Share This Author
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
- Xueping Liang, S. Shetty, Deepak K. Tosh, C. Kamhoua, K. Kwiat, L. Njilla
- Computer ScienceIEEE/ACM International Symposium on Cluster…
- 14 May 2017
This paper designs and implements ProvChain, an architecture to collect and verify cloud data provenance by embedding the provenance data into blockchain transactions, and demonstrates that ProvChain provides security features including tamper-proof provenance, user privacy and reliability with low overhead for the cloud storage applications.
Exploring the Attack Surface of Blockchain: A Systematic Overview
This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, Domain Name System attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
- Muhammad Saad, Jeffrey Spaulding, David A. Mohaisen
- Computer Science, MathematicsIEEE Communications Surveys and Tutorials
- 2 March 2020
This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Estimation of safe sensor measurements of autonomous system under attack
- R. Dutta, Xiaolong Guo, Yier Jin
- Computer Science, MathematicsDesign Automation Conference
- 18 June 2017
This work uses a challenge response authentication (CRA) technique for detection of attack in active sensors data and estimates safe measurements using the recursive least square algorithm to secure an autonomous CPS from such attacks.
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory
- C. Kamhoua, N. Pissinou, Jerry Miller, S. Makki
- Computer ScienceIEEE Globecom Workshops
- 1 December 2010
The evolutionary game theory (EGT) framework is used to address the problem of selfishness in multi-hop wireless networks and the use of distributed algorithms that are able to force selfish nodes to cooperate and forward packets from other nodes, despite their desire to “conserve energy” by not forwarding external packets.
Preventing Colluding Identity Clone Attacks in Online Social Networks
- Georges A. Kamhoua, N. Pissinou, Alex Pissinou Makki
- Computer ScienceInternational Conference on Distributed Computing…
- 1 June 2017
This paper will extract both features and text from a user's profile and build a classifier based on supervised learning techniques to overcome this type of attack by addressing the problem of matching user profiles across multiple OSNs.
Game Theory for Cyber Security and Privacy
This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Reducing Informational Disadvantages to Improve Cyber Risk Management†
The proposed CRISM tool estimates cyberattack probabilities by directly monitoring and scoring cyber risk based on assets at risk and continuously updated software vulnerabilities and produces risk scores that allow organisations to optimally choose mitigation policies that can potentially reduce insurance premiums.
Transfer learning for detecting unknown network attacks
- Juan Zhao, S. Shetty, Jan Wei Pan, C. Kamhoua, K. Kwiat
- Computer ScienceEURASIP Journal on Information Security
- 1 December 2019
A clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack, and several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines performed best.
Hardware Trojan Detection Game: A Prospect-Theoretic Approach
- W. Saad, Anibal Sanjab, Yunpeng Wang, C. Kamhoua, K. Kwiat
- Computer ScienceIEEE Transactions on Vehicular Technology
- 22 March 2017
A novel game-theoretic framework is proposed to analyze the interactions between a hardware manufacturer and an IC testing facility, acting as a defender and shows that the use of PT will provide invaluable insights on the outcomes of the proposed hardware trojan game, in particular, and system security, in general.