Skip to main content

Showing 1–24 of 24 results for author: Markantonakis, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.10881  [pdf, other

    cs.CR

    Addressing Network Packet-based Cheats in Multiplayer Games: A Secret Sharing Approach

    Authors: Yaqi Cai, Konstantinos Markantonakis, Carlton Shepherd

    Abstract: Multiplayer online gaming has witnessed an explosion in popularity over the past two decades. However, security issues continue to give rise to in-game cheating, deterring honest gameplay, detracting from user experience, and ultimately bringing financial harm to game developers. In this paper, we present a new approach for detecting network packet-based cheats, such as forgery and timing cheats,… ▽ More

    Submitted 18 January, 2025; originally announced January 2025.

  2. arXiv:2408.06304  [pdf, other

    cs.CR cs.AR cs.ET

    Control-Flow Attestation: Concepts, Solutions, and Open Challenges

    Authors: Zhanyu Sha, Carlton Shepherd, Amir Rafi, Konstantinos Markantonakis

    Abstract: Control-flow attestation unifies the worlds of control-flow integrity and platform attestation by measuring and reporting a target's run-time behaviour to a verifier. Trust assurances in the target are provided by testing whether its execution follows an authorised control-flow path. The problem has been explored in various settings, such as assessing the trustworthiness of cloud platforms, cyber-… ▽ More

    Submitted 4 December, 2024; v1 submitted 12 August, 2024; originally announced August 2024.

  3. arXiv:2308.00437  [pdf, other

    cs.CR

    A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery

    Authors: Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis

    Abstract: Digital rights management (DRM) solutions aim to prevent the copying or distribution of copyrighted material. On mobile devices, a variety of DRM technologies have become widely deployed. However, a detailed security study comparing their internal workings, and their strengths and weaknesses, remains missing in the existing literature. In this paper, we present the first detailed security analysis… ▽ More

    Submitted 3 August, 2023; v1 submitted 1 August, 2023; originally announced August 2023.

  4. arXiv:2204.11639  [pdf, other

    cs.CR

    Investigating Black-Box Function Recognition Using Hardware Performance Counters

    Authors: Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis

    Abstract: This paper presents new methods and results for recognising black-box program functions using hardware performance counters (HPC), where an investigator can invoke and measure function calls. Important use cases include analysing compiled libraries, e.g. static and dynamic link libraries, and trusted execution environment (TEE) applications. We develop a generic approach to classify a comprehensiv… ▽ More

    Submitted 28 November, 2022; v1 submitted 25 April, 2022; originally announced April 2022.

  5. arXiv:2110.09453  [pdf, other

    cs.RO cs.CG

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Authors: Vihangi Vagal, Konstantinos Markantonakis, Carlton Shepherd

    Abstract: The anticipated widespread use of unmanned aerial vehicles (UAVs) raises significant safety and security concerns, including trespassing in restricted areas, colliding with other UAVs, and disrupting high-traffic airspaces. To mitigate these risks, geofences have been proposed as one line of defence, which limit UAVs from flying into the perimeters of other UAVs and restricted locations. In this p… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: Accepted to the 40th IEEE Digital Avionics Systems Conference

  6. arXiv:2110.06363  [pdf, other

    cs.CR

    A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices

    Authors: Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis

    Abstract: Mobile devices often distribute measurements from physical sensors to multiple applications using software multiplexing. On Android devices, the highest requested sampling frequency is returned to all applications, even if others request measurements at lower frequencies. In this paper, we comprehensively demonstrate that this design choice exposes practically exploitable side-channels using frequ… ▽ More

    Submitted 9 October, 2023; v1 submitted 12 October, 2021; originally announced October 2021.

  7. Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Authors: Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache

    Abstract: Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted security mechanisms have become commonplace for protecting device data, such as trusted execution environments, full-disk and file-based encryption. Both advancements have dramatically complicated the use of conventional physical… ▽ More

    Submitted 22 March, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

    Journal ref: Computers & Security. 111 (2021) 102471

  8. arXiv:2105.02937  [pdf, other

    cs.CR cs.DC

    A DLT-based Smart Contract Architecture for Atomic and Scalable Trading

    Authors: J. Kalbantner, K. Markantonakis, D. Hurley-Smith, C. Shepherd, B. Semal

    Abstract: Distributed Ledger Technology (DLT) has an enormous potential but also downsides. One downside of many DLT systems, such as blockchain, is their limited transaction throughput that hinders their adoption in many use cases (e.g., real-time payments). State channels have emerged as a potential solution to enhance throughput by allowing transactions to process off-chain. While current proposals can i… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

    Comments: This work has been submitted to the IEEE for possible publication

  9. Return-Oriented Programming on RISC-V

    Authors: Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache

    Abstract: This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear Code Sequences And Jumps (LCSAJ), undetected by current Galileo-based ROP gadget searching tools. We argue that this class of gadgets is rich enough on RISC-V to… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 27 pages, 8 figures, originally published at AsiaCCS 2020

  10. arXiv:2102.08804  [pdf, other

    cs.CR

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Authors: Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan

    Abstract: This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust anchor for remote attestation and secure channel creation. Moreover, we show how LIRA-V can be used for trusted communication between two devices usi… ▽ More

    Submitted 22 March, 2022; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: Published in the proceedings of the IEEE Security and Privacy Workshops, 2021

  11. Deep Learning Application in Security and Privacy -- Theory and Practice: A Position Paper

    Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Technology is shaping our lives in a multitude of ways. This is fuelled by a technology infrastructure, both legacy and state of the art, composed of a heterogeneous group of hardware, software, services and organisations. Such infrastructure faces a diverse range of challenges to its operations that include security, privacy, resilience, and quality of services. Among these, cybersecurity and pri… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.

    Journal ref: In WISTP 2018: Information Security Theory and Practice (pp. 129-144). Springer, Cham (2019)

  12. arXiv:1805.10259  [pdf, other

    cs.CR

    An evaluation of the security of the Bitcoin Peer-to- Peer Network

    Authors: James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Bitcoin is a decentralised digital currency that relies on cryptography rather than trusted third parties such as central banks for its security. Underpinning the operation of the currency is a peer-to-peer (P2P) network that facilitates the execution of transactions by end users, as well as the transaction confirmation process known as bitcoin mining. The security of this P2P network is vital for… ▽ More

    Submitted 28 May, 2018; v1 submitted 25 May, 2018; originally announced May 2018.

    Comments: 8 Pages, 7 Figures, Conference

  13. arXiv:1805.10258  [pdf, other

    cs.CR cs.CY

    E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Authors: Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Technology has positive impacts on many aspects of our social life. Designing a 24hour globally connected architecture enables ease of access to a variety of resources and services. Furthermore, technology like Internet has been a fertile ground for innovation and creativity. One of such disruptive innovation is blockchain -- a keystone of cryptocurrencies. The blockchain technology is presented a… ▽ More

    Submitted 3 July, 2018; v1 submitted 25 May, 2018; originally announced May 2018.

    Comments: 9 Pages, 6 Figures, 3 Tables, 5 Algorithms, Conference

  14. arXiv:1805.05844  [pdf, other

    cs.CR

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Authors: Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Society is in constant transition to keep up with technological advancement, we are seeing traditional paradigms being increasingly challenged. The fundamentals of governance are one such paradigm. As society's values have shifted, so have expectations of government shifted from the traditional model to something commonly referred to as 'open governance'. Though a disputed term, we take open gover… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: 9 Pages, 9 Figures, 4 Tables, 5 Algorithms, Conference

  15. arXiv:1805.04747  [pdf, other

    cs.CR

    Consumer Centric Data Control, Tracking and Transparency -- A Position Paper

    Authors: James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Personal data related to a user's activities, preferences and services, is considered to be a valuable commodity not only for a wide range of technology-oriented companies like Google, Amazon and Apple but also for more traditional companies like travel/transport, banking, entertainment and marketing industry. This has resulted in more targeted and to a great extend personalised services for indiv… ▽ More

    Submitted 12 May, 2018; originally announced May 2018.

    Comments: 10 Pages, 2 Figures, Conference

  16. arXiv:1804.10707  [pdf, other

    cs.CR

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Authors: Carlton Shepherd, Raja N. Akram, Konstantinos Markantonakis

    Abstract: Trusted Execution Environments (TEEs) are rapidly emerging as a root-of-trust for protecting sensitive applications and data using hardware-backed isolated worlds of execution. TEEs provide robust assurances regarding critical algorithm execution, tamper-resistant credential storage, and platform integrity using remote attestation. However, the challenge of remotely managing credentials between TE… ▽ More

    Submitted 26 November, 2018; v1 submitted 27 April, 2018; originally announced April 2018.

    Comments: Accepted to 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18)

  17. arXiv:1712.03943  [pdf, other

    cs.CR cs.OS

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Authors: Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote verifie… ▽ More

    Submitted 18 December, 2017; v1 submitted 11 December, 2017; originally announced December 2017.

    Comments: Accepted at the 11th IFIP International Conference on Information Security Theory and Practice (WISTP '17)

  18. arXiv:1708.05732  [pdf, other

    cs.CR cs.AI cs.NE cs.RO

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette

    Abstract: Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to high-sensitive, such as… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)

  19. arXiv:1708.05417  [pdf, ps, other

    cs.CR cs.ET

    Serverless Protocols for Inventory and Tracking with a UAV

    Authors: Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette

    Abstract: It is widely acknowledged that the proliferation of Unmanned Aerial Vehicles (UAVs) may lead to serious concerns regarding avionics safety, particularly when end-users are not adhering to air safety regulations. There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources that often require substantial human resources. F… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: 11 pages, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)

  20. arXiv:1608.04116  [pdf, other

    cs.CR cs.PF

    An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette

    Abstract: Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attacker to access the network, and the fact that it is… ▽ More

    Submitted 16 August, 2016; v1 submitted 14 August, 2016; originally announced August 2016.

    Comments: 10 pages, 2 figures, 4 tables, IEEE DASC

  21. arXiv:1608.04115  [pdf, other

    cs.CR cs.NI cs.PF

    Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette

    Abstract: The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this enforces (at least partially) the security of the network. However, substituting the wired netw… ▽ More

    Submitted 17 August, 2016; v1 submitted 14 August, 2016; originally announced August 2016.

    Comments: 8 page, 4 images, 2 tables, conference, IEEE DASC

  22. arXiv:1605.00446  [pdf, other

    cs.CR

    Challenges of Security and Trust of Mobile Devices as Digital Avionics Component

    Authors: Raja Naeem Akram, Konstantinos Markantonakis

    Abstract: Mobile devices are becoming part of modern digital avionics. Mobile devices can be applied to a range of scenarios, from Electronic Flight Bags to maintenance platforms, in order to manage and configure flight information, configure avionics networks or perform maintenance tasks (including offloading flight logs). It can be argued that recent developments show an increased use of personal mobile d… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 11 pages, 3 figures, 1 table

  23. arXiv:1605.00425  [pdf, other

    cs.CR

    When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

    Authors: Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes

    Abstract: Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being provisioned through smartphones. Smartphones with Near Field Communication (NFC) capability can emulate a contactless smart card; popular examples of such services incl… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 20 pages, 7 figures, 5 tables, Analysis of 7 Ambient Sensors

  24. arXiv:1601.07101  [pdf, other

    cs.CR

    Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments

    Authors: Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes

    Abstract: Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been proposed that rely primarily on ambient sensors as a proximity detection mechanism (also known as an anti-relay mechanism). In this paper, we, for the first time in academic liter… ▽ More

    Submitted 18 February, 2016; v1 submitted 26 January, 2016; originally announced January 2016.

    Comments: 19 pages, 9 figures, 5 tables