首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Toward Proxy Re-encryption From Learning with Errors in the Exponent 从指数误差学习到代理再加密
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.300
Zengpeng Li, Chunguang Ma, Ding Wang, M. Zhao, Qian Zhao, Lu Zhou
Proxy re-encryption (PRE) is an important cryptographic primitive used for private information sharing. However, the recent advance in quantum computer has potentially crippled its security, as the traditional decisional Diffie-Hellman (DDH)-based PRE is venerable to the quantum attack. Thus, learning with errors (LWE)-based PRE schemes, as a kind of latticebased construction with the inherent quantum-resistant property, has attracted special research interest. Unfortunately, the main drawback of lattice-based public key encryption scheme is noise management after multiplication evaluation. Many cryptographers have been devoted to controlling the expansion of noise. In this line of work, Dagdelen-Gajek-G¨opfert (DGG) put forth the notion of learning with errors in the exponent (LWEE) which is based on lattice and group-theoretic assumption, meanwhile demonstrated a paradigm for constructing efficient quantum resistance public key schemes. In this paper, on top of DGG, we construct a single-bit, single-hop and unidirectional LWEE- based PRE scheme with indistinguishable chosen plaintext attack (IND-CPA) security. To the best of our knowledge, our scheme is the first LWEE-based PRE scheme.
代理重加密(PRE)是一种用于私有信息共享的重要加密原语。然而,量子计算机的最新进展可能会削弱其安全性,因为传统的基于决策迪菲-赫尔曼(DDH)的PRE对于量子攻击来说是值得尊重的。因此,基于误差学习(LWE)的PRE方案作为一种基于晶格的结构,具有固有的抗量子特性,引起了人们的特殊研究兴趣。不幸的是,基于格的公钥加密方案的主要缺点是乘法计算后的噪声管理。许多密码学家一直致力于控制噪声的扩展。在这方面,Dagdelen-Gajek-G¨opfert (DGG)提出了基于点阵和群论假设的指数误差学习(LWEE)概念,同时展示了一种构建高效量子抵抗公钥方案的范式。本文在DGG的基础上,构造了一种具有不可区分选择明文攻击(IND-CPA)安全性的单比特、单跳、单向LWEE预加密方案。据我们所知,我们的方案是第一个基于lwee的PRE方案。
{"title":"Toward Proxy Re-encryption From Learning with Errors in the Exponent","authors":"Zengpeng Li, Chunguang Ma, Ding Wang, M. Zhao, Qian Zhao, Lu Zhou","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.300","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.300","url":null,"abstract":"Proxy re-encryption (PRE) is an important cryptographic primitive used for private information sharing. However, the recent advance in quantum computer has potentially crippled its security, as the traditional decisional Diffie-Hellman (DDH)-based PRE is venerable to the quantum attack. Thus, learning with errors (LWE)-based PRE schemes, as a kind of latticebased construction with the inherent quantum-resistant property, has attracted special research interest. Unfortunately, the main drawback of lattice-based public key encryption scheme is noise management after multiplication evaluation. Many cryptographers have been devoted to controlling the expansion of noise. In this line of work, Dagdelen-Gajek-G¨opfert (DGG) put forth the notion of learning with errors in the exponent (LWEE) which is based on lattice and group-theoretic assumption, meanwhile demonstrated a paradigm for constructing efficient quantum resistance public key schemes. In this paper, on top of DGG, we construct a single-bit, single-hop and unidirectional LWEE- based PRE scheme with indistinguishable chosen plaintext attack (IND-CPA) security. To the best of our knowledge, our scheme is the first LWEE-based PRE scheme.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Passive Client-based Approach to Detect Evil Twin Attacks 一种基于被动客户端的恶意双攻击检测方法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.242
Qian Lu, Haipeng Qu, Y. Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users. The presence of such a threat continuously leads to significant loss of information. In this paper, we propose a passive client-side detection approach that allows users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection and location technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.
随着基于802.11的无线局域网(wlan)的广泛部署和使用,Wi-Fi用户很容易受到一种名为“邪恶双胞胎”的安全威胁。邪恶的孪生,一种流氓接入点(rap),伪装成合法的接入点(AP)来引诱用户连接它。恶意的攻击者可以很容易地在笔记本电脑上配置邪恶的双胞胎来诱导受害的无线用户。这种威胁的存在不断导致大量信息的丢失。在本文中,我们提出了一种被动的客户端检测方法,允许用户独立识别和定位邪恶的双胞胎,而无需无线网络管理员的任何帮助。由于恶意双胞胎的转发行为,提出的方法通过对比目标ap发送给用户的802.11数据帧来判断恶意双胞胎攻击。我们在一个名为ET-spotter的Python工具中实现了我们的检测和定位技术。通过我们研究中的实现和评估,我们的算法在区分邪恶双胞胎和合法ap方面达到了96%的准确率。
{"title":"A Passive Client-based Approach to Detect Evil Twin Attacks","authors":"Qian Lu, Haipeng Qu, Y. Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.242","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.242","url":null,"abstract":"As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users. The presence of such a threat continuously leads to significant loss of information. In this paper, we propose a passive client-side detection approach that allows users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection and location technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
GPU Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve Performance GPU寄存器打包:动态利用窄宽度操作数来提高性能
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.308
Xin Wang, Wei Zhang
Graphics processing units(GPUs) have been increasingly used to accelerate general purpose computations. By exploiting massive thread-level parallelism (TLP), GPUs can achieve high throughput as well as memory latency hiding. As a result, a very large register file (RF) is typically required to enable fast and low-cost context switching between tens of thousands of active threads. However, RF resource is still insufficient to enable all thread level parallelism and the lack of RF resources can hurt performance by limiting the occupancy of GPU threads. Moreover, if the available RF capacity can not fit the requirement of a thread block, GPU needs to fetch some variables from local memory which may lead to long memory access latencies. By observing that a large percentage of computed results actually have fewer significant bits compared to the full width of a 32-bit register for many GPGPU applications, we propose a GPU register packing scheme to dynamically exploit narrowwidth operands and pack multiple operands into a single fullwidth register. By using dynamically register packing, more RF space is available which allows GPU to enable more TLP through assigning additional thread blocks on SMs (Streaming Multiprocessors) and thus improve performance. The experimental results show that our GPU register packing scheme can achieve up to 1.96X speedup and 1.18X on average.
图形处理单元(gpu)已经越来越多地用于加速通用计算。通过利用大规模线程级并行性(TLP), gpu可以实现高吞吐量和内存延迟隐藏。因此,通常需要一个非常大的寄存器文件(RF)来实现成千上万个活动线程之间快速和低成本的上下文切换。然而,RF资源仍然不足以实现所有线程级别的并行性,并且RF资源的缺乏会通过限制GPU线程的占用而损害性能。此外,如果可用的RF容量不能满足线程块的要求,GPU需要从本地内存中获取一些变量,这可能会导致较长的内存访问延迟。通过观察到对于许多GPGPU应用程序,与32位寄存器的全宽度相比,大部分计算结果实际上具有更少的有效位,我们提出了一种GPU寄存器打包方案,以动态利用窄宽度操作数并将多个操作数打包到单个全宽度寄存器中。通过使用动态注册封装,更多的RF空间可用,这允许GPU通过在SMs(流多处理器)上分配额外的线程块来启用更多的TLP,从而提高性能。实验结果表明,我们的GPU寄存器打包方案可以实现高达1.96倍的加速,平均速度为1.18倍。
{"title":"GPU Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve Performance","authors":"Xin Wang, Wei Zhang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.308","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.308","url":null,"abstract":"Graphics processing units(GPUs) have been increasingly used to accelerate general purpose computations. By exploiting massive thread-level parallelism (TLP), GPUs can achieve high throughput as well as memory latency hiding. As a result, a very large register file (RF) is typically required to enable fast and low-cost context switching between tens of thousands of active threads. However, RF resource is still insufficient to enable all thread level parallelism and the lack of RF resources can hurt performance by limiting the occupancy of GPU threads. Moreover, if the available RF capacity can not fit the requirement of a thread block, GPU needs to fetch some variables from local memory which may lead to long memory access latencies. By observing that a large percentage of computed results actually have fewer significant bits compared to the full width of a 32-bit register for many GPGPU applications, we propose a GPU register packing scheme to dynamically exploit narrowwidth operands and pack multiple operands into a single fullwidth register. By using dynamically register packing, more RF space is available which allows GPU to enable more TLP through assigning additional thread blocks on SMs (Streaming Multiprocessors) and thus improve performance. The experimental results show that our GPU register packing scheme can achieve up to 1.96X speedup and 1.18X on average.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features 基于深度特征和手工特征结合的鲁棒车辆分类
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.323
Liying Jiang, Jiafeng Li, L. Zhuo, Ziqi Zhu
Vehicle classification plays an important part in Intelligent Transport System. Recently, deep learning has showed outstanding performance in image classification. However, numerous parameters of the deep network need to be optimized which is time-consuming. PCANet is a light-weight deep learning network that is easy to train. In this paper, a new robust vehicle classification method is proposed, in which the deep features of PCANet, handcrafted features of HOG (Histogram of Oriented Gradient) and HU moments are extracted to describe the content property of vehicles. In addition, the spatial location information is introduced to HU moments to improve its distinguishing ability. The combined features are input to SVM (Support Vector Machine) to train the classification model. The vehicles are classified into six categories, i.e. large bus, car, motorcycle, minibus, truck and van. We construct a VehicleDataset including 13700 vehicle images extracted from real surveillance videos to carry out the experiments. The average classification accuracy can achieve 98.34%, which is 4.49% higher than that obtained from the conventional methods based on "Feature + Classifier" and is also slightly higher than that from GoogLeNet (98.26%). The proposed method doesn't need GPU and has much greater convenience than GoogLeNet. The experimental results have demonstrated that for a specific task, the combination of the deep features obtained from light-weight deep learning network and the handcrafted features can achieve comparable or even higher performance compared to the deeper neural network.
车辆分类是智能交通系统的重要组成部分。近年来,深度学习在图像分类方面表现突出。然而,深度网络中需要优化的参数众多,耗时长。PCANet是一种轻量级的深度学习网络,易于训练。本文提出了一种新的鲁棒车辆分类方法,该方法提取PCANet的深度特征、HOG (Histogram of Oriented Gradient)的手工特征和HU矩来描述车辆的内容属性。此外,将空间位置信息引入HU矩中,提高了HU矩的识别能力。将组合的特征输入到支持向量机(SVM)中训练分类模型。车辆分为六大类,即大客车、轿车、摩托车、小巴、卡车和面包车。我们构建了一个包含13700张从真实监控视频中提取的车辆图像的VehicleDataset来进行实验。平均分类准确率可达到98.34%,比基于“Feature + Classifier”的常规方法的分类准确率提高4.49%,也略高于GoogLeNet的分类准确率98.26%。该方法不需要GPU,且比GoogLeNet具有更大的便利性。实验结果表明,对于特定任务,轻量级深度学习网络获得的深度特征与手工制作的特征相结合可以达到与深层神经网络相当甚至更高的性能。
{"title":"Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted Features","authors":"Liying Jiang, Jiafeng Li, L. Zhuo, Ziqi Zhu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.323","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.323","url":null,"abstract":"Vehicle classification plays an important part in Intelligent Transport System. Recently, deep learning has showed outstanding performance in image classification. However, numerous parameters of the deep network need to be optimized which is time-consuming. PCANet is a light-weight deep learning network that is easy to train. In this paper, a new robust vehicle classification method is proposed, in which the deep features of PCANet, handcrafted features of HOG (Histogram of Oriented Gradient) and HU moments are extracted to describe the content property of vehicles. In addition, the spatial location information is introduced to HU moments to improve its distinguishing ability. The combined features are input to SVM (Support Vector Machine) to train the classification model. The vehicles are classified into six categories, i.e. large bus, car, motorcycle, minibus, truck and van. We construct a VehicleDataset including 13700 vehicle images extracted from real surveillance videos to carry out the experiments. The average classification accuracy can achieve 98.34%, which is 4.49% higher than that obtained from the conventional methods based on \"Feature + Classifier\" and is also slightly higher than that from GoogLeNet (98.26%). The proposed method doesn't need GPU and has much greater convenience than GoogLeNet. The experimental results have demonstrated that for a specific task, the combination of the deep features obtained from light-weight deep learning network and the handcrafted features can achieve comparable or even higher performance compared to the deeper neural network.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123326874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications 多播组通信中基于中介的CP-ABE即时属性撤销机制
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.252
Lyes Touati, Y. Challal
Attribute Based Encryption (ABE) scheme is a mechanism that allows implementing cryptographic fine grained access control to shared information. It achieves information sharing of type one-to-many users, without considering the number of users and their identities. However, original ABE systems presents some drawbacks, especially the non-efficiency of their attribute/key revocation mechanisms.Based on Ciphertext-Policy ABE (CP-ABE) scheme, we propose an efficient proxy-based immediate private key update for multicast group communications. Our solution does require neither re-encrypting cipher-texts, nor affecting other users (Updating secret keys).The proxy that has been introduced plays the role of a necessary semi-trusted assistant during the decryption process without taking decisions about who is eligible or not to decrypt data.Finally, we demonstrate that our scheme guarantees security requirements that we target and we also show through analysis that our scheme achieves effectively its goals.
基于属性的加密(ABE)方案是一种允许对共享信息实现加密细粒度访问控制的机制。在不考虑用户数量和身份的情况下,实现一对多用户的信息共享。然而,原始的ABE系统存在一些缺点,特别是其属性/密钥撤销机制的非效率。基于口令策略ABE (cipher - policy ABE, CP-ABE)方案,提出了一种高效的基于代理的多播组通信私钥即时更新方案。我们的解决方案既不需要重新加密加密文本,也不需要影响其他用户(更新密钥)。已经引入的代理在解密过程中扮演必要的半信任助手的角色,而不决定谁有资格或不有资格解密数据。最后,我们证明了我们的方案保证了我们的目标安全需求,并通过分析表明我们的方案有效地实现了它的目标。
{"title":"Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group Communications","authors":"Lyes Touati, Y. Challal","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.252","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.252","url":null,"abstract":"Attribute Based Encryption (ABE) scheme is a mechanism that allows implementing cryptographic fine grained access control to shared information. It achieves information sharing of type one-to-many users, without considering the number of users and their identities. However, original ABE systems presents some drawbacks, especially the non-efficiency of their attribute/key revocation mechanisms.Based on Ciphertext-Policy ABE (CP-ABE) scheme, we propose an efficient proxy-based immediate private key update for multicast group communications. Our solution does require neither re-encrypting cipher-texts, nor affecting other users (Updating secret keys).The proxy that has been introduced plays the role of a necessary semi-trusted assistant during the decryption process without taking decisions about who is eligible or not to decrypt data.Finally, we demonstrate that our scheme guarantees security requirements that we target and we also show through analysis that our scheme achieves effectively its goals.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123665570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Leakage Path Coverage in Android Apps 改进Android应用程序的泄漏路径覆盖率
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.258
G. Modi, V. Laxmi, Smita Naval, M. Gaur
With the phenomenal increase in Android apps usage and storing of personal information on mobile devices, securing this sensitive information has assumed significance. The Android application developers knowingly or unknowingly create apps that may directly or indirectly leak this information to outside world. The majority of state-of-the-art approachesdetect leaks through inter-component communication (ICC) within an app. Android allows inter-component communication (ICC) within the components of the same application or across multiple applications. ICC mechanism is used for the exchange of information among apps. Via ICC, an app or a set of apps can send the sensitive information out of the application or device.In this paper, we propose an approach for intra-app as well as inter-app data transfer analysis through intents and/or sharedpreferences that improve the coverage of leakage paths detectedas compared to existing approaches. Our proposed approach iscapable of analyzing more than two applications at a time. Wehave evaluated proposed approach on the DroidBench datasetand 116 real-time apps randomly selected and downloadedfrom Google PlayStore. We detected 1298 inter-component pathswithin an app and 215 inter-app sensitive paths. Our approachreported ~17.71% of more inter-component paths using sharedpreferences for data transfer.
随着Android应用程序的使用和个人信息在移动设备上的存储的显著增加,保护这些敏感信息具有重要意义。Android应用程序开发人员有意或无意地开发的应用程序可能直接或间接地将这些信息泄露给外部世界。大多数最先进的方法都是通过应用程序内的组件间通信(ICC)来检测泄漏。Android允许在同一应用程序或多个应用程序的组件内进行组件间通信(ICC)。ICC机制用于应用程序之间的信息交换。通过ICC,一个应用程序或一组应用程序可以将敏感信息发送出应用程序或设备。在本文中,我们提出了一种通过意图和/或共享偏好进行应用内部和应用间数据传输分析的方法,与现有方法相比,该方法提高了检测到的泄漏路径的覆盖范围。我们提出的方法不能同时分析两个以上的应用程序。我们在DroidBench数据集和116个随机选择并从Google PlayStore下载的实时应用程序上评估了提议的方法。我们在一个应用中检测到1298个组件间路径和215个应用间敏感路径。我们的方法报告了约17.71%的组件间路径使用共享偏好进行数据传输。
{"title":"Improving Leakage Path Coverage in Android Apps","authors":"G. Modi, V. Laxmi, Smita Naval, M. Gaur","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.258","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.258","url":null,"abstract":"With the phenomenal increase in Android apps usage and storing of personal information on mobile devices, securing this sensitive information has assumed significance. The Android application developers knowingly or unknowingly create apps that may directly or indirectly leak this information to outside world. The majority of state-of-the-art approachesdetect leaks through inter-component communication (ICC) within an app. Android allows inter-component communication (ICC) within the components of the same application or across multiple applications. ICC mechanism is used for the exchange of information among apps. Via ICC, an app or a set of apps can send the sensitive information out of the application or device.In this paper, we propose an approach for intra-app as well as inter-app data transfer analysis through intents and/or sharedpreferences that improve the coverage of leakage paths detectedas compared to existing approaches. Our proposed approach iscapable of analyzing more than two applications at a time. Wehave evaluated proposed approach on the DroidBench datasetand 116 real-time apps randomly selected and downloadedfrom Google PlayStore. We detected 1298 inter-component pathswithin an app and 215 inter-app sensitive paths. Our approachreported ~17.71% of more inter-component paths using sharedpreferences for data transfer.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NodeLeaper: Lower Overhead Oblivious AVL Tree NodeLeaper:低开销无关联AVL树
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.275
Yao Liu, Qingkai Zeng, Pinghai Yuan
Obliviousness is crypto primitives which intent to hide access pattern. Although ORAM is strongest crypto model, it incurs significant overhead. Elaine Shi et. al. propose Obliviousness Data Structrue (ODS) that makes a great theriotical improvement comparing to general ORAM algorithm, in case of the data blocks exhibit some degree of access predictability. Take AVL tree as an example, when all data blocks are organized as one AVL tree, every nodes (data blocks) contain position information points to both of its child node. As such, the client can immediately obtain the next position to be accessed instead of issuing another ORAM access to the server for a PosMap lookup. Also, the algorithm need extra client space for updating the AVL tree.In this paper, we introduce oblivious AVL tree NodeLeaper, NodeLeaper for short, which enables position information of all child nodes to share part of bits. As such one can store multiple positions for is child and grandson node positions with same block size. In this way, the search can be processed in a leap manner. As a result, NodeLeaper theriotically needs less ORAM accessand client space for node updating than ODS.
遗忘是一种意图隐藏访问模式的密码原语。虽然ORAM是最强的加密模型,但它会产生很大的开销。Elaine Shi等人提出了遗忘数据结构(ODS),在数据块表现出一定程度的访问可预测性的情况下,与一般的ORAM算法相比,它在理论上有了很大的改进。以AVL树为例,当所有数据块组织成一棵AVL树时,每个节点(数据块)都包含指向其两个子节点的位置信息。因此,客户端可以立即获得下一个要访问的位置,而不是向服务器发出另一个ORAM访问以进行PosMap查找。此外,该算法需要额外的客户端空间来更新AVL树。在本文中,我们引入了遗忘AVL树NodeLeaper,简称NodeLeaper,它使所有子节点的位置信息共享部分位。因此,可以为具有相同块大小的子节点和孙子节点存储多个位置。这样,搜索就可以以跳跃式的方式进行。因此,理论上NodeLeaper比ODS需要更少的ORAM访问客户端空间进行节点更新。
{"title":"NodeLeaper: Lower Overhead Oblivious AVL Tree","authors":"Yao Liu, Qingkai Zeng, Pinghai Yuan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.275","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.275","url":null,"abstract":"Obliviousness is crypto primitives which intent to hide access pattern. Although ORAM is strongest crypto model, it incurs significant overhead. Elaine Shi et. al. propose Obliviousness Data Structrue (ODS) that makes a great theriotical improvement comparing to general ORAM algorithm, in case of the data blocks exhibit some degree of access predictability. Take AVL tree as an example, when all data blocks are organized as one AVL tree, every nodes (data blocks) contain position information points to both of its child node. As such, the client can immediately obtain the next position to be accessed instead of issuing another ORAM access to the server for a PosMap lookup. Also, the algorithm need extra client space for updating the AVL tree.In this paper, we introduce oblivious AVL tree NodeLeaper, NodeLeaper for short, which enables position information of all child nodes to share part of bits. As such one can store multiple positions for is child and grandson node positions with same block size. In this way, the search can be processed in a leap manner. As a result, NodeLeaper theriotically needs less ORAM accessand client space for node updating than ODS.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Privacy-Preserving Outsourcing of Large-Scale QR Factorization 大规模QR分解的高效隐私保护外包
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.331
Changqing Luo, Kaijin Zhang, Sergio Salinas, Pan Li
Modern organizations have collected vast amounts of data created by various systems and applications. Scientists and engineers have a strong desire to advance scientific and engineering knowledge from such massive data. QR factorization is one of the most fundamental mathematical tools for data analysis. However, conducting QR factorization of a matrix requires high computational complexity. This incurs a formidable challenge in efficiently analyzing large-scale data sets by normal users or small companies on traditional resource limited computers. To overcome this limitation, industry and academia propose to employ cloud computing that can offer abundant computing resources. This, however, raises privacy concerns because users' data may contain sensitive information that needs to be hidden for ethical, legal, or security reasons. To this end, we propose a privacy-preserving outsourcing algorithm for efficiently performing large-scale QR factorization. We implement the proposed algorithm on the Amazon Elastic Compute Cloud (EC2) platform and a laptop. The experiment results show significant time saving for the user.
现代组织已经收集了由各种系统和应用程序创建的大量数据。科学家和工程师都有强烈的愿望,希望从如此庞大的数据中推进科学和工程知识。QR分解是数据分析最基本的数学工具之一。然而,对矩阵进行QR分解需要很高的计算复杂度。这给普通用户或小公司在传统资源有限的计算机上有效分析大规模数据集带来了巨大的挑战。为了克服这一限制,工业界和学术界都提出采用能够提供丰富计算资源的云计算。然而,这引起了隐私问题,因为用户的数据可能包含出于道德、法律或安全原因需要隐藏的敏感信息。为此,我们提出了一种保护隐私的外包算法,用于高效地执行大规模QR分解。我们在Amazon Elastic Compute Cloud (EC2)平台和笔记本电脑上实现了所提出的算法。实验结果表明,该方法为用户节省了大量的时间。
{"title":"Efficient Privacy-Preserving Outsourcing of Large-Scale QR Factorization","authors":"Changqing Luo, Kaijin Zhang, Sergio Salinas, Pan Li","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.331","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.331","url":null,"abstract":"Modern organizations have collected vast amounts of data created by various systems and applications. Scientists and engineers have a strong desire to advance scientific and engineering knowledge from such massive data. QR factorization is one of the most fundamental mathematical tools for data analysis. However, conducting QR factorization of a matrix requires high computational complexity. This incurs a formidable challenge in efficiently analyzing large-scale data sets by normal users or small companies on traditional resource limited computers. To overcome this limitation, industry and academia propose to employ cloud computing that can offer abundant computing resources. This, however, raises privacy concerns because users' data may contain sensitive information that needs to be hidden for ethical, legal, or security reasons. To this end, we propose a privacy-preserving outsourcing algorithm for efficiently performing large-scale QR factorization. We implement the proposed algorithm on the Amazon Elastic Compute Cloud (EC2) platform and a laptop. The experiment results show significant time saving for the user.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Fault-based Attack on AEZ v4.2 基于故障的AEZ v4.2攻击
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.294
Hassan Qahur Al Mahri, L. Simpson, Harry Bartlett, E. Dawson, Kenneth Koon-Ho Wong
This paper investigates differential fault attacks against AEZ v4.2 authenticated encryption scheme. AEZ uses three different 128-bit keys (I, J, L) and can potentially work without a nonce or with a repeated nonce. Under these conditions, this paper identifies the best place to apply differential fault attacks. We exploit the structure of AEZ to minimise the total number of faults required for key recovery. We propose an approach that can reduce the number of fault injections required to retrieve all three AEZ keys, I, J and L, from six to four such that these keys are uniquely determined. As a second step, we further reduce the fault injections to three without reducing the success rate of the key recovery attack. This improvement to differential fault attacks on AEZ makes these attacks more practical. The attacks in this paper are verified experimentally using a generic implementation of AEZ v4.2 developed in C.
研究了针对AEZ v4.2认证加密方案的差分故障攻击。AEZ使用三个不同的128位密钥(I, J, L),可以在没有nonce或重复nonce的情况下工作。在这些条件下,本文确定了应用微分故障攻击的最佳位置。我们利用AEZ的结构来最小化密钥恢复所需的故障总数。我们提出了一种方法,可以减少检索所有三个AEZ密钥(I, J和L)所需的错误注入次数,从6个减少到4个,从而使这些密钥是唯一确定的。第二步,在不降低密钥恢复攻击成功率的前提下,进一步将故障注入减少到3次。对AEZ的差分故障攻击的改进使这些攻击更加实用。本文中的攻击使用C语言开发的AEZ v4.2通用实现进行了实验验证。
{"title":"A Fault-based Attack on AEZ v4.2","authors":"Hassan Qahur Al Mahri, L. Simpson, Harry Bartlett, E. Dawson, Kenneth Koon-Ho Wong","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.294","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.294","url":null,"abstract":"This paper investigates differential fault attacks against AEZ v4.2 authenticated encryption scheme. AEZ uses three different 128-bit keys (I, J, L) and can potentially work without a nonce or with a repeated nonce. Under these conditions, this paper identifies the best place to apply differential fault attacks. We exploit the structure of AEZ to minimise the total number of faults required for key recovery. We propose an approach that can reduce the number of fault injections required to retrieve all three AEZ keys, I, J and L, from six to four such that these keys are uniquely determined. As a second step, we further reduce the fault injections to three without reducing the success rate of the key recovery attack. This improvement to differential fault attacks on AEZ makes these attacks more practical. The attacks in this paper are verified experimentally using a generic implementation of AEZ v4.2 developed in C.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127227276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fine-Grained Fingerprinting Threats to Software-Defined Networks 软件定义网络的细粒度指纹识别威胁
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.229
Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang
Thanks to its flexibility and programmable features, Software-Defined Networking (SDN) has been attracting more and more attention from the academia and the industry. Unfortunately, the fundamental characteristic of SDN that decouples control plane from data plane becomes a potential attack surface as well, which enables adversaries to fingerprint and attack the SDNs. Existing work showed the possibility of fingerprinting an SDN with time-based features. However, they are coarse grained. This paper proposes a fine-grained fingerprinting approach and reveals the much more severe threats to SDN Security. By analyzing network packets, the approach digs out match fields of SDN flow rules innovatively. Being sensitive and control-related information in SDN, the match fields of flow rules can be used to infer the type of an SDN controller and the security policy of the network. With these sensitive configuration information, adversaries can launch more targeted and destructive attacks against an SDN. We implement our approach in both simulative and physical environments. Furthermore, we conduct experiments with different kinds of SDN controllers to verify the effectiveness of our concept. Experiment results demonstrate the feasibility to obtain highly sensitive, fine-grained information in SDN, and hence reveal the high risk of information disclosure in SDN and severe threats of attacks against SDN.
软件定义网络(SDN)以其灵活性和可编程的特点,越来越受到学术界和业界的关注。不幸的是,SDN的基本特征是将控制平面与数据平面解耦,这也成为潜在的攻击面,使攻击者能够对SDN进行指纹识别和攻击。现有的工作表明,指纹识别具有时间特征的SDN是可能的。然而,它们是粗粒度的。本文提出了一种细粒度的指纹识别方法,揭示了SDN安全面临的更为严重的威胁。该方法通过对网络数据包的分析,创新地挖掘出SDN流规则的匹配域。流规则的匹配字段是SDN中敏感的、与控制相关的信息,可以用来推断SDN控制器的类型和网络的安全策略。有了这些敏感的配置信息,攻击者就可以对SDN发起更具针对性和破坏性的攻击。我们在模拟和物理环境中实施我们的方法。此外,我们对不同类型的SDN控制器进行了实验,以验证我们概念的有效性。实验结果证明了在SDN中获取高敏感、细粒度信息的可行性,从而揭示了SDN信息泄露的高风险和针对SDN攻击的严重威胁。
{"title":"Fine-Grained Fingerprinting Threats to Software-Defined Networks","authors":"Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.229","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.229","url":null,"abstract":"Thanks to its flexibility and programmable features, Software-Defined Networking (SDN) has been attracting more and more attention from the academia and the industry. Unfortunately, the fundamental characteristic of SDN that decouples control plane from data plane becomes a potential attack surface as well, which enables adversaries to fingerprint and attack the SDNs. Existing work showed the possibility of fingerprinting an SDN with time-based features. However, they are coarse grained. This paper proposes a fine-grained fingerprinting approach and reveals the much more severe threats to SDN Security. By analyzing network packets, the approach digs out match fields of SDN flow rules innovatively. Being sensitive and control-related information in SDN, the match fields of flow rules can be used to infer the type of an SDN controller and the security policy of the network. With these sensitive configuration information, adversaries can launch more targeted and destructive attacks against an SDN. We implement our approach in both simulative and physical environments. Furthermore, we conduct experiments with different kinds of SDN controllers to verify the effectiveness of our concept. Experiment results demonstrate the feasibility to obtain highly sensitive, fine-grained information in SDN, and hence reveal the high risk of information disclosure in SDN and severe threats of attacks against SDN.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1