Skip to main content

Showing 1–31 of 31 results for author: Garcia-Alfaro, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06344  [pdf, ps, other

    eess.SP cs.AI cs.LG

    A Reinforcement Learning Approach for RIS-aided Fair Communications

    Authors: Alex Pierron, Michel Barbeau, Luca De Cicco, Jose Rubio-Hernan, Joaquin Garcia-Alfaro

    Abstract: Reconfigurable Intelligent Surfaces (RISs) are composed of physical elements that can dynamically alter electromagnetic wave properties to enhance beamforming and leading to improvements in areas with low coverage properties. They have the potential to be combined with Reinforcement Learning (RL) techniques to achieve network performance and energy efficiency via optimization techniques. In additi… ▽ More

    Submitted 11 June, 2025; v1 submitted 1 June, 2025; originally announced June 2025.

    Comments: 8 pages, 7 figures, 1 table, 16 references

  2. arXiv:2504.02120  [pdf, other

    cs.CR

    Graph Analytics for Cyber-Physical System Resilience Quantification

    Authors: Romain Dagnas, Michel Barbeau, Joaquin Garcia-Alfaro, Reda Yaich

    Abstract: Critical infrastructures integrate a wide range of smart technologies and become highly connected to the cyber world. This is especially true for Cyber-Physical Systems (CPSs), which integrate hardware and software components. Despite the advantages of smart infrastructures, they remain vulnerable to cyberattacks. This work focuses on the cyber resilience of CPSs. We propose a methodology based on… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

    Comments: 32 pages, 11 figures, 3 tables

  3. arXiv:2501.12229  [pdf, other

    cs.CR cs.DC

    Empower Healthcare through a Self-Sovereign Identity Infrastructure for Secure Electronic Health Data Access

    Authors: Antonio López Martínez, Montassar Naghmouchi, Maryline Laurent, Joaquin Garcia-Alfaro, Manuel Gil Pérez, Antonio Ruiz Martínez, Pantaleone Nespoli

    Abstract: Health data is one of the most sensitive data for people, which attracts the attention of malicious activities. We propose an open-source health data management framework, that follows a patient-centric approach. The proposed framework implements the Self-Sovereign Identity paradigm with innovative technologies such as Decentralized Identifiers and Verifiable Credentials. The framework uses Blockc… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

    Comments: 40 pages, 11 figures

  4. arXiv:2412.14639  [pdf, other

    quant-ph cs.AI cs.CR

    A Shapley Value Estimation Speedup for Efficient Explainable Quantum AI

    Authors: Iain Burge, Michel Barbeau, Joaquin Garcia-Alfaro

    Abstract: This work focuses on developing efficient post-hoc explanations for quantum AI algorithms. In classical contexts, the cooperative game theory concept of the Shapley value adapts naturally to post-hoc explanations, where it can be used to identify which factors are important in an AI's decision-making process. An interesting question is how to translate Shapley values to the quantum setting and whe… ▽ More

    Submitted 17 April, 2025; v1 submitted 19 December, 2024; originally announced December 2024.

    Comments: 34 pages, 4 figures, 4 tables, 45 citations

  5. arXiv:2411.19876  [pdf, other

    cs.CR cs.AI

    LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states

    Authors: Luis Ibanez-Lissen, Lorena Gonzalez-Manzano, Jose Maria de Fuentes, Nicolas Anciaux, Joaquin Garcia-Alfaro

    Abstract: Large Language Models (LLMs) are increasingly used in a variety of applications, but concerns around membership inference have grown in parallel. Previous efforts focus on black-to-grey-box models, thus neglecting the potential benefit from internal LLM information. To address this, we propose the use of Linear Probes (LPs) as a method to detect Membership Inference Attacks (MIAs) by examining int… ▽ More

    Submitted 10 January, 2025; v1 submitted 29 November, 2024; originally announced November 2024.

  6. arXiv:2411.14434  [pdf, other

    quant-ph cs.CR

    Quantum CORDIC -- Arcsin on a Budget

    Authors: Iain Burge, Michel Barbeau, Joaquin Garcia-Alfaro

    Abstract: This work introduces a quantum algorithm for computing the arcsine function to an arbitrary accuracy. We leverage a technique from embedded computing and field-programmable gate array (FPGA), called COordinate Rotation DIgital Computer (CORDIC). CORDIC is a family of iterative algorithms that, in a classical context, can approximate various trigonometric, hyperbolic, and elementary functions using… ▽ More

    Submitted 2 November, 2024; originally announced November 2024.

    Comments: 6 pages, 3 figures, 3 algorithms, pending acceptance at peer-reviewed conference

  7. arXiv:2407.03466  [pdf, other

    cs.CR

    Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review

    Authors: Omair Faraj, David Megias, Joaquin Garcia-Alfaro

    Abstract: The Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected environments. Given their constrained nature, IoT systems are vulnerable to security attacks. Data provenance, which tracks the origin and flow of data, provides a potential solution to guarantee data security, including trustworthiness, confidentiality, integrity, and availability in IoT systems. Different… ▽ More

    Submitted 2 November, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

    Comments: 40 pages (35+5), 16 tables, 8 figures

  8. arXiv:2401.12594   

    cs.CR cs.CY

    SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification, and Learning Analytics to Train Cybersecurity Competencies

    Authors: Pantaleone Nespoli, Mariano Albaladejo-González, José A. Ruipérez-Valiente, Joaquin Garcia-Alfaro

    Abstract: It is undeniable that we are witnessing an unprecedented digital revolution. However, recent years have been characterized by the explosion of cyberattacks, making cybercrime one of the most profitable businesses on the planet. That is why training in cybersecurity is increasingly essential to protect the assets of cyberspace. One of the most vital tools to train cybersecurity competencies is the… ▽ More

    Submitted 10 December, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: This pre-print was uploaded without the consent of all authors and without the necessary approvals of the project in which the developments were made. We kindly request to mark the article as withdrawn since the project to which it relates is protected by the Ministry of Defence of Spain, and they have not approved the submission

  9. arXiv:2305.00266  [pdf, other

    cs.CR

    ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

    Authors: Omair Faraj, David Megías, Joaquin Garcia-Alfaro

    Abstract: The Internet of Things (IoT) is integrating the Internet and smart devices in almost every domain such as home automation, e-healthcare systems, vehicular networks, industrial control and military applications. In these sectors, sensory data, which is collected from multiple sources and managed through intermediate processing by multiple nodes, is used for decision-making processes. Ensuring data… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

    Comments: Keywords: Data Integrity; Data Provenance; Internet of Things; Intrusion Detection; Cryptography; Zero-Watermarking

  10. arXiv:2302.13791  [pdf, other

    quant-ph cs.ET

    Repeated Purification versus Concatenated Error Correction in Fault Tolerant Quantum Networks

    Authors: Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis

    Abstract: Entanglement distribution is a core mechanism for the future quantum Internet. The quantum world is, however, a faulty environment. Hence, successful entanglement swapping is error-prone. The occurrence of quantum state errors can be mitigated using purification and error correction, which can be repeated in the former case and concatenated in the latter case. Repeated purification merges low-fide… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

    Comments: ACM Format, 21 pages, 14 figures, 1 table

  11. A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems

    Authors: Mariana Segovia-Ferreira, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia-Alfaro

    Abstract: Concerns for the resilience of Cyber-Physical Systems (CPS)s in critical infrastructure are growing. CPS integrate sensing, computation, control, and networking into physical objects and mission-critical services, connecting traditional infrastructure to internet technologies. While this integration increases service efficiency, it has to face the possibility of new threats posed by the new functi… ▽ More

    Submitted 16 May, 2024; v1 submitted 10 February, 2023; originally announced February 2023.

    Comments: ACM Computing Surveys, 56(8):1--37, 36 pages, 2 figures, 1 table

  12. arXiv:2301.04727  [pdf, other

    cs.ET cs.CR math.QA

    A Quantum Algorithm for Shapley Value Estimation

    Authors: Iain Burge, Michel Barbeau, Joaquin Garcia-Alfaro

    Abstract: In the classical context, the cooperative game theory concept of the Shapley value has been adapted for post hoc explanations of machine learning models. However, this approach does not easily translate to eXplainable Quantum ML (XQML). Finding Shapley values can be highly computationally complex. We propose quantum algorithms which can extract Shapley values within some confidence interval. Our r… ▽ More

    Submitted 3 November, 2024; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: 9 pages, 4 figures, 24 references, preprint of QCE 2023 (IEEE International Conference on Quantum Computing and Engineering) Technical Paper (Quantum Algorithms for Shapley Value Calculation), available at https://doi.org/10.1109/QCE57702.2023.00024

  13. Cyber-Physical Defense in the Quantum Era

    Authors: Michel Barbeau, Joaquin Garcia-Alfaro

    Abstract: Networked-Control Systems (NCSs), a type of cyber-physical systems, consist of tightly integrated computing, communication and control technologies. While being very flexible environments, they are vulnerable to computing and networking attacks. Recent NCSs hacking incidents had major impact. They call for more research on cyber-physical security. Fears about the use of quantum computing to break… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 14 pages, 7 figures, 1 table, 4 boxes

    Journal ref: Scientific Reports, Nature Publishing Group, 12(1):1905, February 2022

  14. arXiv:2202.04016  [pdf, other

    cs.CR

    Ontology-based Attack Graph Enrichment

    Authors: Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquin Garcia-Alfaro

    Abstract: Attack graphs provide a representation of possible actions that adversaries can perpetrate to attack a system. They are used by cybersecurity experts to make decisions, e.g., to decide remediation and recovery plans. Different approaches can be used to build such graphs. We focus on logical attack graphs, based on predicate logic, to define the causality of adversarial actions. Since networks and… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: 18 pages, 3 figures, 1 table, conference paper (TIEMS Annual Conference, December 2021, Paris, France)

  15. arXiv:2009.13978  [pdf, ps, other

    cs.CR

    Anonymous proof-of-asset transactions using designated blind signatures

    Authors: Neetu Sharma, Rajeev Anand Sahu, Vishal Saraswat, Joaquin Garcia-Alfaro

    Abstract: We propose a scheme to preserve the anonymity of users in proof-of-asset transactions. We assume bitcoin-like cryptocurrency systems in which a user must prove the strength of its assets (i.e., solvency), prior conducting further transactions. The traditional way of addressing such a problem is the use of blind signatures, i.e., a kind of digital signature whose properties satisfy the anonymity of… ▽ More

    Submitted 26 October, 2020; v1 submitted 29 September, 2020; originally announced September 2020.

    Comments: 17 pages, extended conference version

  16. arXiv:2009.06927  [pdf, other

    cs.CR

    Cyber-Resilience Evaluation of Cyber-Physical Systems

    Authors: Mariana Segovia, Jose Rubio-Hernan, Ana Rosa Cavalli, Joaquin Garcia-Alfaro

    Abstract: Cyber-Physical Systems (CPS) use computational resources to control physical process and provide critical services. For this reason, an attack in these systems may have dangerous consequences in the physical world. Hence, resilience is a fundamental property to ensure the safety of the people, the environment and the controlled physical process. In this paper, we present metrics to quantify the re… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

    Comments: 11 pages, 2 figures, 6 tables

  17. arXiv:1912.07283  [pdf, other

    cs.CR math.LO

    Misconfiguration Management of Network Security Components

    Authors: Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro

    Abstract: Many companies and organizations use firewalls to control the access to their network infrastructure. Firewalls are network security components which provide means to filter traffic within corporate networks, as well as to police incoming and outcoming interaction with the Internet. For this purpose, it is necessary to configure firewalls with a set of filtering rules. Nevertheless, the existence… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: 9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (SSI), Sao Paulo, Brazil

  18. arXiv:1907.08849  [pdf, ps, other

    cs.CR cs.CY

    Next Generation Resilient Cyber-Physical Systems

    Authors: Michel Barbeau, Georg Carle, Joaquin Garcia-Alfaro, Vicenç Torra

    Abstract: Cyber-Physical Systems (CPS) consist of distributed engineered environments where the monitoring and surveillance tasks are governed by tightly integrated computing, communication and control technologies. CPS are omnipresent in our everyday life. Hacking and failures of such systems have impact on critical services with potentially significant and lasting consequences. In this paper, we review wh… ▽ More

    Submitted 8 November, 2019; v1 submitted 20 July, 2019; originally announced July 2019.

    Comments: 6 pages, 45 references

  19. arXiv:1907.03038  [pdf, other

    cs.CR cs.LG

    Faking and Discriminating the Navigation Data of a Micro Aerial Vehicle Using Quantum Generative Adversarial Networks

    Authors: Michel Barbeau, Joaquin Garcia-Alfaro

    Abstract: We show that the Quantum Generative Adversarial Network (QGAN) paradigm can be employed by an adversary to learn generating data that deceives the monitoring of a Cyber-Physical System (CPS) and to perpetrate a covert attack. As a test case, the ideas are elaborated considering the navigation data of a Micro Aerial Vehicle (MAV). A concrete QGAN design is proposed to generate fake MAV navigation d… ▽ More

    Submitted 10 November, 2019; v1 submitted 5 July, 2019; originally announced July 2019.

    Comments: Accepted for publication in IEEE GLOBECOM 2019 Workshop on Quantum Communications and Information Technology 2019 (fifth QCIT workshop of the Emerging Technical Committee on Quantum Communications and Information Technology, QCIT-ETC, cf. http://qcit.committees.comsoc.org/qcit19-workshop/)

  20. arXiv:1906.09505  [pdf, other

    cs.RO eess.SY

    Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification

    Authors: Michel Barbeau, Joaquin Garcia-Alfaro, Evangelos Kranakis, Fillipe Santos

    Abstract: We present an error tolerant path planning algorithm for Micro Aerial Vehicle (MAV) swarms. We assume navigation without GPS-like techniques. The MAVs find their path using sensors and cameras, identifying and following a series of visual landmarks. The visual landmarks lead the MAVs towards their destination. MAVs are assumed to be unaware of the terrain and locations of the landmarks. They hold… ▽ More

    Submitted 3 June, 2021; v1 submitted 22 June, 2019; originally announced June 2019.

    Comments: An early version of this paper appeared in the proceedings of IEEE GLOBECOM 2019, Waikoloa, Hawaii, Dec 9-14, 2019

  21. arXiv:1802.02360  [pdf, ps, other

    cs.CR eess.SY

    Cyber-Physical Architecture Assisted by Programmable Networking

    Authors: Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquin Garcia-Alfaro

    Abstract: Cyber-physical technologies are prone to attacks, in addition to faults and failures. The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats. Towards this end, this letter proposes a new architecture combining control-theoretic solutions together with program… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: 8 pages, 3 figures, pre-print

  22. Security of Cyber-Physical Systems. From Theory to Testbeds and Validation

    Authors: Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro

    Abstract: Traditional control environments connected to physical systems are being upgraded with novel information and communication technologies. The resulting systems need to be adequately protected. Experimental testbeds are crucial for the study and analysis of ongoing threats against those resulting cyber-physical systems. The research presented in this paper discusses some actions towards the developm… ▽ More

    Submitted 30 November, 2017; originally announced November 2017.

    Comments: 17 pages, 4 figures, 2 tables, Security of Industrial Control Systems & Cyber-Physical Systems , (http://www.ds.unipi.gr/cybericps2016/)

  23. An n-sided polygonal model to calculate the impact of cyber security events

    Authors: Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro, Hervé Debar

    Abstract: This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, communication protocols, physical and logical resources, etc.). Every axis is composed of entities that contribute to the execution of the… ▽ More

    Submitted 16 November, 2017; originally announced November 2017.

    Comments: 16 pages, 5 figures, 2 tables, 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016

  24. arXiv:1507.00270  [pdf, other

    cs.ET quant-ph

    Quantum Computing Assisted Medium Access Control for Multiple Client Station Networks

    Authors: Michel Barbeau, Steve R. Cloutier, Joaquin Garcia-Alfaro

    Abstract: A medium access control protocol based on quantum entanglement has been introduced by Berces and Imre (2006) and Van Meter (2012). This protocol entirely avoids collisions. It is assumed that the network consists of one access point and two client stations. We extend this scheme to a network with an arbitrary number of client stations. We propose three approaches, namely, the qubit distribution, t… ▽ More

    Submitted 1 July, 2015; originally announced July 2015.

    Comments: 18 pages, 12 figures, 3 tables; manuscript under review

  25. arXiv:1410.3226   

    cs.CR cs.NI cs.OS

    Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention

    Authors: Joaquin Garcia-Alfaro, Gürkan Gür

    Abstract: This volume contains the proceedings of the 2014 International Advanced Intrusion Detection and Prevention (AIDP'14) Workshop, held in Marrakesh, Morocco, on the 5th of June 2014, in conjunction with the 29th IFIP TC-11 SEC 2014 International Conference. It includes a revised version of the papers selected for presentation at the work- shop.

    Submitted 13 October, 2014; originally announced October 2014.

    ACM Class: Security

    Journal ref: EPTCS 165, 2014

  26. arXiv:1208.3730  [pdf, ps, other

    cs.CR

    On the Use of Latency Graphs for the Construction of Tor Circuits

    Authors: Sergio Castillo-Perez, Joaquin Garcia-Alfaro

    Abstract: The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for The onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through a series of anonymising proxy circuits. The construction of these circuits det… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 34

  27. arXiv:0911.4313  [pdf, other

    cs.CR cs.NI

    Evaluation of Anonymized ONS Queries

    Authors: Joaquin Garcia-Alfaro, Michel Barbeau, Evangelos Kranakis

    Abstract: Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Interne… ▽ More

    Submitted 22 November, 2009; originally announced November 2009.

    Comments: 14 pages

    Journal ref: Proc. 2008 Security of Autonomous and Spontaneous Networks, Editions Publibook Universite, pages 47-60, Loctudy, Brittany, France, October, 2008

  28. arXiv:0905.4850  [pdf, ps, other

    cs.CR

    A Survey on Cross-Site Scripting Attacks

    Authors: Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas

    Abstract: Web applications are becoming truly pervasive in all kinds of business models and organizations. Today, most critical systems such as those related to health care, banking, or even emergency response, are relying on these applications. They must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on th… ▽ More

    Submitted 29 May, 2009; originally announced May 2009.

    Comments: 15 pages

  29. arXiv:0905.1362  [pdf, ps, other

    cs.CR cs.SE

    Reliable Process for Security Policy Deployment

    Authors: Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro, Laurent Toutain

    Abstract: We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is… ▽ More

    Submitted 8 May, 2009; originally announced May 2009.

    Comments: 12 pages

    Journal ref: Proc. 2007 International Conference on Security and Cryptography (Secrypt 2007), Barcelona, Spain, July 2007

  30. arXiv:0803.0653  [pdf, ps, other

    cs.CR cs.NI

    Aggregating and Deploying Network Access Control Policies

    Authors: Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia

    Abstract: The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies -- potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way. To do so, we combine two main approaches… ▽ More

    Submitted 5 March, 2008; originally announced March 2008.

    Comments: 9 pages

    Journal ref: Proc. 2007 International Symposium on Frontiers in Availability, Reliability and Security (FARES), Vienna (Austria), 10-13 April 2007 (10/04/2007), 532-539

  31. arXiv:0802.3718  [pdf, ps, other

    cs.CR cs.NI

    Preventing Coordinated Attacks Via Distributed Alert Exchange

    Authors: Joaquin Garcia-Alfaro, Michael A. Jaeger, Gero Muehl, Joan Borrell

    Abstract: Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well… ▽ More

    Submitted 26 February, 2008; originally announced February 2008.

    Comments: 19 pages, proposal reviewed

    Journal ref: IFIP International Conference on Intelligence in Communication Systems (INTELLCOMM 2005) (17/10/2005) 87-98