首页 > 最新文献

2018 16th Annual Conference on Privacy, Security and Trust (PST)最新文献

英文 中文
Approximating Robust Linear Regression With An Integral Privacy Guarantee 具有积分隐私保证的近似鲁棒线性回归
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514161
Navoda Senavirathne, V. Torra
Most of the privacy-preserving techniques suffer from an inevitable utility loss due to different perturbations carried out on the input data or the models in order to gain privacy. When it comes to machine learning (ML) based prediction models, accuracy is the key criterion for model selection. Thus, an accuracy loss due to privacy implementations is undesirable.The motivation of this work, is to implement the privacy model “integral privacy” and to evaluate its eligibility as a technique for machine learning model selection while preserving model utility. In this paper, a linear regression approximation method is implemented based on integral privacy which ensures high accuracy and robustness while maintaining a degree of privacy for ML models. The proposed method uses a re-sampling based estimator to construct linear regression model which is coupled with a rounding based data discretization method to support integral privacy principles. The implementation is evaluated in comparison with differential privacy in terms of privacy, accuracy and robustness of the output ML models. In comparison, integral privacy based solution provides a better solution with respect to the above criteria.
大多数隐私保护技术由于对输入数据或模型进行不同的扰动而不可避免地遭受效用损失,以获得隐私。当涉及到基于机器学习(ML)的预测模型时,准确性是模型选择的关键标准。因此,由于隐私实现而造成的准确性损失是不可取的。这项工作的动机是实现隐私模型“整体隐私”,并评估其作为机器学习模型选择技术的资格,同时保持模型的实用性。本文提出了一种基于积分隐私的线性回归逼近方法,在保证机器学习模型的高准确性和鲁棒性的同时,保持了一定程度的隐私。该方法使用基于重采样的估计量构建线性回归模型,并结合基于舍入的数据离散方法来支持积分隐私原则。该实现在输出ML模型的隐私性、准确性和鲁棒性方面与差分隐私进行了比较评估。相比之下,基于积分隐私的解决方案在上述条件下提供了更好的解决方案。
{"title":"Approximating Robust Linear Regression With An Integral Privacy Guarantee","authors":"Navoda Senavirathne, V. Torra","doi":"10.1109/PST.2018.8514161","DOIUrl":"https://doi.org/10.1109/PST.2018.8514161","url":null,"abstract":"Most of the privacy-preserving techniques suffer from an inevitable utility loss due to different perturbations carried out on the input data or the models in order to gain privacy. When it comes to machine learning (ML) based prediction models, accuracy is the key criterion for model selection. Thus, an accuracy loss due to privacy implementations is undesirable.The motivation of this work, is to implement the privacy model “integral privacy” and to evaluate its eligibility as a technique for machine learning model selection while preserving model utility. In this paper, a linear regression approximation method is implemented based on integral privacy which ensures high accuracy and robustness while maintaining a degree of privacy for ML models. The proposed method uses a re-sampling based estimator to construct linear regression model which is coupled with a rounding based data discretization method to support integral privacy principles. The implementation is evaluated in comparison with differential privacy in terms of privacy, accuracy and robustness of the output ML models. In comparison, integral privacy based solution provides a better solution with respect to the above criteria.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enforcing Privacy and Security in Public Cloud Storage 加强公共云存储的隐私和安全
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514195
João S. Resende, Rolando Martins, L. Antunes
Cloud storage allows users to remotely store their data, giving access anywhere and to anyone with an Internet connection. The accessibility, lack of local data maintenance and absence of local storage hardware are the main advantages of this type of storage. The adoption of this type of storage is being driven by its accessibility. However, one of the main barriers to its widespread adoption is the sovereignty issues originated by lack of trust in storing private and sensitive information in such a medium. Recent attacks to cloud-based storage show that current solutions do not provide adequate levels of security and subsequently fail to protect users' privacy. Usually, users rely solely on the security supplied by the storage providers, which in the presence of a security breach will ultimate lead to data leakage. In this paper, we propose and implement a broker (ARGUS) that acts as a proxy to the existing public cloud infrastructures by performing all the necessary authentication, cryptography and erasure coding. ARGUS uses erasure code as a way to provide efficient redundancy (opposite to standard replication) while adding an extra layer to data protection in which data is broken into fragments, expanded and encoded with redundant data pieces that are stored across a set of different storage providers (public or private). The key characteristics of ARGUS are confidentiality, integrity and availability of data stored in public cloud systems.
云存储允许用户远程存储他们的数据,让任何有互联网连接的人都可以访问任何地方。可访问性、缺少本地数据维护和缺少本地存储硬件是这种类型存储的主要优点。这种类型存储的采用是由其可访问性驱动的。然而,其广泛采用的主要障碍之一是主权问题,这是由于在这种媒介中存储私人和敏感信息缺乏信任而引起的。最近针对云存储的攻击表明,当前的解决方案没有提供足够的安全级别,因此无法保护用户的隐私。通常,用户完全依赖存储提供商提供的安全性,在存在安全漏洞的情况下,这将最终导致数据泄露。在本文中,我们提出并实现了一个代理(ARGUS),它通过执行所有必要的身份验证、加密和擦除编码,充当现有公共云基础设施的代理。ARGUS使用erasure code作为一种提供高效冗余(与标准复制相反)的方式,同时为数据保护添加了额外的层,其中数据被分解成片段,扩展和编码冗余数据片段,存储在一组不同的存储提供商(公共或私有)中。ARGUS的关键特征是存储在公共云系统中的数据的保密性、完整性和可用性。
{"title":"Enforcing Privacy and Security in Public Cloud Storage","authors":"João S. Resende, Rolando Martins, L. Antunes","doi":"10.1109/PST.2018.8514195","DOIUrl":"https://doi.org/10.1109/PST.2018.8514195","url":null,"abstract":"Cloud storage allows users to remotely store their data, giving access anywhere and to anyone with an Internet connection. The accessibility, lack of local data maintenance and absence of local storage hardware are the main advantages of this type of storage. The adoption of this type of storage is being driven by its accessibility. However, one of the main barriers to its widespread adoption is the sovereignty issues originated by lack of trust in storing private and sensitive information in such a medium. Recent attacks to cloud-based storage show that current solutions do not provide adequate levels of security and subsequently fail to protect users' privacy. Usually, users rely solely on the security supplied by the storage providers, which in the presence of a security breach will ultimate lead to data leakage. In this paper, we propose and implement a broker (ARGUS) that acts as a proxy to the existing public cloud infrastructures by performing all the necessary authentication, cryptography and erasure coding. ARGUS uses erasure code as a way to provide efficient redundancy (opposite to standard replication) while adding an extra layer to data protection in which data is broken into fragments, expanded and encoded with redundant data pieces that are stored across a set of different storage providers (public or private). The key characteristics of ARGUS are confidentiality, integrity and availability of data stored in public cloud systems.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134516005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition 综述生物特征特征与静脉模式识别的关系
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514156
Soheil Varastehpour, H. Sharifzadeh, Iman Tabatabaei Ardekani, A. Sarrafzadeh
Authentication methods based on some human traits, including fingerprint, face, iris, and palmprint, have been developed significantly, and currently, they are mature enough which have been reliably considered for person identification purposes. Recently, as a new research area, few methods based on non-facial skin features such as vein patterns have been developed. This extended abstract briefly explores some key features of biometric traits whereas vein pattern recognition is also outlined.
基于指纹、人脸、虹膜和掌纹等人类特征的身份认证方法已经取得了长足的发展,目前已经足够成熟,可以可靠地用于人的身份识别。近年来,基于非面部皮肤特征(如静脉模式)的方法作为一个新的研究领域得到了较少的发展。这一扩展摘要简要探讨了生物特征的一些关键特征,同时也概述了静脉模式识别。
{"title":"Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition","authors":"Soheil Varastehpour, H. Sharifzadeh, Iman Tabatabaei Ardekani, A. Sarrafzadeh","doi":"10.1109/PST.2018.8514156","DOIUrl":"https://doi.org/10.1109/PST.2018.8514156","url":null,"abstract":"Authentication methods based on some human traits, including fingerprint, face, iris, and palmprint, have been developed significantly, and currently, they are mature enough which have been reliably considered for person identification purposes. Recently, as a new research area, few methods based on non-facial skin features such as vein patterns have been developed. This extended abstract briefly explores some key features of biometric traits whereas vein pattern recognition is also outlined.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125893880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mitigating Client Subnet Leakage in DNS Queries 缓解DNS查询客户端子网泄漏
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514164
Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang
Many authoritative servers today return different responses based on the perceived geographical location of the resolvers' IP addresses, to bring the content as close to the users as possible. RFC7871 proposes an EDNS Client Subnet (ECS) extension to carry part of the client's IP address in the DNS packets for authoritative server. Compared with the resolver's IP address in the DNS packets, ECS can help the authoritative server to guess the user's geographical location more precisely. However, ECS raises some privacy concerns since it leaks client's subnet information on the resolution path to the authoritative server. In order to find a right balance between privacy improvement and end-user experience optimization, in this paper we introduce an EDNS ISP Location (EIL) extension to address the client subnet leakage problem of ECS. Note that EIL can reduce the dependence on high quality IP geolocation database, while this is crucial to ensure DNS response's accuracy in ECS.
如今,许多权威服务器根据解析器IP地址的感知地理位置返回不同的响应,以使内容尽可能接近用户。RFC7871提出了一个EDNS客户端子网(ECS)扩展,用于在授权服务器的DNS报文中携带部分客户端IP地址。与DNS报文中的解析器IP地址相比,ECS可以帮助授权服务器更准确地猜测用户的地理位置。但是,由于ECS会将客户端的子网信息泄露到授权服务器的解析路径上,因此引起了一些隐私问题。为了在隐私改善和最终用户体验优化之间找到一个适当的平衡,本文引入了一个EDNS ISP位置(EIL)扩展来解决ECS的客户端子网泄漏问题。请注意,EIL可以减少对高质量IP地理位置数据库的依赖,而这对于确保ECS中DNS响应的准确性至关重要。
{"title":"Mitigating Client Subnet Leakage in DNS Queries","authors":"Lanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang","doi":"10.1109/PST.2018.8514164","DOIUrl":"https://doi.org/10.1109/PST.2018.8514164","url":null,"abstract":"Many authoritative servers today return different responses based on the perceived geographical location of the resolvers' IP addresses, to bring the content as close to the users as possible. RFC7871 proposes an EDNS Client Subnet (ECS) extension to carry part of the client's IP address in the DNS packets for authoritative server. Compared with the resolver's IP address in the DNS packets, ECS can help the authoritative server to guess the user's geographical location more precisely. However, ECS raises some privacy concerns since it leaks client's subnet information on the resolution path to the authoritative server. In order to find a right balance between privacy improvement and end-user experience optimization, in this paper we introduce an EDNS ISP Location (EIL) extension to address the client subnet leakage problem of ECS. Note that EIL can reduce the dependence on high quality IP geolocation database, while this is crucial to ensure DNS response's accuracy in ECS.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Impact of Password Dataset Distribution on Guessing 探索密码数据集分布对猜测的影响
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514194
Hazel Murray, David Malone
Leaks from password datasets are a regular occur-rence. An organization may defend a leak with reassurances that just a small subset of passwords were taken. In this paper we show that the leak of a relatively small number of text-based passwords from an organizations' stored dataset can lead to a further large collection of users being compromised. Taking a sample of passwords from a given dataset of passwords we exploit the knowledge we gain of the distribution to guess other samples from the same dataset. We show theoretically and empirically that the distribution of passwords in the sample follows the same distribution as the passwords in the whole dataset. We propose a function that measures the ability of one distribution to estimate another. Leveraging this we show that a sample of passwords leaked from a given dataset, will compromise the remaining passwords in that dataset better than a sample leaked from another source.
密码数据集泄露是经常发生的事情。组织可能会通过保证只有一小部分密码被盗来保护泄漏。在本文中,我们展示了从组织存储的数据集中泄漏相对少量的基于文本的密码可能导致进一步的大量用户受到损害。从给定的密码数据集中取一个密码样本,我们利用我们获得的分布知识来猜测来自同一数据集的其他样本。我们从理论上和经验上证明,样本中的密码分布遵循与整个数据集中密码分布相同的分布。我们提出了一个函数来衡量一个分布估计另一个分布的能力。利用这一点,我们展示了从给定数据集中泄露的密码样本,将比从其他来源泄露的样本更好地破坏该数据集中剩余的密码。
{"title":"Exploring the Impact of Password Dataset Distribution on Guessing","authors":"Hazel Murray, David Malone","doi":"10.1109/PST.2018.8514194","DOIUrl":"https://doi.org/10.1109/PST.2018.8514194","url":null,"abstract":"Leaks from password datasets are a regular occur-rence. An organization may defend a leak with reassurances that just a small subset of passwords were taken. In this paper we show that the leak of a relatively small number of text-based passwords from an organizations' stored dataset can lead to a further large collection of users being compromised. Taking a sample of passwords from a given dataset of passwords we exploit the knowledge we gain of the distribution to guess other samples from the same dataset. We show theoretically and empirically that the distribution of passwords in the sample follows the same distribution as the passwords in the whole dataset. We propose a function that measures the ability of one distribution to estimate another. Leveraging this we show that a sample of passwords leaked from a given dataset, will compromise the remaining passwords in that dataset better than a sample leaked from another source.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis and Evaluation of Syntactic Privacy Notions and Games 句法隐私概念与博弈分析与评价
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514214
Robin Ankele, A. Simpson
Previous contributions have established a framework of privacy games that supports the representation of syntactic privacy notions such as anonymity, unlinkability, pseudonymity and unobservablility in the form of games. The intention is that, via such abstractions, the understanding of, and relationships between, privacy notions can be clarified. Further, an unambiguous understanding of adversarial actions is given. Yet, without any practical context, the potential benefits of these notions and games may be incomprehensible to system designers and software developers. We utilise these games in a case study based on recommender systems. Consequently, we show that the game-based definitions have the potential to interconnect privacy implications and can be utilised to reason about privacy.
之前的贡献已经建立了一个隐私游戏框架,该框架支持以游戏形式表示语法隐私概念,如匿名性、不可链接性、假名性和不可观察性。其目的是,通过这样的抽象,可以澄清对隐私概念的理解及其之间的关系。此外,给出了对抗性行为的明确理解。然而,如果没有任何实际背景,系统设计师和软件开发人员可能无法理解这些概念和游戏的潜在好处。我们在基于推荐系统的案例研究中使用了这些游戏。因此,我们表明基于游戏的定义具有相互关联隐私含义的潜力,并可用于对隐私进行推理。
{"title":"Analysis and Evaluation of Syntactic Privacy Notions and Games","authors":"Robin Ankele, A. Simpson","doi":"10.1109/PST.2018.8514214","DOIUrl":"https://doi.org/10.1109/PST.2018.8514214","url":null,"abstract":"Previous contributions have established a framework of privacy games that supports the representation of syntactic privacy notions such as anonymity, unlinkability, pseudonymity and unobservablility in the form of games. The intention is that, via such abstractions, the understanding of, and relationships between, privacy notions can be clarified. Further, an unambiguous understanding of adversarial actions is given. Yet, without any practical context, the potential benefits of these notions and games may be incomprehensible to system designers and software developers. We utilise these games in a case study based on recommender systems. Consequently, we show that the game-based definitions have the potential to interconnect privacy implications and can be utilised to reason about privacy.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling Users to Balance Social Benefit and Privacy in Online Social Networks 让用户在在线社交网络中平衡社交利益和隐私
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514202
S. De, Abdessamad Imine
Attributes such as interests, workplace and relationship status in an Online Social Network (OSN) profile introduce a user to other OSN users. They can contribute to building new friendships as well as reviving and enhancing existing ones. However, the personal data revealed by the user himself or by his vicinity, i.e., his OSN friends, can also make him vulnerable to many privacy harms such as identity theft, stalking or sexual predation. So users have to carefully select the privacy settings for their profile attributes by keeping in mind the trade-off between privacy and social benefit. In this paper, we propose a usercentric two-phase approach, based on Integer Programming, to choose the right privacy settings. Our model assists the user to understand which privacy harms he can avoid, after tolerating residual risks, given his desired social benefit requirements and suggests the privacy settings he should adopt to achieve the maximum social benefit. Thus, users’ choices are based on both privacy risks and benefits, a view supported by the EU General Data Protection Regulation (GDPR). We have tested our approach on user profiles with varying vicinities and social benefit requirements.
OSN (Online Social Network)配置文件中的兴趣、工作单位、关系状态等属性,是将一个用户介绍给其他OSN用户的信息。他们可以帮助建立新的友谊,也可以恢复和加强现有的友谊。然而,用户自己或其附近,即他的OSN朋友透露的个人数据也可能使他容易受到身份盗窃、跟踪或性侵犯等许多隐私伤害。因此,用户必须仔细选择他们的个人资料属性的隐私设置,记住隐私和社会利益之间的权衡。在本文中,我们提出了一种基于整数规划的以用户为中心的两阶段方法来选择正确的隐私设置。我们的模型帮助用户理解在容忍剩余风险后,在其期望的社会效益要求下,他可以避免哪些隐私伤害,并建议他应该采用哪些隐私设置来实现最大的社会效益。因此,用户的选择是基于隐私风险和利益,这一观点得到了欧盟通用数据保护条例(GDPR)的支持。我们已经在不同地区和社会福利要求的用户档案上测试了我们的方法。
{"title":"Enabling Users to Balance Social Benefit and Privacy in Online Social Networks","authors":"S. De, Abdessamad Imine","doi":"10.1109/PST.2018.8514202","DOIUrl":"https://doi.org/10.1109/PST.2018.8514202","url":null,"abstract":"Attributes such as interests, workplace and relationship status in an Online Social Network (OSN) profile introduce a user to other OSN users. They can contribute to building new friendships as well as reviving and enhancing existing ones. However, the personal data revealed by the user himself or by his vicinity, i.e., his OSN friends, can also make him vulnerable to many privacy harms such as identity theft, stalking or sexual predation. So users have to carefully select the privacy settings for their profile attributes by keeping in mind the trade-off between privacy and social benefit. In this paper, we propose a usercentric two-phase approach, based on Integer Programming, to choose the right privacy settings. Our model assists the user to understand which privacy harms he can avoid, after tolerating residual risks, given his desired social benefit requirements and suggests the privacy settings he should adopt to achieve the maximum social benefit. Thus, users’ choices are based on both privacy risks and benefits, a view supported by the EU General Data Protection Regulation (GDPR). We have tested our approach on user profiles with varying vicinities and social benefit requirements.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124551140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster: Agent-based (BDI) modeling for automation of penetration testing 海报:用于渗透测试自动化的基于代理(BDI)建模
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514211
Ge Chu, A. Lisitsa
Traditional penetration testing relies on the domain expert knowledge and requires considerable human effort all of which incurs a high cost. In this paper, we propose an automated penetration testing approach based on the belief-desire-intention (BDI) agent model, which is central in the research on agentbased processing in that it deals interactively with dynamic, uncertain and complex environments. Penetration testing actions are defined as a series of BDI plans and the BDI reasoning cycle is used to represent the penetration testing process. The model is extensible and new plans can be added, once they have been elicited from the human experts. We report on the results of testing of proof of concept BDI-based penetration testing tool in the simulated environment.
传统的渗透测试依赖于领域专家的知识,需要大量的人力投入,成本很高。本文提出了一种基于信念-愿望-意图(BDI)智能体模型的自动化渗透测试方法,该模型是基于智能体处理研究的核心,因为它可以交互地处理动态、不确定和复杂的环境。将渗透测试动作定义为一系列BDI计划,并使用BDI推理周期来表示渗透测试过程。该模型是可扩展的,一旦从人类专家那里得到新的计划,就可以添加新的计划。报告了基于bdi的概念验证渗透测试工具在仿真环境下的测试结果。
{"title":"Poster: Agent-based (BDI) modeling for automation of penetration testing","authors":"Ge Chu, A. Lisitsa","doi":"10.1109/PST.2018.8514211","DOIUrl":"https://doi.org/10.1109/PST.2018.8514211","url":null,"abstract":"Traditional penetration testing relies on the domain expert knowledge and requires considerable human effort all of which incurs a high cost. In this paper, we propose an automated penetration testing approach based on the belief-desire-intention (BDI) agent model, which is central in the research on agentbased processing in that it deals interactively with dynamic, uncertain and complex environments. Penetration testing actions are defined as a series of BDI plans and the BDI reasoning cycle is used to represent the penetration testing process. The model is extensible and new plans can be added, once they have been elicited from the human experts. We report on the results of testing of proof of concept BDI-based penetration testing tool in the simulated environment.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy-Preserving Subgraph Checking 保护隐私的子图检查
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514182
S. Wüller, Benjamin Assadsolimani, Ulrike Meyer, S. Wetzel
A subgraph check is a variant of the common subgraph matching-operating on a reference and a test graph- determining whether a test graph is a subgraph of the reference graph. In this paper, we present two novel privacy-preserving subgraph checking protocols. In our first protocol, all subgraph checks are carried out independently of each other. The second protocol allows for a substantial performance improvement over the straight-forward approach of the first protocol by exploiting structural similarities among the test graphs to be checked against the reference graph.
子图检查是普通子图匹配的一种变体——对一个参考图和一个测试图进行操作——确定一个测试图是否是参考图的子图。本文提出了两种新的保隐私子图检测协议。在我们的第一个协议中,所有子图检查都是相互独立地进行的。第二个协议通过利用测试图之间的结构相似性来对照参考图进行检查,从而在第一个协议的直接方法之上实现了实质性的性能改进。
{"title":"Privacy-Preserving Subgraph Checking","authors":"S. Wüller, Benjamin Assadsolimani, Ulrike Meyer, S. Wetzel","doi":"10.1109/PST.2018.8514182","DOIUrl":"https://doi.org/10.1109/PST.2018.8514182","url":null,"abstract":"A subgraph check is a variant of the common subgraph matching-operating on a reference and a test graph- determining whether a test graph is a subgraph of the reference graph. In this paper, we present two novel privacy-preserving subgraph checking protocols. In our first protocol, all subgraph checks are carried out independently of each other. The second protocol allows for a substantial performance improvement over the straight-forward approach of the first protocol by exploiting structural similarities among the test graphs to be checked against the reference graph.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How-to Express Explicit and Auditable Consent 如何表达明确的和可审计的同意
Pub Date : 2018-08-01 DOI: 10.1109/PST.2018.8514204
Ana C. Carvalho, Rolando Martins, L. Antunes
While the importance of consent request in today's society is increasing, specially online as a lawful basis for the processing of personal data, no detailed analysis of current technological solutions is available. In this work, we describe the existing technological solutions to express online consent in a positive fashion, including all the properties that an online solution should hold. We conclude by offering a risk proposal based on the linear combination of the rating of each one of these properties. We observe a low agreement between observers, highlighting that it is not easy to fulfill the requirements of the GDPR and showing that these studies are important when performing a Data Protection Impact Assessment. To overcome the low agreement, we propose the median of the observers' rate.
虽然同意请求在当今社会的重要性日益增加,特别是在网上作为处理个人数据的合法基础,但目前尚无对技术解决方案的详细分析。在这项工作中,我们描述了以积极的方式表达在线同意的现有技术解决方案,包括在线解决方案应具有的所有属性。最后,我们根据这些属性的每一个评级的线性组合提供了一个风险建议。我们观察到观察者之间的一致性很低,强调了满足GDPR的要求并不容易,并表明这些研究在执行数据保护影响评估时很重要。为了克服低一致性,我们提出了观察员率的中位数。
{"title":"How-to Express Explicit and Auditable Consent","authors":"Ana C. Carvalho, Rolando Martins, L. Antunes","doi":"10.1109/PST.2018.8514204","DOIUrl":"https://doi.org/10.1109/PST.2018.8514204","url":null,"abstract":"While the importance of consent request in today's society is increasing, specially online as a lawful basis for the processing of personal data, no detailed analysis of current technological solutions is available. In this work, we describe the existing technological solutions to express online consent in a positive fashion, including all the properties that an online solution should hold. We conclude by offering a risk proposal based on the linear combination of the rating of each one of these properties. We observe a low agreement between observers, highlighting that it is not easy to fulfill the requirements of the GDPR and showing that these studies are important when performing a Data Protection Impact Assessment. To overcome the low agreement, we propose the median of the observers' rate.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 16th Annual Conference on Privacy, Security and Trust (PST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1