Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por HASLab

2021

Towards a bottom-up approach to inclusive digital identity systems

Autores
Silva, JM; Fonte, V; Sousa, A;

Publicação
ACM International Conference Proceeding Series

Abstract
The path towards the United Nations objective of providing legal identity for all, including free birth registrations, has been facing several challenges. Particularly, the diversity of social realities, limited ICT infrastructures, inadequate legal frameworks, and unstable political engagement have resulted in solutions highly fitted to a specific scenario, thus hard to be replicated in different regions. Paired with noncomprehensive public services of civil registration, these aspects impact the way identity records are created, stored and used by citizens in their daily interactions. To tackle these impairments, this work introduces IDINA, a non-authoritative approach aiming at a community-oriented identification system underpinned by relations of social trust, inclusiveness, and the use of cutting-edge accessible technologies. © 2021 Owner/Author.

2021

An Outlook on using Packet Sampling in Flow-based C2 TLS Malware Traffic Detection

Autores
Novo, C; Silva, JMC; Morla, R;

Publicação
PROCEEDINGS OF THE 2021 12TH INTERNATIONAL CONFERENCE ON NETWORK OF THE FUTURE (NOF 2021)

Abstract
Packet sampling plays an important role in keeping storage and processing requirements at a manageable level in network management. However, because it reduces the amount of available information, it can also reduce the performance of some related tasks, such as detecting security events. In this context, this work explores how packet sampling impacts machine learning-based tasks, in particular, flow-based C2 TLS malware traffic detection using a deep neural network. Based on a proposed lightweight sampling scheme, the ongoing results show a small reduction in classification accuracy compared with analysing all the traffic, while reducing in 10 fold the number of packets processed.

2021

Balancing the Detection of Malicious Traffic in SDN Context

Autores
Machado, BS; Silva, JMC; Lima, SR; Carvalho, P;

Publicação
12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2021)

Abstract
Huge efforts and resources are spent every year on prevention and recovery of cyberattacks targeting users, services and network infrastructures. Software-Defined Networking (SDN) is a technology providing advances to the field of security with the ability of programming the network, promoting high-performance solutions and efficient resource utilization at low costs, as the use of specialized hardware is avoided. The present paper aims at exploring the SDN paradigm to develop an SDN-based framework for prevention and mitigation of malicious attacks throuhgt the network. The framework design and proposal has concerns regarding the efficient use of network and computational resources, distributing the inspection of suspicious flows by distinct Intrusion Detection Systems. For this purpose, a load-balancing strategy for traffic inspection is devised, allowing to balance both the usage of resources and the analysis of traffic flows. In this way, this paper also sheds light on the usage of OpenFlow messages to build distributed SDN-based applications with the mentioned properties.

2021

Balancing the Detection of Malicious Traffic in SDN Context

Autores
Machado, BS; Silva, JMC; Lima, SR; Carvalho, P;

Publicação
Twelfth International Conference on Ubiquitous and Future Networks, ICUFN 2021, Jeju Island, South Korea, August 17-20, 2021

Abstract

2021

LOOM: Interweaving tightly coupled visualization and numeric simulation framework

Autores
Barbosa, J; Navratil, P; Paulo Santos, L; Fussell, D;

Publicação
ACM International Conference Proceeding Series

Abstract
Traditional post-hoc high-fidelity scientific visualization (HSV) of numerical simulations requires multiple I/O check-pointing to inspect the simulation progress. The costs of these I/O operations are high and can grow exponentially with increasing problem sizes. In situ HSV dispenses with costly check-pointing I/O operations, but requires additional computing resources to generate the visualization, increasing power and energy consumption. In this paper we present LOOM, a new interweaving approach supported by a task scheduling framework to allow tightly coupled in situ visualization without significantly adding to the overall simulation runtime. The approach exploits the idle times of the numerical simulation threads, due to workload imbalances, to perform the visualization steps. Overall execution time (simulation plus visualization) is minimized. Power requirements are also minimized by sharing the same computational resources among numerical simulation and visualization tasks. We demonstrate that LOOM reduces time to visualization by 3 × compared to a traditional non-interwoven pipeline. Our results here demonstrate good potential for additional gains for large distributed-memory use cases with larger interleaving opportunities. © 2021 ACM.

2021

Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda

Autores
Carreira, C; Ferreira, JF; Mendes, A; Christin, N;

Publicação
Proceedings First Workshop on Applicable Formal Methods, AppFM@FM 2021, virtual, 23rd November 2021.

Abstract
As software becomes more complex and assumes an even greater role in our lives, formal verification is set to become the gold standard in securing software systems into the future, since it can guarantee the absence of errors and entire classes of attack. Recent advances in formal verification are being used to secure everything from unmanned drones to the internet. At the same time, the usable security research community has made huge progress in improving the usability of security products and end-users comprehension of security issues. However, there have been no human-centered studies focused on the impact of formal verification on the use and adoption of formally verified software products. We propose a research agenda to fill this gap and to contribute with the first collection of studies on people's mental models on formal verification and associated security and privacy guarantees and threats. The proposed research has the potential to increase the adoption of more secure products and it can be directly used by the security and formal methods communities to create more effective and secure software tools. © C. Carreira et al.

  • 55
  • 255