Poster

file

Visible to the public Demo: Securing Automotive Zonal Architectures with Named Data Networking

Data-centric architectures are a candidate for in-vehicle communication. They add naming standardization, data provenance, security, and improve interoperability between different ECUs and networks. In this demo, We demonstrate the feasibility and advantages of data-centric architectures through named Data Networking (NDN). We deploy a bench-top testbed using Raspberry PIs to demonstrate NDNs value in a segmented network. We replay real CAN data over a CAN hat to NDN gateways and demonstrate how that data can be forwarded between segments using NDN.

file

Visible to the public Identifying Online Misbehavior

Online misbehavior such as stalking, doxxing, inappropriate messages, is prevalent on mobile applications. We observed that app users report such incidents in the app reviews. Victims of such incidents are intimidated and feel unsafe on the apps. App developers and the app distribution stores should be aware of such incidents, and take actions to rectify the misuse problem. We explored multiple Natural Language Processing (NLP) techniques to identify such incidents from the app reviews data set. Our best model achieved 80.63% precision at 73.48% recall.

file

Visible to the public DREAD: Dark web Retrieval, Examination, And Detection

The Dark Web is infamous for abetting criminal activity by providing some level of anonymity for its users through the use of the Tor Network. The sale of banned substances, weapons, and illegal services is frequent on the dark web, creating a significant problem for law enforcement at every level. To combat this issue, we have developed DREAD: a Dark Web search engine designed to identify banned substances, weapons, and illicit activity on the Dark Web.

file

Visible to the public Applying Software Security Growth Model to Web Browser Software

Traditional software reliability growth models limit consideration of the software reliability metrics to software testing and defect data only. In contrast, vulnerability discovery models consider post-release vulnerability data and apply software reliability growth models to future software versions. However, vulnerability data are sparse and are a subset of all undiscovered vulnerabilities, resulting in overestimating the vulnerability prediction in the next software release.

file

Visible to the public Toward Automatic Detection of Cloud Server Security Vulnerabilities

Cloud systems have been widely adopted in many real world production applications. Thus, security vulnerabilities in those cloud systems can cause serious widespread impact. Although previous intrusion detection systems can detect security attacks, understanding the underlying software defects that cause those security vulnerabilities is little studied. In this work, we conduct a systematic study over 109 software security vulnerabilities in 13 popular cloud server systems.

file

Visible to the public Threat-related Document Clustering for Continuous Monitoring of Threat Intelligence

Continuous monitoring and sharing of threat intelligence have become a priority for organizations, as the cyberthreat landscape is evolving. Cybersecurity vendors regularly publish threat-related documents, which describe how sophisticated cyberattacks are performed and how the threat landscape is changing. However, threat-related documents are written in natural language and there are often documents published by multiple vendors discussing the similar set of cyberattacks.

file

Visible to the public Are Your Dependencies Code Reviewed? Measuring Code Review Coverage During Dependency Updates

Modern software makes extensive use of third-party open source packages and libraries, referred to as dependencies [12]. However, the use of open source has opened up new attack vectors, as malicious or vulnerable code can sneak into a software through these third-party dependencies [11]. Further, practitioners recommend keeping dependencies up to date with the latest version [1], resulting in developers to keep pulling in new code through frequent dependency updates [4], often automatically and without a security review [10].

file

Visible to the public A Study of Security Weaknesses in Android Payment Service Provider SDKs

Payment Service Providers (PSP) enable application developers to effortlessly integrate complex payment processing code using software development toolkits (SDKs). While providing SDKs reduces the risk of application developers introducing payment vulnerabilities, vulnerabilities in the SDKs themselves can impact thousands of applications. In this work, we propose a static analysis tool for assessing PSP SDKs using OWASP’s MASVS industry standard for mobile application security.

file

Visible to the public Guidelines for Improving Cyber Security Reporting with External Validation

The development of a science is an iterative and systematic process that requires rigor and validity both in the conduct of the research and the reporting of the research. Using input from the SoSL community, we developed a set of guidelines describing the information a research report should contain to maximize the contribution of the work and to facilitate the development of a science of security. Then, to gather feedback on the usability of the guidelines, we hosted a workshop at the SoSL Fall quarterly meeting where participants applied the guidelines to their own papers.

file

Visible to the public Cyber-Physical Systems Undergraduate Education

Cyber-physical systems (CPS) are a vital component of the modern way of life. The public has only recently become aware of their importance and fragility, via events like the Colonial Pipeline at-tack. Increasing the expertise and size of the CPS work force is critical for the operation, modernization, and defense of the United States’ most critical infrastructure. This paper explores the state of undergraduate CPS higher education in the literature and practice on college campuses. A large disparity in CPS definitions, course structure, and implementation of these courses is discussed.