liu.seSearch for publications in DiVA
Endre søk
Link to record
Permanent link

Direct link
Nadjm-Tehrani, Simin, ProfessorORCID iD iconorcid.org/0000-0002-1485-0802
Alternativa namn
Publikasjoner (10 av 138) Visa alla publikasjoner
Sivaraman, N., Nadjm-Tehrani, S. & Johansson, T. (2024). Formal Analysis of Julia Key Agreement Protocol. In: 26th International Conference, ICICS 2024, Proceedings, Part II: . Paper presented at 26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024. Springer Nature
Åpne denne publikasjonen i ny fane eller vindu >>Formal Analysis of Julia Key Agreement Protocol
2024 (engelsk)Inngår i: 26th International Conference, ICICS 2024, Proceedings, Part II, Springer Nature, 2024Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The evolution of the fifth-generation network (5G) increases the demand and use of Internet of Things (IoT) devices extensively. The increased number of IoT devices increases the possibility of new attack surfaces, and thus even resource-constrained IoT devices need secure communication. In this work, we consider the Julia Key Agreement (JKA) protocol, which has been proposed as a secure and efficient protocol for communication among resource-constrained IoT devices. We formally model two variants of the JKA protocol and verify the intended security requirements, such as mutual authentication, forward secrecy, backward secrecy, and resilience to key impersonation attacks, using the Tamarin prover. Our formal analysis shows that the JKA protocol is susceptible to replay attacks under the Dolev-Yao threat model. We also expand the threat model by including several strong threat assumptions to discover interesting attack vectors.

sted, utgiver, år, opplag, sider
Springer Nature, 2024
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 15057
Emneord
Key Agreement protocol, IoT security, Formal verification, Tamarin
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-211016 (URN)10.1007/978-981-97-8801-9_9 (DOI)9789819788002 (ISBN)9789819788019 (ISBN)
Konferanse
26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024
Tilgjengelig fra: 2025-01-16 Laget: 2025-01-16 Sist oppdatert: 2025-01-22
Colaco, V. & Nadjm-Tehrani, S. (2023). Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations. In: Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J. (Ed.), Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023): . Paper presented at The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023. CEUR-WS, 3381, Article ID 38.
Åpne denne publikasjonen i ny fane eller vindu >>Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations
2023 (engelsk)Inngår i: Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023) / [ed] Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J., CEUR-WS , 2023, Vol. 3381, artikkel-id 38Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Since machine learning components are now being considered for integration in safety-critical systems, safety stakeholdersshould be able to provide convincing arguments that the systems are safe for use in realistic deployment settings. In the caseof vision-based systems, the use of tree ensembles calls for formal stability verification against a host of composite geometricperturbations that the system may encounter. Such perturbations are a combination of an affine transformation like rotation,scaling, or translation and a pixel-wise transformation like changes in lighting. However, existing verification approachesmostly target small norm-based perturbations, and do not account for composite geometric perturbations. In this work,we present a novel method to precisely define the desired stability regions for these types of perturbations. We propose afeature space modelling process that generates abstract intervals which can be passed to VoTE, an efficient formal verificationengine that is specialised for tree ensembles. Our method is implemented as an extension to VoTE by defining a new propertychecker. The applicability of the method is demonstrated by verifying classifier stability and computing metrics associatedwith stability and correctness, i.e., robustness, fragility, vulnerability, and breakage, in two case studies. In both case studies,targeted data augmentation pre-processing steps were applied for robust model training. Our results show that even modelstrained with augmented data are unable to handle these types of perturbations, thereby emphasising the need for certifiedrobust training for tree ensembles.

sted, utgiver, år, opplag, sider
CEUR-WS, 2023
Serie
CEUR Workshop Proceedings, ISSN 1613-0073 ; 3381
Emneord
Machine Learning, Formal Verification, Tree Ensembles, Composite Perturbations, Geometric Perturbations, Random Forests, Gradient Boosting Machines, Semantic Perturbations, Stability, Robustness, Trustworthy AI, Trustworthy Computing
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-195996 (URN)2-s2.0-85159287306 (Scopus ID)
Konferanse
The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Tilgjengelig fra: 2023-06-30 Laget: 2023-06-30 Sist oppdatert: 2024-10-28bibliografisk kontrollert
Eckhart, M., Ekelhart, A., Allison, D., Almgren, M., Ceesay-Seitz, K., Janicke, H., . . . Yampolskiy, M. (2023). Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Security and Privacy, 21(6), 64-75
Åpne denne publikasjonen i ny fane eller vindu >>Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
Vise andre…
2023 (engelsk)Inngår i: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 21, nr 6, s. 64-75Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

sted, utgiver, år, opplag, sider
IEEE COMPUTER SOC, 2023
Emneord
Security; Behavioral sciences; Emulation; Testing; Mathematical models; Network systems; Digital twins
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-195770 (URN)10.1109/MSEC.2023.3271225 (DOI)001005921400001 ()
Merknad

Funding Agencies|Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK); Federal Ministry for Labor and Economy (BMAW); federal state of Vienna; FFG via the BRIDGE 1 program [880609]; CDL-SQI; Christian Doppler Research Association; Austrian Federal Ministry for Digital and Economic Affairs; National Foundation for Research, Technology and Development; RICS Center on Resilient Information; Swedish Civil Contingencies Agency (MSB); U.S. Department of Commerce; National Institute of Standards and Technology [NIST-70NANB21H121, NIST-70NANB19H170]

Tilgjengelig fra: 2023-06-27 Laget: 2023-06-27 Sist oppdatert: 2024-10-10bibliografisk kontrollert
Saar de Moraes, R. & Nadjm-Tehrani, S. (2022). Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements. In: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022: . Paper presented at ICAS2022, Stockholm, Sweden, 4-9 September, 2022 (pp. 1700-1710). International Council of the Aeronautical Sciences
Åpne denne publikasjonen i ny fane eller vindu >>Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements
2022 (engelsk)Inngår i: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022, International Council of the Aeronautical Sciences , 2022, s. 1700-1710Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper, we apply a grammar-based approach to generate computation and communication platforms for avionic applications with mixed classes of time-sensitive communication messages. Then, we propose an evolutionary algorithm to schedule communication in the platform considering the interaction between timetriggered and bandwidth-constrained traffic. Together, the platform generation approach and the scheduling algorithm support the exploration of avionic systems at the concept level.

sted, utgiver, år, opplag, sider
International Council of the Aeronautical Sciences, 2022
Serie
ICAS proceedings, ISSN 2958-4647 
Emneord
platform architecture exploration; time-sensitive networks; mixed-critical communication; communication scheduling; timeliness analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-203165 (URN)2-s2.0-85159656333 (Scopus ID)9781713871163 (ISBN)
Konferanse
ICAS2022, Stockholm, Sweden, 4-9 September, 2022
Tilgjengelig fra: 2024-04-30 Laget: 2024-04-30 Sist oppdatert: 2025-01-31bibliografisk kontrollert
Lin, C.-Y. & Nadjm-Tehrani, S. (2021). A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. In: Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica (Ed.), Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers. Paper presented at International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (pp. 207-223). Springer
Åpne denne publikasjonen i ny fane eller vindu >>A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks
2021 (engelsk)Inngår i: Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers / [ed] Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica, Springer, 2021, s. 207-223Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Supervisory and Data Acquisition (SCADA) systems control and monitor modern power networks. As attacks targeting SCADA systems are increasing, significant research is conducted to defend SCADA networks including variations of anomaly detection. Due to the sensitivity of real data, many defence mechanisms have been tested only in small testbeds or emulated traffic that were designed with assumptions on how SCADA systems behave. This work provides a timing characterization of IEC-104 spontaneous traffic and compares the results from emulated traffic and real traffic to verify if the network characteristics appearing in testbeds and emulated traffic coincide with real traffic. Among three verified characteristics, two of them appear in the real dataset but in a less regular way, and one does not appear in the collected real data. The insights from these observations are discussed in terms of presumed differences between emulated and real traffic and how those differences are generated.

sted, utgiver, år, opplag, sider
Springer, 2021
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
Emneord
SCADA, Traffic characterization, IEC-104, Timing analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-189696 (URN)10.1007/978-3-030-69781-5_14 (DOI)2-s2.0-85102736813 (Scopus ID)9783030697808 (ISBN)9783030697815 (ISBN)
Konferanse
International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Forskningsfinansiär
Swedish Civil Contingencies Agency
Tilgjengelig fra: 2022-11-03 Laget: 2022-11-03 Sist oppdatert: 2024-08-27
Saar de Moraes, R., Bernardi, S. & Nadjm-Tehrani, S. (2021). A model-based approach for analysing network communication timeliness in IMA systems at concept level. In: Proceedings of the 29th International Conference on Real-Time Networks and Systems: . Paper presented at RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021 (pp. 78-88). Association for Computing Machinery
Åpne denne publikasjonen i ny fane eller vindu >>A model-based approach for analysing network communication timeliness in IMA systems at concept level
2021 (engelsk)Inngår i: Proceedings of the 29th International Conference on Real-Time Networks and Systems, Association for Computing Machinery , 2021, s. 78-88Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Analyzing the resource adequacy of complex cyber-physical systems at concept development stage can be a challenging task since there are a lot of uncertainties about the system at this stage. In Integrated Modular Avionics (IMA) systems, with a life-cycle over several decades and potential functionality changes, we need to estimate resource needs at the early stage but leave capacity to absorb future modifications. Given an envisaged set of functions and a mapping to a candidate platform, one needs to assure that the selected network configuration will provide adequate resources to meet communication timeliness. In particular, whether the set of switches, the topology, and the available bandwidth are sufficient to meet the envisaged needs. In this paper, timeliness requirements are expressed as constraints on the freshness of data and a strict bounding of end-to-end latency. We support generation of UML/MARTE-based specifications by creating a domain-specific meta-model for IMA systems and a resource modelling approach for the study of time-critical systems. The instances of this model then specify the application requirements and various network configurations that can be formally analyzed. We present a tool, M2NC, for automatic derivation of a network calculus model through model transformation, and use the state-of-art NC tools for deriving the bounds for end-to-end timeliness. The approach is illustrated on an example avionics case study, consisting of 91 computational processes that exchange 629 different types of messages. The results of the analysis show that our approach can efficiently provide feedback on configurations that are compliant with the requirements imposed by the application and the toolchain provides a systematic mechanism to quickly identify potential future bottlenecks.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, 2021
Serie
RTNS ’21
Emneord
UML-MARTE, Real-Time Systems, Network Resource Adequacy, Model Verification, Concept Analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-203160 (URN)10.1145/3453417.3453427 (DOI)000933139900008 ()9781450390019 (ISBN)
Konferanse
RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021
Merknad

Funding: This work was supported by the Swedish Governmental Agency for Innovation Systems- Vinnova, as part of the national projects on aeronautics, NFFP7, project CLASSICS (NFFP7 2017-04890). Simona Bernardi was partially supported by the project Medrese (RTI2018098543-B-I00) by the Spanish Ministry of Science, Innovation and Universities.

Tilgjengelig fra: 2024-04-30 Laget: 2024-04-30 Sist oppdatert: 2024-11-22
Toczé, K. & Nadjm-Tehrani, S. (2021). Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018). Wireless Communications & Mobile Computing, 2021, Article ID 9876126.
Åpne denne publikasjonen i ny fane eller vindu >>Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018)
2021 (engelsk)Inngår i: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2021, artikkel-id 9876126Artikkel i tidsskrift (Annet vitenskapelig) Published
Abstract [en]

n/a

sted, utgiver, år, opplag, sider
Wiley Hindawi, 2021
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-184115 (URN)10.1155/2021/9876126 (DOI)000770932000008 ()
Tilgjengelig fra: 2022-04-11 Laget: 2022-04-11 Sist oppdatert: 2022-06-20
Lin, C.-Y., Fundin, A., Westring, E., Gustafsson, T. & Nadjm-Tehrani, S. (2021). RICSel21 Data Collection: Attacks in a Virtual Power Network. In: 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm): . Paper presented at IEEE International Conference on Smart Grid Communications (SmartGridComm), Aachen, Germany, 25-28 October, 2021 (pp. 201-206). Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>RICSel21 Data Collection: Attacks in a Virtual Power Network
Vise andre…
2021 (engelsk)Inngår i: 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Institute of Electrical and Electronics Engineers (IEEE), 2021, s. 201-206Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Attacks against Supervisory Control and Data Acquisition (SCADA) systems operating critical infrastructures have increased since the appearance of Stuxnet. To defend critical infrastructures, security researchers need realistic datasets to evaluate and benchmark their defense mechanisms such as Anomaly Detection Systems (ADS). However, real-world data collected from critical infrastructures are too sensitive to share openly. Therefore, testbed datasets have become a viable option to balance the requirement of openness and realism. This study provides a data generation framework based on a virtual testbed with a commercial SCADA system and presents an openly available dataset called RICSel21, with packets in IEC-60870-5-104 protocol streams. The dataset is the result of performing 12 attacks, identifying the impact of attacks on a power management system and recording the logs of the seven successful attacks.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2021
Emneord
Computers, Protocols, Computer worms, Power system management, Conferences, SCADA systems, Benchmark testing
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-189699 (URN)10.1109/SmartGridComm51999.2021.9632328 (DOI)2-s2.0-85123913802 (Scopus ID)9781665430449 (ISBN)9781665415026 (ISBN)
Konferanse
IEEE International Conference on Smart Grid Communications (SmartGridComm), Aachen, Germany, 25-28 October, 2021
Forskningsfinansiär
Swedish Civil Contingencies Agency
Tilgjengelig fra: 2022-11-03 Laget: 2022-11-03 Sist oppdatert: 2022-11-09bibliografisk kontrollert
Toczé, K., Lindqvist, J. & Nadjm-Tehrani, S. (2020). Characterization and modeling of an edge computing mixed reality workload. Journal of Cloud Computing: Advances, Systems and Applications, 9(1), Article ID 46.
Åpne denne publikasjonen i ny fane eller vindu >>Characterization and modeling of an edge computing mixed reality workload
2020 (engelsk)Inngår i: Journal of Cloud Computing: Advances, Systems and Applications, E-ISSN 2192-113X, Vol. 9, nr 1, artikkel-id 46Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The edge computing paradigm comes with a promise of lower application latency compared to the cloud. Moreover, offloading user device computations to the edge enables running demanding applications on resource-constrained mobile end devices. However, there is a lack of workload models specific to edge offloading using applications as their basis.In this work, we build upon the reconfigurable open-source mixed reality (MR) framework MR-Leo as a vehicle to study resource utilisation and quality of service for a time-critical mobile application that would have to rely on the edge to be widely deployed. We perform experiments to aid estimating the resource footprint and the generated load by MR-Leo, and propose an application model and a statistical workload model for it. The idea is that such empirically-driven models can be the basis of evaluations of edge algorithms within simulation or analytical studies.A comparison with a workload model used in a recent work shows that the computational demand of MR-Leo exhibits very different characteristics from those assumed for MR applications earlier.

sted, utgiver, år, opplag, sider
Springer, 2020
Emneord
Edge; fog computing; Mixed reality; Open-source; Empirical performance evaluation; Workload characterization and modeling; Application instrumentation for data collection; Resource footprint
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-169226 (URN)10.1186/s13677-020-00190-x (DOI)000560710500001 ()2-s2.0-85089493866 (Scopus ID)
Merknad

Funding Agencies|Swedish National Graduate School in Computer Science (CUGS)

Tilgjengelig fra: 2020-09-12 Laget: 2020-09-12 Sist oppdatert: 2024-09-02bibliografisk kontrollert
Törnblom, J. & Nadjm-Tehrani, S. (2020). Formal Verification of Input-Output Mappings of Tree Ensembles. Science of Computer Programming, 194
Åpne denne publikasjonen i ny fane eller vindu >>Formal Verification of Input-Output Mappings of Tree Ensembles
2020 (engelsk)Inngår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 194Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Recent advances in machine learning and artificial intelligence are now beingconsidered in safety-critical autonomous systems where software defects maycause severe harm to humans and the environment. Design organizations in thesedomains are currently unable to provide convincing arguments that their systemsare safe to operate when machine learning algorithms are used to implement theirsoftware.

In this paper, we present an efficient method to extract equivalence classes from decision trees and tree ensembles, and to formally verify that their input-output mappings comply with requirements. The idea is that, given that safety requirements can be traced to desirable properties on system input-output patterns, we can use positive verification outcomes in safety arguments.

This paper presents the implementation of the method in the tool VoTE (Verifier of Tree Ensembles), and evaluates its scalability on two case studies presented in current literature. We demonstrate that our method is practical for tree ensembles trained on low-dimensional data with up to 25 decision trees and tree depths of up to 20.Our work also studies the limitations of the method with high-dimensionaldata and preliminarily investigates the trade-off between large number of trees and time taken for verification.

Emneord
Formal verification, Decision tree, Tree ensemble, Random forest, Gradient boosting machine
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-164563 (URN)10.1016/j.scico.2020.102450 (DOI)000528192400002 ()
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Merknad

Funding agencies: Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Tilgjengelig fra: 2020-03-24 Laget: 2020-03-24 Sist oppdatert: 2022-03-19
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-1485-0802