Sean Rivera
YOU?
Author Swipe
View article: Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks
Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks Open
International audience
View article: Topology Analysis of the XRP Ledger
Topology Analysis of the XRP Ledger Open
International audience
View article: Probabilistic Edge Multicast Routing for the XRP Network
Probabilistic Edge Multicast Routing for the XRP Network Open
International audience
View article: An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices
An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices Open
Internet of Things (IoT) devices are becoming increasingly ubiquitous in our lives, from personal health monitoring to house and factory management. Further, IoT devices are becoming increasingly complex, and ensuring their security is of …
View article: Topology Analysis of the XRP Ledger
Topology Analysis of the XRP Ledger Open
XRP Ledger is one of the oldest, well-established blockchains. Despite the popularity of the XRP Ledger, little is known about its underlying peer-to-peer network. The structural properties of a network impact its efficiency, security and …
View article: (a draft of) Non-secure Client Awareness in TF-M
(a draft of) Non-secure Client Awareness in TF-M Open
This paper presents a novel mechanism implemented in the SW to identify and authorize secure service call from the NW. While the current solution needs changes of the non-secure software (typically an RTOS), our solution exploits available…
View article: (a draft of) Non-secure Client Awareness in TF-M
(a draft of) Non-secure Client Awareness in TF-M Open
This paper presents a novel mechanism implemented in the SW to identify and authorize secure service call from the NW. While the current solution needs changes of the non-secure software (typically an RTOS), our solution exploits available…
View article: ROS-Immunity: Integrated Approach for the Security of ROS-enabled Robotic Systems
ROS-Immunity: Integrated Approach for the Security of ROS-enabled Robotic Systems Open
The Robotic Operating System (ROS) is the de-facto standardfor the development of modular robotic systems. However,ROS is notorious for the absence of security mechanisms,only partially covered by recent advancements. Indeed, anattacker ca…
View article: ROS-Immunity: Integrated Approach for the Security of ROS-enabled Robotic Systems
ROS-Immunity: Integrated Approach for the Security of ROS-enabled Robotic Systems Open
The Robotic Operating System (ROS) is the de-facto standardfor the development of modular robotic systems. However,ROS is notorious for the absence of security mechanisms,only partially covered by recent advancements. Indeed, anattacker ca…
View article: Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries Open
The Domain Name System (DNS), a fundamental protocol that controls how users interact with the Internet, inadequately provides protection for user privacy. Recently, there have been advancements in the field of DNS privacy and security in …
View article: DiscoFuzzer: Discontinuity-based Vulnerability Detector for Robotic Systems
DiscoFuzzer: Discontinuity-based Vulnerability Detector for Robotic Systems Open
We demonstrate a new fuzzing tool for the Robotic Operating System (ROS), which exploits the physical nature of robotic systems to detect a novel class of bugs.
View article: DiscoFuzzer: Discontinuity-based Vulnerability Detector for Robotic Systems
DiscoFuzzer: Discontinuity-based Vulnerability Detector for Robotic Systems Open
We demonstrate a new fuzzing tool for the Robotic Operating System (ROS), which exploits the physical nature of robotic systems to detect a novel class of bugs.
View article: Auto-Encoding Robot State Against Sensor Spoofing Attacks
Auto-Encoding Robot State Against Sensor Spoofing Attacks Open
<p>In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-physical systems as they rely on several sensors to perform critical operations. The most sensitive targets are thei…
View article: ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications Open
We propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly de…
View article: ROSploit: Cybersecurity Tool for ROS
ROSploit: Cybersecurity Tool for ROS Open
Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the pote…
View article: Software Design and Implementation of a Next Generation Gnss Data Logger for Radio Frequency Interference Detection
Software Design and Implementation of a Next Generation Gnss Data Logger for Radio Frequency Interference Detection Open
The aim of this thesis is to implement a new GNSS interference detection system that extends the functionality of previous systems. This technology will be evaluated on the effectiveness of data collection in GPS L1, GPS L2C and all softwa…