Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hidayet Aksu is active.

Publication


Featured researches published by Hidayet Aksu.


ACM Computing Surveys | 2018

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

Abbas Acar; Hidayet Aksu; A. Selcuk Uluagac; Mauro Conti

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive rights on the data. Especially with popular cloud services, control over the privacy of the sensitive data is lost. Even when the keys are not shared, the encrypted material is shared with a third party that does not necessarily need to access the content. Moreover, untrusted servers, providers, and cloud operators can keep identifying elements of users long after users end the relationship with the services. Indeed, Homomorphic Encryption (HE), a special kind of encryption scheme, can address these concerns as it allows any third party to operate on the encrypted data without decrypting it in advance. Although this extremely useful feature of the HE scheme has been known for over 30 years, the first plausible and achievable Fully Homomorphic Encryption (FHE) scheme, which allows any computable function to perform on the encrypted data, was introduced by Craig Gentry in 2009. Even though this was a major achievement, different implementations so far demonstrated that FHE still needs to be improved significantly to be practical on every platform. Therefore, this survey focuses on HE and FHE schemes. First, we present the basics of HE and the details of the well-known Partially Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which are important pillars for achieving FHE. Then, the main FHE families, which have become the base for the other follow-up FHE schemes, are presented. Furthermore, the implementations and recent improvements in Gentry-type FHE schemes are also surveyed. Finally, further research directions are discussed. This survey is intended to give a clear knowledge and foundation to researchers and practitioners interested in knowing, applying, and extending the state-of-the-art HE, PHE, SWHE, and FHE systems.


Archive | 2018

An Android-Based Covert Channel Framework on Wearables Using Status Bar Notifications

Kyle Denney; A. Selcuk Uluagac; Hidayet Aksu; Kemal Akkaya

Covert channels circumvent security measures to steal sensitive data undetectable to an onlooker. Traditionally, covert channels utilize global system resources or settings to send hidden messages. This chapter introduces covert channels and focuses on a novel covert channel on Android-based Internet of Things (IoT) devices. Particularly, we were able to make a covert channel using notifications a user gets from everyday applications. The chapter will also present this covert channel by discussing the framework, evaluating the performance, and demonstrating the functionality and flexibility of the proposed model.


mobile adhoc and sensor systems | 2017

Cybergrenade: Automated Exploitation of Local Network Machines via Single Board Computers

Anurag Akkiraju; David Gabay; Halim Burak Yesilyurt; Hidayet Aksu; A. Selcuk Uluagac

In this paper, we introduce a defensive cybersecurity framework called Cybergrenade automating various penetration testing tools to sequentially exploit machines connected to a single local network, all underneath a single application running on a Single-Board Computer (SBC). This takes advantage of the SBCs unique capabilities in a way that manual exploitation simply cannot match. Currently, while many SBCs are being used in research as exploitation tool-kits, the current state of automation of the processes associated with exploitation leaves much to be desired. While this paper describes the Cybergrenade Framework, it can be used as a guideline for future research automating the exploitation process. Cybergrenade allows tools such as Nmap, OpenVAS, and Metasploit tools to be automatically utilized under one framework. Our experimental evolution revealed that Cybergrenade can perform the automation of various pentesting tools under a single application with ease.


Journal of Hardware and Systems Security | 2017

A Survey on Function and System Call Hooking Approaches

Juan Lopez; Leonardo Babun; Hidayet Aksu; A. Selcuk Uluagac

Functions and system calls are effective indicators of the behavior of a process. These subroutines are useful for identifying unauthorized behavior caused by malware or for developing a better understanding of the lower-level operations of an application. Code obfuscation, however, often prevents user monitoring and modification of subroutine calls. Subroutine hooking offers a solution to this limitation. Function and system call hooking approaches allow for subroutine instrumentation, making hooking a valuable and versatile skill across industry and academia. In this survey, we present several criteria for the classification and selection of hooking tools and techniques as well as an examination of the major hooking approaches used on Windows, Linux, macOS, iOS, and Android operating systems. We also evaluate and compare the performance of different subroutine hooking tools and techniques based on computing resource utilization such as CPU time, memory, and wall-clock time. To the best of our knowledge, this is the first paper that encompasses both system call and function hooking techniques and tools across the major desktop and mobile operating systems.


communications and networking symposium | 2016

A framework for counterfeit smart grid device detection

Leonardo Babun; Hidayet Aksu; A. Selcuk Uluagac

The core vision of the smart grid concept is the realization of reliable two-way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks and new challenges in protecting the smart grid systems from cyber threats. Particularly, the use of untrusted counterfeit smart grid devices represents a real problem. Consequences of propagating false or malicious data, as well as stealing valuable user or smart grid state information from counterfeit devices are costly. Hence, early detection of counterfeit devices is critical for protecting smart grids components and users. To address these concerns, in this poster, we introduce our initial design of a configurable framework that utilize system call tracing, library interposition, and statistical techniques for monitoring and detection of counterfeit smart grid devices. In our framework, we consider realistic counterfeit device scenarios with different smart grid devices and adversarial settings. Our initial results on a realistic testbed utilizing actual smart-grid GOOSE messages with IEC-61850 communication protocol are very promising. Our framework is showing excellent rates on detection of smart grid counterfeit devices from impostors.


usenix security symposium | 2017

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.

Amit Kumar Sikder; Hidayet Aksu; A. Selcuk Uluagac


usenix security symposium | 2018

Sensitive Information Tracking in Commodity IoT.

Z. Berkay Celik; Leonardo Babun; Amit Kumar Sikder; Hidayet Aksu; Gang Tan; Patrick D. McDaniel; A. Selcuk Uluagac


ieee annual computing and communication workshop and conference | 2018

IoT-enabled smart lighting systems for smart cities

Amit Kumar Sikder; Abbas Acar; Hidayet Aksu; A. Selcuk Uluagac; Kemal Akkaya; Mauro Conti


arXiv: Cryptography and Security | 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.

Amit Kumar Sikder; Giuseppe Petracca; Hidayet Aksu; Trent Jaeger; A. Selcuk Uluagac


international conference on communications | 2017

Identifying counterfeit smart grid devices: A lightweight system level framework

Leonardo Babun; Hidayet Aksu; A. Selcuk Uluagac

Collaboration


Dive into the Hidayet Aksu's collaboration.

Top Co-Authors

Avatar

A. Selcuk Uluagac

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Leonardo Babun

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Abbas Acar

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Amit Kumar Sikder

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Kemal Akkaya

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Patrick D. McDaniel

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Z. Berkay Celik

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Gang Tan

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Giuseppe Petracca

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge