Publications

Publications

Artificial Satellites Journal

Detecting Meaconing Attacks by Analysing the Clock Bias of Gnss Receivers.
D. Marnach, S. Mauw, M. Martins, et C. Harpes,
Juin 2013, Volume 48, Issue 2, Pages 63–83, ISSN (Online) 2083-6104, ISSN (Print) 0208-841X, DOI : 10.2478/arsa-2013-0006.

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing, may be performed and remain undetected. In the scope of the project “Developing a prototype of Localisation Assurance Service Provider”, which is funded by ESA and realised by the company itrust consulting and the University of Luxembourg, a methodology to visualise the beginnings and the ends of meaconing attacks by monitoring the clock bias of an attacked receiver over time was developed. This paper presents an algorithm that is based on this attack visualisation technique and is capable of detecting meaconing attacks automatically. Experiments in a controlled environment confirmed that the chosen methodology works properly. In one of these tests, for example, six meaconing attacks were simulated by using a GNSS signal repeater. The algorithm was able to detect the beginnings and the ends of all six attacks, while resulting in no more than two false positives, even though the average delay introduced by the meaconing stations (repeater) was just 80 nanoseconds.

Liens : Lien vers l'article

NAVITEC 2012 Conference

Implementation and validation of a Localisation Assurance service provider.
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, et J. Pang,
Décembre 2012, 6th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, (NAVITEC), pages 1-8. IEEE Computer Society.

Liens : Référence sur http://ieeexplore.ieee.org   Article

(IN)SECURE Magazine

Un article au sujet des PoC malwares pour le détournement des informations des lecteurs intelligents USB, détecté par malware.lu.
Décembre 2012.

Liens : Article sur http://net-security.org

Hack.lu

Malware.lu overview.
P. Rascagnères et H. Caron,
Octobre 2012.

Liens : Présentation sur http://hack.lu

Hack.lu

When malwares target smartcard.
P. Rascagnères et J. Maladrie,
Octobre 2012.

Liens : Présentation sur http://hack.lu

International Journal of Critical Infrastructure Protection

Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
M. Castrucci, A. Neri, F. Caldeira, J. Aubert, D. Khadraoui, M. Aubigny, C. Harpes, P. Simões, V. Suraci, et P. Capodieci,
Juillet 2012.

Liens : Référence sur http://sciencedirect.com

European Navigation Conference

Detecting Meaconing Attacks by Analysing the Clock Bias of GNSS Receivers
de Daniel Marnach, Sjouke Mauw, Miguel Martins, Carlo Harpes
25 - 27 Avril, 2012, Gdansk, Pologne

Liens : Article

Security Research Conference 2010

A Protection Profile for Secure Information Sharing Among Critical Infrastructures, poster session.
M. Aubigny et Carlo Harpes,
22-24 Septembre 2010.

Liens : Article

CRITIS 2010

Risk ontology and Service Quality Descriptor shared among interdependent Critical Infrastructures.
M. Aubigny, C. Harpes, et M. Castrucci,
Septembre 2010.

Liens : Article

EUROCAT 2010

"Secure Location Sharing", présentation et article.
J. Facon, B. Fetler, et C. Harpes,
Août 2010.

Liens : Publication Présentation

Archive