Skip to main content

Showing 1–50 of 101 results for author: Kanhere, S

.
  1. arXiv:2405.04758  [pdf, other

    cs.CR cs.AI cs.CL

    Honeyfile Camouflage: Hiding Fake Files in Plain Sight

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Honeyfiles are a particularly useful type of honeypot: fake files deployed to detect and infer information from malicious behaviour. This paper considers the challenge of naming honeyfiles so they are camouflaged when placed amongst real files in a file system. Based on cosine distances in semantic vector spaces, we develop two metrics for filename camouflage: one based on simple averaging and one… ▽ More

    Submitted 10 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 3rd Workshop on the security implications of Deepfakes and Cheapfakes (WDC) co-located at ACM ASIACCS 2024

  2. SoK: Trusting Self-Sovereign Identity

    Authors: Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere

    Abstract: Digital identity is evolving from centralized systems to a decentralized approach known as Self-Sovereign Identity (SSI). SSI empowers individuals to control their digital identities, eliminating reliance on third-party data custodians and reducing the risk of data breaches. However, the concept of trust in SSI remains complex and fragmented. This paper systematically analyzes trust in SSI in ligh… ▽ More

    Submitted 27 June, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

    Comments: Accepted at PETS'24 Issue 3

  3. arXiv:2404.04854  [pdf, other

    cs.LG cs.AI cs.CR

    Contextual Chart Generation for Cyber Deception

    Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

    Abstract: Honeyfiles are security assets designed to attract and detect intruders on compromised systems. Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data. Interaction with a honeyfile reveals the presence of an intruder, and can provide insights into their goals and intentions. Their practical use, however, is limited by the time… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 13 pages including references

  4. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  5. SoK: Can Trajectory Generation Combine Privacy and Utility?

    Authors: Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

    Abstract: While location trajectories represent a valuable data source for analyses and location-based services, they can reveal sensitive information, such as political and religious preferences. Differentially private publication mechanisms have been proposed to allow for analyses under rigorous privacy guarantees. However, the traditional protection schemes suffer from a limiting privacy-utility trade-of… ▽ More

    Submitted 27 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: Added DOI: 10.56553/popets-2024-0068

  6. arXiv:2402.03740  [pdf, other

    cs.SI cs.CY cs.LG

    BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning

    Authors: Mohammad Majid Akhtar, Navid Shadman Bhuiyan, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: The detection of automated accounts, also known as "social bots", has been an increasingly important concern for online social networks (OSNs). While several methods have been proposed for detecting social bots, significant research gaps remain. First, current models exhibit limitations in detecting sophisticated bots that aim to mimic genuine OSN users. Second, these methods often rely on simplis… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  7. Modern Computing: Vision and Challenges

    Authors: Sukhpal Singh Gill, Huaming Wu, Panos Patros, Carlo Ottaviani, Priyansh Arora, Victor Casamayor Pujol, David Haunschild, Ajith Kumar Parlikad, Oktay Cetinkaya, Hanan Lutfiyya, Vlado Stankovski, Ruidong Li, Yuemin Ding, Junaid Qadir, Ajith Abraham, Soumya K. Ghosh, Houbing Herbert Song, Rizos Sakellariou, Omer Rana, Joel J. P. C. Rodrigues, Salil S. Kanhere, Schahram Dustdar, Steve Uhlig, Kotagiri Ramamohanarao, Rajkumar Buyya

    Abstract: Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: Preprint submitted to Telematics and Informatics Reports, Elsevier (2024)

    Journal ref: Elsevier Telematics and Informatics Reports, Volume 13, March 2024

  8. arXiv:2401.01022  [pdf

    cs.CR cs.CY

    An Interdisciplinary Survey on Information Flows in Supply Chains

    Authors: Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, Eduard Vlad, Sander J. J. Leemans, Salil S. Kanhere, Volker Stich, Klaus Wehrle

    Abstract: Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010-2021 in an interdisciplinary meta-survey to make this topic holist… ▽ More

    Submitted 28 September, 2023; originally announced January 2024.

    Journal ref: ACM Computing Surveys 56(2):1-38, 2024

  9. arXiv:2312.11735  [pdf, other

    cs.LG

    Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

    Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios. Current deep learning techniques to address multiple-output problems are based on two main methodologies: (1) mixture density networks, which suffer from poor stability at high dimensions, or (2) multiple choice learni… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: To appear in Proceedings of the 38th AAAI Conference on Artificial Intelligence (AAAI-24). 13 pages (9 main, 4 appendix)

  10. arXiv:2312.04749  [pdf, other

    cs.CR

    Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler

    Authors: Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Fuzzing is a highly-scalable software testing technique that uncovers bugs in a target program by executing it with mutated inputs. Over the life of a fuzzing campaign, the fuzzer accumulates inputs inducing new and interesting target behaviors, drawing from these inputs for further mutation. This rapidly results in a large number of inputs to select from, making it challenging to quickly and accu… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 12 pages, 4 figures, Accepted paper at AsiaCCS2024

  11. arXiv:2311.04544  [pdf, other

    cs.CR cs.AI cs.SE

    Local Differential Privacy for Smart Meter Data Sharing

    Authors: Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-young Paik, Salil S. Kanhere, Liming Zhu

    Abstract: Energy disaggregation techniques, which use smart meter data to infer appliance energy usage, can provide consumers and energy companies valuable insights into energy management. However, these techniques also present privacy risks, such as the potential for behavioral profiling. Local differential privacy (LDP) methods provide strong privacy guarantees with high efficiency in addressing privacy c… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 18 pages, 9 figures

  12. arXiv:2311.01060  [pdf, other

    cs.CR

    Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation

    Authors: Lennart Bader, Jan Pennekamp, Emildeon Thevaraj, Maria Spiß, Salil S. Kanhere, Klaus Wehrle

    Abstract: Consumers frequently interact with reputation systems to rate products, services, and deliveries. While past research extensively studied different conceptual approaches to realize such systems securely and privacy-preservingly, these concepts are not yet in use in business-to-business environments. In this paper, (1) we thus outline which specific challenges privacy-cautious stakeholders in volat… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  13. arXiv:2310.12523  [pdf, other

    cs.CR

    Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework

    Authors: Imdad Ullah, Najm Hassan, Sukhpal Singh Gill, Basem Suleiman, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere

    Abstract: The generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) use billions of parameters to extensively analyse large datasets and extract critical private information such as, context, specific details, identifying information etc. This have raised serious threats to user privacy and reluctance to use such tools. This article proposes the conceptual model called PrivChat… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  14. arXiv:2308.12497  [pdf, other

    cs.SI cs.CY cs.LG

    False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations

    Authors: Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: The rapid spread of false information and persistent manipulation attacks on online social networks (OSNs), often for political, ideological, or financial gain, has affected the openness of OSNs. While researchers from various disciplines have investigated different manipulation-triggering elements of OSNs (such as understanding information diffusion on OSNs or detecting automated behavior of acco… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

  15. arXiv:2308.07860  [pdf, other

    cs.CR

    SplITS: Split Input-to-State Map** for Effective Firmware Fuzzing

    Authors: Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe

    Abstract: Ability to test firmware on embedded devices is critical to discovering vulnerabilities prior to their adversarial exploitation. State-of-the-art automated testing methods rehost firmware in emulators and attempt to facilitate inputs from a diversity of methods (interrupt driven, status polling) and a plethora of devices (such as modems and GPS units). Despite recent progress to tackle peripheral… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: Accepted ESORICS 2023

  16. arXiv:2308.01539  [pdf, other

    cs.CR

    VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms

    Authors: Rahma Mukta, Rue C. Teh, Hye-young Paik, Qinghua Lu, Salil S. Kanhere

    Abstract: Self Sovereign Identity (SSI) is an emerging identity system that facilitates secure credential issuance and verification without placing trust in any centralised authority. To bypass central trust, most SSI implementations place blockchain as a trusted mediator by placing credential transactions on-chain. Yet, existing SSI platforms face trust issues as all credential issuers in SSI are not suppo… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

  17. arXiv:2307.08955  [pdf

    cs.LG cs.CR

    Discretization-based ensemble model for robust learning in IoT

    Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere

    Abstract: IoT device identification is the process of recognizing and verifying connected IoT devices to the network. This is an essential process for ensuring that only authorized devices can access the network, and it is necessary for network management and maintenance. In recent years, machine learning models have been used widely for automating the process of identifying devices in the network. However,… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 15 pages

  18. Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots

    Authors: Sukhpal Singh Gill, Minxian Xu, Panos Patros, Huaming Wu, Rupinder Kaur, Kamalpreet Kaur, Stephanie Fuller, Manmeet Singh, Priyansh Arora, Ajith Kumar Parlikad, Vlado Stankovski, Ajith Abraham, Soumya K. Ghosh, Hanan Lutfiyya, Salil S. Kanhere, Rami Bahsoon, Omer Rana, Schahram Dustdar, Rizos Sakellariou, Steve Uhlig, Rajkumar Buyya

    Abstract: ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes of data. In this article, leading scientists, researchers and engineers discuss the transformative effects of ChatGPT on modern education. This research seeks to improve our knowledge of ChatGPT capabilities and its use in the education sector, identifying potential concerns and cha… ▽ More

    Submitted 25 May, 2023; originally announced June 2023.

    Comments: Preprint submitted to IoTCPS Elsevier (2023)

    Journal ref: Internet of Things and Cyber-Physical Systems (Elsevier), Volume 4, 2024, Pages 19-23

  19. arXiv:2305.18769  [pdf

    cs.CV cs.LG

    DualVAE: Controlling Colours of Generated and Real Images

    Authors: Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

    Abstract: Colour controlled image generation and manipulation are of interest to artists and graphic designers. Vector Quantised Variational AutoEncoders (VQ-VAEs) with autoregressive (AR) prior are able to produce high quality images, but lack an explicit representation mechanism to control colour attributes. We introduce DualVAE, a hybrid representation model that provides such control by learning disenta… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  20. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  21. Diverse Multimedia Layout Generation with Multi Choice Learning

    Authors: David D. Nguyen, Surya Nepal, Salil S. Kanhere

    Abstract: Designing visually appealing layouts for multimedia documents containing text, graphs and images requires a form of creative intelligence. Modelling the generation of layouts has recently gained attention due to its importance in aesthetics and communication style. In contrast to standard prediction tasks, there are a range of acceptable layouts which depend on user preferences. For example, a pos… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: 9 pages

    Report number: mfp1907

    Journal ref: Proceedings of the 29th ACM International Conference on Multimedia 2021

  22. arXiv:2301.06626   

    cs.LG cs.CV

    Masked Vector Quantization

    Authors: David D. Nguyen, David Leibowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Generative models with discrete latent representations have recently demonstrated an impressive ability to learn complex high-dimensional data distributions. However, their performance relies on a long sequence of tokens per instance and a large number of codebook entries, resulting in long sampling times and considerable computation to fit the categorical posterior. To address these issues, we pr… ▽ More

    Submitted 24 March, 2024; v1 submitted 16 January, 2023; originally announced January 2023.

    Comments: A newer version of this manuscript was archived under 2312.11735

  23. arXiv:2212.09064  [pdf, other

    cs.CR cs.DC

    PlexiChain: A Secure Blockchain-based Flexibility Aggregator Framework

    Authors: Samuel Karumba, Salil S. Kanhere, Raja Jurdak, Subbu Sethuvenkatraman

    Abstract: Flexible resources in built environments are seen as a low-cost opportunity for delivering grid management services. Consequently, the centralised aggregator model, where the aggregator is used to bundle demand flexibility from flexible resources and deliver it to flexibility customers such as Distributed/Transmission System Operator (DSO/TSO) in flexibility markets, has been adopted. However, the… ▽ More

    Submitted 18 December, 2022; originally announced December 2022.

    Comments: 10 pages, 8 figure

  24. arXiv:2212.04658  [pdf, other

    cs.CR cs.NI

    Trust and Reputation Management for Blockchain-enabled IoT

    Authors: Guntur Dharma Putra, Sidra Malik, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: In recent years, there has been an increasing interest in incorporating blockchain for the Internet of Things (IoT) to address the inherent issues of IoT, such as single point of failure and data silos. However, blockchain alone cannot ascertain the authenticity and veracity of the data coming from IoT devices. The append-only nature of blockchain exacerbates this issue, as it would not be possibl… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: COMSNETS 2023 Invited Paper

  25. Reconstruction Attack on Differential Private Trajectory Protection Mechanisms

    Authors: Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

    Abstract: Location trajectories collected by smartphones and other devices represent a valuable data source for applications such as location-based services. Likewise, trajectories have the potential to reveal sensitive information about individuals, e.g., religious beliefs or sexual orientations. Accordingly, trajectory datasets require appropriate sanitization. Due to their strong theoretical privacy guar… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: To be published in the proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22)

  26. arXiv:2209.03162  [pdf, other

    cs.SI cs.CY cs.LG

    Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News

    Authors: Mohammad Majid Akhtar, Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram, Salil S. Kanhere

    Abstract: COVID-19 impacted every part of the world, although the misinformation about the outbreak traveled faster than the virus. Misinformation spread through online social networks (OSN) often misled people from following correct medical practices. In particular, OSN bots have been a primary source of disseminating false information and initiating cyber propaganda. Existing work neglects the presence of… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  27. arXiv:2209.01582  [pdf, other

    cs.CR cs.LG

    PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

    Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere

    Abstract: Web-based phishing accounts for over 90% of data breaches, and most web-browsers and security vendors rely on machine-learning (ML) models as mitigation. Despite this, links posted regularly on anti-phishing aggregators such as PhishTank and VirusTotal are shown to easily bypass existing detectors. Prior art suggests that automated website cloning, with light mutations, is gaining traction with at… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

    Comments: 8 pages

  28. arXiv:2208.07562  [pdf, other

    cs.NI

    Towards Blockchain-based Trust and Reputation Management for Trustworthy 6G Networks

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: 6G is envisioned to enable futuristic technologies, which exhibit more complexities than the previous generations, as it aims to bring connectivity to a large number of devices, many of which may not be trustworthy. Proper authentication can protect the network from unauthorized adversaries. However, it cannot guarantee in situ reliability and trustworthiness of authorized network nodes, as they c… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Accepted for publication in the IEEE Network Magazine

  29. Deception for Cyber Defence: Challenges and Opportunities

    Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

    Abstract: Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft. One of the factors limiting the use of deception has been the cost of generating realistic artefacts by hand. Recent advances in Machine Learning have, however, created opportunities for scalable, automated generation of realistic decept… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Journal ref: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2021, pp. 173-182

  30. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  31. arXiv:2203.10902  [pdf, other

    cs.CR cs.AI

    PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

    Authors: Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

    Abstract: Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a publ… ▽ More

    Submitted 19 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 18 pages, 9 figures. Accepted to IEEE S&P 2023

  32. arXiv:2203.07580  [pdf, other

    cs.CL cs.CR cs.LG

    TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

    Abstract: Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders. A key property of a honeyfile, enticement, is the extent to which the file can attract an intruder to interact with it. We introduce a novel metric, Topic Semantic Matching (TSM), which uses topic modelling to represent files… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  33. arXiv:2203.06793  [pdf, other

    cs.CL

    Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

    Authors: Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

    Abstract: Each and every organisation releases information in a variety of forms ranging from annual reports to legal proceedings. Such documents may contain sensitive information and releasing them openly may lead to the leakage of confidential information. Detection of sentences that contain sensitive information in documents can help organisations prevent the leakage of valuable confidential information.… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  34. arXiv:2203.05769  [pdf, other

    cs.CR

    DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains

    Authors: Guntur Dharma Putra, Changhoon Kang, Salil S. Kanhere, James Won-Ki Hong

    Abstract: Blockchain has the potential to enhance supply chain management systems by providing stronger assurance in transparency and traceability of traded commodities. However, blockchain does not overcome the inherent issues of data trust in IoT enabled supply chains. Recent proposals attempt to tackle these issues by incorporating generic trust and reputation management, which does not entirely address… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

    Comments: 9 pages, 8 figures. Accepted to IEEE ICBC 2022 as a short paper

  35. AI for Next Generation Computing: Emerging Trends and Future Directions

    Authors: Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer Rana, Ivona Brandic, Steve Uhlig

    Abstract: Autonomic computing investigates how systems can achieve (user) specified control outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and inter-dependent control loops. Despite research into… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: Accepted for Publication in Elsevier IoT Journal, 2022

  36. arXiv:2202.09603  [pdf, other

    cs.CR cs.DC

    Device Identification in Blockchain-Based Internet of Things

    Authors: Ali Dorri, Clemence Roulin, Shantanu Pal, Sarah Baalbaki, Raja Jurdak, Salil Kanhere

    Abstract: In recent years blockchain technology has received tremendous attention. Blockchain users are known by a changeable Public Key (PK) that introduces a level of anonymity, however, studies have shown that anonymized transactions can be linked to deanonymize the users. Most of the existing studies on user de-anonymization focus on monetary applications, however, blockchain has received extensive atte… ▽ More

    Submitted 19 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: text overlap with arXiv:1812.08970

  37. arXiv:2111.11874  [pdf, other

    cs.CR cs.LG

    Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

    Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere

    Abstract: Security risk assessment and prediction are critical for organisations deploying Internet of Things (IoT) devices. An absolute minimum requirement for enterprises is to verify the security risk of IoT devices for the reported vulnerabilities in the National Vulnerability Database (NVD). This paper proposes a novel risk prediction for IoT devices based on publicly available information about them.… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: Accepted - EAI MobiQuitous 2021 - 18th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

  38. Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Abhinav Pathak, Salil S. Kanhere, Raja Jurdak

    Abstract: Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against known attacks. To increase the capability of an IDS, researchers proposed the concept of blockchain-based Collaborative-IDS (CIDS), wherein blockchain acts as a decentralised platform allowing collaboration between CIDS nodes to share intrusion related information, such as intrusion alarms and detec… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021

  39. From MANET to people-centric networking: milestones and open research challenges

    Authors: Marco Conti, Chiara Boldrini, Salil S. Kanhere, Enzo Mingozzi, Elena Pagani, Pedro M. Ruiz, Mohamed Younis

    Abstract: In this paper we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing the MANET paradigm, and why the research on MANET… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Journal ref: Computer Communications 71 (2015): 1-21

  40. arXiv:2109.07721  [pdf, other

    cs.CR cs.DC

    Blockchain for Trust and Reputation Management in Cyber-physical Systems

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak

    Abstract: The salient features of blockchain, such as decentralisation and transparency, have allowed the development of Decentralised Trust and Reputation Management Systems (DTRMS), which mainly aim to quantitatively assess the trustworthiness of the network participants and help to protect the network from adversaries. In the literature, proposals of DTRMS have been applied to various Cyber-physical Syst… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

    Comments: 17 pages, 4 figures

  41. arXiv:2108.12032  [pdf, other

    cs.CR

    Blockchain in Supply Chain: Opportunities and Design Considerations

    Authors: Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Supply chain applications operate in a multi-stakeholder setting, demanding trust, provenance, and transparency. Blockchain technology provides mechanisms to establish a decentralized infrastructure involving multiple stakeholders. Such mechanisms make the blockchain technology ideal for multi-stakeholder supply chain applications. This chapter introduces the characteristics and requirements of th… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  42. arXiv:2105.11217  [pdf, other

    cs.CR

    TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains

    Authors: Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

    Abstract: In this work, we propose a privacy-preservation framework, TradeChain, which decouples the trade events of participants using decentralised identities. TradeChain adopts the Self-Sovereign Identity (SSI) principles and makes the following novel contributions: a) it incorporates two separate ledgers: a public permissioned blockchain for maintaining identities and the permissioned blockchain for rec… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

  43. arXiv:2104.13964  [pdf, other

    cs.CR

    PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains

    Authors: Sidra Malik, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Blockchain offers traceability and transparency to supply chain event data and hence can help overcome many challenges in supply chain management such as: data integrity, provenance and traceability. However, data privacy concerns such as the protection of trade secrets have hindered adoption of blockchain technology. Although consortium blockchains only allow authorised supply chain entities to r… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  44. arXiv:2104.00832  [pdf, other

    cs.CR

    Trust-based Blockchain Authorization for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak, Aleksandar Ignjatovic

    Abstract: Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ convent… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: 12 pages, 10 figures, submitted to IEEE Transactions on Network and Service Management

  45. arXiv:2103.05873  [pdf, other

    cs.CR

    DIMY: Enabling Privacy-preserving Contact Tracing

    Authors: Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay Jha

    Abstract: The infection rate of COVID-19 and lack of an approved vaccine has forced governments and health authorities to adopt lockdowns, increased testing, and contact tracing to reduce the spread of the virus. Digital contact tracing has become a supplement to the traditional manual contact tracing process. However, although there have been a number of digital contact tracing apps proposed and deployed,… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  46. arXiv:2012.07474  [pdf, other

    cs.LG cs.CR

    HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios

    Authors: Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha

    Abstract: We have witnessed the continuing arms race between backdoor attacks and the corresponding defense strategies on Deep Neural Networks (DNNs). Most state-of-the-art defenses rely on the statistical sanitization of the "inputs" or "latent DNN representations" to capture trojan behaviour. In this paper, we first challenge the robustness of such recently reported defenses by introducing a novel variant… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 21 pages, 36 figures, conference paper

  47. arXiv:2010.13346  [pdf, other

    cs.NI cs.AI

    Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning

    Authors: Sayed Amir Hoseini, Ayub Bokani, Jahan Hassan, Shavbo Salehi, Salil S. Kanhere

    Abstract: Next-generation mobile networks have proposed the integration of Unmanned Aerial Vehicles (UAVs) as aerial base stations (UAV-BS) to serve ground nodes. Despite having advantages of using UAV-BSs, their dependence on the on-board, limited-capacity battery hinders their service continuity. Shorter trajectories can save flying energy, however, UAV-BSs must also serve nodes based on their service pri… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  48. arXiv:2010.12134  [pdf, ps, other

    cs.CR

    Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs

    Authors: Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere

    Abstract: We propose CrowdPatching, a blockchain-based decentralized protocol, allowing Internet of Things (IoT) manufacturers to delegate the delivery of software updates to self-interested distributors in exchange for cryptocurrency. Manufacturers announce updates by deploying a smart contract (SC), which in turn will issue cryptocurrency payments to any distributor who provides an unforgeable proof-of-de… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Symposium on Network Computing and Applications (NCA 2020) [Core Rank: A]. The final version appearing in the conference proceedings will have additions and changes

  49. arXiv:2009.06861  [pdf, other

    cs.CR

    Privacy in Targeted Advertising: A Survey

    Authors: Imdad Ullah, Roksana Boreli, Salil S. Kanhere

    Abstract: Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads, using an infrastructure of a number of intermediary entities and technologies. The advertising and analytics companies collect, aggregate, process and trade a vast amount of user's personal data,… ▽ More

    Submitted 20 June, 2021; v1 submitted 15 September, 2020; originally announced September 2020.

  50. arXiv:2008.10479  [pdf, other

    cs.CR

    Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads

    Authors: Imdad Ullah, Salil S. Kanhere, Roksana Boreli

    Abstract: The targeted advertising is based on preference profiles inferred via relationships among individuals, their monitored responses to previous advertising and temporal activity over the Internet, which has raised critical privacy concerns. In this paper, we present a novel proposal for a Blockchain-based advertising platform that provides: a system for privacy preserving user profiling, privately re… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.