Skip to main content

Showing 1–10 of 10 results for author: Moonsamy, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.13773  [pdf, other

    cs.CR

    Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces

    Authors: Philipp Mackensen, Paul Staat, Stefan Roth, Aydin Sezgin, Christof Paar, Veelasha Moonsamy

    Abstract: Today, we rely heavily on the constant availability of wireless communication systems. As a result, wireless jamming continues to prevail as an imminent threat: Attackers can create deliberate radio interference to overshadow desired signals, leading to denial of service. Although the broadcast nature of radio signal propagation makes such an attack possible in the first place, it likewise poses a… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  2. arXiv:2308.04887  [pdf, other

    cs.CY cs.CR cs.LG

    Targeted and Troublesome: Tracking and Advertising on Children's Websites

    Authors: Zahra Moti, Asuman Senol, Hamid Bostani, Frederik Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar

    Abstract: On the modern web, trackers and advertisers frequently construct and monetize users' detailed behavioral profiles without consent. Despite various studies on web tracking mechanisms and advertisements, there has been no rigorous study focusing on websites targeted at children. To address this gap, we present a measurement of tracking and (targeted) advertising on websites directed at children. Mot… ▽ More

    Submitted 10 December, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: To appear at 45th IEEE Symposium on Security and Privacy, May 20-23 2024

  3. arXiv:2205.15128  [pdf, other

    cs.LG cs.CR

    Level Up with RealAEs: Leveraging Domain Constraints in Feature Space to Strengthen Robustness of Android Malware Detection

    Authors: Hamid Bostani, Zhengyu Zhao, Zhuoran Liu, Veelasha Moonsamy

    Abstract: The vulnerability to adversarial examples remains one major obstacle for Machine Learning (ML)-based Android malware detection. Realistic attacks in the Android malware domain create Realizable Adversarial Examples (RealAEs), i.e., AEs that satisfy the domain constraints of Android malware. Recent studies have shown that using such RealAEs in Adversarial Training (AT) is more effective in defendin… ▽ More

    Submitted 11 June, 2023; v1 submitted 30 May, 2022; originally announced May 2022.

  4. arXiv:2112.01967  [pdf, other

    cs.CR

    IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing

    Authors: Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Markus Heinrichs, Rainer Kronberger, Aydin Sezgin, Christof Paar

    Abstract: Wireless radio channels are known to contain information about the surrounding propagation environment, which can be extracted using established wireless sensing methods. Thus, today's ubiquitous wireless devices are attractive targets for passive eavesdroppers to launch reconnaissance attacks. In particular, by overhearing standard communication signals, eavesdroppers obtain estimations of wirele… ▽ More

    Submitted 7 April, 2022; v1 submitted 3 December, 2021; originally announced December 2021.

  5. EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection

    Authors: Hamid Bostani, Veelasha Moonsamy

    Abstract: Over the last decade, researchers have extensively explored the vulnerabilities of Android malware detectors to adversarial examples through the development of evasion attacks; however, the practicality of these attacks in real-world scenarios remains arguable. The majority of studies have assumed attackers know the details of the target classifiers used for malware detection, while in reality, ma… ▽ More

    Submitted 25 January, 2024; v1 submitted 7 October, 2021; originally announced October 2021.

    Comments: The paper was accepted by Elsevier Computers & Security on 20 December 2023

    Journal ref: Computers & Security, Volume 139, 2024

  6. arXiv:2009.04274  [pdf, other

    cs.CR

    Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code

    Authors: Carlo Meijer, Veelasha Moonsamy, Jos Wetzels

    Abstract: The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security-evaluation efforts. In-depth security analysis requires locating and classifying the algorithm in often very large binary images, thus rendering manu… ▽ More

    Submitted 15 October, 2020; v1 submitted 9 September, 2020; originally announced September 2020.

    Comments: A proof-of-concept implementation can be found at https://github.com/wheres-crypto/wheres-crypto

    MSC Class: 68M25 ACM Class: E.3

  7. arXiv:2007.08319  [pdf, other

    cs.CR cs.LG

    Less is More: A privacy-respecting Android malware classifier using Federated Learning

    Authors: Rafa Gálvez, Veelasha Moonsamy, Claudia Diaz

    Abstract: In this paper we present LiM ("Less is More"), a malware classification framework that leverages Federated Learning to detect and classify malicious apps in a privacy-respecting manner. Information about newly installed apps is kept locally on users' devices, so that the provider cannot infer which apps were installed by users. At the same time, input from all users is taken into account in the fe… ▽ More

    Submitted 16 June, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: 21 pages, 8 figures, accepted in PoPETS 2021.4

  8. arXiv:1901.10794  [pdf, other

    cs.CY cs.CR

    Malicious cryptocurrency miners: Status and Outlook

    Authors: Radhesh Krishnan Konoth, Rolf van Wegberg, Veelasha Moonsamy, Herbert Bos

    Abstract: In this study, we examine the behavior and profitability of modern malware that mines cryptocurrency. Unlike previous studies, we look at the cryptocurrency market as a whole, rather than just Bitcoin. We not only consider PCs, but also mobile phones, and IoT devices. In the past few years, criminals have attacked all these platforms for the purpose of cryptocurrency mining. The question is: how m… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

  9. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

    Authors: Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard

    Abstract: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) application is all it takes to exploit the leaking information on modern mobile devices. Giv… ▽ More

    Submitted 6 December, 2017; v1 submitted 11 November, 2016; originally announced November 2016.

  10. arXiv:1609.02750  [pdf, other

    cs.CR

    No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices

    Authors: Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran

    Abstract: More and more people are regularly using mobile and battery-powered handsets, such as smartphones and tablets. At the same time, thanks to the technological innovation and to the high user demands, those devices are integrating extensive functionalities and developers are writing battery-draining apps, which results in a surge of energy consumption of these devices. This scenario leads many people… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

    Comments: 10 pages, 14 figures