Skip to main content

Showing 1–38 of 38 results for author: Celdran, A H

.
  1. arXiv:2407.08652  [pdf, other

    cs.DC

    DART: A Solution for Decentralized Federated Learning Model Robustness Analysis

    Authors: Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, Enrique Tomás Martínez Beltrán, Gérôme Bovet, Burkhard Stiller

    Abstract: Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2405.09318  [pdf, other

    cs.CR cs.LG

    Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the lite… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Submitted to IEEE MILCOM 2024

  3. arXiv:2401.17917  [pdf, ps, other

    cs.CR

    GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware

    Authors: Jan von der Assen, Chao Feng, Alberto Huertas Celdrán, Róbert Oleš, Gérôme Bovet, Burkhard Stiller

    Abstract: Although ransomware has received broad attention in media and research, this evolving threat vector still poses a systematic threat. Related literature has explored their detection using various approaches leveraging Machine and Deep Learning. While these approaches are effective in detecting malware, they do not answer how to use this intelligence to protect against threats, raising concerns abou… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  4. arXiv:2311.05270  [pdf, other

    cs.HC

    Evaluation of Data Processing and Machine Learning Techniques in P300-based Authentication using Brain-Computer Interfaces

    Authors: Eduardo López Bernal, Sergio López Bernal, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: Brain-Computer Interfaces (BCIs) are used in various application scenarios allowing direct communication between the brain and computers. Specifically, electroencephalography (EEG) is one of the most common techniques for obtaining evoked potentials resulting from external stimuli, as the P300 potential is elicited from known images. The combination of Machine Learning (ML) and P300 potentials is… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  5. arXiv:2310.20435  [pdf, other

    cs.CY

    Assessing the Sustainability and Trustworthiness of Federated Learning Models

    Authors: Alberto Huertas Celdran, Chao Feng, Pedro Miguel Sanchez Sanchez, Lynn Zumtaugwald, Gerome Bovet, Burkhard Stiller

    Abstract: Artificial intelligence (AI) plays a pivotal role in various sectors, influencing critical decision-making processes in our daily lives. Within the AI landscape, novel AI paradigms, such as Federated Learning (FL), focus on preserving data privacy while collaboratively training AI models. In such a context, a group of experts from the European Commission (AI-HLEG) has identified sustainable AI as… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  6. arXiv:2310.08739  [pdf, other

    cs.CR cs.DC

    Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL

    Authors: Chao Feng, Alberto Huertas Celdran, Michael Vuong, Gerome Bovet, Burkhard Stiller

    Abstract: The growing concern over malicious attacks targeting the robustness of both Centralized and Decentralized Federated Learning (FL) necessitates novel defensive strategies. In contrast to the centralized approach, Decentralized FL (DFL) has the advantage of utilizing network topology and local dataset information, enabling the exploration of Moving Target Defense (MTD) based approaches. This work… ▽ More

    Submitted 14 February, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  7. arXiv:2310.08097  [pdf, other

    cs.DC cs.AI

    Sentinel: An Aggregation Function to Secure Decentralized Federated Learning

    Authors: Chao Feng, Alberto Huertas Celdran, Janosch Baltensperger, Enrique Tomas Martinez Beltran, Gerome Bovet, Burkhard Stiller

    Abstract: The rapid integration of Federated Learning (FL) into networking encompasses various aspects such as network management, quality of service, and cybersecurity while preserving data privacy. In this context, Decentralized Federated Learning (DFL) emerges as an innovative paradigm to train collaborative models, addressing the single point of failure limitation. However, the security and trustworthin… ▽ More

    Submitted 14 October, 2023; v1 submitted 12 October, 2023; originally announced October 2023.

  8. arXiv:2308.05978  [pdf, other

    cs.CR cs.AI

    CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

    Authors: Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Jan Kreischer, Jan von der Assen, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains… ▽ More

    Submitted 8 September, 2023; v1 submitted 11 August, 2023; originally announced August 2023.

    Comments: 11 pages, 8 figures

  9. arXiv:2308.03554  [pdf, other

    cs.CR

    TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning

    Authors: Ángel Luis Perales Gómez, Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán

    Abstract: Industry 4.0 has brought numerous advantages, such as increasing productivity through automation. However, it also presents major cybersecurity issues such as cyberattacks affecting industrial processes. Federated Learning (FL) combined with time-series analysis is a promising cyberattack detection mechanism proposed in the literature. However, the fact of having a single point of failure and netw… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  10. arXiv:2307.11730  [pdf, other

    cs.CR cs.AI cs.DC cs.LG cs.NI

    Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

    Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the decent… ▽ More

    Submitted 9 December, 2023; v1 submitted 21 July, 2023; originally announced July 2023.

  11. arXiv:2306.15566  [pdf, other

    cs.CR

    MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Rinor Sefa, Gérôme Bovet, Burkhard Stiller

    Abstract: Ransomware has remained one of the most notorious threats in the cybersecurity field. Moving Target Defense (MTD) has been proposed as a novel paradigm for proactive defense. Although various approaches leverage MTD, few of them rely on the operating system and, specifically, the file system, thereby making them dependent on other computing devices. Furthermore, existing ransomware defense techniq… ▽ More

    Submitted 16 November, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  12. arXiv:2306.15559  [pdf, other

    cs.CR cs.AI cs.LG

    RansomAI: AI-powered Ransomware for Stealthy Encryption

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  13. arXiv:2306.09750  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Fedstellar: A Platform for Decentralized Federated Learning

    Authors: Enrique Tomás Martínez Beltrán, Ángel Luis Perales Gómez, Chao Feng, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In 2016, Google proposed Federated Learning (FL) as a novel paradigm to train Machine Learning (ML) models across the participants of a federation while preserving data privacy. Since its birth, Centralized FL (CFL) has been the most used approach, where a central entity aggregates participants' models to create a global one. However, CFL presents limitations such as communication bottlenecks, sin… ▽ More

    Submitted 8 April, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

  14. arXiv:2306.08495  [pdf, other

    cs.CR

    Single-board Device Individual Authentication based on Hardware Performance and Autoencoder Transformer Models

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The proliferation of the Internet of Things (IoT) has led to the emergence of crowdsensing applications, where a multitude of interconnected devices collaboratively collect and analyze data. Ensuring the authenticity and integrity of the data collected by these devices is crucial for reliable decision-making and maintaining trust in the system. Traditional authentication methods are often vulnerab… ▽ More

    Submitted 11 November, 2023; v1 submitted 14 June, 2023; originally announced June 2023.

  15. arXiv:2302.09844  [pdf, other

    cs.CR cs.AI

    FederatedTrust: A Solution for Trustworthy Federated Learning

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data pri… ▽ More

    Submitted 6 July, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  16. arXiv:2212.14677  [pdf, other

    cs.CR cs.AI

    Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  17. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learnin… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  18. arXiv:2212.03169  [pdf, other

    cs.HC

    When Brain-Computer Interfaces Meet the Metaverse: Landscape, Demonstrator, Trends, Challenges, and Concerns

    Authors: Sergio López Bernal, Mario Quiles Pérez, Enrique Tomás Martínez Beltrán, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: The metaverse has gained tremendous popularity in recent years, allowing the interconnection of users worldwide. However, current systems in metaverse scenarios, such as virtual reality glasses, offer a partial immersive experience. In this context, Brain-Computer Interfaces (BCIs) can introduce a revolution in the metaverse, although a study of the applicability and implications of BCIs in these… ▽ More

    Submitted 16 November, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

  19. arXiv:2211.08413  [pdf, other

    cs.LG cs.CR cs.DC cs.NI

    Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges

    Authors: Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: In recent years, Federated Learning (FL) has gained relevance in training collaborative models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the most common approach in the literature, where a central entity creates a global model. However, a centralized approach leads to increased latency due to bottlenecks, heightened vulnerability to system failures, and trustwo… ▽ More

    Submitted 13 September, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

  20. arXiv:2210.11501  [pdf, other

    cs.CR cs.NI

    Trust-as-a-Service: A reputation-enabled trust framework for 5G networks

    Authors: José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez

    Abstract: Trust, security, and privacy are three of the major pillars to assemble the fifth generation network and beyond. Despite such pillars are principally interconnected, they arise a multitude of challenges to be addressed separately. 5G ought to offer flexible and pervasive computing capabilities across multiple domains according to user demands and assuring trustworthy network providers. Distributed… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  21. arXiv:2210.11061  [pdf, other

    cs.LG

    Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Enrique Tomás Martínez Beltrán, Daniel Demeter, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. How… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  22. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challengi… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  23. arXiv:2209.04048  [pdf, other

    eess.SP cs.LG

    Studying Drowsiness Detection Performance while Driving through Scalable Machine Learning Models using Electroencephalography

    Authors: José Manuel Hidalgo Rogel, Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Sergio López Bernal, Gregorio Martínez Pérez, Alberto Huertas Celdrán

    Abstract: - Background / Introduction: Driver drowsiness is a significant concern and one of the leading causes of traffic accidents. Advances in cognitive neuroscience and computer science have enabled the detection of drivers' drowsiness using Brain-Computer Interfaces (BCIs) and Machine Learning (ML). However, the literature lacks a comprehensive evaluation of drowsiness detection performance using a het… ▽ More

    Submitted 30 October, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

  24. arXiv:2209.00993  [pdf, other

    eess.SP cs.AI cs.HC

    Data Fusion in Neuromarketing: Multimodal Analysis of Biosignals, Lifecycle Stages, Current Advances, Datasets, Trends, and Challenges

    Authors: Mario Quiles Pérez, Enrique Tomás Martínez Beltrán, Sergio López Bernal, Eduardo Horna Prat, Luis Montesano Del Campo, Lorenzo Fernández Maimó, Alberto Huertas Celdrán

    Abstract: The primary goal of any company is to increase its profits by improving both the quality of its products and how they are advertised. In this context, neuromarketing seeks to enhance the promotion of products and generate a greater acceptance on potential buyers. Traditionally, neuromarketing studies have relied on a single biosignal to obtain feedback from presented stimuli. However, thanks to ne… ▽ More

    Submitted 21 August, 2023; v1 submitted 30 August, 2022; originally announced September 2022.

    Comments: 26 pages, 15 figures

  25. LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers

    Authors: Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: In today's computing environment, where Artificial Intelligence (AI) and data processing are moving toward the Internet of Things (IoT) and Edge computing paradigms, benchmarking resource-constrained devices is a critical task to evaluate their suitability and performance. Between the employed devices, Single-Board Computers arise as multi-purpose and affordable systems. The literature has explore… ▽ More

    Submitted 24 October, 2022; v1 submitted 18 April, 2022; originally announced April 2022.

  26. Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  27. CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent li… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  28. Robust Federated Learning for execution time-based device model identification under label-flip** attack

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez

    Abstract: The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, device spoofing and impersonation cyberattacks stand out due to their impact and, usually, low complexity required to be launched. To solve this issue, seve… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  29. A methodology to identify identical single-board computers based on hardware behavior fingerprinting

    Authors: Pedro Miguel Sánchez Sánchez, José María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: The connectivity and resource-constrained nature of single-board devices open the door to cybersecurity concerns affecting Internet of Things (IoT) scenarios. One of the most important issues is the presence of unauthorized IoT devices that want to impersonate legitimate ones by using identical hardware and software specifications. This situation can provoke sensitive information leakages, data po… ▽ More

    Submitted 22 June, 2022; v1 submitted 15 June, 2021; originally announced June 2021.

  30. FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

    Authors: Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal

    Abstract: An integrated clinical environment (ICE) enables the connection and coordination of the internet of medical things around the care of patients in hospitals. However, ransomware attacks and their spread on hospital infrastructures, including ICE, are rising. Often the adversaries are targeting multiple hospitals with the same ransomware attacks. These attacks are detected by using machine learning… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 402), 2021

  31. arXiv:2106.04968  [pdf, other

    cs.CR

    Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized

    Authors: Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez

    Abstract: This article presents eight neural cyberattacks affecting spontaneous neural activity, inspired by well-known cyberattacks from the computer science domain: Neural Flooding, Neural Jamming, Neural Scanning, Neural Selective Forwarding, Neural Spoofing, Neural Sybil, Neural Sinkhole and Neural Nonce. These cyberattacks are based on the exploitation of vulnerabilities existing in the new generation… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

  32. arXiv:2105.10997  [pdf, other

    cs.CR

    Neuronal Jamming Cyberattack over Invasive BCI Affecting the Resolution of Tasks Requiring Visual Capabilities

    Authors: Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez

    Abstract: Invasive Brain-Computer Interfaces (BCI) are extensively used in medical application scenarios to record, stimulate, or inhibit neural activity with different purposes. An example is the stimulation of some brain areas to reduce the effects generated by Parkinson's disease. Despite the advances in recent years, cybersecurity on BCI is an open challenge since attackers can exploit the vulnerabiliti… ▽ More

    Submitted 23 May, 2021; originally announced May 2021.

  33. Federated Learning for Malware Detection in IoT Devices

    Authors: Valerian Rey, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Martin Jaggi

    Abstract: This work investigates the possibilities enabled by federated learning concerning IoT malware detection and studies security issues inherent to this new learning paradigm. In this context, a framework that uses federated learning to detect malware affecting IoT devices is presented. N-BaIoT, a dataset modeling network traffic of several real IoT devices while affected by malware, has been used to… ▽ More

    Submitted 19 November, 2021; v1 submitted 15 April, 2021; originally announced April 2021.

    Journal ref: Rey, V., Sánchez, P. M. S., Celdrán, A. H., & Bovet, G. (2022). Federated learning for malware detection in iot devices. Computer Networks, 108693

  34. A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

    Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez

    Abstract: In the current network-based computing world, where the number of interconnected devices grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at the same rate. To guarantee the correct functioning and performance of novel environments such as Smart Cities, Industry 4.0, or crowdsensing, it is crucial to identify the capabilities of their devices (e.g., senso… ▽ More

    Submitted 3 March, 2021; v1 submitted 7 August, 2020; originally announced August 2020.

  35. arXiv:2007.09466  [pdf, other

    q-bio.NC cs.CR

    Cyberattacks on Miniature Brain Implants to Disrupt Spontaneous Neural Signaling

    Authors: Sergio López Bernal, Alberto Huertas Celdrán, Lorenzo Fernández Maimó, Michael Taynnan Barros, Sasitharan Balasubramaniam, Gregorio Martínez Pérez

    Abstract: Brain-Computer Interfaces (BCI) arose as systems that merge computing systems with the human brain to facilitate recording, stimulation, and inhibition of neural activity. Over the years, the development of BCI technologies has shifted towards miniaturization of devices that can be seamlessly embedded into the brain and can target single neuron or small population sensing and control. We present a… ▽ More

    Submitted 10 September, 2020; v1 submitted 18 July, 2020; originally announced July 2020.

  36. AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Lorenzo Fernández Maimó, Gregorio Martínez Pérez

    Abstract: The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenar… ▽ More

    Submitted 30 November, 2020; v1 submitted 16 April, 2020; originally announced April 2020.

  37. Spotting political social bots in Twitter: A use case of the 2019 Spanish general election

    Authors: Javier Pastor-Galindo, Mattia Zago, Pantaleone Nespoli, Sergio López Bernal, Alberto Huertas Celdrán, Manuel Gil Pérez, José A. Ruipérez-Valiente, Gregorio Martínez Pérez, Félix Gómez Mármol

    Abstract: While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Sp… ▽ More

    Submitted 12 October, 2020; v1 submitted 2 April, 2020; originally announced April 2020.

  38. arXiv:1908.03536  [pdf, other

    cs.CR cs.NI

    Security in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges

    Authors: Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez, Michael Taynnan Barros, Sasitharan Balasubramaniam

    Abstract: BCIs have significantly improved the patients' quality of life by restoring damaged hearing, sight, and movement capabilities. After evolving their application scenarios, the current trend of BCI is to enable new innovative brain-to-brain and brain-to-the-Internet communication paradigms. This technological advancement generates opportunities for attackers since users' personal information and phy… ▽ More

    Submitted 2 October, 2020; v1 submitted 9 August, 2019; originally announced August 2019.