Foreword |
|
xiii | |
Preface |
|
xv | |
Editors |
|
xix | |
Contributors |
|
xxi | |
|
1 The Evolution of Hardware-Assisted Security |
|
|
1 | (20) |
|
|
|
|
|
|
1 | (1) |
|
|
2 | (2) |
|
1.2.1 Common Software Vulnerabilities |
|
|
2 | (1) |
|
1.2.2 Software Exploitation |
|
|
2 | (2) |
|
1.3 Security Mechanisms in Hardware |
|
|
4 | (6) |
|
|
4 | (1) |
|
1.3.2 Supervisor Mode Execute/Access Prevention |
|
|
4 | (1) |
|
1.3.3 Data Execution Prevention |
|
|
4 | (1) |
|
1.3.4 Intel Memory Protection Extensions |
|
|
5 | (1) |
|
1.3.5 Intel Memory Protection Keys |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.3.7 Instruction Set Randomization |
|
|
7 | (1) |
|
1.3.8 Control-Flow Integrity |
|
|
8 | (2) |
|
1.3.8.1 Intel Control-flow Enforcement Technology |
|
|
10 | (1) |
|
1.3.8.2 ARM Pointer Integrity |
|
|
10 | (1) |
|
1.4 Trusted Execution Environments |
|
|
10 | (3) |
|
1.4.1 Execute Only Memory |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
1.4.4 Intel Software Guard Extensions |
|
|
12 | (1) |
|
1.5 Hardware Vulnerabilities |
|
|
13 | (2) |
|
1.5.1 Transient Instruction Execution |
|
|
13 | (1) |
|
1.5.2 Cache as a Side-Channel |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (5) |
|
2 Cybersecurity of the Unmanned Ship |
|
|
21 | (22) |
|
|
|
|
21 | (3) |
|
|
24 | (4) |
|
2.2.1 The Extended Maritime Architecture Framework |
|
|
24 | (2) |
|
2.2.2 The CPSs of the Unmanned Ship |
|
|
26 | (2) |
|
2.3 Cyber Risks of the Unmanned Ship |
|
|
28 | (4) |
|
2.4 Cybersecurity Requirements for the Unmanned Ship |
|
|
32 | (4) |
|
2.5 Treating the Cyber Risk of the Unmanned Ship |
|
|
36 | (3) |
|
|
39 | (1) |
|
|
39 | (4) |
|
3 Agile Incident Response in Industrial Control Environments |
|
|
43 | (16) |
|
|
|
|
|
|
|
|
43 | (1) |
|
3.2 Complying with Legal Requirements and Guidance for Operators |
|
|
44 | (1) |
|
3.3 Current Issues in Managing Incidents in Industrial Control Environments |
|
|
45 | (1) |
|
3.4 Agile Approach to Incident Management |
|
|
46 | (3) |
|
|
49 | (6) |
|
|
49 | (1) |
|
3.5.2 Blue Team Composition |
|
|
49 | (2) |
|
3.5.3 Agile Methodologies |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
3.5.3.3 Sprint Retrospectives |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
3.5.4.1 Self-Selection of Tasks |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
3.5.6 Event Questionnaires |
|
|
55 | (1) |
|
3.6 Discussion and Conclusions |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (3) |
|
4 Multi-Stage Threat Modeling and Security Monitoring in 5GCN |
|
|
59 | (18) |
|
|
|
|
|
59 | (2) |
|
|
61 | (2) |
|
|
62 | (1) |
|
4.2.2 Multi-Stage Attack Modeling |
|
|
62 | (1) |
|
4.3 Threat Modeling of the 5GCN |
|
|
63 | (5) |
|
|
64 | (1) |
|
4.3.2 Threat Decomposition |
|
|
65 | (1) |
|
4.3.3 Modeling 5GCN Threats as Graphs |
|
|
66 | (1) |
|
4.3.4 A 5GCN Threat Graph Example |
|
|
66 | (2) |
|
4.4 Graph-Based Security Monitoring for the 5GCN Infrastructure |
|
|
68 | (3) |
|
4.5 Open Research Challenges and Future Work |
|
|
71 | (3) |
|
4.5.1 Detection of Multi-Stage Attack Scenarios |
|
|
72 | (1) |
|
4.5.2 A Centralized Threat Detection Engine |
|
|
73 | (1) |
|
4.5.3 A 5G Network TTP Matrix |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (3) |
|
5 Blockchain Technology for 6G Communication Networks: A Vision for the Future |
|
|
77 | (20) |
|
|
|
|
77 | (3) |
|
5.1.1 Blockchain Overview |
|
|
78 | (1) |
|
5.1.1.1 Blockchain Technology Architecture |
|
|
78 | (2) |
|
5.2 Blockchain and Cryptography |
|
|
80 | (3) |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (4) |
|
5.3.1 The Consensus Problem |
|
|
84 | (1) |
|
|
84 | (1) |
|
5.3.2 Blockchain Consensus Algorithms |
|
|
84 | (1) |
|
5.3.2.1 Proof-Based Algorithms |
|
|
85 | (1) |
|
5.3.2.2 Voting-based Algorithms |
|
|
86 | (1) |
|
5.4 Blockchain for 6G Networks |
|
|
87 | (4) |
|
|
87 | (1) |
|
5.4.2 Blockchain-Based Solutions |
|
|
88 | (1) |
|
5.4.2.1 Infrastructure Solutions |
|
|
88 | (1) |
|
5.4.2.2 Emerging Applications |
|
|
89 | (2) |
|
|
91 | (1) |
|
5.5.1 Open Research Issues |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (4) |
|
6 Securing Components on a 5G Core |
|
|
97 | (18) |
|
|
|
|
|
|
|
|
|
|
|
97 | (2) |
|
6.1.1 Security across Previous Generations |
|
|
97 | (1) |
|
6.1.2 Structure of the MSG Project |
|
|
98 | (1) |
|
6.1.3 The Need to Secure the 5G Core |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (2) |
|
6.2.1 Security Architecture of 5G Networks |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
6.4 Architecture and Components |
|
|
102 | (3) |
|
6.4.1 Event Processing and Visualization Platform |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (2) |
|
6.4.2.2 Metrics and Policy Messages |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (5) |
|
6.5.1 Event Processing and Visualization Platform Tests |
|
|
105 | (2) |
|
6.5.2 Network Exposure Function Tests |
|
|
107 | (2) |
|
6.5.3 Integration Scenario |
|
|
109 | (1) |
|
6.5.3.1 Testbed Description |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (3) |
|
7 RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks |
|
|
115 | (22) |
|
|
|
|
115 | (2) |
|
|
116 | (1) |
|
7.2 RF Jamming Attacks in Vehicular Networks |
|
|
117 | (1) |
|
7.3 RF Jamming Classification Using Relative Speed Estimation |
|
|
118 | (5) |
|
|
119 | (1) |
|
7.3.2 Jamming Attack Scenarios |
|
|
120 | (2) |
|
7.3.3 Estimation of Relative Speed Metric |
|
|
122 | (1) |
|
7.3.4 The variations of relative speed (V RS) Algorithm |
|
|
122 | (1) |
|
7.3.5 Proposed IDS Based on Supervised Learning |
|
|
123 | (1) |
|
7.4 Enhancing the Proposed IDS with Data Fusion Techniques |
|
|
123 | (2) |
|
7.5 Simulation and Performance Evaluation |
|
|
125 | (6) |
|
7.5.1 Detection Performance under Different Au Values |
|
|
125 | (3) |
|
7.5.2 Evaluation under Different Interference Levels |
|
|
128 | (3) |
|
7.5.3 Data Fusion Results |
|
|
131 | (1) |
|
7.6 Discussion and Conclusions |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (4) |
|
8 Smart Cars and Over-the-Air Updates |
|
|
137 | (16) |
|
|
|
|
|
|
|
137 | (1) |
|
|
138 | (1) |
|
8.3 Threats and Vulnerabilities |
|
|
139 | (5) |
|
8.3.1 Smart Car Components |
|
|
140 | (1) |
|
8.3.2 The Attacker's Targets |
|
|
140 | (1) |
|
8.3.3 Over-the-Air Updates and Security Issues |
|
|
141 | (1) |
|
8.3.3.1 Classification of OTA Update Attacks |
|
|
142 | (1) |
|
8.3.3.2 Attacks on OTA Updates |
|
|
142 | (2) |
|
|
144 | (3) |
|
|
145 | (1) |
|
8.4.2 External Protection |
|
|
145 | (1) |
|
8.4.3 Internal Protection |
|
|
146 | (1) |
|
8.4.4 Update-Specific Protection |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (4) |
|
9 Emerging Malware Threats: The Case of Ransomware |
|
|
153 | (18) |
|
|
|
9.1 Evolution of Ransomware |
|
|
153 | (1) |
|
|
154 | (3) |
|
|
157 | (3) |
|
9.4 Ransomware and Social Engineering |
|
|
160 | (3) |
|
9.5 Legislation Challenges |
|
|
163 | (2) |
|
|
165 | (2) |
|
|
167 | (4) |
|
10 Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats in the Cyber Domain |
|
|
171 | (14) |
|
|
10.1 Introduction: Background and Driving Forces |
|
|
171 | (1) |
|
10.2 Problem Definition - The Cyber Crisis Management |
|
|
171 | (8) |
|
|
179 | (1) |
|
|
180 | (2) |
|
|
182 | (1) |
|
|
182 | (3) |
|
|
185 | (14) |
|
|
|
185 | (1) |
|
11.2 The Skills Gap in the Landscape of Industry 4.0 |
|
|
186 | (3) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (2) |
|
11.2.4 Tier 3: Government |
|
|
189 | (1) |
|
11.3 Defining an Agenda for Cybersecurity Skills |
|
|
189 | (2) |
|
11.3.1 Evolution of the Cyber Discipline |
|
|
189 | (2) |
|
11.4 A Framework to Address the Skills Gap in Cyber |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (3) |
|
|
195 | (4) |
Index |
|
199 | |