{"id":1666,"date":"2024-04-27T09:51:21","date_gmt":"2024-04-27T13:51:21","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1666"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-hardening-systems-against-data-corruption-attacks-at-design-time","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2024\/new-publication-hardening-systems-against-data-corruption-attacks-at-design-time\/","title":{"rendered":"New Publication: Hardening Systems Against Data Corruption Attacks at Design Time"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Hardening Systems Against Data Corruption Attacks at Design Time\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our new publication &#8220;<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_24\">Hardening Systems Against Data Corruption Attacks at Design Time <\/a>&#8221; is now available online. This is the work of MASc student, <a href=\"https:\/\/carleton.ca\/cybersea\/people\/john-breton\/\">John Breton<\/a>.In this work, we present a method and tool called Dubhe that can be employed during the design phase of development to harden systems against data corruption attacks. We highlight the benefits of this approach by applying it to an online seller of merchandise system to analyze various &#8221;what-if&#8221; scenarios with different defence objectives. Using our approach, Dubhe (1) analyzes the XML form of UML activity diagrams created to define the behavioural view of the system, (2) determines optimal locations for data sanitization using novel protection techniques and activity centrality concepts, and (3) communicates the results to the designers so that they can incorporate the suggestions back into their system designs.&nbsp; This paper was was presented at the <a href=\"https:\/\/www.fps-2023.com\/\">16th International Symposium on Foundations &amp; Practice of Security (FPS 2023)<\/a> in December 2023. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our new publication &#8220;Hardening Systems Against Data Corruption Attacks at Design Time &#8221; is now available online. This is the work of MASc student, John Breton.In this work, we present a method and tool called Dubhe that can be employed during the design phase of development to harden systems against data corruption attacks. We highlight [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1666"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1666\/revisions"}],"predecessor-version":[{"id":1667,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1666\/revisions\/1667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}