首页 > 最新文献

2013 International Conference on Security and Cryptography (SECRYPT)最新文献

英文 中文
SVD-based digital image watermarking on approximated orthogonal matrix 基于svd的近似正交矩阵数字图像水印
Pub Date : 2013-07-29 DOI: 10.5220/0004507903210330
Y. Zolotavkin, M. Juhola
A new watermarking method based on Singular Value Decomposition is proposed in this paper. The method uses new embedding rules to store a watermark in orthogonal matrix U that is preprocessed in advance in order to fit a proposed model of orthogonal matrix. Some experiments involving common distortions for grayscale images were done in order to confirm efficiency of the proposed method. The robustness of watermark embedded by our method was higher for all the proposed rules under condition of jpeg compression and in some cases outperformed existing method for more than 46%.
提出了一种新的基于奇异值分解的水印方法。该方法利用新的嵌入规则将水印存储在经过预处理的正交矩阵U中,以拟合所提出的正交矩阵模型。为了验证该方法的有效性,对灰度图像进行了一些常见畸变的实验。在jpeg压缩条件下,我们的方法嵌入水印的鲁棒性高于所有规则,在某些情况下比现有方法的鲁棒性高出46%以上。
{"title":"SVD-based digital image watermarking on approximated orthogonal matrix","authors":"Y. Zolotavkin, M. Juhola","doi":"10.5220/0004507903210330","DOIUrl":"https://doi.org/10.5220/0004507903210330","url":null,"abstract":"A new watermarking method based on Singular Value Decomposition is proposed in this paper. The method uses new embedding rules to store a watermark in orthogonal matrix U that is preprocessed in advance in order to fit a proposed model of orthogonal matrix. Some experiments involving common distortions for grayscale images were done in order to confirm efficiency of the proposed method. The robustness of watermark embedded by our method was higher for all the proposed rules under condition of jpeg compression and in some cases outperformed existing method for more than 46%.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A game theory based repeated rational secret sharing scheme for privacy preserving distributed data mining 基于博弈论的分布式数据挖掘重复理性秘密共享方案
Pub Date : 2013-07-29 DOI: 10.5220/0004525205120517
Nirali R. Nanavati, D. Jinwala
Collaborative data mining has become very useful today with the immense increase in the amount of data collected and the increase in competition. This in turn increases the need to preserve the participants' privacy. There have been a number of approaches proposed that use Secret Sharing for privacy preservation for Secure Multiparty Computation (SMC) in different setups and applications. The different multiparty scenarios may have parties that are semi-honest, rational or malicious. A number of approaches have been proposed for semi honest parties in this setup. The problem however is that in reality we have to deal with parties that act in their self-interest and are rational. These rational parties may try and attain maximum gain without disrupting the protocol. Also these parties if cautioned would correct themselves to have maximum individual gain in the future. Thus we propose a new practical game theoretic approach with three novel punishment policies with the primary advantage that it avoids the use of expensive techniques like homomorphic encryption. Our proposed approach is applicable to the secret sharing scheme among rational parties in distributed data mining. We have analysed theoretically the proposed novel punishment policies for this approach. We have also empirically evaluated and implemented our scheme using Java. We compare the punishment policies proposed in terms of the number of rounds required to attain the Nash equilibrium with eventually no bad rational nodes with different percentage of initial bad nodes.
随着数据收集量的巨大增加和竞争的加剧,协作数据挖掘在今天变得非常有用。这反过来又增加了保护参与者隐私的需要。在不同的设置和应用程序中,已经提出了许多使用秘密共享来保护安全多方计算(SMC)隐私的方法。不同的多方方案可能有半诚实、理性或恶意的各方。在这种情况下,已经为半诚实的各方提出了许多方法。然而,问题是,在现实中,我们必须与那些出于自身利益行事且理性的政党打交道。这些理性的各方可能试图在不破坏协议的情况下获得最大的收益。此外,如果受到警告,这些各方将纠正自己,以便在未来获得最大的个人利益。因此,我们提出了一种新的实用的博弈论方法,它具有三种新的惩罚策略,其主要优点是避免了使用昂贵的技术,如同态加密。该方法适用于分布式数据挖掘中理性各方之间的秘密共享方案。我们从理论上分析了针对这种做法提出的新的惩罚政策。我们还使用Java对我们的方案进行了经验评估和实现。在初始不良节点比例不同的情况下,我们根据达到最终无不良理性节点的纳什均衡所需的轮数对所提出的惩罚策略进行了比较。
{"title":"A game theory based repeated rational secret sharing scheme for privacy preserving distributed data mining","authors":"Nirali R. Nanavati, D. Jinwala","doi":"10.5220/0004525205120517","DOIUrl":"https://doi.org/10.5220/0004525205120517","url":null,"abstract":"Collaborative data mining has become very useful today with the immense increase in the amount of data collected and the increase in competition. This in turn increases the need to preserve the participants' privacy. There have been a number of approaches proposed that use Secret Sharing for privacy preservation for Secure Multiparty Computation (SMC) in different setups and applications. The different multiparty scenarios may have parties that are semi-honest, rational or malicious. A number of approaches have been proposed for semi honest parties in this setup. The problem however is that in reality we have to deal with parties that act in their self-interest and are rational. These rational parties may try and attain maximum gain without disrupting the protocol. Also these parties if cautioned would correct themselves to have maximum individual gain in the future. Thus we propose a new practical game theoretic approach with three novel punishment policies with the primary advantage that it avoids the use of expensive techniques like homomorphic encryption. Our proposed approach is applicable to the secret sharing scheme among rational parties in distributed data mining. We have analysed theoretically the proposed novel punishment policies for this approach. We have also empirically evaluated and implemented our scheme using Java. We compare the punishment policies proposed in terms of the number of rounds required to attain the Nash equilibrium with eventually no bad rational nodes with different percentage of initial bad nodes.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient group signatures with verifier-local revocation employing a natural expiration 具有使用自然过期的验证器本地撤销的高效组签名
Pub Date : 2013-07-29 DOI: 10.5220/0004600105550560
L. Malina, J. Hajny, Zdenek Martinasek
This paper presents a novel proposal of group signatures with verifier-local revocation employing a natural expiration to ensure an efficient verification of signatures and a revocation check. Current group signatures have an expensive verification phase which takes several pairing operations and checks a long-sized revocation list, especially, if a large number of users are in the group. Generally, the revocation list grows linearly every time when a new revoked user is added into the list unless group parameters and keys are not reinitialized. Nevertheless, the reinitialization is not feasible and burdens the communication overhead in many communication systems. In these schemes, the verification of several signatures with the long-sized revocation list takes too much time. Our proposed group signature scheme offers the more efficient verification phase which employs the revocation list that is reduced in time by a natural expiration of group member secret keys. Due to an optimization in the verification phase, our scheme is more efficient than related solutions.
本文提出了一种新的验证者本地撤销的群签名方案,该方案采用自然过期来保证签名的有效验证和撤销检查。当前的组签名有一个昂贵的验证阶段,需要进行多次配对操作并检查长长度的吊销列表,特别是在组中有大量用户的情况下。通常,除非组参数和密钥没有重新初始化,否则每次将新的被吊销用户添加到列表中时,吊销列表都会线性增长。然而,在许多通信系统中,重新初始化是不可行的,并且增加了通信开销。在这些方案中,使用长长度的撤销列表验证多个签名需要花费过多的时间。我们提出的组签名方案提供了更有效的验证阶段,该验证阶段采用了由组成员密钥自然过期而减少的撤销列表。由于验证阶段的优化,我们的方案比相关的解决方案更高效。
{"title":"Efficient group signatures with verifier-local revocation employing a natural expiration","authors":"L. Malina, J. Hajny, Zdenek Martinasek","doi":"10.5220/0004600105550560","DOIUrl":"https://doi.org/10.5220/0004600105550560","url":null,"abstract":"This paper presents a novel proposal of group signatures with verifier-local revocation employing a natural expiration to ensure an efficient verification of signatures and a revocation check. Current group signatures have an expensive verification phase which takes several pairing operations and checks a long-sized revocation list, especially, if a large number of users are in the group. Generally, the revocation list grows linearly every time when a new revoked user is added into the list unless group parameters and keys are not reinitialized. Nevertheless, the reinitialization is not feasible and burdens the communication overhead in many communication systems. In these schemes, the verification of several signatures with the long-sized revocation list takes too much time. Our proposed group signature scheme offers the more efficient verification phase which employs the revocation list that is reduced in time by a natural expiration of group member secret keys. Due to an optimization in the verification phase, our scheme is more efficient than related solutions.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modelling SCADA and corporate network of a medium voltage power grid under cyber attacks 网络攻击下的中压电网SCADA和企业网络建模
Pub Date : 2013-07-29 DOI: 10.5220/0004523501230134
E. Ciancamerla, M. Minichino, S. Palmieri
There is an increasing concern over the cyber security of Critical Infrastructures (CI) due to the increasing ability of cyber attackers to cause even catastrophic failures. It is mainly due to the pervasiveness of ICT (Information and Communication Technologies) and to the consequent de isolation of SCADA (Supervision, Control and Data Acquisition) system, which represents the nervous system of most CIs. Cyber attacks could block the connection between SCADA Control Centre and its remote devices or insert fake commands/measurements in the equipment communications. With reference to an actual case study, constituted by a SCADA system controlling a portion of a medium voltage power grid and a corporate network, we discuss how cyber threats, vulnerabilities and attacks might degrade the functionalities of SCADA and corporate network, which, in turn, might lead to outages of the electrical grid. We represent SCADA and corporate network under malware propagation, Denial of Service and Man In The Middle attacks and predict their consequent performance degradation. Particularly, we use NetLogo to identify possible malware propagation in relation to SCADA & corporate security policies adopted from the utility and NS2 simulator to compute the consequences of the attacks on SCADA and in turn on power grid.
由于网络攻击者造成灾难性故障的能力日益增强,人们越来越关注关键基础设施(CI)的网络安全。这主要是由于ICT(信息和通信技术)的普及以及随之而来的SCADA(监督、控制和数据采集)系统的分离,SCADA系统代表了大多数ci的神经系统。网络攻击可以阻断SCADA控制中心与其远程设备之间的连接,或者在设备通信中插入虚假命令/测量。通过一个实际的案例研究,由一个控制部分中压电网和企业网络的SCADA系统构成,我们讨论了网络威胁、漏洞和攻击如何降低SCADA和企业网络的功能,进而可能导致电网中断。我们代表了恶意软件传播、拒绝服务和中间人攻击下的SCADA和企业网络,并预测了它们随后的性能下降。特别是,我们使用NetLogo来识别与SCADA相关的可能的恶意软件传播,以及从实用程序和NS2模拟器采用的公司安全策略,以计算对SCADA攻击的后果,进而对电网进行攻击。
{"title":"Modelling SCADA and corporate network of a medium voltage power grid under cyber attacks","authors":"E. Ciancamerla, M. Minichino, S. Palmieri","doi":"10.5220/0004523501230134","DOIUrl":"https://doi.org/10.5220/0004523501230134","url":null,"abstract":"There is an increasing concern over the cyber security of Critical Infrastructures (CI) due to the increasing ability of cyber attackers to cause even catastrophic failures. It is mainly due to the pervasiveness of ICT (Information and Communication Technologies) and to the consequent de isolation of SCADA (Supervision, Control and Data Acquisition) system, which represents the nervous system of most CIs. Cyber attacks could block the connection between SCADA Control Centre and its remote devices or insert fake commands/measurements in the equipment communications. With reference to an actual case study, constituted by a SCADA system controlling a portion of a medium voltage power grid and a corporate network, we discuss how cyber threats, vulnerabilities and attacks might degrade the functionalities of SCADA and corporate network, which, in turn, might lead to outages of the electrical grid. We represent SCADA and corporate network under malware propagation, Denial of Service and Man In The Middle attacks and predict their consequent performance degradation. Particularly, we use NetLogo to identify possible malware propagation in relation to SCADA & corporate security policies adopted from the utility and NS2 simulator to compute the consequences of the attacks on SCADA and in turn on power grid.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129277032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient and provably secure certificateless identification scheme 一个有效且可证明安全的无证书识别方案
Pub Date : 2013-07-29 DOI: 10.5220/0004526303710378
Ji-Jian Chin, R. Phan, R. Behnia, Swee-Huay Heng
Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user's secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.
Bellare et al.和Kurosawa and Heng于2004年首次独立形制了基于身份的身份识别,但由于生成用户秘钥的TA对每个用户的秘钥都有完全的访问权,因此身份识别仍然存在固有的密钥托管问题。2003年,Al-Riyami和Paterson引入了无证书加密的概念,随后文献中引入了许多无证书加密、签名等方案。但是,到目前为止,仍然没有无证书的身份查验办法。因此,在本文中,我们形式化了无证书标识方案的概念,并构造了第一个具体的无证书标识方案。
{"title":"An efficient and provably secure certificateless identification scheme","authors":"Ji-Jian Chin, R. Phan, R. Behnia, Swee-Huay Heng","doi":"10.5220/0004526303710378","DOIUrl":"https://doi.org/10.5220/0004526303710378","url":null,"abstract":"Identity-based identification, first formalized independently by Bellare et al. and Kurosawa and Heng in 2004, still had the inherent key escrow problem, as the TA generating the user secret keys had full access to every user's secret key. In 2003, Al-Riyami and Paterson introduced the notion of certificateless cryptography, and subsequently many certificateless encryption, signature and other schemes were introduced in literature. However, to this date there are still no certificateless identification schemes in existence. Therefore, in this paper, we formalize the notion of certificateless identification schemes and construct the first concrete certificateless identification scheme.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones 基于策略的移动终端用户设备安全评估是Android智能手机移动设备管理解决方案的替代方案
Pub Date : 2013-07-29 DOI: 10.5220/0004509903470354
Thomas Zefferer, Peter Teufl
For security-critical applications, the integrity and security of end-user devices is of particular importance. This especially applies to mobile applications that use smartphones to process security-critical data. Unfortunately, users often compromise the security of smartphones by disabling security features for convenience reasons or by unintentionally installing malware from untrusted application sources. Mobile device management (MDM) solutions overcome this problem by providing means to centrally manage and configure smartphones. However, MDM is mainly suitable for corporate environments but often cannot be applied in non-corporate fields of application such as m-banking or m-government. To address this problem, we propose an alternative approach to assure the security and integrity of smartphones. Our approach relies on a device assessor that evaluates the current state of a smartphone according to a security policy. Integration of this device assessor allows smartphone applications to condition the processing of security-critical data on the smartphone's compliance with a defined security policy. We have shown the practicability of the proposed approach by means of a concrete implementation for the Android platform. We have evaluated this implementation on different Android devices. Obtained results show that our approach constitutes an appropriate alternative for scenarios, in which MDM cannot be applied.
对于安全关键型应用,终端用户设备的完整性和安全性尤为重要。这尤其适用于使用智能手机处理安全关键数据的移动应用程序。不幸的是,用户经常因为方便而禁用安全功能,或者无意中从不受信任的应用程序源安装恶意软件,从而损害智能手机的安全性。移动设备管理(MDM)解决方案通过提供集中管理和配置智能手机的方法,克服了这个问题。但是,MDM主要适用于企业环境,而通常不能应用于非企业领域的应用程序,如移动银行或移动政府。为了解决这个问题,我们提出了另一种方法来确保智能手机的安全性和完整性。我们的方法依赖于一个设备评估器,它根据安全策略评估智能手机的当前状态。该设备评估器的集成允许智能手机应用程序根据智能手机是否符合已定义的安全策略来限制安全关键数据的处理。我们通过Android平台的具体实现证明了所提出方法的实用性。我们已经在不同的Android设备上评估了这个实现。获得的结果表明,对于不能应用MDM的场景,我们的方法是一种合适的替代方案。
{"title":"Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones","authors":"Thomas Zefferer, Peter Teufl","doi":"10.5220/0004509903470354","DOIUrl":"https://doi.org/10.5220/0004509903470354","url":null,"abstract":"For security-critical applications, the integrity and security of end-user devices is of particular importance. This especially applies to mobile applications that use smartphones to process security-critical data. Unfortunately, users often compromise the security of smartphones by disabling security features for convenience reasons or by unintentionally installing malware from untrusted application sources. Mobile device management (MDM) solutions overcome this problem by providing means to centrally manage and configure smartphones. However, MDM is mainly suitable for corporate environments but often cannot be applied in non-corporate fields of application such as m-banking or m-government. To address this problem, we propose an alternative approach to assure the security and integrity of smartphones. Our approach relies on a device assessor that evaluates the current state of a smartphone according to a security policy. Integration of this device assessor allows smartphone applications to condition the processing of security-critical data on the smartphone's compliance with a defined security policy. We have shown the practicability of the proposed approach by means of a concrete implementation for the Android platform. We have evaluated this implementation on different Android devices. Obtained results show that our approach constitutes an appropriate alternative for scenarios, in which MDM cannot be applied.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intent security testing: An Approach to testing the Intent-based vulnerability of Android components 意图安全测试:一种测试Android组件基于意图漏洞的方法
Pub Date : 2013-07-29 DOI: 10.5220/0004515203550362
S. Salva, Stassia R. Zafimiharisoa, Patrice Laurençot
The intent mechanism is a powerful feature of the Android platform that helps compose existing components together to build a Mobile application. However, hackers can leverage the intent messaging to extract personal data or to call components without credentials by sending malicious intents to components. This paper tackles this issue by proposing a security testing method which aims at detecting whether the components of an Android application are vulnerable to malicious intents. Our method takes Android projects and intent-based vulnerabilities formally represented with models called vulnerability patterns. The originality of our approach resides in the generation of partial specifications from configuration files and component codes to generate test cases. A tool, called APSET, is presented and evaluated with experimentations on some Android applications.
意图机制是Android平台的一个强大功能,它可以帮助将现有组件组合在一起来构建一个移动应用程序。然而,黑客可以利用意图消息来提取个人数据,或者通过向组件发送恶意意图来调用没有凭据的组件。本文通过提出一种安全测试方法来解决这个问题,该方法旨在检测Android应用程序的组件是否容易受到恶意意图的攻击。我们的方法将Android项目和基于意图的漏洞用称为漏洞模式的模型正式表示。我们方法的独创性在于从配置文件和组件代码中生成部分规范,以生成测试用例。本文介绍了一种名为APSET的工具,并在一些Android应用程序上进行了实验。
{"title":"Intent security testing: An Approach to testing the Intent-based vulnerability of Android components","authors":"S. Salva, Stassia R. Zafimiharisoa, Patrice Laurençot","doi":"10.5220/0004515203550362","DOIUrl":"https://doi.org/10.5220/0004515203550362","url":null,"abstract":"The intent mechanism is a powerful feature of the Android platform that helps compose existing components together to build a Mobile application. However, hackers can leverage the intent messaging to extract personal data or to call components without credentials by sending malicious intents to components. This paper tackles this issue by proposing a security testing method which aims at detecting whether the components of an Android application are vulnerable to malicious intents. Our method takes Android projects and intent-based vulnerabilities formally represented with models called vulnerability patterns. The originality of our approach resides in the generation of partial specifications from configuration files and component codes to generate test cases. A tool, called APSET, is presented and evaluated with experimentations on some Android applications.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125872213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices 动态污点分析在android设备上防止隐私信息泄露的有效性研究
Pub Date : 2013-05-22 DOI: 10.5220/0004535104610468
Golam Sarwar, O. Mehani, R. Boreli, M. Kâafar
We investigate the limitations of using dynamic taint analysis for tracking privacy-sensitive information on Android-based mobile devices. Taint tracking keeps track of data as it propagates through variables, interprocess messages and files, by tagging them with taint marks. A popular taint-tracking system, TaintDroid, uses this approach in Android mobile applications to mark private information, such as device identifiers or user's contacts details, and subsequently issue warnings when this information is misused (e.g., sent to an un-desired third party). We present a collection of attacks on Android-based taint tracking. Specifically, we apply generic classes of anti-taint methods in a mobile device environment to circumvent this security technique. We have implemented the presented techniques in an Android application, ScrubDroid. We successfully tested our app with the TaintDroid implementations for Android OS versions 2.3 to 4.1.1, both using the emulator and with real devices. Finally, we evaluate the success rate and time to complete of the presented attacks. We conclude that, although taint tracking may be a valuable tool for software developers, it will not effectively protect sensitive data from the black-box code of a motivated attacker applying any of the presented anti-taint tracking methods.
我们研究了使用动态污点分析来跟踪基于android的移动设备上的隐私敏感信息的局限性。当数据通过变量、进程间消息和文件传播时,污点跟踪通过标记污点标记来跟踪数据。一个流行的污点跟踪系统,TaintDroid,在Android移动应用程序中使用这种方法来标记私人信息,如设备标识符或用户的联系方式,并随后在这些信息被滥用时发出警告(例如,发送给不受欢迎的第三方)。我们展示了一系列基于android的污染跟踪攻击。具体来说,我们在移动设备环境中应用通用类的防污染方法来规避这种安全技术。我们已经在Android应用程序ScrubDroid中实现了所介绍的技术。我们成功地在Android OS 2.3到4.1.1版本的TaintDroid实现中测试了我们的应用,同时使用模拟器和真实设备。最后,我们评估了攻击的成功率和完成时间。我们得出的结论是,尽管污染跟踪可能是软件开发人员的一个有价值的工具,但它不能有效地保护敏感数据免受恶意攻击者的黑盒代码的攻击,这些攻击者使用任何提出的反污染跟踪方法。
{"title":"On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices","authors":"Golam Sarwar, O. Mehani, R. Boreli, M. Kâafar","doi":"10.5220/0004535104610468","DOIUrl":"https://doi.org/10.5220/0004535104610468","url":null,"abstract":"We investigate the limitations of using dynamic taint analysis for tracking privacy-sensitive information on Android-based mobile devices. Taint tracking keeps track of data as it propagates through variables, interprocess messages and files, by tagging them with taint marks. A popular taint-tracking system, TaintDroid, uses this approach in Android mobile applications to mark private information, such as device identifiers or user's contacts details, and subsequently issue warnings when this information is misused (e.g., sent to an un-desired third party). We present a collection of attacks on Android-based taint tracking. Specifically, we apply generic classes of anti-taint methods in a mobile device environment to circumvent this security technique. We have implemented the presented techniques in an Android application, ScrubDroid. We successfully tested our app with the TaintDroid implementations for Android OS versions 2.3 to 4.1.1, both using the emulator and with real devices. Finally, we evaluate the success rate and time to complete of the presented attacks. We conclude that, although taint tracking may be a valuable tool for software developers, it will not effectively protect sensitive data from the black-box code of a motivated attacker applying any of the presented anti-taint tracking methods.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Topological study and Lyapunov exponent of a secure steganographic scheme 安全隐写方案的拓扑研究与Lyapunov指数
Pub Date : 2012-06-13 DOI: 10.5220/0004504202750283
J. Bahi, Nicolas Friot, C. Guyeux
CIS2 is a steganographic scheme proposed formerly, belonging into the small category of algorithms being both stego and topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the “watermark only attack” framework. Its topological security reinforce its capability to face threats in other frameworks as “known message attack” or “known original attack”, in the Simmons' prisoner problem. In this research work, the study of topological properties of CIS2 is enlarged by describing this scheme as iterations over the real line, and investigating other security properties of topological nature as the Lyapunov exponent, that have been reported as important in the field of information hiding security. Results show that this scheme is able to withdraw a malicious attacker in the “estimated original attack” context too.
CIS2是以前提出的一种隐写方案,属于隐写和拓扑安全的一小部分算法。由于该方案具有隐码安全性,因此能够面对发生在“仅水印攻击”框架中的攻击。在Simmons' prisoner问题中,其拓扑安全性增强了其面对“已知消息攻击”或“已知原始攻击”等其他框架威胁的能力。在本研究工作中,通过将CIS2方案描述为实线上的迭代,扩大了对CIS2拓扑性质的研究,并研究了拓扑性质的其他安全性质,如Lyapunov指数,这些性质在信息隐藏安全领域中被报道为重要的。结果表明,该方案能够在“估计原始攻击”的情况下有效地提取恶意攻击者。
{"title":"Topological study and Lyapunov exponent of a secure steganographic scheme","authors":"J. Bahi, Nicolas Friot, C. Guyeux","doi":"10.5220/0004504202750283","DOIUrl":"https://doi.org/10.5220/0004504202750283","url":null,"abstract":"CIS2 is a steganographic scheme proposed formerly, belonging into the small category of algorithms being both stego and topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the “watermark only attack” framework. Its topological security reinforce its capability to face threats in other frameworks as “known message attack” or “known original attack”, in the Simmons' prisoner problem. In this research work, the study of topological properties of CIS2 is enlarged by describing this scheme as iterations over the real line, and investigating other security properties of topological nature as the Lyapunov exponent, that have been reported as important in the field of information hiding security. Results show that this scheme is able to withdraw a malicious attacker in the “estimated original attack” context too.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130526735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust-based secure cloud data storage with cryptographic role-based access control 基于信任的安全云数据存储,具有基于加密角色的访问控制
Pub Date : 1900-01-01 DOI: 10.5220/0004508600620073
Lan Zhou, V. Varadharajan, M. Hitchens
Role-based access control (RBAC) model is a widely used access control model which can simplify security management in large-scale systems. Recently, several cryptographic RBAC schemes have been proposed to integrate cryptographic techniques with RBAC models to secure data storage in an outsourced environment such as a cloud. These schemes allow data to be encrypted in such a way that only the users who are members of an appropriate role can decrypt and view the data. However, the issue of trust in such a data storage system is not addressed in these schemes. In this paper, we propose trust models to improve the security of such a system which uses cryptographic RBAC schemes. The trust models provide an approach for the users and roles to determine the trustworthiness of individual roles and owners in the RBAC system. The users can use the trust models to decide whether to join a particular role for accessing data in the system. The roles can use the trust models in their decision to ensure that only data from data owners with good behaviours are accepted by the roles. The proposed trust models take into account role inheritance and hierarchy in the evaluation of trustworthiness of the roles. In addition, we present a design of a trust-based cloud storage system which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes.
基于角色的访问控制(Role-based access control, RBAC)模型是一种应用广泛的访问控制模型,可以简化大型系统中的安全管理。最近,已经提出了几种加密RBAC方案,将加密技术与RBAC模型集成在一起,以保护外包环境(如云)中的数据存储。这些方案允许以这样一种方式对数据进行加密,即只有属于适当角色的用户才能解密和查看数据。然而,在这些方案中没有解决这种数据存储系统中的信任问题。在本文中,我们提出了信任模型来提高这种使用加密RBAC方案的系统的安全性。信任模型为用户和角色确定RBAC系统中各个角色和所有者的可信度提供了一种方法。用户可以使用信任模型来决定是否加入一个特定的角色来访问系统中的数据。角色可以在其决策中使用信任模型,以确保角色只接受来自具有良好行为的数据所有者的数据。所提出的信任模型在角色可信度评估中考虑了角色继承和层次。此外,我们还设计了一个基于信任的云存储系统,展示了如何将信任模型集成到使用加密RBAC方案的系统中。
{"title":"Trust-based secure cloud data storage with cryptographic role-based access control","authors":"Lan Zhou, V. Varadharajan, M. Hitchens","doi":"10.5220/0004508600620073","DOIUrl":"https://doi.org/10.5220/0004508600620073","url":null,"abstract":"Role-based access control (RBAC) model is a widely used access control model which can simplify security management in large-scale systems. Recently, several cryptographic RBAC schemes have been proposed to integrate cryptographic techniques with RBAC models to secure data storage in an outsourced environment such as a cloud. These schemes allow data to be encrypted in such a way that only the users who are members of an appropriate role can decrypt and view the data. However, the issue of trust in such a data storage system is not addressed in these schemes. In this paper, we propose trust models to improve the security of such a system which uses cryptographic RBAC schemes. The trust models provide an approach for the users and roles to determine the trustworthiness of individual roles and owners in the RBAC system. The users can use the trust models to decide whether to join a particular role for accessing data in the system. The roles can use the trust models in their decision to ensure that only data from data owners with good behaviours are accepted by the roles. The proposed trust models take into account role inheritance and hierarchy in the evaluation of trustworthiness of the roles. In addition, we present a design of a trust-based cloud storage system which shows how the trust models can be integrated into a system that uses cryptographic RBAC schemes.","PeriodicalId":174026,"journal":{"name":"2013 International Conference on Security and Cryptography (SECRYPT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122857939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 International Conference on Security and Cryptography (SECRYPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1