Skip to main content

Showing 1–10 of 10 results for author: Crispo, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.12746  [pdf, other

    cs.CR

    EmbedFuzz: High Speed Fuzzing Through Transplantation

    Authors: Florian Hofhammer, Qinying Wang, Atri Bhattacharyya, Majid Salehi, Bruno Crispo, Manuel Egele, Mathias Payer, Marcel Busch

    Abstract: Dynamic analysis and especially fuzzing are challenging tasks for embedded firmware running on modern low-end Microcontroller Units (MCUs) due to performance overheads from instruction emulation, the difficulty of emulating the vast space of available peripherals, and low availability of open-source embedded firmware. Consequently, efficient security testing of MCU firmware has proved to be a reso… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

  2. Hidden Web Caches Discovery

    Authors: Matteo Golinelli, Bruno Crispo

    Abstract: Web caches play a crucial role in web performance and scalability. However, detecting cached responses is challenging when web servers do not reliably communicate the cache status through standardized headers. This paper presents a novel methodology for cache detection using timing analysis. Our approach eliminates the dependency on cache status headers, making it applicable to any web server. The… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: The definitive Version of Record was published in The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024), September 30-October 02, 2024, Padua, Italy, https://doi.org/10.1145/3678890.3678931

  3. arXiv:2406.03401  [pdf

    cs.CR

    CROSSCON: Cross-platform Open Security Stack for Connected Devices

    Authors: Bruno Crispo, Marco Roveri, Sandro Pinto, Tiago Gomes, Aljosa Pasic, Akos Milankovich, David Puron, Ainara Garcia, Ziga Putrle, Peter Ten, Malvina Catalano

    Abstract: The proliferation of Internet of Things (IoT) embedded devices is expected to reach 30 billion by 2030, creating a dynamic landscape where diverse devices must coexist. This presents challenges due to the rapid expansion of different architectures and platforms. Addressing these challenges requires a unifi ed solution capable of accommodating various devices while offering a broad range of service… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  4. arXiv:2309.07782  [pdf, other

    cs.CR

    The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse

    Authors: Matteo Golinelli, Francesco Bonomi, Bruno Crispo

    Abstract: Content Security Policy (CSP) is an effective security mechanism that prevents the exploitation of Cross-Site Scripting (XSS) vulnerabilities on websites by specifying the sources from which their web pages can load resources, such as scripts and styles. CSP nonces enable websites to allow the execution of specific inline scripts and styles without relying on a whitelist. In this study, we measure… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: Accepted at the WASP workshop (ESORICS 2023)

  5. arXiv:1912.10190  [pdf, other

    cs.CR

    Cached and Confused: Web Cache Deception in the Wild

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Web cache deception (WCD) is an attack proposed in 2017, where an attacker tricks a caching proxy into erroneously storing private information transmitted over the Internet and subsequently gains unauthorized access to that cached data. Due to the widespread use of web caches and, in particular, the use of massive networks of caching proxies deployed by content distribution network (CDN) providers… ▽ More

    Submitted 13 February, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: USENIX Security Symposium, Boston, MA, USA, August 2020

  6. arXiv:1811.07367  [pdf, other

    cs.CR

    slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things

    Authors: Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo

    Abstract: The Internet of Things (IoT) is increasingly intertwined with critical industrial processes, yet contemporary IoT devices offer limited security features, creating a large new attack surface. Remote attestation is a well-known technique to detect cyber threats by remotely verifying the internal state of a networked embedded device through a trusted entity. Multi-device attestation has received lit… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

    Comments: This paper has been accepted at the 2018 IEEE Conference on Dependable and Secure Computing (DSC)

  7. arXiv:1811.07366  [pdf, other

    cs.CR

    WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective)

    Authors: Mahmoud Ammar, Mahdi Washha, Bruno Crispo

    Abstract: The growing pervasiveness of Internet of Things (IoT) expands the attack surface by connecting more and more attractive attack targets, i.e. embedded devices, to the Internet. One key component in securing these devices is software integrity checking, which typically attained with Remote Attestation (RA). RA is realized as an interactive protocol, whereby a trusted party, verifier, verifies the so… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

    Comments: This paper has been accepted and presented at the 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

  8. Large-Scale Analysis of Style Injection by Relative Path Overwrite

    Authors: Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Relative Path Overwrite (RPO) is a recent technique to inject style directives into sites even when no style sink or markup injection vulnerability is present. It exploits differences in how browsers and web servers interpret relative paths (i.e., path confusion) to make a HTML page reference itself as a stylesheet; a simple text injection vulnerability along with browsers' leniency in parsing CSS… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: The Web Conference (WWW), Lyon, France, April 2018

  9. arXiv:1308.3489  [pdf, other

    cs.CR

    ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. Th… ▽ More

    Submitted 15 August, 2013; originally announced August 2013.

    Comments: The final version of this paper has been accepted for publication in Elsevier Computers & Security 2013. arXiv admin note: text overlap with arXiv:1306.4828

  10. arXiv:1306.4828  [pdf, other

    cs.CR

    ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

    Authors: Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo

    Abstract: The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies. However, if such access is allowed in an untrusted environment then confidential information might be leaked by the policies. Current solutions are based on cryptographic operations that embed… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: The final version of this paper has been published at ARES 2011