首页 > 最新文献

Proceedings of the 17th International Conference on Availability, Reliability and Security最新文献

英文 中文
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments 最优网络安全防御策略和投资的博弈论方法
Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, S. Panda, C. Xenakis
Investments on cybersecurity are essential for organizations to protect operational activities, develop trust relationships with clients, and maintain financial stability. A cybersecurity breach can lead to financial losses as well as to damage the reputation of an organization. Protecting an organization from cyber attacks demands considerable investments; however, it is known that organisations unequally divide their budget between cybersecurity and other technological needs. Organizations must consider cybersecurity measures, including but not limited to security controls, in their cybersecurity investment plans. Nevertheless, designing an effective cybersecurity investment plan to optimally distribute the cybersecurity budget is a primary concern. This paper presents GTM, a methodology depicted as a tool dedicated to providing optimal cybersecurity defense strategies and investment plans. GTM utilizes attack graphs to predict all possible cyber attacks, game theory to simulate the cyber attacks and 0-1 Knapsack to optimally allocate the budget. The output of GTM is an optimal cybersecurity strategy that includes security controls to protect the organisation against potential cyber attacks and enhance its cyber defenses. Furthermore, GTM’s effectiveness is evaluated against three use cases and compared against different attacker types under various scenarios.
网络安全投资对于组织保护运营活动、发展与客户的信任关系以及维持财务稳定至关重要。网络安全漏洞会导致经济损失,也会损害组织的声誉。保护组织免受网络攻击需要大量投资;然而,众所周知,企业在网络安全和其他技术需求上的预算分配并不均衡。组织必须在其网络安全投资计划中考虑网络安全措施,包括但不限于安全控制。然而,设计一个有效的网络安全投资计划来优化分配网络安全预算是一个主要问题。本文介绍了GTM,一种用于提供最佳网络安全防御策略和投资计划的工具。GTM利用攻击图预测所有可能的网络攻击,利用博弈论模拟网络攻击,利用0-1 backpack优化预算分配。GTM的输出是一个最佳的网络安全策略,其中包括安全控制,以保护组织免受潜在的网络攻击并增强其网络防御。此外,针对三个用例评估了GTM的有效性,并比较了不同场景下不同的攻击者类型。
{"title":"GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments","authors":"Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, S. Panda, C. Xenakis","doi":"10.1145/3538969.3544431","DOIUrl":"https://doi.org/10.1145/3538969.3544431","url":null,"abstract":"Investments on cybersecurity are essential for organizations to protect operational activities, develop trust relationships with clients, and maintain financial stability. A cybersecurity breach can lead to financial losses as well as to damage the reputation of an organization. Protecting an organization from cyber attacks demands considerable investments; however, it is known that organisations unequally divide their budget between cybersecurity and other technological needs. Organizations must consider cybersecurity measures, including but not limited to security controls, in their cybersecurity investment plans. Nevertheless, designing an effective cybersecurity investment plan to optimally distribute the cybersecurity budget is a primary concern. This paper presents GTM, a methodology depicted as a tool dedicated to providing optimal cybersecurity defense strategies and investment plans. GTM utilizes attack graphs to predict all possible cyber attacks, game theory to simulate the cyber attacks and 0-1 Knapsack to optimally allocate the budget. The output of GTM is an optimal cybersecurity strategy that includes security controls to protect the organisation against potential cyber attacks and enhance its cyber defenses. Furthermore, GTM’s effectiveness is evaluated against three use cases and compared against different attacker types under various scenarios.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124422552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing Coverages of Cyber Insurance Policies Using Ontology 利用本体分析网络保险保单的覆盖范围
Markos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos E. Kotsifakos, Evangellos Froudakis
In an era where all the transactions, businesses and services are becoming digital and online, the data assets and the services protection are of utmost importance. Cyber-insurance companies are offering a wide range of coverages, but they also have exclusions. Customers of these companies need to be able to understand the terms and conditions of the related contracts and furthermore they need to be able to compare various offerings in order to determine the most appropriate solutions for their needs. The research in the area is very limited while at the same time the related market is growing, giving every potential solution a high value. In this paper, we propose a methodology and a prototype system that will help customers to compare contracts based on a pre-defined ontology that is describing cyber-insurance terms. After a first preliminary analysis and validation, our approach accuracy is averaging at almost 50%, giving a promising initial evaluation. Fine tuning, larger data set assessment and ontology refinement will be our next steps to improve the accuracy of our tool. Real user evaluation will follow, in order to evaluate the tool in real world cases.
在一个所有交易、业务和服务都在数字化和网络化的时代,数据资产和服务的保护至关重要。网络保险公司提供的保险范围很广,但它们也有免责条款。这些公司的客户需要能够理解相关合同的条款和条件,此外,他们需要能够比较各种产品,以确定最适合他们需求的解决方案。该领域的研究非常有限,而与此同时,相关市场正在增长,每一个潜在的解决方案都具有很高的价值。在本文中,我们提出了一种方法和一个原型系统,它将帮助客户基于描述网络保险条款的预定义本体来比较合同。经过第一次初步分析和验证,我们的方法准确率平均接近50%,给出了一个有希望的初步评估。微调,更大的数据集评估和本体改进将是我们提高工具准确性的下一步。真实的用户评估将紧随其后,以便在真实世界的案例中评估该工具。
{"title":"Analyzing Coverages of Cyber Insurance Policies Using Ontology","authors":"Markos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos E. Kotsifakos, Evangellos Froudakis","doi":"10.1145/3538969.3544453","DOIUrl":"https://doi.org/10.1145/3538969.3544453","url":null,"abstract":"In an era where all the transactions, businesses and services are becoming digital and online, the data assets and the services protection are of utmost importance. Cyber-insurance companies are offering a wide range of coverages, but they also have exclusions. Customers of these companies need to be able to understand the terms and conditions of the related contracts and furthermore they need to be able to compare various offerings in order to determine the most appropriate solutions for their needs. The research in the area is very limited while at the same time the related market is growing, giving every potential solution a high value. In this paper, we propose a methodology and a prototype system that will help customers to compare contracts based on a pre-defined ontology that is describing cyber-insurance terms. After a first preliminary analysis and validation, our approach accuracy is averaging at almost 50%, giving a promising initial evaluation. Fine tuning, larger data set assessment and ontology refinement will be our next steps to improve the accuracy of our tool. Real user evaluation will follow, in order to evaluate the tool in real world cases.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing Themis:无服务器计算中微服务交互的安全去中心化框架
Angeliki Aktypi, Dimitris Karnikis, N. Vasilakis, Kasper Bonne Rasmussen
In serverless computing, applications are composed of stand-alone microservices that are invoked and scale up independently. Peer-to-peer protocols can be used to enable decentralized communication among the services that compose each application. This paper presents Themis, a framework for secure service-to-service interaction targeting these environments and the underlying service mesh architectures. Themis builds on a notion of decentralized identity management to allow confidential and authenticated service-to-service interaction without the need for a centralized certificate authority. Themis adopts a layered architecture. Its lower layer forms a core communication protocol pair that offers strong security guarantees without depending on a centralized point of authority. Building on this pair, an upper layer provides a series of actions related to communication and identifier management—e.g., store, find, and join. This paper analyzes the security properties of Themis’s protocol suite and shows how it provides a decentralized and flexible communication platform. The evaluation of our Themis prototype targeting serverless applications written in JavaScript shows that these security benefits come with small runtime latency and throughput overheads, and modest startup overheads.
在无服务器计算中,应用程序由独立调用和扩展的独立微服务组成。点对点协议可用于在组成每个应用程序的服务之间实现分散通信。本文介绍了Themis,一个针对这些环境和底层服务网格体系结构的安全服务到服务交互框架。Themis建立在去中心化身份管理的概念之上,允许保密和经过身份验证的服务到服务交互,而不需要集中的证书颁发机构。忒弥斯采用分层架构。它的下层形成了一个核心通信协议对,提供了强大的安全保证,而不依赖于一个集中的权威点。在这对基础上,上层提供了一系列与通信和标识符管理相关的操作。、储存、发现和加入。本文分析了Themis协议套件的安全特性,并展示了它如何提供一个分散和灵活的通信平台。对以JavaScript编写的无服务器应用程序为目标的Themis原型的评估表明,这些安全优势伴随着较小的运行时延迟和吞吐量开销,以及适度的启动开销。
{"title":"Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing","authors":"Angeliki Aktypi, Dimitris Karnikis, N. Vasilakis, Kasper Bonne Rasmussen","doi":"10.1145/3538969.3538983","DOIUrl":"https://doi.org/10.1145/3538969.3538983","url":null,"abstract":"In serverless computing, applications are composed of stand-alone microservices that are invoked and scale up independently. Peer-to-peer protocols can be used to enable decentralized communication among the services that compose each application. This paper presents Themis, a framework for secure service-to-service interaction targeting these environments and the underlying service mesh architectures. Themis builds on a notion of decentralized identity management to allow confidential and authenticated service-to-service interaction without the need for a centralized certificate authority. Themis adopts a layered architecture. Its lower layer forms a core communication protocol pair that offers strong security guarantees without depending on a centralized point of authority. Building on this pair, an upper layer provides a series of actions related to communication and identifier management—e.g., store, find, and join. This paper analyzes the security properties of Themis’s protocol suite and shows how it provides a decentralized and flexible communication platform. The evaluation of our Themis prototype targeting serverless applications written in JavaScript shows that these security benefits come with small runtime latency and throughput overheads, and modest startup overheads.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic online quantification and prioritization of data protection risks 数据保护风险自动在线量化和优先级排序
Sascha Sven Zmiewski, Jan Laufer, Z. Mann
Data processing systems operate in increasingly dynamic environments, such as in cloud or edge computing. In such environments, changes at run time can result in the dynamic appearance of data protection vulnerabilities, i.e., configurations in which an attacker could gain unauthorized access to confidential data. An autonomous system can mitigate such vulnerabilities by means of automated self-adaptations. If there are several data protection vulnerabilities at the same time, the system has to decide which ones to address first. In other areas of cybersecurity, risk-based approaches have proven useful for prioritizing where to focus efforts for increasing security. Traditionally, risk assessment is a manual and time-consuming process. On the other hand, addressing run-time risks requires timely decision-making, which in turn necessitates automated risk assessment. In this paper, we propose a mathematical model for quantifying data protection risks at run time. This model accounts for the specific properties of data protection risks, such as the time it takes to exploit a data protection vulnerability and the damage caused by such exploitation. Using this risk quantification, our approach can make, in an automated process, sound decisions on prioritizing data protection vulnerabilities dynamically. Experimental results show that our risk prioritization method leads to a reduction of up to 15.8% in the damage caused by data protection vulnerabilities.
数据处理系统在日益动态的环境中运行,例如云计算或边缘计算。在这样的环境中,运行时的更改可能导致数据保护漏洞的动态出现,即攻击者可以在其中获得对机密数据的未经授权访问的配置。自治系统可以通过自动自适应的方式减轻这些漏洞。如果同时存在多个数据保护漏洞,系统必须决定首先解决哪些漏洞。在其他网络安全领域,基于风险的方法已被证明对优先考虑在哪些领域集中精力提高安全性非常有用。传统上,风险评估是一个手动且耗时的过程。另一方面,处理运行时风险需要及时的决策,这反过来又需要自动的风险评估。在本文中,我们提出了一个在运行时量化数据保护风险的数学模型。该模型考虑了数据保护风险的特定属性,例如利用数据保护漏洞所需的时间以及利用该漏洞造成的损害。使用这种风险量化,我们的方法可以在自动化过程中动态地对数据保护漏洞的优先级做出合理的决定。实验结果表明,我们的风险优先排序方法使数据保护漏洞造成的损害降低了15.8%。
{"title":"Automatic online quantification and prioritization of data protection risks","authors":"Sascha Sven Zmiewski, Jan Laufer, Z. Mann","doi":"10.1145/3538969.3539005","DOIUrl":"https://doi.org/10.1145/3538969.3539005","url":null,"abstract":"Data processing systems operate in increasingly dynamic environments, such as in cloud or edge computing. In such environments, changes at run time can result in the dynamic appearance of data protection vulnerabilities, i.e., configurations in which an attacker could gain unauthorized access to confidential data. An autonomous system can mitigate such vulnerabilities by means of automated self-adaptations. If there are several data protection vulnerabilities at the same time, the system has to decide which ones to address first. In other areas of cybersecurity, risk-based approaches have proven useful for prioritizing where to focus efforts for increasing security. Traditionally, risk assessment is a manual and time-consuming process. On the other hand, addressing run-time risks requires timely decision-making, which in turn necessitates automated risk assessment. In this paper, we propose a mathematical model for quantifying data protection risks at run time. This model accounts for the specific properties of data protection risks, such as the time it takes to exploit a data protection vulnerability and the damage caused by such exploitation. Using this risk quantification, our approach can make, in an automated process, sound decisions on prioritizing data protection vulnerabilities dynamically. Experimental results show that our risk prioritization method leads to a reduction of up to 15.8% in the damage caused by data protection vulnerabilities.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123316060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation 网络安全技能需求评估的招聘广告分析器
Sara Ricci, Marek Sikora, Simon Parker, I. Lendák, Yianna Danidou, Argyro Chatzopoulou, Rémi Badonnel, Donatas Alksnys
This article presents a new free web-based application, the Cybersecurity Job Ads Analyzer, which has been created to collect and analyse job adverts using a machine learning algorithm. This algorithm enables the detection of the skills required in advertised cybersecurity work positions. The application is both interactive and dynamic allowing for automated analyses and for the underlying database of job adverts to be easily updated. Through the Cybersecurity Job Ads Analyzer, it is possible to explore the skills required over time, and thereby enable academia and other training providers to better understand and address the needs of the industry. We will describe in detail the user interface and technical background of the application, as well as highlight the preliminary statistical results we have obtained from analysing the current database of job adverts.
本文介绍了一个新的免费的基于网络的应用程序,网络安全工作广告分析器,它是用来收集和分析使用机器学习算法的招聘广告。该算法能够检测到广告中网络安全工作职位所需的技能。该应用程序是交互式的和动态的,允许自动分析,并使招聘广告的底层数据库易于更新。通过网络安全招聘广告分析器,可以探索随着时间的推移所需要的技能,从而使学术界和其他培训机构能够更好地了解和解决行业的需求。我们将详细描述该应用程序的用户界面和技术背景,并重点介绍我们通过分析当前招聘广告数据库获得的初步统计结果。
{"title":"Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation","authors":"Sara Ricci, Marek Sikora, Simon Parker, I. Lendák, Yianna Danidou, Argyro Chatzopoulou, Rémi Badonnel, Donatas Alksnys","doi":"10.1145/3538969.3543821","DOIUrl":"https://doi.org/10.1145/3538969.3543821","url":null,"abstract":"This article presents a new free web-based application, the Cybersecurity Job Ads Analyzer, which has been created to collect and analyse job adverts using a machine learning algorithm. This algorithm enables the detection of the skills required in advertised cybersecurity work positions. The application is both interactive and dynamic allowing for automated analyses and for the underlying database of job adverts to be easily updated. Through the Cybersecurity Job Ads Analyzer, it is possible to explore the skills required over time, and thereby enable academia and other training providers to better understand and address the needs of the industry. We will describe in detail the user interface and technical background of the application, as well as highlight the preliminary statistical results we have obtained from analysing the current database of job adverts.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing 基于边缘计算的隐私保护位置服务协议研究
S. Upadhyaya, S. Vivek
Location-based services are getting more popular day by day. Finding nearby stores, proximity-based marketing, on-road service assistance, etc., are some of the services that use location-based services. In location-based services, user information like user identity, user query, and location must be protected. Ma et al. (INFOCOM-BigSecurity 2019) proposed a privacy-preserving location-based service using Somewhat Homomorphic Encryption (SHE). Their protocol uses edge nodes that compute on SHE encrypted location data and determines the k-nearest points of interest contained in the Location-based Server (LBS) without revealing the original user coordinates to LBS, hence, ensuring privacy of users locations. In this work, we show that the above protocol by Ma et al. has a critical flaw. In particular, we show that their secure comparison protocol has a correctness issue in that it will not lead to correct comparison. A major consequence of this flaw is that straightforward approaches to fix this issue will make their protocol insecure. Namely, the LBS will be able to recover the actual locations of the users in each and every query.
基于位置的服务日益流行。寻找附近的商店、就近营销、道路服务协助等,都是一些使用位置服务的服务。在基于位置的服务中,必须保护用户身份、用户查询和位置等用户信息。Ma等人(INFOCOM-BigSecurity 2019)提出了一种使用某种同态加密(SHE)保护隐私的基于位置的服务。他们的协议使用边缘节点来计算SHE加密的位置数据,并确定包含在基于位置的服务器(LBS)中的k个最近的兴趣点,而不会向LBS透露原始用户坐标,因此确保了用户位置的隐私性。在这项工作中,我们证明了Ma等人的上述协议存在一个关键缺陷。特别是,我们展示了他们的安全比较协议有一个正确性问题,因为它不会导致正确的比较。这个缺陷的一个主要后果是,直接解决这个问题的方法将使他们的协议不安全。也就是说,LBS将能够在每个查询中恢复用户的实际位置。
{"title":"Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing","authors":"S. Upadhyaya, S. Vivek","doi":"10.1145/3538969.3544432","DOIUrl":"https://doi.org/10.1145/3538969.3544432","url":null,"abstract":"Location-based services are getting more popular day by day. Finding nearby stores, proximity-based marketing, on-road service assistance, etc., are some of the services that use location-based services. In location-based services, user information like user identity, user query, and location must be protected. Ma et al. (INFOCOM-BigSecurity 2019) proposed a privacy-preserving location-based service using Somewhat Homomorphic Encryption (SHE). Their protocol uses edge nodes that compute on SHE encrypted location data and determines the k-nearest points of interest contained in the Location-based Server (LBS) without revealing the original user coordinates to LBS, hence, ensuring privacy of users locations. In this work, we show that the above protocol by Ma et al. has a critical flaw. In particular, we show that their secure comparison protocol has a correctness issue in that it will not lead to correct comparison. A major consequence of this flaw is that straightforward approaches to fix this issue will make their protocol insecure. Namely, the LBS will be able to recover the actual locations of the users in each and every query.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques SoK:比特币有多私密?比特币隐私技术的分类与评价
Simin Ghesmati, W. Fdhila, E. Weippl
Blockchain is a disruptive technology that promises a multitude of benefits, such as transparency, traceability, and immutability. However, this unique bundle of key characteristics has proved to be a double-edged sword that can put users’ privacy at risk. Unlike in traditional systems, Bitcoin transactions are publicly and permanently recorded, and anyone can access the full history of the records. Despite using pseudonymous identities, an adversary can undermine users’ financial privacy and reveal their actual identities by using advanced heuristics and techniques to identify possible links between transactions, senders, receivers, and consumed services (e.g., online purchases). Hence, a multitude of approaches has been proposed to reduce financial transparency and enhance users’ anonymity. These techniques range from mixing services to off-chain transactions that address different privacy issues. In this paper, we particularly focus on comparing and evaluating privacy techniques in the Bitcoin blockchain (which can be applied in (Unspent Transaction Output (UTXO) based blockchains), present their limitations, and highlight new challenges.
区块链是一项颠覆性技术,它承诺了许多好处,如透明度、可追溯性和不可变性。然而,事实证明,这种独特的关键特征组合是一把双刃剑,可能会危及用户的隐私。与传统系统不同,比特币交易是公开和永久记录的,任何人都可以访问记录的完整历史。尽管使用了假名身份,攻击者可以破坏用户的财务隐私,并通过使用高级启发式和技术来识别交易、发送方、接收方和消费服务(例如,在线购买)之间的可能联系,从而暴露他们的实际身份。因此,提出了多种方法来降低财务透明度并增强用户的匿名性。这些技术的范围从混合服务到解决不同隐私问题的链下交易。在本文中,我们特别关注比较和评估比特币区块链中的隐私技术(可以应用于基于未花费交易输出(UTXO)的区块链),提出它们的局限性,并强调新的挑战。
{"title":"SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques","authors":"Simin Ghesmati, W. Fdhila, E. Weippl","doi":"10.1145/3538969.3538971","DOIUrl":"https://doi.org/10.1145/3538969.3538971","url":null,"abstract":"Blockchain is a disruptive technology that promises a multitude of benefits, such as transparency, traceability, and immutability. However, this unique bundle of key characteristics has proved to be a double-edged sword that can put users’ privacy at risk. Unlike in traditional systems, Bitcoin transactions are publicly and permanently recorded, and anyone can access the full history of the records. Despite using pseudonymous identities, an adversary can undermine users’ financial privacy and reveal their actual identities by using advanced heuristics and techniques to identify possible links between transactions, senders, receivers, and consumed services (e.g., online purchases). Hence, a multitude of approaches has been proposed to reduce financial transparency and enhance users’ anonymity. These techniques range from mixing services to off-chain transactions that address different privacy issues. In this paper, we particularly focus on comparing and evaluating privacy techniques in the Bitcoin blockchain (which can be applied in (Unspent Transaction Output (UTXO) based blockchains), present their limitations, and highlight new challenges.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security of Smart Grid Networks in the Cyber Ranges 网络范围内智能电网的安全
Tomáš Lieskovan, J. Hajny
Smart meters are increasingly a part of everyday households. These smart meters allow remote reading of the energy but also remote disconnection of the point of consumption from the energy supply. As these devices are part of the critical infrastructure of the country, the security of these devices needs to be tested and the relevant personnel trained. We would like to contribute to the scientific community by bringing practical experience from smart meter testing into the Cyber Range virtual environment. In this environment, professionals working with smart meters can be trained and smart meter safety tests can be performed. This paper presents common smart meter vulnerabilities and their demonstration in the Cyber Range environment. The article includes a sample description of scenario for testing so anyone can try it.
智能电表越来越多地成为日常家庭的一部分。这些智能电表允许远程读取能量,也可以远程断开从能源供应的消耗点。由于这些设备是国家关键基础设施的一部分,需要对这些设备的安全性进行测试,并对相关人员进行培训。我们希望通过将智能电表测试的实践经验带入Cyber Range虚拟环境,为科学界做出贡献。在这种环境下,可以对使用智能电表的专业人员进行培训,并进行智能电表安全测试。本文介绍了智能电表的常见漏洞及其在网络靶场环境下的表现。本文包含了一个测试场景的示例描述,因此任何人都可以尝试一下。
{"title":"Security of Smart Grid Networks in the Cyber Ranges","authors":"Tomáš Lieskovan, J. Hajny","doi":"10.1145/3538969.3543801","DOIUrl":"https://doi.org/10.1145/3538969.3543801","url":null,"abstract":"Smart meters are increasingly a part of everyday households. These smart meters allow remote reading of the energy but also remote disconnection of the point of consumption from the energy supply. As these devices are part of the critical infrastructure of the country, the security of these devices needs to be tested and the relevant personnel trained. We would like to contribute to the scientific community by bringing practical experience from smart meter testing into the Cyber Range virtual environment. In this environment, professionals working with smart meters can be trained and smart meter safety tests can be performed. This paper presents common smart meter vulnerabilities and their demonstration in the Cyber Range environment. The article includes a sample description of scenario for testing so anyone can try it.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122222964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classifying the factors affecting the adoption of the SDN-microSENSE innovations 对影响采用SDN-microSENSE创新的因素进行分类
Theodoros Rokkas, I. Neokosmidis
This paper presents the results of a survey conducted in order to identify the most critical factors that can affect the market adoption of the innovations developed in the H2020 R&I project SDN-microSENSE. A hierarchy of the main criteria and sub-criteria was created using the Fuzzy Analytical Hierarchy Process method and experts in the area expressed their preferences through a web-based survey. The results of this process provide an insight on the expert's vision regarding the importance of the factors that are crucial for the adoption of cyber-security solution in the Electrical Power and Energy Systems domain.
本文介绍了一项调查的结果,该调查旨在确定影响H2020 R&I项目SDN-microSENSE中开发的创新的市场采用的最关键因素。使用模糊层次分析法创建了主标准和子标准的层次结构,该领域的专家通过网络调查表达了他们的偏好。这一过程的结果提供了专家关于在电力和能源系统领域采用网络安全解决方案的关键因素的重要性的见解。
{"title":"Classifying the factors affecting the adoption of the SDN-microSENSE innovations","authors":"Theodoros Rokkas, I. Neokosmidis","doi":"10.1145/3538969.3544481","DOIUrl":"https://doi.org/10.1145/3538969.3544481","url":null,"abstract":"This paper presents the results of a survey conducted in order to identify the most critical factors that can affect the market adoption of the innovations developed in the H2020 R&I project SDN-microSENSE. A hierarchy of the main criteria and sub-criteria was created using the Fuzzy Analytical Hierarchy Process method and experts in the area expressed their preferences through a web-based survey. The results of this process provide an insight on the expert's vision regarding the importance of the factors that are crucial for the adoption of cyber-security solution in the Electrical Power and Energy Systems domain.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation 结合变分自编码器和转换语言模型改进密码生成
D. Biesner, K. Cvejoski, R. Sifa
Password generation techniques have recently been explored by leveraging deep-learning natural language processing (NLP) algorithms. Previous work has raised the state of the art for password guessing algorithms significantly, by approaching the problem using either variational autoencoders with CNN-based encoder and decoder architectures or transformer-based architectures (namely GPT2) for text generation. In this work we aim to combine both paradigms, introducing a novel architecture that leverages the expressive power of transformers with the natural sampling approach to text generation of variational autoencoders. We show how our architecture generates state-of-the-art results in password matching performance across multiple benchmark datasets.
密码生成技术最近通过利用深度学习自然语言处理(NLP)算法进行了探索。以前的工作已经大大提高了密码猜测算法的技术水平,通过使用基于cnn的编码器和解码器架构的变分自编码器或基于转换器的文本生成架构(即GPT2)来解决这个问题。在这项工作中,我们的目标是结合这两种范式,引入一种新的架构,利用变压器的表达能力和自然采样方法来生成变分自编码器的文本。我们将展示我们的架构如何在跨多个基准数据集的密码匹配性能中生成最先进的结果。
{"title":"Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation","authors":"D. Biesner, K. Cvejoski, R. Sifa","doi":"10.1145/3538969.3539000","DOIUrl":"https://doi.org/10.1145/3538969.3539000","url":null,"abstract":"Password generation techniques have recently been explored by leveraging deep-learning natural language processing (NLP) algorithms. Previous work has raised the state of the art for password guessing algorithms significantly, by approaching the problem using either variational autoencoders with CNN-based encoder and decoder architectures or transformer-based architectures (namely GPT2) for text generation. In this work we aim to combine both paradigms, introducing a novel architecture that leverages the expressive power of transformers with the natural sampling approach to text generation of variational autoencoders. We show how our architecture generates state-of-the-art results in password matching performance across multiple benchmark datasets.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 17th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1