首页 > 最新文献

2013 International Conference on Security and Cryptography (SECRYPT)最新文献

英文 中文
Preimage attack on BioHashing 对BioHashing的预映像攻击
Pub Date : 2013-07-29 DOI: 10.5220/0004524103630370
Patrick Lacharme, E. Cherrier, C. Rosenberger
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and security issues. The principle is to transform a biometric template in a BioCode, in order to enhance user privacy and application security. These schemes are used for template protection of several biometric modalities, as fingerprints or face and the robustness is generally related to the hardness to recover the original biometric template by an impostor. In this paper, we propose to use genetic algorithms to approximate the original biometric feature and spoof the authentication system. We show through experimental results on fingerprints the efficiency of the proposed attack on the BioHashing algorithm, by approximating the original FingerCode, given the seed and the corresponding BioCode.
生物特征识别越来越多地应用于各种应用的身份验证和访问控制中。生物特征数据与用户密切相关,如果没有适当的后处理,则不允许可撤销性或多样性。可取消的生物识别技术,包括非常流行的生物哈希算法,被用来处理潜在的隐私和安全问题。其原理是在BioCode中转换生物识别模板,以增强用户隐私和应用程序安全性。这些方案用于多种生物识别模式的模板保护,如指纹或人脸,鲁棒性通常与被冒名顶替者恢复原始生物识别模板的硬度有关。在本文中,我们提出使用遗传算法来近似原始生物特征并欺骗认证系统。我们通过指纹的实验结果表明,通过近似原始FingerCode,给定种子和相应的BioCode,提出的攻击生物哈希算法的效率。
{"title":"Preimage attack on BioHashing","authors":"Patrick Lacharme, E. Cherrier, C. Rosenberger","doi":"10.5220/0004524103630370","DOIUrl":"https://doi.org/10.5220/0004524103630370","url":null,"abstract":"Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and security issues. The principle is to transform a biometric template in a BioCode, in order to enhance user privacy and application security. These schemes are used for template protection of several biometric modalities, as fingerprints or face and the robustness is generally related to the hardness to recover the original biometric template by an impostor. In this paper, we propose to use genetic algorithms to approximate the original biometric feature and spoof the authentication system. We show through experimental results on fingerprints the efficiency of the proposed attack on the BioHashing algorithm, by approximating the original FingerCode, given the seed and the corresponding BioCode.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
An efficient approach to assessing the risk of zero-day vulnerabilities 一种评估零日漏洞风险的有效方法
Pub Date : 2013-07-29 DOI: 10.1007/978-3-662-44788-8_19
Massimiliano Albanese, S. Jajodia, A. Singhal, Lingyu Wang
{"title":"An efficient approach to assessing the risk of zero-day vulnerabilities","authors":"Massimiliano Albanese, S. Jajodia, A. Singhal, Lingyu Wang","doi":"10.1007/978-3-662-44788-8_19","DOIUrl":"https://doi.org/10.1007/978-3-662-44788-8_19","url":null,"abstract":"","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Abusing social networks with abuse reports: A coalition attack for social networks 用滥用报告滥用社交网络:对社交网络的联合攻击
Pub Date : 2013-07-29 DOI: 10.5220/0004523005000505
S. Trabelsi, Hana Bouafif
In Social Network websites, the users can report the bad behaviors of other users. In order to do so, they can create a kind of escalation ticket called abuse report in which they detail the infraction made by the “bad” user and help the website moderator to decide on a penalty. Today Social Networks count billions of users, the handling of the abuse reports is no more executed manually by moderators; they currently rely on some algorithms that automatically block the “bad” users until a moderator takes care of the case. In this paper we purport to demonstrate how such algorithms are maliciously used by attackers to illegally block innocent victims. We also propose to automate such an attack to demonstrate the big damage that can be caused in current social network websites. We also took the case study of Facebook as proof of concept.
在社交网站上,用户可以举报其他用户的不良行为。为了做到这一点,他们可以创建一种称为滥用报告的升级票,其中详细说明“坏”用户的违规行为,并帮助网站版主决定处罚。如今,社交网络拥有数十亿用户,滥用报告的处理不再由版主手动执行;他们目前依赖于一些自动屏蔽“坏”用户的算法,直到版主处理这个问题。在本文中,我们旨在证明攻击者如何恶意使用这些算法来非法阻止无辜的受害者。我们还建议将这种攻击自动化,以展示当前社交网站可能造成的巨大损害。我们还以Facebook为例进行了概念验证。
{"title":"Abusing social networks with abuse reports: A coalition attack for social networks","authors":"S. Trabelsi, Hana Bouafif","doi":"10.5220/0004523005000505","DOIUrl":"https://doi.org/10.5220/0004523005000505","url":null,"abstract":"In Social Network websites, the users can report the bad behaviors of other users. In order to do so, they can create a kind of escalation ticket called abuse report in which they detail the infraction made by the “bad” user and help the website moderator to decide on a penalty. Today Social Networks count billions of users, the handling of the abuse reports is no more executed manually by moderators; they currently rely on some algorithms that automatically block the “bad” users until a moderator takes care of the case. In this paper we purport to demonstrate how such algorithms are maliciously used by attackers to illegally block innocent victims. We also propose to automate such an attack to demonstrate the big damage that can be caused in current social network websites. We also took the case study of Facebook as proof of concept.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Instance-based anomaly method for Android malware detection 基于实例的Android恶意软件异常检测方法
Pub Date : 2013-07-29 DOI: 10.5220/0004529603870394
Borja Sanz, I. Santos, Xabier Ugarte-Pedrero, Carlos Laorden, J. Nieves, P. G. Bringas
The usage of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has increased. Android application distribution is based on a centralized market where the developers can upload and sell their applications. However, as it happens with any popular service, it is prone to misuse and, in particular, malware writers can use this market to upload their malicious creations. In this paper, we propose a new method that, based upon several features that are extracted from the AndroidManifest file of the legitimate applications, builds an anomaly detection system able to detect malware.
手机在我们生活中的使用越来越多,因为它们提供的功能几乎和个人电脑一样。此外,基于android的移动设备可用的应用程序数量也有所增加。Android应用分发基于一个集中的市场,开发者可以在这里上传和销售他们的应用。然而,就像任何流行的服务一样,它很容易被滥用,尤其是恶意软件编写者可以利用这个市场上传他们的恶意作品。在本文中,我们提出了一种新的方法,基于从合法应用程序的AndroidManifest文件中提取的几个特征,构建一个能够检测恶意软件的异常检测系统。
{"title":"Instance-based anomaly method for Android malware detection","authors":"Borja Sanz, I. Santos, Xabier Ugarte-Pedrero, Carlos Laorden, J. Nieves, P. G. Bringas","doi":"10.5220/0004529603870394","DOIUrl":"https://doi.org/10.5220/0004529603870394","url":null,"abstract":"The usage of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has increased. Android application distribution is based on a centralized market where the developers can upload and sell their applications. However, as it happens with any popular service, it is prone to misuse and, in particular, malware writers can use this market to upload their malicious creations. In this paper, we propose a new method that, based upon several features that are extracted from the AndroidManifest file of the legitimate applications, builds an anomaly detection system able to detect malware.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115260818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
From a logical approach to internal states of Hash functions how SAT problem can help to understand SHA-⋆ and MD⋆ 从逻辑方法到哈希函数的内部状态SAT问题如何帮助理解SHA-美女和MD -美女
Pub Date : 2013-07-29 DOI: 10.5220/0004534104350443
F. Legendre, Gilles Dequen, M. Krajecki
This paper deals with logical cryptanalysis of hash functions. They are commonly used to check data integrity and to authenticate protocols. These functions compute, from an any-length message, a fixed-length bit string, usually named digest. This work defines an experimental framework, that allows, thanks to the propositional formalism, to study cryptosystems at the bit level through corresponding instances of the SAT problem. Thus, we show that some internal words of popular hashing functions MD⋆ and SHA-⋆ are not as random as expected and provide some convincing elements to explain this phenomenon by the use of round constants. Because this presents several weaknesses, we show how to detect and exploit these ones through an application based on logical cryptanalysis. As a result we show equivalences, and quasi-equivalences between digits and explain how we inverse reduced-step versions of MD5 and SHA-1.
本文讨论了哈希函数的逻辑密码分析。它们通常用于检查数据完整性和验证协议。这些函数从任意长度的消息计算固定长度的位字符串,通常命名为digest。这项工作定义了一个实验框架,由于命题形式主义,它允许通过SAT问题的相应实例在位水平上研究密码系统。因此,我们展示了一些流行的哈希函数MD -百科和SHA-百科的内部词并不像预期的那样随机,并通过使用整数常量提供了一些令人信服的元素来解释这种现象。由于这暴露了几个弱点,我们将展示如何通过基于逻辑密码分析的应用程序检测和利用这些弱点。因此,我们展示了数字之间的等价和准等价,并解释了我们如何逆MD5和SHA-1的简化版本。
{"title":"From a logical approach to internal states of Hash functions how SAT problem can help to understand SHA-⋆ and MD⋆","authors":"F. Legendre, Gilles Dequen, M. Krajecki","doi":"10.5220/0004534104350443","DOIUrl":"https://doi.org/10.5220/0004534104350443","url":null,"abstract":"This paper deals with logical cryptanalysis of hash functions. They are commonly used to check data integrity and to authenticate protocols. These functions compute, from an any-length message, a fixed-length bit string, usually named digest. This work defines an experimental framework, that allows, thanks to the propositional formalism, to study cryptosystems at the bit level through corresponding instances of the SAT problem. Thus, we show that some internal words of popular hashing functions MD⋆ and SHA-⋆ are not as random as expected and provide some convincing elements to explain this phenomenon by the use of round constants. Because this presents several weaknesses, we show how to detect and exploit these ones through an application based on logical cryptanalysis. As a result we show equivalences, and quasi-equivalences between digits and explain how we inverse reduced-step versions of MD5 and SHA-1.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"29 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic proofs of retrievability from Chameleon-Hashes 变色龙哈希可检索性的动态证明
Pub Date : 2013-07-29 DOI: 10.5220/0004505102960304
S. Rass
Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the consistent existence and availability of data residing at a potentially untrusted storage provider, e.g., a cloud. While most POR protocols strictly refer to static files, i.e., content that is read-only, dynamic PORs shall achieve the same security guarantees (existence, consistency and the possibility to retrieve the data) for content that is subject to an unlimited number of (legitimate) modifications. This work discusses how to construct such a dynamic proof of retrievability from chameleon hashes (trapdoor commitments). Like standard POR constructions, the presented scheme is sentinel-based and does audit queries via spot checking mechanism. Unlike previous schemes, however, a-posteriori insertions of new sentinels throughout the lifetime of the file is supported. This novel feature is apparently absent in any other POR scheme in the literature. Moreover, the system is designed for compatibility with XML structured data files.
可检索性证明(POR)是一种交互式协议,允许验证者检查驻留在可能不受信任的存储提供商(例如云)中的数据的一致性存在性和可用性。虽然大多数POR协议严格引用静态文件,即只读的内容,但动态POR应该为无限制(合法)修改的内容实现相同的安全保证(存在性、一致性和检索数据的可能性)。这项工作讨论了如何从变色龙哈希(陷阱门承诺)中构造这样一个可恢复性的动态证明。与标准的POR结构一样,本文提出的方案是基于哨兵的,并通过抽查机制对查询进行审计。然而,与以前的方案不同的是,它支持在整个文件生命周期内对新哨兵进行事后插入。这一新颖的特征在文献中的任何其他POR方案中显然是不存在的。此外,该系统是为兼容XML结构化数据文件而设计的。
{"title":"Dynamic proofs of retrievability from Chameleon-Hashes","authors":"S. Rass","doi":"10.5220/0004505102960304","DOIUrl":"https://doi.org/10.5220/0004505102960304","url":null,"abstract":"Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the consistent existence and availability of data residing at a potentially untrusted storage provider, e.g., a cloud. While most POR protocols strictly refer to static files, i.e., content that is read-only, dynamic PORs shall achieve the same security guarantees (existence, consistency and the possibility to retrieve the data) for content that is subject to an unlimited number of (legitimate) modifications. This work discusses how to construct such a dynamic proof of retrievability from chameleon hashes (trapdoor commitments). Like standard POR constructions, the presented scheme is sentinel-based and does audit queries via spot checking mechanism. Unlike previous schemes, however, a-posteriori insertions of new sentinels throughout the lifetime of the file is supported. This novel feature is apparently absent in any other POR scheme in the literature. Moreover, the system is designed for compatibility with XML structured data files.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121485648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A security-enhanced design methodology for embedded systems 嵌入式系统的安全增强设计方法
Pub Date : 2013-07-29 DOI: 10.5220/0004501000390050
A. Ferrante, Jelena Milosevic, Marija Janjusevic
Designing an embedded system is a complex process that involves working both on hardware and on software. Designers often optimize the systems that they design for specific applications; an optimal system is the one that can execute the desired set of applications with the required performances at the lowest possible cost. Cost may be expressed in different ways such as, for example, energy consumption and/or silicon area. Security is being, in the common practice, disregarded during this phase and inserted in later stages of the design process, thus obtaining non optimal and/or non safe systems. In this paper we propose a design methodology for embedded systems that integrate the choice of suitable design solutions into the early stages of the design process. The main purpose of this methodology is to provide a way to evaluate security as an additional optimization parameter. Along with a description of the methodology, in this paper we also show a case study that explains how the methodology can be applied and that proves its effectiveness.
设计嵌入式系统是一个复杂的过程,涉及硬件和软件的工作。设计师经常优化他们为特定应用设计的系统;最优系统是能够以尽可能低的成本以所需的性能执行所需的一组应用程序的系统。成本可以用不同的方式表示,例如,能源消耗和/或硅面积。在通常的实践中,安全性在这一阶段被忽略,并被插入到设计过程的后期阶段,从而得到非最佳和/或不安全的系统。在本文中,我们提出了一种嵌入式系统的设计方法,该方法将合适的设计解决方案的选择集成到设计过程的早期阶段。这种方法的主要目的是提供一种将安全性作为附加优化参数进行评估的方法。除了对方法的描述之外,本文还展示了一个案例研究,该案例研究解释了如何应用该方法并证明了其有效性。
{"title":"A security-enhanced design methodology for embedded systems","authors":"A. Ferrante, Jelena Milosevic, Marija Janjusevic","doi":"10.5220/0004501000390050","DOIUrl":"https://doi.org/10.5220/0004501000390050","url":null,"abstract":"Designing an embedded system is a complex process that involves working both on hardware and on software. Designers often optimize the systems that they design for specific applications; an optimal system is the one that can execute the desired set of applications with the required performances at the lowest possible cost. Cost may be expressed in different ways such as, for example, energy consumption and/or silicon area. Security is being, in the common practice, disregarded during this phase and inserted in later stages of the design process, thus obtaining non optimal and/or non safe systems. In this paper we propose a design methodology for embedded systems that integrate the choice of suitable design solutions into the early stages of the design process. The main purpose of this methodology is to provide a way to evaluate security as an additional optimization parameter. Along with a description of the methodology, in this paper we also show a case study that explains how the methodology can be applied and that proves its effectiveness.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122353919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure second price auctions with a rational auctioneer 确保与理性的拍卖人进行第二价格拍卖
Pub Date : 2013-07-29 DOI: 10.5220/0004526101580169
Boaz Catane, A. Herzberg
We present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because commonly used requirements, such as the indistinguishability-based secrecy requirement of encryption schemes presented by (Goldwasser and Micali, 1982), do not fit properly in the second price auctions context. Additionally, the presented protocol uses a trustworthy supervisor that checks if the auctioneer deviated from the protocol and fines him accordingly. By making sure the expected utility of the auctioneer when deviating from the protocol is lower than his expected utility when abiding by the protocol we ascertain that a rational auctioneer will abide by the protocol. This allows the supervisor to optimize by performing (computationally-intensive) inspections of the auctioneer with only low probability.
我们提出了新的第二价格拍卖的安全要求和一个简单、有效和实用的协议,可以证明维护这些要求。需要新的要求,因为常用的要求,如(Goldwasser和Micali, 1982)提出的基于不可区分性的加密方案的保密要求,不适合第二种价格拍卖环境。此外,提出的协议使用一个值得信赖的监督者来检查拍卖商是否偏离了协议并对他进行相应的罚款。通过确定拍卖人偏离协议时的预期效用低于遵守协议时的预期效用,可以确定理性的拍卖人会遵守协议。这允许主管以低概率执行(计算密集型)对拍卖师的检查来优化。
{"title":"Secure second price auctions with a rational auctioneer","authors":"Boaz Catane, A. Herzberg","doi":"10.5220/0004526101580169","DOIUrl":"https://doi.org/10.5220/0004526101580169","url":null,"abstract":"We present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because commonly used requirements, such as the indistinguishability-based secrecy requirement of encryption schemes presented by (Goldwasser and Micali, 1982), do not fit properly in the second price auctions context. Additionally, the presented protocol uses a trustworthy supervisor that checks if the auctioneer deviated from the protocol and fines him accordingly. By making sure the expected utility of the auctioneer when deviating from the protocol is lower than his expected utility when abiding by the protocol we ascertain that a rational auctioneer will abide by the protocol. This allows the supervisor to optimize by performing (computationally-intensive) inspections of the auctioneer with only low probability.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The usability of CAPTCHAs on smartphones 智能手机上验证码的可用性
Pub Date : 2013-07-29 DOI: 10.5220/0004533904270434
Gerardo Reynaga, S. Chiasson
Completely Automated Public Turing tests to tell Computers and Humans Apart (CAPTCHA) are challenge-response tests used on the web to distinguish human users from automated bots (von Ahn et al., 2004). In this paper, we present an exploratory analysis of the results obtained from a user study and a heuristic evaluation of captchas on smartphones; we aimed to identify opportunities and guide improvements for captchas on smartphones. Results showed that existing captcha schemes face effectiveness and user satisfaction problems. Among the more severe problems found were the need to often zoom and pan, and too small control buttons. Based on our results, we present deployment and design guidelines for captchas on smartphones.
完全自动化公共图灵测试来区分计算机和人类(CAPTCHA)是在网络上使用的挑战响应测试,用于区分人类用户和自动机器人(von Ahn等人,2004)。在本文中,我们对用户研究结果进行了探索性分析,并对智能手机上的验证码进行了启发式评估;我们的目标是识别机会,并指导改进智能手机上的验证码。结果表明,现有验证码方案存在有效性和用户满意度问题。更严重的问题是需要经常缩放和平移,以及控制按钮太小。基于我们的研究结果,我们提出了智能手机上验证码的部署和设计指南。
{"title":"The usability of CAPTCHAs on smartphones","authors":"Gerardo Reynaga, S. Chiasson","doi":"10.5220/0004533904270434","DOIUrl":"https://doi.org/10.5220/0004533904270434","url":null,"abstract":"Completely Automated Public Turing tests to tell Computers and Humans Apart (CAPTCHA) are challenge-response tests used on the web to distinguish human users from automated bots (von Ahn et al., 2004). In this paper, we present an exploratory analysis of the results obtained from a user study and a heuristic evaluation of captchas on smartphones; we aimed to identify opportunities and guide improvements for captchas on smartphones. Results showed that existing captcha schemes face effectiveness and user satisfaction problems. Among the more severe problems found were the need to often zoom and pan, and too small control buttons. Based on our results, we present deployment and design guidelines for captchas on smartphones.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132502060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A dynamic watermarking model for embedding reducible permutation graphs into software 一种可约置换图嵌入软件的动态水印模型
Pub Date : 2013-07-29 DOI: 10.5220/0004509600740085
Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos
Software watermarking involves embedding a unique identifier or, equivalently, a watermark value, within a software to discourage software theft; towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F[π] through the use of self-inverting permutations π. In this paper, we propose a dynamic watermarking model for embedding the watermark graph F[π] into an application program P. The main idea behind the proposed watermarking model is a systematic use of appropriate calls of specific functions of the program P. More precisely, our model uses the dynamic call-graph G(P, Ikey) of the program P, taken by the specific input Ikey, and the graph F[π], and produces the watermarked program P having the following key property: its dynamic call-graph G(P, Ikey) and the reducible permutation graph F[π] are isomorphic graphs. Within this idea the program P is produced by only altering appropriate real-calls of specific functions of the input program P. Moreover, the proposed watermarking model incorporates such properties which cause it resilient to attacks.
软件水印涉及在软件中嵌入唯一标识符或水印值,以阻止软件盗窃;在嵌入过程中,几种图论水印算法将水印值编码为图结构并嵌入到应用程序中。最近,我们提出了一种有效的编解码系统,利用自逆置换π∗将水印数w编码为可约置换图F[π∗]。在本文中,我们提出了一个动态水印模型,用于将水印图F[π∗]嵌入到应用程序P中。所提出的水印模型背后的主要思想是系统地使用程序P的特定函数的适当调用。更准确地说,我们的模型使用程序P的动态调用图G(P, Ikey),由特定的输入Ikey和图F[π∗]取,并产生具有以下密钥属性的水印程序P∗:其动态召唤图G(P∗,Ikey)与可约置换图F[π∗]是同构图。在这个想法中,程序P *仅通过改变输入程序P的特定函数的适当实调用来产生。此外,所提出的水印模型包含了使其具有抗攻击能力的属性。
{"title":"A dynamic watermarking model for embedding reducible permutation graphs into software","authors":"Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos","doi":"10.5220/0004509600740085","DOIUrl":"https://doi.org/10.5220/0004509600740085","url":null,"abstract":"Software watermarking involves embedding a unique identifier or, equivalently, a watermark value, within a software to discourage software theft; towards the embedding process, several graph theoretic watermarking algorithmic techniques encode the watermark values as graph structures and embed them in application programs. Recently, we presented an efficient codec system for encoding a watermark number w as a reducible permutation graph F[π<sup>∗</sup>] through the use of self-inverting permutations π<sup>∗</sup>. In this paper, we propose a dynamic watermarking model for embedding the watermark graph F[π<sup>∗</sup>] into an application program P. The main idea behind the proposed watermarking model is a systematic use of appropriate calls of specific functions of the program P. More precisely, our model uses the dynamic call-graph G(P, I<inf>key</inf>) of the program P, taken by the specific input I<inf>key</inf>, and the graph F[π<sup>∗</sup>], and produces the watermarked program P<sup>∗</sup> having the following key property: its dynamic call-graph G(P<sup>∗</sup>, I<inf>key</inf>) and the reducible permutation graph F[π<sup>∗</sup>] are isomorphic graphs. Within this idea the program P<sup>∗</sup> is produced by only altering appropriate real-calls of specific functions of the input program P. Moreover, the proposed watermarking model incorporates such properties which cause it resilient to attacks.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 International Conference on Security and Cryptography (SECRYPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1