首页 > 最新文献

2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)最新文献

英文 中文
An Intelligent Behavior-Based Ransomware Detection System For Android Platform 基于智能行为的Android平台勒索软件检测系统
Abdulrahman Alzahrani, Hani Alshahrani, A. Alshehri, Huirong Fu
Malware variants exhibit polymorphic attacks due to the tremendous growth of the present technologies. For instance, ransomware, an astonishingly growing set of monetary-gain threats in the recent years, is peculiarized as one of the most treacherous cyberthreats against innocent individuals and businesses by locking their devices and/or encrypting their files. Many proposed attempts have been introduced by cybersecurity researchers aiming at mitigating the epidemic of the ransomware attacks. However, this type of malware is kept refined by utilizing new evasion techniques, such as sophisticated codes, dynamic payloads, and anti-emulation techniques, in order to survive against detection systems. This paper introduces RanDetector, a new automated and lightweight system for detecting ransomware applications in Android platform based on their behavior. In particular, this detection system investigates the appearance of some information that is related to ransomware operations in an inspected application before integrating some supervised machine learning models to classify the application. RanDetector is evaluated and tested on a dataset of more 450 applications, including benign and ransomware. Hence, RanDetector has successfully achieved more that 97.62% detection rate with nearly zero false positive.
由于当前技术的巨大增长,恶意软件变体表现出多态攻击。例如,勒索软件(ransomware)是近年来以获取金钱为目的的一种惊人增长的威胁,它被认为是针对无辜个人和企业的最危险的网络威胁之一,通过锁定他们的设备和/或加密他们的文件。网络安全研究人员提出了许多建议,旨在减轻勒索软件攻击的流行。然而,这种类型的恶意软件通过利用新的规避技术(如复杂的代码、动态有效载荷和反仿真技术)来保持改进,以便在检测系统中生存下来。本文介绍了一种基于Android平台上的勒索软件行为检测系统RanDetector。特别是,该检测系统在集成一些有监督的机器学习模型对应用程序进行分类之前,在被检查的应用程序中调查与勒索软件操作相关的一些信息的外观。RanDetector在超过450个应用程序的数据集上进行了评估和测试,包括良性和勒索软件。因此,RanDetector成功实现了97.62%以上的检测率,几乎为零误报。
{"title":"An Intelligent Behavior-Based Ransomware Detection System For Android Platform","authors":"Abdulrahman Alzahrani, Hani Alshahrani, A. Alshehri, Huirong Fu","doi":"10.1109/TPS-ISA48467.2019.00013","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00013","url":null,"abstract":"Malware variants exhibit polymorphic attacks due to the tremendous growth of the present technologies. For instance, ransomware, an astonishingly growing set of monetary-gain threats in the recent years, is peculiarized as one of the most treacherous cyberthreats against innocent individuals and businesses by locking their devices and/or encrypting their files. Many proposed attempts have been introduced by cybersecurity researchers aiming at mitigating the epidemic of the ransomware attacks. However, this type of malware is kept refined by utilizing new evasion techniques, such as sophisticated codes, dynamic payloads, and anti-emulation techniques, in order to survive against detection systems. This paper introduces RanDetector, a new automated and lightweight system for detecting ransomware applications in Android platform based on their behavior. In particular, this detection system investigates the appearance of some information that is related to ransomware operations in an inspected application before integrating some supervised machine learning models to classify the application. RanDetector is evaluated and tested on a dataset of more 450 applications, including benign and ransomware. Hence, RanDetector has successfully achieved more that 97.62% detection rate with nearly zero false positive.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Z Table: Cost-Optimized Attack on Reinforcement Learning Z表:强化学习的成本优化攻击
Ian Y. Garrett, Ryan M. Gerdes
Reinforcement learning techniques are increasingly utilized in cyber physical systems and traditional control systems, since they allow the controlling logic to learn through its interactions with its environment. However, reinforcement learning techniques have been found to be vulnerable to malicious influence, in the form of so-called adversarial examples, that can lead to, for example, destabilization of the system. In this paper, an optimization method is proposed to provide a directed attack towards a system resulting in destabilization. The attack differs from previous adversarial work against machine learning algorithms in that it focused on cyber physical systems and, in contrast to false-data injection or actuator attacks, assumed that an adversary is able to directly influence the state(s) of the system, to some degree. Furthermore, it is assumed that the system is controlled using a pre-learned optimal policy; i.e., the attack does not poison the learning process but rather leverages imperfections in the learned policy. This means the reinforcement learning algorithm can be vulnerable even while operating under an optimal policy. The optimization approach increases the feasibility of the attack by reducing the overall cost expended by the adversary. This paper describes the theory supporting the attack by proposing an algorithm and its corresponding proof. The attack is validated using OpenAI's gym and the physics simulator Mujoco to simulate the attack on a cyber physical system trained using a deep reinforcement learning method.
强化学习技术越来越多地应用于网络物理系统和传统控制系统,因为它们允许控制逻辑通过与环境的相互作用来学习。然而,强化学习技术已经被发现容易受到恶意影响,以所谓的对抗性示例的形式,这可能导致系统的不稳定。本文提出了一种针对导致不稳定的系统进行定向攻击的优化方法。这种攻击不同于以往针对机器学习算法的对抗性工作,因为它侧重于网络物理系统,与假数据注入或执行器攻击不同,它假设攻击者能够在一定程度上直接影响系统的状态。此外,假设系统使用预学习的最优策略进行控制;也就是说,攻击不会破坏学习过程,而是利用了学习策略中的不完善之处。这意味着即使在最优策略下运行,强化学习算法也可能是脆弱的。优化方法通过减少对手所花费的总成本来增加攻击的可行性。本文通过提出一种算法和相应的证明来描述支持这种攻击的理论。该攻击使用OpenAI的健身房和物理模拟器Mujoco进行验证,以模拟对使用深度强化学习方法训练的网络物理系统的攻击。
{"title":"Z Table: Cost-Optimized Attack on Reinforcement Learning","authors":"Ian Y. Garrett, Ryan M. Gerdes","doi":"10.1109/TPS-ISA48467.2019.00011","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00011","url":null,"abstract":"Reinforcement learning techniques are increasingly utilized in cyber physical systems and traditional control systems, since they allow the controlling logic to learn through its interactions with its environment. However, reinforcement learning techniques have been found to be vulnerable to malicious influence, in the form of so-called adversarial examples, that can lead to, for example, destabilization of the system. In this paper, an optimization method is proposed to provide a directed attack towards a system resulting in destabilization. The attack differs from previous adversarial work against machine learning algorithms in that it focused on cyber physical systems and, in contrast to false-data injection or actuator attacks, assumed that an adversary is able to directly influence the state(s) of the system, to some degree. Furthermore, it is assumed that the system is controlled using a pre-learned optimal policy; i.e., the attack does not poison the learning process but rather leverages imperfections in the learned policy. This means the reinforcement learning algorithm can be vulnerable even while operating under an optimal policy. The optimization approach increases the feasibility of the attack by reducing the overall cost expended by the adversary. This paper describes the theory supporting the attack by proposing an algorithm and its corresponding proof. The attack is validated using OpenAI's gym and the physics simulator Mujoco to simulate the attack on a cyber physical system trained using a deep reinforcement learning method.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based Study 用户接受可用的基于区块链的研究数据共享系统:一个扩展的基于tam的研究
A. Shrestha, Julita Vassileva
Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives for sharing and give users full transparency and control over who access their data, when and for what purpose. The initial adoption of such blockchain-based systems is necessary for continued use of the services, but their user acceptance behavioral model has not been well investigated in the literature. In this paper, we take the Technology Acceptance Model (TAM) as a foundation and extend the external constructs to uncover how the perceived ease of use, perceived usability, quality of the system and perceived enjoyment influence the intention to use the blockchain-based system. We based our study on user evaluation of a prototype of a blockchain-based research data sharing framework using a TAM validated questionnaire. Our results show that, overall, all the individual constructs of the behavior model significantly influence the intention to use the system while their collective effect is found to be insignificant. The quality of the system and the perceived enjoyment have stronger influence on the perceived usefulness. However, the effect of perceived ease of use on the perceived usefulness is not supported. Finally, we discuss the implications of our findings.
区块链技术已经发展成为一种有前途的手段,可以改变许多领域的数据管理模式,包括医疗保健、农业研究、旅游领域等。在研究社区中,一个可用的基于区块链的系统可以允许用户创建研究工作的所有权和来源证明,共享研究数据而不会失去对它的控制和所有权,为共享提供激励,并为用户提供完全透明和控制谁访问他们的数据,何时以及出于什么目的。最初采用这种基于区块链的系统对于继续使用这些服务是必要的,但它们的用户接受行为模型在文献中尚未得到很好的研究。在本文中,我们以技术接受模型(TAM)为基础,扩展外部结构,以揭示感知易用性、感知可用性、系统质量和感知享受如何影响使用基于区块链的系统的意图。我们的研究基于用户对基于区块链的研究数据共享框架原型的评估,使用TAM验证的问卷。我们的研究结果表明,总体而言,行为模型的所有个体构念显著影响系统使用意愿,而它们的集体效应不显著。系统质量和感知享受对感知有用性的影响更大。然而,感知易用性对感知有用性的影响并不被支持。最后,我们讨论了研究结果的含义。
{"title":"User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based Study","authors":"A. Shrestha, Julita Vassileva","doi":"10.1109/TPS-ISA48467.2019.00033","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00033","url":null,"abstract":"Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives for sharing and give users full transparency and control over who access their data, when and for what purpose. The initial adoption of such blockchain-based systems is necessary for continued use of the services, but their user acceptance behavioral model has not been well investigated in the literature. In this paper, we take the Technology Acceptance Model (TAM) as a foundation and extend the external constructs to uncover how the perceived ease of use, perceived usability, quality of the system and perceived enjoyment influence the intention to use the blockchain-based system. We based our study on user evaluation of a prototype of a blockchain-based research data sharing framework using a TAM validated questionnaire. Our results show that, overall, all the individual constructs of the behavior model significantly influence the intention to use the system while their collective effect is found to be insignificant. The quality of the system and the perceived enjoyment have stronger influence on the perceived usefulness. However, the effect of perceived ease of use on the perceived usefulness is not supported. Finally, we discuss the implications of our findings.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114939945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control 隐私保护、灵活和可扩展的基于角色的分层访问控制的设计与实现
Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, X. Zou
In many domains, organizations must model personnel and corresponding data access privileges as fine-grained hierarchical access control models. One class of such models, Role-based Access Control (RBAC) models, has been widely accepted and deployed. However, RBAC models are often used without involving cryptographic keys nor considering confidentiality/privacy at the data level. How to design, implement and dynamically modify such a hierarchy, ensure user and data privacy and distribute and manage necessary cryptographic keys are issues of the utmost importance. One elegant solution for cryptography-based hierarchical access control combines the collusion-resistant and privacy-preserving Access Control Polynomial (ACP) and Atallah's Dynamic and Efficient Extended Key Management scheme. Such a model involves cryptographic keys used to encrypt data, can address confidentiality/privacy at the data level and can efficiently support dynamic changes to the RBAC access hierarchy. In this paper, we discuss several implementation challenges and propose solutions when deploying such a system including: data encryption and decryption, key storage and key distribution. Furthermore, we provide analysis of the efficiency and scalability of the resulting system.
在许多领域中,组织必须将人员和相应的数据访问权限建模为细粒度分层访问控制模型。其中一类模型,基于角色的访问控制(RBAC)模型,已经被广泛接受和部署。然而,RBAC模型的使用通常不涉及加密密钥,也不考虑数据级别的机密性/隐私性。如何设计、实现和动态修改这样的层次结构,确保用户和数据的隐私,分发和管理必要的加密密钥是至关重要的问题。一种基于密码学的分层访问控制的优雅解决方案结合了抗合谋和保护隐私的访问控制多项式(ACP)和Atallah的动态高效扩展密钥管理方案。这种模型涉及用于加密数据的加密密钥,可以在数据级别解决机密性/隐私问题,并且可以有效地支持对RBAC访问层次结构的动态更改。在本文中,我们讨论了部署这样一个系统时的几个实现挑战并提出了解决方案,包括:数据加密和解密,密钥存储和密钥分发。此外,我们还对系统的效率和可扩展性进行了分析。
{"title":"Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control","authors":"Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, X. Zou","doi":"10.1109/TPS-ISA48467.2019.00015","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00015","url":null,"abstract":"In many domains, organizations must model personnel and corresponding data access privileges as fine-grained hierarchical access control models. One class of such models, Role-based Access Control (RBAC) models, has been widely accepted and deployed. However, RBAC models are often used without involving cryptographic keys nor considering confidentiality/privacy at the data level. How to design, implement and dynamically modify such a hierarchy, ensure user and data privacy and distribute and manage necessary cryptographic keys are issues of the utmost importance. One elegant solution for cryptography-based hierarchical access control combines the collusion-resistant and privacy-preserving Access Control Polynomial (ACP) and Atallah's Dynamic and Efficient Extended Key Management scheme. Such a model involves cryptographic keys used to encrypt data, can address confidentiality/privacy at the data level and can efficiently support dynamic changes to the RBAC access hierarchy. In this paper, we discuss several implementation challenges and propose solutions when deploying such a system including: data encryption and decryption, key storage and key distribution. Furthermore, we provide analysis of the efficiency and scalability of the resulting system.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ComplexIoT: Behavior-Based Trust For IoT Networks ComplexIoT:物联网网络基于行为的信任
Kyle Haefner, I. Ray
This work takes a novel approach to classifying the behavior of devices by exploiting the single-purpose nature of IoT devices and analyzing the complexity and variance of their network traffic. We develop a formalized measurement of complexity for IoT devices, and use this measurement to precisely tune an anomaly detection algorithm for each device. We postulate that IoT devices with low complexity lead to a high confidence in their behavioral model and have a correspondingly more precise decision boundary on their predicted behavior. Conversely, complex general purpose devices have lower confidence and a more generalized decision boundary. We show that there is a positive correlation to our complexity measure and the number of outliers found by an anomaly detection algorithm. By tuning this decision boundary based on device complexity we are able to build a behavioral framework for each device that reduces false positive outliers. Finally, we propose an architecture that can use this tuned behavioral model to rank each flow on the network and calculate a trust score ranking of all traffic to and from a device which allows the network to autonomously make access control decisions on a per-flow basis.
这项工作采用了一种新颖的方法,通过利用物联网设备的单一用途性质和分析其网络流量的复杂性和方差来对设备的行为进行分类。我们为物联网设备开发了一种形式化的复杂性测量方法,并使用该测量方法精确地调整每个设备的异常检测算法。我们假设低复杂性的物联网设备对其行为模型具有高置信度,并且对其预测行为具有相应的更精确的决策边界。相反,复杂的通用设备具有较低的置信度和更广义的决策边界。我们表明,通过异常检测算法发现的异常值数量与我们的复杂性度量呈正相关。通过根据设备复杂性调整这个决策边界,我们能够为每个设备构建一个行为框架,以减少误报异常值。最后,我们提出了一种架构,该架构可以使用这种调整的行为模型对网络上的每个流进行排名,并计算进出设备的所有流量的信任分数排名,从而允许网络在每个流的基础上自主做出访问控制决策。
{"title":"ComplexIoT: Behavior-Based Trust For IoT Networks","authors":"Kyle Haefner, I. Ray","doi":"10.1109/TPS-ISA48467.2019.00016","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00016","url":null,"abstract":"This work takes a novel approach to classifying the behavior of devices by exploiting the single-purpose nature of IoT devices and analyzing the complexity and variance of their network traffic. We develop a formalized measurement of complexity for IoT devices, and use this measurement to precisely tune an anomaly detection algorithm for each device. We postulate that IoT devices with low complexity lead to a high confidence in their behavioral model and have a correspondingly more precise decision boundary on their predicted behavior. Conversely, complex general purpose devices have lower confidence and a more generalized decision boundary. We show that there is a positive correlation to our complexity measure and the number of outliers found by an anomaly detection algorithm. By tuning this decision boundary based on device complexity we are able to build a behavioral framework for each device that reduces false positive outliers. Finally, we propose an architecture that can use this tuned behavioral model to rank each flow on the network and calculate a trust score ranking of all traffic to and from a device which allows the network to autonomously make access control decisions on a per-flow basis.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis and Nudging of Personally Identifiable Information in Online Used Markets 在线二手市场中个人身份信息的分析与推动
Hyunsu Mun, Youngseok Lee
In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime. In this work, we examine how PII elements are exposed at popular online used markets in Brazil, China and Korea. Regardless of country, platform, and PII protection system, PII are exposed. From 1-year data collection, we found that phone numbers and email addresses are frequently observed such that 69.43% of posts include phone numbers and 90.86% showed email addresses, and that 36.41% of PII lasted longer than 90 days with the slow PII decay rate of 0.03% per day in Korean used market. To protect the privacy of sellers exposed on the posts, we present a simple nudging web browser extension that detects and notifies PII elements.
在网络或移动应用在线二手市场中,用户往往会有意留下自己的私人联系方式,以便通过快速沟通来销售自己的商品。然而,用户上传的个人身份信息(PII)很容易受到不必要的广告、利用甚至犯罪的攻击。在这项工作中,我们研究了巴西、中国和韩国流行的在线二手市场中PII元素的暴露情况。无论国家、平台和PII保护系统如何,PII都是暴露的。从1年的数据收集中,我们发现电话号码和电子邮件地址经常被观察到,69.43%的帖子包含电话号码,90.86%的帖子显示电子邮件地址,36.41%的PII持续时间超过90天,韩国二手市场的PII衰减率为0.03% /天。为了保护暴露在帖子上的卖家的隐私,我们提供了一个简单的推动web浏览器扩展,可以检测并通知PII元素。
{"title":"Analysis and Nudging of Personally Identifiable Information in Online Used Markets","authors":"Hyunsu Mun, Youngseok Lee","doi":"10.1109/TPS-ISA48467.2019.00023","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00023","url":null,"abstract":"In web or mobile app online used markets, users often leave their private contact information intentionally to sell their goods through quick communication. However, the Personally identifiable information (PII) uploaded by users is vulnerable to unwanted advertisement, exploits or even crime. In this work, we examine how PII elements are exposed at popular online used markets in Brazil, China and Korea. Regardless of country, platform, and PII protection system, PII are exposed. From 1-year data collection, we found that phone numbers and email addresses are frequently observed such that 69.43% of posts include phone numbers and 90.86% showed email addresses, and that 36.41% of PII lasted longer than 90 days with the slow PII decay rate of 0.03% per day in Korean used market. To protect the privacy of sellers exposed on the posts, we present a simple nudging web browser extension that detects and notifies PII elements.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Queryable Dynamic Graphs using Blockchain 使用区块链的安全可查询动态图
Naila Bushra, Naresh Adhikari, M. Ramkumar
A graph is a non-linear data structure with nodes and edges for depicting relationships between nodes in a wide range of systems such as social networks, maps, dependency network, electronic circuits, etc. Graphs are often inputs to various computational processes such as those for finding shortest paths between nodes, minimum spanning tree, graph coloring, etc. Such algorithms are essential components of many large-scale information systems. Guaranteeing the integrity of responses to various graph queries (like shortest path, number of disjoint sets, etc.) becomes especially challenging for graphs with very large numbers of nodes and/or edges. The goal of the blockchain-based Secure Queryable Dynamic Graphs (SQDG) protocol is to assure the correctness of responses to various types of graph queries, irrespective of the scale of the graph, without the need to rely on trusted third parties.
图是一种具有节点和边的非线性数据结构,用于描述各种系统(如社交网络、地图、依赖网络、电子电路等)中节点之间的关系。图通常是各种计算过程的输入,例如寻找节点之间的最短路径,最小生成树,图着色等。这种算法是许多大型信息系统的基本组成部分。保证对各种图查询(如最短路径、不相交集的数量等)响应的完整性对于具有大量节点和/或边的图来说尤其具有挑战性。基于区块链的安全可查询动态图(SQDG)协议的目标是确保对各种类型的图查询的响应的正确性,而不考虑图的规模,而不需要依赖受信任的第三方。
{"title":"Secure Queryable Dynamic Graphs using Blockchain","authors":"Naila Bushra, Naresh Adhikari, M. Ramkumar","doi":"10.1109/TPS-ISA48467.2019.00027","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00027","url":null,"abstract":"A graph is a non-linear data structure with nodes and edges for depicting relationships between nodes in a wide range of systems such as social networks, maps, dependency network, electronic circuits, etc. Graphs are often inputs to various computational processes such as those for finding shortest paths between nodes, minimum spanning tree, graph coloring, etc. Such algorithms are essential components of many large-scale information systems. Guaranteeing the integrity of responses to various graph queries (like shortest path, number of disjoint sets, etc.) becomes especially challenging for graphs with very large numbers of nodes and/or edges. The goal of the blockchain-based Secure Queryable Dynamic Graphs (SQDG) protocol is to assure the correctness of responses to various types of graph queries, irrespective of the scale of the graph, without the need to rely on trusted third parties.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117303222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal Trust Diggi:一个安全的框架,以最小的信任托管本地云功能
A. Gjerdrum, H. Johansen, L. Brenna, D. Johansen
The emerging serverless cloud paradigm, also known as Function as a Service (FaaS), enables auto-scalable cloud services on-demand, but requires complete trust in the surrounding infrastructure. Workloads hosting sensitive data, such as medical records or financial transactions, may not be able to use such cloud services due to these trust assumptions. This paper introduces Diggi, a native secure FaaS runtime for scalable function deployment requiring minimal trust in the underlying hardware/software stack. We demonstrate that Diggi is practical and that it holds comparable performance to conventional FaaS software.
新兴的无服务器云范式,也称为功能即服务(FaaS),支持按需自动扩展的云服务,但需要完全信任周围的基础设施。由于这些信任假设,托管敏感数据(如医疗记录或金融交易)的工作负载可能无法使用此类云服务。本文介绍了Diggi,这是一个本地安全的FaaS运行时,用于可扩展的功能部署,对底层硬件/软件堆栈的信任要求最低。我们证明Diggi是实用的,并且它具有与传统FaaS软件相当的性能。
{"title":"Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal Trust","authors":"A. Gjerdrum, H. Johansen, L. Brenna, D. Johansen","doi":"10.1109/TPS-ISA48467.2019.00012","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00012","url":null,"abstract":"The emerging serverless cloud paradigm, also known as Function as a Service (FaaS), enables auto-scalable cloud services on-demand, but requires complete trust in the surrounding infrastructure. Workloads hosting sensitive data, such as medical records or financial transactions, may not be able to use such cloud services due to these trust assumptions. This paper introduces Diggi, a native secure FaaS runtime for scalable function deployment requiring minimal trust in the underlying hardware/software stack. We demonstrate that Diggi is practical and that it holds comparable performance to conventional FaaS software.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134561416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Title Page I 第一页
{"title":"Title Page I","authors":"","doi":"10.1109/tps-isa48467.2019.00001","DOIUrl":"https://doi.org/10.1109/tps-isa48467.2019.00001","url":null,"abstract":"","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114565725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disincentivizing Double Spend Attacks Across Interoperable Blockchains 在可互操作的区块链上抑制双花攻击
Kuheli Sai, D. Tipper
Blockchain was originally developed to support decentralized cryptocurrency applications within a single network. However, the proliferation of blockchain technology has led to the need of supporting transactions across multiple networks requiring interoperability. Thus far, minimal analysis has been dedicated to the interoperability scenario and in particular the prevention of double-spending attacks across interoperable blockchain networks. In this paper, we propose the use of neutral observers to monitor transactions that span multiple blockchains and design a protocol that obviates the double-spending problem across interoperable blockchain networks. We show that the observers, can detect double spending, while remaining honest to the protocol as it is more profitable to them than colluding due to our proposed disincentivization scheme. Leveraging Ethereum's smart-contract functionality, we simulate our proposed disincentivization scheme and show its cost-effectiveness.
区块链最初是为了在单个网络中支持分散的加密货币应用而开发的。然而,区块链技术的扩散导致需要支持跨多个需要互操作性的网络的交易。到目前为止,对互操作性场景的分析很少,特别是在可互操作的区块链网络上防止双重支出攻击。在本文中,我们建议使用中立观察者来监控跨多个区块链的交易,并设计一个协议来避免跨可互操作的区块链网络的双重支出问题。我们表明,观察者可以检测到双重支出,同时对协议保持诚实,因为由于我们提出的抑制方案,这对他们来说比串通更有利可图。利用以太坊的智能合约功能,我们模拟了我们提出的非激励方案,并展示了其成本效益。
{"title":"Disincentivizing Double Spend Attacks Across Interoperable Blockchains","authors":"Kuheli Sai, D. Tipper","doi":"10.1109/TPS-ISA48467.2019.00014","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00014","url":null,"abstract":"Blockchain was originally developed to support decentralized cryptocurrency applications within a single network. However, the proliferation of blockchain technology has led to the need of supporting transactions across multiple networks requiring interoperability. Thus far, minimal analysis has been dedicated to the interoperability scenario and in particular the prevention of double-spending attacks across interoperable blockchain networks. In this paper, we propose the use of neutral observers to monitor transactions that span multiple blockchains and design a protocol that obviates the double-spending problem across interoperable blockchain networks. We show that the observers, can detect double spending, while remaining honest to the protocol as it is more profitable to them than colluding due to our proposed disincentivization scheme. Leveraging Ethereum's smart-contract functionality, we simulate our proposed disincentivization scheme and show its cost-effectiveness.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1