Skip to main content

Showing 1–43 of 43 results for author: Uluagac, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.00262  [pdf, ps, other

    cs.CR

    Compact and Selective Disclosure for Verifiable Credentials

    Authors: Alessandro Buldini, Carlo Mazzocca, Rebecca Montanari, Selcuk Uluagac

    Abstract: Self-Sovereign Identity (SSI) is a novel identity model that empowers individuals with full control over their data, enabling them to choose what information to disclose, with whom, and when. This paradigm is rapidly gaining traction worldwide, supported by numerous initiatives such as the European Digital Identity (EUDI) Regulation or Singapore's National Digital Identity (NDI). For instance, by… ▽ More

    Submitted 30 May, 2025; originally announced June 2025.

  2. arXiv:2403.03858  [pdf, other

    cs.CR

    Exploring Jamming and Hijacking Attacks for Micro Aerial Drones

    Authors: Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, Selcuk Uluagac

    Abstract: Recent advancements in drone technology have shown that commercial off-the-shelf Micro Aerial Drones are more effective than large-sized drones for performing flight missions in narrow environments, such as swarming, indoor navigation, and inspection of hazardous locations. Due to their deployments in many civilian and military applications, safe and reliable communication of these drones througho… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: Accepted at IEEE International Conference on Communications (ICC) 2024

  3. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices

    Authors: Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, Selcuk Uluagac

    Abstract: In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms. Based on our analysis, we present future research directions and propose design considerations to help ensure the security and privacy of XR devices.

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: This is the author's version of the work. It is posted here for personal/educational use only. The definitive version was published in IEEE Security & Privacy Magazine Jan/Feb 2024

    Journal ref: in IEEE Security & Privacy, vol. 22, no. 01, pp. 10-23, 2024

  4. A Survey on Decentralized Identifiers and Verifiable Credentials

    Authors: Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, Mauro Conti

    Abstract: Digital identity has always been considered the keystone for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has gone through many technological transformations that have also affected the way entities are digitally identified. During this digital evolution, identity management has shifted from centralized to decentralized approaches. The last… ▽ More

    Submitted 16 April, 2025; v1 submitted 4 February, 2024; originally announced February 2024.

    Comments: 32 pages, 15 figures, and 10 tables

    Journal ref: IEEE Communications Surveys & Tutorials, 2025

  5. arXiv:2311.07760  [pdf, other

    cs.CR

    Ransomware Detection Using Federated Learning with Imbalanced Datasets

    Authors: Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, G. Javidi, S. Uluagac, M. Rahouti, E. Bou-Harb, M. Safaei Pour

    Abstract: Ransomware is a type of malware which encrypts user data and extorts payments in return for the decryption keys. This cyberthreat is one of the most serious challenges facing organizations today and has already caused immense financial damage. As a result, many researchers have been developing techniques to counter ransomware. Recently, the federated learning (FL) approach has also been applied fo… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 6 pages, 4 figures, 3 tables

  6. arXiv:2305.09669  [pdf, other

    cs.CR

    SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

    Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla

    Abstract: Modern smart home control systems utilize real-time occupancy and activity monitoring to ensure control efficiency, occupants' comfort, and optimal energy consumption. Moreover, adopting machine learning-based anomaly detection models (ADMs) enhances security and reliability. However, sufficient system knowledge allows adversaries/attackers to alter sensor measurements through stealthy false data… ▽ More

    Submitted 27 April, 2023; originally announced May 2023.

    Comments: 13 Pages, 2023 IEE/IFIP DSN Conference

  7. arXiv:2209.04930  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

    Authors: Ehsan Nowroozi, Mohammadreza Mohammadi, Pargol Golmohammadi, Yassine Mekdad, Mauro Conti, Selcuk Uluagac

    Abstract: In the past decades, the rise of artificial intelligence has given us the capabilities to solve the most challenging problems in our day-to-day lives, such as cancer prediction and autonomous navigation. However, these applications might not be reliable if not secured against adversarial attacks. In addition, recent works demonstrated that some adversarial examples are transferable across differen… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  8. arXiv:2204.11853  [pdf, other

    cs.CV cs.AI cs.CR cs.LG cs.MM

    Real or Virtual: A Video Conferencing Background Manipulation-Detection System

    Authors: Ehsan Nowroozi, Yassine Mekdad, Mauro Conti, Simone Milani, Selcuk Uluagac, Berrin Yanikoglu

    Abstract: Recently, the popularity and wide use of the last-generation video conferencing technologies created an exponential growth in its market size. Such technology allows participants in different geographic regions to have a virtual face-to-face meeting. Additionally, it enables users to employ a virtual background to conceal their own environment due to privacy concerns or to reduce distractions, par… ▽ More

    Submitted 25 April, 2022; originally announced April 2022.

    Comments: 34 pages. arXiv admin note: text overlap with arXiv:2106.15130

  9. arXiv:2112.07623  [pdf, other

    cs.CR

    D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network

    Authors: Ahmet Kurt, Enes Erdin, Kemal Akkaya, A. Selcuk Uluagac, Mumin Cebe

    Abstract: While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this paper, we first propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. Exploiting various anonymity features of LN, we s… ▽ More

    Submitted 22 May, 2023; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Revised version based on anonymous reviewers' comments. Journal extension of https://doi.org/10.1007/978-3-030-59013-0_36

  10. arXiv:2109.14442  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues of UAVs

    Authors: Yassine Mekdad, Ahmet Aris, Leonardo Babun, Abdeslam EL Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac

    Abstract: In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilian applications such as hostage rescue and parcel delivery will integrate smart cities in the future. Nowadays, the affordability of commercial drones expands its usage at a large scal… ▽ More

    Submitted 5 October, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

  11. arXiv:2108.02287  [pdf, other

    cs.CR

    A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems

    Authors: Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac

    Abstract: The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health, transportation, manufacturing, infrastructure, and agriculture. However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities. Honeypots and… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  12. arXiv:2107.07916  [pdf, other

    cs.CR

    A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems

    Authors: Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, Selcuk Uluagac, Mohammad Ashiqur Rahman

    Abstract: Blockchain has become a key technology in a plethora of application domains owing to its decentralized public nature. The cyber-physical systems (CPS) is one of the prominent application domains that leverage blockchain for myriad operations, where the Internet of Things (IoT) is utilized for data collection. Although some of the CPS problems can be solved by simply adopting blockchain for its sec… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: 6 pages, 2 figures, 1 table

  13. arXiv:2103.03851  [pdf, other

    cs.CR

    SoK: Cryptojacking Malware

    Authors: Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

    Abstract: Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware. Especially with re… ▽ More

    Submitted 26 April, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: EuroS&P 2021 Conference

  14. arXiv:2103.03472  [pdf, other

    cs.CR cs.LG

    A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems

    Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac

    Abstract: Smart healthcare systems (SHSs) are providing fast and efficient disease treatment leveraging wireless body sensor networks (WBSNs) and implantable medical devices (IMDs)-based internet of medical things (IoMT). In addition, IoMT-based SHSs are enabling automated medication, allowing communication among myriad healthcare sensor devices. However, adversaries can launch various attacks on the commun… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  15. arXiv:2102.10695  [pdf, other

    cs.CR

    Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

    Authors: Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the-shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed by end-users looking to automate a small deployment. In contrast to these "plug-and-play" systems, purpose-built Enterprise Internet-of-… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

  16. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions

    Authors: Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac

    Abstract: In recent years, ransomware has been one of the most notorious malware targeting end users, governments, and business organizations. It has become a very profitable business for cybercriminals with revenues of millions of dollars, and a very serious threat to organizations with financial loss of billions of dollars. Numerous studies were proposed to address the ransomware threat, including surveys… ▽ More

    Submitted 24 February, 2022; v1 submitted 11 February, 2021; originally announced February 2021.

    Comments: Accepted to ACM Computing Surveys

  17. arXiv:2010.05658  [pdf, other

    cs.CR

    PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings

    Authors: Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: The rise of IoT devices has led to the proliferation of smart buildings, offices, and homes worldwide. Although commodity IoT devices are employed by ordinary end-users, complex environments such as smart buildings, smart offices, conference rooms, or hospitality require customized and highly reliable solutions. Those systems called Enterprise Internet of Things (EIoT) connect such environments to… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: 10 pages, BuildSys 2020

  18. arXiv:2010.03671  [pdf, other

    cs.LG cs.CR

    Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The increasing availability of healthcare data requires accurate analysis of disease diagnosis, progression, and realtime monitoring to provide improved treatments to the patients. In this context, Machine Learning (ML) models are used to extract valuable features and insights from high-dimensional and heterogeneous healthcare data to detect different diseases and patient activities in a Smart Hea… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, Accepted in IEEE Globecom 2020

  19. arXiv:2005.07359  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses

    Authors: AKM Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of the patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices (IMDs), body area networks (BANs), and Internet of… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

    Comments: Security of modern healthcare systems. submitted and under review. 40 pages, 3 figures, 4 tables

  20. A Cost-efficient IoT Forensics Framework with Blockchain

    Authors: Suat Mercan, Mumin Cebe, Ege Tekiner, Kemal Akkaya, Melissa Chang, Selcuk Uluagac

    Abstract: IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. The collected data is crucial in certain applications where IoT devices generate data for critical infrastructure or systems whose failure may result in catastrophic results. Specifically, for such critical applications, data storage poses challenges since the data may be c… ▽ More

    Submitted 30 April, 2020; originally announced April 2020.

  21. arXiv:1912.10617  [pdf, other

    cs.CR

    LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit

    Authors: Ahmet Kurt, Enes Erdin, Mumin Cebe, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: While various covert botnets were proposed in the past, they still lack complete anonymization for their servers/botmasters or suffer from slow communication between the botmaster and the bots. In this paper, we propose a new generation hybrid botnet that covertly and efficiently communicates over Bitcoin Lightning Network (LN), called LNBot. LN is a payment channel network operating on top of Bit… ▽ More

    Submitted 25 April, 2020; v1 submitted 22 December, 2019; originally announced December 2019.

  22. arXiv:1912.00533  [pdf, other

    cs.CR

    A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case

    Authors: Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to increase efficiency, enhance reliability, and reduce costs. However, compromised devices in the smart grid poses several se… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  23. arXiv:1911.10461  [pdf, other

    cs.CR cs.LG

    Real-time Analysis of Privacy-(un)aware IoT Applications

    Authors: Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Users trust IoT apps to control and automate their smart devices. These apps necessarily have access to sensitive data to implement their functionality. However, users lack visibility into how their sensitive data is used (or leaked), and they often blindly trust the app developers. In this paper, we present IoTWatcH, a novel dynamic analysis tool that uncovers the privacy risks of IoT apps in rea… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  24. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  25. arXiv:1910.11138  [pdf, other

    cs.CR

    A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerometer) and sensing-enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor Application Programming Interface (API). In this way,… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: Accepted in IEEE Transaction on Mobile Computing. arXiv admin note: substantial text overlap with arXiv:1706.10220

  26. arXiv:1910.03750  [pdf, other

    cs.CR

    Aegis: A Context-aware Security Framework for Smart Home Systems

    Authors: Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Our everyday lives are expanding fast with the introduction of new Smart Home Systems (SHSs). Today, a myriad of SHS devices and applications are widely available to users and have already started to re-define our modern lives. Smart home users utilize the apps to control and automate such devices. Users can develop their own apps or easily download and install them from vendor-specific app market… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Comments: Accepted in 2019 Annual Computer Security Applications Conference (ACSAC)

  27. arXiv:1910.02139  [pdf, other

    cs.CR

    HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

    Authors: Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

    Abstract: The High Definition Multimedia Interface (HDMI) is the de-facto standard for Audio/Video interfacing between video-enabled devices. Today, almost tens of billions of HDMI devices exist worldwide and are widely used to distribute A/V signals in smart homes, offices, concert halls, and sporting events making HDMI one of the most highly deployed systems in the world. An important component in HDMI is… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Comments: 10 Pages, ACSAC 2019, 8 Figures

  28. arXiv:1910.00508  [pdf, ps, other

    cs.CR

    An Analysis of Malware Trends in Enterprise Networks

    Authors: Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda

    Abstract: We present an empirical and large-scale analysis of malware samples captured from two different enterprises from 2017 to early 2018. Particularly, we perform threat vector, social-engineering, vulnerability and time-series analysis on our dataset. Unlike existing malware studies, our analysis is specifically focused on the recent enterprise malware samples. First of all, based on our analysis on t… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  29. arXiv:1909.10565  [pdf, other

    cs.CR

    HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The integration of Internet-of-Things and pervasive computing in medical devices have made the modern healthcare system "smart". Today, the function of the healthcare system is not limited to treat the patients only. With the help of implantable medical devices and wearables, Smart Healthcare System (SHS) can continuously monitor different vital signs of a patient and automatically detect and prev… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: Accepted to be appeared in The International Symposium on Health and Medical informatics, Management and Security (HMiMS 2019)

  30. arXiv:1812.05558  [pdf, other

    cs.CR

    U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

    Authors: Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

    Abstract: The ubiquitous nature of the IoT devices has brought serious security implications to its users. A lot of consumer IoT devices have little to no security implementation at all, thus risking user's privacy and making them target of mass cyber-attacks. Indeed, recent outbreak of Mirai botnet and its variants have already proved the lack of security on the IoT world. Hence, it is important to underst… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: International Performance Computing and Communications Conference

  31. Identification of Wearable Devices with Bluetooth

    Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley

    Abstract: With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (1) unauthorized wearable devices with correct credentials accessing valuable systems and networks, (2) passive insiders or outsider wearable devices,… ▽ More

    Submitted 13 April, 2025; v1 submitted 27 September, 2018; originally announced September 2018.

    Comments: 15 pages, 10 figures

    Journal ref: IEEE Transactions on Sustainable Computing, 2018

  32. arXiv:1809.00745  [pdf, other

    cs.CR

    IoTDots: A Digital Forensics Framework for Smart Environments

    Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

    Abstract: IoT devices and sensors have been utilized in a cooperative manner to enable the concept of a smart environment. In these smart settings, abundant data is generated as a result of the interactions between devices and users' day-to-day activities. Such data contain valuable forensic information about events and actions occurring inside the smart environment and, if analyzed, may help hold those vio… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

  33. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  34. arXiv:1804.05106  [pdf, other

    cs.CR

    Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

    Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: The smart grid concept has transformed the traditional power grid into a massive cyber-physical system that depends on advanced two-way communication infrastructure to integrate a myriad of different smart devices. While the introduction of the cyber component has made the grid much more flexible and efficient with so many smart devices, it also broadened the attack surface of the power grid. Part… ▽ More

    Submitted 13 April, 2018; originally announced April 2018.

    Comments: 6 Pages, Accepted for publication in International Conference on Communications

  35. arXiv:1802.10417  [pdf, ps, other

    cs.CR

    WACA: Wearable-Assisted Continuous Authentication

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya

    Abstract: One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. I… ▽ More

    Submitted 5 March, 2018; v1 submitted 28 February, 2018; originally announced February 2018.

    Comments: A shorter version of this paper will appear in BioSTAR 2018 Workshop. This is the full version of the paper. 1st update: added ACK section

  36. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  37. Advertising in the IoT Era: Vision and Challenges

    Authors: Hidayet Aksu, Leonardo Babun, Mauro Conti, Gabriele Tolomei, A. Selcuk Uluagac

    Abstract: The Internet of Things (IoT) extends the idea of interconnecting computers to a plethora of different devices, collectively referred to as smart devices. These are physical items - i.e., "things" - such as wearable devices, home appliances, and vehicles, enriched with computational and networking capabilities. Due to the huge set of devices involved - and therefore, its pervasiveness - IoT is a gr… ▽ More

    Submitted 31 January, 2018; originally announced February 2018.

    Comments: Accepted for publication at IEEE Communications Magazine

    ACM Class: H.3

  38. arXiv:1802.02041  [pdf, other

    cs.CR

    A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    Authors: Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

    Abstract: The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, s… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: Sensor-based Threats, Internet-of-Things, Smart Devices, Side Channel Attack

  39. Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles

    Authors: Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, Selcuk Uluagac

    Abstract: Today's vehicles are becoming cyber-physical systems that do not only communicate with other vehicles but also gather various information from hundreds of sensors within them. These developments help create smart and connected (e.g., self-driving) vehicles that will introduce significant information to drivers, manufacturers, insurance companies and maintenance service providers for various applic… ▽ More

    Submitted 9 July, 2018; v1 submitted 2 February, 2018; originally announced February 2018.

    Journal ref: IEEE Communications Magazine, Volume: 56, Issue: 10 , OCTOBER 2018, 50 - 57

  40. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  41. arXiv:1706.10220  [pdf, other

    cs.CR

    6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensor… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    Comments: 18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium

  42. arXiv:1704.03578  [pdf, other

    cs.CR

    A Survey on Homomorphic Encryption Schemes: Theory and Implementation

    Authors: Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti

    Abstract: Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. Especially with popular cloud services, the control over the privacy of the sensitive data is lost. Even when the keys are not shared, the encrypted material is shared with a third party that does not necessarily need to a… ▽ More

    Submitted 5 October, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: - Updated. (October 6, 2017) - This paper is an early draft of the survey that is being submitted to ACM CSUR and has been uploaded to arXiv for feedback from stakeholders

    ACM Class: E.3; K.6.5; K.4.1

  43. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)