首页 > 最新文献

International Conference on Information, Communications and Signal Processing最新文献

英文 中文
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings AFLOW:在噪声极度受限的环境下开发对抗性示例
Pub Date : 2023-10-15 DOI: 10.1007/978-981-99-7356-9_30
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou
{"title":"AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings","authors":"Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou","doi":"10.1007/978-981-99-7356-9_30","DOIUrl":"https://doi.org/10.1007/978-981-99-7356-9_30","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"36 1","pages":"502-518"},"PeriodicalIF":0.0,"publicationDate":"2023-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139318925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TimeClave: Oblivious In-enclave Time series Processing System TimeClave:遗忘包内时间序列处理系统
Pub Date : 2023-06-29 DOI: 10.48550/arXiv.2306.16652
K. Bagher, S. Cui, X. Yuan, C. Rudolph, X. Yi
Cloud platforms are widely adopted by many systems, such as time series processing systems, to store and process massive amounts of sensitive time series data. Unfortunately, several incidents have shown that cloud platforms are vulnerable to internal and external attacks that lead to critical data breaches. Adopting cryptographic protocols such as homomorphic encryption and secure multi-party computation adds high computational and network overhead to query operations. We present TimeClave, a fully oblivious in-enclave time series processing system: TimeClave leverages Intel SGX to support aggregate statistics on time series with minimal memory consumption inside the enclave. To hide the access pattern inside the enclave, we introduce a non-blocking read-optimised ORAM named RoORAM. TimeClave integrates RoORAM to obliviously and securely handle client queries with high performance. With an aggregation time interval of $10s$, $2^{14}$ summarised data blocks and 8 aggregate functions, TimeClave run point query in $0.03ms$ and a range query of 50 intervals in $0.46ms$. Compared to the ORAM baseline, TimeClave achieves lower query latency by up to $2.5times$ and up to $2times$ throughput, with up to 22K queries per second.
云平台被许多系统广泛采用,例如时间序列处理系统,用于存储和处理大量敏感的时间序列数据。不幸的是,一些事件表明,云平台容易受到内部和外部攻击,从而导致关键数据泄露。采用同态加密和安全多方计算等加密协议会增加查询操作的计算和网络开销。我们介绍TimeClave,一个完全遗忘的enclave内时间序列处理系统:TimeClave利用Intel SGX来支持时间序列的汇总统计,并且在enclave内消耗最小的内存。为了在enclave内部隐藏访问模式,我们引入了一个非阻塞的读优化ORAM,名为RoORAM。TimeClave集成了RoORAM,可以轻松安全地处理高性能的客户端查询。TimeClave以$10s$为聚合时间间隔,$2^{14}$汇总数据块和8个聚合函数,在$0.03ms$中运行点查询,在$0.46ms$中运行50个间隔的范围查询。与ORAM基线相比,TimeClave的查询延迟降低了2.5倍,吞吐量降低了2倍,每秒查询次数高达22K。
{"title":"TimeClave: Oblivious In-enclave Time series Processing System","authors":"K. Bagher, S. Cui, X. Yuan, C. Rudolph, X. Yi","doi":"10.48550/arXiv.2306.16652","DOIUrl":"https://doi.org/10.48550/arXiv.2306.16652","url":null,"abstract":"Cloud platforms are widely adopted by many systems, such as time series processing systems, to store and process massive amounts of sensitive time series data. Unfortunately, several incidents have shown that cloud platforms are vulnerable to internal and external attacks that lead to critical data breaches. Adopting cryptographic protocols such as homomorphic encryption and secure multi-party computation adds high computational and network overhead to query operations. We present TimeClave, a fully oblivious in-enclave time series processing system: TimeClave leverages Intel SGX to support aggregate statistics on time series with minimal memory consumption inside the enclave. To hide the access pattern inside the enclave, we introduce a non-blocking read-optimised ORAM named RoORAM. TimeClave integrates RoORAM to obliviously and securely handle client queries with high performance. With an aggregation time interval of $10s$, $2^{14}$ summarised data blocks and 8 aggregate functions, TimeClave run point query in $0.03ms$ and a range query of 50 intervals in $0.46ms$. Compared to the ORAM baseline, TimeClave achieves lower query latency by up to $2.5times$ and up to $2times$ throughput, with up to 22K queries per second.","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PiXi: Password Inspiration by Exploring Information PiXi:从探索信息中获得密码灵感
Pub Date : 2023-04-21 DOI: 10.48550/arXiv.2304.10728
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure passwords they can recall. To address this problem, we design Password inspiration by eXploring information (PiXi), a novel approach to nudge users towards creating secure passwords. PiXi is the first of its kind that employs a password creation nudge to support users in the task of generating a unique secure password themselves. PiXi prompts users to explore unusual information right before creating a password, to shake them out of their typical habits and thought processes, and to inspire them to create unique (and therefore stronger) passwords. PiXi's design aims to create an engaging, interactive, and effective nudge to improve secure password creation. We conducted a user study ($N=238$) to compare the efficacy of PiXi to typical password creation. Our findings indicate that PiXi's nudges do influence users' password choices such that passwords are significantly longer and more secure (less predictable and guessable).
密码是防止未经授权访问的第一道防线,必须既安全又容易记住。然而,人们通常很难创建他们可以记住的安全密码。为了解决这个问题,我们通过探索信息(PiXi)设计了密码灵感,这是一种推动用户创建安全密码的新方法。PiXi是第一个使用密码创建助推来支持用户自己生成唯一安全密码的同类产品。PiXi提示用户在创建密码之前探索不寻常的信息,以摆脱他们的典型习惯和思维过程,并激励他们创建独特(因此更强)的密码。PiXi的设计旨在创造一个引人入胜的、互动的、有效的推动,以提高安全的密码创建。我们进行了一项用户研究($N=238$),以比较PiXi与典型密码创建的有效性。我们的研究结果表明,PiXi的轻推确实影响了用户的密码选择,比如密码明显更长、更安全(更不可预测和猜测)。
{"title":"PiXi: Password Inspiration by Exploring Information","authors":"Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe","doi":"10.48550/arXiv.2304.10728","DOIUrl":"https://doi.org/10.48550/arXiv.2304.10728","url":null,"abstract":"Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure passwords they can recall. To address this problem, we design Password inspiration by eXploring information (PiXi), a novel approach to nudge users towards creating secure passwords. PiXi is the first of its kind that employs a password creation nudge to support users in the task of generating a unique secure password themselves. PiXi prompts users to explore unusual information right before creating a password, to shake them out of their typical habits and thought processes, and to inspire them to create unique (and therefore stronger) passwords. PiXi's design aims to create an engaging, interactive, and effective nudge to improve secure password creation. We conducted a user study ($N=238$) to compare the efficacy of PiXi to typical password creation. Our findings indicate that PiXi's nudges do influence users' password choices such that passwords are significantly longer and more secure (less predictable and guessable).","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DeepC2: AI-Powered Covert Command and Control on OSNs DeepC2:基于人工智能的osn隐蔽指挥与控制
Pub Date : 2020-09-16 DOI: 10.1007/978-3-031-15777-6_22
Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu
{"title":"DeepC2: AI-Powered Covert Command and Control on OSNs","authors":"Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu","doi":"10.1007/978-3-031-15777-6_22","DOIUrl":"https://doi.org/10.1007/978-3-031-15777-6_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks 基于多层LSTM网络的变形恶意软件封装检测
Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_3
Erik Bergenholtz, E. Casalicchio, D. Ilie, Andrew Moss
{"title":"Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks","authors":"Erik Bergenholtz, E. Casalicchio, D. Ilie, Andrew Moss","doi":"10.1007/978-3-030-61078-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_3","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information-Theoretic Security of Cryptographic Channels 密码信道的信息论安全性
Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_17
M. Fischlin, Felix Günther, Philip A. Muth
{"title":"Information-Theoretic Security of Cryptographic Channels","authors":"M. Fischlin, Felix Günther, Philip A. Muth","doi":"10.1007/978-3-030-61078-4_17","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_17","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation 基于机器学习的电磁辐射硬件木马检测
Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_1
J. Takahashi, Keiichi Okabe, Hiroki Itoh, X. Ngo, S. Guilley, R. Shrivastwa, M. Ahmed, Patrick Lejoly
{"title":"Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation","authors":"J. Takahashi, Keiichi Okabe, Hiroki Itoh, X. Ngo, S. Guilley, R. Shrivastwa, M. Ahmed, Patrick Lejoly","doi":"10.1007/978-3-030-61078-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_1","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blind Functional Encryption 盲功能加密
Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_11
Sébastien Canard, Adel Hamdi, Fabien Laguillaumie
{"title":"Blind Functional Encryption","authors":"Sébastien Canard, Adel Hamdi, Fabien Laguillaumie","doi":"10.1007/978-3-030-61078-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_11","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Comparisons of Verifiable Delay Functions 可验证延迟函数的实验比较
Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_29
Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang
{"title":"Experimental Comparisons of Verifiable Delay Functions","authors":"Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang","doi":"10.1007/978-3-030-61078-4_29","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_29","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Profile Matching Across Online Social Networks 跨在线社交网络的个人资料匹配
Pub Date : 2020-08-20 DOI: 10.1007/978-3-030-61078-4_4
Anisa Halimi, Erman Ayday
{"title":"Profile Matching Across Online Social Networks","authors":"Anisa Halimi, Erman Ayday","doi":"10.1007/978-3-030-61078-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_4","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Conference on Information, Communications and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1