Skip to main content

Showing 1–50 of 62 results for author: Buchanan, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.08701  [pdf, other

    cs.CR

    Review of Generative AI Methods in Cybersecurity

    Authors: Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras

    Abstract: Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more prevalent in everyday use. These advancements strengthen cybersecurity's defensive posture and open up new attack avenues for adversaries as well. Thi… ▽ More

    Submitted 19 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: 40 pages

  2. arXiv:2403.05275  [pdf, other

    cs.CR cs.CY

    vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election

    Authors: Se Elnour, William J Buchanan, Paul Keating, Mwrwan Abubakar, Sirag Elnour

    Abstract: The vSPACE experimental proof-of-concept (PoC) on the TrueElect[Anon][Creds] protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and ElectAnon protocols with the integration of AnonCreds SSI (Self-Sovereign Identity). Such a protocol PoC is situated within a Zero-Trust Architecture (ZTA) and leverages confidential computing, continuous authenticat… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2403.05271  [pdf, other

    cs.CR

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb

    Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification metho… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  4. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  5. arXiv:2401.07691  [pdf, other

    cs.CR

    Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode

    Authors: William J Buchanan, Sam Grierson, Daniel Uribe

    Abstract: Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could lead to privacy breaches of data protection laws. Along with this, there have been several recent data breaches related to the leak of DNA informatio… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  6. arXiv:2401.04707  [pdf, other

    cs.CR

    RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  7. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  8. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  9. arXiv:2310.04898  [pdf, other

    cs.CR

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl

    Abstract: Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Inte… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  10. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  11. arXiv:2308.15009  [pdf, ps, other

    cs.CR

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Authors: Sam Grierson, Konstantinos Chalkias, William J Buchanan, Leandros Maglaras

    Abstract: EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This pap… ▽ More

    Submitted 10 October, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  12. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  13. arXiv:2305.18852  [pdf, other

    cs.CR

    Majority Voting Approach to Ransomware Detection

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 17 pages

  14. arXiv:2303.14785  [pdf, ps, other

    cs.CR

    Review of the NIST Light-weight Cryptography Finalists

    Authors: William J Buchanan, Leandros Maglaras

    Abstract: Since 2016, NIST has been assessing lightweight encryption methods, and, in 2022, NIST published the final 10: ASCON, Elephant, GIFT-COFB, Grain128-AEAD, ISAP, Photon-Beetle, Romulus, Sparkle, TinyJambu, and Xoodyak. At the time that the article was written, NISC announced ASCOn as the chosen method that will be published as NIST'S lightweight cryptography standard later in 2023. In this article,… ▽ More

    Submitted 28 March, 2023; v1 submitted 26 March, 2023; originally announced March 2023.

    Comments: 6 pages

  15. arXiv:2302.08498  [pdf

    cs.CR cs.LG

    An Omnidirectional Approach to Touch-based Continuous Authentication

    Authors: Peter Aaby, Mario Valerio Giuffrida, William J Buchanan, Zhiyuan Tan

    Abstract: This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often focus on gathering data, tuning classifiers, and enhancing performance by evaluating touch interactions in a sequence rather than independently. Howev… ▽ More

    Submitted 13 January, 2023; originally announced February 2023.

  16. Towards The Creation Of The Future Fish Farm

    Authors: Pavlos Papadopoulos, William J Buchanan, Sarwar Sayeed, Nikolaos Pitropakis

    Abstract: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake of protein attributed to seafood. Along with this, there are significant opportunities within the fish farming industry for economic development. Determinin… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Journal ref: Security and Safety, 3(4), 174-186 (2022)

  17. arXiv:2212.08035  [pdf, other

    cs.CR

    Hamming Distributions of Popular Perceptual Hashing Techniques

    Authors: Sean McKeown, William J Buchanan

    Abstract: Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechanism for facilitating detection, allowing for machines to approximately match visual features of an image or video in a robust manner. However, there d… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Journal ref: DFRWS (Digital Forensics Research Conference) EU 2023, 21-24 March 2023, Bonn, Germany

  18. arXiv:2212.03218  [pdf, other

    cs.CR

    Transforming EU Governance: The Digital Integration through EBSI and GLASS

    Authors: Dimitrios Kasimatis, William J Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel

    Abstract: Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital era offers a shift towards unique digital identifiers for each citizen, enabling a 'citizen wallet' for easier access to personal documents like acade… ▽ More

    Submitted 19 April, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

  19. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  20. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

    Authors: Simon R Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: Entropy. 2022; 24(10):1503

  21. arXiv:2206.05229  [pdf, other

    cs.LG

    Measuring the Carbon Intensity of AI in Cloud Instances

    Authors: Jesse Dodge, Taylor Prewitt, Remi Tachet Des Combes, Erika Odmark, Roy Schwartz, Emma Strubell, Alexandra Sasha Luccioni, Noah A. Smith, Nicole DeCario, Will Buchanan

    Abstract: By providing unprecedented access to computational resources, cloud computing has enabled rapid growth in technologies such as machine learning, the computational demands of which incur a high energy cost and a commensurate carbon footprint. As a result, recent scholarship has called for better estimates of the greenhouse gas impact of AI: data scientists today do not have easy or reliable access… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

    Comments: In ACM Conference on Fairness, Accountability, and Transparency (ACM FAccT) 2022

  22. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

    Authors: Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas

    Abstract: E-governance is a process that aims to enhance a government's ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the establishment of an e-Governance model. There is often a need for an inclusive e-governance model with integrated multiactor governance services and where… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Sensors 2022, 22(6), 2291; https://doi.org/10.3390/s22062291

  23. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  24. NapierOne: A modern mixed file data set alternative to Govdocs1

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other researchers interested in reconstructing their environment and validating the research results. A modern cybersecurity mixed file data set called NapierOne… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817

  25. arXiv:2112.12232  [pdf, other

    cs.CR

    Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

    Authors: Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo

    Abstract: Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upo… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Journal ref: 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)

  26. arXiv:2112.10124  [pdf, other

    cs.CR

    Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

    Authors: Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J Buchanan

    Abstract: The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 morbidity, relieve pressure on healthcare systems, and allow economies to open. As a way forward after the COVID-19 vaccination, the Vaccination certif… ▽ More

    Submitted 21 December, 2021; v1 submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021 (14th International Conference on Security of Information and Networks)

  27. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  28. arXiv:2112.02855  [pdf, other

    cs.CR cs.CY

    PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

    Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo

    Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructure may include the Citizen, a Testing Centre (TC), a Health Authority (HA), and a Government Authority (GA). Typically, these different domains need to… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Journal ref: IEEE SIN 2021

  29. arXiv:2112.01815  [pdf, other

    cs.CR

    A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

    Authors: Masoud Barati, William J. Buchanan, Owen Lo, Omer Rana

    Abstract: Digital vaccine passports are one of the main solutions which would allow the restart of travel in a post COVID-19 world. Trust, scalability and security are all key challenges one must overcome in implementing a vaccine passport. Initial approaches attempt to solve this problem by using centralised systems with trusted authorities. However, sharing vaccine passport data between different organisa… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Journal ref: CloudAM: 10th International Workshop on Cloud and Edge Computing, and Applications Management, 2021

  30. arXiv:2110.01970  [pdf

    cs.CR

    Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

    Authors: Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J Buchanan

    Abstract: Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from two privacy focused mixing services namely Obscuro which uses the secure enclave on intel chips to provide enhanced confidentiality and Wasabi wallet wh… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)

  31. arXiv:2109.08566  [pdf, other

    cs.CR cs.CY cs.DC

    GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

    Authors: Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos Karacapilidis, Dimitris Tsakalidis, Dimitris Tsolis

    Abstract: The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation it has broadened the attack surface and made them a popular target for cyber attacks. eGovernance services utilize internet, which is currently a location addressed system where whoever controls the location controls not only the… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: To be published in the proceedings of the 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021

  32. Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

    Authors: Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo

    Abstract: Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosys… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: 20 pages

    Report number: Volume 11 Number 09

    Journal ref: 10th international conference on Cryptography and Information Security 2021

  33. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain only two courses of action open to them; either pay the ransom or lose their data. One common behaviour shared between all crypto ransomware strains is… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Journal ref: Computers & Security, 102377, 2021

  34. arXiv:2104.12426  [pdf, other

    cs.LG cs.CR cs.NI

    Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

    Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan

    Abstract: As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defending approaches are no longer sufficient to detect both known and unknown attacks to high accuracy. Machine learning intrusion detection systems have… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://www.mdpi.com/2624-800X/1/2/14

    Journal ref: J. Cybersecur. Priv. 2021, 1(2), 252-273

  35. arXiv:2103.15753  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Privacy and Trust Redefined in Federated Machine Learning

    Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

    Abstract: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring th… ▽ More

    Submitted 30 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://doi.org/10.3390/make3020017

    Journal ref: Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356

  36. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

    Authors: Andrew Churcher, Rehmat Ullah, Jawad Ahmad, Sadaqat ur Rehman, Fawad Masood, Mandar Gogate, Fehaid Alqahtani, Boubakr Nour, William J. Buchanan

    Abstract: In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

    Journal ref: Sensors. 2021; 21(2):446

  37. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

    Authors: Simon R. Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by com… ▽ More

    Submitted 19 December, 2020; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: 11 pages, 10 figures

    ACM Class: E.3; K.6.5

    Journal ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979

  38. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

    Authors: Charalampos Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis Katsikas, William J Buchanan

    Abstract: Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common security attack vectors. However, healthcare-oriented blockchain solutions can provide a decentralized, anonymous and secure EHR handling approach. This… ▽ More

    Submitted 27 January, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: MDPI Sensors (This article belongs to the Special Issue Security, Trust and Privacy in New Computing Environments) URL: https://www.mdpi.com/1424-8220/20/22/6587

    Journal ref: Sensors 2020, 20(22), 6587

  39. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

    Authors: William J Buchanan, Muhammad Ali Imran, Masood Ur-Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes, Nikolaos Pitropakis, Pavlos Papadopoulos

    Abstract: The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways where carriers of disease could be tracked and their contacts traced. These are generalized methods developed either in a distributed manner giving ci… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

  40. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

    Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan

    Abstract: The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of the growing spread of misinformation and disinformation intentionally or unintentionally by individuals and organizations. This trend has grave politica… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1812.00315, arXiv:1807.06346, arXiv:1904.05386 by other authors

    Journal ref: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2020, pp. 1-3

  41. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

    Authors: Zakwan Jaroucheh, Baraq Ghaleb, William J Buchanan

    Abstract: The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its corresponding software architecture. This protocol leverages two ideas: 1) the proof-of-stake concept to dynamically form stake proportionate consensus groups… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Journal ref: IEEE Conference on Software Architecture Companion, 143-150, 2020

  42. Privacy Preserving Passive DNS

    Authors: Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis Katsikas

    Abstract: The Domain Name System (DNS) was created to resolve the IP addresses of the web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors. The passive DNS data collection process creates a database containing various DNS data elements, some of… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Journal ref: Computers 2020, 9, 64

  43. Decentralized Accessibility of e-commerce Products through Blockchain Technology

    Authors: Gulshan Kumara, Rahul Sahaa, William J Buchanan, G. Geethaa, Reji Thomasa, Tai-Hoon Kimc, Mamoun Alazab

    Abstract: A distributed and transparent ledger system is considered for various e-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This solution, named as 'PRODCHAIN', is a generic blockchain framework with lattice-based cryptographic processes for reducing the complexity for tracing the e-comme… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Journal ref: Sustainable Cities and Society, 102361 (2020)

  44. Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

    Authors: Will Abramson, Nicole E. van Deursen, William J Buchanan

    Abstract: A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes precious time out of a healthcare professional's day. Time that could have been spent focused on patient care. In the midst of the COVID-19 crisis, i… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Journal ref: Blockchain in Healthcare Today, 3 (2020)

  45. arXiv:2006.02456  [pdf, other

    cs.CR cs.CY cs.DC cs.GT cs.LG

    A Distributed Trust Framework for Privacy-Preserving Machine Learning

    Authors: Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

    Abstract: When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. Privacy-preserving techniques distribute computation in order to ensure that data r… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: To be published in the proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020

    Report number: TrustBus 2020, LNCS 12395, pp. 205--220, 2020 MSC Class: 68M25 ACM Class: C.2.0

    Journal ref: 17th International Conference TrustBus 2020

  46. arXiv:2006.00928  [pdf, ps, other

    cs.DC

    Fast Probabilistic Consensus with Weighted Votes

    Authors: Sebastian Müller, Andreas Penzkofer, Bartosz Kuśmierz, Darcy Camargo, William J. Buchanan

    Abstract: The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model the reputation using a Zipf law and show using simulations that the performance of the protocol in Byzantine infrastructure increases with the Zipf exp… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Report number: Conference: FTC 2020 - Future Technologies Conference 2020

  47. BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond

    Authors: Hao Xu, Lei Zhang, Oluwakayode Onireti, Yang Fang, William Bill Buchanan, Muhammad Ali Imran

    Abstract: The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on privacy issues has been a bottleneck to the existing solutions, which is significantly affecting the uptake of contact tracing applications across the… ▽ More

    Submitted 21 December, 2021; v1 submitted 20 May, 2020; originally announced May 2020.

  48. arXiv:2005.06599  [pdf, other

    cs.CR cs.CY cs.LG

    Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

    Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

    Abstract: Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be aware of the URL of the website they are visiting. Traditional detection methods rely on blocklists and content analysis, both of which require time-cons… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: In Proceedings of the 6th ICISSP

    MSC Class: 68-06

    Journal ref: ICISSP, Volume 1, pages 289-298 (2020)

  49. Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

    Authors: Ian Lowe, William J Buchanan, Richard J Macfarlane, Owen Lo

    Abstract: Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car entertainment systems. Since its introduction in 2001, security researchers have suggested that the protocol is weak, and prone to a variety of attacks against its authentication, link management and encryption schemes. Key research… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Journal ref: Journal of Network Technology, 2019

  50. An authentication protocol based on chaos and zero knowledge proof

    Authors: Will Major, William J Buchanan, Jawad Ahmad

    Abstract: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a nove… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: J. Nonlinear Dyn (2020)