首页 > 最新文献

2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things AlkylVM:智能合约区块链连接物联网虚拟机
J. Ellul, Gordon J. Pace
Blockchain technology and the application of smart contracts allow for automation of verifiable digital processes between any number of parties. The Internet of Things (IoT) has seen great potential in the past decade to revolutionise our day-to-day lives with the aim of automating physical processes by incorporating Internet-connected devices into commodities. By integrating the IoT with blockchain systems and smart contracts it is possible to provide verifiable automation of physical processes involving different parties. The challenge lies in that due to resource constraints, many of the computational devices used within the IoT are not capable of directly interacting with blockchain implementations. In this paper, we describe and give a reference design and implementation of a split-virtual machine, AlkylVM, which allows for resource constrained IoT devices to interact with blockchain systems.
区块链技术和智能合约的应用允许在任何数量的各方之间实现可验证的数字流程的自动化。物联网(IoT)在过去十年中已经看到了巨大的潜力,通过将互联网连接的设备整合到商品中,从而实现物理过程的自动化,从而彻底改变我们的日常生活。通过将物联网与区块链系统和智能合约集成,可以为涉及不同各方的物理过程提供可验证的自动化。挑战在于,由于资源限制,物联网中使用的许多计算设备无法直接与区块链实现交互。在本文中,我们描述并给出了一个分裂虚拟机的参考设计和实现,AlkylVM,它允许资源受限的物联网设备与区块链系统交互。
{"title":"AlkylVM: A Virtual Machine for Smart Contract Blockchain Connected Internet of Things","authors":"J. Ellul, Gordon J. Pace","doi":"10.1109/NTMS.2018.8328732","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328732","url":null,"abstract":"Blockchain technology and the application of smart contracts allow for automation of verifiable digital processes between any number of parties. The Internet of Things (IoT) has seen great potential in the past decade to revolutionise our day-to-day lives with the aim of automating physical processes by incorporating Internet-connected devices into commodities. By integrating the IoT with blockchain systems and smart contracts it is possible to provide verifiable automation of physical processes involving different parties. The challenge lies in that due to resource constraints, many of the computational devices used within the IoT are not capable of directly interacting with blockchain implementations. In this paper, we describe and give a reference design and implementation of a split-virtual machine, AlkylVM, which allows for resource constrained IoT devices to interact with blockchain systems.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Identifying Vulnerabilities in APT Attacks: A Simulated Approach 识别APT攻击中的漏洞:模拟方法
Mathew Nicho, Adelaiye Oluwasegun, F. Kamoun
This research aims to identify some vulnerabilities of advanced persistent threat (APT) attacks using multiple simulated attacks in a virtualized environment. Our experimental study shows that while updating the antivirus software and the operating system with the latest patches may help in mitigating APTs, APT threat vectors could still infiltrate the strongest defenses. Accordingly, we highlight some critical areas of security concern that need to be addressed.
本研究旨在通过在虚拟环境中进行多次模拟攻击,识别高级持续威胁(APT)攻击的一些漏洞。我们的实验研究表明,虽然用最新的补丁更新杀毒软件和操作系统可能有助于缓解APT,但APT威胁载体仍然可以渗透到最强的防御系统中。因此,我们强调需要解决的安全关切的一些关键领域。
{"title":"Identifying Vulnerabilities in APT Attacks: A Simulated Approach","authors":"Mathew Nicho, Adelaiye Oluwasegun, F. Kamoun","doi":"10.1109/NTMS.2018.8328696","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328696","url":null,"abstract":"This research aims to identify some vulnerabilities of advanced persistent threat (APT) attacks using multiple simulated attacks in a virtualized environment. Our experimental study shows that while updating the antivirus software and the operating system with the latest patches may help in mitigating APTs, APT threat vectors could still infiltrate the strongest defenses. Accordingly, we highlight some critical areas of security concern that need to be addressed.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving Flexibility in Wireless Sensor Networks via API. An Application in Environmental Monitoring 通过API提高无线传感器网络的灵活性。在环境监测中的应用
Manuel-Jesús Espinosa-Gavira, A. Jimenez-Pro, J. D. L. Rosa, A. A. Pérez, O. Florencias-Oliveros, J. C. P. Salas, José María Sierra Fernández
This paper presents a Wireless Sensor Network (WSN) design, using the Application Programming Interface (API) mode for accessing to the communication modules built-in functions. In these conditions, the use of an external microcontroller can be avoided with the subsequent reduction in the global network cost, but also increasing the reliability and the flexibility while maintaining the essential features of typical WSN. To show the system performance, two variables have been monitored: light and temperature.
本文提出了一种无线传感器网络(WSN)的设计方案,采用应用程序编程接口(API)模式访问其内置的通信模块功能。在这些情况下,可以避免使用外部微控制器,从而降低全局网络成本,同时也增加了可靠性和灵活性,同时保持了典型WSN的基本特征。为了显示系统的性能,我们监测了两个变量:光和温度。
{"title":"Improving Flexibility in Wireless Sensor Networks via API. An Application in Environmental Monitoring","authors":"Manuel-Jesús Espinosa-Gavira, A. Jimenez-Pro, J. D. L. Rosa, A. A. Pérez, O. Florencias-Oliveros, J. C. P. Salas, José María Sierra Fernández","doi":"10.1109/NTMS.2018.8328697","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328697","url":null,"abstract":"This paper presents a Wireless Sensor Network (WSN) design, using the Application Programming Interface (API) mode for accessing to the communication modules built-in functions. In these conditions, the use of an external microcontroller can be avoided with the subsequent reduction in the global network cost, but also increasing the reliability and the flexibility while maintaining the essential features of typical WSN. To show the system performance, two variables have been monitored: light and temperature.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121710678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Drone Forensics: Challenges and New Insights 无人机取证:挑战和新见解
H. Bouafif, F. Kamoun, Farkhund Iqbal, A. Marrington
Powerful information acquisition and processing capabilities, coupled with intelligent surveillance and reconnaissance features, have contributed to increased popularity of Unmanned Aerial Vehicles (UAVs), also known as drones. In addition to the numerous beneficial uses, UAVs have been misused to launch illegal and sometimes criminal activities that pose direct threats to individuals, organizations, public safety and national security. Despite its increased importance, "drone forensics" remains a relatively unexplored research topic. This paper presents important results of a forensic investigation analysis performed on a test Parrot AR drone 2.0. We present new insights into drone forensics in terms of accessing the digital containers of an intercepted drone and retrieving all the information that can help digital forensic investigators establish ownership, recover flight data and acquire content of media files.
强大的信息获取和处理能力,加上智能监视和侦察功能,使得无人驾驶飞行器(uav)越来越受欢迎。除了许多有益的用途外,无人机还被滥用于发起非法活动,有时甚至是犯罪活动,对个人、组织、公共安全和国家安全构成直接威胁。尽管其重要性日益增加,“无人机取证”仍然是一个相对未被探索的研究课题。本文介绍了在测试Parrot AR无人机2.0上进行的法医调查分析的重要结果。我们在访问被拦截无人机的数字容器和检索可以帮助数字法医调查员建立所有权,恢复飞行数据和获取媒体文件内容的所有信息方面,提出了无人机取证的新见解。
{"title":"Drone Forensics: Challenges and New Insights","authors":"H. Bouafif, F. Kamoun, Farkhund Iqbal, A. Marrington","doi":"10.1109/NTMS.2018.8328747","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328747","url":null,"abstract":"Powerful information acquisition and processing capabilities, coupled with intelligent surveillance and reconnaissance features, have contributed to increased popularity of Unmanned Aerial Vehicles (UAVs), also known as drones. In addition to the numerous beneficial uses, UAVs have been misused to launch illegal and sometimes criminal activities that pose direct threats to individuals, organizations, public safety and national security. Despite its increased importance, \"drone forensics\" remains a relatively unexplored research topic. This paper presents important results of a forensic investigation analysis performed on a test Parrot AR drone 2.0. We present new insights into drone forensics in terms of accessing the digital containers of an intercepted drone and retrieving all the information that can help digital forensic investigators establish ownership, recover flight data and acquire content of media files.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications 切片距离:专注于安全应用的仅插入Levenshtein距离
Zeeshan Afzal, Johan Garcia, S. Lindskog, A. Brunström
Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.
Levenshtein距离因其用于比较两个字符串的相似性而闻名。但是,在许多情况下,比较时使用的编辑操作集可以减少。在这种情况下,通用Levenshtein距离的应用可能导致检测和计算性能下降。文献中的其他度量可以将考虑的编辑操作限制在较小的子集中。然而,这种差异只能由删除的字节产生的可能性还没有被探索。为此,我们提出了Levenshtein距离的一个仅插入的变体,以便在仅由于缺少字节而产生差异的情况下对两个字符串进行比较。给出了该距离度量的形式化形式,并讨论了其计算复杂度。我们还讨论了切片距离的潜在安全应用。
{"title":"Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications","authors":"Zeeshan Afzal, Johan Garcia, S. Lindskog, A. Brunström","doi":"10.1109/NTMS.2018.8328718","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328718","url":null,"abstract":"Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134248630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Malware Classification with Deep Convolutional Neural Networks 基于深度卷积神经网络的恶意软件分类
Mahmoud Kalash, Mrigank Rochan, N. Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal
In this paper, we propose a deep learning framework for malware classification. There has been a huge increase in the volume of malware in recent years which poses a serious security threat to financial institutions, businesses and individuals. In order to combat the proliferation of malware, new strategies are essential to quickly identify and classify malware samples so that their behavior can be analyzed. Machine learning approaches are becoming popular for classifying malware, however, most of the existing machine learning methods for malware classification use shallow learning algorithms (e.g. SVM). Recently, Convolutional Neural Networks (CNN), a deep learning approach, have shown superior performance compared to traditional learning algorithms, especially in tasks such as image classification. Motivated by this success, we propose a CNN-based architecture to classify malware samples. We convert malware binaries to grayscale images and subsequently train a CNN for classification. Experiments on two challenging malware classification datasets, Malimg and Microsoft malware, demonstrate that our method achieves better than the state-of-the-art performance. The proposed method achieves 98.52% and 99.97% accuracy on the Malimg and Microsoft datasets respectively.
在本文中,我们提出了一个用于恶意软件分类的深度学习框架。近年来,恶意软件的数量急剧增加,对金融机构、企业和个人构成了严重的安全威胁。为了对抗恶意软件的扩散,必须采用新的策略来快速识别和分类恶意软件样本,以便对其行为进行分析。机器学习方法在恶意软件分类中越来越受欢迎,然而,大多数现有的恶意软件分类机器学习方法使用浅学习算法(例如SVM)。最近,卷积神经网络(CNN)作为一种深度学习方法,与传统的学习算法相比,表现出了优越的性能,特别是在图像分类等任务中。基于这一成功,我们提出了一种基于cnn的恶意软件样本分类架构。我们将恶意软件二进制文件转换为灰度图像,然后训练CNN进行分类。在两个具有挑战性的恶意软件分类数据集(Malimg和Microsoft恶意软件)上的实验表明,我们的方法取得了比现有性能更好的性能。该方法在Malimg和Microsoft数据集上的准确率分别达到98.52%和99.97%。
{"title":"Malware Classification with Deep Convolutional Neural Networks","authors":"Mahmoud Kalash, Mrigank Rochan, N. Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal","doi":"10.1109/NTMS.2018.8328749","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328749","url":null,"abstract":"In this paper, we propose a deep learning framework for malware classification. There has been a huge increase in the volume of malware in recent years which poses a serious security threat to financial institutions, businesses and individuals. In order to combat the proliferation of malware, new strategies are essential to quickly identify and classify malware samples so that their behavior can be analyzed. Machine learning approaches are becoming popular for classifying malware, however, most of the existing machine learning methods for malware classification use shallow learning algorithms (e.g. SVM). Recently, Convolutional Neural Networks (CNN), a deep learning approach, have shown superior performance compared to traditional learning algorithms, especially in tasks such as image classification. Motivated by this success, we propose a CNN-based architecture to classify malware samples. We convert malware binaries to grayscale images and subsequently train a CNN for classification. Experiments on two challenging malware classification datasets, Malimg and Microsoft malware, demonstrate that our method achieves better than the state-of-the-art performance. The proposed method achieves 98.52% and 99.97% accuracy on the Malimg and Microsoft datasets respectively.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130974882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 233
Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing 预计算适当的参数:如何加速云审计的同态加密
Louis Tajan, Moritz Kaumanns, D. Westhoff
In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.
在一个半自治的云审计架构中,我们通过应用[4]中的某种同态加密(SHE)方案的公钥版本,加入了隐私增强机制[15]。事实证明,通过从具体的云审计用例中仔细导出相关的加密参数,SHE的性能可以得到显着提高,该方案可以作为隐私增强方法。通过分析和考虑方案的安全性、正确性和性能,我们提供了一种通用算法,用于根据给定的用例场景找到良好的SHE参数。此外,为了显示我们提出的算法的相关性,我们将其应用于两个主要的云审计用例。
{"title":"Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing","authors":"Louis Tajan, Moritz Kaumanns, D. Westhoff","doi":"10.1109/NTMS.2018.8328713","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328713","url":null,"abstract":"In a Semi-autonomic cloud auditing architecture we weaved in privacy enhancing mechanisms [15] by applying the public key version of the Somewhat homomorphic encryption (SHE) scheme from [4]. It turns out that the performance of the SHE can be significantly improved by carefully deriving relevant crypto parameters from the concrete cloud auditing use cases for which the scheme serves as a privacy enhancing approach. We provide a generic algorithm for finding good SHE parameters with respect to a given use case scenario by analyzing and taking into consideration security, correctness and performance of the scheme. Also, to show the relevance of our proposed algorithms we apply it to two predominant cloud auditing use cases.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling of S-MAC for Heterogeneous WSN 异构 WSN 的 S-MAC 建模
Canek Portillo, J. Martínez-Bauset, V. Pla
Wireless Sensor Networks (WSN) have experienced an important resurgence, especially through applications designed for the Internet of Things. In that sense, a WSN can be constituted of different classes of nodes, having different characteristics. On the other hand, S-MAC was the first Medium Access Control (MAC) protocol for WSN to implement the Duty Cycling (DC). DC is a popular technique for energy conservation in WSN, that allows nodes to wake up and sleep periodically. In this work, a performance evaluation study of S-MAC is performed considering heterogeneous scenarios and diverse medium access priorities. To accomplish that, an analytical model with a pair of two-dimensional Discrete-Time Markov Chains (DTMC) is developed. Scenarios with two classes of nodes forming the network were studied. Performance parameters such as packet average delay, throughput and consumed energy, are obtained and validated by simulation, showing accurate results.
无线传感器网络(WSN)经历了重要的复苏,特别是通过为物联网设计的应用程序。从这个意义上说,一个WSN可以由不同类别的节点组成,这些节点具有不同的特征。另一方面,S-MAC是WSN第一个实现占空比(DC)的介质访问控制(MAC)协议。DC是无线传感器网络中常用的一种节能技术,它允许节点周期性地唤醒和休眠。在这项工作中,考虑异构场景和不同介质访问优先级,进行了S-MAC性能评估研究。为此,建立了二维离散马尔可夫链(DTMC)的解析模型。研究了两类节点构成网络的情形。通过仿真验证了系统的平均时延、吞吐量和能耗等性能参数,得到了准确的结果。
{"title":"Modelling of S-MAC for Heterogeneous WSN","authors":"Canek Portillo, J. Martínez-Bauset, V. Pla","doi":"10.1109/NTMS.2018.8328705","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328705","url":null,"abstract":"Wireless Sensor Networks (WSN) have experienced an important resurgence, especially through applications designed for the Internet of Things. In that sense, a WSN can be constituted of different classes of nodes, having different characteristics. On the other hand, S-MAC was the first Medium Access Control (MAC) protocol for WSN to implement the Duty Cycling (DC). DC is a popular technique for energy conservation in WSN, that allows nodes to wake up and sleep periodically. In this work, a performance evaluation study of S-MAC is performed considering heterogeneous scenarios and diverse medium access priorities. To accomplish that, an analytical model with a pair of two-dimensional Discrete-Time Markov Chains (DTMC) is developed. Scenarios with two classes of nodes forming the network were studied. Performance parameters such as packet average delay, throughput and consumed energy, are obtained and validated by simulation, showing accurate results.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum 在以太坊中实现隐私保护智能合约的经验教训
A. Unterweger, F. Knirsch, Christoph Leixnering, D. Engel
Real-world smart contracts which preserve the privacy of both, their users and their data, have barely been proposed theoretically, let alone been implemented practically. In this paper, we are the first to implement a privacy-preserving protocol from the energy domain as a smart contract in Ethereum. We elaborate on and present our implementation as well as our practical findings, including more or less subtle traps and pitfalls. Despite major optimizations to our implementation, we find that while it is currently possible, it is not feasible to implement a privacy-preserving protocol of modest complexity in the Ethereum blockchain due to the high cost of operation and the lack of privacy by design.
现实世界中保护用户和数据隐私的智能合约在理论上几乎没有被提出,更不用说在实践中实施了。在本文中,我们是第一个在以太坊中实现能源领域隐私保护协议作为智能合约的人。我们详细阐述并展示了我们的实现以及我们的实际发现,包括或多或少微妙的陷阱和陷阱。尽管对我们的实现进行了重大优化,但我们发现,虽然目前有可能,但由于操作成本高和设计缺乏隐私,在以太坊区块链中实现适度复杂的隐私保护协议是不可行的。
{"title":"Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum","authors":"A. Unterweger, F. Knirsch, Christoph Leixnering, D. Engel","doi":"10.1109/NTMS.2018.8328739","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328739","url":null,"abstract":"Real-world smart contracts which preserve the privacy of both, their users and their data, have barely been proposed theoretically, let alone been implemented practically. In this paper, we are the first to implement a privacy-preserving protocol from the energy domain as a smart contract in Ethereum. We elaborate on and present our implementation as well as our practical findings, including more or less subtle traps and pitfalls. Despite major optimizations to our implementation, we find that while it is currently possible, it is not feasible to implement a privacy-preserving protocol of modest complexity in the Ethereum blockchain due to the high cost of operation and the lack of privacy by design.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115178943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection 面向可扩展和云感知网络文件检测的片段散列方法
Johan Garcia
Monitoring networks for the presence of some particular set of files can, for example, be important in order to avoid exfiltration of sensitive data, or combat the spread of Child Sexual Abuse (CSA) material. This work presents a scalable system for large-scale file detection in high-speed networks. A multi-level approach using packet sampling with rolling and block hashing is introduced. We show that such approach together with a well tuned implementation can perform detection of a large number of files on the network at 10 Gbps using standard hardware. The use of packet sampling enables easy distribution of the monitoring processing functionality, and allows for flexible scaling in a cloud environment. Performance experiments on the most run-time critical hashing parts shows a single-thread performance consistent with 10Gbps line rate monitoring. The file detectability is examined for three data sets over a range of packet sampling rates. A conservative sampling rate of 0.1 is demonstrated to perform well for all tested data sets. It is also shown that knowledge of the file size distribution can be exploited to allow lower sampling rates to be configured for two of the data sets, which in turn results in lower resource usage.
例如,监测网络是否存在某些特定的文件集,对于避免敏感数据泄露或打击儿童性虐待材料的传播可能很重要。本文提出了一种可扩展的高速网络中大规模文件检测系统。介绍了一种基于滚动哈希和块哈希的多级分组采样方法。我们表明,这种方法与经过良好调优的实现一起,可以使用标准硬件以10 Gbps的速度对网络上的大量文件进行检测。使用包采样可以轻松分发监控处理功能,并允许在云环境中灵活扩展。对大多数运行时关键散列部分的性能实验显示,单线程性能与10Gbps线速率监控一致。在包采样率范围内对三个数据集的文件可检测性进行了检查。0.1的保守抽样率被证明对所有测试的数据集都表现良好。本文还表明,可以利用文件大小分布的知识,为两个数据集配置更低的采样率,从而降低资源使用。
{"title":"A Fragment Hashing Approach for Scalable and Cloud-Aware Network File Detection","authors":"Johan Garcia","doi":"10.1109/NTMS.2018.8328746","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328746","url":null,"abstract":"Monitoring networks for the presence of some particular set of files can, for example, be important in order to avoid exfiltration of sensitive data, or combat the spread of Child Sexual Abuse (CSA) material. This work presents a scalable system for large-scale file detection in high-speed networks. A multi-level approach using packet sampling with rolling and block hashing is introduced. We show that such approach together with a well tuned implementation can perform detection of a large number of files on the network at 10 Gbps using standard hardware. The use of packet sampling enables easy distribution of the monitoring processing functionality, and allows for flexible scaling in a cloud environment. Performance experiments on the most run-time critical hashing parts shows a single-thread performance consistent with 10Gbps line rate monitoring. The file detectability is examined for three data sets over a range of packet sampling rates. A conservative sampling rate of 0.1 is demonstrated to perform well for all tested data sets. It is also shown that knowledge of the file size distribution can be exploited to allow lower sampling rates to be configured for two of the data sets, which in turn results in lower resource usage.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1