Mshabab Alrizah

CyberSecurity

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and “invisible” way, security becomes critical for the dependability of all smart […]

Embedded systems security: Threats, vulnerabilities, and attack taxonomy Read More »

MICSS: A Realistic Multichannel Secrecy Protocol

Flaws in cryptosystem implementations, such as the Heartbleed bug, render common confidentiality mechanisms ineffective. Defending in depth when this happens would require a different means of providing confidentiality, which could then be layered with existing cryptosystems. This paper presents MICSS, a network protocol which uses multichannel secret sharing rather than encryption to protect data confidentiality.

MICSS: A Realistic Multichannel Secrecy Protocol Read More »

Detecting anomalous latent classes in a batch of network traffic flows

We focus on detecting samples from anomalous latent classes, “buried” within a collected batch of known (“normal”) class samples. In our setting, the number of features for each sample is high. We posit and observe to be true that careful “feature selection” within unsupervised anomaly detection may be needed to achieve the most accurate results.

Detecting anomalous latent classes in a batch of network traffic flows Read More »