Graphical User Interface for ASSA-PBN
Student: Gary CORNELIUS
Level: Master
Supervisor: Dr. Andrzej Mizera
Duration: February — July 2015
Description:
Comprehensive understanding of cellular mechanisms requires the development of efficient methods and
techniques for formal modelling and analysis of real-life biological systems. In this project we concentrate on the
steady-state analysis of Gene Regulatory Networks (GRNs) cast into the framework of Probabilistic Boolean
Networks (PBNs). PBNs is a probabilistic generalization of the standard framework of Boolean Networks: it
incorporates rule-based dependencies between genes, permits systematic study of global network dynamics,
allows to cope with uncertainty, both in data and the model selection, and permits the quantification of the
relative influences and sensitivities of genes in their interactions with other genes.
The dynamics of PBNs is governed by discrete-time Markov chains (DTMCs). Specifically, the dynamics of
a variant of PBNs, i.e., PBNs with perturbations, is governed by an ergodic DTMC. Characterisation of the long-run
behaviour of a PBN and quantification of the influences of genes on other genes are both based on the
steady-state distribution of the associated DTMC. Therefore, efficient computation of steady-state probabilities is
of utter importance. It is well studied how to compute the steady-state distribution of small PBNs with numerical
methods. However, due to their high computational cost and memory requirements, these methods are not scalable. In the literature, a few statistical methods such as Monte Carlo methods, are proposed to deal with large PBNs.
The aim of this project is further development of ASSA-PBN, a tool for approximate steady-state analysis of large PBNs. ASSA-PBN implements
numerical methods for exact analysis of small PBNs and statistical methods for approximate analysis of large PBNs.
The current version supports three different statistical methods, i.e., the perfect simulation algorithm, the
two-state Markov chain approach, and the Skart method. Within this project
ASSA-PBN is being provided with a GUI. In particular the GUI will allow to
- open, save, import, and export PBN models;
- generate a PBN model complying with a provided specification;
- simulate a PBN;
- perform the computation of steady-state probability for a specified set of states with available methods;
- visualise the PBN structure;
- compute the long-term influence of a specified gene on a given target gene.
Keywords: Gene Regulatory Networks, Probabilistic Boolean Networks, software tool, GUI
Distance bounding protocols based on random graphs
Student: Simon BANDELLA
Level: Bachelor
Supervisors: Prof. Dr. Sjouke Mauw and
Dr. Rolando Trujillo Rasúa
Duration: 17/01/2015-31/05/2015
Description:
We have analysed the state-of-the art on graph based distance bounding protocols. The performed analysis shows that the fixed graph structure used by this type of protocols provides an advantage to the adversary that could be overcome by using random graphs instead. Therefore, we propose the notion of distance bounding protocols based on random graphs. The proposed protocols have been evaluated by means of a simulation tool that compare our protocol with other distance bounding protocols. The empirical results confirm the advantages of the new design.
Result: successful defense
Inferring Friendship from Check-in Data of Location-Based Social Networks
Student: Ran Cheng
Level: Master
Supervisors: Dr. Jun Pang and Yang Zhang
Duration: From February 2014 to October 2014.
Description:
In recent years, the relation between human mobility and social connection
attracts a lot of attention from both industry and academia.
In the past, obtaining people's mobility information is considered to be an obstacle
for related studies. Nowadays, however, with the ubiquity of GPS-enabled mobile devices and
location-based social networking services, gaining people's
spatial-temporal location information becomes easier.
These spatial-temporal location information brings us opportunities to investigate on
some valuable information of a particular individual,
such as his interests, his visiting pattern and his real-life social connections.
Particularly, this project focuses on predicting
whether there exists friendship between two individuals according to their mobility information.
As friends tend to visit same places, we consider the number of co-occurrences and
the number of locations that two people co-occurred to be indicators of friendship.
Besides, the visiting time interval between two users also has an effect on friendship prediction.
By conducting machine learning technique on all the information above,
we construct two friendship prediction models.
The first model refers to predicting friendship of two people
with only one of their co-occurred places' information.
It aims at achieving an effective prediction model under the situation
that only limited resources are provided.
The second model proposes solution for predicting friendship of two people
where all the information of their
every particular co-occurred place is essential.
The result shows that both models outperform the state-of-art models
for location-based friendship prediction.
Keywords:
Social relations, spatio-temporal data, location-based services, machine learning
Fighting Fingerprinting for Privacy
Student: Christof FERREIRA TORRES
Level: Bachelor
Supervisor: Dr. Ir. Hugo Jonker
Duration: February — May 2014
Description:
Fingerprinting is a way to identify users that does not depend on
client-side storage (unlike cookies, Flash cookies, etc.).
Fingerprinting is used by both anti-fraud companies and advertising
companies to identify users. Fingerprinting can be done passively, only
based on the interaction between the client and server, or actively,
using client-side scripting to uncover more information about the
client.
In either case, a user who browses the Internet will be open to
fingerprinting by each site (s)he visits. More particularly, any site
that incorporates content from another site -- such as a "share this"
button -- allows the user to be tracked by this second site.
The goal of this project is firstly to analyse how fingerprints are, how
they work, and how they are currently used. Based on that, this project
will develop a FireFox plugin that will improve privacy on the Internet.
Keywords: online privacy, FireFox, fingerprinting, tracking.
Deblurring blurred text
Student: François LANGE
Level: Bachelor
Supervisor: Dr. Ir. Hugo Jonker
Duration: February — May 2014
Description:
Sensitive text (account numbers, personally identifying information,
etc.) is often blurred before being published in newspapers, websites
etc. In this project, we investigate to what extent such hidden
information is recoverable.
The project first surveys possible approaches to deblurring from
literature. In addition, more "thinking out-of-the-box" approaches will
be considered. Based on this survey, one approach is selected and
implemented as a GIMP plugin.
Keywords: deblurring, GIMP
Evaluating Security Protocols for Enforcing Topology-based Access
Control
Student: Nida Khan
Level: Master
Supervisors: Dr. Jun Pang and Yang
Zhang
Duration: From November 2013 to February 2014.
Description:
Large quantity of data in online social networks
(OSNs), such Facebook and Google+, give rises to privacy concerns for
their users. Access control is one of the most straightforward ways to
address this challenge. Relationship-based access control schemes have
been proposed in recent years to protect users' privacy in social
networks. In such schemes, whether a user can view another one's
information depends on the relationship between them.
Recently, we have proposed cryptographic protocols to enforce three
fine-grained relationship-based access control polices which are
topology-based, including k-common friends, k-depth and celebrity in
decentralised social networks. These protocols are mainly built on
paring-based cryptosystems. Their efficiency and security have been
analysed under honest but curious as well as malicious adversary
models. In this project, we focus on the performance of our
proposed protocols and evaluate their computational and communication
overheads through simulations on real social network topologies.
Keywords:
Social networks, security protocols, access control.
DRM for Privacy
Supervisor:
Dr. Ir. Hugo Jonker
Duration: From February 2013 to May 2013.
Description:
Smart phones make taking and sharing photos easy. However, not all
photos should be treated publicly. A photo of a wild night in a disco
should be treated differently from a photo taken in broad daylight in
front of a touristic sight. The goal of this project is to develop an
app that enables users to share photos, while ensuring that the shared
photos can only be viewed in circumstances sufficiently similar to the
ones in which the picture was taken (context privacy).
Keywords:
DRM, context-aware privacy, Android.
User similarity and privacy based on mobility profiles
Student: Ruipeng Lu
Level: Master
Supervisors: Dr. Jun Pang and Xihui Chen
Duration: From February 2013 to October 2013.
Description:
Social networks has become an essential part of many people's everyday lives.
A lot of social networks have deployed location-based services with which
friends can share favorite places or outdoor activities by virtue of the increasingly
ubiquitous devices that are able to acquire locations accurately.
Location-based services leads social networks to a new approach of user
recommendation based on the similarity of users' mobility profiles
which are their frequent movement behavior extracted from their movement history.
This can be done by measuring the extent of proximity between users' movement trajectories,
or semantically by measuring the extent of closeness
between the functionalities of places often visited by users.
In this project, we propose principles that user similarity measures
based on mobility profiles should follow, and identify the defects of the existing
user similarity measures in the literature.
We further propose three novel similarity measures, one without semantics
and the other two with semantics.
The experimental results on real datasets corroborate that our new similarity measures
outperform the existing ones. We also develop the MinUS software tool that
coalesces the mobility profile construction process and the comparison of user similarity
using the existing or our new similarity measures.
Keywords:
Data mining, mobility profiles, spatio-temporal trajectories,
user similarity, location-based services
Multiple Antivius Engine Scanners
Student: Catalin Anton
Level: Master
Supervisor(s): Matthijs
Melissen and Patrick
Schweitzer
Duration: From July 2012 to January 2013.
Description:
The
Multiple Antivirus Engine Scanners project aims at providing
a user-friendly and fast solution to the problem of diagnosing if a
given file is susceptible to contain a particular malware code. The
proposed system is intended as a local scanning tool. This feature will
avoid the further dissemination of the targeted attack malware code,
which may be possible if an online scanning tool is used. It is also
presumable that if an on-line tool is used, the initiators of the attack
may become aware that a targeted malware code is suspected. This will
give them an opportunity to change their course of action to alternative
attacks.
Keywords:
Privacy, anti-virus scanners, malware.
Carving proprietary communication protocols
Students: Ana GAGGERO and Loïc GAMMAITONI
Level: Master
Supervisors: Prof. Dr. Sjouke Mauw and Dr. Ir. Hugo Jonker
Duration: From September 2012 to January 2013.
Description:
The main topic of this project is the reverse-engineering of
proprietary protocols. The envisioned approach will be to select a
protocol for which a closed-source application is distributed to its
users. An example of such protocols is the Skype protocol. By varying
the input to the application and recording the traffic, traces of the
system can be created. The next step is to extend current methods for
analyzing these traces, in order to recover the underlying
protocol. The final step is to implement these methods in an
(existing) prototype.
Keywords:
carving, reverse-engineering, skype, black box analysis
SpyDroid
Student: Filipe FERREIRA
Level: Bachelor
Supervisor: Dr. Ir. Hugo Jonker
Duration: From September 2012 to December 2012.
Description:
Recently, researchers found a way to leverage an iPhone's
accelerometers to infer keystrokes. By leaving a phone running a special
measuring app close to the keyboard, the app is able to make reasonable
guesses at what the typed word is.
The goal of this project is to develop a proof-of-concept:
implement this technique for an Android phone, and set up a working
demonstration.
Keywords:
Android, password, signal-processing.
Constructing and comparing user mobility profiles in LBS
Student: Ran Xue
Supervisor(s): Dr. Jun
Pang and Xihui
Chen
Level: Master
Duration: From February 2012 to October 2012.
Description:
Along with the increasing availability of location-acquisition
technologies such as GPS and GSM networks among others, we have better
access to the collection of large spatio-temporal datasets. This brings
us new opportunities in location-based services. First, using that
large amount of information of spatio-temporal data, we can discover
useful knowledge about users' movement behavior. Second, using the
location-acquisition technologies, users can record their location
histories. Such real-world location histories allow for the discovery of
users' points of interests in places over time. This helps us to
understand the relationships between users based on their location data.
As a requirement for recommendation systems, we need to calculate a
similarity score between each two users to recommend each user a list of
potential friends. This project will study new methods to generate
users' mobility profiles and calculate users' similarity between each
other.
Keywords:
Privacy, location-based services, data mining, mobility profiles,
spatial trajectories.
Reverse engineering communication protocols
Student: Bianca Miniberger
Supervisor(s): Prof. Dr.
Sjouke Mauw and Dr. Sasa
Radomirovic
Level: Master
Duration: From October 2011 to March 2012.
Description:
A notorious problem in digital forensics is the recovery of hidden,
deleted, or partially destroyed data. In order to solve this problem,
it is essential to know the structure, such as a file format or a
protocol specification, of the data that is being reconstructed. If the
structure is unknown it needs to first be reverse-engineered.
This project concerns the reverse-engineering of a protocol
specification from observations of messages exchanged during the
execution of a communication protocol. Its starting point is a recent
paper on this topic by van Deursen, Mauw, and Radomirovic. The paper is
available
here.
Keywords:
Digital Forensics, carving, reverse-engineering.
Implementation and validation of security checks
for GNSS location assurance
Student: Daniel Marnach
Supervisor(s): Prof. Dr.
Sjouke Mauw
Level: Master
Duration: From August 2011 to February 2012.
Description:
Global Navigation Satellite Systems (GNSS) offer no authentication of
their satellites towards their civilian users. As a consequence, two
types of attacks, namely meaconing and GNSS signal spoofing, may be
performed in order to falsify the computed locations.
The LASP project aims to compensate the missing authentication by
introducing the Location Assurance Provider (LAP), a Trusted Third
Party whose purpose it is to estimate the probability that a claimed
location is correct. To do so, it runs a number of so called security
checks. Each of these algorithms gets as input data sent to the LAP by
one or more users, checks whether a particular condition holds, and
returns its opinion on whether the analysed data is authentic.
In this project, we introduce a new security check that is based on the
clock bias of receivers towards the GPS reference time. The design of
this check entailed an extensive reverse engineering of the employed
equipment's behaviour. The clock bias security check has been tested
under laboratory conditions and looks very promising. It was possible to
detect simulated meaconing attacks without having too many false
positives.
Keywords:
location assurance, GNSS, subjective logic, PKI.
Anonymity and privacy in electronic toll
collection systems
Student: David Kamdoum
Supervisor(s): Dr. Jun
Pang and Xihui
Chen
Level: Master
Duration: From February 2011 to December 2011.
Description:
The popularity and cheap access of localisation chips of Global
Navigation Satellite Systems offers chances to upgrade Electronic Toll
Pricing (ETP) Systems. Vehicles' locations are collected by the toll
server automatically and used to compute drivers' tolls at the end a
toll session. This brings a number of benefits to clients, providers
and environment as well. However, it also causes a lot of concern of
people's location privacy.
A few privacy preserving mechanisms have been proposed in last few
years. We find that the attacker (adversarial server) can still learn
more about users' locations with the data available in the proposed
systems, for example, through statistical analysis. In this project, we
want to analyse the effects of statistical analysis from the attacker's
view, and analyse whether public information, e.g., home address,
driving habits can be used to breach users' location privacy as well.
Keywords:
location privacy, anonymity, ETP systems, metrics.
Identifying users by typing cadence
Student: Yiwen Meng
Supervisor(s): Dr. Sasa
Radomirovic
Level: Master
Duration: From February 2011 to October 2011.
Description:
It is well-known that most people have a unique typing rhythm. The aim
of this project is to deduce, in a first step, as much information as
possible about an individual from his or her typing rhythm. In a second
step, given a variety of side-channel information, the aim is to deduce
as much as possible about the
content typed by an individual.
Keywords:
Privacy, keystroke dynamics.
Evaluation of attributes on attack-defense trees
Student: Jean-Paul Weber
Supervisor(s): Dr.
Barbara Kordy and Patrick
Schweitzer
Level: Master
Duration: From February 2011 to October 2011.
Description:
Evaluation of attributes on attack-defense trees.
Keywords:
attack trees, attack-defense trees, security assessment, attributes.
Mafia attacks on RFID and NFC devices
Student: Cheng Xing
Supervisor(s): Dr. Sasa
Radomirovic and Ton van Deursen
Level: Master
Duration: From February 2011 to October 2011.
Description:
In this project, relay attacks on NFC smart phones are implemented. The
viability of these attacks on typical NFC payment applications is
studied in practice and in a formal model. Finally, countermeasures are
proposed and proved correct in the formal model.
Keywords:.
Security and reliability analysis of clustering
protocols
Student: Qian Li
Supervisor(s): Dr. Jun
Pang and Dr. Peter Schaffer
Level: Master
Duration: From February 2011 to October 2011.
Description:
With the advances in sensor development technologies, wireless sensor
networks (WSNs) are growing popular for a wide range of applications in
the military and civil domains. WSNs usually comprise a mass of small,
energy constrained sensor nodes with limited processing and wireless
communication capabilities. Sensor nodes are often grouped into
clusters which are mostly disjoint and consist of a leader, referred to
as the cluster head, and member nodes. The cluster heads are usually
elected in the network through local or global mechanisms. The cluster
head controls the operation of its cluster.
The security and reliability aspects of clustering, or, in other words,
resilience against attacks have gained modest attention so far. An
attacker can have various goals ranging from reducing the efficiency of
data collection performed by the sensor network to the complete
disruption of operation. These attacks can be mounted by preventing the
termination of the algorithm, confusing the nodes with regard to their
responsibilities in the network, retracing the network structure and
launching targeted attacks, etc. Such sophisticated attacks can have a
larger impact than attacks against randomly chosen nodes. The goal of
this project is to find, formally define and explore the key properties
the fulfillment of which provides resistance against attacks of any
kind.
Keywords:
Security, reliability, clustering protocols, formal methods.
Note: This is a project with
SnT.
Probabilistic modelling and analysis of the PDGF
signalling pathway
Student: Qixia Yuan
Supervisor(s): Dr. Jun Pang
Level: Master
Duration: From February 2011 to October 2011.
One
paper based on this work
has been published in the proceedings of CompMod'11.
Description:
Due to the similarity between biological systems and complex
distributed/reactive systems studied in computer science, modeling and
analysing techniques developed in the field of formal methods can be
applied to biological systems as well. In this project, we apply the
probabilistic model checker PRISM to the analysis of a biological system
-- the Platelet-Derived Growth Factor (PDGF) signaling pathway,
demonstrating in detail how this pathway can be analysed in PRISM.
Keywords:
Probabilistic model checking, biological pathways, biological modelling,
verification.
Extending a certified email protocol with
transparent TTP and its formal verification
Student: Zhiyuan Liu
Supervisor(s): Dr. Jun
Pang and Dr.
Chenyi Zhang
Level: Master
Duration: From February 2010 to October 2010.
One
paper based on
this work has been published in the proceedings of TrustCom'10.
Another paper
paper based
on this work has been accepted for publication in the proceedings of
TTSS'10.
Description:
Cederquist et al. proposed an optimistic certified email protocol, which
employs key chains to reduce the storage requirement of the trusted
third party. We extend their protocol to satisfy one more property of
TTP (trusted third party) transparency, using an existing verifiably
encrypted signature scheme based on bilinear pairings. We are able to
show, by a detailed comparison, that our extended protocol is one of the
most efficient certified email protocols satisfying strong fairness,
timeliness, effectiveness and TTP transparency.
We analyse the
extended protocol using the technique of automatic formal verification.
The finite-state model checker Mocha is adopted to verify the properties
of fairness, timeliness and effectiveness. The toolset mCRL is used to
verify the property of TTP transparency.
Keywords:
Certified email protocols, TTP transparency, fairness, formal
verification.
Privacy in social networking sites: A comparative
study and a scheme on collaborative management
Student: Yanjie Sun
Supervisor(s): Dr. Jun Pang
Level: Master
Duration: From February 2010 to October 2010.
A
paper based on this work
has been accepted to be published in the proceedings of STM'10.
Description:
Social networks have sprung up and become a hot issue of current
society. In spite of the fact that these networks provide users with a
variety of attractive features, much to users' dismay, however, they are
likely to expose uses' private information.
In this thesis, we
conduct a full-fledged privacy exploration on six typical social
networking sites. Our study mainly revolves around the life cycle of
users' private data, which pertains to collection, procession, retention
and deletion. An exhaustive comparative analysis has been undertaken to
reveal a wide range of privacy risks.
To address the privacy problem
incurred by resource sharing, we propose an approach which adopts
collaborative management to obtain a joint decision reflecting the
"general will". Our proposed algorithm utilizes trust relations in
social networks and combines it with the Condorcet preferential voting
scheme. An optimization is further developed to improve its efficiency.
Considering users might feel bored in the case of large number of
sharing resources, an inference technique is introduced to relieve user
from the burden of massive manual input.
Keywords:
Privacy, Condorcet voting, social networking.
Game-based verification of multi-party contract
signing protocols
Student: Ying Zhang
Supervisor(s): Dr. Jun
Pang and Dr.
Chenyi Zhang
Level: Master
Duration: From February 2009 to October 2009.
A
paper based on this work
has been published in the proceedings of FAST'09.
Description:
A multi-party contract signing (MPCS) protocol is used for a group of
signers to sign a digital contract over a network. We analyse the
protocols of Mukhamedov and Ryan (MR), and of Mauw, Radomirovic and
Torabi Dashti (MRT), using the finite-state model checker Mocha. Mocha
allows for the specification of properties in alternating-time temporal
logic (ATL) with game semantics, and the model checking problem for ATL
requires the computation of winning strategies. This gives us an
intuitive interpretation of the verification problem of crucial
properties of MPCS protocols. We analyse the MR protocol with up to 5
signers and our analysis does not reveal any flaws. MRT protocols can
be generated from minimal message sequences, depending on the number of
signers. We discover an attack in a published MRT protocol with 3
signers, and present a solution for it. We also design a number of MRT
protocols using minimal message sequences for 3 and 4 signers, all of
which have been model checked in Mocha.
Keywords:
Model checking, contract signing protocols, fairness, Mocha.
Improving automatic verification of security
protocols with XOR
Student: Xihui Chen
Supervisor(s): Dr. Jun
Pang and Ton van
Deursen
Level: Master
Duration: From February 2009 to October 2009.
A
paper based on this work
has been published in the proceedings of ICFEM'09.
Description:
Küsters and Truderung recently proposed an automatic verification
method for security protocols with exclusive or (XOR). Their method
reduces protocols with XOR to their XOR-free equivalents, enabling
efficient verification by tools such as ProVerif. Although the proposed
method works efficiently for verifying secrecy, verification of
authentication properties is inefficient and sometimes impossible.
In this paper, we improve the work by Küsters and Truderung in two
ways. First, we extend their method for authentication verification to
a richer class of XOR-protocols by automatically introducing bounded
verification. Second, we improve the efficiency of their approach by
developing a number of dedicated optimizations. We show the
applicability of our work by implementing a prototype and applying it to
both existing benchmarks and RFID protocols. The experiments show
promising results and uncover a flaw in a recently proposed RFID
protocol.
Keywords:
Formal verification, security protocols, exclusive or, ProVerif.
Model checking round-based distributed algorithms
Student: Xin An
Supervisor(s): Dr. Jun Pang
Level: Master
Duration: From February 2009 to October 2009.
A
paper based on this work
has been published in the proceedings of ICECCS'10.
Description:
In the field of distributed computing, there are many round-based
algorithms to solve fundamental problems, such as leader election and
distributed consensus. Due to the nature of these algorithms, round
numbers are unbounded and can increase infinitely during executions of
the algorithms. This can lead to the state space explosion problem when
verifying correctness of these algorithms using model checking.
In this paper, we present a general idea of investigating the bounded
distance of round numbers in round-based algorithms. We can manage to
transform their state spaces into finite by maintaining such relations
in a proper way, and thus make automatic verification of these
algorithms possible. We apply this idea to several algorithms and
present their verification results in the model checker Spin.
Keywords:
Model checking, distributed algorithms, model transformation, Spin.
Secure ownership and ownership transfer in RFID
systems
Student: Pim Vullers
Supervisor(s): Dr. Sasa
Radomirovic and Ton van Deursen
Level: Master
Duration: From January 2009 to July 2009.
A
paper based on this work
has been accepted and published in the proceedings of ESORICS'09.
Description:
We present a formal model for stateful security protocols. This model
is used to define ownership and ownership transfer as concepts as well
as security properties. These definitions are based on an intuitive
notion of ownership related to physical ownership. They are aimed at
RFID systems, but should be applicable to any scenario sharing the same
intuition of ownership. We discuss the connection between ownership and
the notion of desynchronization resistance and give the first formal
definition of the latter. We apply our definitions to existing RFID
protocols, exhibiting attacks on desynchronization resistance, secure
ownership, and secure ownership transfer.
Keywords:
RFID protocols, ownership, desynchronization
resistance, ownership transfer, formal verification.
Design of an attack-tree creation tool
Student: Carlo Wampach
Level: Bachelor
Duration: From March 2008 to June 2008.
Compositionality of security protocols
Student: Pieter Ceelen
Level: Master
Duration: From April 2007 to July 2007.
A paper based on this work
has been accepted and published in the proceedings of STM'07.