首页 > 最新文献

Journal of Information Processing最新文献

英文 中文
Demonstration Experiment of a System that Helps Users Select Educational Content Using Terms in Basic/advanced Relationships 基于基本/高级关系的词汇选择教学内容系统的演示实验
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.766
Shoko Fujii, Shinya Abe, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa
With a range of learning platforms available on the Internet and the increasing use of video content in education, there have been many studies on using ontologies to support education and learning. However, in many cases, the connections among content systematized in this way are confined within a subject, and there is no learning across subjects or expansion of learners' interests beyond individual subjects. We aimed to connect all educational content in a way that goes beyond school subjects and curricula. In this study, we re-examined the learning sequence of subject matter terms over the course of the learning process, redefined it as a set of basic/advanced relationships among the terms, and proposed a method of estimating the appropriate ordering of content for learning by structuring and utilizing this terminological attribute. We also prototyped a system incorporating our proposed method to help users select educational content and tested it in a proof-of-concept experiment. By comparing the textbook-based presentation of related content with our proposed cross-subject presentation, we identified each method's characteristics and confirmed the proposed method's effectiveness at expanding learners' interests.
随着互联网上的一系列学习平台的出现以及视频内容在教育中的使用越来越多,人们对使用本体来支持教育和学习进行了许多研究。然而,在很多情况下,以这种方式系统化的内容之间的联系仅限于一个学科,没有跨学科的学习,也没有学习者兴趣超越单个学科的扩展。我们的目标是以一种超越学校科目和课程的方式连接所有教育内容。在本研究中,我们重新审视了主题术语在学习过程中的学习顺序,将其重新定义为术语之间的一组基本/高级关系,并提出了一种通过构建和利用术语属性来估计学习内容的适当顺序的方法。我们还设计了一个系统原型,结合我们提出的方法来帮助用户选择教育内容,并在概念验证实验中对其进行了测试。通过比较基于教科书的相关内容演示和我们提出的跨学科演示,我们确定了每种方法的特点,并证实了提出的方法在扩大学习者兴趣方面的有效性。
{"title":"Demonstration Experiment of a System that Helps Users Select Educational Content Using Terms in Basic/advanced Relationships","authors":"Shoko Fujii, Shinya Abe, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa","doi":"10.2197/ipsjjip.31.766","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.766","url":null,"abstract":"With a range of learning platforms available on the Internet and the increasing use of video content in education, there have been many studies on using ontologies to support education and learning. However, in many cases, the connections among content systematized in this way are confined within a subject, and there is no learning across subjects or expansion of learners' interests beyond individual subjects. We aimed to connect all educational content in a way that goes beyond school subjects and curricula. In this study, we re-examined the learning sequence of subject matter terms over the course of the learning process, redefined it as a set of basic/advanced relationships among the terms, and proposed a method of estimating the appropriate ordering of content for learning by structuring and utilizing this terminological attribute. We also prototyped a system incorporating our proposed method to help users select educational content and tested it in a proof-of-concept experiment. By comparing the textbook-based presentation of related content with our proposed cross-subject presentation, we identified each method's characteristics and confirmed the proposed method's effectiveness at expanding learners' interests.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135703751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Container-native Managed Data Sharing 容器原生托管数据共享
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.689
Koichi Onoue, Masaru Ueno, Yui Noma
Cross-industrial collaboration can yield disruptive innovations. However, there are fears regarding data sharing across different organizations. Even if data providers make contracts covering the data shared with their consumers, they will not be able to delete the shared data in accordance with the expiration dates and modify them after they were delivered to the consumers. Data consumers need to be extremely careful about management of shared data since huge penalties are imposed against violations of data protection laws. To allay these fears, we propose a system to handle external data management instead of data providers and consumers. In our system, containerized lifetime controllers delete expired shared data in accordance with contracts for shared data called life cycle policies. To allow only service programs stipulated in the policies to manipulate shared data, containerized volume controllers enforce the access control on the basis of the FUSE interceptions and the /proc file system. The proposed system is transparent to service programs because the containerized controllers run in execution environments that are separate from service programs. The proposed system can be applied to multiple container orchestration clusters in which a provider and consumer independently administer Kubernetes container orchestrators, as well as a single container orchestration cluster. We built a prototype system on Kubernetes container orchestrators presented by the Kubernetes community and public cloud service providers. Experimental results demonstrate that the proposed system achieves data sharing between a provider and consumer with moderate overheads for disk consumption of the containerized controllers, the extensions of the volume drivers, and execution time of the FUSE access control.
跨行业合作可以产生颠覆性创新。然而,对于不同组织之间的数据共享存在担忧。即使数据提供商签订了与消费者共享数据的合同,也不能按照有效期删除共享数据,也不能在数据交付给消费者后对其进行修改。数据消费者需要非常小心共享数据的管理,因为违反数据保护法会受到巨额罚款。为了减轻这些担忧,我们提出了一个系统来处理外部数据管理,而不是数据提供者和消费者。在我们的系统中,容器化生命周期控制器根据称为生命周期策略的共享数据契约删除过期的共享数据。为了只允许策略中规定的服务程序操作共享数据,容器化卷控制器在FUSE拦截和/proc文件系统的基础上实施访问控制。所建议的系统对服务程序是透明的,因为容器化的控制器运行在与服务程序分离的执行环境中。建议的系统可以应用于多个容器编排集群,其中提供者和消费者独立管理Kubernetes容器编排器,也可以应用于单个容器编排集群。我们在Kubernetes社区和公共云服务提供商提供的Kubernetes容器编排器上构建了一个原型系统。实验结果表明,该系统在容器化控制器的磁盘消耗、卷驱动程序的扩展和FUSE访问控制的执行时间方面的开销适中,实现了提供者和消费者之间的数据共享。
{"title":"Container-native Managed Data Sharing","authors":"Koichi Onoue, Masaru Ueno, Yui Noma","doi":"10.2197/ipsjjip.31.689","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.689","url":null,"abstract":"Cross-industrial collaboration can yield disruptive innovations. However, there are fears regarding data sharing across different organizations. Even if data providers make contracts covering the data shared with their consumers, they will not be able to delete the shared data in accordance with the expiration dates and modify them after they were delivered to the consumers. Data consumers need to be extremely careful about management of shared data since huge penalties are imposed against violations of data protection laws. To allay these fears, we propose a system to handle external data management instead of data providers and consumers. In our system, containerized lifetime controllers delete expired shared data in accordance with contracts for shared data called life cycle policies. To allow only service programs stipulated in the policies to manipulate shared data, containerized volume controllers enforce the access control on the basis of the FUSE interceptions and the /proc file system. The proposed system is transparent to service programs because the containerized controllers run in execution environments that are separate from service programs. The proposed system can be applied to multiple container orchestration clusters in which a provider and consumer independently administer Kubernetes container orchestrators, as well as a single container orchestration cluster. We built a prototype system on Kubernetes container orchestrators presented by the Kubernetes community and public cloud service providers. Experimental results demonstrate that the proposed system achieves data sharing between a provider and consumer with moderate overheads for disk consumption of the containerized controllers, the extensions of the volume drivers, and execution time of the FUSE access control.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History 利用属性信息和访问日志历史防止欺诈访问的检测方法分析与思考
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.602
Michio Kunimoto, Takao Okubo
Fraudulent access by way of nInternet banking, credit cards and e-commerce are a serious problem. Fraudsters intend to steal credentials and log in to these websites in many ways such as phishing, malware infection, list based attack etc. There are products and services to prevent fraudulent access like fraud detection software and multi-factor authentication, however these have issues such as installation costs, detection accuracy and operation cost. Some security vendors provide client-side software to prevent fraud, but it is usually difficult for the companies to compel their end-users to install additional software because it may cause trouble and decrease usability. Regarding these issues we are researching an effective fraud detection method using server-side log information. In this paper, we show results from analyzing the attacker device attribute information and the environmental differences between genuine users and fraudsters based on the access log history from actual services and found that the attacker's environment changes year by year. We also discuss the effectiveness of the fraud detection methods described in previous research and effective detection methods utilizing real-world data.
通过网上银行、信用卡和电子商务的欺诈接入是一个严重的问题。欺诈者企图窃取凭证并以多种方式登录这些网站,如网络钓鱼、恶意软件感染、基于列表的攻击等。有一些产品和服务可以防止欺诈访问,如欺诈检测软件和多因素身份验证,但这些都存在安装成本、检测准确性和运营成本等问题。一些安全供应商提供客户端软件来防止欺诈,但公司通常很难强迫其最终用户安装额外的软件,因为这可能会造成麻烦并降低可用性。针对这些问题,我们正在研究一种利用服务器端日志信息的有效的欺诈检测方法。本文根据实际服务的访问日志历史,分析攻击者的设备属性信息和真实用户与欺诈者的环境差异,发现攻击者的环境是逐年变化的。我们还讨论了先前研究中描述的欺诈检测方法的有效性以及利用真实世界数据的有效检测方法。
{"title":"Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History","authors":"Michio Kunimoto, Takao Okubo","doi":"10.2197/ipsjjip.31.602","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.602","url":null,"abstract":"Fraudulent access by way of nInternet banking, credit cards and e-commerce are a serious problem. Fraudsters intend to steal credentials and log in to these websites in many ways such as phishing, malware infection, list based attack etc. There are products and services to prevent fraudulent access like fraud detection software and multi-factor authentication, however these have issues such as installation costs, detection accuracy and operation cost. Some security vendors provide client-side software to prevent fraud, but it is usually difficult for the companies to compel their end-users to install additional software because it may cause trouble and decrease usability. Regarding these issues we are researching an effective fraud detection method using server-side log information. In this paper, we show results from analyzing the attacker device attribute information and the environmental differences between genuine users and fraudsters based on the access log history from actual services and found that the attacker's environment changes year by year. We also discuss the effectiveness of the fraud detection methods described in previous research and effective detection methods utilizing real-world data.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers 使用弱SPN块密码深入研究基于深度学习的输出预测攻击
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.550
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi
Cryptanalysis in a blackbox setting using deep learning is powerful because it does not require the attacker to have knowledge about the internal structure of the cryptographic algorithm. Thus, it is necessary to design a symmetric key cipher that is secure against cryptanalysis using deep learning. Kimura et al. (AIoTS 2022) investigated deep learning-based attacks on the small PRESENT-[4] block cipher with limited component changes, identifying characteristics specific to these attacks which remain unaffected by linear/differential cryptanalysis. Finding such characteristics is important because exploiting such characteristics can make the target cipher vulnerable to deep learning-based attacks. Thus, this paper extends a previous method to explore clues for designing symmetric-key cryptographic algorithms that are secure against deep learning-based attacks. We employ small PRESENT-[4] with two weak S-boxes, which are known to be weak against differential/linear attacks, to clarify the relationship between classical and deep learning-based attacks. As a result, we demonstrated the success probability of our deep learning-based whitebox analysis tends to be affected by the success probability of classical cryptanalysis methods. And we showed our whitebox analysis achieved the same attack capability as traditional methods even when the S-box of the target cipher was changed to a weak one.
使用深度学习的黑盒密码分析功能强大,因为它不需要攻击者了解加密算法的内部结构。因此,有必要设计一个使用深度学习的对称密钥密码,以防止密码分析。Kimura等人(AIoTS 2022)研究了基于深度学习的小型PRESENT-[4]分组密码攻击,其组件变化有限,识别出这些攻击特有的特征,这些攻击不受线性/差分密码分析的影响。找到这些特征很重要,因为利用这些特征可以使目标密码容易受到基于深度学习的攻击。因此,本文扩展了以前的方法来探索设计对称密钥加密算法的线索,这些算法可以抵御基于深度学习的攻击。我们使用了带有两个弱s盒的小型PRESENT-[4]来澄清经典攻击和基于深度学习的攻击之间的关系,这两个弱s盒被认为对微分/线性攻击很弱。因此,我们证明了基于深度学习的白盒分析的成功概率往往会受到经典密码分析方法成功概率的影响。结果表明,即使将目标密码的s盒改为弱s盒,我们的白盒分析方法也能达到与传统方法相同的攻击能力。
{"title":"A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers","authors":"Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi","doi":"10.2197/ipsjjip.31.550","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.550","url":null,"abstract":"Cryptanalysis in a blackbox setting using deep learning is powerful because it does not require the attacker to have knowledge about the internal structure of the cryptographic algorithm. Thus, it is necessary to design a symmetric key cipher that is secure against cryptanalysis using deep learning. Kimura et al. (AIoTS 2022) investigated deep learning-based attacks on the small PRESENT-[4] block cipher with limited component changes, identifying characteristics specific to these attacks which remain unaffected by linear/differential cryptanalysis. Finding such characteristics is important because exploiting such characteristics can make the target cipher vulnerable to deep learning-based attacks. Thus, this paper extends a previous method to explore clues for designing symmetric-key cryptographic algorithms that are secure against deep learning-based attacks. We employ small PRESENT-[4] with two weak S-boxes, which are known to be weak against differential/linear attacks, to clarify the relationship between classical and deep learning-based attacks. As a result, we demonstrated the success probability of our deep learning-based whitebox analysis tends to be affected by the success probability of classical cryptanalysis methods. And we showed our whitebox analysis achieved the same attack capability as traditional methods even when the S-box of the target cipher was changed to a weak one.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135443098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace 编者致《保障网络空间的计算机安全技术》特刊的寄语
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.522
Toshihiro Ohigashi
{"title":"Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace","authors":"Toshihiro Ohigashi","doi":"10.2197/ipsjjip.31.522","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.522","url":null,"abstract":"","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Susceptibility to Phishing via Business Chat through Online Survey 基于在线调查的商务聊天网络钓鱼易感性分析
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.609
Rei Yamagishi, Shota Fujii
Phishing via email has been spreading not only to individuals but also to companies, and various studies have been conducted on it. In addition, the use of chat has been increasing, and phishing via chat is assumed to be occurring, but the risk and susceptibility to phishing via chat have not been clarified. In this study, we conducted a questionnaire survey of 304 participants. In the survey, we divided the participants into two groups, designed similar phishing scenarios using email and chat, and conducted a role play susceptibility study. The results of the study indicated that the susceptibility of chat was as high as or higher than that of email, suggesting that phishing via chat is risky. On the basis of the results, we also summarized methods for reducing the risk of phishing in chat and recommendations for future research.
通过电子邮件进行的网络钓鱼不仅向个人传播,而且还向公司传播,对此进行了各种研究。此外,聊天的使用越来越多,通过聊天进行网络钓鱼被认为正在发生,但通过聊天进行网络钓鱼的风险和易感性尚未明确。在本研究中,我们对304名参与者进行了问卷调查。在调查中,我们将参与者分为两组,设计了使用电子邮件和聊天的类似网络钓鱼场景,并进行了角色扮演易感性研究。研究结果表明,聊天的易感性与电子邮件一样高,甚至更高,表明通过聊天进行网络钓鱼是有风险的。在此基础上,总结了降低聊天网络钓鱼风险的方法,并对今后的研究提出了建议。
{"title":"An Analysis of Susceptibility to Phishing via Business Chat through Online Survey","authors":"Rei Yamagishi, Shota Fujii","doi":"10.2197/ipsjjip.31.609","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.609","url":null,"abstract":"Phishing via email has been spreading not only to individuals but also to companies, and various studies have been conducted on it. In addition, the use of chat has been increasing, and phishing via chat is assumed to be occurring, but the risk and susceptibility to phishing via chat have not been clarified. In this study, we conducted a questionnaire survey of 304 participants. In the survey, we divided the participants into two groups, designed similar phishing scenarios using email and chat, and conducted a role play susceptibility study. The results of the study indicated that the susceptibility of chat was as high as or higher than that of email, suggesting that phishing via chat is risky. On the basis of the results, we also summarized methods for reducing the risk of phishing in chat and recommendations for future research.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MathTOUCH Editor: Rich-text Editor for Math E-learning Using an Intelligent Math Input Interface MathTOUCH编辑器:使用智能数学输入界面的数学电子学习的富文本编辑器
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.775
Shizuka Shirai, Takahiro Nakahara, Tetsuo Fukui
In this study, we presented MathTOUCH, a rich-text editor, to create mathematical documents. In mathematics e-learning with learning management systems, existing math input methods have heavy workloads; therefore, math notations are a long-standing challenge. Furthermore, when creating mathematical documents, such as writing reports and posting questions on the forum, users must enter both texts in a natural language input manner and mathematical expressions in a math input manner. Hence, users' workload increases. To address this issue, we developed the MathTOUCH editor to implement an intelligent math input interface that enables users to enter equations through predictive conversion from the colloquial-style text. A user study was conducted with 71 participants to evaluate the effectiveness of the proposed editor. The results indicate that users could enter equations with the MathTOUCH editor approximately 1.5 times faster than with a standard interface, and the participants also reported greater subjective satisfaction.
在本研究中,我们介绍了一个富文本编辑器MathTOUCH来创建数学文档。在具有学习管理系统的数学电子学习中,现有的数学输入方法工作量较大;因此,数学符号是一个长期存在的挑战。此外,在创建数学文档时,例如编写报告和在论坛上发布问题,用户必须以自然语言输入方式输入文本,并以数学输入方式输入数学表达式。因此,用户的工作量增加了。为了解决这个问题,我们开发了MathTOUCH编辑器来实现一个智能数学输入界面,使用户能够通过预测转换从口语风格的文本输入方程。对71名参与者进行了一项用户研究,以评估拟议编辑器的有效性。结果表明,用户使用MathTOUCH编辑器输入方程的速度比使用标准界面快约1.5倍,参与者也报告了更高的主观满意度。
{"title":"MathTOUCH Editor: Rich-text Editor for Math E-learning Using an Intelligent Math Input Interface","authors":"Shizuka Shirai, Takahiro Nakahara, Tetsuo Fukui","doi":"10.2197/ipsjjip.31.775","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.775","url":null,"abstract":"In this study, we presented MathTOUCH, a rich-text editor, to create mathematical documents. In mathematics e-learning with learning management systems, existing math input methods have heavy workloads; therefore, math notations are a long-standing challenge. Furthermore, when creating mathematical documents, such as writing reports and posting questions on the forum, users must enter both texts in a natural language input manner and mathematical expressions in a math input manner. Hence, users' workload increases. To address this issue, we developed the MathTOUCH editor to implement an intelligent math input interface that enables users to enter equations through predictive conversion from the colloquial-style text. A user study was conducted with 71 participants to evaluate the effectiveness of the proposed editor. The results indicate that users could enter equations with the MathTOUCH editor approximately 1.5 times faster than with a standard interface, and the participants also reported greater subjective satisfaction.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135703765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Type Checking Data Structures More Complex than Trees 类型检查数据结构比树更复杂
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.112
Jin Sano, Naoki Yamamoto, Kazunori Ueda
Graphs are a generalized concept that encompasses more complex data structures than trees, such as difference lists, doubly-linked lists, skip lists, and leaf-linked trees. Normally, these structures are handled with destructive assignments to heaps, which is opposed to a purely functional programming style and makes verification difficult. We propose a new purely functional language, λGT, that handles graphs as immutable, first-class data structures with a pattern matching mechanism based on Graph Transformation and developed a new type system, FGT, for the language. Our approach is in contrast with the analysis of pointer manipulation programs using separation logic, shape analysis, etc. in that (i) we do not consider destructive operations but pattern matchings over graphs provided by the new higher-level language that abstract pointers and heaps away and that (ii) we pursue what properties can be established automatically using a rather simple typing framework.
图是一个广义的概念,它包含比树更复杂的数据结构,如差表、双链表、跳跃表和叶链树。通常,这些结构是通过对堆的破坏性赋值来处理的,这与纯函数式编程风格相反,并且使验证变得困难。我们提出了一种新的纯函数式语言λGT,它将图作为不可变的一级数据结构处理,并采用基于图变换的模式匹配机制,并为该语言开发了一种新的类型系统FGT。我们的方法与使用分离逻辑、形状分析等来分析指针操作程序的方法相反,因为(i)我们不考虑破坏性操作,而是考虑由抽象指针和堆的新高级语言提供的图形的模式匹配,(ii)我们追求可以使用相当简单的类型框架自动建立的属性。
{"title":"Type Checking Data Structures More Complex than Trees","authors":"Jin Sano, Naoki Yamamoto, Kazunori Ueda","doi":"10.2197/ipsjjip.31.112","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.112","url":null,"abstract":"Graphs are a generalized concept that encompasses more complex data structures than trees, such as difference lists, doubly-linked lists, skip lists, and leaf-linked trees. Normally, these structures are handled with destructive assignments to heaps, which is opposed to a purely functional programming style and makes verification difficult. We propose a new purely functional language, λGT, that handles graphs as immutable, first-class data structures with a pattern matching mechanism based on Graph Transformation and developed a new type system, FGT, for the language. Our approach is in contrast with the analysis of pointer manipulation programs using separation logic, shape analysis, etc. in that (i) we do not consider destructive operations but pattern matchings over graphs provided by the new higher-level language that abstract pointers and heaps away and that (ii) we pursue what properties can be established automatically using a rather simple typing framework.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135534582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers 了解Web浏览器权限机制的不一致性
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.620
Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
Modern Web services provide advanced features by utilizing hardware resources on the user's device. Web browsers implement a user consent-based permission model to protect user privacy. In this study, we developed PERMIUM, a web browser analysis framework that automatically analyzes the behavior of permission mechanisms implemented by various browsers. We systematically studied the behavior of permission mechanisms for 22 major browser implementations running on five different operating systems. We found fragmented implementations. Implementations between browsers running on different operating systems are not always identical. We determined that implementation inconsistencies could lead to privacy risks. We identified gaps between browser permission implementations and user perceptions from the user study corresponding to the analyses using PERMIUM. Based on the implementation inconsistencies, we developed two proof-of-concept attacks and evaluated their feasibility. The first attack uses permission information to secretly track the user. The second attack aims to create a situation in which the user cannot correctly determine the origin of the permission request and the user mistakenly grants permission. Finally, we clarify the technical issues that must be standardized in privacy mechanisms and provide recommendations to OS/browser vendors to mitigate the threats identified in this study.
现代Web服务通过利用用户设备上的硬件资源来提供高级特性。Web浏览器实现了基于用户同意的权限模型,以保护用户隐私。在这项研究中,我们开发了PERMIUM,这是一个web浏览器分析框架,可以自动分析各种浏览器实现的权限机制的行为。我们系统地研究了运行在五种不同操作系统上的22种主要浏览器实现的权限机制行为。我们发现了碎片化的实现。运行在不同操作系统上的浏览器之间的实现并不总是相同的。我们认为,实现上的不一致可能会导致隐私风险。我们从与使用PERMIUM分析相对应的用户研究中发现了浏览器权限实现和用户感知之间的差距。基于实现的不一致性,我们开发了两种概念验证攻击并评估了它们的可行性。第一种攻击利用权限信息秘密跟踪用户。第二种攻击的目的是造成一种情况,即用户无法正确确定权限请求的来源,从而错误地授予权限。最后,我们澄清了在隐私机制中必须标准化的技术问题,并为操作系统/浏览器供应商提供建议,以减轻本研究中确定的威胁。
{"title":"Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers","authors":"Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori","doi":"10.2197/ipsjjip.31.620","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.620","url":null,"abstract":"Modern Web services provide advanced features by utilizing hardware resources on the user's device. Web browsers implement a user consent-based permission model to protect user privacy. In this study, we developed PERMIUM, a web browser analysis framework that automatically analyzes the behavior of permission mechanisms implemented by various browsers. We systematically studied the behavior of permission mechanisms for 22 major browser implementations running on five different operating systems. We found fragmented implementations. Implementations between browsers running on different operating systems are not always identical. We determined that implementation inconsistencies could lead to privacy risks. We identified gaps between browser permission implementations and user perceptions from the user study corresponding to the analyses using PERMIUM. Based on the implementation inconsistencies, we developed two proof-of-concept attacks and evaluated their feasibility. The first attack uses permission information to secretly track the user. The second attack aims to create a situation in which the user cannot correctly determine the origin of the permission request and the user mistakenly grants permission. Finally, we clarify the technical issues that must be standardized in privacy mechanisms and provide recommendations to OS/browser vendors to mitigate the threats identified in this study.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend 通信工具端到端加密方案的密码分析及其研究趋势
Q4 Computer Science Pub Date : 2023-01-01 DOI: 10.2197/ipsjjip.31.523
Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu
This paper summarizes our cryptanalysis results on real-world End-to-End Encryption (E2EE) schemes published in recent years. Our targets are LINE (a major messaging application), SFrame (an E2EE protocol adopted by major video/audio applications), and Zoom (a major video communication application). For LINE, we show several attacks against the message integrity of Letter Sealing, the E2EE protocol of LINE, that allow forgery and impersonation. For SFrame, we reveal a critical issue that leads to an impersonation (forgery) attack by a malicious group member with a practical complexity. For Zoom, we discover several attacks more powerful than those expected by Zoom according to their whitepaper. Specifically, if insiders collude with meeting participants, they can impersonate any Zoom user in target meetings, whereas Zoom indicates that they can impersonate only the current meeting participants. We also describe several important works in the area of E2EE security research.
本文总结了近年来我们对现实世界端到端加密(E2EE)方案的密码分析结果。我们的目标是LINE(主要的消息传递应用程序),SFrame(主要的视频/音频应用程序采用的E2EE协议)和Zoom(主要的视频通信应用程序)。对于LINE,我们展示了针对LINE的E2EE协议“信件密封”的消息完整性的几种攻击,这些攻击允许伪造和冒充。对于SFrame,我们揭示了一个导致具有实际复杂性的恶意组成员进行冒充(伪造)攻击的关键问题。对于Zoom,我们发现了一些比Zoom白皮书中预期的更强大的攻击。具体来说,如果内部人员与会议参与者串通,他们可以在目标会议中冒充任何Zoom用户,而Zoom表示他们只能冒充当前会议参与者。我们还介绍了在E2EE安全研究领域的几项重要工作。
{"title":"Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend","authors":"Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu","doi":"10.2197/ipsjjip.31.523","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.523","url":null,"abstract":"This paper summarizes our cryptanalysis results on real-world End-to-End Encryption (E2EE) schemes published in recent years. Our targets are LINE (a major messaging application), SFrame (an E2EE protocol adopted by major video/audio applications), and Zoom (a major video communication application). For LINE, we show several attacks against the message integrity of Letter Sealing, the E2EE protocol of LINE, that allow forgery and impersonation. For SFrame, we reveal a critical issue that leads to an impersonation (forgery) attack by a malicious group member with a practical complexity. For Zoom, we discover several attacks more powerful than those expected by Zoom according to their whitepaper. Specifically, if insiders collude with meeting participants, they can impersonate any Zoom user in target meetings, whereas Zoom indicates that they can impersonate only the current meeting participants. We also describe several important works in the area of E2EE security research.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1