首页 > 最新文献

2019 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets 差分推理测试:一种评估数据集净化的实用方法
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00024
Ali Kassem, G. Ács, C. Castelluccia, C. Palamidessi
In order to protect individuals' privacy, data have to be "well-sanitized" before sharing them, i.e. one has to remove any personal information before sharing data. However, it is not always clear when data shall be deemed well-sanitized. In this paper, we argue that the evaluation of sanitized data should be based on whether the data allows the inference of sensitive information that is specific to an individual, instead of being centered around the concept of re-identification. We propose a framework to evaluate the effectiveness of different sanitization techniques on a given dataset by measuring how much an individual's record from the sanitized dataset influences the inference of his/her own sensitive attribute. Our intent is not to accurately predict any sensitive attribute but rather to measure the impact of a single record on the inference of sensitive information. We demonstrate our approach by sanitizing two real datasets in different privacy models and evaluate/compare each sanitized dataset in our framework.
为了保护个人隐私,在共享数据之前,必须对数据进行“充分消毒”,即在共享数据之前,必须删除任何个人信息。然而,在什么时候数据被认为是经过良好处理的并不总是很清楚。在本文中,我们认为对净化数据的评估应该基于数据是否允许对特定于个人的敏感信息进行推断,而不是围绕重新识别的概念。我们提出了一个框架来评估不同的消毒技术在给定数据集上的有效性,通过测量消毒数据集中的个人记录对他/她自己的敏感属性推断的影响程度。我们的目的不是准确地预测任何敏感属性,而是度量单个记录对敏感信息推断的影响。我们通过在不同的隐私模型中对两个真实数据集进行消毒,并在我们的框架中评估/比较每个消毒过的数据集,来演示我们的方法。
{"title":"Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets","authors":"Ali Kassem, G. Ács, C. Castelluccia, C. Palamidessi","doi":"10.1109/SPW.2019.00024","DOIUrl":"https://doi.org/10.1109/SPW.2019.00024","url":null,"abstract":"In order to protect individuals' privacy, data have to be \"well-sanitized\" before sharing them, i.e. one has to remove any personal information before sharing data. However, it is not always clear when data shall be deemed well-sanitized. In this paper, we argue that the evaluation of sanitized data should be based on whether the data allows the inference of sensitive information that is specific to an individual, instead of being centered around the concept of re-identification. We propose a framework to evaluate the effectiveness of different sanitization techniques on a given dataset by measuring how much an individual's record from the sanitized dataset influences the inference of his/her own sensitive attribute. Our intent is not to accurately predict any sensitive attribute but rather to measure the impact of a single record on the inference of sensitive information. We demonstrate our approach by sanitizing two real datasets in different privacy models and evaluate/compare each sanitized dataset in our framework.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
WTMC 2019 Organization WTMC 2019组织
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00013
{"title":"WTMC 2019 Organization","authors":"","doi":"10.1109/spw.2019.00013","DOIUrl":"https://doi.org/10.1109/spw.2019.00013","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping 通过DNS缓存窥探分析vpn的审查规避
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00046
Oliver Farnan, Alexander Darer, Joss Wright
Anecdotal evidence suggests an increasing number of people are turning to VPN services for the properties of privacy, anonymity and free communication over the internet. Despite this, there is little research into what these services are actually being used for. We use DNS cache snooping to determine what domains people are accessing through VPNs. This technique is used to discover whether certain queries have been made against a particular DNS server. Some VPNs operate their own DNS servers, ensuring that any cached queries were made by users of the VPN. We explore 3 methods of DNS cache snooping and briefly discuss their strengths and limitations. Using the most reliable of the methods, we perform a DNS cache snooping scan against the DNS servers of several major VPN providers. With this we discover which domains are actually accessed through VPNs. We run this technique against popular domains, as well as those known to be censored in certain countries; China, Indonesia, Iran, and Turkey. Our work gives a glimpse into what users use VPNs for, and provides a technique for discovering the frequency with which domain records are accessed on a DNS server.
坊间证据显示,越来越多的人转向VPN服务,以获得隐私、匿名和在互联网上自由交流的特性。尽管如此,关于这些服务的实际用途的研究却很少。我们使用DNS缓存窥探来确定人们通过vpn访问哪些域名。此技术用于发现是否对特定DNS服务器进行了某些查询。一些VPN运行自己的DNS服务器,确保任何缓存的查询都是由VPN的用户进行的。我们探讨了DNS缓存窥探的3种方法,并简要讨论了它们的优点和局限性。使用最可靠的方法,我们对几个主要VPN提供商的DNS服务器执行DNS缓存窥探扫描。有了这个,我们发现哪些域名实际上是通过vpn访问的。我们对流行的域名以及在某些国家被审查的域名运行这种技术;中国,印尼,伊朗和土耳其。我们的工作让我们了解了用户使用vpn的目的,并提供了一种发现DNS服务器上访问域记录的频率的技术。
{"title":"Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping","authors":"Oliver Farnan, Alexander Darer, Joss Wright","doi":"10.1109/SPW.2019.00046","DOIUrl":"https://doi.org/10.1109/SPW.2019.00046","url":null,"abstract":"Anecdotal evidence suggests an increasing number of people are turning to VPN services for the properties of privacy, anonymity and free communication over the internet. Despite this, there is little research into what these services are actually being used for. We use DNS cache snooping to determine what domains people are accessing through VPNs. This technique is used to discover whether certain queries have been made against a particular DNS server. Some VPNs operate their own DNS servers, ensuring that any cached queries were made by users of the VPN. We explore 3 methods of DNS cache snooping and briefly discuss their strengths and limitations. Using the most reliable of the methods, we perform a DNS cache snooping scan against the DNS servers of several major VPN providers. With this we discover which domains are actually accessed through VPNs. We run this technique against popular domains, as well as those known to be censored in certain countries; China, Indonesia, Iran, and Turkey. Our work gives a glimpse into what users use VPNs for, and provides a technique for discovering the frequency with which domain records are accessed on a DNS server.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations 评估域名黑名单对恶意DNS注册的有效性
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00045
T. Vissers, Peter Janssen, W. Joosen, Lieven Desmet
Domain blacklists are widely-used in security research. However, given their proprietary nature, there is little insight into how they operate and how effective they are. In this paper, we analyze a unique combination of DNS traffic measurements with domain registration and blacklisting data. We focus in particular on large-scale malicious campaigns that register thousands of domain names used in orchestrated attacks. This allows us to gain insights into how blacklists and cybercriminals interact with each other. Furthermore, it enables us to pinpoint scenarios where blacklist operators struggle to detect campaign registrations.
域黑名单在安全研究中有着广泛的应用。然而,考虑到它们的专有性质,人们对它们的运作方式和有效性知之甚少。在本文中,我们分析了DNS流量测量与域名注册和黑名单数据的独特组合。我们特别关注大规模恶意活动,这些活动注册了数千个用于精心策划攻击的域名。这使我们能够深入了解黑名单和网络罪犯是如何相互作用的。此外,它使我们能够查明黑名单操作人员难以检测竞选注册的情况。
{"title":"Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations","authors":"T. Vissers, Peter Janssen, W. Joosen, Lieven Desmet","doi":"10.1109/SPW.2019.00045","DOIUrl":"https://doi.org/10.1109/SPW.2019.00045","url":null,"abstract":"Domain blacklists are widely-used in security research. However, given their proprietary nature, there is little insight into how they operate and how effective they are. In this paper, we analyze a unique combination of DNS traffic measurements with domain registration and blacklisting data. We focus in particular on large-scale malicious campaigns that register thousands of domain names used in orchestrated attacks. This allows us to gain insights into how blacklists and cybercriminals interact with each other. Furthermore, it enables us to pinpoint scenarios where blacklist operators struggle to detect campaign registrations.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"754 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Message from the IWPE 2019 Organizers IWPE 2019主办方寄语
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00008
{"title":"Message from the IWPE 2019 Organizers","authors":"","doi":"10.1109/spw.2019.00008","DOIUrl":"https://doi.org/10.1109/spw.2019.00008","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications ROS-Defender:机器人应用程序基于sdn的安全策略实施
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00030
Sean Rivera, S. Lagraa, C. Nita-Rotaru, Sheila Becker, R. State
In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought.
在本文中,我们提出了ROS-Defender,这是一种保护机器人系统的整体方法,它集成了机器人系统的安全事件管理系统(SIEM),入侵防御系统(IPS)和防火墙。ROS- defender将应用程序(ROS)级和网络级的异常检测系统与使用软件定义网络(SDN)的动态策略实施点相结合,以提供针对大类攻击的保护。虽然SIEMs、IPS和防火墙以前已经用于保护计算机网络,但ROSDefender将它们应用于机器人系统的特定用例,在这些用例中,安全性在许多情况下是事后才考虑的。
{"title":"ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications","authors":"Sean Rivera, S. Lagraa, C. Nita-Rotaru, Sheila Becker, R. State","doi":"10.1109/SPW.2019.00030","DOIUrl":"https://doi.org/10.1109/SPW.2019.00030","url":null,"abstract":"In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125863606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Message from the WTMC 2019 Organizers WTMC 2019主办方寄语
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00012
{"title":"Message from the WTMC 2019 Organizers","authors":"","doi":"10.1109/spw.2019.00012","DOIUrl":"https://doi.org/10.1109/spw.2019.00012","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124176138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Aware V-Model for Software Development 面向软件开发的具有隐私意识的v模型
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00028
Ala'a Al-Momani, F. Kargl, R. Schmidt, A. Kung, Christoph Bösch
After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice. We propose the new W-model as a privacy-aware extension of the V-model frequently used in software engineering. One stage of the W-model deals with analyzing privacy in the system where privacy engineers conduct a privacy impact assessment in order to elicit privacy threats and to find a suitable countermeasure to remedy each threat. With respect to finding suitable countermeasures, we provide requirements the countermeasures need to meet in order to be selected. In addition, we introduce a cost function that assists privacy engineers in selecting the most suitable countermeasure. Furthermore, we point out several open issues that future work needs to address.
在采用新的数据保护法规(如GDPR)之后,在整个系统开发生命周期中正确处理隐私已成为必须。本文讨论了在系统开发中更容易、更有效地集成隐私工程的几个方面,以及如何将设计隐私的概念付诸实践。我们提出了新的w模型,作为软件工程中经常使用的v模型的隐私意识扩展。w模型的一个阶段是分析系统中的隐私,其中隐私工程师进行隐私影响评估,以引出隐私威胁,并找到补救每种威胁的合适对策。在寻找合适的对策方面,我们提供对策需要满足的要求,以便选择对策。此外,我们还引入了一个成本函数,以帮助隐私工程师选择最合适的对策。此外,我们指出了未来工作需要解决的几个开放性问题。
{"title":"A Privacy-Aware V-Model for Software Development","authors":"Ala'a Al-Momani, F. Kargl, R. Schmidt, A. Kung, Christoph Bösch","doi":"10.1109/SPW.2019.00028","DOIUrl":"https://doi.org/10.1109/SPW.2019.00028","url":null,"abstract":"After the adoption of new data protection regulations, like GDPR, proper treatment of privacy throughout the system development lifecycle has become a must. In this paper, we discuss several aspects to more easily and effectively integrate privacy engineering in system development and how to bring the notion of privacy-by-design into practice. We propose the new W-model as a privacy-aware extension of the V-model frequently used in software engineering. One stage of the W-model deals with analyzing privacy in the system where privacy engineers conduct a privacy impact assessment in order to elicit privacy threats and to find a suitable countermeasure to remedy each threat. With respect to finding suitable countermeasures, we provide requirements the countermeasures need to meet in order to be selected. In addition, we introduce a cost function that assists privacy engineers in selecting the most suitable countermeasure. Furthermore, we point out several open issues that future work needs to address.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficient Evaluation of Activation Functions over Encrypted Data 加密数据上激活函数的有效评估
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00022
Patricia Thaine, S. Gorbunov, Gerald Penn
We describe a method for approximating any bounded activation function given encrypted input data. The utility of our method is exemplified by simulating it within two typical machine learning tasks: namely, a Variational Autoencoder that learns a latent representation of MNIST data, and an MNIST image classifier.
我们描述了一种逼近给定加密输入数据的任何有界激活函数的方法。我们的方法的实用性通过在两个典型的机器学习任务中模拟它来举例说明:即,学习MNIST数据的潜在表示的变分自编码器和MNIST图像分类器。
{"title":"Efficient Evaluation of Activation Functions over Encrypted Data","authors":"Patricia Thaine, S. Gorbunov, Gerald Penn","doi":"10.1109/SPW.2019.00022","DOIUrl":"https://doi.org/10.1109/SPW.2019.00022","url":null,"abstract":"We describe a method for approximating any bounded activation function given encrypted input data. The utility of our method is exemplified by simulating it within two typical machine learning tasks: namely, a Variational Autoencoder that learns a latent representation of MNIST data, and an MNIST image classifier.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114985326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error 智能家居编程接口对终端用户错误的易感性分析
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00034
Mitali Palekar, Earlence Fernandes, Franziska Roesner
Trigger-action platforms enable end-users to program their smart homes using simple conditional rules of the form: if "condition" then "action". Although these rules are easy to program, subtleties in their interpretation can cause users to make errors that have consequences ranging from incorrect and undesired functionality to security and privacy violations. Based on prior work, we enumerate a set of nine classes of errors that users can make, and we empirically study the relationship between these classes and the interface design of eight commercially available trigger-action platforms. Particularly, we examine whether each interface prevents (e.g., via good design) or allows each class of error. Based on this analysis, we develop a framework to classify errors and extract insights that lay a foundation for the design of future trigger-action programming interfaces where certain classes of errors can be mitigated by technical means or by alerting the user of the possibility of an error. For instance, we identify that an analysis of a dataset of functionally-similar trigger-action rules could be used to predict whether certain types of error patterns are about to occur.
触发操作平台使最终用户能够使用简单的条件规则来编程他们的智能家居:如果“条件”,那么“操作”。尽管这些规则很容易编程,但其解释的微妙之处可能会导致用户犯错误,从而导致从不正确和不希望的功能到违反安全和隐私的后果。基于先前的工作,我们列举了用户可能犯的九类错误,并实证研究了这些错误与八种商用触发器操作平台的界面设计之间的关系。特别是,我们检查每个接口是否防止(例如,通过良好的设计)或允许每一类错误。基于此分析,我们开发了一个框架来对错误进行分类并提取见解,为设计未来的触发-操作编程接口奠定基础,其中某些类型的错误可以通过技术手段或通过提醒用户错误的可能性来减轻。例如,我们确定对功能相似的触发-操作规则数据集的分析可用于预测某些类型的错误模式是否即将发生。
{"title":"Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error","authors":"Mitali Palekar, Earlence Fernandes, Franziska Roesner","doi":"10.1109/SPW.2019.00034","DOIUrl":"https://doi.org/10.1109/SPW.2019.00034","url":null,"abstract":"Trigger-action platforms enable end-users to program their smart homes using simple conditional rules of the form: if \"condition\" then \"action\". Although these rules are easy to program, subtleties in their interpretation can cause users to make errors that have consequences ranging from incorrect and undesired functionality to security and privacy violations. Based on prior work, we enumerate a set of nine classes of errors that users can make, and we empirically study the relationship between these classes and the interface design of eight commercially available trigger-action platforms. Particularly, we examine whether each interface prevents (e.g., via good design) or allows each class of error. Based on this analysis, we develop a framework to classify errors and extract insights that lay a foundation for the design of future trigger-action programming interfaces where certain classes of errors can be mitigated by technical means or by alerting the user of the possibility of an error. For instance, we identify that an analysis of a dataset of functionally-similar trigger-action rules could be used to predict whether certain types of error patterns are about to occur.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2019 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1