Stefan Rass

Stefan Rass
Johannes Kepler University Linz | JKU · LIT Secure and Correct Systems Lab

Prof. Dipl.Ing. Dipl.Ing. Dr.

About

214
Publications
42,921
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,648
Citations
Citations since 2017
106 Research Items
1361 Citations
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300
2017201820192020202120222023050100150200250300

Publications

Publications (214)
Article
Full-text available
This article is an overview of recent progress on a theory of games, whose payoffs are probability distributions rather than real numbers, and which have their equilibria defined and computed over a (suitably restricted yet dense) set of distributions. While the classical method of defining game models with real-valued utility functions has proven...
Preprint
Full-text available
Given a set of points in the Euclidean space $\mathbb{R}^\ell$ with $\ell>1$, the pairwise distances between the points are determined by their spatial location and the metric $d$ that we endow $\mathbb{R}^\ell$ with. Hence, the distance $d(\mathbf x,\mathbf y)=\delta$ between two points is fixed by the choice of $\mathbf x$ and $\mathbf y$ and $d$...
Article
Full-text available
A QKD network provides an additional security layer for IT-secure cryptographic key distribution that is added to existing conventional networks. Thus, QKD network components must be resilient to security challenges from conventional network environments. This paper provided a novel solution for designing a Key Management System resistant to DoS at...
Chapter
Because quantum key distribution is a technology for establishing keys for symmetric encryption (preferably one-time pads, but more practically keys for AES or other conventional symmetric cryptography), end-to-end confidentiality or authentication requires a deeper look into network structure and comes with additional assumptions.
Chapter
Establishing secure cryptographic keys through an untrusted network is a fundamental cryptographic task. While the use of public key infrastructure based on computational intractability assumptions prevail, these solutions remain theoretically breakable. They are under constant threat as computational power continues to increase, new algorithms are...
Chapter
The basis of all modern networks is device which is able to manage and control network traffic. The fundamental network device is a router that connects at least two networks and has traffic directing functions. From a logical point of view, a router is the intersection of links forming a network. Its task is to accept incoming packets, analyze des...
Chapter
Modern telecommunications networks are based on packet-switching traffic processing and the methodology by which packets can be delivered using an arbitrary route. However, for some applications, merely finding the route to destination is insufficient. Applications can place multiple parameters in their requests, starting from the time it takes the...
Chapter
The conceptual composition of a QKD link into quantum and physical channels corresponds to similar connections in the physical world and does not preclude the dual use of fibres as both a classic and quantum channel (in fact, the SECOQC network was built on existing fibre-optic cables). Viewed from a logical perspective, the network consists of mor...
Preprint
Full-text available
Decisions are often based on imprecise, uncertain or vague information. Likewise, the consequences of an action are often equally unpredictable, thus putting the decision maker into a twofold jeopardy. Assuming that the effects of an action can be modeled by a random variable, then the decision problem boils down to comparing different effects (ran...
Preprint
Full-text available
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often va...
Chapter
The development of electronic and optical components has led to greater interest in the application of QKD solutions in everyday life. In this section, we briefly describe the currently attractive trends and approaches for future research in the field of QKD technologies.
Chapter
Quality of Service (QoS) architecture models the structure and methods of applying QoS mechanisms to satisfy QoS objectives. It is often referred to the QoS model because it uniquely defines which QoS mechanisms (such as those listed in Sect. 2.3) are used and how they are implemented. QoS architecture also defines network traffic processing polici...
Chapter
Generally, the need for and the type of signaling, or more strictly speaking, the QoS signaling protocol depends on the applied QoS architecture. Here, we distinguish between the signal and the signaling protocol, which in the literature elsewhere are commonly applied as synonyms.
Article
Full-text available
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. To protect these entities and learn about adversaries, data on attackers can be realistically gathered using decoy systems...
Preprint
Full-text available
The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers can be realistically gathered through cyber threat intelligence using systems like honeypots. Admit...
Article
We study the question of how well machine learning (ML) models trained on a certain data set provide privacy for the training data or, equivalently, whether it is possible to reverse-engineer the training data from a given ML model. While this is easy to answer negatively in the most general case, it is interesting to note that the protection exten...
Chapter
Many practical situations require some modeling of uncertainty, and often, this means speaking about events whose likelihood to occur is conveniently expressible by probability parameters, say, a scalar 0 ≤ p ≤ 1 . The semantics of such values can be arbitrarily complex, ranging from simple probabilities, up to conditional likelihoods, or factors o...
Article
Full-text available
The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. Th...
Preprint
Full-text available
We consider a family of distributions on which natural tail orders can be constructed upon a representation of a distribution by a (single) hyper-real number. Past research revealed that the ordering can herein strongly depend on the particular model of the hyperreals, specifically the underlying ultrafilter. Hence, our distribution family is const...
Article
Full-text available
In this paper we address game theory problems arising in the context of network security. In traditional game theory problems, given a defender and an attacker, one searches for mixed strategies which minimize a linear payoff functional. In the problems addressed in this paper an additional quadratic term is added to the minimization problem. Such...
Chapter
Full-text available
We present a method for the joint analysis of textual and numerical IT-system data usable to predict possibly critical system states. Towards a comparative discussion culminating in a justified model and method choice, we apply logistic regression, random forest and neural networks to the prediction of critical system states. Our models consume a s...
Preprint
Full-text available
We study the question of how well machine learning (ML) models trained on a certain data set provide privacy for the training data, or equivalently, whether it is possible to reverse-engineer the training data from a given ML model. While this is easy to answer negatively in the most general case, it is interesting to note that the protection exten...
Preprint
Full-text available
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechanisms during the development, deployment or while in production. As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and an a posteriori hardening is at least challengi...
Article
Full-text available
With the growing popularity of robots, the development of robot applications is subject to an ever increasing number of additional requirements from e.g., safety, legal and ethical sides. The certification of an application for compliance to such requirements is an essential step in the development of a robot program. However, at this point in time...
Book
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to market occasionally goes at the cost of neglecting security mechanisms during the development, deployment or while in production. As a result, contemporary robotic systems are vulnerable to diverse attack patterns, and a posteriori hardening is at least challenging,...
Book
This book constitutes the refereed proceedings of the 12th International Conference on Decision and Game Theory for Security, GameSec 2021,held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers presented were carefully reviewed and selected from 37 submissions. The papers focus on Theoretical Foundation...
Chapter
Measuring risk in multiple dimensions is vital for a comprehensive understanding and for risk analysis. Therefore, we here propose to use multiple impact categories. This yield generalized multi-categorical risk measures, depending on how the likelihood of occurrence is measured. For the one-dimensional case, risk is measured through a vector, whil...
Chapter
Security is rarely single-dimensional and is in most practical instances a tradeoff between dependent, and occasionally conflicting goals. The simplest method of multi-criteria optimization and games with vector-valued payoffs, is transforming such games into ones with scalar payoffs, and looking for Pareto-optimal behavior. This usually requires a...
Chapter
Cities and their agglomerations are home to a large number of critical infrastructures that provide essential services in a geographically-narrow space. Because the critical infrastructures in a city are physically and logically dependent on each another, an incident in one infrastructure can have impacts on the entire city and its population. Thus...
Preprint
Full-text available
The reuse of technologies and inherent complexity of most robotic systems is increasingly leading to robots with wide attack surfaces and a variety of potential vulnerabilities. Given their growing presence in public environments, security research is increasingly becoming more important than in any other area, specially due to the safety implicati...
Article
Full-text available
The degree of sophistication of modern cyber-attacks has increased in recent years, and in the future these attacks will more and more target cyber-physical systems (CPS). Unfortunately, today’s security solutions that are used for enterprise information technology (IT) infrastructures are not sufficient to protect CPS, which have largely different...
Preprint
Full-text available
With its growing use in industry, ROS is rapidly becoming a standard in robotics. While developments in ROS 2 show promise, the slow adoption cycles in industry will push widespread ROS 2 industrial adoption years from now. ROS will prevail in the meantime which raises the question: can ROS be used securely for industrial use cases even though its...
Conference Paper
Full-text available
Due to its importance for decision-making processes, data quality plays a crucial role in modern data management. However, assessing data quality still involves a number of manual steps. Moreover, these tasks are characterized by subjective decisions performed by domain experts. The goal of this research is to reduce the time spent on these activit...
Article
Full-text available
The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds. The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first 96:2 M. Mehic et al. application on...
Article
Full-text available
The only reliable remedy against anxiety is information, and reliable information and news are of crucial value in times of crises, such as COVID-19. Contemporary social media offers almost everyone a platform to publish one’s own thoughts, opinions, political statements and others, some of which may gain significant interest of others and thereby...
Chapter
Critical Infrastructures (CIs) now include complex cyber-physical systems, with communication networks enabling interactions between the cyber and physical systems. Although the digitalization of such critical infrastructures is intended to increase performance and safety, it also subjects them to new forms of attack. Contemporary attacks that comb...
Article
Full-text available
Cryptographic functions for constrained processing environments can be devised using lightweight cryptography. For use in safety relevant automotive applications where transient faults can occur at runtime the calculation of a cipher text requires verification. We propose an algorithm to generate a group parity based concurrent error detection for...
Chapter
The term “game” has substantially different meanings within the security area, depending on whether we speak about cryptographic security in particular, or system security in a more general setting that includes quantitative security with help of game theory. Game theory and cryptography are, however, of mutual value for each other, since game theo...
Chapter
Patrolling and surveillance games both deal with a chasing-evading situation of an adversary trying to escape detection by either a mobile defender (patrolling) or a fixed defender (surveillance). Both kinds of games are played on graphs as abstract models of an infrastructure, and we review a variety of closed-form solutions for optimal patrolling...
Chapter
This chapter embeds game theoretic techniques and models inside the ISO31000 risk management process, as a generic template for the general duty of risk control. We observe similarities between risk management processes and extensive form games, accompanied by the possibility of using game-theoretic algorithms and methods in various steps of a risk...
Chapter
This chapter introduces the most important classes of games underlying practical security models. These include Stackelberg games, Nash games, signaling games, and games with distribution-valued payoffs. The latter build upon empirical methods and data science to construct games from data, but also reveals theoretic connections to multi-criteria op...
Chapter
This chapter refines the introduction of security in critical infrastructures by going into deeper details about how threats and countermeasures differ and are specific for the physical domain, the cyber domain and intermediate areas. Gaining an understanding of these differences is crucial for the design of effective countermeasures against the di...
Chapter
This chapter revisits the concept of a utility function, first introduced in Chap. 3, from an axiomatic viewpoint. We review the fundamental principles of decision making as axioms that induce the existence of (continuous) utility functions. Since empirical research of decision situations in real life has shown considerable deviations between mathe...
Chapter
Since both, decision- and game theory vitally employ optimization at their core, this chapter will provide the basic ideas, concepts and modeling aspects of optimization. It is intended to provide the mathematical basics for the further chapters. The presentation is to the point of a simple, compact and self-contained description of: (i) what is de...
Chapter
In this chapter, we adopt a holistic cross-layer viewpoint towards a hierarchical structure of ICS and the attack models. The physical layer is comprised of devices, controllers and the plant whereas the cyber layer consists of routers, protocols, and security agents and manager. The physical layer controllers are often designed to be robust, adapt...
Chapter
In this chapter, we consider games for the computation of optimal strategies of how, how often, and when to inspect along a production line, or general industrial process. We review basic concepts of statistical tests, conducted whenever the defender chooses its action to “inspect”, and to understand cheating strategies for the adversary trying to...
Chapter
Cyber insurance provides users a valuable additional layer of protection to transfer cyber data risks to third-parties. An incentive-compatible cyber insurance policy can reduce the number of successful cyber-attacks by incentivizing the adoption of preventative measures in return for more coverage and the implementation of best practices by pricin...
Chapter
This chapter discusses the use of data and data science to choose values for model parameters, and suggests a few methods and literature pointers to techniques that can be helpful to instantiate models. Furthermore, we review a set of selected software tools that help with the setup and equilibrium analysis of practical game theoretic models. We re...
Conference Paper
In this article, we want to present the concept for a risk management approach to assess the condition of critical infrastructure networks within metropolitan areas, their interdependencies among each other and the potential cascading effects. In contrast to existing solutions, this concept aims at providing a holistic view on the variety of interc...
Preprint
Full-text available
In this paper we address a game theory problem arising in the context of network security. In traditional game theory problems, given a defender and an attacker, one searches for mixed strategies which minimize a linear payoff functional. In the problem addressed in this paper an additional quadratic term is added to the minimization problem. Such...
Chapter
Random numbers are an important ingredient in cryptographic applications, whose importance is often underestimated. For example, various protocols hinge on the requirement of using numbers only once and never again (most prominently, the one-time pad), or rest on a certain minimal entropy of a random quantity. Quantum random number generators can h...
Chapter
Nowadays, critical infrastructures operate a large number of highly interdependent, cyber-physical systems. Thus, incidents can have far-reaching cascading effects throughout the entire infrastructure, which need to be identified and estimated to realize a proper risk management. In this paper, we present a formal model to describe the propagation...
Book
This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader – who ideally has a background in classical statistics, computer science, or cryptography...
Book
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an adva...
Article
Full-text available
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity betwee...
Conference Paper
Full-text available
Researchers and practitioners from various fields strive to achieve and maintain high standards of information quality for their projects or organizational units. Since information (data) is widely seen as a valuable asset, the literature consists of a number of frameworks and guidelines for assessing its quality. Implementing such methods can prov...
Chapter
Full-text available
In this paper, we define a cyber deception game between the Advanced Metering Infrastructure (AMI) network administrator (henceforth, defender) and attacker. The defender decides to install between a low-interaction honeypot, high-interaction honeypot, and a real system with no honeypot. The attacker decides on whether or not to attack the system g...
Chapter
A major characteristic of Advanced Persistent Threats (APTs) is their stealthiness over a possibly long period, during which the victim system is being penetrated and prepared for the finishing blow. We model an APT as a game played on an attack graph G, and consider the following interaction pattern: the attacker chooses an attack path in G toward...
Conference Paper
Full-text available
In this paper, we define a cyber deception game between the Advanced Metering Infrastructure (AMI) network administrator (hence-forth, defender) and attacker. The defender decides to install between a low-interaction honeypot, high-interaction honeypot, and a real system with no honeypot. The attacker decides on whether or not to attack the system...
Conference Paper
Full-text available
A major characteristic of Advanced Persistent Threats (APTs) is their stealthiness over a possibly long period, during which the victim system is being penetrated and prepared for the finishing blow. We model an APT as a game played on an attack graph G, and consider the following interaction pattern: the attacker chooses a path in G, and step-by-s...
Chapter
Situational awareness is often a matter of detailed local information and proportionally limited view on the bigger picture. Conversely, the big picture avoids complicating details, and as such displays the system components as atomic “black boxes”. This work proposes a combination of local and global views, accounting for a common practical divisi...
Chapter
Full-text available
Big data is an appealing source and often perceived to bear all sorts of hidden information. Filtering out the gemstones of information besides the rubbish that is equally easy to “deduce” is, however, a nontrivial issue. This position paper will open with the motivating problem of risk estimation for an enterprise, using big data. Our illustrative...
Article
Full-text available
Nowadays, the importance of achieving and maintaining a high standard of data quality is widely recognized by both practitioners and researchers. Based on its impact on businesses, the quality of data is commonly viewed as a valuable asset. The literature comprises various techniques for defining, assessing and improving data quality. However, requ...
Conference Paper
Full-text available
We describe an e-learning system for teaching cryptography. Our software is a programming environment that shall help students in studying cryptographic systems without having to worry too much about the underlying mathematics (number theory). To this end, we designed a programming language that natively supports common algebraic structures found t...
Chapter
While risk in many areas of science and security is quantitatively understood as expected loss, resilience is a frequently used but much less formalized term. Defining the term plainly as the probability of outage appears as an oversimplification of practical matters, since precautions towards resilience typically target at impacts and may be witho...
Book
Full-text available
Part 2: Workshop and Tutorial Papers
Article
Full-text available
Critical infrastructures (CIs) are essential for the welfare and prosperity of a society, and failure of one infrastructure has a significant impact on our everyday life. However, a problem in one critical infrastructure is rarely local but often affects other infrastructures, e.g., limited availability of electricity affects hospitals, water provi...
Conference Paper
Full-text available
This paper investigates (perfectly) secure message transmission over a wireless sensor network. Using a layered network architecture and a very simple form of routing, we show how to construct an arbitrarily secure communication channel over a given infrastructure of wireless devices. Our construction is computationally cheap and requires no crypto...
Conference Paper
Full-text available
Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the consistent existence and availability of data residing at a potentially untrusted storage provider, e.g., a cloud. While most POR protocols strictly refer to static files, i.e., content that is read-only, dynamic PORs shall achieve the same security guarante...
Preprint
Full-text available
We consider network graphs G = (V, E) in which adjacent nodes share common secrets. In this setting, certain techniques for perfect end-to-end security (in the sense of confidentiality, authenticity (imply-ing integrity) and availability, i.e., CIA+) can be made applicable without end-to-end shared secrets and without computational intractability a...
Article
Full-text available
High availability of IT-applications and –infrastructure components is a significant factor for the success of organizations because more and more business processes depend entirely on IT-services. The result is that the complexity of IT-environments is permanently increasing and therefore the cost of intensive maintenance processes become more dif...
Preprint
Full-text available
We consider network graphs $G=(V,E)$ in which adjacent nodes share common secrets. In this setting, certain techniques for perfect end-to-end security (in the sense of confidentiality, authenticity (implying integrity) and availability, i.e., CIA+) can be made applicable without end-to-end shared secrets and without computational intractability ass...
Preprint
Full-text available
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity betwee...