首页 > 最新文献

IET Inf. Secur.最新文献

英文 中文
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0 SP分组密码截短差分的观察及其在mCrypton和CRYPTON V1.0中的应用
Pub Date : 2018-04-04 DOI: 10.1049/iet-ifs.2017.0196
D. Yang, Wen-feng Qi, Huajin Chen
Truncated differential attack (TDA) proposed by Knudsen in Fast Software Encryption 1995 (FSE'95) has been widely used in the analysis of block ciphers. In this study, the authors specifically study the security of SP block ciphers against TDA. In FSE'15, Li et al. introduced a meet-in-the-middle technique to construct truncated differential for Feistel ciphers. They first apply Li's technique to SP block ciphers and get some further results. Second, they introduce the concept of generalised truncated difference to control the diffusion of active S-boxes in the truncated differential. On the basis of these, two 5-round truncated differential distinguishers for mCrypton and CRYPTON V1.0 have been constructed. Using these two 5-round distinguishers, they present the first 8-round DA on mCrypton-64 and improve the former best TDA on CRYPTON V1.0 by one round.
Knudsen在Fast Software Encryption 1995 (FSE'95)中提出的截断差分攻击(Truncated differential attack, TDA)在分组密码的分析中得到了广泛的应用。在本研究中,作者专门研究了SP分组密码对TDA的安全性。在FSE'15中,Li等人引入了一种中间相遇技术来构造费斯特尔密码的截断微分。他们首先将李的技术应用于SP分组密码,并得到了一些进一步的结果。其次,他们引入广义截断差分的概念来控制截断差分中有源s盒的扩散。在此基础上,构造了mCrypton和CRYPTON V1.0的两个5轮截断微分区分器。使用这两个5回合的区分器,他们在mCrypton-64上展示了第一个8回合的DA,并将之前在CRYPTON V1.0上的最佳TDA提高了一轮。
{"title":"Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0","authors":"D. Yang, Wen-feng Qi, Huajin Chen","doi":"10.1049/iet-ifs.2017.0196","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0196","url":null,"abstract":"Truncated differential attack (TDA) proposed by Knudsen in Fast Software Encryption 1995 (FSE'95) has been widely used in the analysis of block ciphers. In this study, the authors specifically study the security of SP block ciphers against TDA. In FSE'15, Li et al.\u0000 introduced a meet-in-the-middle technique to construct truncated differential for Feistel ciphers. They first apply Li's technique to SP block ciphers and get some further results. Second, they introduce the concept of generalised truncated difference to control the diffusion of active S-boxes in the truncated differential. On the basis of these, two 5-round truncated differential distinguishers for mCrypton and CRYPTON V1.0 have been constructed. Using these two 5-round distinguishers, they present the first 8-round DA on mCrypton-64 and improve the former best TDA on CRYPTON V1.0 by one round.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"50 1","pages":"419-424"},"PeriodicalIF":0.0,"publicationDate":"2018-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87377338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anomaly-based exploratory analysis and detection of exploits in android mediaserver 基于异常的android mediasserver漏洞探索性分析与检测
Pub Date : 2018-04-04 DOI: 10.1049/iet-ifs.2017.0460
Guillermo Suarez-Tangil, Santanu Kumar Dash, P. García-Teodoro, J. Camacho, L. Cavallaro
Smartphone platforms are becoming increasingly complex, which gives way to software vulnerabilities difficult to identify and that might allow malware developers to gain unauthorised privileges through technical exploitation. However, the authors maintain that these types of attacks indirectly renders a number of unexpected behaviours in the system that can be profiled. In this work, the authors present CoME, an anomaly-based methodology aiming at detecting software exploitation in Android systems. CoME models the normal behaviour of a given software component or service and it is capable of identifying any unanticipated behaviour. To this end, they first monitor the normal operation of a given exploitable component through lightweight virtual introspection. Then, they use a multivariate analysis approach to estimate the normality model and detect anomalies. They evaluate their system against one of the most critical vulnerable and widely exploited services in Android, i.e. the mediaserver. Results show that the proposed approach can not only provide a meaningful explanatory of discriminant features for illegitimate activities, but can also be used to accurately detect malicious software exploitations at runtime.
智能手机平台正变得越来越复杂,这给难以识别的软件漏洞让路,这可能使恶意软件开发人员通过技术利用获得未经授权的特权。然而,作者坚持认为,这些类型的攻击间接地在系统中呈现了许多可以被分析的意外行为。在这项工作中,作者提出了CoME,一种基于异常的方法,旨在检测Android系统中的软件利用。CoME为给定软件组件或服务的正常行为建模,并且能够识别任何意外行为。为此,它们首先通过轻量级虚拟自省监视给定可利用组件的正常操作。然后,他们使用多变量分析方法来估计正态性模型并检测异常。他们针对Android中最脆弱和被广泛利用的服务之一(即mediaserver)来评估他们的系统。结果表明,该方法不仅可以对非法活动的判别特征提供有意义的解释,而且可以用于在运行时准确检测恶意软件利用。
{"title":"Anomaly-based exploratory analysis and detection of exploits in android mediaserver","authors":"Guillermo Suarez-Tangil, Santanu Kumar Dash, P. García-Teodoro, J. Camacho, L. Cavallaro","doi":"10.1049/iet-ifs.2017.0460","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0460","url":null,"abstract":"Smartphone platforms are becoming increasingly complex, which gives way to software vulnerabilities difficult to identify and that might allow malware developers to gain unauthorised privileges through technical exploitation. However, the authors maintain that these types of attacks indirectly renders a number of unexpected behaviours in the system that can be profiled. In this work, the authors present CoME\u0000, an anomaly-based methodology aiming at detecting software exploitation in Android systems. CoME\u0000 models the normal behaviour of a given software component or service and it is capable of identifying any unanticipated behaviour. To this end, they first monitor the normal operation of a given exploitable component through lightweight virtual introspection. Then, they use a multivariate analysis approach to estimate the normality model and detect anomalies. They evaluate their system against one of the most critical vulnerable and widely exploited services in Android, i.e. the mediaserver. Results show that the proposed approach can not only provide a meaningful explanatory of discriminant features for illegitimate activities, but can also be used to accurately detect malicious software exploitations at runtime.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"4 1","pages":"404-413"},"PeriodicalIF":0.0,"publicationDate":"2018-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82257278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis 用于相关密钥放大回旋镖密码分析的完整MISTY1分组密码的弱密钥
Pub Date : 2018-01-04 DOI: 10.1049/iet-ifs.2017.0173
Jiqiang Lu, W. Yap, Yongzhuang Wei
The MISTY1 block cipher has a 64-bit block size, a 128-bit master key, and a total of 8 rounds. It is an ISO international standard, a Japanese CRYPTREC-recommended e-government cipher, and a European NESSIE selected cipher. In this study, the authors show another cryptographic weakness of the full MISTY1 cipher: they describe four classes of 2 90 weak keys of the full MISTY1 cipher for a related-key amplified boomerang attack that has a data complexity of 2 60.5 chosen plaintexts and a time complexity of 2 87.33 encryptions under each class of weak keys. The result shows that the MISTY1 cipher can be distinguishable from an ideal cipher in terms of related-key amplified boomerang cryptanalysis, and users should be very careful when using MISTY1 for a full security in relevant application situations.
MISTY1分组密码的块大小为64位,主密钥为128位,总共8轮。它是ISO国际标准,日本cryptrec推荐的电子政务密码,欧洲NESSIE选择密码。在这项研究中,作者展示了完整MISTY1密码的另一个密码弱点:他们描述了完整MISTY1密码的4类2990个弱密钥,用于相关密钥放大回旋器攻击,该攻击具有2 60.5选择明文的数据复杂度和2 87.33加密的时间复杂度。结果表明,MISTY1密码在相关密钥放大回旋镖密码分析方面可以与理想密码区分,用户在使用MISTY1密码时应非常小心,以获得充分的安全性。
{"title":"Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis","authors":"Jiqiang Lu, W. Yap, Yongzhuang Wei","doi":"10.1049/iet-ifs.2017.0173","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0173","url":null,"abstract":"The MISTY1 block cipher has a 64-bit block size, a 128-bit master key, and a total of 8 rounds. It is an ISO international standard, a Japanese CRYPTREC-recommended e-government cipher, and a European NESSIE selected cipher. In this study, the authors show another cryptographic weakness of the full MISTY1 cipher: they describe four classes of 2 90 weak keys of the full MISTY1 cipher for a related-key amplified boomerang attack that has a data complexity of 2 60.5 chosen plaintexts and a time complexity of 2 87.33 encryptions under each class of weak keys. The result shows that the MISTY1 cipher can be distinguishable from an ideal cipher in terms of related-key amplified boomerang cryptanalysis, and users should be very careful when using MISTY1 for a full security in relevant application situations.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"62 1","pages":"389-397"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73137202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient identity-based blind message recovery signature scheme from pairings 有效的基于身份的盲消息恢复签名方案
Pub Date : 2017-12-22 DOI: 10.1049/iet-ifs.2017.0342
Girraj Kumar Verma, B. Singh
Blind signature (BS) schemes are a vital tool to design electronic cash (e-cash), online transaction, electronic voting (e-voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and more confidential signature schemes. This article presents the first provably secure and efficient identity-based message recovery BS scheme from pairing. Since, in this scheme, the message is not transmitted with signature and recovered during verification phase, the total message–signature length is the lowest. Due to the blindness, the scheme provides authentication along with anonymity. The performance comparison shows that the authors' scheme consumes the lowest computation cost. Thus, it inspires the energy efficient (green) technology as well as is the most appealing BS scheme towards applications such as e-cash, e-voting, DRM systems etc. using low bandwidth and high security.
盲签名(BS)方案是设计电子现金(e-cash)、网上交易、电子投票(e-voting)、数字版权管理(DRM)等系统的重要工具。为此类应用设计的通信系统需要较小的尺寸和更机密的签名方案。本文提出了第一个可证明安全有效的基于身份的消息恢复方案。由于在该方案中,消息不带签名传输,并在验证阶段恢复,因此消息签名的总长度最小。由于盲性,该方案在匿名的同时提供身份验证。性能比较表明,作者的方案消耗的计算量最低。因此,它激发了节能(绿色)技术,也是电子现金,电子投票,DRM系统等应用中最具吸引力的BS方案,使用低带宽和高安全性。
{"title":"Efficient identity-based blind message recovery signature scheme from pairings","authors":"Girraj Kumar Verma, B. Singh","doi":"10.1049/iet-ifs.2017.0342","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0342","url":null,"abstract":"Blind signature (BS) schemes are a vital tool to design electronic cash (e-cash), online transaction, electronic voting (e-voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and more confidential signature schemes. This article presents the first provably secure and efficient identity-based message recovery BS scheme from pairing. Since, in this scheme, the message is not transmitted with signature and recovered during verification phase, the total message–signature length is the lowest. Due to the blindness, the scheme provides authentication along with anonymity. The performance comparison shows that the authors' scheme consumes the lowest computation cost. Thus, it inspires the energy efficient (green) technology as well as is the most appealing BS scheme towards applications such as e-cash, e-voting, DRM systems etc. using low bandwidth and high security.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"55 1","pages":"150-156"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86346876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
CCN framework with privacy support 具有隐私支持的CCN框架
Pub Date : 2017-11-24 DOI: 10.1049/iet-ifs.2017.0390
Xiaonan Wang, Zhengxiong Dou, Y. Mu
Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focused on the privacy issues of CCN and proposed a CCN framework with privacy support. In this framework, the concept of a privacy name was proposed and accordingly the forwarding information base (FIB) and pending Interest table (PIT) establishment algorithms based on privacy names were proposed. On the basis of the proposed FIB and PIT, the content communication algorithm based on privacy names was presented. In this algorithm, one authorised consumer could use a privacy name to seek, retrieve and share the ciphertext of the content, so the privacy was achieved. Finally, the privacy of this framework was analysed and the performance was evaluated to justify its advantages.
以内容为中心的网络(CCN)使用兴趣的名称来查找目标内容,其中名称是明文且不受保护的。除了名称之外,一个Data中的内容也不受保护。如果未经授权的节点拦截了兴趣,它可以推断请求的内容类型。如果节点截获了响应数据,则可能非法获取响应数据的内容。本研究针对CCN的隐私问题,提出了一个具有隐私支持的CCN框架。在此框架中,提出了隐私名的概念,并据此提出了基于隐私名的转发信息库(FIB)和待处理兴趣表(PIT)建立算法。在提出的FIB和PIT算法的基础上,提出了基于隐私名的内容通信算法。在该算法中,授权消费者可以使用一个隐私名来查找、检索和共享内容的密文,从而实现了隐私。最后,对该框架的隐私性进行了分析,并对其性能进行了评估,以证明其优点。
{"title":"CCN framework with privacy support","authors":"Xiaonan Wang, Zhengxiong Dou, Y. Mu","doi":"10.1049/iet-ifs.2017.0390","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0390","url":null,"abstract":"Content-centric networking (CCN) used the name of an Interest to seek the target content, where the name was a plaintext and unprotected. Apart from the name, the content in one Data is also unprotected. If an unauthorised node intercepted an Interest, it could infer what kind of content is requested. If the node intercepted a response Data, it could illegally acquire the content. This study focused on the privacy issues of CCN and proposed a CCN framework with privacy support. In this framework, the concept of a privacy name was proposed and accordingly the forwarding information base (FIB) and pending Interest table (PIT) establishment algorithms based on privacy names were proposed. On the basis of the proposed FIB and PIT, the content communication algorithm based on privacy names was presented. In this algorithm, one authorised consumer could use a privacy name to seek, retrieve and share the ciphertext of the content, so the privacy was achieved. Finally, the privacy of this framework was analysed and the performance was evaluated to justify its advantages.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"51 1","pages":"157-164"},"PeriodicalIF":0.0,"publicationDate":"2017-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89801844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Formal analysis of HMAC authorisation in the TPM2.0 specification TPM2.0规范中HMAC授权的正式分析
Pub Date : 2017-11-23 DOI: 10.1049/iet-ifs.2016.0005
J. Shao, Yu Qin, D. Feng
The Trusted Platform Module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers functionality for key management by storing keys into the TPM's protected storage. The access to the TPM-resident key object is protected by the session-based authorisation mechanism. This mechanism is keyed to the object's authorisation value known as authValue and the session-bound secret value known as sessionKey. The new authValue introduced into the TPM is protected by the sessionbased encryption mechanism, which is also keyed on the sessionKey. In the authors' study, they conduct a formal analysis of the TPM2.0 HMAC (hash message authentication code) authorisation mechanism used in the key management. They first use the stateful applied π calculus to formalise the session-based HMAC authorisation and encryption mechanisms in a model of TPM2.0 API commands. They propose a threat model to formalise the secrecy and authentication properties. Then they discuss several attacking scenarios in practice where the sessionKey could be disclosed. They also instantiate their threat model according to specific attacking scenarios. By using the SAPIC tool and the tamarin prover, they automatically give out the analysis results of their models.
可信平台模块(Trusted Platform Module, TPM)是一个系统组件,它提供了一种基于硬件的方法来在平台中建立信任。最新的TPM2.0规范于2015年被接受为ISO标准。它通过将密钥存储到TPM受保护的存储中来提供密钥管理功能。对驻留tpm密钥对象的访问受到基于会话的授权机制的保护。该机制与对象的授权值authValue和会话绑定的秘密值sessionKey相关。引入到TPM中的新authValue受到基于会话的加密机制的保护,该机制也在sessionKey上进行密钥设置。在作者的研究中,他们对密钥管理中使用的TPM2.0 HMAC(哈希消息认证码)授权机制进行了正式分析。他们首先使用状态应用π演算在TPM2.0 API命令模型中形式化基于会话的HMAC授权和加密机制。他们提出了一个威胁模型来形式化保密和身份验证属性。然后,他们讨论了几个可能会泄露sessionKey的攻击场景。他们还根据特定的攻击场景实例化他们的威胁模型。利用SAPIC工具和绢毛猴证明器,自动给出了模型的分析结果。
{"title":"Formal analysis of HMAC authorisation in the TPM2.0 specification","authors":"J. Shao, Yu Qin, D. Feng","doi":"10.1049/iet-ifs.2016.0005","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0005","url":null,"abstract":"The Trusted Platform Module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers functionality for key management by storing keys into the TPM's protected storage. The access to the TPM-resident key object is protected by the session-based authorisation mechanism. This mechanism is keyed to the object's authorisation value known as authValue and the session-bound secret value known as sessionKey. The new authValue introduced into the TPM is protected by the sessionbased encryption mechanism, which is also keyed on the sessionKey. In the authors' study, they conduct a formal analysis of the TPM2.0 HMAC (hash message authentication code) authorisation mechanism used in the key management. They first use the stateful applied π calculus to formalise the session-based HMAC authorisation and encryption mechanisms in a model of TPM2.0 API commands. They propose a threat model to formalise the secrecy and authentication properties. Then they discuss several attacking scenarios in practice where the sessionKey could be disclosed. They also instantiate their threat model according to specific attacking scenarios. By using the SAPIC tool and the tamarin prover, they automatically give out the analysis results of their models.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"57 1","pages":"133-140"},"PeriodicalIF":0.0,"publicationDate":"2017-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90677078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cryptanalysis of Morillo-Obrador polynomial delegation schemes Morillo-Obrador多项式授权方案的密码分析
Pub Date : 2017-11-17 DOI: 10.1049/iet-ifs.2017.0259
Shuaijianni Xu, L. Zhang
Verifiable computation (VC) allows a client to outsource (delegate) the computation of a function f on an input x to a server and then verify the server's results with substantially less time than computing f(x) from scratch. The security of VC requires no efficient adversary can persuade the client to accept any wrong results. Morillo and Obrador (PST 2013) proposed three VC schemes for outsourcing the computation of polynomial functions and claimed that all schemes are secure under the decisional subgroup membership assumption. The authors show a simple attack against the security of their first scheme and then extend the attack to the other two schemes. Morillo and Obrador (PST 2013) also claimed that their third scheme keeps the client's input private under the square root assumption. The authors show that this is not true under the standard definition of input privacy. In particular, a curious server can extract the client's input x, if the x is not too large. The authors' results show that Morillo-Obrador schemes cannot be used in the polynomial delegation.
可验证计算(VC)允许客户机将输入x上函数f的计算外包(委托)给服务器,然后用比从头计算f(x)少得多的时间验证服务器的结果。风险投资的安全性要求没有有效的对手可以说服客户接受任何错误的结果。Morillo和Obrador (PST 2013)提出了三种外包多项式函数计算的VC方案,并声称在决策子群隶属假设下,所有方案都是安全的。作者展示了针对第一个方案安全性的简单攻击,然后将攻击扩展到其他两个方案。Morillo和Obrador (PST 2013)还声称,他们的第三个方案在平方根假设下保持客户输入的私密性。作者表明,在输入隐私的标准定义下,这是不正确的。特别是,好奇的服务器可以提取客户机的输入x,如果x不是太大的话。结果表明,Morillo-Obrador方案不能用于多项式委托。
{"title":"Cryptanalysis of Morillo-Obrador polynomial delegation schemes","authors":"Shuaijianni Xu, L. Zhang","doi":"10.1049/iet-ifs.2017.0259","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0259","url":null,"abstract":"Verifiable computation (VC) allows a client to outsource (delegate) the computation of a function f on an input x to a server and then verify the server's results with substantially less time than computing f(x) from scratch. The security of VC requires no efficient adversary can persuade the client to accept any wrong results. Morillo and Obrador (PST 2013) proposed three VC schemes for outsourcing the computation of polynomial functions and claimed that all schemes are secure under the decisional subgroup membership assumption. The authors show a simple attack against the security of their first scheme and then extend the attack to the other two schemes. Morillo and Obrador (PST 2013) also claimed that their third scheme keeps the client's input private under the square root assumption. The authors show that this is not true under the standard definition of input privacy. In particular, a curious server can extract the client's input x, if the x is not too large. The authors' results show that Morillo-Obrador schemes cannot be used in the polynomial delegation.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"48 1","pages":"127-132"},"PeriodicalIF":0.0,"publicationDate":"2017-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79936239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Malware classification based on API calls and behaviour analysis 基于API调用和行为分析的恶意软件分类
Pub Date : 2017-10-04 DOI: 10.1049/iet-ifs.2017.0430
Abdurrahman Pektas, T. Acarman
This study presents the runtime behaviour-based classification procedure for Windows malware. Runtime behaviours are extracted with a particular focus on the determination of a malicious sequence of application programming interface (API) calls in addition to the file, network and registry activities. Mining and searching n-gram over API call sequences is introduced to discover episodes representing behaviour-based features of a malware. Voting Experts algorithm is used to extract malicious API patterns over API calls. The classification model is built by applying online machine learning algorithms and compared with the baseline classifiers. The model is trained and tested with a fairly large set of 17,400 malware samples belonging to 60 distinct families and 532 benign samples. The malware classification accuracy is reached at 98%.
提出了基于运行时行为的Windows恶意软件分类方法。在提取运行时行为时,除了文件、网络和注册表活动外,还特别关注确定应用程序编程接口(API)调用的恶意序列。引入API调用序列的n-gram挖掘和搜索来发现代表恶意软件基于行为的特征的事件。投票专家算法用于通过API调用提取恶意API模式。应用在线机器学习算法建立分类模型,并与基线分类器进行比较。该模型是用相当大的一组17400个恶意软件样本进行训练和测试的,这些样本属于60个不同的家族和532个良性样本。恶意软件分类准确率达到98%。
{"title":"Malware classification based on API calls and behaviour analysis","authors":"Abdurrahman Pektas, T. Acarman","doi":"10.1049/iet-ifs.2017.0430","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0430","url":null,"abstract":"This study presents the runtime behaviour-based classification procedure for Windows malware. Runtime behaviours are extracted with a particular focus on the determination of a malicious sequence of application programming interface (API) calls in addition to the file, network and registry activities. Mining and searching n-gram over API call sequences is introduced to discover episodes representing behaviour-based features of a malware. Voting Experts algorithm is used to extract malicious API patterns over API calls. The classification model is built by applying online machine learning algorithms and compared with the baseline classifiers. The model is trained and tested with a fairly large set of 17,400 malware samples belonging to 60 distinct families and 532 benign samples. The malware classification accuracy is reached at 98%.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"321 1","pages":"107-117"},"PeriodicalIF":0.0,"publicationDate":"2017-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84661945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Analysis of the adoption of security headers in HTTP HTTP中安全头的采用分析
Pub Date : 2017-10-04 DOI: 10.1049/IET-IFS.2016.0621
W. Buchanan, Scott Helme, Alan Woodward
With the increase in the number of threats within web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injection, and so on. This study analyses some of the newest security options used within HTTP responses, and scans the Alexa Top 1 Million sites for their implementation within HTTP responses. These options scanned for include: content security policy, public key pinning extension for HTTP, HTTP strict transport security, and HTTP header field X-frame-options, in order to understand the impact that these options have on the most popular websites. The results show that, while the implementation of the parameters is increasing, it is still not implemented on many of the top sites. Along with this, the study shows the profile of adoption of Let's Encrypt digital certificates across the one million sites, along with a way of assessing the quality of the security headers.
随着基于web的系统中威胁数量的增加,需要一种更加集成的方法来确保从服务器到客户机的安全策略的实施。这些策略旨在阻止中间人攻击、代码注入等。本研究分析了HTTP响应中使用的一些最新安全选项,并扫描了Alexa前100万个网站在HTTP响应中的实现。扫描的这些选项包括:内容安全策略、HTTP公钥固定扩展、HTTP严格传输安全性和HTTP头字段x帧选项,以便了解这些选项对最受欢迎的网站的影响。结果表明,虽然这些参数的实现在增加,但在许多排名靠前的网站上仍然没有实现。除此之外,该研究还显示了100万个网站采用Let's Encrypt数字证书的概况,以及评估安全标头质量的方法。
{"title":"Analysis of the adoption of security headers in HTTP","authors":"W. Buchanan, Scott Helme, Alan Woodward","doi":"10.1049/IET-IFS.2016.0621","DOIUrl":"https://doi.org/10.1049/IET-IFS.2016.0621","url":null,"abstract":"With the increase in the number of threats within web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injection, and so on. This study analyses some of the newest security options used within HTTP responses, and scans the Alexa Top 1 Million sites for their implementation within HTTP responses. These options scanned for include: content security policy, public key pinning extension for HTTP, HTTP strict transport security, and HTTP header field X-frame-options, in order to understand the impact that these options have on the most popular websites. The results show that, while the implementation of the parameters is increasing, it is still not implemented on many of the top sites. Along with this, the study shows the profile of adoption of Let's Encrypt digital certificates across the one million sites, along with a way of assessing the quality of the security headers.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"76 1","pages":"118-126"},"PeriodicalIF":0.0,"publicationDate":"2017-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76035034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Note on scalar multiplication using division polynomials 注意使用除法多项式的标量乘法
Pub Date : 2017-07-01 DOI: 10.1049/iet-ifs.2015.0119
Binglong Chen, Chuangqiang Hu, Chang-An Zhao
Scalar multiplication is the most important and expensive operation in elliptic curve cryptosystems. In this study, the authors improve the efficiency of the elliptic net algorithm to compute scalar multiplication by using the equivalence of elliptic nets. The proposed method saves four multiplications by a constant in each iteration loop. Experimental results also indicate that the proposed algorithm will be more efficient than the previously known results on this line while it is still slower than the state-of-the-art algorithm to compute scalar multiplication.
标量乘法运算是椭圆曲线密码系统中最重要也是最昂贵的运算。在本研究中,作者利用椭圆网的等价性提高了椭圆网算法计算标量乘法的效率。提出的方法在每个迭代循环中节省了四次常数乘法。实验结果还表明,该算法在计算标量乘法时比现有算法要慢,但在计算标量乘法时比现有算法效率更高。
{"title":"Note on scalar multiplication using division polynomials","authors":"Binglong Chen, Chuangqiang Hu, Chang-An Zhao","doi":"10.1049/iet-ifs.2015.0119","DOIUrl":"https://doi.org/10.1049/iet-ifs.2015.0119","url":null,"abstract":"Scalar multiplication is the most important and expensive operation in elliptic curve cryptosystems. In this study, the authors improve the efficiency of the elliptic net algorithm to compute scalar multiplication by using the equivalence of elliptic nets. The proposed method saves four multiplications by a constant in each iteration loop. Experimental results also indicate that the proposed algorithm will be more efficient than the previously known results on this line while it is still slower than the state-of-the-art algorithm to compute scalar multiplication.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"37 1","pages":"195-198"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87312814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
IET Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1