首页 > 最新文献

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)最新文献

英文 中文
Forensic Analysis of Dating Applications on Android and iOS Devices Android和iOS设备上约会应用程序的取证分析
Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik
Dating application use is on the rise, and with it comes the need to better understand what data can be recovered to assist in an investigation. While using these dating applications, people send countless messages (including pictures and videos) without ever considering exactly what data is being sent within that message. In this project, we conduct a forensic analysis of five popular dating applications (Her, Hily, Hinge, OkCupid, and Plenty of Fish (POF)) that are available on both Android and iOS devices. We also determined what forensically relevant data can be recovered from dating applications on both Android and iOS. Specifically, we determined what data can be recovered about the sender from the receiver's phone. Secondly, we identified any privacy concerns that result due to the recoverable data and discuss their implications for users. Lastly, we detailed the investigative process that should be followed and presented the locations of any relevant data to aid digital forensics investigators during an Investigation.
约会应用程序的使用正在上升,随之而来的是需要更好地了解可以恢复哪些数据以协助调查。在使用这些约会应用程序时,人们发送了无数的信息(包括图片和视频),却从来没有考虑过这些信息中到底发送了什么数据。在这个项目中,我们对五个流行的约会应用程序(Her, Hily, Hinge, OkCupid和Plenty of Fish (POF))进行了取证分析,这些应用程序可以在Android和iOS设备上使用。我们还确定了可以从Android和iOS上的约会应用程序中恢复哪些法医相关数据。具体来说,我们确定了可以从接收者的手机中恢复哪些关于发送者的数据。其次,我们确定了由于可恢复数据而导致的任何隐私问题,并讨论了它们对用户的影响。最后,我们详细介绍了应遵循的调查过程,并提供了任何相关数据的位置,以帮助调查期间的数字取证调查员。
{"title":"Forensic Analysis of Dating Applications on Android and iOS Devices","authors":"Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik","doi":"10.1109/TrustCom50675.2020.00113","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00113","url":null,"abstract":"Dating application use is on the rise, and with it comes the need to better understand what data can be recovered to assist in an investigation. While using these dating applications, people send countless messages (including pictures and videos) without ever considering exactly what data is being sent within that message. In this project, we conduct a forensic analysis of five popular dating applications (Her, Hily, Hinge, OkCupid, and Plenty of Fish (POF)) that are available on both Android and iOS devices. We also determined what forensically relevant data can be recovered from dating applications on both Android and iOS. Specifically, we determined what data can be recovered about the sender from the receiver's phone. Secondly, we identified any privacy concerns that result due to the recoverable data and discuss their implications for users. Lastly, we detailed the investigative process that should be followed and presented the locations of any relevant data to aid digital forensics investigators during an Investigation.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting User Selection Algorithm for Securing Wireless Communication Networks 利用用户选择算法保护无线通信网络
Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du
How to improve the security and stability of wireless communication systems has become a critical issue. In this paper, physical layer security is introduced to overcome security challenges. The considered communication system is equipped with full-duplex (FD) users in contrast to conventional frameworks where half-duplex (HD) users are at hand. Under these assumptions, we propose a Q-learning based user selection algorithm to model the interaction between a source and multiple users. We also investigate the effect of self-interference and channel interference on physical layer security. The numerical results verify the superiority of the proposed algorithm and in certain conditions, demonstrate substantial performance gain over the conventional approaches.
如何提高无线通信系统的安全性和稳定性已成为一个至关重要的问题。本文引入物理层安全来克服安全挑战。所考虑的通信系统配备了全双工(FD)用户,而传统框架则配备了半双工(HD)用户。在这些假设下,我们提出了一种基于q学习的用户选择算法来模拟一个源和多个用户之间的交互。我们还研究了自干扰和信道干扰对物理层安全性的影响。数值结果验证了该算法的优越性,并且在一定条件下,与传统方法相比,性能有了很大的提高。
{"title":"Exploiting User Selection Algorithm for Securing Wireless Communication Networks","authors":"Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du","doi":"10.1109/TrustCom50675.2020.00213","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00213","url":null,"abstract":"How to improve the security and stability of wireless communication systems has become a critical issue. In this paper, physical layer security is introduced to overcome security challenges. The considered communication system is equipped with full-duplex (FD) users in contrast to conventional frameworks where half-duplex (HD) users are at hand. Under these assumptions, we propose a Q-learning based user selection algorithm to model the interaction between a source and multiple users. We also investigate the effect of self-interference and channel interference on physical layer security. The numerical results verify the superiority of the proposed algorithm and in certain conditions, demonstrate substantial performance gain over the conventional approaches.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE 降低保护的代价:在TEE中识别和迁移非敏感代码
Yin Liu, E. Tilevich
As the trusted computing base (TCB) unnecessarily increases its size, the performance and security of Trusted Execution Environments (TEE) can deteriorate rapidly. Existing solutions focus on placing only the necessary program parts in TEE, but neglect the numerous cases of legacy software with misplaced TEE-based non-sensitive code. In this paper, we introduce a new type of software refactoring—TEE Insourcing—that identifies and migrates non-sensitive code out of TEE. We present TEE-DRUP, the first semi-automated TEE Insourcing framework whose process comprises two phases: (1) a variable sensitivity analysis designates each variable as sensitive or non-sensitive; (2) a compiler-assisted program transformation automatically moves the functions that never operate on the sensitive variables out of TEE. Developers can participate to verify and confirm sensitive variables, and specify additional non-sensitive functions to migrate. The evaluation results of TEE-DRUP on real-world programs are encouraging. TEE-DRUP distinguishes between sensitive and non-sensitive variables with satisfactory accuracy, precision, and recall — all of their actual values are greater than 80% in the majority of evaluation scenarios. Further, moving non-sensitive code out of TEE improves system performance, with the speedup ranging between 1.35 and 10K. Finally, TEE-DRUP's automated program transformation requires only a small programming effort.
随着可信计算基础(TCB)规模的不必要增加,可信执行环境(TEE)的性能和安全性会迅速恶化。现有的解决方案只关注于在TEE中放置必要的程序部分,而忽略了遗留软件中基于TEE的非敏感代码的大量情况。在本文中,我们介绍了一种新的软件重构——TEE内建——它可以识别和迁移TEE外的非敏感代码。我们提出TEE- drup,第一个半自动化TEE内包框架,其过程包括两个阶段:(1)变量敏感性分析指定每个变量为敏感或非敏感;(2)编译器辅助的程序转换自动将从不操作敏感变量的函数移出TEE。开发人员可以参与验证和确认敏感变量,并指定要迁移的其他非敏感函数。TEE-DRUP对实际项目的评价结果令人鼓舞。TEE-DRUP区分敏感变量和非敏感变量,具有令人满意的准确度、精密度和召回率——在大多数评估场景中,它们的实际值都大于80%。此外,将非敏感代码移出TEE可以提高系统性能,加速范围在1.35到10K之间。最后,TEE-DRUP的自动化程序转换只需要很小的编程工作。
{"title":"Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE","authors":"Yin Liu, E. Tilevich","doi":"10.1109/TrustCom50675.2020.00028","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00028","url":null,"abstract":"As the trusted computing base (TCB) unnecessarily increases its size, the performance and security of Trusted Execution Environments (TEE) can deteriorate rapidly. Existing solutions focus on placing only the necessary program parts in TEE, but neglect the numerous cases of legacy software with misplaced TEE-based non-sensitive code. In this paper, we introduce a new type of software refactoring—TEE Insourcing—that identifies and migrates non-sensitive code out of TEE. We present TEE-DRUP, the first semi-automated TEE Insourcing framework whose process comprises two phases: (1) a variable sensitivity analysis designates each variable as sensitive or non-sensitive; (2) a compiler-assisted program transformation automatically moves the functions that never operate on the sensitive variables out of TEE. Developers can participate to verify and confirm sensitive variables, and specify additional non-sensitive functions to migrate. The evaluation results of TEE-DRUP on real-world programs are encouraging. TEE-DRUP distinguishes between sensitive and non-sensitive variables with satisfactory accuracy, precision, and recall — all of their actual values are greater than 80% in the majority of evaluation scenarios. Further, moving non-sensitive code out of TEE improves system performance, with the speedup ranging between 1.35 and 10K. Finally, TEE-DRUP's automated program transformation requires only a small programming effort.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131084285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AEIT 2020 Organizing and Program Committees AEIT 2020组织委员会和项目委员会
{"title":"AEIT 2020 Organizing and Program Committees","authors":"","doi":"10.1109/trustcom50675.2020.00009","DOIUrl":"https://doi.org/10.1109/trustcom50675.2020.00009","url":null,"abstract":"","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware NLabel:大规模弱标记恶意软件的精确家族聚类框架
Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan
Automatic family labeling for malware is in demand, especially for today's malware scale. While business Anti-Virus engines provide an efficient family labeling method, the raw labels tend to be inconsistent. Prior works mitigate such inconsistency by detecting the aliases and majority voting to obtain the final family label. However, these methods solve the inconsistency in a coarse-grained and vulnerable manner, and the obtained family label is inaccurate sometimes. In this work, we propose NLabel to conduct familial clustering based on AV engines' raw labels. On the one hand, NLabel uses word embedding techniques to capture the similarity among raw labels, transform the inconsistent labels of the same family into similar semantic representations, and mitigate the inconsistency at finer granularity. On the other hand, we propose a hierarchical family clustering method to boost the performance of large-scale data sets. Experimental results show that our method outperforms the SOTA.
对恶意软件的自动家族标记是有需求的,特别是对于今天的恶意软件规模。虽然商业反病毒引擎提供了一种有效的家族标签方法,但原始标签往往不一致。先前的工作通过检测别名和多数投票来获得最终的家族标签来缓解这种不一致。然而,这些方法解决不一致性的方法都是粗粒度的、易受攻击的,而且有时得到的家族标签也不准确。在这项工作中,我们提出了NLabel基于AV引擎的原始标签进行家族聚类。一方面,NLabel利用词嵌入技术捕获原始标签之间的相似性,将同族不一致的标签转化为相似的语义表示,并在更细的粒度上缓解不一致。另一方面,我们提出了一种层次族聚类方法来提高大规模数据集的性能。实验结果表明,该方法优于SOTA算法。
{"title":"NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware","authors":"Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan","doi":"10.1109/TrustCom50675.2020.00039","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00039","url":null,"abstract":"Automatic family labeling for malware is in demand, especially for today's malware scale. While business Anti-Virus engines provide an efficient family labeling method, the raw labels tend to be inconsistent. Prior works mitigate such inconsistency by detecting the aliases and majority voting to obtain the final family label. However, these methods solve the inconsistency in a coarse-grained and vulnerable manner, and the obtained family label is inaccurate sometimes. In this work, we propose NLabel to conduct familial clustering based on AV engines' raw labels. On the one hand, NLabel uses word embedding techniques to capture the similarity among raw labels, transform the inconsistent labels of the same family into similar semantic representations, and mitigate the inconsistency at finer granularity. On the other hand, we propose a hierarchical family clustering method to boost the performance of large-scale data sets. Experimental results show that our method outperforms the SOTA.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning 基于深度强化学习的机器学习模型公平性测试
Wentao Xie, Peng Wu
Machine learning models play an important role for decision-making systems in areas such as hiring, insurance, and predictive policing. However, it still remains a challenge to guarantee their trustworthiness. Fairness is one of the most critical properties of these machine learning models, while individual discriminatory cases may break the trustworthiness of these systems severely. In this paper, we present a systematic approach of testing the fairness of a machine learning model, with individual discriminatory inputs generated automatically in an adaptive manner based on the state-of-the-art deep reinforcement learning techniques. Our approach can explore and exploit the input space efficiently, and find more individual discriminatory inputs within less time consumption. Case studies with typical benchmark models demonstrate the effectiveness and efficiency of our approach, compared to the state-of-the-art black-box fairness testing approaches.
机器学习模型在招聘、保险和预测性警务等领域的决策系统中发挥着重要作用。然而,如何保证它们的可信度仍然是一个挑战。公平性是这些机器学习模型最关键的属性之一,而个别的歧视性案例可能会严重破坏这些系统的可信度。在本文中,我们提出了一种系统的方法来测试机器学习模型的公平性,该模型基于最先进的深度强化学习技术,以自适应的方式自动生成个体歧视性输入。我们的方法可以有效地探索和利用输入空间,并在更短的时间内找到更多的个体歧视性输入。与最先进的黑盒公平性测试方法相比,典型基准模型的案例研究证明了我们方法的有效性和效率。
{"title":"Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning","authors":"Wentao Xie, Peng Wu","doi":"10.1109/TrustCom50675.2020.00029","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00029","url":null,"abstract":"Machine learning models play an important role for decision-making systems in areas such as hiring, insurance, and predictive policing. However, it still remains a challenge to guarantee their trustworthiness. Fairness is one of the most critical properties of these machine learning models, while individual discriminatory cases may break the trustworthiness of these systems severely. In this paper, we present a systematic approach of testing the fairness of a machine learning model, with individual discriminatory inputs generated automatically in an adaptive manner based on the state-of-the-art deep reinforcement learning techniques. Our approach can explore and exploit the input space efficiently, and find more individual discriminatory inputs within less time consumption. Case studies with typical benchmark models demonstrate the effectiveness and efficiency of our approach, compared to the state-of-the-art black-box fairness testing approaches.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126302745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things 面向消费者物联网零信任的信任感知持续授权
T. Dimitrakos, Tezcan Dilshener, A. Kravtsov, Antonio La Marra, F. Martinelli, Athanasios Rizos, A. Rosetti, A. Saracino
This work describes the architecture and prototype implementation of a novel trust-aware continuous authorization technology that targets consumer Internet of Things (IoT), e.g., Smart Home. Our approach extends previous authorization models in three complementary ways: (1) By incorporating trust-level evaluation formulae as conditions inside authorization rules and policies, while supporting the evaluation of such policies through the fusion of an Attribute-Based Access Control (ABAC) authorization policy engine with a Trust-Level-Evaluation-Engine (TLEE). (2) By introducing contextualized, continuous monitoring and re-evaluation of policies throughout the authorization life-cycle. That is, mutable attributes about subjects, resources and environment as well as trust levels that are continuously monitored while obtaining an authorization, throughout the duration of or after revoking an existing authorization. Whenever change is detected, the corresponding authorization rules, including both access control rules and trust level expressions, are re-evaluated. (3) By minimizing the computational and memory footprint and maximizing concurrency and modular evaluation to improve performance while preserving the continuity of monitoring. Finally we introduce an application of such model in Zero Trust Architecture (ZTA) for consumer IoT.
这项工作描述了一种针对消费者物联网(IoT)(例如智能家居)的新型信任感知连续授权技术的体系结构和原型实现。我们的方法以三种互补的方式扩展了以前的授权模型:(1)通过将信任级评估公式作为授权规则和策略中的条件,同时通过基于属性的访问控制(ABAC)授权策略引擎与信任级评估引擎(TLEE)的融合来支持这些策略的评估。(2)在整个授权生命周期中对政策进行情境化、持续监测和重新评估。也就是说,关于主题、资源和环境的可变属性以及信任级别,这些属性在获得授权期间、在整个授权期间或在撤销现有授权之后持续受到监视。每当检测到更改时,将重新计算相应的授权规则(包括访问控制规则和信任级别表达式)。(3)通过最小化计算和内存占用,最大化并发性和模块化评估来提高性能,同时保持监测的连续性。最后介绍了该模型在消费者物联网零信任架构(ZTA)中的应用。
{"title":"Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things","authors":"T. Dimitrakos, Tezcan Dilshener, A. Kravtsov, Antonio La Marra, F. Martinelli, Athanasios Rizos, A. Rosetti, A. Saracino","doi":"10.1109/TrustCom50675.2020.00247","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00247","url":null,"abstract":"This work describes the architecture and prototype implementation of a novel trust-aware continuous authorization technology that targets consumer Internet of Things (IoT), e.g., Smart Home. Our approach extends previous authorization models in three complementary ways: (1) By incorporating trust-level evaluation formulae as conditions inside authorization rules and policies, while supporting the evaluation of such policies through the fusion of an Attribute-Based Access Control (ABAC) authorization policy engine with a Trust-Level-Evaluation-Engine (TLEE). (2) By introducing contextualized, continuous monitoring and re-evaluation of policies throughout the authorization life-cycle. That is, mutable attributes about subjects, resources and environment as well as trust levels that are continuously monitored while obtaining an authorization, throughout the duration of or after revoking an existing authorization. Whenever change is detected, the corresponding authorization rules, including both access control rules and trust level expressions, are re-evaluated. (3) By minimizing the computational and memory footprint and maximizing concurrency and modular evaluation to improve performance while preserving the continuity of monitoring. Finally we introduce an application of such model in Zero Trust Architecture (ZTA) for consumer IoT.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing 保护隐私的道德钴采购公开验证
Kilian Becher, J. Lagodzinski, T. Strufe
Cobalt is a key ingredient of lithium-ion batteries and therefore is crucial for many modern devices. To ensure ethical sourcing, consumers need a way to verify provenance of their cobalt-based products, including the percentage of artisanally mined (ASM) cobalt. Existing frameworks for provenance and supply chain traceability rely on distributed ledgers. Providing public verifiability via permissionless distributed ledgers is trivial. However, offering public verifiability based on confidential production details seems contradictory. Hence, existing frameworks lack public verifiability of ratios between commodities while ensuring confidentiality of supply chain details. We propose a protocol that allows end consumers to verify the percentage of ASM cobalt in their products. Unlike previous solutions, production details are published and processed entirely in encrypted form by employing homomorphic encryption and proxy re-encryption. Thus, it ensures a high level of confidentiality of supply chain data. It has constant consumer-side complexity, making it suitable for mobile devices.
钴是锂离子电池的关键成分,因此对许多现代设备至关重要。为了确保合乎道德的采购,消费者需要一种方法来验证其钴基产品的来源,包括手工开采(ASM)钴的百分比。现有的来源和供应链可追溯性框架依赖于分布式账本。通过无许可的分布式账本提供公共可验证性是微不足道的。然而,提供基于机密生产细节的公开可验证性似乎是矛盾的。因此,现有框架缺乏商品之间比例的公共可验证性,同时确保供应链细节的机密性。我们提出了一个协议,允许最终消费者验证其产品中ASM钴的百分比。与以前的解决方案不同,通过使用同态加密和代理重新加密,生产细节完全以加密形式发布和处理。因此,它确保了供应链数据的高度机密性。它具有恒定的消费者端复杂性,使其适合移动设备。
{"title":"Privacy-Preserving Public Verification of Ethical Cobalt Sourcing","authors":"Kilian Becher, J. Lagodzinski, T. Strufe","doi":"10.1109/TrustCom50675.2020.00133","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00133","url":null,"abstract":"Cobalt is a key ingredient of lithium-ion batteries and therefore is crucial for many modern devices. To ensure ethical sourcing, consumers need a way to verify provenance of their cobalt-based products, including the percentage of artisanally mined (ASM) cobalt. Existing frameworks for provenance and supply chain traceability rely on distributed ledgers. Providing public verifiability via permissionless distributed ledgers is trivial. However, offering public verifiability based on confidential production details seems contradictory. Hence, existing frameworks lack public verifiability of ratios between commodities while ensuring confidentiality of supply chain details. We propose a protocol that allows end consumers to verify the percentage of ASM cobalt in their products. Unlike previous solutions, production details are published and processed entirely in encrypted form by employing homomorphic encryption and proxy re-encryption. Thus, it ensures a high level of confidentiality of supply chain data. It has constant consumer-side complexity, making it suitable for mobile devices.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image Self-Recovery Based on Authentication Feature Extraction 基于认证特征提取的图像自恢复
Tong Liu, Xiaochen Yuan
This paper proposes a novel image self-recovery scheme based on authentication feature extraction. The Authentication Feature Extraction method is proposed to calculate the authentication information. The Set Partitioning in Hierarchical Trees encoding algorithm is employed to calculate the recovery information. Moreover, in order to retrieve the damaged information caused by tampering, we propose to map each block into another position and generate the mapped-recovery information accordingly. In this way, a double assurance of recovery information can be provided. Experimental results show the superior performance of the proposed scheme in terms of image self-recovery. Comparison with the state-of-the-art works demonstrate that the proposed scheme shows efficiency in strong capability for image recovery, and effectiveness of attack resistance.
提出了一种基于认证特征提取的图像自恢复方案。提出了认证特征提取方法来计算认证信息。采用分层树集合分区编码算法计算恢复信息。此外,为了检索由于篡改而造成的损坏信息,我们建议将每个块映射到另一个位置,并相应地生成映射的恢复信息。通过这种方式,可以提供恢复信息的双重保证。实验结果表明,该方法具有较好的图像自恢复性能。与现有算法的比较表明,该算法具有较强的图像恢复能力和抗攻击能力。
{"title":"Image Self-Recovery Based on Authentication Feature Extraction","authors":"Tong Liu, Xiaochen Yuan","doi":"10.1109/TrustCom50675.2020.00164","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00164","url":null,"abstract":"This paper proposes a novel image self-recovery scheme based on authentication feature extraction. The Authentication Feature Extraction method is proposed to calculate the authentication information. The Set Partitioning in Hierarchical Trees encoding algorithm is employed to calculate the recovery information. Moreover, in order to retrieve the damaged information caused by tampering, we propose to map each block into another position and generate the mapped-recovery information accordingly. In this way, a double assurance of recovery information can be provided. Experimental results show the superior performance of the proposed scheme in terms of image self-recovery. Comparison with the state-of-the-art works demonstrate that the proposed scheme shows efficiency in strong capability for image recovery, and effectiveness of attack resistance.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics 基于预测前向动力学的下肢外骨骼康复机器人阻抗控制方法
Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoyi Li, Huai-bin Wang
Aiming at the problem of the sick limb condition of the exoskeleton rehabilitation robot affects the smoothness and stability of the robot system during rehabilitation training, this paper proposed an impedance control model for the lower limb exoskeleton rehabilitation robot. The model realizes the flexibility of the robot system by adjusting the impedance control parameters in real time. To verify the validity of the model, we used SCONE software to realize forward dynamics simulation of walking gait. The classical PID impedance control system and fuzzy adaptive impedance control system are simulated respectively. The results show that the fuzzy adaptive control system is more effective to adapt to the changes of limb condition for the impedance control system of lower limb exoskeleton rehabilitation robot.
针对外骨骼康复机器人在康复训练过程中肢体患病状况影响机器人系统平稳性和稳定性的问题,本文提出了下肢外骨骼康复机器人的阻抗控制模型。该模型通过实时调整阻抗控制参数来实现机器人系统的灵活性。为了验证模型的有效性,我们利用SCONE软件对行走步态进行了前向动力学仿真。分别对经典PID阻抗控制系统和模糊自适应阻抗控制系统进行了仿真。结果表明,模糊自适应控制系统对于下肢外骨骼康复机器人阻抗控制系统能够更有效地适应肢体状况的变化。
{"title":"An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics","authors":"Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoyi Li, Huai-bin Wang","doi":"10.1109/TrustCom50675.2020.00206","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00206","url":null,"abstract":"Aiming at the problem of the sick limb condition of the exoskeleton rehabilitation robot affects the smoothness and stability of the robot system during rehabilitation training, this paper proposed an impedance control model for the lower limb exoskeleton rehabilitation robot. The model realizes the flexibility of the robot system by adjusting the impedance control parameters in real time. To verify the validity of the model, we used SCONE software to realize forward dynamics simulation of walking gait. The classical PID impedance control system and fuzzy adaptive impedance control system are simulated respectively. The results show that the fuzzy adaptive control system is more effective to adapt to the changes of limb condition for the impedance control system of lower limb exoskeleton rehabilitation robot.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121874312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1