2021
Authors
Brandao, A; Resende, JS; Martins, R;
Publication
COMPUTERS & SECURITY
Abstract
With the rising popularity of the cloud, companies lose control of both the hardware and the operating system responsible for hosting their software and data. This means that companies are at risk of losing confidential data when these are utilized in components controlled by a third-party cloud vendor. Secure enclaves can help solve this problem by creating a secure environment where code can be executed securely, guaranteeing that no unwanted parties read or modify the data inside this secure environment. While the use of secure enclaves has been focused on small footprints software, such as the implementation of trusted computing base for distributed protocols, we analyze the strengths and shortcoming of current tools in an effort to further expand the applicability of their use. Given the importance of web servers and their inherent greater exposure to attacks, we explore the hardening of Apache web server through the use of secure enclaves. This was accomplished by making the necessary modifications to further protect its private key from both the operating system and hypervisor. We also provide a performance assessment to quantify the overhead associated with the use of secure enclaves, namely, Intel SGX.
2021
Authors
Araújo, R; Pinto, A;
Publication
J. Cybersecur. Priv.
Abstract
2021
Authors
Araújo, R; Pinto, A; Pinto, P;
Publication
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings
Abstract
Vulnerability scanning tools can help secure the computer networks of organisations. Triggered by the release of the Tsunami vulnerability scanner by Google, the authors analysed and compared the commonly used, free-to-use vulnerability scanners. The performance, accuracy and precision of these scanners are quite disparate and vary accordingly to the target systems. The computational, memory and network resources required be these scanners also differ. We present a recent and detailed comparison of such tools that are available for use by organisations with lower resources such as small and medium-sized enterprises. © 2021, IFIP International Federation for Information Processing.
2021
Authors
Fernandes, R; Pinto, P; Pinto, A;
Publication
2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021)
Abstract
The Malware Information Sharing Platform (MISP) enables the sharing of cyberthreat information within a community, company or organisation. However, this platform presents limitations if its information is deemed as classified or shared only for a given period of time. This implies that this information should to be handled only in encrypted form. One solution is to use MISP with searchable encryption techniques to impose greater control over the sharing of information. In this paper, we propose a controlled information sharing functionality that features a synchronisation procedure that enables classified data exchange between MISP instances, based on policies and ensuring the required confidentiality and integrity of the shared data. Sequence charts are presented validating the configuration, the data synchronisation, and the data searching between multiple entities.
2021
Authors
Gonçalves, R; Ferreira, I; Godina, R; Pinto, P; Pinto, A;
Publication
Blockchain and Applications - 3rd International Congress, BLOCKCHAIN 2021, Salamanca, Spain, 6-8 October, 2021
Abstract
2021
Authors
Pinto, A; Correia, A; Alves, R; Matos, P; Ascensão, J; Camelo, D;
Publication
Wireless Mobile Communication and Healthcare - 10th EAI International Conference, MobiHealth 2021, Virtual Event, November 13-14, 2021, Proceedings
Abstract
For the regularly medicated population, the management of the posology is of utmost importance. With increasing average life expectancy, people tend to become older and more likely to have chronic medical disorders, consequently taking more medicines. This is predominant in the older population, but it’s not exclusive to this generation. It’s a common problem for all those suffering from chronic diseases, regardless of age group. Performing a correct management of the medicines stock, as well as, taking them at the ideal time, is not always easy and, in some cases, the diversity of medicines needed to treat a particular medical disorder is a proof of that. Knowing what to take, how much to take, and ensuring compliance with the medication intervals, for each medication in use, becomes a serious problem for those who experience this reality. The situation is aggravated when the posology admits variable amounts, intervals, and combinations depending on the patient’s health condition. This paper presents a solution that optimizes the management of medication of users who use the services of institutions that provide health care to the elderly (e.g., day care centers or nursing homes). Making use of the NB-IoT network, artificial intelligence algorithms, a set of sensors and an Arduino MKR NB 1500, this solution, in addition to the functionalities already described, eHealthCare also has mechanisms that allow identifying the non-adherence to medication by the elderly. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.