Skip to main content

Showing 1–5 of 5 results for author: Kwiat, K

.
  1. Enabling Cooperative IoT Security via Software Defined Networks (SDN)

    Authors: Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles Kamhoua, Kevin Kwiat

    Abstract: Internet of Things (IoT) is becoming an increasingly attractive target for cybercriminals. We observe that many attacks to IoTs are launched in a collusive way, such as brute-force hacking usernames and passwords, to target at a particular victim. However, most of the time our defending mechanisms to such kind of attacks are carried out individually and independently, which leads to ineffective an… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: IEEE ICC 2018

    Journal ref: 2018 IEEE International Conference on Communications (ICC)

  2. arXiv:1703.07499  [pdf, other

    cs.IT cs.CR cs.GT

    Hardware Trojan Detection Game: A Prospect-Theoretic Approach

    Authors: Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles Kamhoua, Kevin Kwiat

    Abstract: Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans - malicious designs that, when activated, can lead t… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

    Comments: IEEE Transactions on Vehicular Technology

  3. arXiv:1702.06436  [pdf, ps, other

    cs.CR cs.GT

    Contract-Theoretic Resource Allocation for Critical Infrastructure Protection

    Authors: AbdelRahman Eldosouky, Walid Saad, Charles Kamhoua, and Kevin Kwiat

    Abstract: Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation… ▽ More

    Submitted 21 February, 2017; originally announced February 2017.

    Comments: Accepted in IEEE GLOBECOM 2015

  4. arXiv:1702.00552  [pdf, other

    cs.CR

    Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

    Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: Threat intelligence sharing has become a growing concept, whereby entities can exchange patterns of threats with each other, in the form of indicators, to a community of trust for threat analysis and incident response. However, sharing threat-related information have posed various risks to an organization that pertains to its security, privacy, and competitiveness. Given the coinciding benefits an… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.

  5. arXiv:1702.00548  [pdf, other

    cs.CR

    Rethinking Information Sharing for Actionable Threat Intelligence

    Authors: Aziz Mohaisen, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introduc- ing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators ar… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.