-
Practical Acoustic Eavesdropping On Typed Passphrases
Abstract: Cloud services have become an essential infrastructure for enterprises and individuals. Access to these cloud services is typically governed by Identity and Access Management systems, where user authentication often relies on passwords. While best practices dictate the implementation of multi-factor authentication, it's a reality that many such users remain solely protected by passwords. This reli… ▽ More
Submitted 7 April, 2025; v1 submitted 20 March, 2025; originally announced March 2025.
Comments: 8 pages, 9 figures
Journal ref: Proc of the 16th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2025), pp. 9-16, Valencia, Spain, April 2025, ISSN 2308-4294
-
arXiv:2503.16392 [pdf, ps, other]
Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment
Abstract: With AI-based software becoming widely available, the risk of exploiting its capabilities, such as high automation and complex pattern recognition, could significantly increase. An AI used offensively to attack non-AI assets is referred to as offensive AI. Current research explores how offensive AI can be utilized and how its usage can be classified. Additionally, methods for threat modeling are… ▽ More
Submitted 7 April, 2025; v1 submitted 20 March, 2025; originally announced March 2025.
Comments: 8 pages, 4 figures
Journal ref: Proc of the 16th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2025), Valencia, Spain, April 2025, pp. 17-24, ISSN 2308-4294
-
Securing Confidential Data For Distributed Software Development Teams: Encrypted Container File
Abstract: In the context of modern software engineering, there is a trend towards Cloud-native software development involving international teams with members from all over the world. Cloud-based version management services like GitHub are commonly used for source code and other files. However, a challenge arises when developers from different companies or organizations share the platform, as sensitive data… ▽ More
Submitted 12 July, 2024; originally announced July 2024.
Comments: 18 pages, for associated implementation etc., see https://github.com/Hirnmoder/ECF
Journal ref: International Journal On Advances in Security, vol. 17, no. 1 and 2, pp. 11-28, 2024, ISSN 1942-2636
-
Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices
Abstract: The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly secured. Therefore, a threat analysis is required in order to identify weaknesses and thus mitigate the risk. In this paper, we present a systematic and holistic… ▽ More
Submitted 25 May, 2024; originally announced May 2024.
Comments: 12 pages
Journal ref: International Journal On Advances in Security, vol. 14, no. 1 and 2, pp. 59-70, 2021
-
Threat Analysis of Industrial Internet of Things Devices
Abstract: As part of the Internet of Things, industrial devices are now also connected to cloud services. However, the connection to the Internet increases the risks for Industrial Control Systems. Therefore, a threat analysis is essential for these devices. In this paper, we examine Industrial Internet of Things devices, identify and rank different sources of threats and describe common threats and vulnera… ▽ More
Submitted 25 May, 2024; originally announced May 2024.
Comments: 7 pages
Journal ref: Proc of the 11th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2020), Nice, France, Apr 2020, pp. 31-37, ISSN 2308-4294
-
PLASMA -- Platform for Service Management in Digital Remote Maintenance Applications
Abstract: To support maintenance and servicing of industrial machines, service processes are even today often performed manually and analogously, although supportive technologies such as augmented reality, virtual reality and digital platforms already exist. In many cases, neither technicians on-site nor remote experts have all the essential information and options for suitable actions available. Existing s… ▽ More
Submitted 20 May, 2024; originally announced May 2024.
Comments: 4 pages
Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 78-81, ISSN 2308-4294
-
Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
Abstract: As part of the Internet of Things (IoT) and Industry 4.0 Cloud services are increasingly interacting with low-performance devices that are used in automation. This results in security issues that will be presented in this paper. Particular attention is paid to so-called critical infrastructures. The authors intend to work on the addressed security challenges as part of a funded research project, u… ▽ More
Submitted 18 May, 2024; originally announced May 2024.
Comments: 5 pages
Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 88-92, ISSN 2308-4294
-
arXiv:2405.11350 [pdf, ps, other]
Cloud Security and Security Challenges Revisited
Abstract: In recent years, Cloud Computing has transformed local businesses and created new business models on the Internet- and Cloud services are still flourishing. But after the emphatic hype in the early years, a more realistic perception of Cloud services has emerged. One reason for this surely is that today, Cloud Computing is considered as an established and well-accepted technology and no longer as… ▽ More
Submitted 18 May, 2024; originally announced May 2024.
Comments: 6 pages
Journal ref: Proc of the 10th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2019), Venice, Italy, May 2019, pp. 61-66, ISSN 2308-4294
-
A Secure and Privacy-Friendly Logging Scheme
Abstract: Finding a robust security mechanism for audit trail logging has long been a poorly satisfied goal. There are many reasons for this. The most significant of these is that the audit trail is a highly sought after goal of attackers to ensure that they do not get caught. Thus they have an incredibly strong incentive to prevent companies from succeeding in this worthy aim. Regulation, such as the Europ… ▽ More
Submitted 18 May, 2024; originally announced May 2024.
Comments: 5 pages
Journal ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto, Portugal, April 2021, pp. 8-12, ISSN 2308-4294
-
Securing 3rd Party App Integration in Docker-based Cloud Software Ecosystems
Abstract: Open software ecosystems are beneficial for customers; they benefit from 3rd party services and applications, e.g. analysis of data using apps, developed and deployed by other companies or open-source communities. One significant advantage of this approach is that other customers may benefit from these newly developed applications as well. Especially software ecosystems utilizing container technol… ▽ More
Submitted 18 May, 2024; originally announced May 2024.
Comments: 7 pages
Journal ref: Proc of the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2018), Barcelona, Spain, February 2018, pp. 77-83, ISSN 2308-4294
-
Distinguishing Tor From Other Encrypted Network Traffic Through Character Analysis
Abstract: For journalists reporting from a totalitarian regime, whistleblowers and resistance fighters, the anonymous use of cloud services on the Internet can be vital for survival. The Tor network provides a free and widely used anonymization service for everyone. However, there are different approaches to distinguishing Tor from non-Tor encrypted network traffic, most recently only due to the (relative)… ▽ More
Submitted 15 May, 2024; originally announced May 2024.
Comments: 5 pages
Journal ref: Proc of the 15th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2024), Venice, Italy, May 2024, pp. 8-12, ISSN 2308-4294
-
arXiv:2405.09398 [pdf, ps, other]
Encrypted Container File: Design and Implementation of a Hybrid-Encrypted Multi-Recipient File Structure
Abstract: Modern software engineering trends towards Cloud-native software development by international teams of developers. Cloud-based version management services, such as GitHub, are used for the source code and other artifacts created during the development process. However, using such a service usually means that every developer has access to all data stored on the platform. Particularly, if the develo… ▽ More
Submitted 18 May, 2024; v1 submitted 15 May, 2024; originally announced May 2024.
Comments: 7 pages, for associated implementation etc., see https://github.com/Hirnmoder/ECF
Journal ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 1-7, ISSN 2308-4294
-
An Approach for Decentralized Authentication in Networks of UAVs
Abstract: We propose a decentralized authentication system for networks of unmanned aerial vehicles. A blockchain-based public key infrastructure allows the usage of public key cryptography and public key based authentication protocols. The blockchain provides a common storage of the public keys and their relations and can provide the required information for the authentication process. Furthermore, the unm… ▽ More
Submitted 12 May, 2024; originally announced May 2024.
Comments: 5 pages
Journal ref: Proc of the 12th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2021), Porto Portugal, April 2021, pp. 13-17, ISSN 2308-4294
-
Managing Forensic Recovery in the Cloud
Abstract: As organisations move away from locally hosted computer services toward Cloud platforms, there is a corresponding need to ensure the forensic integrity of such instances. The primary reasons for concern are (i) the locus of responsibility, and (ii) the associated risk of legal sanction and financial penalty. Building upon previously proposed techniques for intrusion monitoring, we highlight the mu… ▽ More
Submitted 10 May, 2024; originally announced May 2024.
Comments: 6 pages
Journal ref: Proc of the 9th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2018), Barcelona, Spain, February 2018, pp. 45-50, ISSN 2308-4294
-
Strategies for Intrusion Monitoring in Cloud Services
Abstract: Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activit… ▽ More
Submitted 3 May, 2024; originally announced May 2024.
Comments: 5 pages
Journal ref: Proc of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2017), Athens, Greece, February 2017, pp. 49-53, ISSN 2308-4294
-
Security Challenges for Cloud or Fog Computing-Based AI Applications
Abstract: Security challenges for Cloud or Fog-based machine learning services pose several concerns. Securing the underlying Cloud or Fog services is essential, as successful attacks against these services, on which machine learning applications rely, can lead to significant impairments of these applications. Because the requirements for AI applications can also be different, we differentiate according to… ▽ More
Submitted 20 December, 2023; v1 submitted 30 October, 2023; originally announced October 2023.
Journal ref: Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), Nice, France, June 2023, pp. 21-29, ISSN 2308-4294