首页 > 最新文献

2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)最新文献

英文 中文
Adaptive online/offline RFID scheme for supply chain management systems 供应链管理系统的自适应在线/离线RFID方案
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970598
Zeeshan Bilal, K. Martin
This paper is concerned with RFID tagged objects in a supply chain management system. Such objects are read by multiple readers both in known locations (secure zone with online readers) as well as unknown locations (insecure zone with offline readers). In the secure zone, the primary requirement is to read a large number of tags with high speed. In the insecure zone, the primary requirement is to preserve the privacy of a tagged object. We present an EPCglobal Class-1 Gen-2 Version 1.2.0 standard compliant scheme which allows RFID tags to be authenticated by readers throughout the supply chain lifecycle while meeting the requirements of both the secure and insecure zones.
本文研究的是供应链管理系统中RFID标签物品。这样的对象可以被位于已知位置(在线阅读器的安全区域)和未知位置(离线阅读器的不安全区域)的多个阅读器读取。在安全区域内,主要要求是高速读取大量标签。在不安全区域,主要的需求是保护被标记对象的隐私。我们提出了一个EPCglobal Class-1 Gen-2 Version 1.2.0标准兼容方案,该方案允许RFID标签在整个供应链生命周期中由读取器进行身份验证,同时满足安全和不安全区域的要求。
{"title":"Adaptive online/offline RFID scheme for supply chain management systems","authors":"Zeeshan Bilal, K. Martin","doi":"10.1109/PRISMS.2014.6970598","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970598","url":null,"abstract":"This paper is concerned with RFID tagged objects in a supply chain management system. Such objects are read by multiple readers both in known locations (secure zone with online readers) as well as unknown locations (insecure zone with offline readers). In the secure zone, the primary requirement is to read a large number of tags with high speed. In the insecure zone, the primary requirement is to preserve the privacy of a tagged object. We present an EPCglobal Class-1 Gen-2 Version 1.2.0 standard compliant scheme which allows RFID tags to be authenticated by readers throughout the supply chain lifecycle while meeting the requirements of both the secure and insecure zones.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A keyboard that manages your passwords in Android 在安卓系统中管理密码的键盘
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970592
Faysal Boukayoua, B. Decker, Vincent Naessens
During the recent years, smartphones and tablets have become a fixture of daily life. They are used to run ever more tasks and services. Unfortunately, when it comes to password management, users are confronted with greater security and usability concerns than in the non-mobile world. This work presents a password manager for Android that can accommodate any app. Existing platform mechanisms are leveraged to better protect against malware and device theft, than current solutions. Our approach also provides significant usability improvements. No modifications are required to existing applications or to the mobile platform.
近年来,智能手机和平板电脑已经成为人们日常生活的一部分。它们被用来运行越来越多的任务和服务。不幸的是,当涉及到密码管理时,用户面临着比非移动世界更大的安全性和可用性问题。这项工作为Android提供了一个可以容纳任何应用程序的密码管理器。利用现有的平台机制,比当前的解决方案更好地防止恶意软件和设备盗窃。我们的方法还提供了显著的可用性改进。不需要对现有应用程序或移动平台进行修改。
{"title":"A keyboard that manages your passwords in Android","authors":"Faysal Boukayoua, B. Decker, Vincent Naessens","doi":"10.1109/PRISMS.2014.6970592","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970592","url":null,"abstract":"During the recent years, smartphones and tablets have become a fixture of daily life. They are used to run ever more tasks and services. Unfortunately, when it comes to password management, users are confronted with greater security and usability concerns than in the non-mobile world. This work presents a password manager for Android that can accommodate any app. Existing platform mechanisms are leveraged to better protect against malware and device theft, than current solutions. Our approach also provides significant usability improvements. No modifications are required to existing applications or to the mobile platform.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130321013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Android - On-device detection of SMS catchers and sniffers Android -在设备上检测短信捕获器和嗅探器
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970601
Peter Teufl, Thomas Zefferer, Christoph Wörgötter, Alexander Oprisnik, Daniel M. Hein
With 6.1 trillion text messages sent in 2010 alone, short message service (SMS) is still one of the most popular mobile communication services. Due to its continuing popularity, SMS technology is nowadays used in various fields of application. This also includes security-sensitive fields such as e-banking, or e-government. In these fields, SMS technology is for instance employed to authorize financial transactions or the creation of qualified electronic signatures. Modern smartphone platforms such as Google Android provide application developers with the means to include SMS functionality. This can be beneficial in most cases but also facilitates the implementation of malware that is able to send and receive SMS messages unnoticed by the legitimate end user. In this context, SMS sniffers and SMS catchers have recently attracted attention. This kind of malware intercepts incoming SMS messages either to spy on security-sensitive data transmitted via SMS or to receive SMS-based malware control commands. For security-sensitive SMS-based applications, SMS catchers pose a serious threat. A recent attack on SMS-based e-banking systems has employed SMS catchers on smartphones to steal 36.000.000 Euro from corporate and private bank accounts in Europe. Unfortunately, security software for smartphones is still in the fledging stages and current solutions are not able to reliably detect SMS catchers. To overcome this problem, we introduce different methods to detect SMS sniffers and SMS catchers on smartphones. We discuss benefits and limitations of the proposed methods and show how these methods can be assembled to a comprehensive detection workflow for SMS-based malware. By providing means to detect SMS catchers and sniffers on smartphones, our work contributes to the security of current and future SMS-based applications.
仅2010年就发送了6.1万亿条短信,短信服务(SMS)仍然是最受欢迎的移动通信服务之一。由于它的持续普及,短信技术现在被应用于各个领域。这也包括对安全敏感的领域,如电子银行或电子政府。在这些领域中,SMS技术被用于授权金融交易或创建合格的电子签名。现代智能手机平台(如Google Android)为应用程序开发人员提供了包含短信功能的手段。这在大多数情况下是有益的,但也有利于恶意软件的实现,这些恶意软件能够发送和接收未被合法最终用户注意到的SMS消息。在这种情况下,短信嗅探器和短信捕捉器最近引起了人们的注意。这类恶意软件拦截传入的短信,要么是为了监视通过短信传输的安全敏感数据,要么是为了接收基于短信的恶意软件控制命令。对于安全敏感的短信应用程序,短信捕获程序构成了严重的威胁。最近一次针对基于短信的电子银行系统的攻击,利用智能手机上的短信捕获器从欧洲的公司和私人银行账户中窃取了3600万欧元。不幸的是,智能手机的安全软件仍处于起步阶段,目前的解决方案无法可靠地检测短信捕获器。为了克服这个问题,我们介绍了不同的方法来检测智能手机上的短信嗅探器和短信捕获器。我们讨论了所提出的方法的优点和局限性,并展示了如何将这些方法组装成基于短信的恶意软件的综合检测工作流程。通过在智能手机上提供检测短信捕获器和嗅探器的方法,我们的工作有助于当前和未来基于短信的应用程序的安全性。
{"title":"Android - On-device detection of SMS catchers and sniffers","authors":"Peter Teufl, Thomas Zefferer, Christoph Wörgötter, Alexander Oprisnik, Daniel M. Hein","doi":"10.1109/PRISMS.2014.6970601","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970601","url":null,"abstract":"With 6.1 trillion text messages sent in 2010 alone, short message service (SMS) is still one of the most popular mobile communication services. Due to its continuing popularity, SMS technology is nowadays used in various fields of application. This also includes security-sensitive fields such as e-banking, or e-government. In these fields, SMS technology is for instance employed to authorize financial transactions or the creation of qualified electronic signatures. Modern smartphone platforms such as Google Android provide application developers with the means to include SMS functionality. This can be beneficial in most cases but also facilitates the implementation of malware that is able to send and receive SMS messages unnoticed by the legitimate end user. In this context, SMS sniffers and SMS catchers have recently attracted attention. This kind of malware intercepts incoming SMS messages either to spy on security-sensitive data transmitted via SMS or to receive SMS-based malware control commands. For security-sensitive SMS-based applications, SMS catchers pose a serious threat. A recent attack on SMS-based e-banking systems has employed SMS catchers on smartphones to steal 36.000.000 Euro from corporate and private bank accounts in Europe. Unfortunately, security software for smartphones is still in the fledging stages and current solutions are not able to reliably detect SMS catchers. To overcome this problem, we introduce different methods to detect SMS sniffers and SMS catchers on smartphones. We discuss benefits and limitations of the proposed methods and show how these methods can be assembled to a comprehensive detection workflow for SMS-based malware. By providing means to detect SMS catchers and sniffers on smartphones, our work contributes to the security of current and future SMS-based applications.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"87 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121042659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Do you think your passwords are secure? 你认为你的密码安全吗?
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970600
Dominik Ziegler, Mattias Rauter, Christof Stromberger, Peter Teufl, Daniel M. Hein
Many systems rely on passwords for authentication. Due to numerous accounts for different services, users have to choose and remember a significant number of passwords. Password-Manager applications address this issue by storing the user's passwords. They are especially useful on mobile devices, because of the ubiquitous access to the account passwords. Password-Managers often use key derivation functions to convert a master password into a cryptographic key suitable for encrypting the list of passwords, thus protecting the passwords against unauthorized, off-line access. Therefore, design and implementation flaws in the key derivation function impact password security significantly. Design and implementation problems in the key derivation function can render the encryption on the password list useless, by for example allowing efficient bruteforce attacks, or - even worse - direct decryption of the stored passwords. In this paper, we analyze the key derivation functions of popular Android Password-Managers with often startling results. With this analysis, we want to raise the awareness of developers of security critical apps for security, and provide an overview about the current state of implementation security of security-critical applications.
许多系统依赖密码进行身份验证。由于不同服务的帐户众多,用户必须选择和记住大量的密码。密码管理器应用程序通过存储用户的密码来解决这个问题。它们在移动设备上特别有用,因为对账户密码的访问无处不在。密码管理器通常使用密钥派生功能将主密码转换为适合加密密码列表的加密密钥,从而保护密码免受未经授权的离线访问。因此,密钥派生功能的设计和实现缺陷会严重影响密码的安全性。密钥派生函数中的设计和实现问题可能使密码列表上的加密无效,例如允许有效的暴力攻击,或者更糟糕的是,直接解密存储的密码。在本文中,我们分析了常用的Android密码管理器的密钥派生功能,结果往往令人吃惊。通过这种分析,我们希望提高安全关键型应用程序开发人员的安全意识,并概述安全关键型应用程序的当前实现安全状态。
{"title":"Do you think your passwords are secure?","authors":"Dominik Ziegler, Mattias Rauter, Christof Stromberger, Peter Teufl, Daniel M. Hein","doi":"10.1109/PRISMS.2014.6970600","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970600","url":null,"abstract":"Many systems rely on passwords for authentication. Due to numerous accounts for different services, users have to choose and remember a significant number of passwords. Password-Manager applications address this issue by storing the user's passwords. They are especially useful on mobile devices, because of the ubiquitous access to the account passwords. Password-Managers often use key derivation functions to convert a master password into a cryptographic key suitable for encrypting the list of passwords, thus protecting the passwords against unauthorized, off-line access. Therefore, design and implementation flaws in the key derivation function impact password security significantly. Design and implementation problems in the key derivation function can render the encryption on the password list useless, by for example allowing efficient bruteforce attacks, or - even worse - direct decryption of the stored passwords. In this paper, we analyze the key derivation functions of popular Android Password-Managers with often startling results. With this analysis, we want to raise the awareness of developers of security critical apps for security, and provide an overview about the current state of implementation security of security-critical applications.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127318045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
One-pass authenticated key establishment protocol on bilinear pairings for Wireless Sensor Networks 无线传感器网络双线性对的一遍认证密钥建立协议
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970595
M. R. Mishra, J. Kar, B. Majhi
The article proposes one-pass authenticated key establishment protocol in random oracles for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Bilinear Pairings. In one-pass key establishment protocol, the initiator computes a session key and a related message. The key token is to be sent to the intended receiver using receiver's public key and sender secret key. From the received key token the receiver compute the session key, which is the same as the one computed by the sender, using sender public key and receiver's secret key. Because of low communication overhead, the scheme is better suited for Wireless Sensor Networks(WSNs) than the traditional key establishment protocol to establish the session key between two adjacent nodes
提出了无线传感器网络随机数据库中一次认证密钥建立协议。该协议的安全性依赖于双线性对上的计算Diffie-Hellman问题。在一遍密钥建立协议中,发起者计算会话密钥和相关消息。密钥令牌将使用接收方的公钥和发送方的密钥发送给预期的接收方。从接收到的密钥令牌中,接收方使用发送方公钥和接收方密钥计算会话密钥,会话密钥与发送方计算的会话密钥相同。由于通信开销小,该方案比传统的密钥建立协议更适合无线传感器网络(WSNs)中相邻两个节点之间建立会话密钥
{"title":"One-pass authenticated key establishment protocol on bilinear pairings for Wireless Sensor Networks","authors":"M. R. Mishra, J. Kar, B. Majhi","doi":"10.1109/PRISMS.2014.6970595","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970595","url":null,"abstract":"The article proposes one-pass authenticated key establishment protocol in random oracles for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Bilinear Pairings. In one-pass key establishment protocol, the initiator computes a session key and a related message. The key token is to be sent to the intended receiver using receiver's public key and sender secret key. From the received key token the receiver compute the session key, which is the same as the one computed by the sender, using sender public key and receiver's secret key. Because of low communication overhead, the scheme is better suited for Wireless Sensor Networks(WSNs) than the traditional key establishment protocol to establish the session key between two adjacent nodes","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"39 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120982285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security and privacy in the Internet of Things: Current status and open issues 物联网中的安全和隐私:现状和开放问题
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970594
Mohamed Abomhara, G. M. Køien
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy are presented.
总的来说,物联网将促进数十亿设备、人员和服务相互连接并交换信息和有用数据。由于物联网系统将无处不在,将出现许多安全和隐私问题。物联网需要可靠、经济、高效和有效的安全性和隐私性,以确保准确和准确的机密性、完整性、身份验证和访问控制等。本文讨论了物联网领域的远景、现有的安全威胁和开放的挑战。讨论了物联网安全需求的研究现状,提出了物联网安全和隐私方面的未来研究方向。
{"title":"Security and privacy in the Internet of Things: Current status and open issues","authors":"Mohamed Abomhara, G. M. Køien","doi":"10.1109/PRISMS.2014.6970594","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970594","url":null,"abstract":"The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy are presented.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 322
Android encryption systems Android加密系统
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970599
Peter Teufl, Andreas Fitzek, Daniel M. Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer
The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are encryption systems, which are available in the majority of current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered when deploying mobile devices in security-critical environments. As the second part in a series of papers (the first part was on iOS), this work analyzes the deployment of the Android platform and the usage of its encryption systems within a security-critical context. For this purpose, Android's different encryption systems are assessed and their susceptibility to different attacks is analyzed in detail. Based on these results a workflow is presented, which supports deployment of the Android platform and usage of its encryption systems within security-critical application scenarios.
智能手机和平板电脑的高可用性受到消费者、企业和公共部门的欢迎。然而,特别是在非消费领域,安全因素在平台选择过程中起着决定性的作用。目前移动设备领域的所有公司(苹果、谷歌、微软)都在最初面向消费者的设备上添加了广泛的安全功能,或者从一开始就把安全作为核心功能来处理(RIM,现在的黑莓)。保护设备上的数据或设备备份中的数据的关键安全特性之一是加密系统,这在大多数当前设备中都是可用的。然而,即使假设系统被正确实现,在安全关键型环境中部署移动设备时,也需要考虑各种参数、特定用例和弱点。作为系列论文的第二部分(第一部分是关于iOS的),本文分析了Android平台的部署及其加密系统在安全关键环境中的使用。为此,对Android的不同加密系统进行了评估,并详细分析了其对不同攻击的易感性。基于这些结果,提出了一个工作流,该工作流支持Android平台的部署和在安全关键应用场景中使用其加密系统。
{"title":"Android encryption systems","authors":"Peter Teufl, Andreas Fitzek, Daniel M. Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer","doi":"10.1109/PRISMS.2014.6970599","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970599","url":null,"abstract":"The high usability of smartphones and tablets is embraced by consumers as well as the corporate and public sector. However, especially in the non-consumer area the factor security plays a decisive role for the platform-selection process. All of the current companies within the mobile device sector added a wide range of security features to the initially consumer-oriented devices (Apple, Google, Microsoft), or have dealt with security as a core feature from the beginning (RIM, now Blackerry). One of the key security features for protecting data on the device or in device backups are encryption systems, which are available in the majority of current devices. However, even under the assumption that the systems are implemented correctly, there is a wide range of parameters, specific use cases, and weaknesses that need to be considered when deploying mobile devices in security-critical environments. As the second part in a series of papers (the first part was on iOS), this work analyzes the deployment of the Android platform and the usage of its encryption systems within a security-critical context. For this purpose, Android's different encryption systems are assessed and their susceptibility to different attacks is analyzed in detail. Based on these results a workflow is presented, which supports deployment of the Android platform and usage of its encryption systems within security-critical application scenarios.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130416202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks 基于p2p的在线社交网络批认证和密钥协议框架的改进
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970596
Huihui Yang, V. Oleshchuk
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
批量身份验证是同时对多个用户进行身份验证,以提供更高的效率。文献[1]基于不同的原语,提出了三种批量认证协议,以实现在线社交网络(online social network, osn)中多个用户的同时认证。本文简要介绍了原始协议,描述了其安全漏洞和相关攻击,并提出了修改建议,使其再次安全。
{"title":"An improvement of the batch-authentication and key agreement framework for P2P-based online social networks","authors":"Huihui Yang, V. Oleshchuk","doi":"10.1109/PRISMS.2014.6970596","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970596","url":null,"abstract":"Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security pairings using physical layer properties of wireless communications 使用无线通信物理层属性的安全配对
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970593
Jani Suomalainen, Antti Evesti, A. Kotelba
New security solutions in the physical communication layer - secret key extraction from the radio channel and information-theoretic secrecy - protect confidentiality of communication without cryptographic establishment of secret keys. Unfortunately, they currently lack authentication. Cryptographic mechanisms are still needed to secure the first contact between previously unknown devices - to guarantee that security pairings are made as the user intends. In this paper, we contribute by analyzing how five different security pairing approaches can be realized or complemented with physical layer solutions. We propose new solutions for replacing the use of expensive crypto algorithms with secret key extraction. We note that information-theoretic secrecy solutions are less capable of surviving without cryptographic authentication. However, in some information-theoretic secrecy approaches, secure out-of-band delivery of channel state information can authenticate receivers.
物理通信层的新安全解决方案——从无线电信道中提取秘密密钥和信息论保密——保护了通信的机密性,而无需加密建立秘密密钥。不幸的是,它们目前缺乏身份验证。仍然需要加密机制来保护以前未知设备之间的第一次接触,以保证按照用户的意愿进行安全配对。在本文中,我们通过分析如何实现五种不同的安全配对方法或与物理层解决方案相补充来做出贡献。我们提出了新的解决方案,用密钥提取取代昂贵的加密算法。我们注意到,如果没有加密身份验证,信息理论保密解决方案的生存能力较差。然而,在一些信息论保密方法中,信道状态信息的安全带外传递可以对接收方进行身份验证。
{"title":"Security pairings using physical layer properties of wireless communications","authors":"Jani Suomalainen, Antti Evesti, A. Kotelba","doi":"10.1109/PRISMS.2014.6970593","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970593","url":null,"abstract":"New security solutions in the physical communication layer - secret key extraction from the radio channel and information-theoretic secrecy - protect confidentiality of communication without cryptographic establishment of secret keys. Unfortunately, they currently lack authentication. Cryptographic mechanisms are still needed to secure the first contact between previously unknown devices - to guarantee that security pairings are made as the user intends. In this paper, we contribute by analyzing how five different security pairing approaches can be realized or complemented with physical layer solutions. We propose new solutions for replacing the use of expensive crypto algorithms with secret key extraction. We note that information-theoretic secrecy solutions are less capable of surviving without cryptographic authentication. However, in some information-theoretic secrecy approaches, secure out-of-band delivery of channel state information can authenticate receivers.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124271898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed privacy-preserving mean estimation 分布式隐私保护均值估计
Pub Date : 2014-05-11 DOI: 10.1109/PRISMS.2014.6970597
Mirco Schönfeld, M. Werner
Due to the rise of mobile computing and smartphones, a lot of information about groups has become accessible. This information shall often be kept secret. Hence distributed algorithms for privacy-preserving distribution estimation are needed. Most research currently focuses on privacy in a database, where a single entity has collected the secret information and privacy is ensured between query results and the database. In fully distributed systems such as sensor networks it is often infeasible to move the data towards a central entity for processing. Instead, distributed algorithms are needed. With this paper we propose a fully distributed, privacy-friendly, consensus-based approach. In our approach all nodes cooperate to generate a sufficiently random obfuscation of their secret values until the estimated and obfuscated values of the individual nodes can be safely published. Then the calculations can be done on this replacement containing only non-secret values but recovering some aspects (mean, standard deviation) of the original distribution.
由于移动计算和智能手机的兴起,很多关于群体的信息都可以访问。这些信息通常应保密。因此,需要使用分布式算法进行隐私保护分布估计。目前的研究大多集中在数据库中的隐私性,其中单个实体收集了秘密信息,并且保证了查询结果与数据库之间的隐私性。在完全分布式的系统中,如传感器网络,将数据移动到一个中央实体进行处理通常是不可行的。相反,我们需要分布式算法。在本文中,我们提出了一种完全分布式、隐私友好、基于共识的方法。在我们的方法中,所有节点合作生成其秘密值的足够随机混淆,直到单个节点的估计和混淆值可以安全地发布。然后可以在这个替换上进行计算,只包含非秘密值,但恢复原始分布的某些方面(平均值,标准差)。
{"title":"Distributed privacy-preserving mean estimation","authors":"Mirco Schönfeld, M. Werner","doi":"10.1109/PRISMS.2014.6970597","DOIUrl":"https://doi.org/10.1109/PRISMS.2014.6970597","url":null,"abstract":"Due to the rise of mobile computing and smartphones, a lot of information about groups has become accessible. This information shall often be kept secret. Hence distributed algorithms for privacy-preserving distribution estimation are needed. Most research currently focuses on privacy in a database, where a single entity has collected the secret information and privacy is ensured between query results and the database. In fully distributed systems such as sensor networks it is often infeasible to move the data towards a central entity for processing. Instead, distributed algorithms are needed. With this paper we propose a fully distributed, privacy-friendly, consensus-based approach. In our approach all nodes cooperate to generate a sufficiently random obfuscation of their secret values until the estimated and obfuscated values of the individual nodes can be safely published. Then the calculations can be done on this replacement containing only non-secret values but recovering some aspects (mean, standard deviation) of the original distribution.","PeriodicalId":272766,"journal":{"name":"2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1