首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems 基于信息物理系统的复杂网络系统可靠性建模
K. Ravindran
We use the cyber-physical systems (CPS) framework to infuse intelligent adaptation behaviors in complex network systems to achieve dependability. The CPS framework is anchored on "intelligent physical worlds" (IPW) around which complex adaptation behaviors are built. An IPW is an embodiment of control software functions wrapped around the raw physical processes (e.g., servers, links, sensors, actuators), performing the core system activities while adapting its behavior to the changing environment conditions and user inputs. The IPW exhibits an intelligent behavior over a limited operating region of the system (in contrast with traditional models where the physical world is dumb). To perform over wide operating regions, the IPW interacts with an intelligent computational world (ICW) to patch itself with control parameters and procedures relevant in those changed conditions. The modular decomposition of an application into IPW and ICW lowers the design complexity of dependable network systems, and simplifies the system verification/testing.
我们使用网络物理系统(CPS)框架在复杂网络系统中注入智能适应行为以实现可靠性。CPS框架以“智能物理世界”(IPW)为基础,复杂的适应行为围绕着它建立起来。IPW是包裹在原始物理过程(例如,服务器、链路、传感器、执行器)周围的控制软件功能的体现,执行核心系统活动,同时调整其行为以适应不断变化的环境条件和用户输入。IPW在系统的有限操作区域内表现出智能行为(与物理世界是哑的传统模型相反)。为了在更广泛的操作区域内运行,IPW与智能计算世界(ICW)相互作用,用与这些变化条件相关的控制参数和程序来修补自己。将应用模块分解为IPW和ICW,降低了可靠网络系统的设计复杂性,简化了系统验证/测试。
{"title":"Cyber-Physical Systems Based Modeling of Dependability of Complex Network Systems","authors":"K. Ravindran","doi":"10.1109/ARES.2011.90","DOIUrl":"https://doi.org/10.1109/ARES.2011.90","url":null,"abstract":"We use the cyber-physical systems (CPS) framework to infuse intelligent adaptation behaviors in complex network systems to achieve dependability. The CPS framework is anchored on \"intelligent physical worlds\" (IPW) around which complex adaptation behaviors are built. An IPW is an embodiment of control software functions wrapped around the raw physical processes (e.g., servers, links, sensors, actuators), performing the core system activities while adapting its behavior to the changing environment conditions and user inputs. The IPW exhibits an intelligent behavior over a limited operating region of the system (in contrast with traditional models where the physical world is dumb). To perform over wide operating regions, the IPW interacts with an intelligent computational world (ICW) to patch itself with control parameters and procedures relevant in those changed conditions. The modular decomposition of an application into IPW and ICW lowers the design complexity of dependable network systems, and simplifies the system verification/testing.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Trustworthy Usage Control Enforcement Framework 一个可信的使用控制实施框架
Pub Date : 2011-08-22 DOI: 10.4018/jmcmc.2013070103
R. Neisse, A. Pretschner, V. D. Giacomo
Usage control policies specify restrictions on the handling of data after access has been granted. We present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. We show how this framework can, among other things, be used to enforce separation-of-duty policies. We provide a performance analysis.
使用控制策略指定在授予访问权限后对数据处理的限制。我们展示了一个框架的设计和实现,用于执行使用控制需求,并通过将其实例化到两个不同的抽象级别(操作系统和企业服务总线的抽象级别)来演示其通用性。该框架由策略语言、策略到执行机制的自动转换以及基于可信计算技术实现的技术组成,可信计算技术使检测基础设施的篡改成为可能。我们将展示如何使用这个框架来执行职责分离策略。我们提供性能分析。
{"title":"A Trustworthy Usage Control Enforcement Framework","authors":"R. Neisse, A. Pretschner, V. D. Giacomo","doi":"10.4018/jmcmc.2013070103","DOIUrl":"https://doi.org/10.4018/jmcmc.2013070103","url":null,"abstract":"Usage control policies specify restrictions on the handling of data after access has been granted. We present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. We show how this framework can, among other things, be used to enforce separation-of-duty policies. We provide a performance analysis.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117076406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies 利用真假组织制服预防社会工程攻击的研究:无线电和体内通信技术的应用
M. Fujikawa, M. Nishigaki
Social engineering attack using real/fake organization's uniform is frequent everywhere in the world. If anyone can verify the uniformed person in front of him/her quickly, they can escape the damage from above fraud. So in this paper, we studied and proposed the uniformed person verification system. First, we developed the uniform-wearing detection system using IBC technology as a basis of our target system. Second, we made a prototype system which can notify verifier (genuine officer/employee) whether uniformed person in front of him/her is genuine officer/employee or not. High practicality, reliability, and safety of the prototype system were demonstrated by experimenting with actual uniform.
利用真假组织的制服进行社会工程攻击在世界各地都很常见。如果任何人都能迅速核实他/她面前的穿制服的人,他们可以避免上述欺诈的损害。因此,本文研究并提出了统一人员验证系统。首先,我们开发了基于IBC技术的制服检测系统作为目标系统的基础。其次,我们做了一个原型系统,可以通知验证者(真正的官员/员工)他/她面前穿制服的人是否是真正的官员/员工。通过对实际制服的试验,验证了原型系统具有较高的实用性、可靠性和安全性。
{"title":"A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies","authors":"M. Fujikawa, M. Nishigaki","doi":"10.1109/ARES.2011.123","DOIUrl":"https://doi.org/10.1109/ARES.2011.123","url":null,"abstract":"Social engineering attack using real/fake organization's uniform is frequent everywhere in the world. If anyone can verify the uniformed person in front of him/her quickly, they can escape the damage from above fraud. So in this paper, we studied and proposed the uniformed person verification system. First, we developed the uniform-wearing detection system using IBC technology as a basis of our target system. Second, we made a prototype system which can notify verifier (genuine officer/employee) whether uniformed person in front of him/her is genuine officer/employee or not. High practicality, reliability, and safety of the prototype system were demonstrated by experimenting with actual uniform.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy 投票系统中的公告板:隐私建模和测量
H. Jonker, Jun Pang
Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by making information (e.g. election result) public. In e-voting literature, this publication is often described in terms of a bulletin board. While privacy of voting systems has been actively studied in recent years, resulting in various analysis frameworks, to date there has not been an explicit modelling of bulletin board in any such framework. Privacy implications of bulletin boards are thus understudied. In this paper, we extend the semantics of the framework of Jonker, Mauw and Pang to model a bulletin board and capture coercion-resistance. The usage of the extended framework is illustrated by an application to the Pret a Voter voting system. Moreover, we present an information-theoretical measure of privacy loss in elections.
透明度对于确保公平、诚实的选举至关重要。透明度是通过公开信息(例如选举结果)来实现的。在电子投票文献中,这种出版物通常被描述为公告板。虽然近年来对投票系统的隐私进行了积极研究,产生了各种分析框架,但迄今为止,在任何此类框架中都没有明确的公告板建模。因此,电子公告板对隐私的影响尚未得到充分研究。在本文中,我们扩展了Jonker, Mauw和Pang框架的语义来模拟公告板并捕获矫顽性。通过Pret a Voter投票系统的一个应用程序说明了扩展框架的使用。此外,我们提出了选举中隐私损失的信息理论测量。
{"title":"Bulletin Boards in Voting Systems: Modelling and Measuring Privacy","authors":"H. Jonker, Jun Pang","doi":"10.1109/ARES.2011.50","DOIUrl":"https://doi.org/10.1109/ARES.2011.50","url":null,"abstract":"Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by making information (e.g. election result) public. In e-voting literature, this publication is often described in terms of a bulletin board. While privacy of voting systems has been actively studied in recent years, resulting in various analysis frameworks, to date there has not been an explicit modelling of bulletin board in any such framework. Privacy implications of bulletin boards are thus understudied. In this paper, we extend the semantics of the framework of Jonker, Mauw and Pang to model a bulletin board and capture coercion-resistance. The usage of the extended framework is illustrated by an application to the Pret a Voter voting system. Moreover, we present an information-theoretical measure of privacy loss in elections.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130578883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence 数字取证信息:数字证据可视化过程的实现
G. Osborne, J. Slay
Infovis enables us to combine the language of the eyes with the language of the mind, empowering all manner of people to be data detectives. Formalised processes for the integration of infovis techniques within the digital forensics domain are few and far between. One such process, the Explore, Investigate and Correlate process has been developed and provides a series of phases and key principles on which to build systems that integrate infovis techniques within the digital forensics investigative workflow. This paper presents refinements to this process and a proof-of-concept implementation. How the implementation achieves the goals of the process, the techniques it uses and how it helps to reduce information overload within the digital forensics domain are examined.
Infovis使我们能够将眼睛的语言与心灵的语言结合起来,使各种各样的人都能成为数据侦探。将信息取证技术集成到数字取证领域的形式化流程少之又少。一个这样的过程,探索、调查和关联过程已经被开发出来,它提供了一系列的阶段和关键原则,在这些阶段和关键原则的基础上,构建了在数字取证调查工作流程中集成信息技术的系统。本文提出了对该过程的改进和概念验证实现。研究了实现如何实现流程的目标、它使用的技术以及它如何帮助减少数字取证领域中的信息过载。
{"title":"Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence","authors":"G. Osborne, J. Slay","doi":"10.1109/ARES.2011.36","DOIUrl":"https://doi.org/10.1109/ARES.2011.36","url":null,"abstract":"Infovis enables us to combine the language of the eyes with the language of the mind, empowering all manner of people to be data detectives. Formalised processes for the integration of infovis techniques within the digital forensics domain are few and far between. One such process, the Explore, Investigate and Correlate process has been developed and provides a series of phases and key principles on which to build systems that integrate infovis techniques within the digital forensics investigative workflow. This paper presents refinements to this process and a proof-of-concept implementation. How the implementation achieves the goals of the process, the techniques it uses and how it helps to reduce information overload within the digital forensics domain are examined.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study of Countermeasures for Content Leaks by Video Recording 视频内容泄露对策研究
M. Fujikawa, Junki Akimoto, F. Oda, K. Moriyasu, S. Fuchi, Y. Takeda
The authors have been engaged in the study of countermeasures to prevent the leak of onscreen movies using a digital video camera. One of the studies is the development of a transparent sheet that emits infrared (IR) light, which is applied to the screen and generates optical noise in the onscreen photographic images when recorded. Another study is the development of a method to detect the presence of the IR-cut filter near the display, which compromises the function of the IR emitting sheet as a countermeasure to prevent video recording using the IR-cut filter. This report is prepared as an advance report because it was confirmed that the feasibility of such countermeasures is enhanced.
作者们一直在研究利用数码摄像机防止电影外泄的对策。其中一项研究是开发一种能发射红外线(IR)的透明薄片,这种薄片被应用到屏幕上,并在记录屏幕上的摄影图像时产生光学噪声。另一项研究是开发一种方法来检测显示器附近IR-cut滤波器的存在,这损害了IR发射片的功能,作为防止使用IR-cut滤波器录制视频的对策。本报告是作为事前报告编写的,因为确认了这种对策的可行性得到了加强。
{"title":"Study of Countermeasures for Content Leaks by Video Recording","authors":"M. Fujikawa, Junki Akimoto, F. Oda, K. Moriyasu, S. Fuchi, Y. Takeda","doi":"10.1109/ARES.2011.126","DOIUrl":"https://doi.org/10.1109/ARES.2011.126","url":null,"abstract":"The authors have been engaged in the study of countermeasures to prevent the leak of onscreen movies using a digital video camera. One of the studies is the development of a transparent sheet that emits infrared (IR) light, which is applied to the screen and generates optical noise in the onscreen photographic images when recorded. Another study is the development of a method to detect the presence of the IR-cut filter near the display, which compromises the function of the IR emitting sheet as a countermeasure to prevent video recording using the IR-cut filter. This report is prepared as an advance report because it was confirmed that the feasibility of such countermeasures is enhanced.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Attribute Based Framework for Risk-Adaptive Access Control Models 基于属性的风险自适应访问控制模型框架
Savith Kandala, R. Sandhu, Venkata Bhamidipati
The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) adjust security risk for providing access to resources accounting for operational needs, risk factors and situational factors. In order to make progress in this arena we need abstract models analogous to those that underlie the sustained and successful practice of discretionary, mandatory and role-based access control. Such models define a formal structure and components for policy specifications, while allowing for a variety of enforcement architectures and detailed implementation. In this paper we develop a novel approach to capture these characteristics of RAdAC using attribute-based access control. We further show that this RAdAC model can be expressed in the UCON usage control model with suitable extensions, and discuss how other UCON elements not used in this construction could beneficially improve the RAdAC vision.
基于风险的自适应访问控制(RAdAC,发音为Raid-ack)的概念最近在文献中被引入。它寻求自动(或半自动)调整安全风险,以便根据操作需求、风险因素和情景因素提供对资源的访问。为了在这一领域取得进展,我们需要抽象的模型,类似于那些支持自由裁量、强制和基于角色的访问控制的持续和成功实践的模型。这样的模型定义了策略规范的正式结构和组件,同时允许各种强制体系结构和详细实现。在本文中,我们开发了一种使用基于属性的访问控制来捕获RAdAC的这些特征的新方法。我们进一步证明了该RAdAC模型可以通过适当的扩展在UCON使用控制模型中表达,并讨论了在该结构中未使用的其他UCON元素如何有益地改善RAdAC愿景。
{"title":"An Attribute Based Framework for Risk-Adaptive Access Control Models","authors":"Savith Kandala, R. Sandhu, Venkata Bhamidipati","doi":"10.1109/ARES.2011.41","DOIUrl":"https://doi.org/10.1109/ARES.2011.41","url":null,"abstract":"The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) adjust security risk for providing access to resources accounting for operational needs, risk factors and situational factors. In order to make progress in this arena we need abstract models analogous to those that underlie the sustained and successful practice of discretionary, mandatory and role-based access control. Such models define a formal structure and components for policy specifications, while allowing for a variety of enforcement architectures and detailed implementation. In this paper we develop a novel approach to capture these characteristics of RAdAC using attribute-based access control. We further show that this RAdAC model can be expressed in the UCON usage control model with suitable extensions, and discuss how other UCON elements not used in this construction could beneficially improve the RAdAC vision.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
A Complexity Based Forensic Analysis of the Trojan Horse Defence 基于复杂性的特洛伊木马防御取证分析
R. Overill, Jantje A. M. Silomon
The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.
操作复杂性模型(OCM)已被用于得出东南亚发生的五种最普遍的网络犯罪的复杂性,即点对点(P2P)多媒体盗版,在线拍卖欺诈,在线存储攻击性材料,盗窃在线游戏武器和分布式拒绝服务(DDoS)攻击。在每种情况下,最简单的特洛伊木马过程的复杂性可能被调用作为恢复的数字证据的另一种解释,也使用OCM确定,结果用于评估在每种情况下两种相互竞争的解释的相对合理性。最后,概述了在法医鉴定的情况下,特洛伊木马防御最有可能成功。
{"title":"A Complexity Based Forensic Analysis of the Trojan Horse Defence","authors":"R. Overill, Jantje A. M. Silomon","doi":"10.1109/ARES.2011.120","DOIUrl":"https://doi.org/10.1109/ARES.2011.120","url":null,"abstract":"The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"43 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Here's Johnny: A Methodology for Developing Attacker Personas 这是Johnny:开发攻击者角色的方法论
Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, J. Lyle, I. Flechais
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona development to build personas for possible attackers, such work is only speculative and fails to build upon recent research. This paper presents an approach for developing Attacker Personas which is both grounded and validated by structured data about attackers. We describe a case study example where the personas were developed and used to support the development of a Context of Use description for the EU FP7 webinos project.
对抗性元素是安全系统设计的内在组成部分,但我们对攻击者和威胁的假设往往是有限的或刻板的。虽然之前有研究将以用户为中心的设计应用到角色开发中,为可能的攻击者构建角色,但这样的工作只是推测性的,没有建立在最近的研究基础上。本文提出了一种开发攻击者角色的方法,该方法以攻击者的结构化数据为基础并进行验证。我们描述了一个案例研究示例,其中角色被开发并用于支持EU FP7 webinos项目的使用上下文描述的开发。
{"title":"Here's Johnny: A Methodology for Developing Attacker Personas","authors":"Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, J. Lyle, I. Flechais","doi":"10.1109/ARES.2011.115","DOIUrl":"https://doi.org/10.1109/ARES.2011.115","url":null,"abstract":"The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona development to build personas for possible attackers, such work is only speculative and fails to build upon recent research. This paper presents an approach for developing Attacker Personas which is both grounded and validated by structured data about attackers. We describe a case study example where the personas were developed and used to support the development of a Context of Use description for the EU FP7 webinos project.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Discussion of Visualization Techniques for the Analysis of Digital Evidence 数字证据分析的可视化技术探讨
Gerald Schrenk, R. Poisel
Digital crimes are increasing, so is the need for improvements in digital forensics. With the growth of storage capacity these digital forensic investigations are getting more difficult. Visualization allows for displaying big amounts of data at once, so a foresic investigator is able to maintain an overlook about the whole case. Through zooming it is possible to analyze interesting parts of evidence without losing the general view. This paper gives an overview of data classification, data sources and a classification of available techniques. Different state of the art tools for visualization of frequency, timelines, e-mails and logging data are discussed. Further details on how these tools support the digital forensics progress through visualization are given. Finally a comparison between conventional approaches and visualization techniques is presented. The benefit for the reader is to get a quick overview of the state-of-the-art of visualization techniques for processing digital evidence.
数字犯罪正在增加,因此需要改进数字取证。随着存储容量的增长,这些数字法医调查变得越来越困难。可视化允许一次显示大量数据,因此法医调查员能够对整个案件保持一个俯瞰。通过放大,可以在不失去总体观点的情况下分析证据中有趣的部分。本文概述了数据分类、数据源和可用技术的分类。讨论了用于频率、时间线、电子邮件和日志数据可视化的不同工具。进一步详细介绍了这些工具如何通过可视化支持数字取证的进展。最后对传统方法和可视化技术进行了比较。对读者的好处是得到的最新的可视化技术处理数字证据的快速概述。
{"title":"A Discussion of Visualization Techniques for the Analysis of Digital Evidence","authors":"Gerald Schrenk, R. Poisel","doi":"10.1109/ARES.2011.119","DOIUrl":"https://doi.org/10.1109/ARES.2011.119","url":null,"abstract":"Digital crimes are increasing, so is the need for improvements in digital forensics. With the growth of storage capacity these digital forensic investigations are getting more difficult. Visualization allows for displaying big amounts of data at once, so a foresic investigator is able to maintain an overlook about the whole case. Through zooming it is possible to analyze interesting parts of evidence without losing the general view. This paper gives an overview of data classification, data sources and a classification of available techniques. Different state of the art tools for visualization of frequency, timelines, e-mails and logging data are discussed. Further details on how these tools support the digital forensics progress through visualization are given. Finally a comparison between conventional approaches and visualization techniques is presented. The benefit for the reader is to get a quick overview of the state-of-the-art of visualization techniques for processing digital evidence.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1