Publications

Publications

The CockpitCI approach

Improving cyber-security awareness on Industrial Control Systems,
T. Cruz, J. Proença, P. Simões, M. Aubigny, M. Ouedraogo, A. Graziano and L. Yasakhetu,
3-4 July 2014, at Piraeus, Greece
In proceeding of: 13th European Conference on Information Warfare and Security ECCWS 2014

Links: Article

ICCGI 2014

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences.
G. Schaff, C. Harpes, M. Aubigny, M. Junger, and R. Martin,
June 22 - 26, 2014, Seville, Spain. In: The Ninth International Multi-Conference on Computing in the Global Information Technology (ICCGI), IARIA, ISBN 978-1-61208-346-9.

Links: Publication

CENTRIC 2013

An application to estimate the cyber-risk detection skill of mobile device users.
G. Schaff, C. Harpes, R. Martin, and M. Junger,
October 27 - November 1, 2013 - Venice, Italy.
The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services; IARIA conference; ISBN: 978-1-61208-306-3.

Links: Article on http://iaria.org

ERCIM NEWS online edition “intelligent cars”

Location Assurance and Privacy in GNSS Navigation.
X. Chen, C. Harpes, G. Lenzini, S. Mauw, and J. Pang,
July 2013.

Links: Article on http://ercim-news.ercim.eu

ACM Conference on Computer and Communications Security

Demonstrating a trust framework for evaluating GNSS signals integrity.
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, and J. Pang,
June 2013, In Proc. 20th ACM Conference on Computer and Communication Security (CCS), pages 1329-1332. ACM Press.

Links: Reference on http://uni.lu   Reference on http://researchgate.net

IEEE Security Fondations Symposium (CSF)

A trust framework for evaluating GNSS signals integrity.
X. Chen, G. Lenzini, M. Martins, S. Mauw, and J. Pang,
June 2013, In Proc. 26th IEEE Security Fondations Symposium (CSF), pages 179-192. IEEE Computer Society.

Links: Reference on http://uni.lu

Artificial Satellites Journal

Detecting Meaconing Attacks by Analysing the Clock Bias of Gnss Receivers.
D. Marnach, S. Mauw, M. Martins, and C. Harpes,
January 2013, Volume 48, Issue 2, Pages 63–83, ISSN (Online) 2083-6104, ISSN (Print) 0208-841X, DOI: 10.2478/arsa-2013-0006.

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing, may be performed and remain undetected. In the scope of the project “Developing a prototype of Localisation Assurance Service Provider”, which is funded by ESA and realised by the company itrust consulting and the University of Luxembourg, a methodology to visualise the beginnings and the ends of meaconing attacks by monitoring the clock bias of an attacked receiver over time was developed. This paper presents an algorithm that is based on this attack visualisation technique and is capable of detecting meaconing attacks automatically. Experiments in a controlled environment confirmed that the chosen methodology works properly. In one of these tests, for example, six meaconing attacks were simulated by using a GNSS signal repeater. The algorithm was able to detect the beginnings and the ends of all six attacks, while resulting in no more than two false positives, even though the average delay introduced by the meaconing stations (repeater) was just 80 nanoseconds.

Links: Link to the article

NAVITEC 2012 Conference

Implementation and validation of a Localisation Assurance service provider.
X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, and J. Pang,
December 2012, 6th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, (NAVITEC), pages 1-8. IEEE Computer Society.

Links: Reference on http://ieeexplore.ieee.org Article

(IN)SECURE Magazine

PoC malware for remote hijacking of USB smart readers
malware.lu.
(IN)SECURE Magazine Issue 36, December 2012, second article on page 30

Links: Article on http://net-security.org

Hack.lu

Malware.lu overview.
P. Rascagnères and H. Caron,
October 2012.

Links: Presentation on http://hack.lu

Archive