首页 > 最新文献

Security and Privacy in Communication Networks最新文献

英文 中文
MetaPriv: Acting in Favor of Privacy on Social Media Platforms MetaPriv:支持社交媒体平台上的隐私
Pub Date : 2022-09-08 DOI: 10.48550/arXiv.2209.03679
Robert Cantaragiu, A. Michalas, E. Frimpong, Alexandros Bakas
Social networks such as Facebook (FB) and Instagram are known for tracking user online behaviour for commercial gain. To this day, there is practically no other way of achieving privacy in said platforms other than renouncing their use. However, many users are reluctant in doing so because of convenience or social and professional reasons. In this work, we propose a means of balancing convenience and privacy on FB through obfuscation. We have created MetaPriv, a tool based on simulating user interaction with FB. MetaPriv allows users to add noise interactions to their account so as to lead FB's profiling algorithms astray, and make them draw inaccurate profiles in relation to their interests and habits. To prove our tool's effectiveness, we ran extensive experiments on a dummy account and two existing user accounts. Our results showed that, by using our tool, users can achieve a higher degree of privacy in just a couple of weeks. We believe that MetaPriv can be further developed to accommodate other social media platforms and help users regain their privacy, while maintaining a reasonable level of convenience. To support open science and reproducible research, our source code is publicly available online.
Facebook和Instagram等社交网络以追踪用户在线行为以获取商业利益而闻名。直到今天,在上述平台上,除了放弃使用它们之外,几乎没有其他方法可以实现隐私。然而,由于方便或社交和职业原因,许多用户不愿意这样做。在这项工作中,我们提出了一种通过混淆来平衡FB的便利性和隐私性的方法。我们已经创建了MetaPriv,一个基于模拟用户与FB交互的工具。MetaPriv允许用户在自己的账户中添加噪音互动,从而使facebook的分析算法误入歧途,并使他们根据自己的兴趣和习惯绘制不准确的个人资料。为了证明我们的工具的有效性,我们在一个虚拟帐户和两个现有用户帐户上进行了大量的实验。我们的研究结果表明,通过使用我们的工具,用户可以在短短几周内获得更高程度的隐私。我们相信MetaPriv可以进一步发展,以适应其他社交媒体平台,帮助用户重新获得隐私,同时保持合理的便利性。为了支持开放科学和可重复的研究,我们的源代码在网上公开提供。
{"title":"MetaPriv: Acting in Favor of Privacy on Social Media Platforms","authors":"Robert Cantaragiu, A. Michalas, E. Frimpong, Alexandros Bakas","doi":"10.48550/arXiv.2209.03679","DOIUrl":"https://doi.org/10.48550/arXiv.2209.03679","url":null,"abstract":"Social networks such as Facebook (FB) and Instagram are known for tracking user online behaviour for commercial gain. To this day, there is practically no other way of achieving privacy in said platforms other than renouncing their use. However, many users are reluctant in doing so because of convenience or social and professional reasons. In this work, we propose a means of balancing convenience and privacy on FB through obfuscation. We have created MetaPriv, a tool based on simulating user interaction with FB. MetaPriv allows users to add noise interactions to their account so as to lead FB's profiling algorithms astray, and make them draw inaccurate profiles in relation to their interests and habits. To prove our tool's effectiveness, we ran extensive experiments on a dummy account and two existing user accounts. Our results showed that, by using our tool, users can achieve a higher degree of privacy in just a couple of weeks. We believe that MetaPriv can be further developed to accommodate other social media platforms and help users regain their privacy, while maintaining a reasonable level of convenience. To support open science and reproducible research, our source code is publicly available online.","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison 跨架构二值相似度比较的多关系指令关联图
Pub Date : 2022-06-24 DOI: 10.48550/arXiv.2206.12236
Qi Song, Yongzheng Zhang, Shuhao Li
Cross-architecture binary similarity comparison is essential in many security applications. Recently, researchers have proposed learning-based approaches to improve comparison performance. They adopted a paradigm of instruction pre-training, individual binary encoding, and distance-based similarity comparison. However, instruction embeddings pre-trained on external code corpus are not universal in diverse real-world applications. And separately encoding cross-architecture binaries will accumulate the semantic gap of instruction sets, limiting the comparison accuracy. This paper proposes a novel cross-architecture binary similarity comparison approach with multi-relational instruction association graph. We associate mono-architecture instruction tokens with context relevance and cross-architecture tokens with potential semantic correlations from different perspectives. Then we exploit the relational graph convolutional network (R-GCN) to perform type-specific graph information propagation. Our approach can bridge the gap in the cross-architecture instruction representation spaces while avoiding the external pre-training workload. We conduct extensive experiments on basic block-level and function-level datasets to prove the superiority of our approach. Furthermore, evaluations on a large-scale real-world IoT malware reuse function collection show that our approach is valuable for identifying malware propagated on IoT devices of various architectures.
跨体系结构二元相似性比较在许多安全应用程序中是必不可少的。最近,研究人员提出了基于学习的方法来提高比较表现。他们采用了指令预训练、个体二进制编码和基于距离的相似性比较的范式。然而,在外部代码语料库上预先训练的指令嵌入在各种实际应用中并不普遍。而单独编码跨体系结构的二进制文件会累积指令集的语义差距,限制了比较的准确性。提出了一种新的基于多关系指令关联图的跨体系结构二值相似度比较方法。我们从不同的角度将单架构指令令牌与上下文相关性和跨架构令牌与潜在的语义相关性联系起来。然后利用关系图卷积网络(R-GCN)进行特定类型的图信息传播。我们的方法可以弥合跨架构指令表示空间的差距,同时避免外部预训练工作量。我们在基本的块级和函数级数据集上进行了大量的实验来证明我们方法的优越性。此外,对大规模现实世界物联网恶意软件重用功能集的评估表明,我们的方法对于识别在各种架构的物联网设备上传播的恶意软件是有价值的。
{"title":"Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison","authors":"Qi Song, Yongzheng Zhang, Shuhao Li","doi":"10.48550/arXiv.2206.12236","DOIUrl":"https://doi.org/10.48550/arXiv.2206.12236","url":null,"abstract":"Cross-architecture binary similarity comparison is essential in many security applications. Recently, researchers have proposed learning-based approaches to improve comparison performance. They adopted a paradigm of instruction pre-training, individual binary encoding, and distance-based similarity comparison. However, instruction embeddings pre-trained on external code corpus are not universal in diverse real-world applications. And separately encoding cross-architecture binaries will accumulate the semantic gap of instruction sets, limiting the comparison accuracy. This paper proposes a novel cross-architecture binary similarity comparison approach with multi-relational instruction association graph. We associate mono-architecture instruction tokens with context relevance and cross-architecture tokens with potential semantic correlations from different perspectives. Then we exploit the relational graph convolutional network (R-GCN) to perform type-specific graph information propagation. Our approach can bridge the gap in the cross-architecture instruction representation spaces while avoiding the external pre-training workload. We conduct extensive experiments on basic block-level and function-level datasets to prove the superiority of our approach. Furthermore, evaluations on a large-scale real-world IoT malware reuse function collection show that our approach is valuable for identifying malware propagated on IoT devices of various architectures.","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116850935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureBERT: A Domain-Specific Language Model for Cybersecurity SecureBERT:网络安全领域特定语言模型
Pub Date : 2022-04-06 DOI: 10.1007/978-3-031-25538-0_3
Ehsan Aghaei, Xi Niu, W. Shadid, E. Al-Shaer
{"title":"SecureBERT: A Domain-Specific Language Model for Cybersecurity","authors":"Ehsan Aghaei, Xi Niu, W. Shadid, E. Al-Shaer","doi":"10.1007/978-3-031-25538-0_3","DOIUrl":"https://doi.org/10.1007/978-3-031-25538-0_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
System-Wide Security for Offline Payment Terminals 离线支付终端的全系统安全性
Pub Date : 2021-07-18 DOI: 10.1007/978-3-030-90022-9_6
Nikolay Ivanov, Qiben Yan
{"title":"System-Wide Security for Offline Payment Terminals","authors":"Nikolay Ivanov, Qiben Yan","doi":"10.1007/978-3-030-90022-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-90022-9_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels 比特币猎人:通过加密通道检测比特币流量
Pub Date : 2020-10-21 DOI: 10.1007/978-3-030-63086-7_10
F. Rezaei, Shahrzad Naseri, Ittay Eyal, A. Houmansadr
{"title":"The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels","authors":"F. Rezaei, Shahrzad Naseri, Ittay Eyal, A. Houmansadr","doi":"10.1007/978-3-030-63086-7_10","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_10","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Jamming Game in Wireless Networks Under Uncertainty 不确定条件下无线网络的协同干扰对策
Pub Date : 2020-10-21 DOI: 10.1007/978-3-030-63086-7_14
Zhifan Xu, M. Baykal-Gursoy
{"title":"A Cooperative Jamming Game in Wireless Networks Under Uncertainty","authors":"Zhifan Xu, M. Baykal-Gursoy","doi":"10.1007/978-3-030-63086-7_14","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_14","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ThreatZoom: CVE2CWE using Hierarchical Neural Network ThreatZoom: CVE2CWE使用分层神经网络
Pub Date : 2020-09-24 DOI: 10.1007/978-3-030-63086-7_2
Ehsan Aghaei, W. Shadid, E. Al-Shaer
{"title":"ThreatZoom: CVE2CWE using Hierarchical Neural Network","authors":"Ehsan Aghaei, W. Shadid, E. Al-Shaer","doi":"10.1007/978-3-030-63086-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Best-Effort Adversarial Approximation of Black-Box Malware Classifiers 黑盒恶意软件分类器的最佳努力对抗逼近
Pub Date : 2020-06-28 DOI: 10.1007/978-3-030-63086-7_18
A. Ali, Birhanu Eshete
{"title":"Best-Effort Adversarial Approximation of Black-Box Malware Classifiers","authors":"A. Ali, Birhanu Eshete","doi":"10.1007/978-3-030-63086-7_18","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"15 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies 基于属性的访问控制策略最优挖掘的自然启发框架
Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_29
M. Narouei, Hassan Takabi
{"title":"A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies","authors":"M. Narouei, Hassan Takabi","doi":"10.1007/978-3-030-37231-6_29","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_29","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain 基于区块链的增强可验证域间路由协议
Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_4
Yaping Liu, Shuo Zhang, Haojin Zhu, P. Wan, Lixin Gao, Yaoxue Zhang
{"title":"An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain","authors":"Yaping Liu, Shuo Zhang, Haojin Zhu, P. Wan, Lixin Gao, Yaoxue Zhang","doi":"10.1007/978-3-030-37228-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Security and Privacy in Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1