首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
FBRC: Optimization of task Scheduling in Fog-Based Region and Cloud FBRC:基于雾域和云的任务调度优化
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.360
D. Hoang, T. Dang
Fog computing preserves benefits of cloud computing and is strategically positioned to address effectively many local and performance issues because its resources and specific services are virtualized and located at the edge of the customer premises. Resource management is a critical issue affecting system performance significantly. Due to the complex distribution and high mobility of fog devices, computation resources still experience high latencies in fog's large coverage area. This paper considers a Fog-based Region and Cloud (FBRC) in which requests are locally handled not just by a region but multiple regions when additional resources are needed. An efficient task scheduling mechanism is thus essential to minimize the completion time of tasks and improve user experiences. To this end, two issues are investigated in the paper: 1) designing a fog-based region architecture to provide nearby computing resources; 2) investigating efficient scheduling algorithms to distribute tasks among regions and remote clouds. To deal with the complexity of scheduling tasks, a heuristic-based algorithm is proposed based on our formulation and validated by extensive simulations.
雾计算保留了云计算的优点,并且战略性地定位于有效地解决许多本地和性能问题,因为它的资源和特定服务是虚拟化的,并且位于客户场所的边缘。资源管理是影响系统性能的关键问题。由于雾设备分布复杂,移动性高,在雾覆盖面积大的情况下,计算资源仍然存在较高的延迟。本文考虑了一种基于雾的区域和云(FBRC),当需要额外的资源时,请求不仅由一个区域本地处理,而且由多个区域本地处理。因此,有效的任务调度机制对于最小化任务完成时间和改善用户体验至关重要。为此,本文研究了两个问题:1)设计一种基于雾的区域架构,以提供附近的计算资源;2)研究在区域和远程云之间分配任务的有效调度算法。针对任务调度的复杂性,在此基础上提出了一种启发式算法,并通过大量仿真验证了算法的有效性。
{"title":"FBRC: Optimization of task Scheduling in Fog-Based Region and Cloud","authors":"D. Hoang, T. Dang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.360","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.360","url":null,"abstract":"Fog computing preserves benefits of cloud computing and is strategically positioned to address effectively many local and performance issues because its resources and specific services are virtualized and located at the edge of the customer premises. Resource management is a critical issue affecting system performance significantly. Due to the complex distribution and high mobility of fog devices, computation resources still experience high latencies in fog's large coverage area. This paper considers a Fog-based Region and Cloud (FBRC) in which requests are locally handled not just by a region but multiple regions when additional resources are needed. An efficient task scheduling mechanism is thus essential to minimize the completion time of tasks and improve user experiences. To this end, two issues are investigated in the paper: 1) designing a fog-based region architecture to provide nearby computing resources; 2) investigating efficient scheduling algorithms to distribute tasks among regions and remote clouds. To deal with the complexity of scheduling tasks, a heuristic-based algorithm is proposed based on our formulation and validated by extensive simulations.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors 面向组织行为实时仿真的情境语义聚合器
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.304
Yan Zhang, L. Liao, Chang Xu, Licheng Shi
Realtime simulation on organizational behaviors is very important for detection of group attacks in cyber situational awareness. Previous work on the modeling and simulation of organizational behaviors is successful in top-down approach centering on certain organizational behaviors. However, these models are inefficient for realtime simulation on unknown organizational behaviors. To address this issue, we use situation theory for runtime meaning of unknown organizational behaviors to propose a situation semantics aggregator with bottom-up approach. Based on behavior type theory, the proposed aggregator can converge organizational behaviors of simulating objects while entity objects running. So, the proposed aggregator is suitable for realtime simualtion of unknown organizational behaviors.
在网络态势感知中,组织行为的实时模拟对群体攻击的检测具有重要意义。以往关于组织行为建模和模拟的研究都是成功的,它们采用的是自上而下的方法,以某些组织行为为中心。然而,这些模型对于未知组织行为的实时模拟是低效的。为了解决这一问题,我们利用未知组织行为运行时含义的情境理论,提出了一种自下而上的情境语义聚合器。基于行为类型理论,提出的聚合器可以在实体对象运行时对模拟对象的组织行为进行收敛。因此,所提出的聚合器适用于未知组织行为的实时模拟。
{"title":"Situation Semantics Aggregator for Realtime Simulation on Organizational Behaviors","authors":"Yan Zhang, L. Liao, Chang Xu, Licheng Shi","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.304","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.304","url":null,"abstract":"Realtime simulation on organizational behaviors is very important for detection of group attacks in cyber situational awareness. Previous work on the modeling and simulation of organizational behaviors is successful in top-down approach centering on certain organizational behaviors. However, these models are inefficient for realtime simulation on unknown organizational behaviors. To address this issue, we use situation theory for runtime meaning of unknown organizational behaviors to propose a situation semantics aggregator with bottom-up approach. Based on behavior type theory, the proposed aggregator can converge organizational behaviors of simulating objects while entity objects running. So, the proposed aggregator is suitable for realtime simualtion of unknown organizational behaviors.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"141 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data 大数据快速k均值聚类的数据科学与工程解决方案
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.332
K. Dierckens, Adrian B. Harrison, C. Leung, Adrienne V. Pind
With advances in technology, high volumes of a wide variety of valuable data of different veracity can be easily collected or generated at a high velocity in the current era of big data. Embedded in these big data are implicit, previously unknown and potentially useful information. Hence, fast and scalable big data science and engineering solutions that mine and discover knowledge from these big data are in demand. A popular and practical data mining task is to group similar data into clusters (i.e., clustering). To cluster very large data or big data, k-means based algorithms have been widely used. Although many existing k-means algorithms give quality results, they also suffer from some problems. For instance, there are risks associated with randomly selecting the k centroids, there is a tendency to produce roughly equal circular clusters, and the runtime complexity is very high. To deal with these problems, we present in this paper a big data science and engineering solution that applies heuristic prototype-based algorithm. Evaluation results show the efficiency and scalability of this solution.
随着技术的进步,在当前的大数据时代,可以很容易地收集或高速生成大量、种类繁多、不同准确性的有价值数据。在这些大数据中嵌入了隐含的、以前未知的、潜在有用的信息。因此,需要从这些大数据中挖掘和发现知识的快速、可扩展的大数据科学和工程解决方案。一个流行且实用的数据挖掘任务是将相似的数据分组到集群中(即聚类)。为了对非常大的数据或大数据进行聚类,基于k-means的算法已经被广泛使用。虽然许多现有的k-means算法给出了高质量的结果,但它们也存在一些问题。例如,随机选择k个质心存在风险,可能会产生大致相等的圆形簇,并且运行时复杂性非常高。为了解决这些问题,本文提出了一种基于启发式原型算法的大数据科学与工程解决方案。评估结果表明了该方案的有效性和可扩展性。
{"title":"A Data Science and Engineering Solution for Fast K-Means Clustering of Big Data","authors":"K. Dierckens, Adrian B. Harrison, C. Leung, Adrienne V. Pind","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.332","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.332","url":null,"abstract":"With advances in technology, high volumes of a wide variety of valuable data of different veracity can be easily collected or generated at a high velocity in the current era of big data. Embedded in these big data are implicit, previously unknown and potentially useful information. Hence, fast and scalable big data science and engineering solutions that mine and discover knowledge from these big data are in demand. A popular and practical data mining task is to group similar data into clusters (i.e., clustering). To cluster very large data or big data, k-means based algorithms have been widely used. Although many existing k-means algorithms give quality results, they also suffer from some problems. For instance, there are risks associated with randomly selecting the k centroids, there is a tendency to produce roughly equal circular clusters, and the runtime complexity is very high. To deal with these problems, we present in this paper a big data science and engineering solution that applies heuristic prototype-based algorithm. Evaluation results show the efficiency and scalability of this solution.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"17 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Hidden-Token Searchable Public-Key Encryption 隐藏令牌可搜索公钥加密
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.244
Cong Zuo, Jun Shao, Zhe Liu, Y. Ling, Guiyi Wei
In this paper, we propose a variant of searchable public-key encryption named hidden-token searchable public-key encryption with two new security properties: token anonymity and one-token-per-trapdoor. With the former security notion, the client can obtain the search token from the data owner without revealing any information about the underlying keyword. Meanwhile, the client cannot derive more than one token from one trapdoor generated by the data owner according to the latter security notion. Furthermore, we present a concrete hiddentoken searchable public-key encryption scheme together with the security proofs in the random oracle model.
在本文中,我们提出了一种可搜索公钥加密的变体——隐藏令牌可搜索公钥加密,它具有两个新的安全属性:令牌匿名性和每门一个令牌。使用前一种安全概念,客户机可以从数据所有者那里获得搜索令牌,而无需透露有关底层关键字的任何信息。同时,根据后一种安全概念,客户端不能从数据所有者生成的一个陷阱门派生多个令牌。在此基础上,提出了一种具体的隐藏令牌可搜索公钥加密方案,并给出了随机oracle模型下的安全性证明。
{"title":"Hidden-Token Searchable Public-Key Encryption","authors":"Cong Zuo, Jun Shao, Zhe Liu, Y. Ling, Guiyi Wei","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.244","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.244","url":null,"abstract":"In this paper, we propose a variant of searchable public-key encryption named hidden-token searchable public-key encryption with two new security properties: token anonymity and one-token-per-trapdoor. With the former security notion, the client can obtain the search token from the data owner without revealing any information about the underlying keyword. Meanwhile, the client cannot derive more than one token from one trapdoor generated by the data owner according to the latter security notion. Furthermore, we present a concrete hiddentoken searchable public-key encryption scheme together with the security proofs in the random oracle model.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks 一种实用的无线网络反合谋分层身份非交互密钥协议
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.224
Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu
We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called "shadowing factor" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion properties of key agreements in the real situation. Through the theoretical proof and practical analysis, our HIB-NIKA has been proved anti-collusion and resilient against the compromises from intermediate and leaf nodes in the hierarchy, which covers the shortage of the trial of Guo and solves the open problem posed by Gennaro in-the-true-sense.
我们提出了标准模型中第一个不明确要求多线性映射的选择性安全分层基于身份的非交互式密钥协议(HIB-NIKA)。为了提高HIB-NIKA的安全性,我们提出了一种新的弹性解决方案——“阴影因子”,并提出了一种实用的分层密钥协议攻击模型,分析了真实情况下密钥协议的抗伪造和抗共谋特性。通过理论证明和实践分析,证明我们的HIB-NIKA具有抗合通和抗层级中中间节点和叶子节点妥协的能力,弥补了郭审判的不足,真正解决了Gennaro提出的开放性问题。
{"title":"A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks","authors":"Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.224","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224","url":null,"abstract":"We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called \"shadowing factor\" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion properties of key agreements in the real situation. Through the theoretical proof and practical analysis, our HIB-NIKA has been proved anti-collusion and resilient against the compromises from intermediate and leaf nodes in the hierarchy, which covers the shortage of the trial of Guo and solves the open problem posed by Gennaro in-the-true-sense.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128120689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory 基于博弈论的面向隐私保护的移动众感分析
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.342
Rong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye
As a new method of the Internet of Things (IoT), the mobile crowdsensing provides a novel way to realize the ubiquitous social perception. From the point of the game theory, this paper addresses the reputation incentive mechanism and discusses the prisoner's dilemma in the mobile crowdsensing. Firstly, we give a formal definition of the sensing user's contribution based on the accuracy in data analysis, and propose a reputation incentive mechanism based on this contribution, which considers the privacy protection of the sensing data and encourages more sensing users to continually provide the highquality data to participate in the mobile crowdsensing. Furthermore, we observe that the sensing user's benefits not only depend on their own contribution, but also rely on the outcome of the final data transaction between the service provider and the mediator. However, this data transaction is vulnerable to the prisoner's dilemma due to the selfish choice of the both parties. Therefore, we analyze and discuss the prisoner's dilemma in the above data transactionsand give the corresponding solutions. Finally, we point outsome future research directions about privacy protection ofthe mobile crowdsensing.
移动众测作为物联网的一种新方法,为实现无所不在的社会感知提供了一种新的途径。本文从博弈论的角度分析了声誉激励机制,讨论了移动众筹中的囚徒困境。首先,我们基于数据分析的准确性给出了感知用户贡献的形式化定义,并在此基础上提出了声誉激励机制,该机制考虑了感知数据的隐私保护,鼓励更多的感知用户持续提供高质量的数据参与移动众测。此外,我们观察到感知用户的利益不仅取决于他们自己的贡献,还取决于服务提供者和中介之间最终数据交易的结果。然而,由于交易双方的自私选择,这种数据交易容易陷入囚徒困境。因此,我们对上述数据交易中的囚徒困境进行了分析和讨论,并给出了相应的解决方案。最后,对移动众测隐私保护的未来研究方向进行了展望。
{"title":"Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory","authors":"Rong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.342","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.342","url":null,"abstract":"As a new method of the Internet of Things (IoT), the mobile crowdsensing provides a novel way to realize the ubiquitous social perception. From the point of the game theory, this paper addresses the reputation incentive mechanism and discusses the prisoner's dilemma in the mobile crowdsensing. Firstly, we give a formal definition of the sensing user's contribution based on the accuracy in data analysis, and propose a reputation incentive mechanism based on this contribution, which considers the privacy protection of the sensing data and encourages more sensing users to continually provide the highquality data to participate in the mobile crowdsensing. Furthermore, we observe that the sensing user's benefits not only depend on their own contribution, but also rely on the outcome of the final data transaction between the service provider and the mediator. However, this data transaction is vulnerable to the prisoner's dilemma due to the selfish choice of the both parties. Therefore, we analyze and discuss the prisoner's dilemma in the above data transactionsand give the corresponding solutions. Finally, we point outsome future research directions about privacy protection ofthe mobile crowdsensing.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks 环境感知检测NFC中继攻击的有效性研究
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.218
Iakovos Gurulian, Carlton Shepherd, E. Frank, K. Markantonakis, Raja Naeem Akram, K. Mayes
Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards, which has resulted in the deployment of various access control, transportation and payment services, such as Google Pay and Apple Pay. Like contactless cards, however, NFC-based smartphone transactions are susceptible to relay attacks, and ambient sensing has been suggested as a potential countermeasure. In this study, we empirically evaluate the suitability of ambient sensors as a proximity detection mechanism for smartphone-based transactions under EMV constraints. We underpin our study using sensing data collected from 17 sensors from an emulated relay attack test-bed to assess whether they can thwart such attacks effectively. Each sensor, where feasible, was used to record 350-400 legitimate and relay (illegitimate) contactless transactions at two different physical locations. Our analysis provides an empirical foundation upon which to determine the efficacy of ambient sensing for providing a strong anti-relay mechanism in security-sensitive applications. We demonstrate that no single, evaluated mobile ambient sensor is suitable for such critical applications under realistic deployment constraints.
具有近场通信(NFC)功能的智能手机可能会模仿非接触式智能卡,这导致了各种门禁、交通和支付服务的部署,如谷歌支付和苹果支付。然而,与非接触式卡一样,基于nfc的智能手机交易也容易受到中继攻击,因此环境感应被认为是一种潜在的对策。在本研究中,我们对环境传感器作为EMV约束下基于智能手机的交易的接近检测机制的适用性进行了实证评估。我们使用来自模拟中继攻击试验台的17个传感器收集的传感数据来支持我们的研究,以评估它们是否可以有效地阻止此类攻击。在可行的情况下,每个传感器用于记录两个不同物理位置的350-400个合法和中继(非法)非接触式交易。我们的分析为确定环境传感在安全敏感应用中提供强大的反中继机制的有效性提供了经验基础。我们证明,在现实的部署限制下,没有一个单一的、经过评估的移动环境传感器适合于这样的关键应用。
{"title":"On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks","authors":"Iakovos Gurulian, Carlton Shepherd, E. Frank, K. Markantonakis, Raja Naeem Akram, K. Mayes","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.218","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218","url":null,"abstract":"Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards, which has resulted in the deployment of various access control, transportation and payment services, such as Google Pay and Apple Pay. Like contactless cards, however, NFC-based smartphone transactions are susceptible to relay attacks, and ambient sensing has been suggested as a potential countermeasure. In this study, we empirically evaluate the suitability of ambient sensors as a proximity detection mechanism for smartphone-based transactions under EMV constraints. We underpin our study using sensing data collected from 17 sensors from an emulated relay attack test-bed to assess whether they can thwart such attacks effectively. Each sensor, where feasible, was used to record 350-400 legitimate and relay (illegitimate) contactless transactions at two different physical locations. Our analysis provides an empirical foundation upon which to determine the efficacy of ambient sensing for providing a strong anti-relay mechanism in security-sensitive applications. We demonstrate that no single, evaluated mobile ambient sensor is suitable for such critical applications under realistic deployment constraints.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121936919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
McFTP: A Framework to Explore and Prototype Multi-core Thermal Managements on Real Processors McFTP:在真实处理器上探索和原型化多核热管理的框架
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.316
Long Cheng, Zhihao Zhao, Kai Huang, Gang Chen, A. Knoll
Nowadays, multi-core processor architectures have been widely adopted in main domains e.g., embedded, general-purpose, real-time systems, etc. Diverse thermal managements have been proposed to manage the temperature under various constraints. This has made the selection of the right thermal management policy difficult. Designers need to validate any resource distribution decision in design phase on the target architecture, e.g., by using a re-configurable thermal framework running in the user-space. In this paper, we first analyze the requirements that such a framework should satisfy. Then, we propose McFTP: a thermal framework fulfilling all the requirements. For this purpose, an intermediate interface is defined to isolate thermal management policies from the low-level implementations. A set of commonly used temperature control mechanisms are implemented as a library which can be accessed via the interface. With these features, McFTP can not only implement a thermal management policy at high-level of abstraction, but also execute the user-defined task-set for real thermal evolution. We demonstrate the effectiveness and efficiency of McFTP by implementing it with two works in the literature on a Dell hardware platform.
目前,多核处理器体系结构已广泛应用于嵌入式、通用、实时系统等主要领域。人们提出了不同的热管理方法来管理不同约束条件下的温度。这使得选择正确的热管理政策变得困难。设计人员需要在设计阶段验证目标架构上的任何资源分配决策,例如,通过使用在用户空间中运行的可重新配置的热框架。在本文中,我们首先分析了这样一个框架应该满足的需求。然后,我们提出了McFTP:一个满足所有需求的热框架。为此,定义了一个中间接口,将热管理策略与低级实现隔离开来。一组常用的温度控制机制被实现为可通过接口访问的库。通过这些特性,McFTP不仅可以实现高级抽象的热管理策略,还可以执行用户自定义的任务集,以实现真正的热演化。我们通过在Dell硬件平台上实现两个文献中的作品来证明McFTP的有效性和效率。
{"title":"McFTP: A Framework to Explore and Prototype Multi-core Thermal Managements on Real Processors","authors":"Long Cheng, Zhihao Zhao, Kai Huang, Gang Chen, A. Knoll","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.316","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.316","url":null,"abstract":"Nowadays, multi-core processor architectures have been widely adopted in main domains e.g., embedded, general-purpose, real-time systems, etc. Diverse thermal managements have been proposed to manage the temperature under various constraints. This has made the selection of the right thermal management policy difficult. Designers need to validate any resource distribution decision in design phase on the target architecture, e.g., by using a re-configurable thermal framework running in the user-space. In this paper, we first analyze the requirements that such a framework should satisfy. Then, we propose McFTP: a thermal framework fulfilling all the requirements. For this purpose, an intermediate interface is defined to isolate thermal management policies from the low-level implementations. A set of commonly used temperature control mechanisms are implemented as a library which can be accessed via the interface. With these features, McFTP can not only implement a thermal management policy at high-level of abstraction, but also execute the user-defined task-set for real thermal evolution. We demonstrate the effectiveness and efficiency of McFTP by implementing it with two works in the literature on a Dell hardware platform.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"12 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131452858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Practical Application-Level Dynamic Taint Analysis of Android Apps Android应用程序的实际应用级动态污点分析
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.215
J. Schütte, Alexander Kuechler, Dennis Titze
Dynamic taint analysis traces data flows in applications at runtime and allows detection and consequently prevention of flow-based vulnerabilities, such as data leaks or injection attacks. While dynamic taint analysis spanning all components of the stack is potentially more precise, it requires adaptations of components across the OS stack and thus does not allow to analyze applications in their real runtime environment. In this paper, we introduce a dynamic taint analysis framework for Android applications which injects a taint analysis directly into an application's bytecode and can thus operate on any stock Android platform. Our approach is more precise than previous ones, copes with flow-aware source and sink definitions, and propagates data flows across process boundaries, including propagation over file I/O and inter process communication. We explain how our framework performs with popular apps from the Google Play Store and show that it achieves a precision which is comparable to the most precise platform-level tainting framework.
动态污染分析在运行时跟踪应用程序中的数据流,并允许检测和预防基于流的漏洞,例如数据泄漏或注入攻击。虽然跨越堆栈所有组件的动态污点分析可能更精确,但它需要跨操作系统堆栈调整组件,因此不允许在实际运行时环境中分析应用程序。在本文中,我们为Android应用程序引入了一个动态污染分析框架,它将污染分析直接注入到应用程序的字节码中,从而可以在任何现有的Android平台上运行。我们的方法比以前的方法更精确,处理流感知的源和接收定义,并跨进程边界传播数据流,包括通过文件I/O传播和进程间通信。我们解释了我们的框架是如何在Google Play Store的流行应用中执行的,并表明它达到了与最精确的平台级污染框架相媲美的精度。
{"title":"Practical Application-Level Dynamic Taint Analysis of Android Apps","authors":"J. Schütte, Alexander Kuechler, Dennis Titze","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.215","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.215","url":null,"abstract":"Dynamic taint analysis traces data flows in applications at runtime and allows detection and consequently prevention of flow-based vulnerabilities, such as data leaks or injection attacks. While dynamic taint analysis spanning all components of the stack is potentially more precise, it requires adaptations of components across the OS stack and thus does not allow to analyze applications in their real runtime environment. In this paper, we introduce a dynamic taint analysis framework for Android applications which injects a taint analysis directly into an application's bytecode and can thus operate on any stock Android platform. Our approach is more precise than previous ones, copes with flow-aware source and sink definitions, and propagates data flows across process boundaries, including propagation over file I/O and inter process communication. We explain how our framework performs with popular apps from the Google Play Store and show that it achieves a precision which is comparable to the most precise platform-level tainting framework.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of Landing and Distribution Domains Using Whois’ Text Mining 基于Whois文本挖掘的着陆域和分布域分类
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.213
Tran Thao Phuong, A. Yamada, Kosuke Murakami, J. Urakawa, Y. Sawaya, A. Kubota
Detection of drive-by-download attack has gained a focus in security research since the attack has turned into the most popular and serious threat to web infrastructure. The attack exploits vulnerabilities in web browsers and their extensions for unnoticeably downloading malicious software. Often, the victim is sent through a long chain of redirection operations in order to take down the offending pages. Concretely, the attack is triggered when a user visits a benign webpage that is compromised by the attacker (called landing page) and is inserted some malicious code inside. The user is then automatically redirected to an actual page that installs malware on the user's computer (called distribution page) without his/her consent or knowledge. While there is a large body of works targeting on detection of drive-by download attack, there is little attention on the redirection which is a crucial characteristic of the attack. In this paper, for the first time, we propose an approach to the classification of landing and distribution domains which are important components forming the head and tail of a redirection chain in the attack. The methodology in our approach is to use machine learning for text mining on the registered information of the domains called whois. We intensively implemented our approach with six popular supervised learning algorithms, compared the results and concluded that Linear-based Support Vector Machine and CART algorithm-based Decision Tree are the best models for our dataset which respectively give 98.55% and 99.28% of accuracy, 97.78% and 98.95% of F1 score, 98.35% and 99.45% of average precision.
由于下载驱动攻击已成为网络基础设施中最常见和最严重的威胁,其检测已成为安全研究的焦点。这种攻击利用网络浏览器及其扩展的漏洞,悄无声息地下载恶意软件。通常,受害者被发送到一个长链的重定向操作,以删除违规页面。具体来说,当用户访问一个被攻击者破坏的良性网页(称为登陆页)并在其中插入一些恶意代码时,就会触发攻击。然后,在未经用户同意或不知情的情况下,用户被自动重定向到在用户计算机上安装恶意软件的实际页面(称为分发页面)。虽然针对驱动下载攻击的检测已有大量的工作,但对驱动下载攻击的关键特征重定向的关注却很少。在本文中,我们首次提出了一种分类着陆域和分布域的方法,它们是攻击中形成重定向链的头和尾的重要组成部分。我们的方法是使用机器学习对被称为whois的域名的注册信息进行文本挖掘。我们将我们的方法与六种流行的监督学习算法进行了深入的实践,比较了结果,得出基于线性的支持向量机和基于CART算法的决策树是我们数据集的最佳模型,分别给出了98.55%和99.28%的准确率,97.78%和98.95%的F1分数,98.35%和99.45%的平均精度。
{"title":"Classification of Landing and Distribution Domains Using Whois’ Text Mining","authors":"Tran Thao Phuong, A. Yamada, Kosuke Murakami, J. Urakawa, Y. Sawaya, A. Kubota","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.213","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.213","url":null,"abstract":"Detection of drive-by-download attack has gained a focus in security research since the attack has turned into the most popular and serious threat to web infrastructure. The attack exploits vulnerabilities in web browsers and their extensions for unnoticeably downloading malicious software. Often, the victim is sent through a long chain of redirection operations in order to take down the offending pages. Concretely, the attack is triggered when a user visits a benign webpage that is compromised by the attacker (called landing page) and is inserted some malicious code inside. The user is then automatically redirected to an actual page that installs malware on the user's computer (called distribution page) without his/her consent or knowledge. While there is a large body of works targeting on detection of drive-by download attack, there is little attention on the redirection which is a crucial characteristic of the attack. In this paper, for the first time, we propose an approach to the classification of landing and distribution domains which are important components forming the head and tail of a redirection chain in the attack. The methodology in our approach is to use machine learning for text mining on the registered information of the domains called whois. We intensively implemented our approach with six popular supervised learning algorithms, compared the results and concluded that Linear-based Support Vector Machine and CART algorithm-based Decision Tree are the best models for our dataset which respectively give 98.55% and 99.28% of accuracy, 97.78% and 98.95% of F1 score, 98.35% and 99.45% of average precision.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129535937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1