(NSF DUE-1315328), Project Title: "EDU: Collaborative: When Cyber Security Meets Physical World: A Multimedia-based Virtual Classroom for Cyber-Physical Systems Security Education to Serve City / Rural Colleges".

 

Year 2016-2017: Independent Study on Advanced Cybersecurity

 

Besides the course materials developed before (please click here: Link 1, Link 2), this year we have focused on the education of graduate students on the contemporary important cyber security topics.

 

For this Independent Study course, we have covered some common topics such as Cloud Security, Web security, Smart Grid security, medical device security, etc. Those topics have also been covered in the previous two courses: (1) ECE 493 - Introduction to CPS Security; and (2) ECE 593 - Advanced CPS security.

 

The new topics covered in this Independent Study include the following items:

 

(Note: For all PDF document provided here, they are used ONLY FOR EDUCATION purpose. The copyright all belong to the original publication sources.)

 

New Added Topics:

Topic 1

Ransom Attacks

 

UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware [PDF] Paper Authors: Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda, Northeastern University (25th USENIX Security Symposium)

Teaching focus: Explain how to detect the ransomware attacks; The concept of file lockers; using artificial user environment; using dissimilarity scores of screenshots to detect screen lockers; Understand the UNVEIL implementation process.

 

Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks [PDF] Paper Authors: Amin Kharraz, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda

Teaching focus: Explain how to use simple ways to stop ransomware attacks. by looking at I/O requests and protecting Master File Table (MFT) in the NTFS file system, it is possible to detect and prevent a significant number of zero-day ransomware attacks.

Topic 2

Machine Learning Security

 

Can Machine Learning Be Secure? [ PDF] Paper Authors: Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar

Teaching focus: A taxonomy of different types of attacks on machine learning techniques and systems, a variety of defenses agains tthose attacks, a discussion of ideas that are important to security for machine learning.

 

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data [PDF]  Paper Authors: Shui Yu

Teaching focus: The concept of big data privacy. Privacy categories. Math models of privacy. How to achieve privacy? (crytography, game theory, policy perspective, etc.)

 

Adversarial Feature Selection against Evasion Attacks [PDF] Paper authors: Fei Zheng, Patrick P. K. Chan, etc.

Teaching focus: Using reduced feature sets on classifier against the ML attacks; adversary-aware feature selection; wrapper-based implementation.

 

Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks [PDF]  Paper authors: Weilin Xu, David Evans, Yanjun Qi

Teaching focus: Secure deep neural networks (DNNs) by reducing the search space available to an adversary. It detects adversarial examples wth high accuracy. Bigger feature space exposes more attacks.

 

AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems [PDF] Paper authors: Shiqi Shen, Shruti Tople, Prateek Saxena

Teaching focus: Security in collaborative deep learning. The poisoning attacks in deep learning. Countermeasure for such a posioning attack. Identify polluted data samples.

Topic 3

Smart City Attacks

 

An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks [PDF] by Cesar Cerrudo

Teaching focus: This is a good overview paper.Give students a big picture on various attacks in smart cities.

 

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [PDF] by Sridhar Adepu and Aditya Mathur

Teaching focus: Water distribution/treatment is important in smart cities. Teach multi-point CPS attack model; using the water flow features to detect such an attack.

 

 

Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks [PDF] by Saurabh Amin, Xavier Litrico, Shankar Sastry, and Alexandre M. Bayen

 

Teaching focus: Teach Deception attacks; control model and attacks; canal system security; SCADA security

 

 Cyber–Physical System Security for the Electric Power Grid [PDF]  by Siddharth Sridhar, Adam Hahn, Manimaran Govindarasu

 

Teaching focus: Teach CPS attacks in power grid. A layered approach to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure. A classification method to highlight dependencies between the cyber–physical controls required to support the smart grid and the communication and computations that must be protected from cyber attacks. Current research efforts aimed at enhancing the smart grid’s application and infrastructure security.

 

 Secure Control: Towards Survivable Cyber-Physical Systems [PDF] By Alvaro A. C´ardenas Saurabh Amin Shankar Sastry

 

Teaching focus: Teach the problem of secure control; the defenses that information security and control theory can provide; challenges that need to be addressed to improve the survivability of cyber-physical systems.

 Topic 4

 Acoustic Attacks

 

 WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers

with Acoustic Injection Attacks [PDF] by Timothy Trippel, Ofir Weisse, Wenyuan Xu*, Peter Honeyman, Kevin Fu

 

Teaching focus: Teach smart phone security. Modeling the physics of malicious acoustic interference on MEMS accelerometers; discovering the circuit-level security flaws that cause the vulnerabilities by measuring acoustic injection attacks on MEMS accelerometers as well as systems that employ on these sensors; software-only defenses that mitigate many of the risks to the integrity of MEMS accelerometer outputs.

 

 Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components [PDF] by Anupam Das, Nikita Borisov, Matthew Caesar

 

Teaching focus: Using microphones and speakers embedded in smartphones to uniquely fingerprint individual devices; During fabrication, subtle imperfections arise in device microphones and speakers, which induce anomalies in produced and received sounds. We can exploit this observation to fingerprint smartphones through playback and recording of audio samples. We can further explore different acoustic features and analyze their ability to successfully fingerprint smartphones.

 

 PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones [PDF], by Bingsheng Zhang, Qin Zhan, Junfei Wang, etc.

 

Teaching focus: A purely software-based solution to secure smartphone short-range communication without the key agreement phase. PriWhisper adopts the emerging friendly jamming technique from radio communication for data confidentiality.

Topic 5

Social-economic secutity 

 

Persona: An Online Social Network with User-Defined Privacy, [PDF] by Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee

 

Teaching focus: Persona is an online social network (OSN) where users dictate who

may access their information. Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine-grained policies over who may view their data. Persona provides an effective means of creating applications in which users, not the OSN, define policy over access to private data.

 

Understanding and Combating Link Farming in the Twitter Social Network [PDF] by Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, etc.

 

Teaching focus: Twitter has become a target for link farming, where users, especially spammers, try to acquire large numbers of follower links in the social network. Acquiring followers not only increases the size of a user’s direct audience, but also contributes to the perceived influence of the user, which in turn impacts the ranking of the user’s tweets by search engines. A simple user ranking scheme that penalizes users for connecting to spammers can effectively address the problem by disincentivizing users from linking with other users simply to gain influence.