首页 > 最新文献

2022 17th Asia Joint Conference on Information Security (AsiaJCIS)最新文献

英文 中文
An HDL Simulator with Direct Register Access for Improving Code Coverage 一个具有直接寄存器访问的HDL模拟器,用于提高代码覆盖率
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00018
Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, T. Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, D. Inoue
When debugging a DUT (Device Under Test) written in HDL (Hardware Description Language) code in simulation, code coverage is one of the most important evaluation metrics because it indicates how many unchecked statements remain where bugs could be hidden. A typical random test-pattern generator can be used very easily for debugging; however, it could fail to obtain enough code coverage of DUTs because it does not provide effective strategies for code coverage. In this paper, we propose an HDL simulator to improve branch coverage of DUTs up to 100%. A key idea behind our simulator is to directly write values to registers of DUTs for intentionally transfer a state to an unchecked state in the state machine of DUTs. This improves code coverage by executing statements corresponding to an unchecked state. Our simulator uses an SMT (Satisfiability Modulo Theories) solver to obtain the values written to registers from the condition (e.g., if and case) corresponding to an unchecked state. With the evaluation, we confirmed that our simulator successfully obtained a branch coverage of 100% for each of three open-sourced IP (Intellectual Property) core modules. As a bench mark, we also used a random test-pattern generator for those modules.
在模拟中调试用HDL(硬件描述语言)代码编写的DUT(被测设备)时,代码覆盖率是最重要的评估指标之一,因为它表明有多少未检查的语句保留在可能隐藏bug的地方。一个典型的随机测试模式生成器可以很容易地用于调试;然而,它可能无法获得足够的dut代码覆盖,因为它没有为代码覆盖提供有效的策略。在本文中,我们提出了一个HDL模拟器,以提高dut的分支覆盖率高达100%。我们的模拟器背后的一个关键思想是直接将值写入dut的寄存器,以便有意地将状态转移到dut状态机中的未检查状态。这通过执行与未检查状态相对应的语句来提高代码覆盖率。我们的模拟器使用SMT(可满足模数理论)求解器从与未检查状态相对应的条件(例如,if和case)中获取写入寄存器的值。通过评估,我们确认我们的模拟器成功地为三个开源IP(知识产权)核心模块中的每个模块获得了100%的分支覆盖率。作为基准,我们还为这些模块使用了随机测试模式生成器。
{"title":"An HDL Simulator with Direct Register Access for Improving Code Coverage","authors":"Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, T. Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, D. Inoue","doi":"10.1109/AsiaJCIS57030.2022.00018","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00018","url":null,"abstract":"When debugging a DUT (Device Under Test) written in HDL (Hardware Description Language) code in simulation, code coverage is one of the most important evaluation metrics because it indicates how many unchecked statements remain where bugs could be hidden. A typical random test-pattern generator can be used very easily for debugging; however, it could fail to obtain enough code coverage of DUTs because it does not provide effective strategies for code coverage. In this paper, we propose an HDL simulator to improve branch coverage of DUTs up to 100%. A key idea behind our simulator is to directly write values to registers of DUTs for intentionally transfer a state to an unchecked state in the state machine of DUTs. This improves code coverage by executing statements corresponding to an unchecked state. Our simulator uses an SMT (Satisfiability Modulo Theories) solver to obtain the values written to registers from the condition (e.g., if and case) corresponding to an unchecked state. With the evaluation, we confirmed that our simulator successfully obtained a branch coverage of 100% for each of three open-sourced IP (Intellectual Property) core modules. As a bench mark, we also used a random test-pattern generator for those modules.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organizing Committee: AsiaJCIS 2022 组委会:AsiaJCIS 2022
Pub Date : 2022-07-01 DOI: 10.1109/asiajcis57030.2022.00007
{"title":"Organizing Committee: AsiaJCIS 2022","authors":"","doi":"10.1109/asiajcis57030.2022.00007","DOIUrl":"https://doi.org/10.1109/asiajcis57030.2022.00007","url":null,"abstract":"","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130625718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bot-pelganger: Predict and Preserve Game Bots' Behavior Bot-pelganger:预测并保存游戏bot的行为
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00019
Yong-Seob Kim, H. Kim
In most multiplayer online games, players' repetitive tasks (i.e., spec-up) are required to grow their characters. However, some users use illegal programs, “game bots,” to achieve a high level fast or gain cyber-money. Various methods have been proposed to identify game bots. However, the methods have generalization issues. Because the methods use features only existed in the specific game. Thus, we carefully use common features that existed in multiple datasets broadly, such as ‘login’ or ‘exit’ events to detect bots. Choosing such general events gives merits from the applicability view; however, if we only use time or space-related features, we fail to detect bots from normal users because the bots' behavior patterns are omitted too much. We use a convolutional LSTM (ConvLSTM) model to overcome this problem, superimpose their behavioral histories over time, and record them as image sequences. By finding a user who shows high self-similar behavior, we regard it as an unidentified bot; then, we update their behavior patterns for future use. As a result, the proposed model showed a high accuracy of 98% in classifyina game bot users.
在大多数多人在线游戏中,玩家需要通过重复任务(游戏邦注:如规格)来发展自己的角色。然而,一些用户使用非法程序“游戏机器人”来快速达到高水平或获得网络金钱。人们提出了各种方法来识别游戏机器人。然而,这些方法存在一般化问题。因为这些方法使用的功能只存在于特定的游戏中。因此,我们谨慎地广泛使用多个数据集中存在的共同特征,例如“登录”或“退出”事件来检测机器人。从适用性的角度来看,选择这样的一般事件有其优点;然而,如果我们只使用时间或空间相关的特征,我们无法从正常用户中检测到机器人,因为机器人的行为模式被忽略了太多。我们使用卷积LSTM (ConvLSTM)模型来克服这个问题,将它们的行为历史随时间叠加,并将它们记录为图像序列。通过寻找一个表现出高度自相似行为的用户,我们将其视为一个身份不明的机器人;然后,我们更新它们的行为模式以供将来使用。结果表明,该模型对游戏机器人用户的分类准确率高达98%。
{"title":"Bot-pelganger: Predict and Preserve Game Bots' Behavior","authors":"Yong-Seob Kim, H. Kim","doi":"10.1109/AsiaJCIS57030.2022.00019","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00019","url":null,"abstract":"In most multiplayer online games, players' repetitive tasks (i.e., spec-up) are required to grow their characters. However, some users use illegal programs, “game bots,” to achieve a high level fast or gain cyber-money. Various methods have been proposed to identify game bots. However, the methods have generalization issues. Because the methods use features only existed in the specific game. Thus, we carefully use common features that existed in multiple datasets broadly, such as ‘login’ or ‘exit’ events to detect bots. Choosing such general events gives merits from the applicability view; however, if we only use time or space-related features, we fail to detect bots from normal users because the bots' behavior patterns are omitted too much. We use a convolutional LSTM (ConvLSTM) model to overcome this problem, superimpose their behavioral histories over time, and record them as image sequences. By finding a user who shows high self-similar behavior, we regard it as an unidentified bot; then, we update their behavior patterns for future use. As a result, the proposed model showed a high accuracy of 98% in classifyina game bot users.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128169134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing a Network Graph of File Tracking Results Against Information Leakage 基于信息泄漏的文件跟踪结果网络图构建
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00012
Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata
It is important for organizations to take measures against information leakage. Confidential files can be leaked through various channels, so it is necessary to have a method to prevent information leakage against various threats. Some of the previous works have utilized the difference of users' legitimate file access patterns, and other works use strings about confidential files, or the similarity of confidential files in the organizations. However, the former works are difficult to detect traitors and unintentional perpetrators, and latter works are difficult to perform when confidential files are significantly transformed through encryption or encoding. Therefore, we need a method for discovering information leakage that are independent of the subjects and of the file transformation formats. In this paper, we present a novel method for file tracking and visualization to assist the discovery of information leakage. In our file tracking method, we track all user processes that read confidential files and files written by these processes. Therefore, tracking is possible whoever manipulate the confidential files and even who even when the data is heavily transformed from the original files. In our visualization method, we present these file tracking results in the form of a network graph. We represent what process the confidential file is read and what file is written by process, by using the flow of a network graph based on the result of confidential file tracking. By using our proposed network graph, it is possible to track events briefly even when the file transforms into another file through multiple events. Additionally, in order to reduce the events needed to focus on as information leakage, we prune the network graph based on past read and write events. By pruning the network graph, visibility is expected to be improved. Our experiment shows that we observed the results of the network graph when files under two information leakage scenarios were moved and copied. Most of the results were visualized according to the scenario, and we could reduce the vertices by 11.5 % and edges by 7.3 % by pruning the network graph.
对于组织来说,采取措施防止信息泄露是非常重要的。机密文件可以通过各种渠道泄露,因此有必要针对各种威胁制定防止信息泄露的方法。之前的一些作品利用了用户合法文件访问模式的差异,还有一些作品利用了机密文件的字符串,或者组织内机密文件的相似性。但是,前者的作品很难发现叛徒和非故意犯罪者,后者的作品在机密文件通过加密或编码进行重大转换时难以执行。因此,我们需要一种方法来发现独立于主体和文件转换格式的信息泄漏。在本文中,我们提出了一种新的文件跟踪和可视化方法,以帮助发现信息泄漏。在我们的文件跟踪方法中,我们跟踪所有读取机密文件的用户进程以及这些进程写入的文件。因此,无论谁操纵机密文件,甚至是谁,即使数据从原始文件进行了大量转换,也可以进行跟踪。在我们的可视化方法中,我们以网络图的形式呈现这些文件跟踪结果。我们利用基于机密文件跟踪结果的网络图流来表示哪些进程读取了机密文件,哪些进程写入了机密文件。通过使用我们提出的网络图,即使文件通过多个事件转换为另一个文件,也可以短暂地跟踪事件。此外,为了减少需要关注的事件作为信息泄漏,我们基于过去的读写事件对网络图进行了修剪。通过修剪网络图,期望提高可见性。我们的实验表明,我们观察到了两种信息泄露场景下文件移动和复制时的网络图结果。大多数结果都是根据场景进行可视化的,通过对网络图进行修剪,可以减少11.5%的顶点和7.3%的边。
{"title":"Constructing a Network Graph of File Tracking Results Against Information Leakage","authors":"Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata","doi":"10.1109/AsiaJCIS57030.2022.00012","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00012","url":null,"abstract":"It is important for organizations to take measures against information leakage. Confidential files can be leaked through various channels, so it is necessary to have a method to prevent information leakage against various threats. Some of the previous works have utilized the difference of users' legitimate file access patterns, and other works use strings about confidential files, or the similarity of confidential files in the organizations. However, the former works are difficult to detect traitors and unintentional perpetrators, and latter works are difficult to perform when confidential files are significantly transformed through encryption or encoding. Therefore, we need a method for discovering information leakage that are independent of the subjects and of the file transformation formats. In this paper, we present a novel method for file tracking and visualization to assist the discovery of information leakage. In our file tracking method, we track all user processes that read confidential files and files written by these processes. Therefore, tracking is possible whoever manipulate the confidential files and even who even when the data is heavily transformed from the original files. In our visualization method, we present these file tracking results in the form of a network graph. We represent what process the confidential file is read and what file is written by process, by using the flow of a network graph based on the result of confidential file tracking. By using our proposed network graph, it is possible to track events briefly even when the file transforms into another file through multiple events. Additionally, in order to reduce the events needed to focus on as information leakage, we prune the network graph based on past read and write events. By pruning the network graph, visibility is expected to be improved. Our experiment shows that we observed the results of the network graph when files under two information leakage scenarios were moved and copied. Most of the results were visualized according to the scenario, and we could reduce the vertices by 11.5 % and edges by 7.3 % by pruning the network graph.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes 两种基于属性的加密方案的密码分析与讨论
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00014
Yi-Fan Tseng, Jheng-Jia Huang, Hao Yang, Tsung-Yu Chien, Chieh-Han Wu
Attribute-based encryption (ABE), which was first conceptualized by Sahai and Waters in 2005, has been developed into one of the most popular research topics in modern cryptography. Various variants of ABE has been designed and proposed in literature, e.g., ABE supporting user/attribute revocation, pairing-free ABE, etc. In this work, we study two ABE schemes proposed by Sethia et al. and Guo et al., respectively, in 2001. We found that, the scheme of Sethia et al. is insecure against the collusion attacks, and the scheme of Guo et al. fails to revoke a user. Therefore, in this manuscript, we will review on their schemes, and give the corresponding cryptanalysis. Besides, the discussion on the reasons to the attacks and possible improvement will be presented as well.
基于属性的加密(ABE)是Sahai和Waters于2005年首次提出的概念,目前已发展成为现代密码学中最热门的研究课题之一。文献中已经设计和提出了ABE的各种变体,例如,支持用户/属性撤销的ABE,无配对ABE等。在这项工作中,我们研究了Sethia et al.和Guo et al.分别于2001年提出的两种ABE方案。我们发现,Sethia等人的方案对合谋攻击是不安全的,Guo等人的方案无法撤销用户。因此,在本文中,我们将回顾他们的方案,并给出相应的密码分析。此外,还将讨论攻击的原因和可能的改进。
{"title":"Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes","authors":"Yi-Fan Tseng, Jheng-Jia Huang, Hao Yang, Tsung-Yu Chien, Chieh-Han Wu","doi":"10.1109/AsiaJCIS57030.2022.00014","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00014","url":null,"abstract":"Attribute-based encryption (ABE), which was first conceptualized by Sahai and Waters in 2005, has been developed into one of the most popular research topics in modern cryptography. Various variants of ABE has been designed and proposed in literature, e.g., ABE supporting user/attribute revocation, pairing-free ABE, etc. In this work, we study two ABE schemes proposed by Sethia et al. and Guo et al., respectively, in 2001. We found that, the scheme of Sethia et al. is insecure against the collusion attacks, and the scheme of Guo et al. fails to revoke a user. Therefore, in this manuscript, we will review on their schemes, and give the corresponding cryptanalysis. Besides, the discussion on the reasons to the attacks and possible improvement will be presented as well.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114760726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program Committee: AsiaJCIS 2022 项目委员会:AsiaJCIS 2022
Pub Date : 2022-07-01 DOI: 10.1109/asiajcis57030.2022.00008
{"title":"Program Committee: AsiaJCIS 2022","authors":"","doi":"10.1109/asiajcis57030.2022.00008","DOIUrl":"https://doi.org/10.1109/asiajcis57030.2022.00008","url":null,"abstract":"","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"497 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134175623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewers: AsiaJCIS 2022
Pub Date : 2022-07-01 DOI: 10.1109/asiajcis57030.2022.00010
{"title":"Reviewers: AsiaJCIS 2022","authors":"","doi":"10.1109/asiajcis57030.2022.00010","DOIUrl":"https://doi.org/10.1109/asiajcis57030.2022.00010","url":null,"abstract":"","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices SPOT:分析使用裸机NAS设备的物联网勒索软件攻击
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00013
Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, K. Yoshioka, Tsutomu Matsumoto
Ransomware attacks targeting Network Attached Storage (NAS) devices have shown a steady presence in the threat landscape since 2019. Early research has analyzed the functionality of IoT ransomware but its attack infrastructure and operation remain unrevealed. In this paper, we propose an attack observation system named SPOT, which uses popular bare metal NAS devices, QNAP, as honeypot and malware sandbox to conduct an in-depth analysis of the ransomware attacks. During the three-month observation with SPOT from September to November 2021, we observed, on average, 130 hosts per day accessing from the Internet that retrieves files in the storage and exploits the vulnerable services of the NAS devices, indicating NAS devices are intensively targeted. Moreover, we obtained 39 eCh0raix samples from VirusTotal and executed them in the SPOT sandboxes. We identified six remote Onion proxy servers used to connect to the C&C server behind the TOR network to hide their locations. By redirecting the C&C connections to active proxy servers, we successfully observed two malware samples interacting with the C&C server, encrypting files in the infected NAS device, and leaving ransom notes. Two kinds of contact points for ransom payment were found in the ransom notes; instruction web pages and email addresses. While the email addresses were not reachable during the experiment, we could access the instruction website, which was hosted on the same TOR hidden service as the C&C server. We kept monitoring the instruction page as it was created for each ransomware infection and we even observed a “30% discount campaign” of ransom payments for a limited period. We observe that the degree of automation in the attack operation is much higher compared to the tailored and targeted ransomware attacks. While each case of successful ransom payment is limited to 0.03 BTC, the automated nature of the attacks would maximize the frequency of such successful cases.
自2019年以来,针对网络附加存储(NAS)设备的勒索软件攻击在威胁环境中表现出稳定的存在。早期的研究分析了物联网勒索软件的功能,但其攻击基础设施和操作仍未披露。本文提出了一种名为SPOT的攻击观察系统,该系统使用流行的裸机NAS设备QNAP作为蜜罐和恶意软件沙箱,对勒索软件攻击进行深入分析。在2021年9月至11月为期三个月的SPOT观察期间,我们观察到,平均每天有130台主机从互联网访问,检索存储中的文件并利用NAS设备的脆弱服务,这表明NAS设备被集中攻击。此外,我们从VirusTotal获得了39个eCh0raix样本,并在SPOT沙盒中执行。我们确定了六个远程洋葱代理服务器,用于连接到TOR网络后面的C&C服务器,以隐藏其位置。通过将C&C连接重定向到活动代理服务器,我们成功观察到两个恶意软件样本与C&C服务器交互,加密受感染NAS设备中的文件,并留下赎金笔记。在赎金笔记中发现了两种支付赎金的联系方式;说明网页和电子邮件地址。虽然在实验期间无法访问电子邮件地址,但我们可以访问指令网站,该网站托管在与C&C服务器相同的TOR隐藏服务上。我们一直在监控针对每个勒索软件感染创建的说明页面,我们甚至在有限的时间内观察到支付赎金的“30%折扣活动”。我们观察到,与定制和有针对性的勒索软件攻击相比,攻击操作的自动化程度要高得多。虽然每个成功支付赎金的案例限制在0.03 BTC,但攻击的自动化性质将使此类成功案例的频率最大化。
{"title":"SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices","authors":"Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, K. Yoshioka, Tsutomu Matsumoto","doi":"10.1109/AsiaJCIS57030.2022.00013","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00013","url":null,"abstract":"Ransomware attacks targeting Network Attached Storage (NAS) devices have shown a steady presence in the threat landscape since 2019. Early research has analyzed the functionality of IoT ransomware but its attack infrastructure and operation remain unrevealed. In this paper, we propose an attack observation system named SPOT, which uses popular bare metal NAS devices, QNAP, as honeypot and malware sandbox to conduct an in-depth analysis of the ransomware attacks. During the three-month observation with SPOT from September to November 2021, we observed, on average, 130 hosts per day accessing from the Internet that retrieves files in the storage and exploits the vulnerable services of the NAS devices, indicating NAS devices are intensively targeted. Moreover, we obtained 39 eCh0raix samples from VirusTotal and executed them in the SPOT sandboxes. We identified six remote Onion proxy servers used to connect to the C&C server behind the TOR network to hide their locations. By redirecting the C&C connections to active proxy servers, we successfully observed two malware samples interacting with the C&C server, encrypting files in the infected NAS device, and leaving ransom notes. Two kinds of contact points for ransom payment were found in the ransom notes; instruction web pages and email addresses. While the email addresses were not reachable during the experiment, we could access the instruction website, which was hosted on the same TOR hidden service as the C&C server. We kept monitoring the instruction page as it was created for each ransomware infection and we even observed a “30% discount campaign” of ransom payments for a limited period. We observe that the degree of automation in the attack operation is much higher compared to the tailored and targeted ransomware attacks. While each case of successful ransom payment is limited to 0.03 BTC, the automated nature of the attacks would maximize the frequency of such successful cases.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"28 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Searchable Encryption with Small Clients on Edge Cloud 边缘云上的小型客户端轻量级可搜索加密
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00017
Ruizhong Du, Haoyu Jiang, Mingyue Li
In view of the limited storage and computing power of the client and the high delay of interaction with the cloud platform in public key searchable encryption, a new public key searchable encryption scheme SE-EPOMFC based on edge cloud network is proposed. The scheme adopts a multi cloud multi edge node architecture. By delegating the task of generating searchable ciphertext, trapdoor and general keyword set from the client to the edge node, the storage and computing overhead of the client is reduced. The edge network caches the frequently searched hot data, and the client can search on the edge network, so as to reduce the traffic load of the backbone network. At the same time, the response speed of the system is improved. A filtering algorithm based on partial homomorphic encryption is designed to filter completely mismatched tasks, which reduces the communication overhead between distributed systems and saves storage space for cloud services. The filtering algorithm can be calculated in the ciphertext state, which proves that it is safe under the collusion attack of semi trusted edge cloud nodes. In addition, the distributed two trapdoor public key cryptosystem is used to divide the keys for multiple nodes. Through the subset decisionmaking mechanism, the relationship between keywords is represented by binary strings to realize the search of multiple keywords. The simulation results show that the communication time of se-epomfc is saved by 25.46% in the case of task set matching degree II and 62.21% in the case of task set matching degree I.
针对公钥可搜索加密中客户端存储和计算能力有限以及与云平台交互延迟大的问题,提出了一种基于边缘云网络的公钥可搜索加密方案SE-EPOMFC。该方案采用多云多边缘节点架构。通过将客户端生成可搜索的密文、trapdoor和通用关键字集的任务委托给边缘节点,降低了客户端的存储和计算开销。边缘网络缓存了频繁搜索的热点数据,客户端可以在边缘网络上进行搜索,从而减少了骨干网的流量负荷。同时,提高了系统的响应速度。设计了一种基于部分同态加密的过滤算法来过滤完全不匹配的任务,减少了分布式系统之间的通信开销,节省了云服务的存储空间。该过滤算法可以在密文状态下进行计算,证明该算法在半可信边缘云节点串通攻击下是安全的。此外,采用分布式双活门公钥密码系统对多个节点进行密钥划分。通过子集决策机制,用二进制字符串表示关键字之间的关系,实现对多个关键字的搜索。仿真结果表明,在任务集匹配度为II的情况下,se-epomfc通信时间节省25.46%,在任务集匹配度为I的情况下,通信时间节省62.21%。
{"title":"Lightweight Searchable Encryption with Small Clients on Edge Cloud","authors":"Ruizhong Du, Haoyu Jiang, Mingyue Li","doi":"10.1109/AsiaJCIS57030.2022.00017","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00017","url":null,"abstract":"In view of the limited storage and computing power of the client and the high delay of interaction with the cloud platform in public key searchable encryption, a new public key searchable encryption scheme SE-EPOMFC based on edge cloud network is proposed. The scheme adopts a multi cloud multi edge node architecture. By delegating the task of generating searchable ciphertext, trapdoor and general keyword set from the client to the edge node, the storage and computing overhead of the client is reduced. The edge network caches the frequently searched hot data, and the client can search on the edge network, so as to reduce the traffic load of the backbone network. At the same time, the response speed of the system is improved. A filtering algorithm based on partial homomorphic encryption is designed to filter completely mismatched tasks, which reduces the communication overhead between distributed systems and saves storage space for cloud services. The filtering algorithm can be calculated in the ciphertext state, which proves that it is safe under the collusion attack of semi trusted edge cloud nodes. In addition, the distributed two trapdoor public key cryptosystem is used to divide the keys for multiple nodes. Through the subset decisionmaking mechanism, the relationship between keywords is represented by binary strings to realize the search of multiple keywords. The simulation results show that the communication time of se-epomfc is saved by 25.46% in the case of task set matching degree II and 62.21% in the case of task set matching degree I.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125601621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks 基于条件生成对抗网络的过采样安全警报筛选
Pub Date : 2022-07-01 DOI: 10.1109/AsiaJCIS57030.2022.00011
Samuel Ndichu, Tao Ban, Takeshi Takahashi, D. Inoue
Imbalanced class distribution can cause information loss and missed/false alarms for deep learning and machine-learning algorithms. The detection performance of traditional intrusion detection systems tend to degenerate due to skewed class distribution caused by the uneven allocation of observations in different kinds of attacks. To combat class imbalance and improve network intrusion detection performance, we adopt the conditional generative adversarial network (CTGAN) that enables the generation of samples of specific classes of interest. CTGAN builds on the generative adversarial networks (GAN) architecture to model tabular data and generate high quality synthetic data by conditionally sampling rows from the generated model. Oversampling using CTGAN adds instances to the minority class such that both data in the majority and the minority class are of equal distribution. The generated security alerts are used for training classifiers that realize critical alert detection. The proposed scheme is evaluated on a real-world dataset collected from security operation center of a large enterprise. The experiment results show that detection accuracy can be substantially improved when CTGAN is adopted to produce a balanced security-alert dataset. We believe the proposed CTGAN-based approach can cast new light on building effective systems for critical alert detection with reduced missed/false alarms.
类分布不平衡会导致深度学习和机器学习算法的信息丢失和漏报/误报。传统的入侵检测系统由于在不同类型的攻击中观测值分配不均而导致类分布偏态,导致检测性能下降。为了对抗类不平衡并提高网络入侵检测性能,我们采用了条件生成对抗网络(CTGAN),该网络能够生成特定感兴趣类的样本。CTGAN建立在生成对抗网络(GAN)架构的基础上,对表格数据进行建模,并通过有条件地从生成的模型中采样行来生成高质量的合成数据。使用CTGAN的过采样将实例添加到少数类中,这样多数类和少数类中的数据都具有相等的分布。生成的安全警报用于训练实现关键警报检测的分类器。在某大型企业安全运营中心的真实数据集上对该方案进行了评估。实验结果表明,采用CTGAN生成平衡的安全警报数据集,可以显著提高检测精度。我们相信提出的基于ctgan的方法可以为构建有效的关键警报检测系统提供新的思路,减少漏报/误报。
{"title":"Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks","authors":"Samuel Ndichu, Tao Ban, Takeshi Takahashi, D. Inoue","doi":"10.1109/AsiaJCIS57030.2022.00011","DOIUrl":"https://doi.org/10.1109/AsiaJCIS57030.2022.00011","url":null,"abstract":"Imbalanced class distribution can cause information loss and missed/false alarms for deep learning and machine-learning algorithms. The detection performance of traditional intrusion detection systems tend to degenerate due to skewed class distribution caused by the uneven allocation of observations in different kinds of attacks. To combat class imbalance and improve network intrusion detection performance, we adopt the conditional generative adversarial network (CTGAN) that enables the generation of samples of specific classes of interest. CTGAN builds on the generative adversarial networks (GAN) architecture to model tabular data and generate high quality synthetic data by conditionally sampling rows from the generated model. Oversampling using CTGAN adds instances to the minority class such that both data in the majority and the minority class are of equal distribution. The generated security alerts are used for training classifiers that realize critical alert detection. The proposed scheme is evaluated on a real-world dataset collected from security operation center of a large enterprise. The experiment results show that detection accuracy can be substantially improved when CTGAN is adopted to produce a balanced security-alert dataset. We believe the proposed CTGAN-based approach can cast new light on building effective systems for critical alert detection with reduced missed/false alarms.","PeriodicalId":304383,"journal":{"name":"2022 17th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 17th Asia Joint Conference on Information Security (AsiaJCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1