Skip to main content

Showing 1–6 of 6 results for author: Truong, H T T

.
  1. arXiv:1908.09015  [pdf, other

    cs.DC cs.CR

    Towards Secure and Decentralized Sharing of IoT Data

    Authors: Hien Thi Thu Truong, Miguel Almeida, Ghassan Karame, Claudio Soriente

    Abstract: The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude of data produced and exchanged by IoT devices and platforms. Some of those challenges are currently being addressed by coupling IoT applications with blockchains. However, current blockchain-backed IoT systems simply use the blockchain to store access control policies, thereby underutilizing t… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

  2. arXiv:1812.04293  [pdf, other

    cs.CR

    On the Security of Randomized Defenses Against Adversarial Samples

    Authors: Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame

    Abstract: Deep Learning has been shown to be particularly vulnerable to adversarial samples. To combat adversarial strategies, numerous defensive techniques have been proposed. Among these, a promising approach is to use randomness in order to make the classification process unpredictable and presumably harder for the adversary to control. In this paper, we study the effectiveness of randomized defenses aga… ▽ More

    Submitted 16 March, 2020; v1 submitted 11 December, 2018; originally announced December 2018.

  3. arXiv:1803.07211  [pdf, other

    cs.CR

    DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

    Authors: Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan

    Abstract: Copresence verification based on context can improve usability and strengthen security of many authentication and access control systems. By sensing and comparing their surroundings, two or more devices can tell whether they are copresent and use this information to make access control decisions. To the best of our knowledge, all context-based copresence verification mechanisms to date are suscept… ▽ More

    Submitted 18 February, 2019; v1 submitted 19 March, 2018; originally announced March 2018.

  4. Sensor-based Proximity Detection in the Face of Active Adversaries

    Authors: Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan

    Abstract: Contextual proximity detection (or, co-presence detection) is a promising approach to defend against relay attacks in many mobile authentication systems. We present a systematic assessment of co-presence detection in the presence of a context-manipulating attacker. First, we show that it is feasible to manipulate, consistently control and stabilize the readings of different acoustic and physical e… ▽ More

    Submitted 4 April, 2021; v1 submitted 3 November, 2015; originally announced November 2015.

    Journal ref: IEEE Transactions on Mobile Computing ( Volume: 18, Issue: 2, Feb. 1 2019)

  5. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators

    Authors: Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya

    Abstract: There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,0… ▽ More

    Submitted 27 February, 2014; v1 submitted 11 December, 2013; originally announced December 2013.

    ACM Class: D.4.6

  6. arXiv:1012.1131  [pdf, ps, other

    cs.DC

    A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

    Authors: Hien Thi Thu Truong, Claudia-Lavinia Ignat

    Abstract: Nowadays we are faced with an increasing popularity of social software including wikis, blogs, micro-blogs and online social networks such as Facebook and MySpace. Unfortunately, the mostly used social services are centralized and personal information is stored at a single vendor. This results in potential privacy problems as users do not have much control over how their private data is disseminat… ▽ More

    Submitted 6 December, 2010; originally announced December 2010.