Skip to main content

Showing 1–18 of 18 results for author: Beyah, R

.
  1. A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners

    Authors: Anna Raymaker, Akshaya Kumar, Miuyin Yong Wong, Ryan Pickren, Animesh Chhotaray, Frank Li, Saman Zonouz, Raheem Beyah

    Abstract: Maritime systems, including ships and ports, are critical components of global infrastructure, essential for transporting over 80% of the world's goods and supporting internet connectivity. However, these systems face growing cybersecurity threats, as shown by recent attacks disrupting Maersk, one of the world's largest shipping companies, causing widespread impacts on international trade. The uni… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: 18 pages, 2 figures, To appear in the Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS '25)

  2. arXiv:2503.23718  [pdf, other

    cs.SE cs.CR

    Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis

    Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji

    Abstract: Smart contracts are fundamental pillars of the blockchain, playing a crucial role in facilitating various business transactions. However, these smart contracts are vulnerable to exploitable bugs that can lead to substantial monetary losses. A recent study reveals that over 80% of these exploitable bugs, which are primarily functional bugs, can evade the detection of current tools. The primary issu… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

  3. arXiv:2503.16708  [pdf, other

    cs.LG

    NeuroSep-CP-LCB: A Deep Learning-based Contextual Multi-armed Bandit Algorithm with Uncertainty Quantification for Early Sepsis Prediction

    Authors: Anni Zhou, Raheem Beyah, Rishikesan Kamaleswaran

    Abstract: In critical care settings, timely and accurate predictions can significantly impact patient outcomes, especially for conditions like sepsis, where early intervention is crucial. We aim to model patient-specific reward functions in a contextual multi-armed bandit setting. The goal is to leverage patient-specific clinical features to optimize decision-making under uncertainty. This paper proposes Ne… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  4. arXiv:2410.18483  [pdf, other

    cs.CR

    FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization

    Authors: Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, Shouling Ji

    Abstract: While fuzzing has demonstrated its effectiveness in exposing vulnerabilities within embedded firmware, the discovery of crashing test cases is only the first step in improving the security of these critical systems. The subsequent fault localization process, which aims to precisely identify the root causes of observed crashes, is a crucial yet time-consuming post-fuzzing work. Unfortunately, the a… ▽ More

    Submitted 24 October, 2024; originally announced October 2024.

    Comments: To appear in the IEEE Symposium on Security and Privacy (IEEE S&P) 2025, San Francisco, CA, USA

  5. arXiv:2309.14742  [pdf, other

    cs.CR

    SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices

    Authors: Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah

    Abstract: Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted Operating System (Trusted OS) is the primary component. It enables the TEE to use security-based design techniques, such as data encryption and identity authentication. Once a Trusted OS has been exploited, the TEE can no long… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: To appear in the IEEE Symposium on Security and Privacy (IEEE S&P) 2024, San Francisco, CA, USA

  6. arXiv:2306.11206  [pdf, other

    cs.CR

    UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

    Authors: Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah

    Abstract: Nowadays, IoT devices integrate a wealth of third-party components (TPCs) in firmware to shorten the development cycle. TPCs usually have strict usage specifications, e.g., checking the return value of the function. Violating the usage specifications of TPCs can cause serious consequences, e.g., NULL pointer dereference. Therefore, this massive amount of TPC integrations, if not properly implement… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: Accepted as a full paper at USENIX Security '23

  7. arXiv:2303.02545  [pdf, other

    cs.CR

    MINER: A Hybrid Data-Driven Approach for REST API Fuzzing

    Authors: Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Raheem Beyah

    Abstract: In recent years, REST API fuzzing has emerged to explore errors on a cloud service. Its performance highly depends on the sequence construction and request generation. However, existing REST API fuzzers have trouble generating long sequences with well-constructed requests to trigger hard-to-reach states in a cloud service, which limits their performance of finding deep errors and security bugs. Fu… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Comments: Accepted as a full paper at USENIX Security '23

  8. arXiv:2212.13716  [pdf, other

    cs.CR

    One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

    Authors: Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah

    Abstract: Currently, the development of IoT firmware heavily depends on third-party components (TPCs) to improve development efficiency. Nevertheless, TPCs are not secure, and the vulnerabilities in TPCs will influence the security of IoT firmware. Existing works pay less attention to the vulnerabilities caused by TPCs, and we still lack a comprehensive understanding of the security impact of TPC vulnerabil… ▽ More

    Submitted 28 December, 2022; v1 submitted 28 December, 2022; originally announced December 2022.

  9. arXiv:2208.08751  [pdf, other

    cs.CR

    MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols

    Authors: Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah

    Abstract: Facilitated by messaging protocols (MP), many home devices are connected to the Internet, bringing convenience and accessibility to customers. However, most deployed MPs on IoT platforms are fragmented and are not implemented carefully to support secure communication. To the best of our knowledge, there is no systematic solution to perform automatic security checks on MP implementations yet. To… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: Accepted as a full paper at USENIX Security '21

  10. arXiv:2204.04063  [pdf, other

    cs.CV cs.AI cs.CR cs.CY cs.LG

    Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

    Authors: Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang

    Abstract: One intriguing property of adversarial attacks is their "transferability" -- an adversarial example crafted with respect to one deep neural network (DNN) model is often found effective against other DNNs as well. Intensive research has been conducted on this phenomenon under simplistic controlled conditions. Yet, thus far, there is still a lack of comprehensive understanding about transferability-… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted to IEEE Security & Privacy 2022

  11. arXiv:2010.01785  [pdf, other

    cs.CR

    UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers

    Authors: Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang

    Abstract: A flurry of fuzzing tools (fuzzers) have been proposed in the literature, aiming at detecting software vulnerabilities effectively and efficiently. To date, it is however still challenging to compare fuzzers due to the inconsistency of the benchmarks, performance metrics, and/or environments for evaluation, which buries the useful insights and thus impedes the discovery of promising fuzzing primit… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: To appear in the Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021)

  12. arXiv:1905.12061  [pdf, other

    cs.CR cs.RO

    On Evaluating the Effectiveness of the HoneyBot: A Case Study

    Authors: Celine Irvene, David Formby, Raheem Beyah

    Abstract: In recent years, cyber-physical system (CPS) security as applied to robotic systems has become a popular research area. Mainly because robotics systems have traditionally emphasized the completion of a specific objective and lack security oriented design. Our previous work, HoneyBot \cite{celine}, presented the concept and prototype of the first software hybrid interaction honeypot specifically de… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: 9 pages

  13. arXiv:1902.00717  [pdf, other

    cs.CR

    De-Health: All Your Online Health Information Are Belong to Us

    Authors: Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Qinming He, Raheem Beyah, Ting Wang

    Abstract: In this paper, we study the privacy of online health data. We present a novel online health data De-Anonymization (DA) framework, named De-Health. De-Health consists of two phases: Top-K DA, which identifies a candidate set for each anonymized user, and refined DA, which de-anonymizes an anonymized user to a user in its candidate set. By employing both candidate selection and DA verification schem… ▽ More

    Submitted 3 June, 2019; v1 submitted 2 February, 2019; originally announced February 2019.

  14. arXiv:1902.00714  [pdf, other

    cs.CR

    FDI: Quantifying Feature-based Data Inferability

    Authors: Shouling Ji, Haiqin Weng, Yiming Wu, Qinming He, Raheem Beyah, Ting Wang

    Abstract: Motivated by many existing security and privacy applications, e.g., network traffic attribution, linkage attacks, private web search, and feature-based data de-anonymization, in this paper, we study the Feature-based Data Inferability (FDI) quantification problem. First, we conduct the FDI quantification under both naive and general data models from both a feature distance perspective and a featur… ▽ More

    Submitted 3 June, 2019; v1 submitted 2 February, 2019; originally announced February 2019.

  15. arXiv:1901.07846   

    cs.CR

    SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems

    Authors: Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah

    Abstract: Despite their immense popularity, deep learning-based acoustic systems are inherently vulnerable to adversarial attacks, wherein maliciously crafted audios trigger target systems to misbehave. In this paper, we present SirenAttack, a new class of attacks to generate adversarial audios. Compared with existing attacks, SirenAttack highlights with a set of significant features: (i) versatile -- it is… ▽ More

    Submitted 24 July, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

    Comments: The experimental results were not up to our expectation

  16. arXiv:1901.01107  [pdf, other

    cs.CR

    Adversarial CAPTCHAs

    Authors: Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang

    Abstract: Following the principle of to set one's own spear against one's own shield, we study how to design adversarial CAPTCHAs in this paper. We first identify the similarity and difference between adversarial CAPTCHA generation and existing hot adversarial example (image) generation research. Then, we propose a framework for text-based and image-based adversarial CAPTCHA generation on top of state-of-th… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

    Comments: 16pages,9 figures, journal

  17. arXiv:1805.00074  [pdf, other

    cs.CR

    Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems

    Authors: Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah

    Abstract: Securing cyber-physical systems (CPS) against malicious attacks is of paramount importance because these attacks may cause irreparable damages to physical systems. Recent studies have revealed that control programs running on CPS devices suffer from both control-oriented attacks (e.g., code-injection or code-reuse attacks) and data-oriented attacks (e.g., non-control data attacks). Unfortunately,… ▽ More

    Submitted 24 March, 2019; v1 submitted 30 April, 2018; originally announced May 2018.

  18. arXiv:1802.09096  [pdf, other

    cs.CR

    Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator

    Authors: Monodeep Kar, Arvind Singh, Sanu Mathew, Santosh Ghosh, Anand Rajan, Vivek De, Raheem Beyah, Saibal Mukhopadhyay

    Abstract: Modern high-performance as well as power-constrained System-on-Chips (SoC) are increasingly using hardware accelerated encryption engines to secure computation, memory access, and communication operations. The electromagnetic (EM) emission from a chip leaks information of the underlying logical operations and can be collected using low-cost non-invasive measurements. EM based side-channel attacks… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.