Skip to main content

Showing 1–8 of 8 results for author: Pekaric, I

Searching in archive cs. Search in all archives.
.
  1. Understanding the Process of Data Labeling in Cybersecurity

    Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese

    Abstract: Many domains now leverage the benefits of Machine Learning (ML), which promises solutions that can autonomously learn to solve complex tasks by training over some data. Unfortunately, in cyberthreat detection, high-quality data is hard to come by. Moreover, for some specific applications of ML, such data must be labeled by human operators. Many works "assume" that labeling is tough/challenging/cos… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  2. arXiv:2310.00654  [pdf, other

    cs.CR cs.IR

    Streamlining Attack Tree Generation: A Fragment-Based Approach

    Authors: Irdin Pekaric, Markus Frick, Jubril Gbolahan Adigun, Raffaela Groner, Thomas Witte, Alexander Raschke, Michael Felderer, Matthias Tichy

    Abstract: Attack graphs are a tool for analyzing security vulnerabilities that capture different and prospective attacks on a system. As a threat modeling tool, it shows possible paths that an attacker can exploit to achieve a particular goal. However, due to the large number of vulnerabilities that are published on a daily basis, they have the potential to rapidly expand in size. Consequently, this necessi… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

    Comments: To appear at the 57th Hawaii International Conference on Social Systems (HICSS-57), Honolulu, Hawaii. 2024

  3. Model-Based Generation of Attack-Fault Trees

    Authors: Raffaela Groner, Thomas Witte, Alexander Raschke, Sophie Hirn, Irdin Pekaric, Markus Frick, Matthias Tichy, Michael Felderer

    Abstract: Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security. Manually creating a complete AFT for the whole system is, however, a daunting task.… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  4. arXiv:2309.09653  [pdf, other

    cs.CR cs.FL cs.RO cs.SE

    Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis

    Authors: Thomas Witte, Raffaela Groner, Alexander Raschke, Matthias Tichy, Irdin Pekaric, Michael Felderer

    Abstract: Self-adaptive systems offer several attack surfaces due to the communication via different channels and the different sensors required to observe the environment. Often, attacks cause safety to be compromised as well, making it necessary to consider these two aspects together. Furthermore, the approaches currently used for safety and security analysis do not sufficiently take into account the inte… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  5. arXiv:2309.09649  [pdf, other

    cs.CR cs.LG cs.SE

    VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries

    Authors: Irdin Pekaric, Michael Felderer, Philipp Steinmüller

    Abstract: The identification of vulnerabilities is a continuous challenge in software projects. This is due to the evolution of methods that attackers employ as well as the constant updates to the software, which reveal additional issues. As a result, new and innovative approaches for the identification of vulnerable software are needed. In this paper, we present VULNERLIZER, which is a novel framework for… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  6. Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles Using the Gazebo Simulator

    Authors: Irdin Pekaric, David Arnold, Michael Felderer

    Abstract: Conducting safety simulations in various simulators, such as the Gazebo simulator, became a very popular means of testing vehicles against potential safety risks (i.e. crashes). However, this was not the case with security testing. Performing security testing in a simulator is very difficult because security attacks are performed on a different abstraction level. In addition, the attacks themselve… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  7. Applying Security Testing Techniques to Automotive Engineering

    Authors: Irdin Pekaric, Clemens Sauerwein, Michael Felderer

    Abstract: The openness of modern IT systems and their permanent change make it challenging to keep these systems secure. A combination of regression and security testing called security regression testing, which ensures that changes made to a system do not harm its security, are therefore of high significance and the interest in such approaches has steadily increased. In this article we present a systematic… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  8. arXiv:2204.13793  [pdf, other

    cs.CR

    Towards Understanding the Skill Gap in Cybersecurity

    Authors: Francois Goupil, Pavel Laskov, Irdin Pekaric, Michael Felderer, Alexander Dürr, Frederic Thiesse

    Abstract: Given the ongoing "arms race" in cybersecurity, the shortage of skilled professionals in this field is one of the strongest in computer science. The currently unmet staffing demand in cybersecurity is estimated at over 3 million jobs worldwide. Furthermore, the qualifications of the existing workforce are largely believed to be insufficient. We attempt to gain deeper insights into the nature of th… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.