To Örebro University

oru.seÖrebro universitets publikasjoner
Endre søk
Link to record
Permanent link

Direct link
Publikasjoner (10 av 30) Visa alla publikasjoner
Giaretta, A. & Banaee, H. (2026). Edge Virtual Fence for Smart Airport Physical Security: A Case Study. In: Bart Coppens; Bruno Volckaert; Vincent Naessens; Bjorn De Sutter (Ed.), Availability, Reliability and Security: ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I. Paper presented at 20th International Conference on Availability Reliability and Security (ARES 2025), Gent, Belgium, August 11-14, 2025 (pp. 41-54). Springer, 15994
Åpne denne publikasjonen i ny fane eller vindu >>Edge Virtual Fence for Smart Airport Physical Security: A Case Study
2026 (engelsk)Inngår i: Availability, Reliability and Security: ARES 2025 International Workshops, Ghent, Belgium, August 11–14, 2025, Proceedings, Part I / [ed] Bart Coppens; Bruno Volckaert; Vincent Naessens; Bjorn De Sutter, Springer, 2026, Vol. 15994, s. 41-54Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The growing digitisation of airport operations has paved the way for the smart airports of the future. One key challenge faced by smaller hubs is minimising the time spent by skilled operators on boring, repetitive tasks, and allowing them to be assigned to more critical duties. One such task is the monitoring of restricted areas to prevent unauthorized access by individuals, vehicles, or wildlife. This paper presents the design and deployment of an Edge-based virtual fence system at a Swedish regional airport, as a case study in implementing privacypreserving and automated surveillance. Our system integrates off-theshelf components, such as IP cameras and AI-powered Edge devices, to detect and respond to trespassing events. Furthermore, we analyse the system's robustness against potential cybersecurity and physical security threats and present our considerations regarding design choices and techniques for mitigating such threats.

sted, utgiver, år, opplag, sider
Springer, 2026
Serie
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349 ; 15994
Emneord
Virtual fence, Edge computing, Airport security, Privacy-preserving surveillance, AI-based surveillance
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-125301 (URN)10.1007/978-3-032-00630-1_3 (DOI)001582753000003 ()9783032006301 (ISBN)9783032006295 (ISBN)
Konferanse
20th International Conference on Availability Reliability and Security (ARES 2025), Gent, Belgium, August 11-14, 2025
Forskningsfinansiär
VinnovaWallenberg AI, Autonomous Systems and Software Program (WASP)
Merknad

This work has been partially supported by Sweden’s Innovation Agency (Vinnova), as part of the project System of Autonomous Airport Systems - The Future for the Cargo Airports (2022-02678), and by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation.

Tilgjengelig fra: 2025-12-02 Laget: 2025-12-02 Sist oppdatert: 2025-12-02bibliografisk kontrollert
Venturini, M., Freda, F., Miotto, E., Conti, M. & Giaretta, A. (2025). Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations. IEEE Transactions on Dependable and Secure Computing, 22(4), 3449-3464
Åpne denne publikasjonen i ny fane eller vindu >>Differential Area Analysis for Ransomware: Attacks, Countermeasures, and Limitations
Vise andre…
2025 (engelsk)Inngår i: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 22, nr 4, s. 3449-3464Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Crypto-ransomware attacks have been a growing threat over the last few years. The goal of every ransomware strain is encrypting user data, such that attackers can later demand users a ransom for unlocking their data. To maximise their earning chances, attackers equip their ransomware with strong encryption which produce files with high entropy values. Davies et al. proposed Differential Area Analysis (DAA), a technique that analyses files headers to differentiate compressed, regularly encrypted, and ransomware-encrypted files. In this paper, first we propose three different attacks to perform malicious header manipulation and bypass DAA detection. Then, we propose three countermeasures, namely 2-Fragments (2F), 3-Fragments (3F), and 4-Fragments (4F), which can be applied equally against each of the three attacks we propose. We conduct a number of experiments to analyse the ability of our countermeasures to detect ransomware-encrypted files, whether implementing our proposed attacks or not. Last, we test the robustness of our own countermeasures by analysing the performance, in terms of files per second analysed and resilience to extensive injection of low-entropy data. Our results show that our detection countermeasures are viable and deployable alternatives to DAA.

sted, utgiver, år, opplag, sider
IEEE, 2025
Emneord
Ransomware detection, entropy, differential area analysis, vulnerabilities, invasive software
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-121212 (URN)10.1109/tdsc.2025.3532324 (DOI)001561098500015 ()2-s2.0-85216116780 (Scopus ID)
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Tilgjengelig fra: 2025-05-22 Laget: 2025-05-22 Sist oppdatert: 2025-12-05bibliografisk kontrollert
Giaretta, A. (2025). Security and privacy in virtual reality: a literature survey. Virtual Reality, 29(1), Article ID 10.
Åpne denne publikasjonen i ny fane eller vindu >>Security and privacy in virtual reality: a literature survey
2025 (engelsk)Inngår i: Virtual Reality, ISSN 1359-4338, E-ISSN 1434-9957, Vol. 29, nr 1, artikkel-id 10Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Virtual reality (VR) is a multibillionaire market that keeps growing, year after year. As VR is becoming prevalent in households and small businesses, it is critical to address the effects that this technology might have on the privacy and security of its users. In this paper, we explore the state-of-the-art in VR privacy and security, we categorise potential issues and threats, and we analyse causes and effects of the identified threats. Besides, we focus on the research previously conducted in the field of authentication in VR, as it stands as the most investigated area in the topic. We also provide an overview of other interesting uses of VR in the field of cybersecurity, such as the use of VR to teach cybersecurity or evaluate the usability of security solutions.

sted, utgiver, år, opplag, sider
Springer, 2025
Emneord
Virtual reality (VR), Privacy, Security, Cybersecurity, Authentication
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-117989 (URN)10.1007/s10055-024-01079-9 (DOI)001380725700002 ()2-s2.0-85212676471 (Scopus ID)
Forskningsfinansiär
Örebro UniversityWallenberg AI, Autonomous Systems and Software Program (WASP)
Merknad

Open access funding provided by Örebro University. This work was partially supported by the Wallenberg AI, Autonomous Systems and Software Program - Humanities and Society (WASPHS) funded by the Marianne and Marcus Wallenberg Foundation and the Marcus and Amalia Wallenberg Foundation.

Tilgjengelig fra: 2025-01-03 Laget: 2025-01-03 Sist oppdatert: 2025-01-07bibliografisk kontrollert
Zhu, Y., Chen, Z., Yan, Q., Wang, S., Giaretta, A., Li, E., . . . Conti, M. (2023). Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. In: Michele Zorzi; Meixia Tao; Walid Saad (Ed.), ICC 2023 - IEEE International Conference on Communications: . Paper presented at IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023 (pp. 2338-2344). IEEE
Åpne denne publikasjonen i ny fane eller vindu >>Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Vise andre…
2023 (engelsk)Inngår i: ICC 2023 - IEEE International Conference on Communications / [ed] Michele Zorzi; Meixia Tao; Walid Saad, IEEE, 2023, s. 2338-2344Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components and not embedded in the payload, loaders cannot be analysed using conventional approaches that rely on honeypots for capturing samples. Different approaches are necessary for studying the loaders evolution and defining a genealogy. To address the insufficient knowledge about loaders' lineage in existing studies, in this paper, we propose a semantic-aware method to measure, categorize, and compare different loader servers, with the goal of highlighting their evolution, independent from the payload evolution. Leveraging behavior-based metrics, we cluster the discovered loaders and define eight families to determine the genealogy and draw a homology map. Our study shows that the source code of Mirai is evolving and spawning new botnets with new capabilities, both on the client side and the server side. In turn, shedding light on the infection loaders can help the cybersecurity community to improve detection and prevention tools.

sted, utgiver, år, opplag, sider
IEEE, 2023
Serie
IEEE International Conference on Communications, ISSN 1550-3607, E-ISSN 1938-1883
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-111188 (URN)10.1109/ICC45041.2023.10278636 (DOI)001094862602074 ()2-s2.0-85178255384 (Scopus ID)9781538674628 (ISBN)9781538674635 (ISBN)
Konferanse
IEEE International Conference on Communications (ICC 2023), Rome, Italy, May 28 - June 1, 2023
Merknad

This work was supported by the Shandong Provincial Key R&D Program of China under Grants No.2021SFGC0401, the National Natural Science Foundation of China under Grants No. 61702218, No.61972176, Project of Shandong Province Higher Educational Youth Innovation Science and Technology Program under Grant No.2019KJN028, Natural Science Foundation of Shandong Province under Grant No. ZR2019LZH015.

Tilgjengelig fra: 2024-01-29 Laget: 2024-01-29 Sist oppdatert: 2025-12-05bibliografisk kontrollert
Giaretta, A. & Loutfi, A. (2023). On the people counting problem in smart homes: undirected graphs and theoretical lower-bounds. Journal of Ambient Intelligence and Humanized Computing, 14(4), 3839-3851
Åpne denne publikasjonen i ny fane eller vindu >>On the people counting problem in smart homes: undirected graphs and theoretical lower-bounds
2023 (engelsk)Inngår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 14, nr 4, s. 3839-3851Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Smart homes of the future will have to deal with multi-occupancy scenarios. Multi-occupancy systems entail a preliminary and critical feature: the capability of counting people. This can be fulfilled by means of simple binary sensors, cheaper and more privacy preserving than other sensors, such as cameras. However, it is currently unclear how many people can be counted in a smart home, given the set of available sensors. In this paper, we propose a graph-based technique that allows to map a smart home to an undirected graph G and discover the lower-bound of certainly countable people, also defined as certain count. We prove that every independent set of n vertices of an undirected graph G represents a minimum count of n people. We also prove that the maximum number of certainly countable people corresponds to the maximum independent sets of G, and that the maximal independent sets of G provide every combination of active sensors that ensure different minimum count. Last, we show how to use this technique to identify and optimise suboptimal deployment of sensors, so that the assumptions can be tightened and the theoretical lower-bound improved.

sted, utgiver, år, opplag, sider
Springer, 2023
Emneord
Counting, Smart Home, Multi-occupancy, Graph Theory, Independent Set
HSV kategori
Forskningsprogram
Datavetenskap
Identifikatorer
urn:nbn:se:oru:diva-94963 (URN)10.1007/s12652-021-03514-0 (DOI)000701599000001 ()2-s2.0-85115885370 (Scopus ID)
Merknad

Funding agency:

Örebro University

Tilgjengelig fra: 2021-10-12 Laget: 2021-10-12 Sist oppdatert: 2023-06-12bibliografisk kontrollert
Ritola, N., Giaretta, A. & Kiselev, A. (2023). Operator Identification in a VR-Based Robot Teleoperation Scenario Using Head, Hands, and Eyes Movement Data. In: Proceedings of the 6th International Workshop on Virtual, Augmented, and Mixed Reality for Human-Robot Interactions (VAM-HRI), 2023: . Paper presented at 6th International Workshop on Virtual, Augmented, and Mixed-Reality for Human-Robot Interactions (VAM-HRI '23), Stockholm, Sweden, March 13-16, 2023. Association for Computing Machinery
Åpne denne publikasjonen i ny fane eller vindu >>Operator Identification in a VR-Based Robot Teleoperation Scenario Using Head, Hands, and Eyes Movement Data
2023 (engelsk)Inngår i: Proceedings of the 6th International Workshop on Virtual, Augmented, and Mixed Reality for Human-Robot Interactions (VAM-HRI), 2023, Association for Computing Machinery , 2023Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Remote teleoperation using a Virtual Reality (VR) allows users to experience better degrees of immersion and embodiment. Equipped with a variety of sensors, VR headsets have the potential to offer automatic adaptation to users' personal preferences and modes of operation. However, to achieve this goal VR users must be uniquely identifiable. In this paper, we investigate the possibility of identifying VR users teleoperating a simulated robotic arm, by their forms of interaction with the VR environment. In particular, in addition to standard head and eye data, our framework uses hand tracking data provided by a Leap Motion hand-tracking sensor. Our first set of experiments shows that it is possible to identify users with an accuracy close to 100% by aggregating the sessions data and training/testing with a 70/30 split approach. Last, our second set of experiments show that, even by training and testing on separated sessions, it is still possible to identify users with a satisfactory accuracy of 89,23%.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, 2023
Emneord
User Identification, Robot Teleoperation, Virtual Reality
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-111187 (URN)
Konferanse
6th International Workshop on Virtual, Augmented, and Mixed-Reality for Human-Robot Interactions (VAM-HRI '23), Stockholm, Sweden, March 13-16, 2023
Tilgjengelig fra: 2024-01-29 Laget: 2024-01-29 Sist oppdatert: 2024-01-31bibliografisk kontrollert
Tavella, F., Giaretta, A., Conti, M. & Balasubramaniam, S. (2022). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. Computer Communications, 187, 59-70
Åpne denne publikasjonen i ny fane eller vindu >>A machine learning-based approach to detect threats in bio-cyber DNA storage systems
2022 (engelsk)Inngår i: Computer Communications, ISSN 0140-3664, E-ISSN 1873-703X, Vol. 187, s. 59-70Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Data storage is one of the main computing issues of this century. Not only storage devices are converging to strict physical limits, but also the amount of data generated by users is growing at an unbelievable rate. To face these challenges, data centres grew constantly over the past decades. However, this growth comes with a price, particularly from the environmental point of view. Among various promising media, DNA is one of the most fascinating candidate. In our previous work, we have proposed an automated archival architecture which uses bioengineered bacteria to store and retrieve data, previously encoded into DNA. The similarities between biological media and classical ones can be a drawback, as malicious parties might replicate traditional attacks on the former archival system, using biological instruments and techniques. In this paper, first we analyse the main characteristics of our storage system and the different types of attacks that could be executed on it. Then, aiming at identifying on-going attacks, we propose and evaluate detection techniques, which rely on traditional metrics and machine learning algorithms. We identify and adapt two suitable metrics for this purpose, namely generalized entropy and information distance.

sted, utgiver, år, opplag, sider
Elsevier, 2022
Emneord
DNA encoding, Storage system, DoS, Metrics, Machine learning
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-99709 (URN)10.1016/j.comcom.2022.01.023 (DOI)000817094300005 ()2-s2.0-85124592700 (Scopus ID)
Tilgjengelig fra: 2022-06-21 Laget: 2022-06-21 Sist oppdatert: 2025-12-05bibliografisk kontrollert
Pirayesh, J., Giaretta, A., Conti, M. & Keshavarzi, P. (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks. Computer Networks, 216, Article ID 109077.
Åpne denne publikasjonen i ny fane eller vindu >>A PLS-HECC-based device authentication and key agreement scheme for smart home networks
2022 (engelsk)Inngår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 216, artikkel-id 109077Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

IoT devices permeate our society, collect personal data, and support critical infrastructures such as the healthcare. Therefore, there is a critical need for authentication and authorization schemes for IoT devices to meet privacy requirements, such as mutual authentication and user anonymity, as well as robustness against security attacks. In this paper, we propose a device authentication and key agreement scheme for IoT networks. Our proposal takes as a model the scheme proposed by Rezai et al., and combines it with a physical layer security technique and a hyper-elliptic curve cryptosystem. Our results show that not only our authentication scheme provides anonymity, mutual authentication, and efficiency, but it also provides resilience to various attacks, including man-in-the-middle, replay, and de-synchronization attacks. Our comparison shows that our scheme performs better than the state-of-the-art in terms of security properties, while adding a small overhead of ≈ 10(ms).

sted, utgiver, år, opplag, sider
Elsevier, 2022
Emneord
IoT, Smart home, Device authentication, Key agreement, PLS, HECC, HECDSA
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-99710 (URN)10.1016/j.comnet.2022.109077 (DOI)000889101200001 ()2-s2.0-85136604673 (Scopus ID)
Tilgjengelig fra: 2022-06-21 Laget: 2022-06-21 Sist oppdatert: 2025-12-05bibliografisk kontrollert
Chimamiwa, G., Giaretta, A., Alirezaie, M., Pecora, F. & Loutfi, A. (2022). Are Smart Homes Adequate for Older Adults with Dementia?. Sensors, 22(11), Article ID 4254.
Åpne denne publikasjonen i ny fane eller vindu >>Are Smart Homes Adequate for Older Adults with Dementia?
Vise andre…
2022 (engelsk)Inngår i: Sensors, E-ISSN 1424-8220, Vol. 22, nr 11, artikkel-id 4254Artikkel, forskningsoversikt (Fagfellevurdert) Published
Abstract [en]

Smart home technologies can enable older adults, including those with dementia, to live more independently in their homes for a longer time. Activity recognition, in combination with anomaly detection, has shown the potential to recognise users' daily activities and detect deviations. However, activity recognition and anomaly detection are not sufficient, as they lack the capacity to capture the progression of patients' habits across the different stages of dementia. To achieve this, smart homes should be enabled to recognise patients' habits and changes in habits, including the loss of some habits. In this study, we first present an overview of the stages that characterise dementia, alongside real-world personas that depict users' behaviours at each stage. Then, we survey the state of the art on activity recognition in smart homes for older adults with dementia, including the literature that combines activity recognition and anomaly detection. We categorise the literature based on goals, stages of dementia, and targeted users. Finally, we justify the necessity for habit recognition in smart homes for older adults with dementia, and we discuss the research challenges related to its implementation.

sted, utgiver, år, opplag, sider
MDPI, 2022
Emneord
Activity recognition, ageing, dementia, habit recognition, smart homes
HSV kategori
Identifikatorer
urn:nbn:se:oru:diva-99532 (URN)10.3390/s22114254 (DOI)000809104700001 ()35684874 (PubMedID)2-s2.0-85131268514 (Scopus ID)
Forskningsfinansiär
EU, Horizon 2020, 754285
Tilgjengelig fra: 2022-06-15 Laget: 2022-06-15 Sist oppdatert: 2024-03-27bibliografisk kontrollert
Giaretta, A., Dragoni, N. & Massacci, F. (2022). S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices. ACM transactions on sensor networks, 18(1), Article ID 12.
Åpne denne publikasjonen i ny fane eller vindu >>S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices
2022 (engelsk)Inngår i: ACM transactions on sensor networks, ISSN 1550-4867, E-ISSN 1550-4859, Vol. 18, nr 1, artikkel-id 12Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S×C) and Fog computing. First, we summarise the necessary background such as the basic S×C definitions. Then, we describe how devices interact within S×C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S×C4IoT can allow legacy S×C-noncompliant devices to participate with an S×C network, we illustrate two different integration approaches, and we show how they fit into S×C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S×C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.

sted, utgiver, år, opplag, sider
Association for Computing Machinery (ACM), 2022
Emneord
IoT, internet of things, security, security-by-contract, S×C, fog computing, configurability, self-configurability, declarative security
HSV kategori
Forskningsprogram
Datavetenskap; Datateknik; Datalogi
Identifikatorer
urn:nbn:se:oru:diva-94966 (URN)10.1145/3480462 (DOI)000841447200012 ()2-s2.0-85137706511 (Scopus ID)
Tilgjengelig fra: 2021-10-12 Laget: 2021-10-12 Sist oppdatert: 2023-12-08
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-9293-7711