Skip to main content

Showing 1–50 of 70 results for author: Buchanan, W

.
  1. arXiv:2403.08701  [pdf, other

    cs.CR

    Review of Generative AI Methods in Cybersecurity

    Authors: Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras

    Abstract: Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more prevalent in everyday use. These advancements strengthen cybersecurity's defensive posture and open up new attack avenues for adversaries as well. Thi… ▽ More

    Submitted 19 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: 40 pages

  2. arXiv:2403.05275  [pdf, other

    cs.CR cs.CY

    vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election

    Authors: Se Elnour, William J Buchanan, Paul Keating, Mwrwan Abubakar, Sirag Elnour

    Abstract: The vSPACE experimental proof-of-concept (PoC) on the TrueElect[Anon][Creds] protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and ElectAnon protocols with the integration of AnonCreds SSI (Self-Sovereign Identity). Such a protocol PoC is situated within a Zero-Trust Architecture (ZTA) and leverages confidential computing, continuous authenticat… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2403.05271  [pdf, other

    cs.CR

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb

    Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification metho… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  4. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  5. arXiv:2401.07691  [pdf, other

    cs.CR

    Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode

    Authors: William J Buchanan, Sam Grierson, Daniel Uribe

    Abstract: Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could lead to privacy breaches of data protection laws. Along with this, there have been several recent data breaches related to the leak of DNA informatio… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  6. Astrobiological Potential of Venus Atmosphere Chemical Anomalies and Other Unexplained Cloud Properties

    Authors: Janusz J. Petkowski, Sara Seager, David H. Grinspoon, William Bains, Sukrit Ranjan, Paul B. Rimmer, Weston P. Buchanan, Rachana Agrawal, Rakesh Mogul, Christopher E. Carr

    Abstract: Long-standing unexplained Venus atmosphere observations and chemical anomalies point to unknown chemistry but also leave room for the possibility of life. The unexplained observations include several gases out of thermodynamic equilibrium (e.g. tens of ppm O2, the possible presence of PH3 and NH3, SO2 and H2O vertical abundance profiles), an unknown composition of large, lower cloud particles, and… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: Published in Astrobiology (in press); Partially based on the text of the Venus Life Finder Mission Study report (arXiv:2112.05153)

  7. arXiv:2401.04707  [pdf, other

    cs.CR

    RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  8. arXiv:2401.00215  [pdf, other

    math.NT math.AG

    On families of elliptic curves $E_{p,q}:y^2=x^3-pqx$ that intersect the same line $L_{a,b}:y=\frac{a}{b}x$ of rational slope

    Authors: Eldar Sultanow, Malik Amir, Anja Jeschke, Amir Darwish Tfiha, Madjid Tehrani, William J Buchanan

    Abstract: Let $p$ and $q$ be two distinct odd primes, $p<q$ and $E_{p,q}:y^2=x^3-pqx$ be an elliptic curve. Fix a line $L_{a.b}:y=\frac{a}{b}x$ where $a\in \mathbb{Z},b\in \mathbb{N}$ and $(a,b)=1$. We study sufficient conditions that $p$ and $q$ must satisfy so that there are infinitely many elliptic curves $E_{p,q}$ that intersect $L_{a,b}$.

    Submitted 8 June, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

    Comments: 16 pages, 7 figures

    MSC Class: 14H52

  9. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  10. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  11. arXiv:2310.04898  [pdf, other

    cs.CR

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl

    Abstract: Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Inte… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  12. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  13. arXiv:2308.15009  [pdf, ps, other

    cs.CR

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Authors: Sam Grierson, Konstantinos Chalkias, William J Buchanan, Leandros Maglaras

    Abstract: EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This pap… ▽ More

    Submitted 10 October, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  14. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  15. arXiv:2306.13727  [pdf, other

    quant-ph

    Enabling Quantum Cybersecurity Analytics in Botnet Detection: Stable Architecture and Speed-up through Tree Algorithms

    Authors: Madjid Tehrani, Eldar Sultanow, William J Buchanan, Malik Amir, Anja Jeschke, Raymond Chow, Mouad Lemoudden

    Abstract: For the first time, we enable the execution of hybrid machine learning methods on real quantum computers with 100 data samples and real-device-based simulations with 5,000 data samples, thereby outperforming the current state of research of Suryotrisongko and Musashi from 2022 who were dealing with 1,000 data samples and quantum simulators (pure software-based emulators) only. Additionally, we bea… ▽ More

    Submitted 31 July, 2023; v1 submitted 23 June, 2023; originally announced June 2023.

    Comments: 32 pages, 4 figures, 5 tables

    ACM Class: I.2

  16. arXiv:2305.18852  [pdf, other

    cs.CR

    Majority Voting Approach to Ransomware Detection

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 17 pages

  17. arXiv:2303.14785  [pdf, ps, other

    cs.CR

    Review of the NIST Light-weight Cryptography Finalists

    Authors: William J Buchanan, Leandros Maglaras

    Abstract: Since 2016, NIST has been assessing lightweight encryption methods, and, in 2022, NIST published the final 10: ASCON, Elephant, GIFT-COFB, Grain128-AEAD, ISAP, Photon-Beetle, Romulus, Sparkle, TinyJambu, and Xoodyak. At the time that the article was written, NISC announced ASCOn as the chosen method that will be published as NIST'S lightweight cryptography standard later in 2023. In this article,… ▽ More

    Submitted 28 March, 2023; v1 submitted 26 March, 2023; originally announced March 2023.

    Comments: 6 pages

  18. arXiv:2302.08498  [pdf

    cs.CR cs.LG

    An Omnidirectional Approach to Touch-based Continuous Authentication

    Authors: Peter Aaby, Mario Valerio Giuffrida, William J Buchanan, Zhiyuan Tan

    Abstract: This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often focus on gathering data, tuning classifiers, and enhancing performance by evaluating touch interactions in a sequence rather than independently. Howev… ▽ More

    Submitted 13 January, 2023; originally announced February 2023.

  19. Towards The Creation Of The Future Fish Farm

    Authors: Pavlos Papadopoulos, William J Buchanan, Sarwar Sayeed, Nikolaos Pitropakis

    Abstract: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake of protein attributed to seafood. Along with this, there are significant opportunities within the fish farming industry for economic development. Determinin… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Journal ref: Security and Safety, 3(4), 174-186 (2022)

  20. arXiv:2212.08035  [pdf, other

    cs.CR

    Hamming Distributions of Popular Perceptual Hashing Techniques

    Authors: Sean McKeown, William J Buchanan

    Abstract: Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechanism for facilitating detection, allowing for machines to approximately match visual features of an image or video in a robust manner. However, there d… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Journal ref: DFRWS (Digital Forensics Research Conference) EU 2023, 21-24 March 2023, Bonn, Germany

  21. arXiv:2212.03218  [pdf, other

    cs.CR

    Transforming EU Governance: The Digital Integration through EBSI and GLASS

    Authors: Dimitrios Kasimatis, William J Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel

    Abstract: Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital era offers a shift towards unique digital identifiers for each citizen, enabling a 'citizen wallet' for easier access to personal documents like acade… ▽ More

    Submitted 19 April, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

  22. arXiv:2211.11443  [pdf

    astro-ph.IM astro-ph.EP

    Venus Life Finder Habitability Mission: Motivation, Science Objectives, and Instrumentation

    Authors: Sara Seager, Janusz J. Petkowski, Christopher E. Carr, Sarag J. Saikia, Rachana Agrawal, Weston P. Buchanan, David H. Grinspoon, Monika U. Weber, Pete Klupar, Simon P. Worden, Iaroslav Iakubivskyi, Mihkel Pajusalu, Laila Kaasik

    Abstract: For over half a century, scientists have contemplated the potential existence of life within the clouds of Venus. Unknown chemistry leaves open the possibility that certain regions of the Venusian atmosphere are habitable. In situ atmospheric measurements with a suite of modern instruments can determine whether the cloud decks possess the characteristics needed to support life as we know it. The k… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: Based on the text of the Venus Life Finder Mission Study report (arXiv:2112.05153). Published in Aerospace as a part of the Special Issue "The Search for Signs of Life on Venus: Science Objectives and Mission Designs" (https://www.mdpi.com/journal/aerospace/special_issues/Search_Life_Venus_Science_Objectives_Mission_Designs). arXiv admin note: text overlap with arXiv:2112.05153

    Journal ref: Aerospace 2022, 9(11), 733

  23. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  24. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

    Authors: Simon R Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: Entropy. 2022; 24(10):1503

  25. arXiv:2208.05582  [pdf

    astro-ph.IM astro-ph.EP

    Mission Architecture to Characterize Habitability of Venus Cloud Layers via an Aerial Platform

    Authors: Rachana Agrawal, Weston P. Buchanan, Archit Arora, Athul P. Girija, Maxim de Jong, Sara Seager, Janusz J. Petkowski, Sarag J. Saikia, Christopher E. Carr, David H. Grinspoon, James M. Longuski

    Abstract: Venus is known for its extreme surface temperature and its sulfuric acid clouds. But the cloud layers on Venus have similar temperature and pressure conditions to those on the surface of Earth and are conjectured to be a possible habitat for microscopic life forms. We propose a mission concept to explore the clouds of Venus for up to 30 days to evaluate habitability and search for signs of life. T… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: Based on the text of the Venus Life Finder Mission Study report (arXiv:2112.05153). Published in Aerospace as a part of the Special Issue "The Search for Signs of Life on Venus: Science Objectives and Mission Designs" (https://www.mdpi.com/journal/aerospace/special_issues/Search_Life_Venus_Science_Objectives_Mission_Designs)

    Journal ref: Aerospace 9.7 (2022): 359

  26. arXiv:2208.05579  [pdf

    astro-ph.IM astro-ph.EP

    Aerial Platform Design Options for a Life-Finding Mission at Venus

    Authors: Weston P. Buchanan, Maxim de Jong, Rachana Agrawal, Janusz J. Petkowski, Archit Arora, Sarag J. Saikia, Sara Seager, James M. Longuski

    Abstract: Mounting evidence of chemical disequilibria in the Venusian atmosphere has heightened interest in the search for life within the planet's cloud decks. Balloon systems are currently considered to be the superior class of aerial platform for extended atmospheric sampling within the clouds, providing the highest ratio of science return to risk. Balloon-based aerial platform designs depend heavily on… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: Based on the text of the Venus Life Finder Mission Study report (arXiv:2112.05153). Published in Aerospace as a part of the Special Issue "The Search for Signs of Life on Venus: Science Objectives and Mission Designs" (https://www.mdpi.com/journal/aerospace/special_issues/Search_Life_Venus_Science_Objectives_Mission_Designs)

    Journal ref: Aerospace 9.7 (2022): 363

  27. arXiv:2208.05570  [pdf

    astro-ph.IM astro-ph.EP

    Venus Life Finder Missions Motivation and Summary

    Authors: Sara Seager, Janusz J. Petkowski, Christopher E. Carr, David H. Grinspoon, Bethany L. Ehlmann, Sarag J. Saikia, Rachana Agrawal, Weston P. Buchanan, Monika U. Weber, Richard French, Pete Klupar, Simon P. Worden, Darrel Baumgardner

    Abstract: Finding evidence of extraterrestrial life would be one of the most profound scientific discoveries ever made, advancing humanity into a new epoch of cosmic awareness. The Venus Life Finder (VLF) missions feature a series of three direct atmospheric probes designed to assess the habitability of the Venusian clouds and search for signs of life and life itself. The VLF missions are an astrobiology-fo… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: Based on the text of the Venus Life Finder Mission Study report (arXiv:2112.05153). Published in Aerospace as a part of the Special Issue "The Search for Signs of Life on Venus: Science Objectives and Mission Designs" (https://www.mdpi.com/journal/aerospace/special_issues/Search_Life_Venus_Science_Objectives_Mission_Designs)

    Journal ref: Aerospace 9.7 (2022): 385

  28. arXiv:2206.05229  [pdf, other

    cs.LG

    Measuring the Carbon Intensity of AI in Cloud Instances

    Authors: Jesse Dodge, Taylor Prewitt, Remi Tachet Des Combes, Erika Odmark, Roy Schwartz, Emma Strubell, Alexandra Sasha Luccioni, Noah A. Smith, Nicole DeCario, Will Buchanan

    Abstract: By providing unprecedented access to computational resources, cloud computing has enabled rapid growth in technologies such as machine learning, the computational demands of which incur a high energy cost and a commensurate carbon footprint. As a result, recent scholarship has called for better estimates of the greenhouse gas impact of AI: data scientists today do not have easy or reliable access… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

    Comments: In ACM Conference on Fairness, Accountability, and Transparency (ACM FAccT) 2022

  29. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

    Authors: Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas

    Abstract: E-governance is a process that aims to enhance a government's ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the establishment of an e-Governance model. There is often a need for an inclusive e-governance model with integrated multiactor governance services and where… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Sensors 2022, 22(6), 2291; https://doi.org/10.3390/s22062291

  30. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  31. NapierOne: A modern mixed file data set alternative to Govdocs1

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other researchers interested in reconstructing their environment and validating the research results. A modern cybersecurity mixed file data set called NapierOne… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817

  32. arXiv:2112.12232  [pdf, other

    cs.CR

    Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

    Authors: Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo

    Abstract: Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upo… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Journal ref: 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)

  33. arXiv:2112.10124  [pdf, other

    cs.CR

    Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

    Authors: Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J Buchanan

    Abstract: The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 morbidity, relieve pressure on healthcare systems, and allow economies to open. As a way forward after the COVID-19 vaccination, the Vaccination certif… ▽ More

    Submitted 21 December, 2021; v1 submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021 (14th International Conference on Security of Information and Networks)

  34. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  35. arXiv:2112.05153  [pdf

    astro-ph.IM astro-ph.EP

    Venus Life Finder Mission Study

    Authors: Sara Seager, Janusz J. Petkowski, Christopher E. Carr, David Grinspoon, Bethany Ehlmann, Sarag J. Saikia, Rachana Agrawal, Weston Buchanan, Monika U. Weber, Richard French, Pete Klupar, Simon P. Worden

    Abstract: The Venus Life Finder Missions are a series of focused astrobiology mission concepts to search for habitability, signs of life, and life itself in the Venus atmosphere. While people have speculated on life in the Venus clouds for decades, we are now able to act with cost-effective and highly-focused missions. A major motivation are unexplained atmospheric chemical anomalies, including the "mysteri… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    Comments: The study was partially sponsored by the Breakthrough Initiatives. Correspondence to Prof. Sara Seager [email protected] and Dr. Janusz J. Petkowski [email protected]. See venuscloudlife.com for more information on the VLF Collaboration

  36. arXiv:2112.02855  [pdf, other

    cs.CR cs.CY

    PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

    Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo

    Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructure may include the Citizen, a Testing Centre (TC), a Health Authority (HA), and a Government Authority (GA). Typically, these different domains need to… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Journal ref: IEEE SIN 2021

  37. arXiv:2112.01815  [pdf, other

    cs.CR

    A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

    Authors: Masoud Barati, William J. Buchanan, Owen Lo, Omer Rana

    Abstract: Digital vaccine passports are one of the main solutions which would allow the restart of travel in a post COVID-19 world. Trust, scalability and security are all key challenges one must overcome in implementing a vaccine passport. Initial approaches attempt to solve this problem by using centralised systems with trusted authorities. However, sharing vaccine passport data between different organisa… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Journal ref: CloudAM: 10th International Workshop on Cloud and Edge Computing, and Applications Management, 2021

  38. arXiv:2110.01970  [pdf

    cs.CR

    Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

    Authors: Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J Buchanan

    Abstract: Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from two privacy focused mixing services namely Obscuro which uses the secure enclave on intel chips to provide enhanced confidentiality and Wasabi wallet wh… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)

  39. arXiv:2109.08566  [pdf, other

    cs.CR cs.CY cs.DC

    GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

    Authors: Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos Karacapilidis, Dimitris Tsakalidis, Dimitris Tsolis

    Abstract: The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation it has broadened the attack surface and made them a popular target for cyber attacks. eGovernance services utilize internet, which is currently a location addressed system where whoever controls the location controls not only the… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: To be published in the proceedings of the 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021

  40. Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

    Authors: Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo

    Abstract: Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosys… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: 20 pages

    Report number: Volume 11 Number 09

    Journal ref: 10th international conference on Cryptography and Information Security 2021

  41. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain only two courses of action open to them; either pay the ransom or lose their data. One common behaviour shared between all crypto ransomware strains is… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Journal ref: Computers & Security, 102377, 2021

  42. arXiv:2104.12426  [pdf, other

    cs.LG cs.CR cs.NI

    Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

    Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan

    Abstract: As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defending approaches are no longer sufficient to detect both known and unknown attacks to high accuracy. Machine learning intrusion detection systems have… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://www.mdpi.com/2624-800X/1/2/14

    Journal ref: J. Cybersecur. Priv. 2021, 1(2), 252-273

  43. arXiv:2103.15753  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Privacy and Trust Redefined in Federated Machine Learning

    Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

    Abstract: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring th… ▽ More

    Submitted 30 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://doi.org/10.3390/make3020017

    Journal ref: Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356

  44. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  45. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

    Authors: Simon R. Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by com… ▽ More

    Submitted 19 December, 2020; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: 11 pages, 10 figures

    ACM Class: E.3; K.6.5

    Journal ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979

  46. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

    Authors: Charalampos Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis Katsikas, William J Buchanan

    Abstract: Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common security attack vectors. However, healthcare-oriented blockchain solutions can provide a decentralized, anonymous and secure EHR handling approach. This… ▽ More

    Submitted 27 January, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: MDPI Sensors (This article belongs to the Special Issue Security, Trust and Privacy in New Computing Environments) URL: https://www.mdpi.com/1424-8220/20/22/6587

    Journal ref: Sensors 2020, 20(22), 6587

  47. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

    Authors: William J Buchanan, Muhammad Ali Imran, Masood Ur-Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes, Nikolaos Pitropakis, Pavlos Papadopoulos

    Abstract: The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways where carriers of disease could be tracked and their contacts traced. These are generalized methods developed either in a distributed manner giving ci… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

  48. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

    Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan

    Abstract: The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of the growing spread of misinformation and disinformation intentionally or unintentionally by individuals and organizations. This trend has grave politica… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1812.00315, arXiv:1807.06346, arXiv:1904.05386 by other authors

    Journal ref: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2020, pp. 1-3

  49. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

    Authors: Zakwan Jaroucheh, Baraq Ghaleb, William J Buchanan

    Abstract: The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its corresponding software architecture. This protocol leverages two ideas: 1) the proof-of-stake concept to dynamically form stake proportionate consensus groups… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Journal ref: IEEE Conference on Software Architecture Companion, 143-150, 2020

  50. Privacy Preserving Passive DNS

    Authors: Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis Katsikas

    Abstract: The Domain Name System (DNS) was created to resolve the IP addresses of the web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors. The passive DNS data collection process creates a database containing various DNS data elements, some of… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Journal ref: Computers 2020, 9, 64