Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2022

The rabbit as an animal model to study innate immunity genes: Is it better than mice?

Authors
Soares, J; Pinheiro, A; Esteves, PJ;

Publication
FRONTIERS IN IMMUNOLOGY

Abstract
The European rabbit (Oryctolagus cuniculus) was the first animal model used to understand human diseases like rabies and syphilis. Nowadays, the rabbit is still used to study several human infectious diseases like syphilis, HIV and papillomavirus. However, due to several mainly practical reasons, it has been replaced as an animal model by mice (Mus musculus). The rabbit and mouse share a recent common ancestor and are classified in the superorder Glires which arose at approximately 82 million years ago (mya). These species diverged from the Primates' ancestor at around 92 million years ago and, as such, one expects the rabbit-human and mouse-human genetic distances to be very similar. To evaluate this hypothesis, we developed a set of tools for automatic data extraction, sequence alignment and similarity study, and a web application for visualization of the resulting data. We aligned and calculated the genetic distances for 2793 innate immune system genes from human, rabbit and mouse using sequences available in the NCBI database. The obtained results show that the rabbit-human genetic distance is lower than the mouse-human genetic distance for 88% of these genes. Furthermore, when we considered only genes with a difference in genetic distance higher than 0.05, this figure increase to 93%. These results can be explained by the increase of the mutation rates in the mouse lineage suggested by some authors and clearly show that, at least looking to the genetic distance to human genes, the European rabbit is a better model to study innate immune system genes than the mouse.

2022

Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices

Authors
Mukhandi M.; Damiao F.; Granjal J.; Vilela J.P.;

Publication
Proceedings - IEEE Consumer Communications and Networking Conference, CCNC

Abstract
To decrease the IoT attack surface and provide protection against security threats such as introduction of fake IoT nodes and identity theft, IoT requires scalable device identity and authentication management. This work proposes a blockchain-based identity management approach with consensus authentication as a scalable solution for IoT device authentication management. The proposed approach relies on having a blockchain secure tamper proof ledger and a novel lightweight consensus-based identity authentication. The results show that the proposed decentralised authentication system is scalable as we increase number of nodes.

2022

Effect of User Expectation on Mobile App Privacy: A Field Study

Authors
Mendes, R; Brandao, A; Vilela, JP; Beresford, AR;

Publication
2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM)

Abstract
Runtime permission managers for mobile devices allow requests to be performed at the time in which permissions are required, thus enabling the user to grant/deny requests in context according to their expectations. However, in order to avoid cognitive overload, second and subsequent requests are usually automatically granted without user intervention/awareness. This paper explores whether these automated decisions fit user expectations. We performed a field study with 93 participants to collect their privacy decisions, the surrounding context and whether each request was expected. The collected 65261 permission decisions revealed a strong misalignment between apps' practices and expectation as almost half of requests are unexpected by users. This ratio strongly varies with the requested permission, the category and visibility of the requesting application and the user itself; that is, expectation is subjective to each individual. Moreover, privacy decisions are most strongly correlated with user expectation, but such correlation is also highly personal. Finally, Android's default permission manager would have violated the privacy of our participants 15% of the time.

2022

Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning

Authors
Brandao, A; Mendes, R; Vilela, JP;

Publication
CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY

Abstract
Permission managers in mobile devices allow users to control permissions requests, by granting of denying application's access to data and sensors. However, existing managers are ineffective at both protecting and warning users of the privacy risks of their permissions' decisions. Recent research proposes privacy protection mechanisms through user profiles to automate privacy decisions, taking personal privacy preferences into consideration. While promising, these proposals usually resort to a centralized server towards training the automation model, thus requiring users to trust this central entity. In this paper we propose a methodology to build privacy profiles and train neural networks for prediction of privacy decisions, while guaranteeing user privacy, even against a centralized server. Specifically, we resort to privacy-preserving clustering techniques towards building the privacy profiles, that is, the server computes the centroids (profiles) without access to the underlying data. Then, using federated learning, the model to predict permission decisions is learnt in a distributed fashion while all data remains locally in the users' devices. Experiments following our methodology show the feasibility of building a personalized and automated permission manager guaranteeing user privacy, while also reaching a performance comparable to the centralized state of the art, with an F1-score of 0.9.

2022

Is FFT Fast Enough for Beyond 5G Communications? A Throughput-Complexity Analysis for OFDM Signals

Authors
Queiroz, S; Vilela, JP; Monteiro, E;

Publication
IEEE ACCESS

Abstract
In this paper, we study the impact of computational complexity on the throughput limits of the fast Fourier transform (FFT) algorithm for orthogonal frequency division multiplexing (OFDM) waveforms. Based on the spectro-computational complexity (SC) analysis, we verify that the complexity of an N-point FFT grows faster than the number of bits in the OFDM symbol. Thus, we show that FFT nullifies the OFDM throughput on N unless the N -point discrete Fourier transform (DFT) problem verifies as Omega(N) , which remains a fascinating open question in theoretical computer science. Also, because FFT demands N to be a power of two 2(i) (i > 0), the spectrum widening leads to an exponential complexity on i , i.e. O (2(i)i) . To overcome these limitations, we consider the alternative frequency-time transform formulation of vector OFDM (V-OFDM), in which an N -point FFT is replaced by N/L (L > 0) smaller L-point FFTs to mitigate the cyclic prefix overhead of OFDM. Building on that, we replace FFT by the straightforward DFT algorithm to release the V-OFDM parameters from growing as powers of two and to benefit from flexible numerology (e.g., L = 3 , N = 156). Besides, by setting L to Theta (1) , the resulting solution can run linearly on N (rather than exponentially on i) while sustaining a non null throughput as N grows.

2022

Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences

Authors
Mendes, R; Cunha, M; Vilela, JP; Beresford, AR;

Publication
COMPUTER SECURITY - ESORICS 2022, PT I

Abstract
The multitude of applications and security configurations of mobile devices requires automated approaches for effective user privacy protection. Current permission managers, the core mechanism for privacy protection in smartphones, have shown to be ineffective by failing to account for privacy's contextual dependency and personal preferences within context. In this paper we focus on the relation between privacy decisions (e.g. grant or deny a permission request) and their surrounding context, through an analysis of a real world dataset obtained in campaigns with 93 users. We leverage such findings and the collected data to develop methods for automated, personalized and context-aware privacy protection, so as to predict users' preferences with respect to permission requests. Our analysis reveals that while contextual features have some relevance in privacy decisions, the increase in prediction performance of using such features is minimal, since two features alone are capable of capturing a relevant effect of context changes, namely the category of the requesting application and the requested permission. Our methods for prediction of privacy preferences achieved an F1 score of 0.88, while reducing the number of privacy violations by 28% when compared to the standard Android permission manager.

  • 29
  • 200