5th of December 2019
Trust and Security in the Future Internet Ilaria Matteucci Istituto - - PowerPoint PPT Presentation
Trust and Security in the Future Internet Ilaria Matteucci Istituto - - PowerPoint PPT Presentation
Trust and Security in the Future Internet Ilaria Matteucci Istituto di Informatica e Telematica - Consiglio Nazionale delle Ricerche 5th of December 2019 Main Research Areas Authentication Risk Management Authorization and Usage
Main Research Areas
2
- Authentication
- Authorization and Usage
Control
- Privacy-aware technologies
- Trust and Reputation
Management
- Intrusion Detection
- Formal methods for system
design, analysis, and synthesis
- Risk Management
- Cyber Insurance
- Modelling of Online
Behaviours
- Detection of Fake Accounts
- Online reviews analysis
- Distributed Ledger and
Block-chains
Main Application Scenarios
3
- Critical Infrastructures
Protection
- Power Grid
- Airport security
- Social Media
- Distributed OSN
- Automotive
- Distributed Systems
- Web Services
- Grid
- Cloud
- Mobile Devices
- Internet of Things
- Smart Home
- Critical Data Protection
- E-health
Topic 1: Usage Control in IoT
4
- The IoT scenario (e.g.,
Industry4.0) poses new security and privacy challenges
- Huge amount of data are
continuously created from sensors (data streams)
- Typically stored on the Cloud
- Used for Collaborative Analytics
- Data producers are willing to share
their data only if they can regulate their subsequent usage
Topic 1: Usage Control in IoT
5
- The Usage Control model could be
used to regulate the access to, and the subsequent usage of data and resources in dynamic access contexts
Topic 2. Offensive and Defensive security in Automotive
Reverse engineering on:
- CAN bus considering the different in-vehicle
partitions
- In-Vehicle Infotainment system as entry-point to
CAN communications
Penetration Testing for:
- Remote access to the vehicle
- Passengers’ privacy leakage
- https://youtu.be/6pTvD4wya50
Design and development of :
- Security protocols on CAN bus communication
- Keys exchange mechanisms
- Intrusion detection and prevention systems
6
1010100101010100110 110
Topic 3. Fake News Detection
7
- Evaluation of quality and credibility of online information
- Computational fact-checking
- Provenance and source detection of claims
- Analysis of misinformation spread on social media
- Addressing and quantifying biases eliciting belief in false news
- Quantifying the statistical efficacy of social bots in diffusing false
news
Topic 4. Risk assessment for certification
8
Goal:
- Develop a risk-based cyber security certification schema for software systems (i.e., cloud, IoT/CPS, etc.).
- Objectives:
- Flexible certification scheme
- Easy and fast certification process
- Continuous certification
Approach:
- Develop a methodology suitable for assessment and mitigation of risks
- Integrate risk assessment methodology into a certification schema
- Expand the capabilities of the schema with rapid and frequent risk re-assessment and certification.
The need:
- Strong on-going political trend on cybersecurity certification (e.g., see the EU Cybersecurity Act, or the outcomes from
ESCO, 4 Pilot projects, etc.)
- Security certification schemes targeting products (e.g., Common Criteria) are not risk-assessment based, unlike the
- nes for processes (e.g., ISO 27001, NIST CSF, CSA).
- Security group of IIT has very good knowledge in risk assessment and certification. There is a risk assessment tool for
network systems to start with.
Bibliography
9
Topic 1. Usage Control in IoT
- A. La Marra, F. Martinelli, P. Mori, A. Rizos, A. Saracino. Introducing Usage Control in MQTT protocol for IoT. In Proceedings
- f the 3rd Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2017). In
Conjunction With ESORICS 2017. Lecture Notes in Computer Science, vol 10683. Springer, Cham (2017), 35--43, DOI 10.1007/978-3-319-72817-9_3
Topic 2. Offensive and Defensive security in Automotive
- Costantino, G., Matteucci, I.: CANDY CREAM - haCking infotAiNment anDroid sYstems to Command instRument clustEr via
cAn data fraMe. In: Proceedings of the 17th IEEE International Conference on Embedded and Ubiquitous Computing EUC
- 2019. IEEE (2019, in press)
Topic 3. Fake News Detection
- Guido Caldarelli, Rocco De Nicola, Fabio Del Vigna, Marinella Petrocchi, Fabio Saracco: The role of bot squads in the
political propaganda on Twitter. CoRR abs/1905.12687 (2019)
Topic 4. Risk assessment for certification
- George Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom
Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou: Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations. CAMAD 2019: 1-6
Pisa, 5 Dicembre 2019 Istituto di Informatica e Telematica CNR – Pisa, Italy