Skip to main content

Showing 1–8 of 8 results for author: Mayes, K

  1. Return-Oriented Programming on RISC-V

    Authors: Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache

    Abstract: This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear Code Sequences And Jumps (LCSAJ), undetected by current Galileo-based ROP gadget searching tools. We argue that this class of gadgets is rich enough on RISC-V to… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 27 pages, 8 figures, originally published at AsiaCCS 2020

  2. arXiv:2010.14173  [pdf, other

    eess.SY eess.SP

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Authors: Martin Higgins, Keith Mayes, Fei Teng

    Abstract: This paper outlines a cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks. We demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the pr… ▽ More

    Submitted 30 October, 2020; v1 submitted 27 October, 2020; originally announced October 2020.

  3. arXiv:1708.05732  [pdf, other

    cs.CR cs.AI cs.NE cs.RO

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette

    Abstract: Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to high-sensitive, such as… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)

  4. arXiv:1608.04116  [pdf, other

    cs.CR cs.PF

    An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette

    Abstract: Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attacker to access the network, and the fact that it is… ▽ More

    Submitted 16 August, 2016; v1 submitted 14 August, 2016; originally announced August 2016.

    Comments: 10 pages, 2 figures, 4 tables, IEEE DASC

  5. arXiv:1608.04115  [pdf, other

    cs.CR cs.NI cs.PF

    Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

    Authors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette

    Abstract: The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this enforces (at least partially) the security of the network. However, substituting the wired netw… ▽ More

    Submitted 17 August, 2016; v1 submitted 14 August, 2016; originally announced August 2016.

    Comments: 8 page, 4 images, 2 tables, conference, IEEE DASC

  6. arXiv:1605.00425  [pdf, other

    cs.CR

    When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

    Authors: Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes

    Abstract: Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being provisioned through smartphones. Smartphones with Near Field Communication (NFC) capability can emulate a contactless smart card; popular examples of such services incl… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 20 pages, 7 figures, 5 tables, Analysis of 7 Ambient Sensors

  7. arXiv:1601.07101  [pdf, other

    cs.CR

    Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments

    Authors: Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes

    Abstract: Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been proposed that rely primarily on ambient sensors as a proximity detection mechanism (also known as an anti-relay mechanism). In this paper, we, for the first time in academic liter… ▽ More

    Submitted 18 February, 2016; v1 submitted 26 January, 2016; originally announced January 2016.

    Comments: 19 pages, 9 figures, 5 tables

  8. arXiv:nlin/0308017  [pdf, ps, other

    nlin.PS

    Dynamic Domains in Strongly Driven Ferromagnetic Films

    Authors: K. Mayes, T. Plefka, H. Sauermann

    Abstract: The spatiotemporal structure formation problem is investigated in the region far above the transverse ferromagnetic resonance instability. The investigations are based on the dissipative Landau-Lifshitz equation and have been performed on a model which takes external fields, isotropic exchange fields, anisotropy fields and the demagnetizing part of the dipolar field into consideration. The numer… ▽ More

    Submitted 14 August, 2003; originally announced August 2003.

    Comments: 7 pages, 6 figures