首页 > 最新文献

2021 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space 通过特征空间深度强化学习实现黑箱对抗攻击
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346264
Lyue Li, Amir Rezapour, Wen-Guey Tzeng
In this paper we propose a novel black-box adversarial attack by using the reinforcement learning to learn the characteristics of the target classifier C. Our method does not need to find a substitute classifier that resembles $C$ with respect to its structure and parameters. Instead, our method learns an optimal attacking policy of guiding the attacker to build an adversarial image from the original image. We work on the feature space of images, instead of the pixels of images directly. Our method achieves better results on many measures. Our method achieves 94.5 % attack success rate on a well-trained digit classifier. Our adversarial images have better imperceptibility even though the norm distances to original images are larger than other methods. Since our method works on the characteristics of a classifier, it has better transferability. The transfer rate of our method could reach 52.1 % for a targeted class and 65.9% for a non-targeted class. This improves over previous results of single-digit transfer rates. Also, we show that it is harder to defend our attack by incorporating defense mechanisms, such as MagNet, which uses a denoising technique. We show that our method achieves 65% attack success rate even though the target classifier employs MagNet to defend.
在本文中,我们提出了一种新颖的黑盒对抗攻击方法,即利用强化学习来学习目标分类器 C 的特征。相反,我们的方法可以学习最佳的攻击策略,引导攻击者从原始图像中建立对抗图像。我们的工作对象是图像的特征空间,而不是直接图像的像素。我们的方法在许多指标上都取得了更好的结果。在训练有素的数字分类器上,我们的方法取得了 94.5% 的攻击成功率。我们的对抗图像具有更好的不可感知性,即使与原始图像的标准距离比其他方法更大。由于我们的方法基于分类器的特征,因此具有更好的可移植性。我们的方法对目标类别的转移率可达 52.1%,对非目标类别的转移率可达 65.9%。这比以前个位数的转移率有所提高。此外,我们还表明,通过采用防御机制(如使用去噪技术的 MagNet)来防御我们的攻击更加困难。我们的研究表明,即使目标分类器采用 MagNet 进行防御,我们的方法也能达到 65% 的攻击成功率。
{"title":"A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space","authors":"Lyue Li, Amir Rezapour, Wen-Guey Tzeng","doi":"10.1109/DSC49826.2021.9346264","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346264","url":null,"abstract":"In this paper we propose a novel black-box adversarial attack by using the reinforcement learning to learn the characteristics of the target classifier C. Our method does not need to find a substitute classifier that resembles $C$ with respect to its structure and parameters. Instead, our method learns an optimal attacking policy of guiding the attacker to build an adversarial image from the original image. We work on the feature space of images, instead of the pixels of images directly. Our method achieves better results on many measures. Our method achieves 94.5 % attack success rate on a well-trained digit classifier. Our adversarial images have better imperceptibility even though the norm distances to original images are larger than other methods. Since our method works on the characteristics of a classifier, it has better transferability. The transfer rate of our method could reach 52.1 % for a targeted class and 65.9% for a non-targeted class. This improves over previous results of single-digit transfer rates. Also, we show that it is harder to defend our attack by incorporating defense mechanisms, such as MagNet, which uses a denoising technique. We show that our method achieves 65% attack success rate even though the target classifier employs MagNet to defend.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems 一种基于私有集交集的网络-物理-社会系统轮廓匹配方案
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346252
Yalian Qian, Xueya Xia, Jian Shen
The cyber-physical-social system (CPSS) is a three-layer system framework that combines the human society on the basis of the cyber-physical system (CPS), so that the human society, the cyber world and the physical world are interconnected. In the CPSS, similar profile attributes are matched to socialize and ultimately achieve the purpose of information sharing. However, some personal information may be included in the profile attributes, thus the users' privacy cannot be protected during the process. To meet this challenge, a privacy-preserving profile matching scheme based on private set intersection is proposed in this paper. Multi-tag is utilized to partition the dataset of users to achieve fine-grained profile matching. In addition, the privacy of users is protected by re-encryption technique. Security analysis shows that our scheme is secure against the semi-honest adversary and theoretical analysis of the experiment shows that that the scheme is efficient for profile matching in the CPSS.
网络-物理-社会系统(cyber-physical-social system, CPSS)是在网络-物理系统(CPS)的基础上结合人类社会,使人类社会、网络世界和物理世界相互联系的三层系统框架。在CPSS中,通过匹配相似的配置文件属性进行社交,最终达到信息共享的目的。但是,配置文件属性中可能包含一些个人信息,因此在此过程中无法保护用户的隐私。针对这一挑战,本文提出了一种基于私有集交集的保密性轮廓匹配方案。利用多标签对用户数据集进行分区,实现细粒度的轮廓匹配。此外,通过重加密技术保护了用户的隐私。安全性分析表明,该方案对半诚实对手是安全的,实验的理论分析表明,该方案对CPSS中的轮廓匹配是有效的。
{"title":"A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems","authors":"Yalian Qian, Xueya Xia, Jian Shen","doi":"10.1109/DSC49826.2021.9346252","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346252","url":null,"abstract":"The cyber-physical-social system (CPSS) is a three-layer system framework that combines the human society on the basis of the cyber-physical system (CPS), so that the human society, the cyber world and the physical world are interconnected. In the CPSS, similar profile attributes are matched to socialize and ultimately achieve the purpose of information sharing. However, some personal information may be included in the profile attributes, thus the users' privacy cannot be protected during the process. To meet this challenge, a privacy-preserving profile matching scheme based on private set intersection is proposed in this paper. Multi-tag is utilized to partition the dataset of users to achieve fine-grained profile matching. In addition, the privacy of users is protected by re-encryption technique. Security analysis shows that our scheme is secure against the semi-honest adversary and theoretical analysis of the experiment shows that that the scheme is efficient for profile matching in the CPSS.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay 基于编译时污点语义提取和离线重放的混合模式信息流跟踪
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346239
Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, S. Mallissery, Yu-Sung Wu
Static information flow analysis (IFA) and dynamic information flow tracking (DIFT) have been widely employed in offline security analysis of computer programs. As security attacks become more sophisticated, there is a rising need for IFA and DIFT in production environment. However, existing systems usually deal with IFA and DIFT separately, and most DIFT systems incur significant performance overhead. We propose MIT to facilitate IFA and DIFT in online production environment. MIT offers mixed-mode information flow tracking at byte-granularity and incurs moderate runtime performance overhead. The core techniques consist of the extraction of taint semantics intermediate representation (TSIR) at compile-time and the decoupled execution of TSIR for information flow analysis. We conducted an extensive performance overhead evaluation on MIT to confirm its applicability in production environment. We also outline potential applications of MIT, including the implementation of data provenance checking and information flow based anomaly detection in real-world applications.
静态信息流分析(IFA)和动态信息流跟踪(DIFT)在计算机程序离线安全分析中得到了广泛的应用。随着安全攻击变得越来越复杂,在生产环境中对IFA和DIFT的需求越来越大。然而,现有的系统通常分别处理IFA和DIFT,并且大多数DIFT系统会产生显著的性能开销。我们建议MIT在在线生产环境中促进IFA和DIFT。MIT以字节粒度提供混合模式信息流跟踪,并产生适度的运行时性能开销。其核心技术包括编译时污损语义中间表示(TSIR)的提取和用于信息流分析的TSIR解耦执行。我们对MIT进行了广泛的性能开销评估,以确认其在生产环境中的适用性。我们还概述了MIT的潜在应用,包括在实际应用中实现数据来源检查和基于信息流的异常检测。
{"title":"Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay","authors":"Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, S. Mallissery, Yu-Sung Wu","doi":"10.1109/DSC49826.2021.9346239","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346239","url":null,"abstract":"Static information flow analysis (IFA) and dynamic information flow tracking (DIFT) have been widely employed in offline security analysis of computer programs. As security attacks become more sophisticated, there is a rising need for IFA and DIFT in production environment. However, existing systems usually deal with IFA and DIFT separately, and most DIFT systems incur significant performance overhead. We propose MIT to facilitate IFA and DIFT in online production environment. MIT offers mixed-mode information flow tracking at byte-granularity and incurs moderate runtime performance overhead. The core techniques consist of the extraction of taint semantics intermediate representation (TSIR) at compile-time and the decoupled execution of TSIR for information flow analysis. We conducted an extensive performance overhead evaluation on MIT to confirm its applicability in production environment. We also outline potential applications of MIT, including the implementation of data provenance checking and information flow based anomaly detection in real-world applications.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid 智能电网中一种高效的匿名身份认证方案
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346257
Xueya Xia, S. Ji
Smart grid is not only related to the revolution in the power system, It will also drive the transformation of the mode of production and development of the whole society. In smart grid, the electricity data from users needs to be collected to realize efficient energy management, which may reveal their privacy. The existing researches on protecting privacy of users mainly focus on data aggregation. These solutions protect users' privacy at the expense of acquiring their fine-grained electricity data. However, fine-grained electricity data is significant for smart grid to perform many functions, such as debugging configuration problems, developing optimal energy use strategies, etc. To solve this problem, an anonymous authentication scheme based on non-interactive zero knowledge (NIZK) is proposed. The scheme ensures operation center (OC) to acquire fine-grained electricity data from users while protect their privacy. The experimental simulation indicates that the proposal is practical and applicable to large-scale user clusters.
智能电网不仅关系到电力系统的变革,还将带动整个社会生产方式的变革和发展。在智能电网中,为了实现高效的能源管理,需要收集用户的用电数据,这可能会泄露用户的隐私。现有的用户隐私保护研究主要集中在数据聚合方面。这些解决方案以获取用户的细粒度电力数据为代价来保护用户的隐私。然而,细粒度的电力数据对于智能电网执行许多功能至关重要,例如调试配置问题,制定最佳能源使用策略等。为了解决这一问题,提出了一种基于非交互零知识(NIZK)的匿名认证方案。该方案确保运营中心(OC)在保护用户隐私的同时获取用户的细粒度电力数据。实验仿真表明,该方法具有实用性,适用于大规模用户集群。
{"title":"An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid","authors":"Xueya Xia, S. Ji","doi":"10.1109/DSC49826.2021.9346257","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346257","url":null,"abstract":"Smart grid is not only related to the revolution in the power system, It will also drive the transformation of the mode of production and development of the whole society. In smart grid, the electricity data from users needs to be collected to realize efficient energy management, which may reveal their privacy. The existing researches on protecting privacy of users mainly focus on data aggregation. These solutions protect users' privacy at the expense of acquiring their fine-grained electricity data. However, fine-grained electricity data is significant for smart grid to perform many functions, such as debugging configuration problems, developing optimal energy use strategies, etc. To solve this problem, an anonymous authentication scheme based on non-interactive zero knowledge (NIZK) is proposed. The scheme ensures operation center (OC) to acquire fine-grained electricity data from users while protect their privacy. The experimental simulation indicates that the proposal is practical and applicable to large-scale user clusters.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134523060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext 具有恒定长度密文的高效多权威属性签名加密
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346249
Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang, Yi Ding
Recently, efficient fine-grained access mechanism has been studied as a main concern in cloud storage area for several years. Attribute-based signcryption (ABSC) which is logical combination of attribute-based encryption(ABE) and attribute-based signature(ABS), can provide confidentiality, authenticity for sensitive data and anonymous authentication. At the same time it is more efficient than previous “encrypt-then-sign” and “sign-then-encrypt” patterns. However, most of the existing ABSC schemes fail to serve for real scenario of multiple authorities and have heavy communication overhead and computing overhead. Hence, we construct a novel ABSC scheme realizing multi-authority access control and constant-size ciphertext that does not depend on the number of attributes or authorities. Furthermore, our scheme provides public verifiability of the ciphertext and privacy protection for the signcryptor. Specially, it is proven to be secure in the standard model, including ciphertext indistinguishability under adaptive chosen ciphertext attacks and existential unforgeability under adaptive chosen message attack.
近年来,高效的细粒度访问机制一直是云存储领域的研究热点。基于属性的签名加密(ABSC)是基于属性的加密(ABE)和基于属性的签名(ABS)的逻辑结合,可以为敏感数据提供保密性、真实性和匿名认证。同时,它比以前的“先加密后签名”和“先签名后加密”模式更有效。但是,现有的ABSC方案大多不能满足多权限的实际场景,通信开销和计算开销较大。因此,我们构建了一种新的ABSC方案,实现了不依赖于属性和授权数量的多授权访问控制和恒定长度的密文。此外,我们的方案提供了密文的公开可验证性和签名者的隐私保护。特别地,在标准模型下证明了其安全性,包括自适应选择密文攻击下的密文不可分辨性和自适应选择消息攻击下的存在不可伪造性。
{"title":"Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext","authors":"Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang, Yi Ding","doi":"10.1109/DSC49826.2021.9346249","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346249","url":null,"abstract":"Recently, efficient fine-grained access mechanism has been studied as a main concern in cloud storage area for several years. Attribute-based signcryption (ABSC) which is logical combination of attribute-based encryption(ABE) and attribute-based signature(ABS), can provide confidentiality, authenticity for sensitive data and anonymous authentication. At the same time it is more efficient than previous “encrypt-then-sign” and “sign-then-encrypt” patterns. However, most of the existing ABSC schemes fail to serve for real scenario of multiple authorities and have heavy communication overhead and computing overhead. Hence, we construct a novel ABSC scheme realizing multi-authority access control and constant-size ciphertext that does not depend on the number of attributes or authorities. Furthermore, our scheme provides public verifiability of the ciphertext and privacy protection for the signcryptor. Specially, it is proven to be secure in the standard model, including ciphertext indistinguishability under adaptive chosen ciphertext attacks and existential unforgeability under adaptive chosen message attack.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130201040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition 隐私遮阳板用于破坏未经授权的人脸识别的漏洞
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346246
Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori
This work studies a vulnerability in privacy visors, new wearable devices that aim to prevent unauthorized face recognition from being performed. Although the use of a privacy visor assumes that the detectors' targets are uncovered bare faces, it is not hard to detect the privacy visor itself. To quantify the effects of the disruption and the vulnerability, we conducted experiments involving two major face-recognition algorithms, namely a method based on convolutional neural networks and a method that aims to identify coordinates of facial landscapes. Our experiments were able to demonstrate that using a privacy visor can reduce the mean face-recognition rates for both algorithms. However, they are less effective if faces with privacy visors are used in training. Faces with privacy visors is detected at a rate of 42.28 % on average.
这项工作研究了隐私护目镜中的一个漏洞,这是一种新的可穿戴设备,旨在防止未经授权的人脸识别。尽管使用隐私遮阳板假设检测器的目标是裸露的脸,但检测隐私遮阳板本身并不难。为了量化破坏和脆弱性的影响,我们进行了涉及两种主要人脸识别算法的实验,即基于卷积神经网络的方法和旨在识别面部景观坐标的方法。我们的实验能够证明,使用隐私遮阳板可以降低两种算法的平均人脸识别率。然而,如果在训练中使用带隐私面罩的脸,它们的效果就不那么好了。带隐私面罩的人脸的平均检出率为42.28%。
{"title":"Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition","authors":"Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki, Takafumi Mori","doi":"10.1109/DSC49826.2021.9346246","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346246","url":null,"abstract":"This work studies a vulnerability in privacy visors, new wearable devices that aim to prevent unauthorized face recognition from being performed. Although the use of a privacy visor assumes that the detectors' targets are uncovered bare faces, it is not hard to detect the privacy visor itself. To quantify the effects of the disruption and the vulnerability, we conducted experiments involving two major face-recognition algorithms, namely a method based on convolutional neural networks and a method that aims to identify coordinates of facial landscapes. Our experiments were able to demonstrate that using a privacy visor can reduce the mean face-recognition rates for both algorithms. However, they are less effective if faces with privacy visors are used in training. Faces with privacy visors is detected at a rate of 42.28 % on average.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EC-Model: An Evolvable Malware Classification Model EC-Model:一种可进化的恶意软件分类模型
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346248
Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, S. Shieh
Malware evolves quickly as new attack, evasion and mutation techniques are commonly used by hackers to build new malicious malware families. For malware detection and classification, multi-class learning model is one of the most popular machine learning models being used. To recognize malicious programs, multi-class model requires malware types to be predefined as output classes in advance which cannot be dynamically adjusted after the model is trained. When a new variant or type of malicious programs is discovered, the trained multi-class model will be no longer valid and have to be retrained completely. This consumes a significant amount of time and resources, and cannot adapt quickly to meet the timely requirement in dealing with dynamically evolving malware types. To cope with the problem, an evolvable malware classification deep learning model, namely EC-Model, is proposed in this paper which can dynamically adapt to new malware types without the need of fully retraining. Consequently, the reaction time can be significantly reduced to meet the timely requirement of malware classification. To our best knowledge, our work is the first attempt to adopt multi-task, deep learning for evolvable malware classification.
随着新的攻击、逃避和变异技术被黑客用来构建新的恶意软件家族,恶意软件发展迅速。对于恶意软件的检测和分类,多类学习模型是目前使用最广泛的机器学习模型之一。为了识别恶意程序,多类模型需要将恶意软件的类型预先定义为输出类,在模型训练完成后不能动态调整输出类。当发现新的恶意程序变体或类型时,训练好的多类模型将不再有效,必须完全重新训练。这消耗了大量的时间和资源,并且不能快速适应处理动态变化的恶意软件类型的及时需求。为了解决这一问题,本文提出了一种可进化的恶意软件分类深度学习模型EC-Model,该模型可以动态适应新的恶意软件类型,而无需完全重新训练。从而大大缩短了响应时间,满足了恶意软件分类的及时性要求。据我们所知,我们的工作是第一次尝试采用多任务,深度学习来进行可进化的恶意软件分类。
{"title":"EC-Model: An Evolvable Malware Classification Model","authors":"Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, S. Shieh","doi":"10.1109/DSC49826.2021.9346248","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346248","url":null,"abstract":"Malware evolves quickly as new attack, evasion and mutation techniques are commonly used by hackers to build new malicious malware families. For malware detection and classification, multi-class learning model is one of the most popular machine learning models being used. To recognize malicious programs, multi-class model requires malware types to be predefined as output classes in advance which cannot be dynamically adjusted after the model is trained. When a new variant or type of malicious programs is discovered, the trained multi-class model will be no longer valid and have to be retrained completely. This consumes a significant amount of time and resources, and cannot adapt quickly to meet the timely requirement in dealing with dynamically evolving malware types. To cope with the problem, an evolvable malware classification deep learning model, namely EC-Model, is proposed in this paper which can dynamically adapt to new malware types without the need of fully retraining. Consequently, the reaction time can be significantly reduced to meet the timely requirement of malware classification. To our best knowledge, our work is the first attempt to adopt multi-task, deep learning for evolvable malware classification.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Smart Road Pricing System in Smart Cities 智慧城市中保护隐私的智能道路收费系统
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346274
Qingfeng Zhu, S. Ji, Qi Liu
Recently, the smart road tolling system has drawn significant attention from researchers and industries. However, how to guarantee the geolocation privacy of vehicles and prevent drivers from behaving incorrectly at the same time remains a challenging task. In this paper, a reliable and secure road tolling system is proposed. The vehicle's routes information are encrypted and uploaded to the roadside units, which then forwards to the traffic control centre for further tolling. For malicious vehicles, the traffic control centre has the capability to compare data collected from roadside units and video surveillance cameras to analysis whether it behave incorrectly. The security analysis and experiment yield the robustness of the proposed scheme in comparison to the existing approaches.
最近,智能道路收费系统引起了研究人员和行业的极大关注。然而,如何保证车辆的地理位置隐私,同时防止驾驶员的不当行为仍然是一个具有挑战性的任务。本文提出了一种可靠、安全的道路收费系统。车辆的路线信息被加密并上传到路边单元,然后转发到交通控制中心进行进一步收费。对于恶意车辆,交通控制中心有能力比较从路边装置和视频监控摄像头收集的数据,以分析其行为是否不正确。安全性分析和实验结果表明,与现有方法相比,该方案具有较好的鲁棒性。
{"title":"Privacy-Preserving Smart Road Pricing System in Smart Cities","authors":"Qingfeng Zhu, S. Ji, Qi Liu","doi":"10.1109/DSC49826.2021.9346274","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346274","url":null,"abstract":"Recently, the smart road tolling system has drawn significant attention from researchers and industries. However, how to guarantee the geolocation privacy of vehicles and prevent drivers from behaving incorrectly at the same time remains a challenging task. In this paper, a reliable and secure road tolling system is proposed. The vehicle's routes information are encrypted and uploaded to the roadside units, which then forwards to the traffic control centre for further tolling. For malicious vehicles, the traffic control centre has the capability to compare data collected from roadside units and video surveillance cameras to analysis whether it behave incorrectly. The security analysis and experiment yield the robustness of the proposed scheme in comparison to the existing approaches.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Site Detection Using Similarity of Website Structure 基于网站结构相似性的钓鱼网站检测
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346256
Shoma Tanaka, T. Matsunaka, A. Yamada, A. Kubota
The number of phishing sites is increasing and becoming a problem. General phishing sites often have very short lives. Phishers are thought to construct phishing sites using tools such as phishing kits. Phishing sites constructed using the same tools have similar website structures. We propose a new method based on the similarity of website structure information defined by the types and sizes of web resources that make up these websites. Our method can detect phishing sites that is not registered with blocklists or do not have similar URL strings with targeting legitimate sites. In addition, our method can identify phishing sites that differed in appearance but have similar website structures. Our method is particularly effective for detecting phishing sites constructed by the same phishers or using the same tools, as our method identifies structural similarity between websites. We conducted an evaluation to confirm the correctness of our assumption using phishing sites constructed using phishing kits and the PhishTank dataset. We found a large number of phishing sites that were structurally similar to phishing sites constructed using phishing kits. We applied our method to web access logs provided by ordinary Japanese citizens, and detected some unknown phishing sites. We have also examined the possibility of improving our method based on the importance of web resources, determined using the number of occurrences in web access logs.
网络钓鱼网站的数量正在增加,并成为一个问题。一般的网络钓鱼网站通常寿命很短。网络钓鱼者被认为是使用诸如网络钓鱼工具包之类的工具来构建网络钓鱼网站。使用相同工具构建的钓鱼网站具有相似的网站结构。我们提出了一种基于网站结构信息相似性的新方法,这些相似性由组成这些网站的网络资源的类型和大小所定义。我们的方法可以检测未在阻止列表中注册或与目标合法网站没有相似URL字符串的网络钓鱼网站。此外,我们的方法可以识别外观不同但网站结构相似的网络钓鱼网站。我们的方法对于检测由相同的钓鱼者或使用相同的工具构建的钓鱼网站特别有效,因为我们的方法可以识别网站之间的结构相似性。我们使用使用钓鱼工具包和PhishTank数据集构建的钓鱼网站进行了评估,以确认我们假设的正确性。我们发现大量的网络钓鱼网站在结构上与使用网络钓鱼工具包构建的网络钓鱼网站相似。我们将我们的方法应用到日本普通公民提供的网络访问日志中,发现了一些未知的网络钓鱼网站。我们还检查了基于web资源的重要性改进方法的可能性,使用web访问日志中的出现次数来确定。
{"title":"Phishing Site Detection Using Similarity of Website Structure","authors":"Shoma Tanaka, T. Matsunaka, A. Yamada, A. Kubota","doi":"10.1109/DSC49826.2021.9346256","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346256","url":null,"abstract":"The number of phishing sites is increasing and becoming a problem. General phishing sites often have very short lives. Phishers are thought to construct phishing sites using tools such as phishing kits. Phishing sites constructed using the same tools have similar website structures. We propose a new method based on the similarity of website structure information defined by the types and sizes of web resources that make up these websites. Our method can detect phishing sites that is not registered with blocklists or do not have similar URL strings with targeting legitimate sites. In addition, our method can identify phishing sites that differed in appearance but have similar website structures. Our method is particularly effective for detecting phishing sites constructed by the same phishers or using the same tools, as our method identifies structural similarity between websites. We conducted an evaluation to confirm the correctness of our assumption using phishing sites constructed using phishing kits and the PhishTank dataset. We found a large number of phishing sites that were structurally similar to phishing sites constructed using phishing kits. We applied our method to web access logs provided by ordinary Japanese citizens, and detected some unknown phishing sites. We have also examined the possibility of improving our method based on the importance of web resources, determined using the number of occurrences in web access logs.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model 支持标准模型中动态成员关系的基于cca安全属性的加密
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346247
Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng
Attribute-based encryption (ABE) is an access control mechanism where a sender encrypts messages according to an attribute set for multiple receivers. With fine-grained access control, it has been widely applied to cloud storage and file sharing systems. In such a mechanism, it is a challenge to achieve the revocation efficiently on a specific user since different users may share common attributes. Thus, dynamic membership is a critical issue to discuss. On the other hand, most works on LSSS-based ABE do not address the situation about threshold on the access structure, and it lowers the diversity of access policies. This manuscript presents an efficient attribute-based encryption scheme with dynamic membership by using LSSS. The proposed scheme can implement threshold gates in the access structure. Furthermore, it is the first ABE supporting complete dynamic membership that achieves the CCA security in the standard model, i.e. without the assumption of random oracles.
基于属性的加密(ABE)是一种访问控制机制,发送方根据多个接收方的属性集对消息进行加密。它具有细粒度的访问控制,被广泛应用于云存储和文件共享系统。在这种机制中,由于不同的用户可能共享相同的属性,因此对特定用户有效地实现撤销是一项挑战。因此,动态成员是一个需要讨论的关键问题。另一方面,基于lsss的ABE研究大多没有解决访问结构的阈值问题,降低了访问策略的多样性。本文提出了一种高效的基于属性的动态隶属度加密方案。该方案可以在访问结构中实现阈值门。此外,它是第一个支持完全动态成员的ABE,在标准模型中实现了CCA安全性,即不假设随机预言机。
{"title":"CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model","authors":"Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng","doi":"10.1109/DSC49826.2021.9346247","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346247","url":null,"abstract":"Attribute-based encryption (ABE) is an access control mechanism where a sender encrypts messages according to an attribute set for multiple receivers. With fine-grained access control, it has been widely applied to cloud storage and file sharing systems. In such a mechanism, it is a challenge to achieve the revocation efficiently on a specific user since different users may share common attributes. Thus, dynamic membership is a critical issue to discuss. On the other hand, most works on LSSS-based ABE do not address the situation about threshold on the access structure, and it lowers the diversity of access policies. This manuscript presents an efficient attribute-based encryption scheme with dynamic membership by using LSSS. The proposed scheme can implement threshold gates in the access structure. Furthermore, it is the first ABE supporting complete dynamic membership that achieves the CCA security in the standard model, i.e. without the assumption of random oracles.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1