Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2021

Hardening cryptographic operations through the use of secure enclaves

Autores
Brandao, A; Resende, JS; Martins, R;

Publicação
COMPUTERS & SECURITY

Abstract
With the rising popularity of the cloud, companies lose control of both the hardware and the operating system responsible for hosting their software and data. This means that companies are at risk of losing confidential data when these are utilized in components controlled by a third-party cloud vendor. Secure enclaves can help solve this problem by creating a secure environment where code can be executed securely, guaranteeing that no unwanted parties read or modify the data inside this secure environment. While the use of secure enclaves has been focused on small footprints software, such as the implementation of trusted computing base for distributed protocols, we analyze the strengths and shortcoming of current tools in an effort to further expand the applicability of their use. Given the importance of web servers and their inherent greater exposure to attacks, we explore the hardening of Apache web server through the use of secure enclaves. This was accomplished by making the necessary modifications to further protect its private key from both the operating system and hypervisor. We also provide a performance assessment to quantify the overhead associated with the use of secure enclaves, namely, Intel SGX.

2021

Secure Remote Storage of Logs with Search Capabilities

Autores
Araújo, R; Pinto, A;

Publicação
J. Cybersecur. Priv.

Abstract
Along with the use of cloud-based services, infrastructure, and storage, the use of application logs in business critical applications is a standard practice. Application logs must be stored in an accessible manner in order to be used whenever needed. The debugging of these applications is a common situation where such access is required. Frequently, part of the information contained in logs records is sensitive. In this paper, we evaluate the possibility of storing critical logs in a remote storage while maintaining its confidentiality and server-side search capabilities. To the best of our knowledge, the designed search algorithm is the first to support full Boolean searches combined with field searching and nested queries. We demonstrate its feasibility and timely operation with a prototype implementation that never requires access, by the storage provider, to plain text information. Our solution was able to perform search and decryption operations at a rate of, approximately, 0.05 ms per line. A comparison with the related work allows us to demonstrate its feasibility and conclude that our solution is also the fastest one in indexing operations, the most frequent operations performed.

2021

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited

Autores
Araújo, R; Pinto, A; Pinto, P;

Publicação
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings

Abstract
Vulnerability scanning tools can help secure the computer networks of organisations. Triggered by the release of the Tsunami vulnerability scanner by Google, the authors analysed and compared the commonly used, free-to-use vulnerability scanners. The performance, accuracy and precision of these scanners are quite disparate and vary accordingly to the target systems. The computational, memory and network resources required be these scanners also differ. We present a recent and detailed comparison of such tools that are available for use by organisations with lower resources such as small and medium-sized enterprises. © 2021, IFIP International Federation for Information Processing.

2021

Controlled and Secure Sharing of Classified Threat Intelligence between Multiple Entities

Autores
Fernandes, R; Pinto, P; Pinto, A;

Publicação
2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021)

Abstract
The Malware Information Sharing Platform (MISP) enables the sharing of cyberthreat information within a community, company or organisation. However, this platform presents limitations if its information is deemed as classified or shared only for a given period of time. This implies that this information should to be handled only in encrypted form. One solution is to use MISP with searchable encryption techniques to impose greater control over the sharing of information. In this paper, we propose a controlled information sharing functionality that features a synchronisation procedure that enables classified data exchange between MISP instances, based on policies and ensuring the required confidentiality and integrity of the shared data. Sequence charts are presented validating the configuration, the data synchronisation, and the data searching between multiple entities.

2021

A Smart Contract Architecture to Enhance the Industrial Symbiosis Process Between the Pulp and Paper Companies - A Case Study

Autores
Gonçalves, R; Ferreira, I; Godina, R; Pinto, P; Pinto, A;

Publicação
Blockchain and Applications - 3rd International Congress, BLOCKCHAIN 2021, Salamanca, Spain, 6-8 October, 2021

Abstract

2021

eHealthCare - A Medication Monitoring Approach for the Elderly People

Autores
Pinto, A; Correia, A; Alves, R; Matos, P; Ascensão, J; Camelo, D;

Publicação
Wireless Mobile Communication and Healthcare - 10th EAI International Conference, MobiHealth 2021, Virtual Event, November 13-14, 2021, Proceedings

Abstract
For the regularly medicated population, the management of the posology is of utmost importance. With increasing average life expectancy, people tend to become older and more likely to have chronic medical disorders, consequently taking more medicines. This is predominant in the older population, but it’s not exclusive to this generation. It’s a common problem for all those suffering from chronic diseases, regardless of age group. Performing a correct management of the medicines stock, as well as, taking them at the ideal time, is not always easy and, in some cases, the diversity of medicines needed to treat a particular medical disorder is a proof of that. Knowing what to take, how much to take, and ensuring compliance with the medication intervals, for each medication in use, becomes a serious problem for those who experience this reality. The situation is aggravated when the posology admits variable amounts, intervals, and combinations depending on the patient’s health condition. This paper presents a solution that optimizes the management of medication of users who use the services of institutions that provide health care to the elderly (e.g., day care centers or nursing homes). Making use of the NB-IoT network, artificial intelligence algorithms, a set of sensors and an Arduino MKR NB 1500, this solution, in addition to the functionalities already described, eHealthCare also has mechanisms that allow identifying the non-adherence to medication by the elderly. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

  • 42
  • 202