Zum Hauptinhalt springen

Showing 1–50 of 54 results for author: Laszka, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13205  [pdf, other

    cs.LG

    Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing

    Authors: Amutheezan Sivagnanam, Ava Pettet, Hunter Lee, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka

    Abstract: An emergency responder management (ERM) system dispatches responders, such as ambulances, when it receives requests for medical aid. ERM systems can also proactively reposition responders between predesignated waiting locations to cover any gaps that arise due to the prior dispatch of responders or significant changes in the distribution of anticipated requests. Optimal repositioning is computatio… ▽ More

    Submitted 8 June, 2024; v1 submitted 21 May, 2024; originally announced May 2024.

  2. arXiv:2403.04072  [pdf, other

    cs.AI cs.CY cs.LG

    Forecasting and Mitigating Disruptions in Public Bus Transit Services

    Authors: Chaeeun Han, Jose Paolo Talusan, Dan Freudberg, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka

    Abstract: Public transportation systems often suffer from unexpected fluctuations in demand and disruptions, such as mechanical failures and medical emergencies. These fluctuations and disruptions lead to delays and overcrowding, which are detrimental to the passengers' experience and to the overall performance of the transit service. To proactively mitigate such events, many transit agencies station substi… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  3. arXiv:2403.03339  [pdf, other

    cs.CY

    An Online Approach to Solving Public Transit Stationing and Dispatch Problem

    Authors: Jose Paolo Talusan, Chaeeun Han, Ayan Mukhopadhyay, Aron Laszka, Dan Freudberg, Abhishek Dubey

    Abstract: Public bus transit systems provide critical transportation services for large sections of modern communities. On-time performance and maintaining the reliable quality of service is therefore very important. Unfortunately, disruptions caused by overcrowding, vehicular failures, and road accidents often lead to service performance degradation. Though transit agencies keep a limited number of vehicle… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

  4. arXiv:2401.07162  [pdf, other

    cs.CR cs.DC

    Pipelet: Practical Streamlined Blockchain Protocol

    Authors: Vivek Karihaloo, Ruchi Shah, Panruo Wu, Aron Laszka

    Abstract: Fueled by the growing popularity of proof-of-stake blockchains, there has been increasing interest and progress in permissioned consensus protocols, which could provide a simpler alternative to existing protocols, such as Paxos and PBFT. In particular, the recently proposed Streamlet protocol provides a surprisingly simple and streamlined consensus approach, which crystallizes years of research in… ▽ More

    Submitted 17 January, 2024; v1 submitted 13 January, 2024; originally announced January 2024.

  5. arXiv:2401.03197  [pdf, other

    cs.AI cs.LG

    Decision Making in Non-Stationary Environments with Policy-Augmented Search

    Authors: Ava Pettet, Yunuo Zhang, Baiting Luo, Kyle Wray, Hendrik Baier, Aron Laszka, Abhishek Dubey, Ayan Mukhopadhyay

    Abstract: Sequential decision-making under uncertainty is present in many important problems. Two popular approaches for tackling such problems are reinforcement learning and online search (e.g., Monte Carlo tree search). While the former learns a policy by interacting with the environment (typically done before execution), the latter uses a generative model of the environment to sample promising action tra… ▽ More

    Submitted 20 January, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

    Comments: Extended Abstract accepted for presentation at AAMAS 2024

  6. arXiv:2312.14625  [pdf, other

    cs.AI cs.CR cs.LG

    Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks

    Authors: Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: The increasing reliance of drivers on navigation applications has made transportation networks more susceptible to data-manipulation attacks by malicious actors. Adversaries may exploit vulnerabilities in the data collection or processing of navigation services to inject false information, and to thus interfere with the drivers' route selection. Such attacks can significantly increase traffic cong… ▽ More

    Submitted 6 March, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

  7. arXiv:2310.16241  [pdf, other

    cs.LG

    Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction

    Authors: Afiya Ayman, Ayan Mukhopadhyay, Aron Laszka

    Abstract: When a number of similar tasks have to be learned simultaneously, multi-task learning (MTL) models can attain significantly higher accuracy than single-task learning (STL) models. However, the advantage of MTL depends on various factors, such as the similarity of the tasks, the sizes of the datasets, and so on; in fact, some tasks might not benefit from MTL and may even incur a loss of accuracy co… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  8. arXiv:2308.07457  [pdf, other

    cs.AI

    Artificial Intelligence for Smart Transportation

    Authors: Michael Wilbur, Amutheezan Sivagnanam, Afiya Ayman, Samitha Samaranayeke, Abhishek Dubey, Aron Laszka

    Abstract: There are more than 7,000 public transit agencies in the U.S. (and many more private agencies), and together, they are responsible for serving 60 billion passenger miles each year. A well-functioning transit system fosters the growth and expansion of businesses, distributes social and economic benefits, and links the capabilities of community members, thereby enhancing what they can accomplish as… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: This is a pre-print for a book chapter to appear in Vorobeychik, Yevgeniy., and Mukhopadhyay, Ayan., (Eds.). (2023). Artificial Intelligence and Society. ACM Press

  9. arXiv:2306.06769  [pdf, other

    cs.CR

    Adversarial Reconnaissance Mitigation and Modeling

    Authors: Shanto Roy, Nazia Sharmin, Mohammad Sujan Miah, Jaime C Acosta, Christopher Kiekintveld, Aron Laszka

    Abstract: Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception techniques, such as deploying honeypots. In recent years, researchers have made great strides in developing game-theoretic models to find optimal deception strategies. Ho… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  10. arXiv:2304.07411  [pdf, other

    cs.CR

    SoK: The MITRE ATT&CK Framework in Research and Practice

    Authors: Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas

    Abstract: The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic researchers. Its broad range of industry applications include threat intelligence, threat detection, and incident response, some of which go beyond what it was originally designed for. Despite its popularity, there is a lack of… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

  11. arXiv:2303.03475  [pdf, other

    cs.AI cs.MA

    Rolling Horizon based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows

    Authors: Youngseo Kim, Danushka Edirimanna, Michael Wilbur, Philip Pugliese, Aron Laszka, Abhishek Dubey, Samitha Samaranayake

    Abstract: The offline pickup and delivery problem with time windows (PDPTW) is a classical combinatorial optimization problem in the transportation community, which has proven to be very challenging computationally. Due to the complexity of the problem, practical problem instances can be solved only via heuristics, which trade-off solution quality for computational tractability. Among the various heuristics… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  12. arXiv:2301.12092  [pdf, other

    cs.CR

    The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox

    Authors: Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka

    Abstract: Recently, bug-bounty programs have gained popularity and become a significant part of the security culture of many organizations. Bug-bounty programs enable organizations to enhance their security posture by harnessing the diverse expertise of crowds of external security experts (i.e., bug hunters). Nonetheless, quantifying the benefits of bug-bounty programs remains elusive, which presents a sign… ▽ More

    Submitted 23 February, 2023; v1 submitted 28 January, 2023; originally announced January 2023.

  13. arXiv:2301.04781  [pdf, other

    cs.CR cs.SE

    Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

    Authors: Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka

    Abstract: Although researchers have characterized the bug-bounty ecosystem from the point of view of platforms and programs, minimal effort has been made to understand the perspectives of the main workers: bug hunters. To improve bug bounties, it is important to understand hunters' motivating factors, challenges, and overall benefits. We address this research gap with three studies: identifying key factors… ▽ More

    Submitted 7 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

  14. arXiv:2211.13345  [pdf, other

    cs.CR cs.AI

    Principled Data-Driven Decision Support for Cyber-Forensic Investigations

    Authors: Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis, Aron Laszka

    Abstract: In the wake of a cybersecurity incident, it is crucial to promptly discover how the threat actors breached security in order to assess the impact of the incident and to develop and deploy countermeasures that can protect against further attacks. To this end, defenders can launch a cyber-forensic investigation, which discovers the techniques that the threat actors used in the incident. A fundamenta… ▽ More

    Submitted 3 March, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

  15. arXiv:2204.11992  [pdf, ps, other

    cs.AI cs.LG

    Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit

    Authors: Amutheezan Sivagnanam, Salah Uddin Kadir, Ayan Mukhopadhyay, Philip Pugliese, Abhishek Dubey, Samitha Samaranayake, Aron Laszka

    Abstract: Vehicle routing problems (VRPs) can be divided into two major categories: offline VRPs, which consider a given set of trip requests to be served, and online VRPs, which consider requests as they arrive in real-time. Based on discussions with public transit agencies, we identify a real-world problem that is not addressed by existing formulations: booking trips with flexible pickup windows (e.g., 3… ▽ More

    Submitted 5 May, 2022; v1 submitted 25 April, 2022; originally announced April 2022.

  16. arXiv:2203.15127  [pdf, other

    cs.AI cs.MA

    An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services

    Authors: Michael Wilbur, Salah Uddin Kadir, Youngseo Kim, Geoffrey Pettet, Ayan Mukhopadhyay, Philip Pugliese, Samitha Samaranayake, Aron Laszka, Abhishek Dubey

    Abstract: Many transit agencies operating paratransit and microtransit services have to respond to trip requests that arrive in real-time, which entails solving hard combinatorial and sequential decision-making problems under uncertainty. To avoid decisions that lead to significant inefficiency in the long term, vehicles should be allocated to requests by optimizing a non-myopic utility function or by batch… ▽ More

    Submitted 31 March, 2022; v1 submitted 28 March, 2022; originally announced March 2022.

    Comments: Accepted for publication at ICCPS 2022

  17. arXiv:2109.07724  [pdf, other

    cs.CR cs.GT

    Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies

    Authors: Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which enables the defender to remotely verify the integrity of devices and their software. There are a number of approaches for remote attestation, and each has its unique ad… ▽ More

    Submitted 26 September, 2021; v1 submitted 16 September, 2021; originally announced September 2021.

  18. arXiv:2107.05756  [pdf, other

    eess.SY cs.AI

    Reinforcement Learning based Proactive Control for Transmission Grid Resilience to Wildfire

    Authors: Salah U. Kadir, Subir Majumder, Ajay D. Chhokra, Abhishek Dubey, Himanshu Neema, Aron Laszka, Anurag K. Srivastava

    Abstract: Power grid operation subject to an extreme event requires decision-making by human operators under stressful condition with high cognitive load. Decision support under adverse dynamic events, specially if forecasted, can be supplemented by intelligent proactive control. Power system operation during wildfires require resiliency-driven proactive control for load shedding, line switching and resourc… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

  19. arXiv:2105.04749  [pdf, other

    cs.CR

    Survey and Taxonomy of Adversarial Reconnaissance Techniques

    Authors: Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka

    Abstract: Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain. We summarize and analyze the methods, tactics, and tools that adversaries use to conduct reconnaissance activities throughout the attack process. Fi… ▽ More

    Submitted 28 April, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

  20. arXiv:2103.08007  [pdf, other

    cs.CR

    Selfish Mining Attacks Exacerbated by Elastic Hash Supply

    Authors: Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka

    Abstract: Several attacks have been proposed against Proof-of-Work blockchains, which may increase the attacker's share of mining rewards (e.g., selfish mining, block withholding). A further impact of such attacks, which has not been considered in prior work, is that decreasing the profitability of mining for honest nodes incentivizes them to stop mining or to leave the attacked chain for a more profitable… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

  21. arXiv:2101.09261  [pdf, other

    cs.CY

    Efficient Data Management for Intelligent Urban Mobility Systems

    Authors: Michael Wilbur, Philip Pugliese, Aron Laszka, Abhishek Dubey

    Abstract: Modern intelligent urban mobility applications are underpinned by large-scale, multivariate, spatiotemporal data streams. Working with this data presents unique challenges of data management, processing and presentation that is often overlooked by researchers. Therefore, in this work we present an integrated data management and processing framework for intelligent urban mobility systems currently… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 5 pages, 3 figures

  22. arXiv:2008.02413  [pdf, other

    physics.soc-ph cs.CY

    Impact of COVID-19 on Public Transit Accessibility and Ridership

    Authors: Michael Wilbur, Afiya Ayman, Anna Ouyang, Vincent Poon, Riyan Kabir, Abhiram Vadali, Philip Pugliese, Daniel Freudberg, Aron Laszka, Abhishek Dubey

    Abstract: Public transit is central to cultivating equitable communities. Meanwhile, the novel coronavirus disease COVID-19 and associated social restrictions has radically transformed ridership behavior in urban areas. Perhaps the most concerning aspect of the COVID-19 pandemic is that low-income and historically marginalized groups are not only the most susceptible to economic shifts but are also most rel… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

  23. arXiv:2006.13364  [pdf, other

    cs.CR

    A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission

    Authors: Md Whaiduzzaman, Md. Razon Hossain, Ahmedur Rahman Shovon, Shanto Roy, Aron Laszka, Rajkumar Buyya, Alistair Barros

    Abstract: To slow down the spread of COVID-19, governments around the world are trying to identify infected people and to contain the virus by enforcing isolation and quarantine. However, it is difficult to trace people who came into contact with an infected person, which causes widespread community transmission and mass infection. To address this problem, we develop an e-government Privacy Preserving Mobil… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Comments: 12 pages, 9 figures, 1 table, 1 algorithm

  24. arXiv:2006.08016  [pdf, ps, other

    cs.CR cs.CY

    Equilibrium of Blockchain Miners with Dynamic Asset Allocation

    Authors: Go Yamamoto, Aron Laszka, Fuhito Kojima

    Abstract: We model and analyze blockchain miners who seek to maximize the compound return of their mining businesses. The analysis of the optimal strategies finds a new equilibrium point among the miners and the mining pools, which predicts the market share of each miner or mining pool. The cost of mining determines the share of each miner or mining pool at equilibrium. We conclude that neither miners nor m… ▽ More

    Submitted 3 December, 2020; v1 submitted 14 June, 2020; originally announced June 2020.

  25. arXiv:2005.11429  [pdf, other

    cs.DC cs.MA

    Mechanisms for Outsourcing Computation via a Decentralized Market

    Authors: Scott Eisele, Taha Eghtesad, Nicholas Troutman, Aron Laszka, Abhishek Dubey

    Abstract: As the number of personal computing and IoT devices grows rapidly, so does the amount of computational power that is available at the edge. Since many of these devices are often idle, there is a vast amount of computational power that is currently untapped, and which could be used for outsourcing computation. Existing solutions for harnessing this power, such as volunteer computing (e.g., BOINC),… ▽ More

    Submitted 19 July, 2020; v1 submitted 22 May, 2020; originally announced May 2020.

  26. arXiv:2004.06043  [pdf, other

    eess.SP cs.LG

    Data-Driven Prediction of Route-Level Energy Use for Mixed-Vehicle Transit Fleets

    Authors: Afiya Ayman, Michael Wilbur, Amutheezan Sivagnanam, Philip Pugliese, Abhishek Dubey, Aron Laszka

    Abstract: Due to increasing concerns about environmental impact, operating costs, and energy security, public transit agencies are seeking to reduce their fuel use by employing electric vehicles (EVs). However, because of the high upfront cost of EVs, most agencies can afford only mixed fleets of internal-combustion and electric vehicles. Making the best use of these mixed fleets presents a challenge for ag… ▽ More

    Submitted 19 July, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

  27. arXiv:2004.05146  [pdf, other

    cs.AI eess.SY

    Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service

    Authors: Amutheezan Sivagnanam, Afiya Ayman, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka

    Abstract: Affordable public transit services are crucial for communities since they enable residents to access employment, education, and other services. Unfortunately, transit services that provide wide coverage tend to suffer from relatively low utilization, which results in high fuel usage per passenger per mile, leading to high operating costs and environmental impact. Electric vehicles (EVs) can reduce… ▽ More

    Submitted 28 February, 2021; v1 submitted 10 April, 2020; originally announced April 2020.

  28. arXiv:2003.07435  [pdf, other

    cs.CR

    Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities

    Authors: Mudabbir Kaleem, Anastasia Mavridou, Aron Laszka

    Abstract: Vyper has been proposed as a new high-level language for Ethereum smart contract development due to numerous security vulnerabilities and attacks witnessed on contracts written in Solidity since the system's inception. Vyper aims to address these vulnerabilities by providing a language that focuses on simplicity, auditability and security. We present a survey where we study how well-known and comm… ▽ More

    Submitted 14 June, 2020; v1 submitted 16 March, 2020; originally announced March 2020.

  29. arXiv:2003.06197  [pdf, other

    cs.CR cs.NI

    PayPlace: Secure and Flexible Operator-Mediated Payments in Blockchain Marketplaces at Scale

    Authors: Madhumitha Harishankar, Dimitrios-Georgios Akestoridis, Sriram V. Iyer, Aron Laszka, Carlee Joe-Wong, Patrick Tague

    Abstract: Decentralized marketplace applications demand fast, cheap and easy-to-use cryptocurrency payment mechanisms to facilitate high transaction volumes. The standard solution for off-chain payments, state channels, are optimized for frequent transactions between two entities and impose prohibitive liquidity and capital requirements on payment senders for marketplace transactions. We propose PayPlace, a… ▽ More

    Submitted 4 August, 2020; v1 submitted 13 March, 2020; originally announced March 2020.

  30. arXiv:2002.09629  [pdf, other

    cs.CR

    An Empirical Study of Android Security Bulletins in Different Vendors

    Authors: Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags

    Abstract: Mobile devices encroach on almost every part of our lives, including work and leisure, and contain a wealth of personal and sensitive information. It is, therefore, imperative that these devices uphold high security standards. A key aspect is the security of the underlying operating system. In particular, Android plays a critical role due to being the most dominant platform in the mobile ecosystem… ▽ More

    Submitted 22 February, 2020; originally announced February 2020.

  31. arXiv:1911.11972  [pdf, ps, other

    cs.CR cs.AI cs.GT

    Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense

    Authors: Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka

    Abstract: Moving target defense (MTD) is a proactive defense approach that aims to thwart attacks by continuously changing the attack surface of a system (e.g., changing host or network configurations), thereby increasing the adversary's uncertainty and attack cost. To maximize the impact of MTD, a defender must strategically choose when and what changes to make, taking into account both the characteristics… ▽ More

    Submitted 20 August, 2020; v1 submitted 27 November, 2019; originally announced November 2019.

  32. arXiv:1910.12579  [pdf, other

    cs.CR cs.CY cs.DC cs.MA eess.SP eess.SY

    Safe and Private Forward-Trading Platform for Transactive Microgrids

    Authors: Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey

    Abstract: Transactive microgrids have emerged as a transformative solution for the problems faced by distribution system operators due to an increase in the use of distributed energy resources and rapid growth in renewable energy generation. Transactive microgrids are tightly coupled cyber and physical systems, which require resilient and robust financial markets where transactions can be submitted and clea… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

  33. arXiv:1908.04867  [pdf, other

    cs.CR

    Post-Incident Audits on Cyber Insurance Discounts

    Authors: Sakshyam Panda, Daniel W Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis

    Abstract: We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity claim. Audits can reveal fraudulent (or simply careless) policyholders not following reported security procedures, in which case the insurer… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

  34. arXiv:1906.08805  [pdf, other

    cs.CR cs.AI cs.GT

    Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning

    Authors: Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik

    Abstract: Detection of malicious behavior is a fundamental problem in security. One of the major challenges in using detection systems in practice is in dealing with an overwhelming number of alerts that are triggered by normal behavior (the so-called false positives), obscuring alerts resulting from actual malicious activity. While numerous methods for reducing the scope of this issue have been proposed, u… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: v1.0

  35. arXiv:1905.09352  [pdf, other

    cs.CR

    Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities

    Authors: Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags

    Abstract: In this paper, we perform a comprehensive study of 2,470 patched Android vulnerabilities that we collect from different data sources such as Android security bulletins, CVEDetails, Qualcomm Code Aurora, AOSP Git repository, and Linux Patchwork. In our data analysis, we focus on determining the affected layers, OS versions, severity levels, and common weakness enumerations (CWE) associated with the… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: The 2019 Workshop on the Economics of Information Security (WEIS 2019)

  36. arXiv:1905.08833  [pdf, ps, other

    cs.CY cs.CR cs.SE

    Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media

    Authors: Afiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka

    Abstract: Blockchain-based platforms are emerging as a transformative technology that can provide reliability, integrity, and auditability without trusted entities. One of the key features of these platforms is the trustworthy decentralized execution of general-purpose computation in the form of smart contracts, which are envisioned to have a wide range of applications. As a result, a rapidly growing and ac… ▽ More

    Submitted 16 January, 2020; v1 submitted 15 May, 2019; originally announced May 2019.

  37. arXiv:1904.09381  [pdf, other

    cs.CR

    Economic Analyses of Security Investments on Cryptocurrency Exchanges

    Authors: Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore

    Abstract: Cryptocurrency exchanges are frequently targeted and compromised by cyber-attacks, which may lead to significant losses for the depositors and closure of the affected exchanges. These risks threaten the viability of the entire public blockchain ecosystem since exchanges serve as major gateways for participation in public blockchain technologies. In this paper, we develop an economic model to captu… ▽ More

    Submitted 19 April, 2019; originally announced April 2019.

  38. arXiv:1901.01292  [pdf, other

    cs.CR cs.SE

    VeriSolid: Correct-by-Design Smart Contracts for Ethereum

    Authors: Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey

    Abstract: The adoption of blockchain based distributed ledgers is growing fast due to their ability to provide reliability, integrity, and auditability without trusted entities. One of the key capabilities of these emerging platforms is the ability to create self-enforcing smart contracts. However, the development of smart contracts has proven to be error-prone in practice, and as a result, contracts deploy… ▽ More

    Submitted 20 January, 2019; v1 submitted 4 January, 2019; originally announced January 2019.

  39. arXiv:1808.09090  [pdf, other

    cs.CR

    Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical infrastructures, for example, against smart water-distribution and transportation systems, pose serious threats to public health and safety. Owing to the severit… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  40. arXiv:1808.08349  [pdf, other

    cs.CR cs.GT

    Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game

    Authors: Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos

    Abstract: In recent years, state-of-the-art traffic-control devices have evolved from standalone hardware to networked smart devices. Smart traffic control enables operators to decrease traffic congestion and environmental impact by acquiring real-time traffic data and changing traffic signals from fixed to adaptive schedules. However, these capabilities have inadvertently exposed traffic control to a wide… ▽ More

    Submitted 2 August, 2019; v1 submitted 24 August, 2018; originally announced August 2018.

  41. arXiv:1804.08133  [pdf, other

    cs.DC

    SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities

    Authors: Scott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey

    Abstract: Internet of Things and data sciences are fueling the development of innovative solutions for various applications in Smart and Connected Communities (SCC). These applications provide participants with the capability to exchange not only data but also resources, which raises the concerns of integrity, trust, and above all the need for fair and optimal solutions to the problem of resource allocation… ▽ More

    Submitted 24 April, 2018; v1 submitted 22 April, 2018; originally announced April 2018.

  42. arXiv:1802.09949  [pdf, other

    cs.CR cs.FL cs.SE

    Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts

    Authors: Anastasia Mavridou, Aron Laszka

    Abstract: Blockchain-based distributed computing platforms enable the trusted execution of computation - defined in the form of smart contracts - without trusted agents. Smart contracts are envisioned to have a variety of applications, ranging from financial to IoT asset tracking. Unfortunately, the development of smart contracts has proven to be extremely error prone. In practice, contracts are riddled wit… ▽ More

    Submitted 26 February, 2018; originally announced February 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.09327

  43. arXiv:1801.07215  [pdf, other

    cs.AI cs.CR cs.DB cs.GT cs.MA

    Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

    Authors: Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin

    Abstract: For enhancing the privacy protections of databases, where the increasing amount of detailed personal data is stored and processed, multiple mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities; however, the two main limitations in common are: 1) the volume of such alerts is often substantially greater than the capabilitie… ▽ More

    Submitted 22 January, 2018; originally announced January 2018.

    ACM Class: D.4.6; H.2.0; K.6.5; J.1; I.2

  44. arXiv:1712.08222  [pdf, other

    cs.CR

    An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

    Authors: Sadegh Farhang, Aron Laszka, Jens Grossklags

    Abstract: Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications. However, research has documented how various security problems are associated with this customization process. We develop a model of the Android ecosystem utilizing the concepts of gam… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: 22nd International Conference on Financial Cryptography and Data Security (FC 2018)

  45. arXiv:1711.09327  [pdf, other

    cs.CR cs.FL cs.SE

    Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach

    Authors: Anastasia Mavridou, Aron Laszka

    Abstract: The adoption of blockchain-based distributed computation platforms is growing fast. Some of these platforms, such as Ethereum, provide support for implementing smart contracts, which are envisioned to have novel applications in a broad range of areas, including finance and Internet-of-Things. However, a significant number of smart contracts deployed in practice suffer from security vulnerabilities… ▽ More

    Submitted 25 November, 2017; originally announced November 2017.

  46. arXiv:1709.09614  [pdf, other

    cs.DC cs.CR

    Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers

    Authors: Aron Laszka, Abhishek Dubey, Michael Walker, Douglas Schmidt

    Abstract: Power grids are undergoing major changes due to rapid growth in renewable energy resources and improvements in battery technology. While these changes enhance sustainability and efficiency, they also create significant management challenges as the complexity of power systems increases. To tackle these challenges, decentralized Internet-of-Things (IoT) solutions are emerging, which arrange local co… ▽ More

    Submitted 27 September, 2017; originally announced September 2017.

  47. arXiv:1709.09612  [pdf, ps, other

    cs.DC

    PlaTIBART: a Platform for Transactive IoT Blockchain Applications with Repeatable Testing

    Authors: Michael A. Walker, Abhishek Dubey, Aron Laszka, Douglas C. Schmidt

    Abstract: With the advent of blockchain-enabled IoT applications, there is an increased need for related software patterns, middleware concepts, and testing practices to ensure adequate quality and productivity. IoT and blockchain each provide different design goals, concepts, and practices that must be integrated, including the distributed actor model and fault tolerance from IoT and transactive informatio… ▽ More

    Submitted 29 September, 2017; v1 submitted 27 September, 2017; originally announced September 2017.

    Comments: Workshop on Middleware and Applications for the Internet of Things (M4IoT) 2017

  48. arXiv:1709.09601  [pdf, other

    cs.DC

    On the Design of Communication and Transaction Anonymity in Blockchain-Based Transactive Microgrids

    Authors: Jonatan Bergquist, Aron Laszka, Monika Sturm, Abhishek Dubey

    Abstract: Transactive microgrids are emerging as a transformative solution for the problems faced by distribution system operators due to an increase in the use of distributed energy resources and a rapid acceleration in renewable energy generation, such as wind and solar power. Distributed ledgers have recently found widespread interest in this domain due to their ability to provide transactional integrity… ▽ More

    Submitted 30 January, 2018; v1 submitted 27 September, 2017; originally announced September 2017.

  49. arXiv:1709.09597  [pdf, other

    cs.DC

    Privacy-Preserving Platform for Transactive Energy Systems

    Authors: Karla Kvaternik, Aron Laszka, Michael Walker, Douglas Schmidt, Monika Sturm, Martin lehofer, Abhishek Dubey

    Abstract: Transactive energy systems (TES) are emerging as a transformative solution for the problems faced by distribution system operators due to an increase in the use of distributed energy resources and a rapid acceleration in renewable energy generation. These, on one hand, pose a decentralized power system controls problem, requiring strategic microgrid control to maintain stability for the community… ▽ More

    Submitted 30 January, 2018; v1 submitted 27 September, 2017; originally announced September 2017.

  50. arXiv:1707.06247  [pdf, ps, other

    cs.CR

    On the Economics of Ransomware

    Authors: Aron Laszka, Sadegh Farhang, Jens Grossklags

    Abstract: While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves. At the same time, our strategic understanding of the threat and the adversarial interaction between organizations and c… ▽ More

    Submitted 21 August, 2017; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: 8th Conference on Decision and Game Theory for Security (GameSec 2017)