首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
A study on the use of quantum computers, risk assessment and security problems 研究量子计算机的使用、风险评估和安全问题
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355318
Bilgehan Arslan, Mehtap Ulker, S. Akleylek, Ş. Sağiroğlu
In the computer based solutions of the problems in today's world; if the problem has a high complexity value, different requirements can be addressed such as necessity of simultaneous operation of many computers, the long processing times for the operation of algorithms, and computers with hardware features that can provide high performance. For this reason, it is inevitable to use a computer based on quantum physics in the near future in order to make today's cryptosystems unsafe, search the servers and other information storage centers on internet very quickly, solve optimization problems in the NP-hard category with a very wide solution space and analyze information on large-scale data processing and to process high-resolution image for artificial intelligence applications. In this study, an examination of quantum approaches and quantum computers, which will be widely used in the near future, was carried out and the areas in which such innovation can be used was evaluated. Malicious or non-malicious use of quantum computers with this capacity, the advantages and disadvantages of the high performance which it provides were examined under the head of security, the effect of this recent technology on the existing security systems was investigated.
以计算机为基础解决当今世界的问题;如果问题具有较高的复杂性值,则可以解决不同的要求,例如需要多台计算机同时运行,算法运行的处理时间长,以及具有可以提供高性能的硬件功能的计算机。因此,在不久的将来,使用基于量子物理的计算机是不可避免的,以使今天的密码系统变得不安全,以非常快的速度搜索互联网上的服务器和其他信息存储中心,以非常广泛的解决方案空间解决NP-hard类别的优化问题,并分析大规模数据处理的信息和处理高分辨率图像用于人工智能应用。在这项研究中,对量子方法和量子计算机进行了检查,这些方法和量子计算机将在不久的将来被广泛使用,并对可以使用这种创新的领域进行了评估。在安全的标题下,研究了具有这种能力的量子计算机的恶意或非恶意使用,它提供的高性能的优点和缺点,并研究了这项新技术对现有安全系统的影响。
{"title":"A study on the use of quantum computers, risk assessment and security problems","authors":"Bilgehan Arslan, Mehtap Ulker, S. Akleylek, Ş. Sağiroğlu","doi":"10.1109/ISDFS.2018.8355318","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355318","url":null,"abstract":"In the computer based solutions of the problems in today's world; if the problem has a high complexity value, different requirements can be addressed such as necessity of simultaneous operation of many computers, the long processing times for the operation of algorithms, and computers with hardware features that can provide high performance. For this reason, it is inevitable to use a computer based on quantum physics in the near future in order to make today's cryptosystems unsafe, search the servers and other information storage centers on internet very quickly, solve optimization problems in the NP-hard category with a very wide solution space and analyze information on large-scale data processing and to process high-resolution image for artificial intelligence applications. In this study, an examination of quantum approaches and quantum computers, which will be widely used in the near future, was carried out and the areas in which such innovation can be used was evaluated. Malicious or non-malicious use of quantum computers with this capacity, the advantages and disadvantages of the high performance which it provides were examined under the head of security, the effect of this recent technology on the existing security systems was investigated.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative analysis of common YouTube comment spam filtering techniques 常见的YouTube评论垃圾邮件过滤技术的比较分析
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355315
Abdullah O. Abdullah, M. A. Ali, M. Karabatak, A. Şengur
Ever since its development in 2005, YouTube has been providing a vital social media platform for video sharing. Unfortunately, YouTube users may have malicious intentions, such as disseminating malware and profanity. One way to do so is using the comment field for this purpose. Although YouTube provides a built-in tool for spam control, yet it is insufficient for combating malicious and spam contents within the comments. In this paper, a comparative study of the common filtering techniques used for YouTube comment spam is conducted. The study deploys datasets extracted from YouTube using its Data API. According to the obtained results, high filtering accuracy (more than 98%) can be achieved with low-complexity algorithms, implying the possibility of developing a suitable browser extension to alleviate comment spam on YouTube in future.
自2005年成立以来,YouTube一直为视频分享提供重要的社交媒体平台。不幸的是,YouTube用户可能有恶意,如传播恶意软件和亵渎。实现这一目的的一种方法是使用注释字段。虽然YouTube提供了一个内置的垃圾邮件控制工具,但它不足以打击评论中的恶意和垃圾内容。本文对YouTube评论垃圾邮件常用的过滤技术进行了比较研究。该研究使用YouTube的Data API部署了从YouTube提取的数据集。根据获得的结果,使用低复杂度的算法可以实现较高的过滤准确率(超过98%),这意味着将来可以开发合适的浏览器扩展来减少YouTube上的评论垃圾。
{"title":"A comparative analysis of common YouTube comment spam filtering techniques","authors":"Abdullah O. Abdullah, M. A. Ali, M. Karabatak, A. Şengur","doi":"10.1109/ISDFS.2018.8355315","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355315","url":null,"abstract":"Ever since its development in 2005, YouTube has been providing a vital social media platform for video sharing. Unfortunately, YouTube users may have malicious intentions, such as disseminating malware and profanity. One way to do so is using the comment field for this purpose. Although YouTube provides a built-in tool for spam control, yet it is insufficient for combating malicious and spam contents within the comments. In this paper, a comparative study of the common filtering techniques used for YouTube comment spam is conducted. The study deploys datasets extracted from YouTube using its Data API. According to the obtained results, high filtering accuracy (more than 98%) can be achieved with low-complexity algorithms, implying the possibility of developing a suitable browser extension to alleviate comment spam on YouTube in future.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126247763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Perceptions of high school students regarding cyberbullying and precautions on coping with cyberbullying 高中生对网络欺凌的认知及应对措施
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355386
Songül Karabatak, A. Namli, M. Karabatak
The aim of this study is to reveal the perceptions of high school students regarding cyberbullying through metaphor analysis. The research data were obtained from 67 high school students in Elazığ Province during the academic year of 2017–2018. Qualitative research method was used in the study. In order to collect data students were asked to complete the prompt “Cyberbullying is like … Because …”. Both content and descriptive analysis techniques were utilized to analyze the data. In the analysis of the collected data, participants produced 46 valid metaphors about cyberbullying. Based on these metaphorical images, 10 categories were identified. According to findings most of the high school students had negative opinions about cyber bullying but very few of them also had positive opinions about cyberbullying such as pleasure source. At the end of the study, suggestions have been developed for school administrators, teachers and student about coping with cyberbulling.
本研究的目的是通过隐喻分析揭示高中生对网络欺凌的认知。研究数据来自Elazığ省2017-2018学年的67名高中生。本研究采用定性研究方法。为了收集数据,学生们被要求完成“网络欺凌就像……因为……”这一提示。使用内容分析和描述性分析技术来分析数据。在对收集到的数据的分析中,参与者提出了46个关于网络欺凌的有效隐喻。基于这些隐喻意象,我们确定了10个类别。调查结果显示,绝大多数高中生对网络欺凌持负面看法,但也有极少数高中生对网络欺凌如快乐来源持积极看法。在研究结束时,为学校管理人员、教师和学生提供了应对网络欺凌的建议。
{"title":"Perceptions of high school students regarding cyberbullying and precautions on coping with cyberbullying","authors":"Songül Karabatak, A. Namli, M. Karabatak","doi":"10.1109/ISDFS.2018.8355386","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355386","url":null,"abstract":"The aim of this study is to reveal the perceptions of high school students regarding cyberbullying through metaphor analysis. The research data were obtained from 67 high school students in Elazığ Province during the academic year of 2017–2018. Qualitative research method was used in the study. In order to collect data students were asked to complete the prompt “Cyberbullying is like … Because …”. Both content and descriptive analysis techniques were utilized to analyze the data. In the analysis of the collected data, participants produced 46 valid metaphors about cyberbullying. Based on these metaphorical images, 10 categories were identified. According to findings most of the high school students had negative opinions about cyber bullying but very few of them also had positive opinions about cyberbullying such as pleasure source. At the end of the study, suggestions have been developed for school administrators, teachers and student about coping with cyberbulling.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An overview of monitoring tools for real-time cyber-attacks 实时网络攻击监控工具概述
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355339
M. Baykara, Ugur Gurturk, Resul Das
Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.
网络安全是指旨在保护网络和数字世界之间交换的数据的可用性和完整性的预防措施和活动。信息安全利用硬件和软件技术保护数字数据免遭未经授权的访问、披露、操纵、更改或破坏。据信息安全领域的专家分析,一个中等规模的公司每月遭受的网络攻击超过2万次。根据所进行的分析,已经确定,虽然大多数攻击的风险水平不高,但对于重要数据来说是一种强烈的危险,并且这些攻击的严重程度增加了。提供实时分析的系统已被创建,以提高对这些日益增加的威胁和网络攻击的认识,并检测新的攻击。在本研究中,我们概述了用于实时可见全球网络攻击威胁系统的软件系统,这些系统根据攻击的目的地/来源国和物种/详细信息,根据世界上的网络攻击信息提供实时映射的动画。实时监控工具的设计目的是监视指示恶意活动的特定流量模式。
{"title":"An overview of monitoring tools for real-time cyber-attacks","authors":"M. Baykara, Ugur Gurturk, Resul Das","doi":"10.1109/ISDFS.2018.8355339","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355339","url":null,"abstract":"Network security refers to precautions and activities designed to protect the availability and integrity of data exchanged between the network and the digital world. Information security protects digital data from unauthorized access, disclosure, manipulation, alteration or destruction using both hardware and software technologies. According to an analysis by experts working in the field of information security, more than twenty thousand cyber-attacks per month are being made to a medium-sized company. As a result of the analyzes carried out, it has been determined that although the level of risk is not high in most of the attacks, it is an intense danger for important data and the severity of these attacks is increased. Systems that provide real-time analysis have been created to raise awareness of these increasing threats and cyber-attacks and to detect new attacks. In this study, we introduce an overview of software systems for real-time visibility into global cyber-attacks threat systems, which provide animations in real-time mappings based on information about cyber-attacks on the world, according to the destination/source country of the attack and species/detail information. Real-time monitoring tools are designed to monitor for specific traffic patterns that are indicative of malicious activity.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Minutiae based partial fingerprint registration and matching method 基于细节的部分指纹配准与匹配方法
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355343
Naveed Ahmed, A. Varol
Everyone in this world has a unique set of fingerprints and these fingerprints do not change throughout one's life, and is not questionable. The question is whether investigators can accurately link the collected fingerprints to the offender. Our proposed method can be used to match partial fingerprints with collection of fingerprints of all known criminals and suspects. In this method system completely relies on localized features (minutiae) for registration and matching process. Due to localized in nature minutiae are invariant to translation, rotation and displacement. Errors in alignment lead to errors in matching process.
在这个世界上,每个人都有一套独特的指纹,这些指纹在一个人的一生中不会改变,这是毋庸置疑的。问题是调查人员能否准确地将收集到的指纹与罪犯联系起来。我们提出的方法可以将部分指纹与所有已知罪犯和嫌疑人的指纹集合进行匹配。在该方法中,系统完全依赖于局部特征(细节)进行配准和匹配。由于其局域性,细部对平移、旋转和位移是不变的。对准错误会导致匹配过程中的错误。
{"title":"Minutiae based partial fingerprint registration and matching method","authors":"Naveed Ahmed, A. Varol","doi":"10.1109/ISDFS.2018.8355343","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355343","url":null,"abstract":"Everyone in this world has a unique set of fingerprints and these fingerprints do not change throughout one's life, and is not questionable. The question is whether investigators can accurately link the collected fingerprints to the offender. Our proposed method can be used to match partial fingerprints with collection of fingerprints of all known criminals and suspects. In this method system completely relies on localized features (minutiae) for registration and matching process. Due to localized in nature minutiae are invariant to translation, rotation and displacement. Errors in alignment lead to errors in matching process.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115724034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel approach to ransomware: Designing a safe zone system 一种新的勒索软件方法:设计一个安全区域系统
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355317
M. Baykara, Baran Sekin
It is vital to protect the files and data for institutions, organizations and individuals. For this, people and institutions develop methods to provide both physical and digital security, and they spend thousands of dollars over the years for measures. Ransomware is undoubtedly one of the most frequently encountered malicious software that harms people and organizations. These viruses are used to encrypt all important data on the infected computer. Ransomware usually targets file types such as PDF, Word, Excel that can store important documents, bills, financial data, and makes these documents inaccessible by encrypting them. The restoration of these encrypted files is only possible with the keyword in the hand of the person who wrote the virus. This key word is given by an aggressive fee, which means ransom against documents. These fees are usually very high and there is no guarantee that the attacker will not want more fee. In this paper, it is aimed to find solutions to these problems and to minimize possible harm. In order to do so, an area called safezone has been created and prevented from being replaced by other software by moving important documents to this zone.
保护机构、组织和个人的文件和数据至关重要。为此,人们和机构开发了提供物理和数字安全的方法,多年来他们在这些措施上花费了数千美元。勒索软件无疑是最常见的危害个人和组织的恶意软件之一。这些病毒用于加密受感染计算机上的所有重要数据。勒索软件通常以PDF、Word、Excel等文件类型为目标,这些文件可以存储重要文件、账单、财务数据,并通过加密使这些文件无法访问。要恢复这些加密文件,关键字必须掌握在编写病毒的人手中。这个关键词是由一个激进的费用给出的,这意味着对文件的赎金。这些费用通常非常高,并且不能保证攻击者不想要更多的费用。本文旨在找到解决这些问题的方法,并将可能的危害降到最低。为了做到这一点,创建了一个称为安全区的区域,并通过将重要文件移到该区域来防止被其他软件取代。
{"title":"A novel approach to ransomware: Designing a safe zone system","authors":"M. Baykara, Baran Sekin","doi":"10.1109/ISDFS.2018.8355317","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355317","url":null,"abstract":"It is vital to protect the files and data for institutions, organizations and individuals. For this, people and institutions develop methods to provide both physical and digital security, and they spend thousands of dollars over the years for measures. Ransomware is undoubtedly one of the most frequently encountered malicious software that harms people and organizations. These viruses are used to encrypt all important data on the infected computer. Ransomware usually targets file types such as PDF, Word, Excel that can store important documents, bills, financial data, and makes these documents inaccessible by encrypting them. The restoration of these encrypted files is only possible with the keyword in the hand of the person who wrote the virus. This key word is given by an aggressive fee, which means ransom against documents. These fees are usually very high and there is no guarantee that the attacker will not want more fee. In this paper, it is aimed to find solutions to these problems and to minimize possible harm. In order to do so, an area called safezone has been created and prevented from being replaced by other software by moving important documents to this zone.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The need for a global response against cybercrime: Qatar as a case study 全球应对网络犯罪的必要性:以卡塔尔为例
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355331
Aliya Tabassum, Mohammad Saleh Mustafa, S. A. Maadeed
Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless communication and extensive usage of cyberspace has weakened privacy. Eventually, cybercrime has become the substantial threat to all the organizations in the world because of its devastating implications on diverse sectors associated to human. This paper explores few impacts of cybercrime to understand the intensity of damage it can cause. Besides, Qatar is taken as a case study to emphasize the exigency of securing cyberspace. The contribution of this work identifies the past cyber-attacks in Qatar to generate consciousness and to trigger actions for improving national security. The recent major cyber-attack on Qatar News Agency which led to catastrophic results and threatened Qatar's diplomacy is also outlined along with the critical challenges that are being faced by the security of Qatar. As cybercrime crosses borders of all nations, this paper emphasizes the need for global response to curb it. Additionally, it delineates the fact that attacks in cyberspace are not just driven by financial gain, but by politics or disinformation to denigrate and cause emotional harm.
网络安全是21世纪生活中最重要的问题之一,保护信息系统对全球各国政府和企业来说是一项艰巨的任务。无线通信的迅猛发展和网络空间的广泛使用削弱了隐私。最终,网络犯罪已经成为世界上所有组织的重大威胁,因为它对与人类相关的各个部门造成了毁灭性的影响。本文探讨了网络犯罪的一些影响,以了解其可能造成的破坏强度。此外,本文还以卡塔尔为例,强调网络空间安全的迫切性。这项工作的贡献确定了卡塔尔过去的网络攻击,以产生意识并引发改善国家安全的行动。最近针对卡塔尔通讯社的重大网络攻击导致了灾难性的后果,并威胁到卡塔尔的外交,同时也概述了卡塔尔安全面临的重大挑战。由于网络犯罪跨越了所有国家的边界,本文强调需要全球应对来遏制它。此外,它描述了这样一个事实,即网络空间中的攻击不仅仅是由经济利益驱动的,而是由政治或虚假信息来诋毁和造成情感伤害。
{"title":"The need for a global response against cybercrime: Qatar as a case study","authors":"Aliya Tabassum, Mohammad Saleh Mustafa, S. A. Maadeed","doi":"10.1109/ISDFS.2018.8355331","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355331","url":null,"abstract":"Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless communication and extensive usage of cyberspace has weakened privacy. Eventually, cybercrime has become the substantial threat to all the organizations in the world because of its devastating implications on diverse sectors associated to human. This paper explores few impacts of cybercrime to understand the intensity of damage it can cause. Besides, Qatar is taken as a case study to emphasize the exigency of securing cyberspace. The contribution of this work identifies the past cyber-attacks in Qatar to generate consciousness and to trigger actions for improving national security. The recent major cyber-attack on Qatar News Agency which led to catastrophic results and threatened Qatar's diplomacy is also outlined along with the critical challenges that are being faced by the security of Qatar. As cybercrime crosses borders of all nations, this paper emphasizes the need for global response to curb it. Additionally, it delineates the fact that attacks in cyberspace are not just driven by financial gain, but by politics or disinformation to denigrate and cause emotional harm.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A novel hardware Trojan design based on one-hot code 一种基于单热码的新型硬件木马设计
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355314
Di Wang, Liji Wu, Xiangmin Zhang, Xingjun Wu
Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security. In this work, we designed a novel counter-type Hardware Trojan based on One-hot code, which has better performance than classic solutions. By improvement in this work, the dynamic power consumption of counter Trojan has reached a decrease of 25%. At the same time, power consumption peak caused by flipping like 0111111→1000000 under binary encoding was avoided. The performance of designed Trojan has been fully tested in the software-hardware co-verification environment, which shows that Trojan implantation did not influence the proper work of background circuit, only did some tricks in the way we need; and the Trojan latent period is controllable by connecting Trojan circuit to different trigger nodes.
随着人们对硬件安全意识的提高,硬件木马的研究成为近年来一个重要的研究课题。本文设计了一种基于One-hot代码的新型反型硬件木马,其性能优于经典解决方案。通过对该工作的改进,反木马的动态功耗降低了25%。同时避免了二进制编码下0111111→1000000等翻转引起的功耗峰值。设计的木马在软硬件协同验证环境下进行了充分的性能测试,结果表明木马的植入并不影响后台电路的正常工作,只是按照我们需要的方式做了一些诡计;通过将木马电路连接到不同的触发节点来控制木马潜伏期。
{"title":"A novel hardware Trojan design based on one-hot code","authors":"Di Wang, Liji Wu, Xiangmin Zhang, Xingjun Wu","doi":"10.1109/ISDFS.2018.8355314","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355314","url":null,"abstract":"Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security. In this work, we designed a novel counter-type Hardware Trojan based on One-hot code, which has better performance than classic solutions. By improvement in this work, the dynamic power consumption of counter Trojan has reached a decrease of 25%. At the same time, power consumption peak caused by flipping like 0111111→1000000 under binary encoding was avoided. The performance of designed Trojan has been fully tested in the software-hardware co-verification environment, which shows that Trojan implantation did not influence the proper work of background circuit, only did some tricks in the way we need; and the Trojan latent period is controllable by connecting Trojan circuit to different trigger nodes.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Alternative substitutional box structures for DES DES的替代盒结构
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355368
F. Özkaynak, Mukhlis I. Muhamad
The DES algorithm is an important encryption protocol that has influenced many cryptology studies. It is still used today in many practical applications such as electronic passport. But it is an important problem that the design parameters of substitution boxes of this algorithm are unknown. In this work, we have proposed alternatives to DES s-box structures to solve this problem. The analysis results of the proposed structures are equivalent to DES s-box structures.
DES算法是一种重要的加密协议,影响了许多密码学研究。时至今日,它仍在许多实际应用中使用,如电子护照。但该算法的一个重要问题是替换盒的设计参数未知。在这项工作中,我们提出了DES -box结构的替代方案来解决这个问题。所提出结构的分析结果与DES - s-box结构等效。
{"title":"Alternative substitutional box structures for DES","authors":"F. Özkaynak, Mukhlis I. Muhamad","doi":"10.1109/ISDFS.2018.8355368","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355368","url":null,"abstract":"The DES algorithm is an important encryption protocol that has influenced many cryptology studies. It is still used today in many practical applications such as electronic passport. But it is an important problem that the design parameters of substitution boxes of this algorithm are unknown. In this work, we have proposed alternatives to DES s-box structures to solve this problem. The analysis results of the proposed structures are equivalent to DES s-box structures.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparison of classifiers on reduced phishing website dataset 分类器在精简网络钓鱼网站数据集上的性能比较
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355357
M. Karabatak, Twana Mustafa
The Internet is becoming a necessary and important tool in everyday life. However, Internet users might have poor security for different kinds of web threats, which may lead to financial loss or clients lacking trust in online trading and banking. Phishing is described as a skill of impersonating a trusted website aiming to obtain private and secret information such as a username and password or social security and credit card number. In this paper, phising website dataset taken from UCI was investigated. Its dimension was reduced and the performance comparison of classification algorithms is studied on reduced phishing website dataset. Phishing website dataset was taken from UCI machine learning repository. This dataset consists of 11055 records and 31 features. Feature selection algorithms were applied to reduce the dimension of phishing website dataset and to obtain higher classification performance. Then, the performance of classification algorithms is compared to other data mining classification algorithms. Finally, a comparative classification performance on the reduced dataset by using the common classification algorithms is given.
互联网正在成为日常生活中必不可少的重要工具。然而,互联网用户可能对各种网络威胁的安全性较差,这可能导致经济损失或客户对网上交易和银行缺乏信任。网络钓鱼被描述为一种模仿可信网站的技能,目的是获取私人和秘密信息,如用户名和密码或社会安全号码和信用卡号码。本文对来自UCI的网络钓鱼网站数据集进行了研究。将其降维,并在降维后的钓鱼网站数据集上研究了分类算法的性能比较。钓鱼网站数据取自UCI机器学习存储库。该数据集由11055条记录和31个特征组成。采用特征选择算法对钓鱼网站数据集进行降维,以获得更高的分类性能。然后,将分类算法的性能与其他数据挖掘分类算法进行比较。最后,比较了常用分类算法在约简后的数据集上的分类性能。
{"title":"Performance comparison of classifiers on reduced phishing website dataset","authors":"M. Karabatak, Twana Mustafa","doi":"10.1109/ISDFS.2018.8355357","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355357","url":null,"abstract":"The Internet is becoming a necessary and important tool in everyday life. However, Internet users might have poor security for different kinds of web threats, which may lead to financial loss or clients lacking trust in online trading and banking. Phishing is described as a skill of impersonating a trusted website aiming to obtain private and secret information such as a username and password or social security and credit card number. In this paper, phising website dataset taken from UCI was investigated. Its dimension was reduced and the performance comparison of classification algorithms is studied on reduced phishing website dataset. Phishing website dataset was taken from UCI machine learning repository. This dataset consists of 11055 records and 31 features. Feature selection algorithms were applied to reduce the dimension of phishing website dataset and to obtain higher classification performance. Then, the performance of classification algorithms is compared to other data mining classification algorithms. Finally, a comparative classification performance on the reduced dataset by using the common classification algorithms is given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132936515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1