infrastructures including financial, healthcare, transportation, and energy.
FPGA Trust Zone: Incorporating trust and reliability into FPGA designs
Vinayaka Jyothi, Manasa Thoonoli, Richard Stern and Ramesh Karri This paper proposes a novel methodology FPGA Trust Zone (FTZ) to incorporate security into the design cycle to detect and isolate anomalies such as Hardware Trojans in the FPGA fabric. Anomalies are identified using violation to spatial correlation of process variation in FPGA fabric.
Hardware Trojans: Lessons Learned after One Decade of Research
Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mark Mohammad Tehranipoor Given the increasing complexity of modern electronics and the cost of fabrication, entities from around the globe have become more heavily involved in all phases of the electronics supply chain. In this environment, hardware Trojans (i.e., malicious modifications or inclusions made by untrusted third parties)...
Securing digital microfluidic biochips by randomizing checkpoints
Jack Tang, Ramesh Karri, Mohamed Ibrahim, and Krishnendu Chakrabarty Much progress has been made in digital microfluidic biochips (DMFB), with a great body of literature addressing low-cost, high-performance, and reliable operation. Despite this progress, security of DMFBs has not been adequately addressed. We present an analysis of a DMFB system prone to malicious modification of routes...
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users
Minhui Xue, Cameron Ballard, Kelvin Liu, Carson Nemelka, Yanqiu Wu, Keith Ross, and Haifeng Qian The recent growth of anonymous social network services — such as 4chan, Whisper, and Yik Yak — has brought online anonymity into the spotlight. For these services to function properly, the integrity of user anonymity must be preserved. If an...
What Is Cyber Collateral Damage? And Why Does It Matter?
Zachary K. Goldman and Sasha Romanosky What happens when the consequences of a cyberattack are not physical? What happens when a digital missile destroys or corrupts data in a manner that is not intended by the person launching a lawful cyberattack? Current legal and policy frameworks for assessing collateral damage do not squarely address the...