Skip to main content

Showing 1–10 of 10 results for author: Njilla, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.09669  [pdf, other

    cs.CR

    SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

    Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla

    Abstract: Modern smart home control systems utilize real-time occupancy and activity monitoring to ensure control efficiency, occupants' comfort, and optimal energy consumption. Moreover, adopting machine learning-based anomaly detection models (ADMs) enhances security and reliability. However, sufficient system knowledge allows adversaries/attackers to alter sensor measurements through stealthy false data… ▽ More

    Submitted 27 April, 2023; originally announced May 2023.

    Comments: 13 Pages, 2023 IEE/IFIP DSN Conference

  2. arXiv:2303.12367  [pdf, other

    cs.CR cs.LG math.OC

    AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices

    Authors: Volviane Saphir Mfogo, Alain Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles Kamhoua

    Abstract: The proliferation of the Internet of Things (IoT) has raised concerns about the security of connected devices. There is a need to develop suitable and cost-efficient methods to identify vulnerabilities in IoT devices in order to address them before attackers seize opportunities to compromise them. The deception technique is a prominent approach to improving the security posture of IoT systems. Hon… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

    Comments: 7 pages, 7 figures

  3. arXiv:1908.04507  [pdf, other

    cs.CR

    A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses

    Authors: Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu

    Abstract: The blockchain technology is believed by many to be a game changer in many application domains, especially financial applications. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency purposes, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

    Comments: 29 pages

  4. arXiv:1904.03487  [pdf, other

    cs.CR

    Exploring the Attack Surface of Blockchain: A Systematic Overview

    Authors: Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

    Abstract: In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we ou… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

  5. arXiv:1811.09943  [pdf, other

    cs.CR

    Countering Selfish Mining in Blockchains

    Authors: Muhammad Saad, Laurent Njilla, Charles Kamhoua, Aziz Mohaisen

    Abstract: Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block rewards. In this paper, we explore a new form of selfish mining attack that guarantees high rewards with low cost. We show the feasibility of this attack facilitated by recent developments in blockchain technology opening new attack avenues. By outlining the limitations of existing countermeasures, we hi… ▽ More

    Submitted 17 December, 2018; v1 submitted 24 November, 2018; originally announced November 2018.

    Comments: International Workshop on Computing, Networking and Communications (CNC 2019)

  6. arXiv:1810.09438  [pdf, other

    cs.DC cs.CR

    Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs)

    Authors: Amro Awad, Laurent Njilla, Mao Ye

    Abstract: Emerging Non-Volatile Memories (NVMs) are promising contenders for building future memory systems. On the other side, unlike DRAM systems, NVMs can retain data even after power loss and thus enlarge the attack surface. While data encryption and integrity verification have been proposed earlier for DRAM systems, protecting and recovering secure memories becomes more challenging with persistent memo… ▽ More

    Submitted 20 October, 2018; originally announced October 2018.

    Comments: This paper is currently under submission. We arXiv our paper to establish credit for inventing this work

  7. Enabling Cooperative IoT Security via Software Defined Networks (SDN)

    Authors: Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles Kamhoua, Kevin Kwiat

    Abstract: Internet of Things (IoT) is becoming an increasingly attractive target for cybercriminals. We observe that many attacks to IoTs are launched in a collusive way, such as brute-force hacking usernames and passwords, to target at a particular victim. However, most of the time our defending mechanisms to such kind of attacks are carried out individually and independently, which leads to ineffective an… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: IEEE ICC 2018

    Journal ref: 2018 IEEE International Conference on Communications (ICC)

  8. arXiv:1802.05832  [pdf, other

    cs.IT

    A Reputation-based Stackelberg Game Model to Enhance Secrecy Rate in Spectrum Leasing to Selfish IoT Devices

    Authors: Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles Kamhoua

    Abstract: The problem of cooperative spectrum leasing to unlicensed Internet of Things (IoT) devices is studied to account for potential selfish behavior of these devices. A distributed game theoretic framework for spectrum leasing is proposed where the licensed users can willingly lease a portion of their spectrum access to unlicensed IoT devices, and in return the IoT devices provide cooperative services,… ▽ More

    Submitted 15 February, 2018; originally announced February 2018.

    Comments: 6 Pages, IEEE INFOCOM Workshop on Advances in Software Defined and Context Aware Cognitive Networks 2018

  9. arXiv:1702.00552  [pdf, other

    cs.CR

    Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

    Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: Threat intelligence sharing has become a growing concept, whereby entities can exchange patterns of threats with each other, in the form of indicators, to a community of trust for threat analysis and incident response. However, sharing threat-related information have posed various risks to an organization that pertains to its security, privacy, and competitiveness. Given the coinciding benefits an… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.

  10. arXiv:1702.00548  [pdf, other

    cs.CR

    Rethinking Information Sharing for Actionable Threat Intelligence

    Authors: Aziz Mohaisen, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla

    Abstract: In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introduc- ing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators ar… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.