Skip to main content

Showing 1–30 of 30 results for author: Uluagac, A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.07623  [pdf, other

    cs.CR

    D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network

    Authors: Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe

    Abstract: While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this paper, we first propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. Exploiting various anonymity features of LN, we s… ▽ More

    Submitted 22 May, 2023; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Revised version based on anonymous reviewers' comments. Journal extension of https://doi.org/10.1007/978-3-030-59013-0_36

  2. arXiv:2109.14442  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues of UAVs

    Authors: Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam EL Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac

    Abstract: In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage rescue and parcel delivery will integrate smart cities in the future. Nowadays, the affordability of commercial drones expands its usage at a large scal… ▽ More

    Submitted 5 October, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

  3. arXiv:2108.02287  [pdf, other

    cs.CR

    A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

    Authors: Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac

    Abstract: The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health, transportation, manufacturing, infrastructure, and agriculture. However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities. Honeypots and… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  4. arXiv:2103.03851  [pdf, other

    cs.CR

    SoK: Cryptojacking Malware

    Authors: Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

    Abstract: Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware. Especially with re… ▽ More

    Submitted 26 April, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: EuroS&P 2021 Conference

  5. arXiv:2102.10695  [pdf, other

    cs.CR

    Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

    Authors: Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the-shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed by end-users looking to automate a small deployment. In contrast to these "plug-and-play" systems, purpose-built Enterprise Internet-of-… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

  6. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

    Authors: Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac

    Abstract: In recent years, ransomware has been one of the most notorious malware targeting end users, governments, and business organizations. It has become a very profitable business for cybercriminals with revenues of millions of dollars, and a very serious threat to organizations with financial loss of billions of dollars. Numerous studies were proposed to address the ransomware threat, including surveys… ▽ More

    Submitted 24 February, 2022; v1 submitted 11 February, 2021; originally announced February 2021.

    Comments: Accepted to ACM Computing Surveys

  7. arXiv:2010.05658  [pdf, other

    cs.CR

    PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings

    Authors: Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: 10 pages, BuildSys 2020

  8. arXiv:2010.03671  [pdf, other

    cs.LG cs.CR

    Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The increasing availability of healthcare data requires accurate analysis of disease diagnosis, progression, and realtime monitoring to provide improved treatments to the patients. In this context, Machine Learning (ML) models are used to extract valuable features and insights from high-dimensional and heterogeneous healthcare data to detect different diseases and patient activities in a Smart Hea… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, Accepted in IEEE Globecom 2020

  9. arXiv:2005.07359  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses

    Authors: AKM Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of the patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices (IMDs), body area networks (BANs), and Internet of… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

    Comments: Security of modern healthcare systems. submitted and under review. 40 pages, 3 figures, 4 tables

  10. arXiv:1912.10617  [pdf, other

    cs.CR

    LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit

    Authors: Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this paper, we propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. LN is a payment channel network operating on top of Bit… ▽ More

    Submitted 25 April, 2020; v1 submitted 22 December, 2019; originally announced December 2019.

  11. arXiv:1912.00533  [pdf, other

    cs.CR

    A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case

    Authors: Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to increase efficiency, enhance reliability, and reduce costs. However, compromised devices in the smart grid poses several se… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  12. arXiv:1911.10461  [pdf, other

    cs.CR cs.LG

    Real-time Analysis of Privacy-(un)aware IoT Applications

    Authors: Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Users trust IoT apps to control and automate their smart devices. These apps necessarily have access to sensitive data to implement their functionality. However, users lack visibility into how their sensitive data is used (or leaked), and they often blindly trust the app developers. In this paper, we present IoTWatcH, a novel dynamic analysis tool that uncovers the privacy risks of IoT apps in rea… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  13. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  14. arXiv:1910.11138  [pdf, other

    cs.CR

    A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerometer) and sensing-enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor Application Programming Interface (API). In this way,… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: Accepted in IEEE Transaction on Mobile Computing. arXiv admin note: substantial text overlap with arXiv:1706.10220

  15. arXiv:1910.03750  [pdf, other

    cs.CR

    Aegis: A Context-aware Security Framework for Smart Home Systems

    Authors: Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Our everyday lives are expanding fast with the introduction of new Smart Home Systems (SHSs). Today, a myriad of SHS devices and applications are widely available to users and have already started to re-define our modern lives. Smart home users utilize the apps to control and automate such devices. Users can develop their own apps or easily download and install them from vendor-specific app market… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Comments: Accepted in 2019 Annual Computer Security Applications Conference (ACSAC)

  16. arXiv:1910.02139  [pdf, other

    cs.CR

    HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

    Authors: Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: The High Definition Multimedia Interface (HDMI) is the de-facto standard for Audio/Video interfacing between video-enabled devices. Today, almost tens of billions of HDMI devices exist worldwide and are widely used to distribute A/V signals in smart homes, offices, concert halls, and sporting events making HDMI one of the most highly deployed systems in the world. An important component in HDMI is… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Comments: 10 Pages, ACSAC 2019, 8 Figures

  17. arXiv:1910.00508  [pdf, ps, other

    cs.CR

    An Analysis of Malware Trends in Enterprise Networks

    Authors: Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda

    Abstract: We present an empirical and large-scale analysis of malware samples captured from two different enterprises from 2017 to early 2018. Particularly, we perform threat vector, social-engineering, vulnerability and time-series analysis on our dataset. Unlike existing malware studies, our analysis is specifically focused on the recent enterprise malware samples. First of all, based on our analysis on t… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  18. arXiv:1909.10565  [pdf, other

    cs.CR

    HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The integration of Internet-of-Things and pervasive computing in medical devices have made the modern healthcare system "smart". Today, the function of the healthcare system is not limited to treat the patients only. With the help of implantable medical devices and wearables, Smart Healthcare System (SHS) can continuously monitor different vital signs of a patient and automatically detect and prev… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: Accepted to be appeared in The International Symposium on Health and Medical informatics, Management and Security (HMiMS 2019)

  19. arXiv:1812.05558  [pdf, other

    cs.CR

    U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

    Authors: Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

    Abstract: The ubiquitous nature of the IoT devices has brought serious security implications to its users. A lot of consumer IoT devices have little to no security implementation at all, thus risking user's privacy and making them target of mass cyber-attacks. Indeed, recent outbreak of Mirai botnet and its variants have already proved the lack of security on the IoT world. Hence, it is important to underst… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: International Performance Computing and Communications Conference

  20. Identification of Wearable Devices with Bluetooth

    Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley

    Abstract: With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (1) unauthorized wearable devices with correct credentials accessing valuable systems and networks, (2) passive insiders or outsider wearable devices,… ▽ More

    Submitted 27 September, 2018; originally announced September 2018.

    Comments: 15 pages, 10 figures

    Journal ref: IEEE Transactions on Sustainable Computing, 2018

  21. arXiv:1809.00745  [pdf, other

    cs.CR

    IoTDots: A Digital Forensics Framework for Smart Environments

    Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

    Abstract: IoT devices and sensors have been utilized in a cooperative manner to enable the concept of a smart environment. In these smart settings, abundant data is generated as a result of the interactions between devices and users' day-to-day activities. Such data contain valuable forensic information about events and actions occurring inside the smart environment and, if analyzed, may help hold those vio… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

  22. arXiv:1804.05106  [pdf, other

    cs.CR

    Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

    Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: The smart grid concept has transformed the traditional power grid into a massive cyber-physical system that depends on advanced two-way communication infrastructure to integrate a myriad of different smart devices. While the introduction of the cyber component has made the grid much more flexible and efficient with so many smart devices, it also broadened the attack surface of the power grid. Part… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: 6 Pages, Accepted for publication in International Conference on Communications

  23. arXiv:1802.10417  [pdf, ps, other

    cs.CR

    WACA: Wearable-Assisted Continuous Authentication

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

    Abstract: One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. I… ▽ More

    Submitted 5 March, 2018; v1 submitted 28 February, 2018; originally announced February 2018.

    Comments: A shorter version of this paper will appear in BioSTAR 2018 Workshop. This is the full version of the paper. 1st update: added ACK section

  24. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  25. Advertising in the IoT Era: Vision and Challenges

    Authors: Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac

    Abstract: The Internet of Things (IoT) extends the idea of interconnecting computers to a plethora of different devices, collectively referred to as smart devices. These are physical items - i.e., "things" - such as wearable devices, home appliances, and vehicles, enriched with computational and networking capabilities. Due to the huge set of devices involved - and therefore, its pervasiveness - IoT is a gr… ▽ More

    Submitted 31 January, 2018; originally announced February 2018.

    Comments: Accepted for publication at IEEE Communications Magazine

    ACM Class: H.3

  26. arXiv:1802.02041  [pdf, other

    cs.CR

    A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    Authors: Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

    Abstract: The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, s… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: Sensor-based Threats, Internet-of-Things, Smart Devices, Side Channel Attack

  27. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  28. arXiv:1706.10220  [pdf, other

    cs.CR

    6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensor… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    Comments: 18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium

  29. arXiv:1704.03578  [pdf, other

    cs.CR

    A Survey on Homomorphic Encryption Schemes: Theory and Implementation

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti

    Abstract: Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. Especially with popular cloud services, the control over the privacy of the sensitive data is lost. Even when the keys are not shared, the encrypted material is shared with a third party that does not necessarily need to a… ▽ More

    Submitted 5 October, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: - Updated. (October 6, 2017) - This paper is an early draft of the survey that is being submitted to ACM CSUR and has been uploaded to arXiv for feedback from stakeholders

    ACM Class: E.3; K.6.5; K.4.1

  30. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)