Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bilal Shebaro is active.

Publication


Featured researches published by Bilal Shebaro.


IEEE Transactions on Dependable and Secure Computing | 2015

Context-Based Access Control Systems for Mobile Devices

Bilal Shebaro; Oyindamola Oluwatimi; Elisa Bertino

Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.


computer and communications security | 2012

Demonstrating a lightweight data provenance for sensor networks

Bilal Shebaro; Salmin Sultana; Shakthidhar Reddy Gopavaram; Elisa Bertino

The popularity of sensor networks and their many uses in critical domains such as military and healthcare make them more vulnerable to malicious attacks. In such contexts, trustworthiness of sensor data and their provenance is critical for decision-making. In this demonstration, we present an efficient and secure approach for transmitting provenance information about sensor data. Our provenance approach uses light-weight in-packet Bloom filters that are encoded as sensor data travels through intermediate sensor nodes, and are decoded and verified at the base station. Our provenance technique is also able to defend against malicious attacks such as packet dropping and allows one to detect the responsible node for packet drops. As such it makes possible to modify the transmission route to avoid nodes that could be compromised or malfunctioning. Our technique is designed to create a trustworthy environment for sensor nodes where only trusted data is processed.


extending database technology | 2013

PostgreSQL anomalous query detector

Bilal Shebaro; Asmaa Sallam; Ashish Kamra; Elisa Bertino

We propose to demonstrate the design, implementation, and the capabilities of an anomaly detection (AD) system integrated with a relational database management system (DBMS). Our AD system is trained by extracting relevant features from the parse-tree representation of the SQL commands, and then uses the DBMS roles as the classes for the bayesian classifier. In the detection phase, the maximum apriori probability role is chosen by the classifier which, if not matching the role associated with the SQL command, raises an alarm. We have implemented such system in the PostgreSQL DBMS, integrated with the statistics collection and the query processing mechanism of the DBMS. During the demonstration, our audience will be given the choice of training our system using either synthetic role-based SQL query traces based on probability sampling, or by entering their own set of training queries. In the subsequent detection mode, the audience can test the detection capabilities of the system by submitting arbitrary SQL commands. We will also allow the audience to generate arbitrary work loads to measure the overhead of the training phase and the detection phase of our AD mechanism on the performance of the DBMS.


sensor, mesh and ad hoc communications and networks | 2014

Fine-Grained Analysis of Packet Losses in Wireless Sensor Networks

Bilal Shebaro; Daniele Midi; Elisa Bertino

Packet losses in a wireless sensor network represent an indicator of possible attacks to the network. Detecting and reacting to such losses is thus an important component of any comprehensive security solution. However, in order to quickly and automatically react to such a loss, it is important to determine the actual cause of the loss. In a wireless sensor network, packet losses can result from attacks affecting the nodes or the wireless links connecting the nodes. Failure to identify the actual attack can undermine the efficacy of the attack responses. We thus need approaches to correctly identify the cause of packet losses. In this paper, we address this problem by proposing and building a fine-grained analysis (FGA) tool that investigates the causes of packet losses and reports the most likely cause of these losses. Our tool uses parameters, e.g. RSSI and LQI, present within every received packet to profile the links between nodes and their corresponding neighborhood. Through real-world experiments, we have validated our approach and shown that our tool is able to differentiate between the various attacks that may affect the nodes and the links.


computer and communications security | 2014

Demo Overview: Privacy-Enhancing Features of IdentiDroid

Daniele Midi; Oyindamola Oluwatimi; Bilal Shebaro; Elisa Bertino

As privacy today is a major concern for mobile systems, network anonymizers are widely available on smartphones systems, such as Android. However, in many cases applications are still able to identify the user and the device by means different from the IP address. In this demo we show two solutions that address this problem by providing application-level anonymity. The first solution shadows sensitive data that can reveal the user identity. The second solutions dynamically revokes Android application permissions associated with sensitive information at run-time. In addition, both solutions offer protection from applications that identify their users through traces left in the applications data storage or by exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions, and built IdentiDroid Profile Manager, a profile-based configuration tool for setting different configurations for each installed Android application.


international conference on embedded networked sensor systems | 2013

Fine-grained analysis of packet loss symptoms in wireless sensor networks

Bilal Shebaro; Daniele Midi; Elisa Bertino

In a wireless sensor networks, packet losses can result from attacks affecting the nodes or the wireless links connecting the nodes. Failure to identify the actual attack can undermine the efficacy of the attack responses. We thus need approaches to correctly identify the cause of packet losses. In this poster paper, we address this problem by proposing and building a fine-grained analysis (FGA) tool that investigates the causes of packet losses and reports the most likely cause of these losses. Our tool uses parameters, e.g. RSSI and LQI, transmitted with every received packet to profile the links between nodes and their corresponding neighborhood. Through real-world experiments, we have validated our approach and shown that our tool is able to differentiate between the various attacks that may affect the nodes and the links.


computer and communications security | 2013

POSTER: Performance signatures of mobile phone browsers

Bilal Shebaro; Di Jin; Elisa Bertino

Several fingerprinting techniques for computer browsers have been proposed to make it possible to link together different browser sessions and possibly tie them to a user identity. As most of these techniques depend on static browser characteristics and user-installed plugins, the resulting fingerprints are not suitable for mobile browsers because of the similarity of browser characteristics on similar mobile device products in spite of the differences in software and hardware. Moreover, mobile devices are shipped with pre-installed plugins that cannot be modified, which limits browser uniqueness. Therefore, we propose a dynamic mobile browser fingerprinting technique that records the browsers behavior and execution characteristics by running background customized browser scripts. Our dynamic technique is based on the use of Javascript, HTML5, Flash, and other scripts that are used to generate performance signatures of mobile browsers to detect the browser used, the operating system version, and device type. Our browser detection technique compares the active browser session signature with existing signatures through three detection methods: (1) Euclidean Distance, (2) Cosine Similarity, and (3) Voting System. In this paper we compare the detection rates of these methods and their accuracy in determining the mobile browser in use.


annual information security symposium | 2015

Privacy-enhancing features of identidroid

Daniele Midi; Oyindamola Oluwatimi; Bilal Shebaro; Elisa Bertino


computer and communications security | 2013

Performance signatures of mobile phone browsers.

Bilal Shebaro; Di Jin; Elisa Bertino


annual information security symposium | 2013

PostgreSQL anomaly detector

Bilal Shebaro; Asmaa Sallam; Ashish Karma; Elisa Bertino

Collaboration


Dive into the Bilal Shebaro's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge