Skip to main content

Showing 1–43 of 43 results for author: Stiller, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.08033  [pdf, ps, other

    cs.LG cs.DC

    Demo: A Practical Testbed for Decentralized Federated Learning on Physical Edge Devices

    Authors: Chao Feng, Nicolas Huber, Alberto Huertas Celdran, Gerome Bovet, Burkhard Stiller

    Abstract: Federated Learning (FL) enables collaborative model training without sharing raw data, preserving participant privacy. Decentralized FL (DFL) eliminates reliance on a central server, mitigating the single point of failure inherent in the traditional FL paradigm, while introducing deployment challenges on resource-constrained devices. To evaluate real-world applicability, this work designs and depl… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

  2. arXiv:2505.07149  [pdf, ps, other

    cs.LG

    AugMixCloak: A Defense against Membership Inference Attacks via Image Transformation

    Authors: Heqing Ren, Chao Feng, Alberto Huertas, Burkhard Stiller

    Abstract: Traditional machine learning (ML) raises serious privacy concerns, while federated learning (FL) mitigates the risk of data leakage by keeping data on local devices. However, the training process of FL can still leak sensitive information, which adversaries may exploit to infer private data. One of the most prominent threats is the membership inference attack (MIA), where the adversary aims to det… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

  3. arXiv:2505.05292  [pdf, ps, other

    cs.CR

    QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks

    Authors: Thomas Grübl, Weijie Niu, Jan von der Assen, Burkhard Stiller

    Abstract: The QUIC protocol is now widely adopted by major tech companies and accounts for a significant fraction of today's Internet traffic. QUIC's multiplexing capabilities, encrypted headers, dynamic IP address changes, and encrypted parameter negotiations make the protocol not only more efficient, secure, and censorship-resistant, but also practically unmanageable by firewalls. This opens doors for att… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

    Comments: Accepted at the 20th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2025)

  4. arXiv:2503.15964  [pdf, other

    cs.CR

    Are We There Yet? A Study of Decentralized Identity Applications

    Authors: Daria Schumm, Katharina O. E. Müller, Burkhard Stiller

    Abstract: The development of Decentralized Identities (DI) and Self-Sovereign Identities (SSI) has seen significant growth in recent years. This is accompanied by a numerous academic and commercial contributions to the development of principles, standards, and systems. While several comprehensive reviews have been produced, they predominantly focus on academic literature, with few considering grey literatur… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

    Comments: 27 pages

  5. arXiv:2502.20242  [pdf, other

    cs.CY

    GreenDFL: a Framework for Assessing the Sustainability of Decentralized Federated Learning Systems

    Authors: Chao Feng, Alberto Huertas Celdrán, Xi Cheng, Gérôme Bovet, Burkhard Stiller

    Abstract: Decentralized Federated Learning (DFL) is an emerging paradigm that enables collaborative model training without centralized data and model aggregation, enhancing privacy and resilience. However, its sustainability remains underexplored, as energy consumption and carbon emissions vary across different system configurations. Understanding the environmental impact of DFL is crucial for optimizing it… ▽ More

    Submitted 7 March, 2025; v1 submitted 27 February, 2025; originally announced February 2025.

  6. arXiv:2502.04771  [pdf, other

    cs.LG cs.AI

    DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences

    Authors: Chao Feng, Yunlong Li, Yuanzhe Gao, Alberto Huertas Celdrán, Jan von der Assen, Gérôme Bovet, Burkhard Stiller

    Abstract: Federated learning (FL) has garnered significant attention as a prominent privacy-preserving Machine Learning (ML) paradigm. Decentralized FL (DFL) eschews traditional FL's centralized server architecture, enhancing the system's robustness and scalability. However, these advantages of DFL also create new vulnerabilities for malicious participants to execute adversarial attacks, especially model po… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

    Comments: 8 pages, 3 figures

  7. arXiv:2501.10347  [pdf, other

    cs.LG

    ColNet: Collaborative Optimization in Decentralized Federated Multi-task Learning Systems

    Authors: Chao Feng, Nicolas Fazli Kohler, Alberto Huertas Celdran, Gerome Bovet, Burkhard Stiller

    Abstract: The integration of Federated Learning (FL) and Multi-Task Learning (MTL) has been explored to address client heterogeneity, with Federated Multi-Task Learning (FMTL) treating each client as a distinct task. However, most existing research focuses on data heterogeneity (e.g., addressing non-IID data) rather than task heterogeneity, where clients solve fundamentally different tasks. Additionally, mu… ▽ More

    Submitted 17 January, 2025; originally announced January 2025.

  8. arXiv:2501.07917  [pdf

    cs.ET physics.app-ph physics.optics

    Roadmap on Neuromorphic Photonics

    Authors: Daniel Brunner, Bhavin J. Shastri, Mohammed A. Al Qadasi, H. Ballani, Sylvain Barbay, Stefano Biasi, Peter Bienstman, Simon Bilodeau, Wim Bogaerts, Fabian Böhm, G. Brennan, Sonia Buckley, Xinlun Cai, Marcello Calvanese Strinati, B. Canakci, Benoit Charbonnier, Mario Chemnitz, Yitong Chen, Stanley Cheung, Jeff Chiles, Suyeon Choi, Demetrios N. Christodoulides, Lukas Chrostowski, J. Chu, J. H. Clegg , et al. (125 additional authors not shown)

    Abstract: This roadmap consolidates recent advances while exploring emerging applications, reflecting the remarkable diversity of hardware platforms, neuromorphic concepts, and implementation philosophies reported in the field. It emphasizes the critical role of cross-disciplinary collaboration in this rapidly evolving field.

    Submitted 16 January, 2025; v1 submitted 14 January, 2025; originally announced January 2025.

  9. arXiv:2501.03119  [pdf, other

    cs.LG cs.AI

    From Models to Network Topologies: A Topology Inference Attack in Decentralized Federated Learning

    Authors: Chao Feng, Yuanzhe Gao, Alberto Huertas Celdran, Gerome Bovet, Burkhard Stiller

    Abstract: Federated Learning (FL) is widely recognized as a privacy-preserving machine learning paradigm due to its model-sharing mechanism that avoids direct data exchange. Nevertheless, model training leaves exploitable traces that can be used to infer sensitive information. In Decentralized FL (DFL), the topology, defining how participants are connected, plays a crucial role in shaping the model's privac… ▽ More

    Submitted 9 May, 2025; v1 submitted 6 January, 2025; originally announced January 2025.

  10. arXiv:2410.07678  [pdf, other

    cs.LG

    FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning

    Authors: Chao Feng, Hongjie Guan, Alberto Huertas Celdrán, Jan von der Assen, Gérôme Bovet, Burkhard Stiller

    Abstract: Non-Independent and Identically Distributed (non-IID) data in Federated Learning (FL) causes client drift issues, leading to slower convergence and reduced model performance. While existing approaches mitigate this issue in Centralized FL (CFL) using a central server, Decentralized FL (DFL) remains underexplored. In DFL, the absence of a central entity results in nodes accessing a global view of t… ▽ More

    Submitted 6 January, 2025; v1 submitted 10 October, 2024; originally announced October 2024.

  11. arXiv:2410.06127  [pdf, other

    cs.LG

    De-VertiFL: A Solution for Decentralized Vertical Federated Learning

    Authors: Alberto Huertas Celdrán, Chao Feng, Sabyasachi Banik, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Federated Learning (FL), introduced in 2016, was designed to enhance data privacy in collaborative model training environments. Among the FL paradigm, horizontal FL, where clients share the same set of features but different data samples, has been extensively studied in both centralized and decentralized settings. In contrast, Vertical Federated Learning (VFL), which is crucial in real-world decen… ▽ More

    Submitted 4 February, 2025; v1 submitted 8 October, 2024; originally announced October 2024.

  12. arXiv:2409.19302  [pdf, other

    cs.CR cs.DC

    Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data

    Authors: Chao Feng, Alberto Huertas Celdrán, Zien Zeng, Zi Ye, Jan von der Assen, Gerome Bovet, Burkhard Stiller

    Abstract: Decentralized Federated Learning (DFL), a paradigm for managing big data in a privacy-preserved manner, is still vulnerable to poisoning attacks where malicious clients tamper with data or models. Current defense methods often assume Independently and Identically Distributed (IID) data, which is unrealistic in real-world applications. In non-IID contexts, existing defensive strategies face challen… ▽ More

    Submitted 12 November, 2024; v1 submitted 28 September, 2024; originally announced September 2024.

  13. arXiv:2408.12081  [pdf, other

    cs.CR

    Towards Threat Modelling of IoT Context-Sharing Platforms

    Authors: Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay Jha

    Abstract: The Internet of Things (IoT) involves complex, interconnected systems and devices that depend on context-sharing platforms for interoperability and information exchange. These platforms are, therefore, critical components of real-world IoT deployments, making their security essential to ensure the resilience and reliability of these 'systems of systems'. In this paper, we take the first steps towa… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  14. arXiv:2407.14286  [pdf, other

    cs.CR

    PACCOR4ESP: Embedded Device Security Attestation using Platform Attribute Certificates

    Authors: Thomas Grübl, Jan von der Assen, Markus Knecht, Burkhard Stiller

    Abstract: Verifying the integrity of embedded device characteristics is required to ensure secure operation of a device. One central challenge is to securely extract and store device-specific configurations for future verification. Existing device attestation schemes suffer from notable limitations, including a lack of standardization and a failure to encompass all hardware and software aspects inherent to… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  15. arXiv:2407.08652  [pdf, other

    cs.DC

    DART: A Solution for Decentralized Federated Learning Model Robustness Analysis

    Authors: Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, Enrique Tomás Martínez Beltrán, Gérôme Bovet, Burkhard Stiller

    Abstract: Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  16. arXiv:2406.01135  [pdf, other

    cs.CR

    The Danger Within: Insider Threat Modeling Using Business Process Models

    Authors: Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller

    Abstract: Threat modeling has been successfully applied to model technical threats within information systems. However, a lack of methods focusing on non-technical assets and their representation can be observed in theory and practice. Following the voices of industry practitioners, this paper explored how to model insider threats based on business process models. Hence, this study developed a novel insider… ▽ More

    Submitted 3 September, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  17. arXiv:2404.11281  [pdf, other

    cs.CR

    SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks

    Authors: Krzysztof Gogol, Christian Killer, Malte Schlosser, Thomas Bocek, Burkhard Stiller, Claudio Tessone

    Abstract: Decentralized Finance (DeFi) refers to financial services that are not necessarily related to crypto-currencies. By employing blockchain for security and integrity, DeFi creates new possibilities that attract retail and institution users, including central banks. Given its novel applications and sophisticated designs, the distinction between DeFi services and understanding the risk involved is oft… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  18. arXiv:2404.08306  [pdf, other

    cs.CR cs.DC

    Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds

    Authors: Jan von der Assen, Christian Killer, Alessandro De Carli, Burkhard Stiller

    Abstract: The advent of Decentralized Physical Infrastructure Networks (DePIN) represents a shift in the digital infrastructure of today's Internet. While Centralized Service Providers (CSP) monopolize cloud computing, DePINs aim to enhance data sovereignty and confidentiality and increase resilience against a single point of failure. Due to the novelty of the emerging field of DePIN, this work focuses on t… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  19. arXiv:2403.06512  [pdf, other

    cs.CR cs.SE

    Asset-centric Threat Modeling for AI-based Systems

    Authors: Jan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller

    Abstract: Threat modeling is a popular method to securely develop systems by achieving awareness of potential areas of future damage caused by adversaries. However, threat modeling for systems relying on Artificial Intelligence is still not well explored. While conventional threat modeling methods and tools did not address AI-related threats, research on this amalgamation still lacks solutions capable of gu… ▽ More

    Submitted 3 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

  20. arXiv:2402.14140  [pdf, other

    cs.CR

    QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience

    Authors: Jan von der Assen, Muriel F. Franco, Muyao Dong, Burkhard Stiller

    Abstract: Threat modeling has emerged as a key process for understanding relevant threats within businesses. However, understanding the importance of threat events is rarely driven by the business incorporating the system. Furthermore, prioritization of threat events often occurs based on abstract and qualitative scoring. While such scores enable prioritization, they do not allow the results to be easily in… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  21. arXiv:2401.17917  [pdf, ps, other

    cs.CR

    GuardFS: a File System for Integrated Detection and Mitigation of Linux-based Ransomware

    Authors: Jan von der Assen, Chao Feng, Alberto Huertas Celdrán, Róbert Oleš, Gérôme Bovet, Burkhard Stiller

    Abstract: Although ransomware has received broad attention in media and research, this evolving threat vector still poses a systematic threat. Related literature has explored their detection using various approaches leveraging Machine and Deep Learning. While these approaches are effective in detecting malware, they do not answer how to use this intelligence to protect against threats, raising concerns abou… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

  22. arXiv:2401.16353  [pdf, ps, other

    cs.CR

    Empirical and Theoretical Analysis of Liquid Staking Protocols

    Authors: Krzysztof Gogol, Benjamin Kraner, Malte Schlosser, Tao Yan, Claudio Tessone, Burkhard Stiller

    Abstract: Liquid staking has become the largest category of decentralized finance protocols in terms of total value locked. However, few studies exist on its implementation designs or underlying risks. The liquid staking protocols allow for earning staking rewards without the disadvantage of locking the capital at the validators. Yet, they are seen by some as a threat to the Proof-of-Stake blockchain securi… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Report number: ChainScience/2023/21

  23. arXiv:2310.20435  [pdf, other

    cs.CY

    Assessing the Sustainability and Trustworthiness of Federated Learning Models

    Authors: Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Lynn Zumtaugwald, Gerome Bovet, Burkhard Stiller

    Abstract: Artificial intelligence is widely used in various sectors and significantly impacts decision-making processes. Novel AI paradigms, such as Federated Learning (FL), focus on training AI models collaboratively while preserving data privacy. In such a context, the European Commission's AI-HLEG group has highlighted the importance of sustainable AI for trustworthy AI. While existing literature offers… ▽ More

    Submitted 11 February, 2025; v1 submitted 31 October, 2023; originally announced October 2023.

  24. arXiv:2310.08739  [pdf, other

    cs.CR cs.DC

    Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL

    Authors: Chao Feng, Alberto Huertas Celdran, Michael Vuong, Gerome Bovet, Burkhard Stiller

    Abstract: The growing concern over malicious attacks targeting the robustness of both Centralized and Decentralized Federated Learning (FL) necessitates novel defensive strategies. In contrast to the centralized approach, Decentralized FL (DFL) has the advantage of utilizing network topology and local dataset information, enabling the exploration of Moving Target Defense (MTD) based approaches. This work… ▽ More

    Submitted 14 February, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  25. arXiv:2310.08097  [pdf, other

    cs.DC cs.AI

    Sentinel: An Aggregation Function to Secure Decentralized Federated Learning

    Authors: Chao Feng, Alberto Huertas Celdrán, Janosch Baltensperger, Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Burkhard Stiller

    Abstract: Decentralized Federated Learning (DFL) emerges as an innovative paradigm to train collaborative models, addressing the single point of failure limitation. However, the security and trustworthiness of FL and DFL are compromised by poisoning attacks, negatively impacting its performance. Existing defense mechanisms have been designed for centralized FL and they do not adequately exploit the particul… ▽ More

    Submitted 4 September, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  26. arXiv:2308.05978  [pdf, other

    cs.CR cs.AI

    CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

    Authors: Chao Feng, Alberto Huertas Celdran, Pedro Miguel Sanchez Sanchez, Jan Kreischer, Jan von der Assen, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Recent research has shown that the integration of Reinforcement Learning (RL) with Moving Target Defense (MTD) can enhance cybersecurity in Internet-of-Things (IoT) devices. Nevertheless, the practicality of existing work is hindered by data privacy concerns associated with centralized data processing in RL, and the unsatisfactory time needed to learn right MTD techniques that are effective agains… ▽ More

    Submitted 30 September, 2024; v1 submitted 11 August, 2023; originally announced August 2023.

  27. arXiv:2307.11140  [pdf, other

    cs.CR cs.CY cs.IR

    RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

    Authors: Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller

    Abstract: Digitization increases business opportunities and the risk of companies being victims of devastating cyberattacks. Therefore, managing risk exposure and cybersecurity strategies is essential for digitized companies that want to survive in competitive markets. However, understanding company-specific risks and quantifying their associated costs is not trivial. Current approaches fail to provide indi… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  28. arXiv:2306.15566  [pdf, other

    cs.CR

    MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Rinor Sefa, Gérôme Bovet, Burkhard Stiller

    Abstract: Ransomware has remained one of the most notorious threats in the cybersecurity field. Moving Target Defense (MTD) has been proposed as a novel paradigm for proactive defense. Although various approaches leverage MTD, few of them rely on the operating system and, specifically, the file system, thereby making them dependent on other computing devices. Furthermore, existing ransomware defense techniq… ▽ More

    Submitted 16 November, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  29. arXiv:2306.15559  [pdf, other

    cs.CR cs.AI cs.LG

    RansomAI: AI-powered Ransomware for Stealthy Encryption

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Janik Luechinger, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybersecurity solutions have shown promising performance when detecting ransomware samples that use fixed algorithms and encryption rates. However, due to the current explosion of Artificial Intelligence (AI), sooner than later, ransomware (and malware in general) will incorporate AI techniques to intelligently and dynamically adapt its encryption behavior to be undetected. It might result in inef… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  30. arXiv:2304.07909  [pdf, other

    cs.CR cs.CY

    SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

    Authors: Muriel Figueredo Franco, Christian Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller

    Abstract: Cybersecurity planning is challenging for digitized companies that want adequate protection without overspending money. Currently, the lack of investments and perverse economic incentives are the root cause of cyberattacks, which results in several economic impacts on companies worldwide. Therefore, cybersecurity planning has to consider technical and economic dimensions to help companies achieve… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: 12 pages, 7 figures, 2 tables, 9 equations

  31. arXiv:2303.01151  [pdf, other

    cs.NI

    Real-time Tracking of Medical Devices: An Analysis of Multilateration and Fingerprinting Approaches

    Authors: Bruno Rodrigues, Eder J. Scheid, Katharina O. E. Müller, Julius Willems, Burkhard Stiller

    Abstract: Hospital infrastructures are always in evidence in periods of crisis, such as natural disasters or pandemic events, under stress. The recent COVID-19 pandemic exposed several inefficiencies in hospital systems over a relatively long period. Among these inefficiencies are human factors, such as how to manage staff during periods of high demand, and technical factors, including the management of Por… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: 18 pages

    ACM Class: C.2.3

  32. arXiv:2302.09844  [pdf, other

    cs.CR cs.AI

    FederatedTrust: A Solution for Trustworthy Federated Learning

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Ning Xie, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: The rapid expansion of the Internet of Things (IoT) and Edge Computing has presented challenges for centralized Machine and Deep Learning (ML/DL) methods due to the presence of distributed data silos that hold sensitive information. To address concerns regarding data privacy, collaborative and privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged. However, ensuring data pri… ▽ More

    Submitted 6 July, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  33. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Timo Schenk, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learnin… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

  34. arXiv:2210.11061  [pdf, other

    cs.LG

    Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Enrique Tomás Martínez Beltrán, Daniel Demeter, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Federated learning (FL) allows participants to collaboratively train machine and deep learning models while protecting data privacy. However, the FL paradigm still presents drawbacks affecting its trustworthiness since malicious participants could launch adversarial attacks against the training process. Related work has studied the robustness of horizontal FL scenarios under different attacks. How… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  35. A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

    Authors: Jan von der Assen, Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jordan Cedeño, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Malware affecting Internet of Things (IoT) devices is rapidly growing due to the relevance of this paradigm in real-world scenarios. Specialized literature has also detected a trend towards multi-purpose malware able to execute different malicious actions such as remote control, data leakage, encryption, or code hiding, among others. Protecting IoT devices against this kind of malware is challengi… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  36. Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

    Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  37. CyberSpec: Intelligent Behavioral Fingerprinting to Detect Attacks on Crowdsensing Spectrum Sensors

    Authors: Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller

    Abstract: Integrated sensing and communication (ISAC) is a novel paradigm using crowdsensing spectrum sensors to help with the management of spectrum scarcity. However, well-known vulnerabilities of resource-constrained spectrum sensors and the possibility of being manipulated by users with physical access complicate their protection against spectrum sensing data falsification (SSDF) attacks. Most recent li… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

  38. arXiv:2103.10756  [pdf, other

    cs.CR

    On-Chain IoT Data Modification in Blockchains

    Authors: Sina Rafati Niya, Julius Willems, Burkhard Stiller

    Abstract: In recent years, the interest growth in the Blockchains (BC) and Internet-of-Things (IoT) integration -- termed as BIoT -- for more trust via decentralization has led to great potentials in various use cases such as health care, supply chain tracking, and smart cities. A key element of BIoT ecosystems is the data transactions (TX) that include the data collected by IoT devices. BIoT applications f… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: 10 pages, 3 figures

  39. arXiv:2008.09841  [pdf, other

    cs.CR cs.NI

    Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

    Authors: Christian Killer, Lucas Thorbecke, Bruno Rodrigues, Eder Scheid, Muriel Franco, Burkhard Stiller

    Abstract: Trust in electoral processes is fundamental for democracies. Further, the identity management of citizen data is crucial, because final tallies cannot be guaranteed without the assurance that every final vote was cast by an eligible voter. In order to establish a basis for a hybrid public verifiability of voting, this work (1) introduces Proverum, an approach combining a private environment based… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

  40. arXiv:2004.08812  [pdf, other

    cs.CR

    WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

    Authors: A. De Carli, M. Franco, A. Gassmann, C. Killer, B. Rodrigues, E. Scheid, D. Schoenbaechler, B. Stiller

    Abstract: For the protection of people and society against harm and health threats -- especially for the COVID-19 pandemic -- a variety of different disciplines needs to be involved. The data collection of very basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities and governments can, shall, or need to plan for or… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  41. arXiv:1608.03511  [pdf, other

    quant-ph cs.CR cs.ET physics.ao-ph physics.optics

    Quantum-limited measurements of optical signals from a geostationary satellite

    Authors: Kevin Günthner, Imran Khan, Dominique Elser, Birgit Stiller, Ömer Bayraktar, Christian R. Müller, Karen Saucke, Daniel Tröndle, Frank Heine, Stefan Seel, Peter Greulich, Herwig Zech, Björn Gütlich, Sabine Philipp-May, Christoph Marquardt, Gerd Leuchs

    Abstract: The measurement of quantum signals that traveled through long distances is of fundamental and technological interest. We present quantum-limited coherent measurements of optical signals, sent from a satellite in geostationary Earth orbit to an optical ground station. We bound the excess noise that the quantum states could have acquired after having propagated 38600 km through Earth's gravitational… ▽ More

    Submitted 27 February, 2017; v1 submitted 11 August, 2016; originally announced August 2016.

    Comments: 8 pages (4 pages main article, 4 pages supplementary material), 9 figures (4 figures main article, 5 figures supplementary material), Kevin Günthner and Imran Khan contributed equally to this work

    Journal ref: Optica 4, 611-616 (2017)

  42. arXiv:1510.04507  [pdf

    quant-ph cs.CR cs.ET physics.ao-ph physics.optics

    Satellite Quantum Communication via the Alphasat Laser Communication Terminal

    Authors: Dominique Elser, Kevin Günthner, Imran Khan, Birgit Stiller, Christoph Marquardt, Gerd Leuchs, Karen Saucke, Daniel Tröndle, Frank Heine, Stefan Seel, Peter Greulich, Herwig Zech, Björn Gütlich, Ines Richter, Rolf Meyer

    Abstract: By harnessing quantum effects, we nowadays can use encryption that is in principle proven to withstand any conceivable attack. These fascinating quantum features have been implemented in metropolitan quantum networks around the world. In order to interconnect such networks over long distances, optical satellite communication is the method of choice. Standard telecommunication components allow one… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: International Conference on Space Optical Systems and Applications (IEEE ICSOS 2015), October 27 and 28, 2015, New Orleans, USA, 4 pages, 5 figures

  43. arXiv:1404.2637  [pdf

    cs.NI cs.CR

    Bypassing Cloud Providers' Data Validation to Store Arbitrary Data

    Authors: Guilherme Sperb Machado, Fabio Hecht, Martin Waldburger, Burkhard Stiller

    Abstract: A fundamental Software-as-a-Service (SaaS) characteristic in Cloud Computing is to be application-specific; depending on the application, Cloud Providers (CPs) restrict data formats and attributes allowed into their servers via a data validation process. An ill-defined data validation process may directly impact both security (e.g. application failure, legal issues) and accounting and charging (e.… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: 8 pages, ISBN 978-1-4673-5229-1

    Journal ref: IFIP/IEEE Integrated Network Management Symposium, Ghent, Belgium, 2013, pp. 1-8