首页 > 最新文献

Digital Threats: Research and Practice最新文献

英文 中文
Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems 物联网系统中mac层欺骗检测和预防的随机移动目标方法
Pub Date : 2022-04-07 DOI: 10.1145/3477403
Pooria Madani, N. Vlajic, I. Maljevic
MAC-layer spoofing, also known as identity spoofing, is recognized as a serious problem in many practical wireless systems. IoT systems are particularly vulnerable to this type of attack as IoT devices (due to their various limitations) are often incapable of deploying advanced MAC-layer spoofing prevention and detection techniques, such as cryptographic authentication. Signal-level device fingerprinting is an approach to identity spoofing detection that is highly suitable for sensor-based IoT networks but can be also utilized in many other types of wireless systems. Previous research works on signal-level device fingerprinting have been based on rather simplistic assumptions about both the adversary’s behavior and the operation of the defense system. The goal of our work was to examine the effectiveness of a novel system that combines signal-level device fingerprinting with the principles of Randomized Moving Target Defense (RMTD) when dealing with a very advanced adversary. The obtained results show that our RMTD-enhanced signal-level device fingerprinting technique exhibits far superior defense performance over the non-RMTD techniques previously discussed in the literature and, as such, could be of great value for practical wireless systems subjected to identity spoofing attacks. We have also introduced a novel proof-of-concept adaptive parameter tuning approach for system practitioners with the ability to encode their risk profile and compute the most efficient hyper-parameters of our proposed defense system.
mac层欺骗,也称为身份欺骗,是许多实际无线系统中公认的一个严重问题。物联网系统特别容易受到这种类型的攻击,因为物联网设备(由于其各种限制)通常无法部署先进的mac层欺骗预防和检测技术,例如加密身份验证。信号级设备指纹识别是一种身份欺骗检测方法,非常适合基于传感器的物联网网络,但也可以用于许多其他类型的无线系统。之前关于信号级设备指纹识别的研究工作是基于对对手行为和防御系统操作的相当简单的假设。我们的工作目标是研究一种新型系统的有效性,该系统将信号级设备指纹识别与随机移动目标防御(RMTD)原理相结合,以应对非常先进的对手。获得的结果表明,我们的rmtd增强的信号级设备指纹识别技术比以前在文献中讨论的非rmtd技术表现出更优越的防御性能,因此,对于遭受身份欺骗攻击的实际无线系统可能具有很大的价值。我们还为系统从业者介绍了一种新的概念验证自适应参数调整方法,该方法具有编码其风险概况和计算我们提出的防御系统的最有效超参数的能力。
{"title":"Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems","authors":"Pooria Madani, N. Vlajic, I. Maljevic","doi":"10.1145/3477403","DOIUrl":"https://doi.org/10.1145/3477403","url":null,"abstract":"MAC-layer spoofing, also known as identity spoofing, is recognized as a serious problem in many practical wireless systems. IoT systems are particularly vulnerable to this type of attack as IoT devices (due to their various limitations) are often incapable of deploying advanced MAC-layer spoofing prevention and detection techniques, such as cryptographic authentication. Signal-level device fingerprinting is an approach to identity spoofing detection that is highly suitable for sensor-based IoT networks but can be also utilized in many other types of wireless systems. Previous research works on signal-level device fingerprinting have been based on rather simplistic assumptions about both the adversary’s behavior and the operation of the defense system. The goal of our work was to examine the effectiveness of a novel system that combines signal-level device fingerprinting with the principles of Randomized Moving Target Defense (RMTD) when dealing with a very advanced adversary. The obtained results show that our RMTD-enhanced signal-level device fingerprinting technique exhibits far superior defense performance over the non-RMTD techniques previously discussed in the literature and, as such, could be of great value for practical wireless systems subjected to identity spoofing attacks. We have also introduced a novel proof-of-concept adaptive parameter tuning approach for system practitioners with the ability to encode their risk profile and compute the most efficient hyper-parameters of our proposed defense system.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda 工业物联网中出现的网络安全能力差距:概述和研究议程
Pub Date : 2022-03-28 DOI: 10.1145/3503920
Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, R. Hannigan, A. Kaafarani, M. Goldsmith, S. Creese
Internet of Things (IoT)-enabled devices are becoming integrated into a significant and increasing proportion of critical infrastructures, changing the cybersecurity-risk landscape. Risk is being introduced to industry sectors such as transport, energy, and manufacturing, with new attack surfaces exposed and potential for increased harm. Furthermore, risk and harm arising in the Industrial IoT (IIoT) could propagate across interconnected organisations and sectors, resulting in systemic risk. Aspects of this changing risk landscape are not addressed by current cybersecurity approaches, leaving cybersecurity-capability gaps. In this article, we show how current and emerging cybersecurity needs in the IIoT align with a key industry cybersecurity standard, the NIST Cyber Security Framework. The key capability gaps emerging in the IIoT are identified based on our findings from a series of workshops with over 100 expert participants. We present a comprehensive research agenda to enable researchers to prioritise research focus to address these gaps; this research agenda covers the full lifecycle of IIoT development (design, implementation, use and decommission). Furthermore, we conclude that there is a significant gap in understanding of the nature of systemic risk, which should be a key priority if we are to develop effective solutions for cybersecurity and safety in IIoT environments.
支持物联网(IoT)的设备正越来越多地集成到关键基础设施中,从而改变了网络安全风险格局。运输、能源和制造业等行业正在引入风险,新的攻击面暴露出来,危害可能会增加。此外,工业物联网(IIoT)产生的风险和危害可能会在相互关联的组织和部门之间传播,从而导致系统性风险。当前的网络安全方法没有解决这种不断变化的风险格局的各个方面,从而留下了网络安全能力的差距。在本文中,我们将展示工业物联网中当前和新兴的网络安全需求如何与关键的行业网络安全标准NIST网络安全框架保持一致。根据我们对100多名专家参加的一系列研讨会的调查结果,确定了工业物联网中出现的关键能力差距。我们提出了一个全面的研究议程,使研究人员能够优先考虑研究重点,以解决这些差距;本研究议程涵盖工业物联网开发的整个生命周期(设计、实施、使用和退役)。此外,我们得出结论,在理解系统性风险的本质方面存在重大差距,如果我们要为工业物联网环境中的网络安全和安全制定有效的解决方案,这应该是一个关键的优先事项。
{"title":"Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda","authors":"Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, R. Hannigan, A. Kaafarani, M. Goldsmith, S. Creese","doi":"10.1145/3503920","DOIUrl":"https://doi.org/10.1145/3503920","url":null,"abstract":"Internet of Things (IoT)-enabled devices are becoming integrated into a significant and increasing proportion of critical infrastructures, changing the cybersecurity-risk landscape. Risk is being introduced to industry sectors such as transport, energy, and manufacturing, with new attack surfaces exposed and potential for increased harm. Furthermore, risk and harm arising in the Industrial IoT (IIoT) could propagate across interconnected organisations and sectors, resulting in systemic risk. Aspects of this changing risk landscape are not addressed by current cybersecurity approaches, leaving cybersecurity-capability gaps. In this article, we show how current and emerging cybersecurity needs in the IIoT align with a key industry cybersecurity standard, the NIST Cyber Security Framework. The key capability gaps emerging in the IIoT are identified based on our findings from a series of workshops with over 100 expert participants. We present a comprehensive research agenda to enable researchers to prioritise research focus to address these gaps; this research agenda covers the full lifecycle of IIoT development (design, implementation, use and decommission). Furthermore, we conclude that there is a significant gap in understanding of the nature of systemic risk, which should be a key priority if we are to develop effective solutions for cybersecurity and safety in IIoT environments.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Secure E-Voting over Blockchain 区块链上的安全电子投票
Pub Date : 2021-12-31 DOI: 10.1145/3461461
Patrick McCorry, M. Mehrnezhad, Ehsan Toreini, S. F. Shahandashti, F. Hao
This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum’s blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a “preventive” measure to stop retrospective changes on previously published records as opposed to a “detective” measure like the use of mirror websites. CCS Concepts: •  Security and privacy ;
本文讨论了在三种不同设置下通过区块链进行电子投票的安全方法:分散投票,集中远程投票和集中投票站投票。这些设置几乎涵盖了实际中发生的所有投票场景。提出了在以太坊区块链上进行分散投票的概念验证实现。这项工作证明了区块链的合适使用,不仅是作为公共公告板,更重要的是,作为一个值得信赖的计算平台,以公开可验证的方式强制正确执行投票协议。我们还讨论了扩大基于区块链的全国选举投票应用程序。我们表明,对于全国范围的选举,主要的可验证性问题可以在不依赖任何区块链的情况下得到解决。然而,区块链仍然是实现公共公告板的可行选择,其优点是作为一种“预防性”措施来阻止对先前发布的记录进行回顾性更改,而不是像使用镜像网站这样的“侦探”措施。CCS概念:•安全和隐私;
{"title":"On Secure E-Voting over Blockchain","authors":"Patrick McCorry, M. Mehrnezhad, Ehsan Toreini, S. F. Shahandashti, F. Hao","doi":"10.1145/3461461","DOIUrl":"https://doi.org/10.1145/3461461","url":null,"abstract":"\u0000 This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum’s blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a “preventive” measure to stop retrospective changes on previously published records as opposed to a “detective” measure like the use of mirror websites. CCS Concepts: • \u0000 Security and privacy\u0000 ;\u0000","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
COVID-19 Vaccination Certificates in the Darkweb 暗网上的COVID-19疫苗接种证书
Pub Date : 2021-11-24 DOI: 10.1145/3530877
Dimitrios Georgoulias, J. Pedersen, M. Falch, Emmanouil Vasilomanolakis
COVID-19 vaccines have been rolled out in many countries and with them a number of vaccination certificates. For instance, the EU is utilizing a digital certificate in the form of a QR-code that is digitally signed and can be easily validated throughout all EU countries. In this article, we document the current state of the COVID-19 vaccination certificate market in the darkweb with a focus on the EU Digital Green Certificate (DGC). We investigate 17 marketplaces and 10 vendor shops that include vaccination certificates in their listings, and discover that a multitude of sellers in both types of platforms are advertising forging capabilities. According to their claims, it is possible to buy fake vaccination certificates issued in many countries worldwide. We demonstrate some examples of such sellers, including how they advertise their services, and we develop a taxonomy of EU COVID-19 certificate forging capabilities, describing the potential methods that the vendors are utilizing to generate certificates. We highlight two particular cases of vendor shops, with one of them showing an elevated degree of professionalism, showcasing forged valid certificates, the validity of which we verify using two different national mobile COVID-19 applications.
COVID-19疫苗已在许多国家推出,并附带了一些疫苗接种证书。例如,欧盟正在使用qr码形式的数字证书,该数字证书经过数字签名,可以在所有欧盟国家轻松验证。在本文中,我们记录了暗网上COVID-19疫苗接种证书市场的现状,重点介绍了欧盟数字绿色证书(DGC)。我们调查了包含疫苗接种证书的17个市场和10个供应商商店,发现这两种类型平台上的大量卖家都在宣传锻造能力。根据他们的说法,有可能买到世界上许多国家颁发的假疫苗接种证书。我们展示了此类卖家的一些示例,包括他们如何宣传自己的服务,并开发了欧盟COVID-19证书伪造能力的分类法,描述了供应商用于生成证书的潜在方法。我们重点介绍了两个供应商商店的特殊案例,其中一个展示了较高的专业程度,展示了伪造的有效证书,我们使用两个不同的国家COVID-19移动应用程序验证其有效性。
{"title":"COVID-19 Vaccination Certificates in the Darkweb","authors":"Dimitrios Georgoulias, J. Pedersen, M. Falch, Emmanouil Vasilomanolakis","doi":"10.1145/3530877","DOIUrl":"https://doi.org/10.1145/3530877","url":null,"abstract":"COVID-19 vaccines have been rolled out in many countries and with them a number of vaccination certificates. For instance, the EU is utilizing a digital certificate in the form of a QR-code that is digitally signed and can be easily validated throughout all EU countries. In this article, we document the current state of the COVID-19 vaccination certificate market in the darkweb with a focus on the EU Digital Green Certificate (DGC). We investigate 17 marketplaces and 10 vendor shops that include vaccination certificates in their listings, and discover that a multitude of sellers in both types of platforms are advertising forging capabilities. According to their claims, it is possible to buy fake vaccination certificates issued in many countries worldwide. We demonstrate some examples of such sellers, including how they advertise their services, and we develop a taxonomy of EU COVID-19 certificate forging capabilities, describing the potential methods that the vendors are utilizing to generate certificates. We highlight two particular cases of vendor shops, with one of them showing an elevated degree of professionalism, showcasing forged valid certificates, the validity of which we verify using two different national mobile COVID-19 applications.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124202721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Vulnerability Forecasting: Theory and Practice 脆弱性预测:理论与实践
Pub Date : 2021-11-12 DOI: 10.1145/3492328
É. Leverett, Matilda Rhode, Adam Wedgbury
It is possible to forecast the volume of CVEs released within a time frame with a given prediction interval. For example, the number of CVEs published between now and a year from now can be forecast within 8% of the actual value. Different predictive algorithms perform well at different lookahead values other than 365 days, such as monthly, quarterly, and half year. It is also possible to estimate the proportions of that total volume belonging to specific vendors, software, CVSS scores, or vulnerability types. Some vendors and products can be predicted with accuracy, others with too much uncertainty to be practically useful. This article documents which vendors are amenable to being forecasted. Strategic patch management should become much easier with these tools, and further uncertainty reductions can be built from the methodologies in this article.
在给定预测间隔的时间范围内,可以预测cve的释放量。例如,从现在到一年后发布的cve数量可以在实际值的8%以内进行预测。不同的预测算法在365天以外的预测值(如月度、季度、半年)表现良好。估计属于特定供应商、软件、CVSS分数或漏洞类型的总容量的比例也是可能的。一些供应商和产品可以准确地预测,另一些则有太多的不确定性,无法实际使用。本文记录了哪些供应商可以被预测。使用这些工具,战略性补丁管理应该变得更加容易,并且可以从本文中的方法中进一步减少不确定性。
{"title":"Vulnerability Forecasting: Theory and Practice","authors":"É. Leverett, Matilda Rhode, Adam Wedgbury","doi":"10.1145/3492328","DOIUrl":"https://doi.org/10.1145/3492328","url":null,"abstract":"It is possible to forecast the volume of CVEs released within a time frame with a given prediction interval. For example, the number of CVEs published between now and a year from now can be forecast within 8% of the actual value. Different predictive algorithms perform well at different lookahead values other than 365 days, such as monthly, quarterly, and half year. It is also possible to estimate the proportions of that total volume belonging to specific vendors, software, CVSS scores, or vulnerability types. Some vendors and products can be predicted with accuracy, others with too much uncertainty to be practically useful. This article documents which vendors are amenable to being forecasted. Strategic patch management should become much easier with these tools, and further uncertainty reductions can be built from the methodologies in this article.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CVSS: Ubiquitous and Broken CVSS:无处不在和破碎
Pub Date : 2021-10-29 DOI: 10.1145/3491263
Henry Howland
The Common Vulnerability Scoring System is at the core of vulnerability management for systems of private corporations to highly classified government networks, allowing organizations to prioritize remediation in descending order of risk. With a lack of justification for its underlying formula, inconsistencies in its specification document, and no correlation to exploited vulnerabilities in the wild, it is unable to provide a meaningful metric for describing a vulnerability’s severity, let alone risk. As it stands, this standard compromises the security of America’s most sensitive information systems.
通用漏洞评分系统是私营企业系统到高度机密的政府网络漏洞管理的核心,允许组织按风险降序优先考虑修复。由于缺乏对其基础公式的证明,其规范文档中的不一致性,以及与野外利用的漏洞没有相关性,它无法提供描述漏洞严重性的有意义的度量,更不用说风险了。就目前而言,这一标准危及了美国最敏感信息系统的安全。
{"title":"CVSS: Ubiquitous and Broken","authors":"Henry Howland","doi":"10.1145/3491263","DOIUrl":"https://doi.org/10.1145/3491263","url":null,"abstract":"The Common Vulnerability Scoring System is at the core of vulnerability management for systems of private corporations to highly classified government networks, allowing organizations to prioritize remediation in descending order of risk. With a lack of justification for its underlying formula, inconsistencies in its specification document, and no correlation to exploited vulnerabilities in the wild, it is unable to provide a meaningful metric for describing a vulnerability’s severity, let alone risk. As it stands, this standard compromises the security of America’s most sensitive information systems.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115701397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques 使用变点分析和机器学习技术检测智能手机设备的异常行为
Pub Date : 2021-10-15 DOI: 10.1145/3492327
Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, N. Goel
Detecting anomalous behavior on smartphones is challenging since malware evolution. Other methodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static analysis is prone to code’s obfuscation while dynamic needs that malicious activities to cease to be dormant in the shortest possible time while data samples are collected. Triggering and capturing malicious behavior in data samples in dynamic analysis is challenging since we need to generate an efficient combination of user’s inputs to trigger these malicious activities. We propose a general model which uses a data collector and analyzer to unveil malicious behavior by analyzing the device’s power consumption since this summarizes the changes in software. The data collector uses an automated tool to generate user inputs. The data analyzer uses changepoint analysis to extract features from power consumption and machine learning techniques to train these features. The data analyzer stage contains two methodologies that extract features using parametric and non-parametric changepoint. Our methodologies are efficient in data collection time than a manual method and the data analyzer provides higher accuracy compared to other techniques, reaching over 94% F1-measure for emulated and real malware.
检测智能手机上的异常行为是具有挑战性的,因为恶意软件的进化。其他方法通过分析应用程序代码的静态特征或从硬件或软件获得的动态数据样本来检测恶意行为。静态分析容易导致代码混淆,而动态分析需要在收集数据样本的同时,在尽可能短的时间内停止恶意活动的休眠。在动态分析中触发和捕获数据样本中的恶意行为是具有挑战性的,因为我们需要生成用户输入的有效组合来触发这些恶意活动。我们提出了一个通用模型,该模型使用数据收集器和分析仪通过分析设备的功耗来揭示恶意行为,因为这总结了软件的变化。数据收集器使用自动化工具生成用户输入。数据分析器使用变化点分析从功耗中提取特征,并使用机器学习技术训练这些特征。数据分析阶段包含使用参数和非参数变化点提取特征的两种方法。我们的方法在数据收集时间上比手动方法更有效,与其他技术相比,数据分析仪提供了更高的准确性,对于模拟和真实的恶意软件达到了94%以上的f1测量值。
{"title":"Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques","authors":"Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, N. Goel","doi":"10.1145/3492327","DOIUrl":"https://doi.org/10.1145/3492327","url":null,"abstract":"Detecting anomalous behavior on smartphones is challenging since malware evolution. Other methodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static analysis is prone to code’s obfuscation while dynamic needs that malicious activities to cease to be dormant in the shortest possible time while data samples are collected. Triggering and capturing malicious behavior in data samples in dynamic analysis is challenging since we need to generate an efficient combination of user’s inputs to trigger these malicious activities. We propose a general model which uses a data collector and analyzer to unveil malicious behavior by analyzing the device’s power consumption since this summarizes the changes in software. The data collector uses an automated tool to generate user inputs. The data analyzer uses changepoint analysis to extract features from power consumption and machine learning techniques to train these features. The data analyzer stage contains two methodologies that extract features using parametric and non-parametric changepoint. Our methodologies are efficient in data collection time than a manual method and the data analyzer provides higher accuracy compared to other techniques, reaching over 94% F1-measure for emulated and real malware.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BUDS+: Better Privacy with Converger and Noisy Shuffling BUDS+:更好的隐私与汇聚和嘈杂的洗牌
Pub Date : 2021-10-15 DOI: 10.1145/3491259
Poushali Sengupta, Sudipta Paul, Subhankar Mishra
Advancements in machine learning and data science deal with the collection of a tremendous amount of data for research and analysis, following which there is a growing awareness among a large number of users about their sensitive data, and hence privacy protection has seen significant growth. Differential privacy is one of the most popular techniques to ensure data protection. However, it has two major issues: first, utility-privacy tradeoff, where users are asked to choose between them; second, the real-time implementation of such a system on high-dimensional data is missing. In this work, we propose BUDS+, a novel differential privacy framework that achieves an impressive privacy budget of 0.03. It introduces iterative shuffling, embedding for data encoding, converger function into a novel comparison system to converge the privacy threshold among the aggregated differentially private and noisy reports to further minimize the attack model’s time.
机器学习和数据科学的进步处理了大量用于研究和分析的数据的收集,随后大量用户对其敏感数据的意识越来越强,因此隐私保护得到了显着增长。差分隐私是确保数据保护的最流行的技术之一。然而,它有两个主要问题:首先,效用与隐私的权衡,用户被要求在两者之间做出选择;其次,缺乏对高维数据的实时实现。在这项工作中,我们提出了一种新的差分隐私框架BUDS+,它实现了令人印象深刻的0.03的隐私预算。它将迭代变换、数据编码嵌入、收敛函数引入到一个新的比较系统中,以收敛聚合的差分隐私和噪声报告之间的隐私阈值,从而进一步减少攻击模型的时间。
{"title":"BUDS+: Better Privacy with Converger and Noisy Shuffling","authors":"Poushali Sengupta, Sudipta Paul, Subhankar Mishra","doi":"10.1145/3491259","DOIUrl":"https://doi.org/10.1145/3491259","url":null,"abstract":"Advancements in machine learning and data science deal with the collection of a tremendous amount of data for research and analysis, following which there is a growing awareness among a large number of users about their sensitive data, and hence privacy protection has seen significant growth. Differential privacy is one of the most popular techniques to ensure data protection. However, it has two major issues: first, utility-privacy tradeoff, where users are asked to choose between them; second, the real-time implementation of such a system on high-dimensional data is missing. In this work, we propose BUDS+, a novel differential privacy framework that achieves an impressive privacy budget of 0.03. It introduces iterative shuffling, embedding for data encoding, converger function into a novel comparison system to converge the privacy threshold among the aggregated differentially private and noisy reports to further minimize the attack model’s time.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategies for Practical Hybrid Attack Graph Generation and Analysis 实用混合攻击图生成与分析策略
Pub Date : 2021-10-15 DOI: 10.1145/3491257
Ming Li, P. Hawrylak, J. Hale
As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.
攻击图作为一种网络安全分析工具,能够发现目标计算机网络上的多阶段攻击向量。信息物理系统(cps)包括一种特殊类型的网络,它不仅包含计算设备,还集成了在连续域中运行的组件,如传感器和执行器。在cps上使用AGs需要系统模型和利用模式捕获令牌值和实值信息。在本文中,我们描述了一个用于cps和计算机网络安全分析的混合AG模型。具体来说,我们重点研究了与该模型在实践中的应用相关的两个问题:高效的混合AG生成和从中提取信息的技术。为了解决第一个问题,我们提出了一种采用并行编程和高性能计算(HPC)的加速混合AG生成器。我们在CPU和GPU平台上进行了性能测试,以表征我们并行算法的效率。为了解决第二个问题,我们引入了一种基于中心性分析的分析方案,并将其应用于为目标CPS系统生成的混合AG,以发现有效的漏洞修复解决方案。
{"title":"Strategies for Practical Hybrid Attack Graph Generation and Analysis","authors":"Ming Li, P. Hawrylak, J. Hale","doi":"10.1145/3491257","DOIUrl":"https://doi.org/10.1145/3491257","url":null,"abstract":"As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126364516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GALU: A Genetic Algorithm Framework for Logic Unlocking 逻辑解锁的遗传算法框架
Pub Date : 2021-10-15 DOI: 10.1145/3491256
Huili Chen, Cheng Fu, Jishen Zhao, F. Koushanfar
Logic locking is a circuit obfuscation technique that inserts additional key gates to the original circuit in order to prevent potential threats such as circuit overproduction, piracy, and counterfeiting. The encrypted circuit generates desired outputs only when the correct keys are applied to the key gates. Previous works have identified the vulnerability of logic locking to satisfiability (SAT)-based attacks. However, SAT attacks are unscalable and have limited effectiveness on circuits with SAT-hard structures. To address the above constraints, we propose GALU, the first genetic algorithm-based logic unlocking framework that is parallelizable and significantly faster than the conventional SAT-based counterparts. GALU works by formulating circuit deobfuscation (i.e., identifying the correct keys) as a combinatorial optimization problem and approaches it using genetic algorithms (GAs). We consider key sequences as individuals in distinct populations and propose an adaptive, diversity-guided GA framework consisting of four main steps: circuit fitness evaluation, population selection, crossover, and mutation. In each iteration, the key sequences with high fitness scores are selected and transformed into the offspring key sequences. As a result of evolutionary key searching, GALU is highly scalable, effective, and efficient. To optimize the runtime overhead of logic unlocking, we integrate the design of GALU’s algorithm, software and hardware in a closed loop. In particular, we identify circuit fitness evaluation as the performance bottleneck and employ hardware emulation on programmable hardware for runtime optimization. To this end, GALU framework automatically constructs customized auxiliary circuitry to pipeline the computation in constraints checking, sorting, crossover, and mutation. GALU is the first adaptive and scalable attack framework that provides the flexibility/trade-off between runtime overhead and key usability. This is achieved by producing a group of approximate keys with improving quality over time. We perform a comprehensive evaluation of GALU’s performance on various benchmarks and demonstrate that GALU achieves up to 1089.2× speedup and 4268.6× more energy-efficiency compared to the state-of-the-art SAT attacks for circuit logic unlocking.
逻辑锁定是一种电路混淆技术,它在原始电路中插入额外的密钥门,以防止电路生产过剩、盗版和假冒等潜在威胁。只有当正确的密钥应用于密钥门时,加密电路才产生所需的输出。以前的工作已经确定了逻辑锁定对基于可满足性(SAT)的攻击的脆弱性。然而,SAT攻击是不可扩展的,并且对具有SAT硬结构的电路的有效性有限。为了解决上述限制,我们提出了GALU,这是第一个基于遗传算法的逻辑解锁框架,它是可并行的,并且比传统的基于sat的框架快得多。GALU的工作原理是将电路去混淆(即识别正确的键)作为组合优化问题,并使用遗传算法(GAs)进行处理。我们将关键序列视为不同种群中的个体,并提出了一个适应性的、多样性导向的遗传框架,该框架由四个主要步骤组成:电路适应度评估、种群选择、交叉和突变。在每次迭代中,选择适应度得分高的关键序列并将其转化为后代关键序列。由于演化式关键字搜索,GALU具有高度可伸缩性、有效性和高效性。为了优化逻辑解锁的运行时开销,我们将GALU的算法、软件和硬件设计集成在一个闭环中。特别是,我们将电路适应度评估确定为性能瓶颈,并在可编程硬件上采用硬件仿真进行运行时优化。为此,GALU框架自动构建定制化的辅助电路,将约束检查、排序、交叉、突变等计算流水线化。GALU是第一个自适应和可扩展的攻击框架,它提供了运行时开销和关键可用性之间的灵活性/权衡。这是通过生成一组随着时间的推移而提高质量的近似键来实现的。我们在各种基准测试中对GALU的性能进行了全面评估,并证明与电路逻辑解锁的最先进的SAT攻击相比,GALU实现了高达1089.2倍的加速和4268.6倍的能效。
{"title":"GALU: A Genetic Algorithm Framework for Logic Unlocking","authors":"Huili Chen, Cheng Fu, Jishen Zhao, F. Koushanfar","doi":"10.1145/3491256","DOIUrl":"https://doi.org/10.1145/3491256","url":null,"abstract":"Logic locking is a circuit obfuscation technique that inserts additional key gates to the original circuit in order to prevent potential threats such as circuit overproduction, piracy, and counterfeiting. The encrypted circuit generates desired outputs only when the correct keys are applied to the key gates. Previous works have identified the vulnerability of logic locking to satisfiability (SAT)-based attacks. However, SAT attacks are unscalable and have limited effectiveness on circuits with SAT-hard structures. To address the above constraints, we propose GALU, the first genetic algorithm-based logic unlocking framework that is parallelizable and significantly faster than the conventional SAT-based counterparts. GALU works by formulating circuit deobfuscation (i.e., identifying the correct keys) as a combinatorial optimization problem and approaches it using genetic algorithms (GAs). We consider key sequences as individuals in distinct populations and propose an adaptive, diversity-guided GA framework consisting of four main steps: circuit fitness evaluation, population selection, crossover, and mutation. In each iteration, the key sequences with high fitness scores are selected and transformed into the offspring key sequences. As a result of evolutionary key searching, GALU is highly scalable, effective, and efficient. To optimize the runtime overhead of logic unlocking, we integrate the design of GALU’s algorithm, software and hardware in a closed loop. In particular, we identify circuit fitness evaluation as the performance bottleneck and employ hardware emulation on programmable hardware for runtime optimization. To this end, GALU framework automatically constructs customized auxiliary circuitry to pipeline the computation in constraints checking, sorting, crossover, and mutation. GALU is the first adaptive and scalable attack framework that provides the flexibility/trade-off between runtime overhead and key usability. This is achieved by producing a group of approximate keys with improving quality over time. We perform a comprehensive evaluation of GALU’s performance on various benchmarks and demonstrate that GALU achieves up to 1089.2× speedup and 4268.6× more energy-efficiency compared to the state-of-the-art SAT attacks for circuit logic unlocking.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Threats: Research and Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1