Publications & Demonstrators

All accepted publications from SPARTA partners under its funding as well as videos presenting some of the work done under SPARTA


LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion

Damasevicius, Robertas; Venckauskas, Algimantas; Grigaliunas, Sarunas; Toldinas, Jevgenijus; Morkevicius, Nerijus; Aleliunas, Tautvydas; Smuikys, Paulius.

Network intrusion detection is one of the main problems in ensuring the security of modern computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In order to develop efficient network-intrusion-detection methods, realistic and up-to-date network flow datasets are required. Despite several recent efforts, there is still a lack of...More>>

Domains: Benchmark, dataset, network, intrusion, detection, attack, cyber, security

Privacy-Preserving Contact Tracing: current solutions and open questions

Qiang Tang

The COVID-19 pandemic has posed a unique challenge for the world to find solutions, ranging from vaccines to ICT solutions to slow down the virus spreading. Due to the highly contagious nature of the virus, social distancing is one fundamental measure which has already adopted by many countries. At the...More>>

Domains: COVID-19, privacy-aware, contact, tracing, solutions

Building Next Generation Cyber Ranges with CRACK

Enrico Russo, Gabriele Costa, Alessandro Armando

Cyber Ranges are complex infrastructures hosting high quality exercises that simulate cybersecurity scenarios of real-world complexity. Building the computing infrastructure is only the first step towards the successful execution of the cyber exercises. The design, verification and deployment of scenarios are costly and error-prone activities. As a matter of...More>>

Domains: Cyber, Range, Cybersecurity, Training, Automated, design, Scenario, verification

Experimental Analysis of the Electromagnetic Instruction Skip Fault Model

Menu, Alexandre and Dutertre, Jean-Max and Potin, Olivier and Rigaud, Jean-Baptiste and Danger, Jean-Luc

Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works assessed a fault model that consists in a single...More>>

Domains: cryptography, fault, diagnosis, microcontrollers

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors

Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens

Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory,or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features,...More>>

Domains: Microprocessors

Natural Projection as Partial Model Checking

Costa, G.; Galletta, L.; Degano, P.; Basin, D.; Bodei, C.

Verifying the correctness of a system as a whole requires establishing that it satisfies a global specification. When it does not, it would be helpful to determine which modules are incorrect. As a consequence, specification decomposition is a relevant problem from both a theoretical and practical point of view. Until...More>>

Domains: Model, Checking

Towards formal verification of IoT protocols: A Review

Katharina Hofer-Schmitz, Branka Stojanovi

Formal Verification is one of the crucial methods to detect possible weaknesses and vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety of protocols used in the IoT environment. It gives detailed descriptions of the considered properties and the applied methods. An in-depth literature...More>>

Domains: Formal, verification, Security, Protocols, Model, checkers, IoT

Enhancing Security in 6G Visible Light Communications

Simone Soderi

This paper considers improving the confidentiality of the next generation of wireless communications by using the watermark-based blind physical layer security (WBPLSec) in Visible Light Communications (VLCs). Since the growth of wireless applications and service, the demand for a secure and fast data transfer connection requires new technology solutions...More>>

Domains: free-space, optical, communication, jamming, light, emitting, diodes, spread, spectrum, telecommunication, security, watermarking

Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium

Christophe Ponsard, Jeremy Grandclaudon and Nicolas Point

Increasing the maturity of SMEs with respect to cybersecurity threats is crucial as they are less prepared and less resilient. They are also increasingly exposed and targeted by malicious actors. Providing support means ensuring an effective ecosystem is available to help companies all along the process. Resources have to be...More>>

Domains: audit, smes