首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis 我仍然知道你去年夏天做了什么:通过流量分析推断消息应用程序上的敏感用户活动
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3218191
Ardavan Bozorgi, Alireza Bahramali, Fateme Rezaei, Amirhossein Ghafari, A. Houmansadr, Ramin Soltani, D. Goeckel, D. Towsley
Instant Messaging (IM) applications such as Signal, Telegram, and WhatsApp have become tremendously popular in recent years. Unfortunately, such IM services have been targets of governmental surveillance and censorship, as these services are home to public and private communications on socially and politically sensitive topics. To protect their clients, popular IM services deploy state-of-the-art encryption. Despite the use of advanced encryption, we show that popular IM applications leak sensitive information about their clients to adversaries merely monitoring their encrypted IM traffic, with no need for leveraging any software vulnerabilities of IM applications. Specifically, we devise traffic analysis attacks enabling an adversary to identify participants of target IM communications (e.g., forums) with high accuracies. We believe that our study demonstrates a significant, real-world threat to the users of such services. We demonstrate the practicality of our attacks through extensive experiments on real-world IM communications. We show that standard countermeasure techniques can degrade the effectiveness of these attacks. We hope our study will encourage IM providers to integrate effective traffic obfuscation into their software. In the meantime, we have designed a countermeasure system, called IMProxy that can be used by IM clients with no need for any support from IM providers. We demonstrate the effectiveness of IMProxy through simulation and experiments.
近年来,Signal、Telegram和WhatsApp等即时消息应用程序变得非常流行。不幸的是,此类即时通讯服务一直是政府监控和审查的目标,因为这些服务是关于社会和政治敏感话题的公共和私人通信的家园。为了保护客户,流行的IM服务部署了最先进的加密技术。尽管使用了高级加密,但我们发现,流行的IM应用程序只需监控其加密的IM流量,就可以将有关其客户端的敏感信息泄露给对手,而无需利用IM应用程序的任何软件漏洞。具体而言,我们设计了流量分析攻击,使对手能够高精度地识别目标IM通信(如论坛)的参与者。我们认为,我们的研究表明,这类服务的用户在现实世界中面临着重大威胁。我们通过对真实世界IM通信的大量实验来证明我们的攻击的实用性。我们表明,标准的对抗技术会降低这些攻击的有效性。我们希望我们的研究将鼓励IM提供商将有效的流量模糊技术集成到他们的软件中。与此同时,我们设计了一个名为IMProxy的对抗系统,IM客户端可以使用该系统,而不需要IM提供商的任何支持。我们通过仿真和实验证明了IMProxy的有效性。
{"title":"I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis","authors":"Ardavan Bozorgi, Alireza Bahramali, Fateme Rezaei, Amirhossein Ghafari, A. Houmansadr, Ramin Soltani, D. Goeckel, D. Towsley","doi":"10.1109/TDSC.2022.3218191","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3218191","url":null,"abstract":"Instant Messaging (IM) applications such as Signal, Telegram, and WhatsApp have become tremendously popular in recent years. Unfortunately, such IM services have been targets of governmental surveillance and censorship, as these services are home to public and private communications on socially and politically sensitive topics. To protect their clients, popular IM services deploy state-of-the-art encryption. Despite the use of advanced encryption, we show that popular IM applications leak sensitive information about their clients to adversaries merely monitoring their encrypted IM traffic, with no need for leveraging any software vulnerabilities of IM applications. Specifically, we devise traffic analysis attacks enabling an adversary to identify participants of target IM communications (e.g., forums) with high accuracies. We believe that our study demonstrates a significant, real-world threat to the users of such services. We demonstrate the practicality of our attacks through extensive experiments on real-world IM communications. We show that standard countermeasure techniques can degrade the effectiveness of these attacks. We hope our study will encourage IM providers to integrate effective traffic obfuscation into their software. In the meantime, we have designed a countermeasure system, called IMProxy that can be used by IM clients with no need for any support from IM providers. We demonstrate the effectiveness of IMProxy through simulation and experiments.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4135-4153"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49582604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Privacy of Counting Bloom Filters Under a Black-Box Attacker 黑盒攻击下Bloom滤波器计数的保密性
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3217115
Sergio Galan, P. Reviriego, Stefan Walzer, A. Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi
Counting Bloom Filters (CBFs) are approximate membership checking data structures, and it is normally believed that at most an approximate reconstruction of the underlying set can be derived when interacting with a CBF. This paper decisively refutes this assumption. In a recent paper, we considered the privacy of CBFs when the attacker has access to the implementation details and thus, it sees the filter as a white-box. In that setting, we showed that the attacker may be able to extract the elements stored in the filter when the number of false positives over the entire universe is not significantly larger than the number of elements stored in the filter. In this work, we consider a black-box attacker that can only perform user interactions on the CBF to insert, remove and query elements with no knowledge of the filter implementation details. We show that even in this case, an attacker may be able to extract information from the filter at the cost of using more complex and time-consuming attack algorithms. The proposed algorithms have been implemented and compared with the white-box attack, showing that in most cases, almost the same information can be extracted from the filter.
计数布隆过滤器(CBF)是近似成员身份检查数据结构,通常认为,当与CBF交互时,最多可以导出底层集合的近似重建。本文果断地驳斥了这一假设。在最近的一篇论文中,当攻击者可以访问实现细节时,我们考虑了CBF的隐私,因此,它将过滤器视为白盒。在该设置中,我们表明,当整个宇宙中的假阳性数量不显著大于过滤器中存储的元素数量时,攻击者可能能够提取过滤器中保存的元素。在这项工作中,我们考虑了一个黑匣子攻击者,它只能在CBF上执行用户交互,以插入、删除和查询元素,而不知道过滤器的实现细节。我们表明,即使在这种情况下,攻击者也可能以使用更复杂、更耗时的攻击算法为代价,从过滤器中提取信息。所提出的算法已经实现,并与白盒攻击进行了比较,表明在大多数情况下,可以从滤波器中提取几乎相同的信息。
{"title":"On the Privacy of Counting Bloom Filters Under a Black-Box Attacker","authors":"Sergio Galan, P. Reviriego, Stefan Walzer, A. Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi","doi":"10.1109/TDSC.2022.3217115","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3217115","url":null,"abstract":"Counting Bloom Filters (CBFs) are approximate membership checking data structures, and it is normally believed that at most an approximate reconstruction of the underlying set can be derived when interacting with a CBF. This paper decisively refutes this assumption. In a recent paper, we considered the privacy of CBFs when the attacker has access to the implementation details and thus, it sees the filter as a white-box. In that setting, we showed that the attacker may be able to extract the elements stored in the filter when the number of false positives over the entire universe is not significantly larger than the number of elements stored in the filter. In this work, we consider a black-box attacker that can only perform user interactions on the CBF to insert, remove and query elements with no knowledge of the filter implementation details. We show that even in this case, an attacker may be able to extract information from the filter at the cost of using more complex and time-consuming attack algorithms. The proposed algorithms have been implemented and compared with the white-box attack, showing that in most cases, almost the same information can be extracted from the filter.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4434-4440"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42420610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds 基于差分流形的攻击伤害计算新方法
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3214809
Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan
Calculating system damage caused by a cyberattack can help in understanding the impact and destructiveness of the attack to discover system security weaknesses. Thus, system damage calculations is important in the process of network offense–defense confrontation. However, there is little research on attack damage calculation. Current methods are unable to quantitatively evaluate the impact of an attack in a rational and accurate way. The lack of theoretical support and the complexity of both cyber systems and attacks bring tremendous challenges to attack damage calculations. In this paper, we propose a novel method called ADCaDeM to enable quantitative attack damage calculation based on a differential manifold. The damage is a negative utility produced by attack behaviors on an attacked object, which can be characterized and expressed by its attributes. We formally map the attack behaviors into a space constructed by the attributes of the attacked object in a mathematical way. Then, we propose an algorithm to construct these attributes as a differential manifold to represent their algebraic topological structure. According to the theory of tangent vectors and geodesics on the differential manifold, we can calculate attack behavioral utility in a physical way, such as computing the work done in physics. Regardless of the complexity of the dimensional structure of the attributes, the differential manifold structure can reasonably represent and calculate the damage caused by an attack. We simulate a data theft attack and a web penetration attack to test the performance of ADCaDeM and compare it with existing methods. Our experimental results illustrate ADCaDeM's advance in terms of rationality for calculating the damage caused by some typical cyberattacks.
计算网络攻击造成的系统损坏有助于了解攻击的影响和破坏性,以发现系统安全弱点。因此,系统损伤计算在网络攻防对抗过程中具有重要意义。然而,关于攻击伤害计算的研究却很少。目前的方法无法以合理和准确的方式定量评估袭击的影响。网络系统和攻击的理论支持不足和复杂性给攻击损伤计算带来了巨大挑战。在本文中,我们提出了一种称为ADCaDeM的新方法,以实现基于微分流形的定量攻击损伤计算。损伤是被攻击对象的攻击行为所产生的一种负效用,可以用其属性来表征和表达。我们以数学的方式将攻击行为正式映射到由被攻击对象的属性构建的空间中。然后,我们提出了一种算法,将这些属性构造为微分流形,以表示它们的代数拓扑结构。根据微分流形上的切向量和测地线理论,我们可以用物理的方式计算攻击行为效用,例如计算物理中所做的工作。无论属性的维度结构多么复杂,微分流形结构都可以合理地表示和计算攻击造成的损伤。我们模拟了一次数据盗窃攻击和一次网络渗透攻击,以测试ADCaDeM的性能,并将其与现有方法进行比较。我们的实验结果说明了ADCaDeM在计算一些典型网络攻击造成的损害方面的合理性。
{"title":"ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds","authors":"Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan","doi":"10.1109/TDSC.2022.3214809","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3214809","url":null,"abstract":"Calculating system damage caused by a cyberattack can help in understanding the impact and destructiveness of the attack to discover system security weaknesses. Thus, system damage calculations is important in the process of network offense–defense confrontation. However, there is little research on attack damage calculation. Current methods are unable to quantitatively evaluate the impact of an attack in a rational and accurate way. The lack of theoretical support and the complexity of both cyber systems and attacks bring tremendous challenges to attack damage calculations. In this paper, we propose a novel method called ADCaDeM to enable quantitative attack damage calculation based on a differential manifold. The damage is a negative utility produced by attack behaviors on an attacked object, which can be characterized and expressed by its attributes. We formally map the attack behaviors into a space constructed by the attributes of the attacked object in a mathematical way. Then, we propose an algorithm to construct these attributes as a differential manifold to represent their algebraic topological structure. According to the theory of tangent vectors and geodesics on the differential manifold, we can calculate attack behavioral utility in a physical way, such as computing the work done in physics. Regardless of the complexity of the dimensional structure of the attributes, the differential manifold structure can reasonably represent and calculate the damage caused by an attack. We simulate a data theft attack and a web penetration attack to test the performance of ADCaDeM and compare it with existing methods. Our experimental results illustrate ADCaDeM's advance in terms of rationality for calculating the damage caused by some typical cyberattacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4070-4084"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44755518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Privacy-Preserving State Estimation Scheme for Smart Grids 一种智能电网的隐私保护状态估计方案
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3210017
Hong-Yen Tran, Jiankun Hu, H. Pota
With the appearance of electric energy market deregulation, there exists a growing concern over the potential privacy leakage of commercial data among competing power companies where data sharing is essential in the applications such as smart grid state estimation. Most of the existing solutions are either perturbation-based or conventional cryptography-based where a trusted central 3rd party would often be required. This article proposes privacy-preserving state estimation protocols for DC and AC models. The proposed idea is to distribute the overall task of the system state estimation into sub-tasks which can be performed by local sub-grid operators with their private data. A masking method is designed inside a homomorphic encryption scheme which is then used to ensure both the input and output data privacy during the collaboration process among individual sub-task players. Security is achieved via the computationally indistinguishable post-quantum security guaranteed by a levelled homomorphic encryption scheme over real numbers and the differential privacy of the output estimated states provided by the Laplace mechanism perturbation integrated into the masking linear transformation. Simulation results are presented to demonstrate the validity of our proposed privacy-preserving system state estimation protocols.
随着电力市场放松管制的出现,在智能电网状态估计等应用中,数据共享是必不可少的,竞争电力公司之间商业数据隐私泄露问题日益受到关注。大多数现有的解决方案要么是基于扰动的,要么是基于传统加密的,通常需要一个可信的中央第三方。本文提出了DC和AC模型的隐私保护状态估计协议。该思想是将系统状态估计的整体任务分配到子任务中,这些子任务可以由局部子网格运营商使用其私有数据执行。在同态加密方案中设计了一种掩蔽方法,用于保证各个子任务参与者之间协作过程中输入和输出数据的隐私性。安全性是通过实数上的水平同态加密方案保证的计算上不可区分的后量子安全性和集成到掩蔽线性变换中的拉普拉斯机制摄动提供的输出估计状态的微分隐私性来实现的。仿真结果验证了所提出的隐私保护系统状态估计协议的有效性。
{"title":"A Privacy-Preserving State Estimation Scheme for Smart Grids","authors":"Hong-Yen Tran, Jiankun Hu, H. Pota","doi":"10.1109/TDSC.2022.3210017","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3210017","url":null,"abstract":"With the appearance of electric energy market deregulation, there exists a growing concern over the potential privacy leakage of commercial data among competing power companies where data sharing is essential in the applications such as smart grid state estimation. Most of the existing solutions are either perturbation-based or conventional cryptography-based where a trusted central 3rd party would often be required. This article proposes privacy-preserving state estimation protocols for DC and AC models. The proposed idea is to distribute the overall task of the system state estimation into sub-tasks which can be performed by local sub-grid operators with their private data. A masking method is designed inside a homomorphic encryption scheme which is then used to ensure both the input and output data privacy during the collaboration process among individual sub-task players. Security is achieved via the computationally indistinguishable post-quantum security guaranteed by a levelled homomorphic encryption scheme over real numbers and the differential privacy of the output estimated states provided by the Laplace mechanism perturbation integrated into the masking linear transformation. Simulation results are presented to demonstrate the validity of our proposed privacy-preserving system state estimation protocols.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3940-3956"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43459859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SlimBox: Lightweight Packet Inspection over Encrypted Traffic SlimBox:对加密流量进行轻量级数据包检测
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3222533
Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang
Due to the explosive increase of enterprise network traffic, middleboxes that inspect packets through customized rules have been widely outsourced for cost-saving. Despite promising, redirecting enterprise traffic to remote middleboxes raises privacy concerns about the exposure of corporate secrets. To address this, existing solutions mainly apply searchable encryption (SE) to encrypt traffic and rules, enabling middlebox to perform pattern matching over ciphertexts without learning any sensitive information. However, SE is designed for searching pre-chosen keywords, and may cause extensive costs when applied directly to inspecting traffic in which the keywords cannot be determined in advance. The inefficiency of existing SE-based approaches motivates us to investigate a privacy-preserving and lightweight middlebox. To this end, this paper designs $mathsf{SlimBox}$SlimBox, which rapidly screens out potentially malicious packets in constant time while incurring only moderate communication overhead. Our main idea is to fragment a traffic/rule string into sub-patterns to achieve conjunctive sub-pattern matching over ciphertexts, while incorporating the position information into the secure matching process to avoid false positives. Experiment results on real datasets show that $mathsf{SlimBox}$SlimBox can achieve a good tradeoff between matching latency and communication cost compared to prior work.
随着企业网络流量的爆炸式增长,通过自定义规则检测报文的中间件被广泛外包,以节省成本。尽管前景看好,但将企业流量重定向到远程中间件会引发对企业机密暴露的隐私担忧。为了解决这个问题,现有的解决方案主要应用可搜索加密(SE)来加密流量和规则,使middlebox能够在不学习任何敏感信息的情况下对密文执行模式匹配。但是,SE是为搜索预先选择的关键字而设计的,如果直接应用到无法提前确定关键字的流量检测中,可能会造成很大的成本。现有的基于se的方法效率低下,这促使我们研究一种保护隐私和轻量级的中间盒。为此,本文设计了$mathsf{SlimBox}$SlimBox,它在恒定时间内快速筛选出潜在的恶意数据包,同时只产生适度的通信开销。我们的主要思想是将流量/规则字符串分割成子模式,以实现密文上的联合子模式匹配,同时将位置信息纳入安全匹配过程,以避免误报。在真实数据集上的实验结果表明,与之前的工作相比,$mathsf{SlimBox}$SlimBox可以很好地平衡匹配延迟和通信成本。
{"title":"SlimBox: Lightweight Packet Inspection over Encrypted Traffic","authors":"Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang","doi":"10.1109/TDSC.2022.3222533","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3222533","url":null,"abstract":"Due to the explosive increase of enterprise network traffic, middleboxes that inspect packets through customized rules have been widely outsourced for cost-saving. Despite promising, redirecting enterprise traffic to remote middleboxes raises privacy concerns about the exposure of corporate secrets. To address this, existing solutions mainly apply searchable encryption (SE) to encrypt traffic and rules, enabling middlebox to perform pattern matching over ciphertexts without learning any sensitive information. However, SE is designed for searching pre-chosen keywords, and may cause extensive costs when applied directly to inspecting traffic in which the keywords cannot be determined in advance. The inefficiency of existing SE-based approaches motivates us to investigate a privacy-preserving and lightweight middlebox. To this end, this paper designs <inline-formula><tex-math notation=\"LaTeX\">$mathsf{SlimBox}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">SlimBox</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq1-3222533.gif\"/></alternatives></inline-formula>, which rapidly screens out potentially malicious packets in constant time while incurring only moderate communication overhead. Our main idea is to fragment a traffic/rule string into sub-patterns to achieve conjunctive sub-pattern matching over ciphertexts, while incorporating the position information into the secure matching process to avoid false positives. Experiment results on real datasets show that <inline-formula><tex-math notation=\"LaTeX\">$mathsf{SlimBox}$</tex-math><alternatives><mml:math><mml:mi mathvariant=\"sans-serif\">SlimBox</mml:mi></mml:math><inline-graphic xlink:href=\"wang-ieq2-3222533.gif\"/></alternatives></inline-formula> can achieve a good tradeoff between matching latency and communication cost compared to prior work.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4359-4371"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46995993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses 隐式锤子:通过隐式访问跨越特权边界的Rowhammer
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3214666
Zhi-Li Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yuexian Zou
Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to hammer rows can induce bit flips in neighboring victim rows. Rowhammer attacks have enabled privilege escalation, sandbox escape, cryptographic key disclosures, etc. A key requirement of all existing rowhammer attacks is that an attacker must have access to at least part of an exploitable hammer row. We term such rowhammer attacks as Explicit Hammer. Recently, several proposals leverage the spatial proximity between the accessed hammer rows and the location of the victim rows for a defense against rowhammer. These all aim to deny the attacker's permission to access hammer rows near sensitive data, thus defeating explicit hammer-based attacks. In this paper, we question the core assumption underlying these defenses. We present Implicit Hammer, a confused-deputy attack that causes accesses to hammer rows that the attacker is not allowed to access. It is a paradigm shift in rowhammer attacks since it crosses privilege boundary to stealthily rowhammer an inaccessible row by implicit DRAM accesses. Such accesses are achieved by abusing inherent features of modern hardware and/or software. We propose a generic model to rigorously formalize the necessary conditions to initiate implicit hammer and explicit hammer, respectively. Compared to explicit hammer, implicit hammer can defeat the advanced software-only defenses, stealthy in hiding itself and hard to be mitigated. To demonstrate the practicality of implicit hammer, we have created two implicit hammer's instances, called PThammer and SyscallHammer.
Rowhammer是DRAM内存中的一个硬件漏洞,重复访问hammer行会导致相邻受害者行中的位翻转。Rowhammer攻击启用了权限提升、沙箱转义、加密密钥披露等。所有现有Rowhammer袭击的一个关键要求是,攻击者必须至少能够访问可利用的hammer行的一部分。我们将这种赛艇锤攻击称为显性锤。最近,一些提案利用进入的锤子排和受害者排的位置之间的空间接近性来防御赛艇锤。这些都旨在拒绝攻击者访问敏感数据附近的hammer行的权限,从而击败基于显式hammer的攻击。在本文中,我们对这些防御的核心假设提出了质疑。我们提出了隐式Hammer,这是一种混乱的副攻击,它会导致攻击者访问不允许访问的Hammer行。这是rowhammer攻击的一个范式转变,因为它跨越特权边界,通过隐式DRAM访问悄悄地rowhammer一个不可访问的行。这种访问是通过滥用现代硬件和/或软件的固有特征来实现的。我们提出了一个通用模型来严格形式化分别启动隐式锤和显式锤的必要条件。与显式锤子相比,隐式锤子可以击败先进的纯软件防御,隐蔽性强,难以缓解。为了证明隐锤的实用性,我们创建了两个隐锤实例,分别称为PThammer和SyscallHammer。
{"title":"Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses","authors":"Zhi-Li Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yuexian Zou","doi":"10.1109/TDSC.2022.3214666","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3214666","url":null,"abstract":"Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to hammer rows can induce bit flips in neighboring victim rows. Rowhammer attacks have enabled privilege escalation, sandbox escape, cryptographic key disclosures, etc. A key requirement of all existing rowhammer attacks is that an attacker must have access to at least part of an exploitable hammer row. We term such rowhammer attacks as Explicit Hammer. Recently, several proposals leverage the spatial proximity between the accessed hammer rows and the location of the victim rows for a defense against rowhammer. These all aim to deny the attacker's permission to access hammer rows near sensitive data, thus defeating explicit hammer-based attacks. In this paper, we question the core assumption underlying these defenses. We present Implicit Hammer, a confused-deputy attack that causes accesses to hammer rows that the attacker is not allowed to access. It is a paradigm shift in rowhammer attacks since it crosses privilege boundary to stealthily rowhammer an inaccessible row by implicit DRAM accesses. Such accesses are achieved by abusing inherent features of modern hardware and/or software. We propose a generic model to rigorously formalize the necessary conditions to initiate implicit hammer and explicit hammer, respectively. Compared to explicit hammer, implicit hammer can defeat the advanced software-only defenses, stealthy in hiding itself and hard to be mitigated. To demonstrate the practicality of implicit hammer, we have created two implicit hammer's instances, called PThammer and SyscallHammer.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3716-3733"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47050844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning 为安全联合学习建立互信的多Shuffler框架
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3215574
Zan Zhou, Changqiao Xu, Mingze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu
Albeit the popularity of federated learning (FL), recently emerging model-inversion and poisoning attacks arouse extensive concerns towards privacy or model integrity, which catalyzes the developments of secure federated learning (SFL) methods. Nonetheless, the collisions between its privacy and integrity, two equally crucial elements in collaborative learning scenarios, are relatively underexplored. Individuals’ wish to “hide in the crowd” for privacy frequently clashes with aggregators’ need to resist abnormal participants for integrity (i.e., the incompatibility between Byzantine robustness and differential privacy). The dilemma prompts researchers to reflect on how to build mutual confidence between individuals and aggregators. Against the backdrop, this paper proposes a multi-shuffler secure federated learning (MSFL) framework, based on which we further propound three modules (hierarchical shuffling mechanism, malice evaluation module, and composite defense strategy) to jointly guarantee strong privacy protection, efficient poisoning resistance, and agile adversary elimination. Extensive experiments on standard datasets exhibited the method's effectiveness in thwarting different FL poisoning attack paradigms with a minimal cost of privacy breaches.
尽管联邦学习(FL)很受欢迎,但最近出现的模型反转和中毒攻击引起了人们对隐私或模型完整性的广泛关注,这催化了安全联邦学习(SFL)方法的发展。尽管如此,它的隐私和完整性这两个在协作学习场景中同样重要的元素之间的冲突却相对未被充分挖掘。个人为了隐私而“躲在人群中”的愿望经常与聚合器为了完整性而抵制异常参与者的需求相冲突(即拜占庭稳健性和差异隐私之间的不兼容性)。这种困境促使研究人员反思如何在个人和聚合者之间建立相互信任。在此背景下,本文提出了一种多洗牌安全联合学习(MSFL)框架,在此基础上,我们进一步提出了三个模块(分层洗牌机制、恶意评估模块和复合防御策略),共同保证强大的隐私保护、高效的防毒和敏捷的对手消除。在标准数据集上进行的大量实验表明,该方法在以最低的隐私泄露成本挫败不同FL中毒攻击模式方面是有效的。
{"title":"A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning","authors":"Zan Zhou, Changqiao Xu, Mingze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu","doi":"10.1109/TDSC.2022.3215574","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3215574","url":null,"abstract":"Albeit the popularity of federated learning (FL), recently emerging model-inversion and poisoning attacks arouse extensive concerns towards privacy or model integrity, which catalyzes the developments of secure federated learning (SFL) methods. Nonetheless, the collisions between its privacy and integrity, two equally crucial elements in collaborative learning scenarios, are relatively underexplored. Individuals’ wish to “hide in the crowd” for privacy frequently clashes with aggregators’ need to resist abnormal participants for integrity (i.e., the incompatibility between Byzantine robustness and differential privacy). The dilemma prompts researchers to reflect on how to build mutual confidence between individuals and aggregators. Against the backdrop, this paper proposes a multi-shuffler secure federated learning (MSFL) framework, based on which we further propound three modules (hierarchical shuffling mechanism, malice evaluation module, and composite defense strategy) to jointly guarantee strong privacy protection, efficient poisoning resistance, and agile adversary elimination. Extensive experiments on standard datasets exhibited the method's effectiveness in thwarting different FL poisoning attack paradigms with a minimal cost of privacy breaches.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4230-4244"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41998702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data 基于加密数据的高效隐私空间关键词相似性查询
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3227141
Songnian Zhang, S. Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
As a popular and practical query type in location-based services, the spatial keyword query has been extensively studied in both academia and industry. Meanwhile, with the growing demand for data privacy, many privacy-preserving spatial keyword query schemes have been proposed to deal with queries over encrypted data. However, none of the existing schemes preserve access pattern privacy, and the recent research illustrates that leaking such privacy may incur inference attacks and thus disclose sensitive information. In addition, most existing schemes only consider the boolean keyword search, which is not quite practical and flexible in real-world applications. To address the above issues, in this paper, we propose two privacy-preserving spatial keyword similarity query schemes that can preserve full and partial access pattern privacy, respectively. First, we present a basic privacy-preserving spatial keyword similarity query scheme (PPSKS) by integrating a secure set membership test (SSMT) technique with secure circuits. After that, to improve performance, we propose a tree-based scheme (PPSKS+) by employing a new index called FR-tree together with a predicate encryption technique that can encrypt FR-tree. Formal security analysis shows that: i) our proposed schemes can protect outsourced data, query requests, and query results; ii) our PPSKS scheme can hide full access patterns, while the PPSKS+ scheme preserves $m$m-access pattern privacy. Extensive experiments are also conducted, and the results indicate that our tree-based PPSKS+ scheme is much more efficient, almost two orders of magnitude better than our linear search PPSKS scheme in performing queries.
空间关键字查询作为位置服务中较为流行和实用的查询类型,在学术界和业界都得到了广泛的研究。同时,随着数据隐私需求的不断增长,人们提出了许多保护隐私的空间关键字查询方案来处理对加密数据的查询。然而,现有的方案都没有保护访问模式的隐私,最近的研究表明,泄露这种隐私可能会引起推理攻击,从而泄露敏感信息。此外,大多数现有方案只考虑布尔关键字搜索,这在实际应用中不太实用和灵活。针对上述问题,本文提出了两种保护隐私的空间关键字相似度查询方案,分别保护了完全访问模式和部分访问模式的隐私。首先,将安全集隶属度检验(SSMT)技术与安全电路相结合,提出了一种基本的空间关键字相似度查询方案(PPSKS)。然后,为了提高性能,我们提出了一种基于树的方案(PPSKS+),该方案采用一种称为FR-tree的新索引和一种可以对FR-tree进行加密的谓词加密技术。正式的安全性分析表明:i)我们提出的方案可以保护外包数据、查询请求和查询结果;ii)我们的PPSKS方案可以隐藏完整的访问模式,而PPSKS+方案保留了$m$m访问模式的隐私。大量的实验结果表明,基于树的PPSKS+方案在执行查询方面比线性搜索的PPSKS方案效率高得多,几乎高出两个数量级。
{"title":"Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data","authors":"Songnian Zhang, S. Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao","doi":"10.1109/TDSC.2022.3227141","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3227141","url":null,"abstract":"As a popular and practical query type in location-based services, the spatial keyword query has been extensively studied in both academia and industry. Meanwhile, with the growing demand for data privacy, many privacy-preserving spatial keyword query schemes have been proposed to deal with queries over encrypted data. However, none of the existing schemes preserve access pattern privacy, and the recent research illustrates that leaking such privacy may incur inference attacks and thus disclose sensitive information. In addition, most existing schemes only consider the boolean keyword search, which is not quite practical and flexible in real-world applications. To address the above issues, in this paper, we propose two privacy-preserving spatial keyword similarity query schemes that can preserve full and partial access pattern privacy, respectively. First, we present a basic privacy-preserving spatial keyword similarity query scheme (PPSKS) by integrating a secure set membership test (SSMT) technique with secure circuits. After that, to improve performance, we propose a tree-based scheme (PPSKS+) by employing a new index called FR-tree together with a predicate encryption technique that can encrypt FR-tree. Formal security analysis shows that: i) our proposed schemes can protect outsourced data, query requests, and query results; ii) our PPSKS scheme can hide full access patterns, while the PPSKS+ scheme preserves <inline-formula><tex-math notation=\"LaTeX\">$m$</tex-math><alternatives><mml:math><mml:mi>m</mml:mi></mml:math><inline-graphic xlink:href=\"lu-ieq1-3227141.gif\"/></alternatives></inline-formula>-access pattern privacy. Extensive experiments are also conducted, and the results indicate that our tree-based PPSKS+ scheme is much more efficient, almost two orders of magnitude better than our linear search PPSKS scheme in performing queries.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3770-3786"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48767861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities 多领域实体协同防御的网络威胁情报共享
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3214423
Soumya Purohit, R. Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, P. Calyam
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, Cryptojacking which threaten service availability. Recently, methods for threat information sharing and defense require cooperation and trust between multiple domains/entities. There is a need for mechanisms that establish distributed trust to allow for such a collective defense. In this paper, we present a novel threat intelligence sharing and defense system, namely “DefenseChain,” to allow organizations to have incentive-based and trustworthy cooperation to mitigate the impact of cyber attacks. Our solution approach features a consortium Blockchain platform and an economic model to obtain threat data and select suitable peers to help with attack detection and mitigation. We apply DefenseChain in the financial technology industry for an insurance claim processing use case to demonstrate the effectiveness of DefenseChain in a real-world application setting. Our evaluation experiments with DefenseChain implementation are performed on an Open Cloud testbed with Hyperledger Composer and in a simulation environment. Our results show that the DefenseChain system overall performs better than state-of-the-art decision making schemes in choosing the most appropriate detector and mitigator peers. Lastly, we validate how DefenseChain helps mitigate the threat risk of incidents relating to potential fraudulent insurance claims or cyber attacks.
云托管应用程序容易受到DDoS、高级持久性威胁、Cryptojacking等有针对性的攻击,从而威胁服务可用性。最近,威胁信息共享和防御方法需要多个域/实体之间的合作和信任。需要建立分布式信任的机制来实现这种集体防御。在本文中,我们提出了一种新的威胁情报共享和防御系统,即“防御链”,使组织能够进行基于激励和值得信赖的合作,以减轻网络攻击的影响。我们的解决方案方法采用联盟区块链平台和经济模型,以获取威胁数据并选择合适的对等方来帮助检测和缓解攻击。我们将DefenseChain应用于金融科技行业的保险索赔处理用例,以展示DefenseChan在现实应用环境中的有效性。我们对DefenseChain实现的评估实验是在Hyperledger Composer的开放云测试台上和模拟环境中进行的。我们的结果表明,在选择最合适的检测器和缓解对等体方面,DefenseChain系统总体上比最先进的决策方案表现更好。最后,我们验证了DefenseChain如何帮助降低与潜在欺诈性保险索赔或网络攻击有关的事件的威胁风险。
{"title":"Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities","authors":"Soumya Purohit, R. Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, P. Calyam","doi":"10.1109/TDSC.2022.3214423","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3214423","url":null,"abstract":"Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, Cryptojacking which threaten service availability. Recently, methods for threat information sharing and defense require cooperation and trust between multiple domains/entities. There is a need for mechanisms that establish distributed trust to allow for such a collective defense. In this paper, we present a novel threat intelligence sharing and defense system, namely “DefenseChain,” to allow organizations to have incentive-based and trustworthy cooperation to mitigate the impact of cyber attacks. Our solution approach features a consortium Blockchain platform and an economic model to obtain threat data and select suitable peers to help with attack detection and mitigation. We apply DefenseChain in the financial technology industry for an insurance claim processing use case to demonstrate the effectiveness of DefenseChain in a real-world application setting. Our evaluation experiments with DefenseChain implementation are performed on an Open Cloud testbed with Hyperledger Composer and in a simulation environment. Our results show that the DefenseChain system overall performs better than state-of-the-art decision making schemes in choosing the most appropriate detector and mitigator peers. Lastly, we validate how DefenseChain helps mitigate the threat risk of incidents relating to potential fraudulent insurance claims or cyber attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"4273-4290"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47626315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems 安全电子医疗系统中敏感数据集的决策树评估
IF 7.3 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-01 DOI: 10.1109/TDSC.2022.3219849
Mingwu Zhang, Yu Chen, W. Susilo
By collecting and analyzing patients' e-healthcare data in Medical Internet-of-Things (MIOT), e-Healthcare providers can offer alternative and helpful evaluation services of the risk of diseases to patients. However, e-Healthcare providers cannot cope with the huge volumes of data and respond to this online service. Providers typically outsource medical data to powerful medical cloud servers. Since outsourced servers are not fully trusted, a direct evaluation service will inevitably result in privacy risks concerning the patient's identity or original medical data. It is hard to hide the results of an evaluation from the single-server model unless a fully homomorphic cryptosystem is used or the patients must communicate online with the cloud multiple times in an inefficient manner. With regards to these issues, this article proposes a Secure and Privacy-Preserving Decision Tree Evaluation scheme (namely SPP-DTE) to achieve secure disease diagnosis classification under e-Healthcare systems without revealing the sensitive information of patients such as physiological data or the private data of medical providers such as the structure of decision trees. Our proposed scheme uses modified KNN computation to match the similarity and preserve the confidentiality of raw data and also applies matrix randomization and monotonically increasing and one-way functions to confuse the intermediate results. The experiment is conducted in data sets from UCI machine learning repository of medical health data. Our analysis indicates that the proposed SPP-DTE scheme is efficient in terms of computational cost and communication overhead that is practical and efficient for privacy protection in e-Healthcare classification and diagnosis system.
通过在医疗物联网(MIOT)中收集和分析患者的电子医疗数据,电子医疗服务提供商可以为患者提供替代和有用的疾病风险评估服务。然而,电子医疗服务提供商无法应对庞大的数据量并对这项在线服务做出回应。提供商通常将医疗数据外包给功能强大的医疗云服务器。由于外包服务器不完全可信,直接评估服务将不可避免地导致与患者身份或原始医疗数据有关的隐私风险。除非使用全同态密码系统,或者患者必须以低效的方式多次与云在线通信,否则很难从单服务器模型中隐藏评估结果。针对这些问题,本文提出了一种安全和隐私保护的决策树评估方案(即SPP-DTE),以实现电子医疗系统下的安全疾病诊断分类,而不会泄露患者的敏感信息,如生理数据或医疗提供者的私人数据,如决策树的结构。我们提出的方案使用改进的KNN计算来匹配相似性并保持原始数据的机密性,还应用矩阵随机化、单调递增和单向函数来混淆中间结果。该实验是在来自UCI医学健康数据机器学习库的数据集中进行的。我们的分析表明,所提出的SPP-DTE方案在计算成本和通信开销方面是有效的,这对于电子医疗分类和诊断系统中的隐私保护是实用和有效的。
{"title":"Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems","authors":"Mingwu Zhang, Yu Chen, W. Susilo","doi":"10.1109/TDSC.2022.3219849","DOIUrl":"https://doi.org/10.1109/TDSC.2022.3219849","url":null,"abstract":"By collecting and analyzing patients' e-healthcare data in Medical Internet-of-Things (MIOT), e-Healthcare providers can offer alternative and helpful evaluation services of the risk of diseases to patients. However, e-Healthcare providers cannot cope with the huge volumes of data and respond to this online service. Providers typically outsource medical data to powerful medical cloud servers. Since outsourced servers are not fully trusted, a direct evaluation service will inevitably result in privacy risks concerning the patient's identity or original medical data. It is hard to hide the results of an evaluation from the single-server model unless a fully homomorphic cryptosystem is used or the patients must communicate online with the cloud multiple times in an inefficient manner. With regards to these issues, this article proposes a Secure and Privacy-Preserving Decision Tree Evaluation scheme (namely SPP-DTE) to achieve secure disease diagnosis classification under e-Healthcare systems without revealing the sensitive information of patients such as physiological data or the private data of medical providers such as the structure of decision trees. Our proposed scheme uses modified KNN computation to match the similarity and preserve the confidentiality of raw data and also applies matrix randomization and monotonically increasing and one-way functions to confuse the intermediate results. The experiment is conducted in data sets from UCI machine learning repository of medical health data. Our analysis indicates that the proposed SPP-DTE scheme is efficient in terms of computational cost and communication overhead that is practical and efficient for privacy protection in e-Healthcare classification and diagnosis system.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":"20 1","pages":"3988-4001"},"PeriodicalIF":7.3,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43677889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1