Skip to main content

Showing 1–20 of 20 results for author: Hankin, C

Searching in archive cs. Search in all archives.
.
  1. Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool

    Authors: Przemysław Buczkowski, Pasquale Malacaria, Chris Hankin, Andrew Fielder

    Abstract: CySecTool is a tool that finds a cost-optimal security controls portfolio in a given budget for a probabilistic attack graph. A portfolio is a set of counter-measures, or controls, against vulnerabilities adopted for a computer system, while an attack graph is a type of a threat scenario model. In an attack graph, nodes are privilege states of the attacker, edges are vulnerabilities escalating pri… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

    Comments: 10 pages, 6 figures, SaT-CPS '22 conference

    ACM Class: K.6.5; J.7; G.1.6; G.2.2

  2. arXiv:2112.10525  [pdf, other

    cs.LG cs.CR

    Certified Federated Adversarial Training

    Authors: Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Sergio Maffeis, Chris Hankin

    Abstract: In federated learning (FL), robust aggregation schemes have been developed to protect against malicious clients. Many robust aggregation schemes rely on certain numbers of benign clients being present in a quorum of workers. This can be hard to guarantee when clients can join at will, or join based on factors such as idle system status, and connected to power and WiFi. We tackle the scenario of se… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: First presented at the 1st NeurIPS Workshop on New Frontiers in Federated Learning (NFFL 2021)

  3. arXiv:2007.08255  [pdf, other

    cs.CR cs.DM cs.LO cs.NI eess.SY

    MaxSAT Evaluation 2020 -- Benchmark: Identifying Maximum Probability Minimal Cut Sets in Fault Trees

    Authors: Martín Barrère, Chris Hankin

    Abstract: This paper presents a MaxSAT benchmark focused on the identification of Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We address the MPMCS problem by transforming the input fault tree into a weighted logical formula that is then used to build and solve a Weighted Partial MaxSAT problem. The benchmark includes 80 cases with fault trees of different size and composition as well as th… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 5 pages, 1 figure. To appear in Proceedings of the MaxSAT Evaluation 2020 (MSE'20). https://maxsat-evaluations.github.io/2020/

    MSC Class: 68M15; 05C05; 94C15; 68R10; 90B25; 93B20; 90C27; 90C35; 68U07; 03B05 ACM Class: B.8; C.4; G.2.2; F.4.1; J.6; J.7; B.6.3; D.4.5; D.4.6; J.2

  4. arXiv:2006.14890  [pdf

    cs.CR cs.CY cs.RO eess.SY

    CyRes -- Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract)

    Authors: Carsten Maple, Peter Davies, Kerstin Eder, Chris Hankin, Greg Chance, Gregory Epiphaniou

    Abstract: Existing approaches to cyber security and regulation in the automotive sector cannot achieve the quality of outcome necessary to ensure the safe mass deployment of advanced vehicle technologies and smart mobility systems. Without sustainable resilience hard-fought public trust will evaporate, derailing emerging global initiatives to improve the efficiency, safety and environmental impact of future… ▽ More

    Submitted 3 July, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    Comments: 7 pages, extended abstract

    ACM Class: K.4.4; K.6.5

  5. arXiv:2005.03003  [pdf, other

    cs.AI cs.CR cs.DM cs.LO cs.NI eess.SY

    Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT

    Authors: Martín Barrère, Chris Hankin

    Abstract: In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient.

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), Fast Abstracts Track, 2020

    MSC Class: 68M15; 05C05; 94C15; 68R10; 90B25; 93B20; 90C27; 90C35; 68U07; 03B05 ACM Class: B.8; C.4; G.2.2; F.4.1; J.6; J.7; B.6.3; D.4.5; D.4.6; J.2

  6. arXiv:1911.09404  [pdf, other

    cs.CR cs.NI eess.SY

    Assessing Cyber-Physical Security in Industrial Control Systems

    Authors: Martín Barrère, Chris Hankin, Demetrios G. Eliades, Nicolas Nicolau, Thomas Parisini

    Abstract: Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical components are therefore essential. AND/OR graphs have proven very useful in this context as they are able to semantically grasp intricate logical interdependenc… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: 10 pages, 10 figures. Keywords: security metrics, cyber-physical security, AND-OR graphs, hypergraphs, MAX-SAT resolution, ICS, CPS

    Journal ref: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), pp. 49-58 (2019)

  7. Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems

    Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones

    Abstract: Neural networks are increasingly used for intrusion detection on industrial control systems (ICS). With neural networks being vulnerable to adversarial examples, attackers who wish to cause damage to an ICS can attempt to hide their attacks from detection by using adversarial example techniques. In this work we address the domain specific challenges of constructing such attacks against autoregress… ▽ More

    Submitted 3 October, 2021; v1 submitted 8 November, 2019; originally announced November 2019.

    Comments: Accepted at the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

  8. arXiv:1911.00516  [pdf, other

    cs.CR cs.NI eess.SY

    MaxSAT Evaluation 2019 -- Benchmark: Identifying Security-Critical Cyber-Physical Components in Weighted AND/OR Graphs

    Authors: Martín Barrère, Chris Hankin, Nicolas Nicolau, Demetrios G. Eliades, Thomas Parisini

    Abstract: This paper presents a MaxSAT benchmark focused on identifying critical nodes in AND/OR graphs. We use AND/OR graphs to model Industrial Control Systems (ICS) as they are able to semantically grasp intricate logical interdependencies among ICS components. However, identifying critical nodes in AND/OR graphs is an NP-complete problem. We address this problem by efficiently transforming the input AND… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1905.04796

  9. arXiv:1910.03916  [pdf, other

    cs.LG stat.ML

    Deep Latent Defence

    Authors: Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones

    Abstract: Deep learning methods have shown state of the art performance in a range of tasks from computer vision to natural language processing. However, it is well known that such systems are vulnerable to attackers who craft inputs in order to cause misclassification. The level of perturbation an attacker needs to introduce in order to cause such a misclassification can be extremely small, and often imper… ▽ More

    Submitted 27 September, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

  10. arXiv:1905.04796  [pdf, other

    cs.CR cs.NI eess.SY

    Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems

    Authors: Martín Barrère, Chris Hankin, Nicolas Nicolau, Demetrios G. Eliades, Thomas Parisini

    Abstract: In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks, having massive destructive consequences. Security metrics are therefore essential to assess their security posture. In this paper, we present a novel ICS security metric based on AND/OR graphs that represent cyber-physical dependencies among network components. Our metric is able to efficiently ide… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Comments: Keywords: Security metrics, industrial control systems, cyber-physical systems, AND-OR graphs, MAX-SAT resolution

  11. arXiv:1811.00142  [pdf, other

    cs.CR

    Improving ICS Cyber Resilience through Optimal Diversification of Network Resources

    Authors: Tingting Li, Cheng Feng, Chris Hankin

    Abstract: Network diversity has been widely recognized as an effective defense strategy to mitigate the spread of malware. Optimally diversifying network resources can improve the resilience of a network against malware propagation. This work proposes an efficient method to compute such an optimal deployment, in the context of upgrading a legacy Industrial Control System with modern IT infrastructure. Our a… ▽ More

    Submitted 16 May, 2019; v1 submitted 31 October, 2018; originally announced November 2018.

  12. arXiv:1504.04357  [pdf, other

    cs.SI physics.soc-ph

    DEFENDER: Detecting and Forecasting Epidemics using Novel Data-analytics for Enhanced Response

    Authors: Donal Simmie, Nicholas Thapen, Chris Hankin

    Abstract: In recent years social and news media have increasingly been used to explain patterns in disease activity and progression. Social media data, principally from the Twitter network, has been shown to correlate well with official disease case counts. This fact has been exploited to provide advance warning of outbreak detection, tracking of disease levels and the ability to predict the likelihood of i… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

  13. arXiv:1504.02335  [pdf, other

    cs.SI

    The Early Bird Catches The Term: Combining Twitter and News Data For Event Detection and Situational Awareness

    Authors: Nicholas Thapen, Donal Simmie, Chris Hankin

    Abstract: Twitter updates now represent an enormous stream of information originating from a wide variety of formal and informal sources, much of which is relevant to real-world events. In this paper we adapt existing bio-surveillance algorithms to detect localised spikes in Twitter activity corresponding to real events with a high level of confidence. We then develop a methodology to automatically summaris… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.

  14. arXiv:1502.05532  [pdf, other

    cs.GT cs.CR

    Comparing Decision Support Approaches for Cyber Security Investment

    Authors: Andrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi

    Abstract: When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the tw… ▽ More

    Submitted 19 February, 2015; originally announced February 2015.

  15. A short note on Simulation and Abstraction

    Authors: Chris Hankin

    Abstract: This short note is written in celebration of David Schmidt's sixtieth birthday. He has now been active in the program analysis research community for over thirty years and we have enjoyed many interactions with him. His work on characterising simulations between Kripke structures using Galois connections was particularly influential in our own work on using probabilistic abstract interpretation… ▽ More

    Submitted 19 September, 2013; originally announced September 2013.

    Comments: In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557

    Journal ref: EPTCS 129, 2013, pp. 337-340

  16. arXiv:1301.0955  [pdf, other

    cs.DS cs.SI physics.soc-ph

    Fast Multi-Scale Community Detection based on Local Criteria within a Multi-Threaded Algorithm

    Authors: Erwan Le Martelot, Chris Hankin

    Abstract: Many systems can be described using graphs, or networks. Detecting communities in these networks can provide information about the underlying structure and functioning of the original systems. Yet this detection is a complex task and a large amount of work was dedicated to it in the past decade. One important feature is that communities can be found at several scales, or levels of resolution, indi… ▽ More

    Submitted 5 February, 2013; v1 submitted 5 January, 2013; originally announced January 2013.

    Comments: arXiv admin note: text overlap with arXiv:1204.1002

  17. arXiv:1204.1002  [pdf, other

    cs.DS cs.SI physics.soc-ph

    Fast Multi-Scale Detection of Relevant Communities

    Authors: Erwan Le Martelot, Chris Hankin

    Abstract: Nowadays, networks are almost ubiquitous. In the past decade, community detection received an increasing interest as a way to uncover the structure of networks by grou** nodes into communities more densely connected internally than externally. Yet most of the effective methods available do not consider the potential levels of organisation, or scales, a network may encompass and are therefore lim… ▽ More

    Submitted 6 June, 2012; v1 submitted 4 April, 2012; originally announced April 2012.

    Comments: 19 pages, 3 figures, 1 table, 4 algorithms

  18. arXiv:1201.4262  [pdf, ps, other

    cs.PL cs.DC

    Secondary use of data in EHR systems

    Authors: Fan Yang, Chris Hankin, Flemming Nielson, Hanne Riis Nielson

    Abstract: We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies - policies based on the future behavior of a program. A novel feature of our approach is that advice is able to analyze the future use of… ▽ More

    Submitted 20 January, 2012; originally announced January 2012.

    Comments: 40 pages

  19. arXiv:1201.3307  [pdf, other

    cs.DS cs.SI physics.soc-ph

    Multi-scale Community Detection using Stability Optimisation within Greedy Algorithms

    Authors: Erwan Le Martelot, Chris Hankin

    Abstract: Many real systems can be represented as networks whose analysis can be very informative regarding the original system's organisation. In the past decade community detection received a lot of attention and is now an active field of research. Recently stability was introduced as a new measure for partition quality. This work investigates stability as an optimisation criterion that exploits a Markov… ▽ More

    Submitted 16 January, 2012; originally announced January 2012.

    Comments: This paper is an extension of the paper named "Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm" by the same authors published in Proc. of the 2011 Int. Conf. on Knowledge Discovery and Information Retrieval (KDIR 2011), SciTePress, 2011, 216-225

  20. arXiv:0807.3879  [pdf, ps, other

    cs.CR cs.PL

    Quantifying Timing Leaks and Cost Optimisation

    Authors: Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky

    Abstract: We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of low variables. We then show how to measure the security of a program with respect to this notion via a computable estimate of the timing leakage and use this estimate for cost optimisation.

    Submitted 24 July, 2008; originally announced July 2008.

    Comments: 16 pages, 2 figures, 4 tables. A shorter version is included in the proceedings of ICICS'08 - 10th International Conference on Information and Communications Security, 20-22 October, 2008 Birmingham, UK