Skip to main content

Showing 1–21 of 21 results for author: Esteves-Verissimo, P

.
  1. arXiv:2503.18687  [pdf, other

    eess.SY cs.CR

    EVOLVE: a Value-Added Services Platform for Electric Vehicle Charging Stations

    Authors: Erick Silva, Tadeu Freitas, Rehana Yasmin, Ali Shoker, Paulo Esteves-Verissimo

    Abstract: A notable challenge in Electric Vehicle (EV) charging is the time required to fully charge the battery, which can range from 15 minutes to 2-3 hours. This idle period, however, presents an opportunity to offer time-consuming or data-intensive services such as vehicular software updates. ISO 15118 referred to the concept of Value-Added Services (VAS) in the charging scenario, but it remained undere… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  2. arXiv:2503.16984  [pdf, other

    cs.CR eess.SY

    EVSOAR: Security Orchestration, Automation and Response via EV Charging Stations

    Authors: Tadeu Freitas, Erick Silva, Rehana Yasmin, Ali Shoker, Manuel E. Correia, Rolando Martins, Paulo Esteves-Verissimo

    Abstract: Vehicle cybersecurity has emerged as a critical concern, driven by the innovation in the automotive industry, e.g., automomous, electric, or connnected vehicles. Current efforts to address these challenges are constrained by the limited computational resources of vehicles and the reliance on connected infrastructures. This motivated the foundation of Vehicle Security Operations Centers (VSOCs) tha… ▽ More

    Submitted 21 March, 2025; originally announced March 2025.

  3. arXiv:2409.02553  [pdf, other

    cs.CR cs.AR

    ResiLogic: Leveraging Composability and Diversity to Design Fault and Intrusion Resilient Chips

    Authors: Ahmad T. Sheikh, Ali Shoker, Suhaib A. Fahmy, Paulo Esteves-Verissimo

    Abstract: A long-standing challenge is the design of chips resilient to faults and glitches. Both fine-grained gate diversity and coarse-grained modular redundancy have been used in the past. However, these approaches have not been well-studied under other threat models where some stakeholders in the supply chain are untrusted. Increasing digital sovereignty tensions raise concerns regarding the use of fore… ▽ More

    Submitted 15 April, 2025; v1 submitted 4 September, 2024; originally announced September 2024.

  4. arXiv:2406.18117  [pdf, other

    cs.AR

    Resilient and Secure Programmable System-on-Chip Accelerator Offload

    Authors: Inês Pinto Gouveia, Ahmad T. Sheikh, Ali Shoker, Suhaib A. Fahmy, Paulo Esteves-Verissimo

    Abstract: Computational offload to hardware accelerators is gaining traction due to increasing computational demands and efficiency challenges. Programmable hardware, like FPGAs, offers a promising platform in rapidly evolving application areas, with the benefits of hardware acceleration and software programmability. Unfortunately, such systems composed of multiple hardware components must consider integrit… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: To be published in The 43rd International Symposium on Reliable Distributed Systems (SRDS 2024)

  5. arXiv:2404.04886  [pdf, other

    cs.CR cs.AI

    PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer

    Authors: Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Esteves-Veríssimo

    Abstract: Amidst the surge in deep learning-based password guessing models, challenges of generating high-quality passwords and reducing duplicate passwords persist. To address these challenges, we present PagPassGPT, a password guessing model constructed on Generative Pretrained Transformer (GPT). It can perform pattern guided guessing by incorporating pattern structure information as background knowledge,… ▽ More

    Submitted 17 June, 2024; v1 submitted 7 April, 2024; originally announced April 2024.

    Comments: Be accepted by DSN 2024

  6. arXiv:2404.03180  [pdf, other

    cs.LG cs.CR

    Goldfish: An Efficient Federated Unlearning Framework

    Authors: Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo

    Abstract: With recent legislation on the right to be forgotten, machine unlearning has emerged as a crucial research area. It facilitates the removal of a user's data from federated trained machine learning models without the necessity for retraining from scratch. However, current machine unlearning algorithms are confronted with challenges of efficiency and validity. To address the above issues, we propose… ▽ More

    Submitted 23 April, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

  7. arXiv:2402.14580  [pdf, other

    cs.AI eess.SY

    Savvy: Trustworthy Autonomous Vehicles Architecture

    Authors: Ali Shoker, Rehana Yasmin, Paulo Esteves-Verissimo

    Abstract: The increasing interest in Autonomous Vehicles (AV) is notable due to business, safety, and performance reasons. While there is salient success in recent AV architectures, hinging on the advancements in AI models, there is a growing number of fatal incidents that impedes full AVs from going mainstream. This calls for the need to revisit the fundamentals of building safety-critical AV architectures… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  8. arXiv:2312.05714  [pdf, other

    cs.DC cs.CR

    Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols

    Authors: Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves-Verissimo, Jiangshan Yu

    Abstract: A recent paper by Gupta et al. (EuroSys'23) challenged the usefulness of trusted component (TC) based Byzantine fault-tolerant (BFT) protocols to lower the replica group size from $3f+1$ to $2f+1$, identifying three limitations of such protocols and proposing that TCs should be used instead to improve the performance of BFT protocols. Here, we point out flaws in both arguments and advocate that th… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  9. arXiv:2307.04184  [pdf, other

    cs.CR cs.DC cs.NI eess.SY

    Intrusion Resilience Systems for Modern Vehicles

    Authors: Ali Shoker, Vincent Rahli, Jeremie Decouchant, Paulo Esteves-Verissimo

    Abstract: Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition, prevention is limited to few primitive options like dropping network packets or extreme options, e.g., ECU Bus-off state. To fill this gap, we introduce the concept of vehicular Intrusion Resilience Systems (I… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Journal ref: In the 97th IEEE Vehicular Technology Conference: VTC2023

  10. arXiv:2307.02032  [pdf, other

    cs.CR cs.DC cs.RO eess.SY

    ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles

    Authors: Ali Shoker, Fernando Alves, Paulo Esteves-Verissimo

    Abstract: Over-the-Air (OTA) software updates are becoming essential for electric/electronic vehicle architectures in order to reduce recalls amid the increasing software bugs and vulnerabilities. Current OTA update architectures rely heavily on direct cellular repository-to-vehicle links, which makes the repository a communication bottleneck, and increases the cellular bandwidth utilization cost as well as… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

  11. arXiv:2301.08018  [pdf, ps, other

    cs.CR cs.AR

    System on Chip Rejuvenation in the Wake of Persistent Attacks

    Authors: Ahmad T Sheikh, Ali Shoker, Paulo Esteves-Verissimo

    Abstract: To cope with the ever increasing threats of dynamic and adaptive persistent attacks, Fault and Intrusion Tolerance (FIT) is being studied at the hardware level to increase critical systems resilience. Based on state-machine replication, FIT is known to be effective if replicas are compromised and fail independently. This requires different ways of diversification at the software and hardware level… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

  12. arXiv:2110.05878  [pdf, other

    cs.CR eess.SY

    Sanctuary lost: a cyber-physical warfare in space

    Authors: Rafal Graczyk, Paulo Esteves-Verissimo, Marcus Voelp

    Abstract: Over the last decades, space has grown from a purely scientific struggle, fueled by the desire to demonstrate superiority of one regime over the other, to an anchor point of the economies of essentially all developed countries. Many businesses depend crucially on satellite communication or data acquisition, not only for defense purposes, but increasingly also for day-to-day applications. However,… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

  13. arXiv:2106.14962  [pdf, other

    cs.CR eess.SY

    Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems

    Authors: Charalambos Konstantinou, George Stergiopoulos, Masood Parvania, Paulo Esteves-Verissimo

    Abstract: Cyber-physical systems (CPS) incorporate the complex and large-scale engineered systems behind critical infrastructure operations, such as water distribution networks, energy delivery systems, healthcare services, manufacturing systems, and transportation networks. Industrial CPS in particular need to simultaneously satisfy requirements of available, secure, safe and reliable system operation agai… ▽ More

    Submitted 28 September, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: 2021 Resilience Week (RWS)

  14. arXiv:2101.12620  [pdf, ps, other

    cs.CR eess.SY

    EphemeriShield -- defence against cyber-antisatellite weapons

    Authors: Rafal Graczyk, Marcus Voelp, Paulo Esteves-Verissimo

    Abstract: Satellites, are both crucial and, despite common misbelieve, very fragile parts our civilian and military critical infrastructure. While, many efforts are focused on securing ground and space segments, especially when national security or large businesses interests are affected, the small-sat, newspace revolution democratizes access to, and exploitation of the near earth orbits. This brings new pl… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

  15. PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite

    Authors: David Kozhaya, Jeremie Decouchant, Vincent Rahli, Paulo Esteves-Verissimo

    Abstract: The accelerated digitalisation of society along with technological evolution have extended the geographical span of cyber-physical systems. Two main threats have made the reliable and real-time control of these systems challenging: (i) uncertainty in the communication infrastructure induced by scale, and heterogeneity of the environment and devices; and (ii) targeted attacks maliciously worsening… ▽ More

    Submitted 18 March, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: This is an extended version of a journal article, which appears in the IEEE Transactions on Parallel and Distributed Systems

  16. arXiv:2005.04519  [pdf, other

    cs.DC cs.CR cs.NI

    PriLok: Citizen-protecting distributed epidemic tracing

    Authors: Paulo Esteves-Verissimo, Jérémie Decouchant, Marcus Völp, Alireza Esfahani, Rafal Graczyk

    Abstract: Contact tracing is an important instrument for national health services to fight epidemics. As part of the COVID-19 situation, many proposals have been made for scaling up contract tracing capacities with the help of smartphone applications, an important but highly critical endeavor due to the privacy risks involved in such solutions. Extending our previously expressed concern, we clearly articula… ▽ More

    Submitted 1 June, 2020; v1 submitted 9 May, 2020; originally announced May 2020.

  17. arXiv:2005.04096  [pdf, other

    cs.DC

    Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions

    Authors: Inês Pinto Gouveia, Marcus Völp, Paulo Esteves-Verissimo

    Abstract: Today, leveraging the enormous modular power, diversity and flexibility of manycore systems-on-a-chip (SoCs) requires careful orchestration of complex resources, a task left to low-level software, e.g. hypervisors. In current architectures, this software forms a single point of failure and worthwhile target for attacks: once compromised, adversaries gain access to all information and full control… ▽ More

    Submitted 3 May, 2020; originally announced May 2020.

  18. arXiv:1908.08316  [pdf, other

    cs.DC

    Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure

    Authors: Christopher Natoli, Jiangshan Yu, Vincent Gramoli, Paulo Esteves-Verissimo

    Abstract: It is no exaggeration to say that since the introduction of Bitcoin, blockchains have become a disruptive technology that has shaken the world. However, the rising popularity of the paradigm has led to a flurry of proposals addressing variations and/or trying to solve problems stemming from the initial specification. This added considerable complexity to the current blockchain ecosystems, amplifie… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

  19. arXiv:1807.01226  [pdf, other

    cs.DC

    RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast

    Authors: David Kozhaya, Jérémie Decouchant, Paulo Esteves-Verissimo

    Abstract: Today's cyber-physical systems face various impediments to achieving their intended goals, namely, communication uncertainties and faults, relative to the increased integration of networked and wireless devices, hinder the synchronism needed to meet real-time deadlines. Moreover, being critical, these systems are also exposed to significant security threats. This threat combination increases the r… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: 19 pages

  20. arXiv:1711.03636  [pdf, other

    cs.NI cs.CR

    ANCHOR: logically-centralized security for Software-Defined Networks

    Authors: Diego Kreutz, Jiangshan Yu, Fernando M. V. Ramos, Paulo Esteves-Verissimo

    Abstract: While the centralization of SDN brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties like 'security' or 'dependability'. Though addressing the latter in an… ▽ More

    Submitted 31 December, 2018; v1 submitted 9 November, 2017; originally announced November 2017.

    Comments: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 references

  21. arXiv:1702.04294  [pdf, other

    cs.NI

    The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure

    Authors: Diego Kreutz, Jiangshan Yu, Paulo Esteves-Verissimo, Catia Magalhaes, Fernando M. V. Ramos

    Abstract: Security is an increasingly fundamental requirement in Software-Defined Networking (SDN). However, the pace of adoption of secure mechanisms has been slow, which we estimate to be a consequence of the performance overhead of traditional solutions and of the complexity of the support infrastructure required. As a first step to addressing these problems, we propose a modular secure SDN control plane… ▽ More

    Submitted 2 November, 2017; v1 submitted 14 February, 2017; originally announced February 2017.

    Comments: 12 pages, 7 figures, 2 algorithms, 41 references