首页 > 最新文献

Proceedings of the 17th International Conference on Availability, Reliability and Security最新文献

英文 中文
Applying a cryptographic metric to post-quantum lattice-based signature algorithms 将密码度量应用于后量子格签名算法
Markus Rautell, Outi-Marja Latvala, V. Vallivaara, Kimmo Halunen
Measuring the security of cryptographic systems is not a simple task. Nevertheless, there is an increasing need for a cryptographic metric which could assist in decision making when choosing between various candidates. The National Institute of Standards and Technology (NIST) has launched a process to standardize quantum-resistance public key encryption, key encapsulation and digital signature algorithms. This is NIST’s response to the threat posed by quantum computers against classical public key cryptography. In this paper, we apply a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric. Although, our results show that clear differences can be found with used metrics, we propose some improvements to them to allow more comprehensive analysis.
测量加密系统的安全性并不是一项简单的任务。然而,越来越需要一种加密度量,它可以帮助在各种候选人之间进行选择时做出决策。美国国家标准与技术研究院(NIST)启动了一项标准化量子抗公钥加密、密钥封装和数字签名算法的进程。这是NIST对量子计算机对经典公钥加密构成威胁的回应。在本文中,我们将早期研究产生的度量分类法应用于NIST第三轮决赛数字签名算法Dilithium和Falcon,以评估度量的有效性和广泛性。尽管我们的结果表明,使用度量标准可以发现明显的差异,但我们建议对它们进行一些改进,以便进行更全面的分析。
{"title":"Applying a cryptographic metric to post-quantum lattice-based signature algorithms","authors":"Markus Rautell, Outi-Marja Latvala, V. Vallivaara, Kimmo Halunen","doi":"10.1145/3538969.3544438","DOIUrl":"https://doi.org/10.1145/3538969.3544438","url":null,"abstract":"Measuring the security of cryptographic systems is not a simple task. Nevertheless, there is an increasing need for a cryptographic metric which could assist in decision making when choosing between various candidates. The National Institute of Standards and Technology (NIST) has launched a process to standardize quantum-resistance public key encryption, key encapsulation and digital signature algorithms. This is NIST’s response to the threat posed by quantum computers against classical public key cryptography. In this paper, we apply a metric taxonomy, produced by earlier studies, to two NIST third round finalist digital signature algorithms Dilithium and Falcon in order to asses the effectiveness and extensiveness of the metric. Although, our results show that clear differences can be found with used metrics, we propose some improvements to them to allow more comprehensive analysis.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications 面向物联网应用的RIOT操作系统DTLS实现性能评估
Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, W. Mazurczyk
The popularity, variety, and number of Internet of Things (IoT) devices and solutions have been increasing significantly with each passing year. This diversity of devices, and limited computational, memory, and battery resources make it difficult to apply effective security solutions. That is why dedicated mechanisms for the protection of IoT-based transmissions are developed. One of the most popular solutions is Datagram Transport Layer Security (DTLS), which allows securing datagram-based applications. In this paper, we investigate how efficient the three currently available DTLS implementations provided by the RIOT Operating System are. Based on the results obtained, interested parties can choose the DTLS module that has the best performance for the chosen IoT application.
物联网(IoT)设备和解决方案的普及程度、种类和数量逐年显著增加。设备的多样性以及有限的计算、内存和电池资源使得难以应用有效的安全解决方案。这就是开发保护基于物联网传输的专用机制的原因。最流行的解决方案之一是数据报传输层安全(DTLS),它允许保护基于数据报的应用程序。在本文中,我们研究了RIOT操作系统提供的三种当前可用的DTLS实现的效率。根据获得的结果,感兴趣的各方可以为所选的物联网应用选择具有最佳性能的DTLS模块。
{"title":"Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications","authors":"Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, W. Mazurczyk","doi":"10.1145/3538969.3544470","DOIUrl":"https://doi.org/10.1145/3538969.3544470","url":null,"abstract":"The popularity, variety, and number of Internet of Things (IoT) devices and solutions have been increasing significantly with each passing year. This diversity of devices, and limited computational, memory, and battery resources make it difficult to apply effective security solutions. That is why dedicated mechanisms for the protection of IoT-based transmissions are developed. One of the most popular solutions is Datagram Transport Layer Security (DTLS), which allows securing datagram-based applications. In this paper, we investigate how efficient the three currently available DTLS implementations provided by the RIOT Operating System are. Based on the results obtained, interested parties can choose the DTLS module that has the best performance for the chosen IoT application.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adding European Cybersecurity Skills Framework into Curricula Designer 在课程设计中加入欧洲网络安全技能框架
J. Hajny, Marek Sikora, A. Grammatopoulos, Fabio Di Franco
We present the updated version of the Curricula Designer, a tool that is devoted to helping study program administrators and education providers to create cybersecurity curricula that are modern and reflect the needs of the job market. Our main contribution is the inclusion of the European Cybersecurity Skills Framework (ECSF) developed by ENISA to the Curricula Designer. The ECSF makes it possible to directly link knowledge and skills with professional profiles, which in turn reflect actual work roles on the job market. By adding ECSF to the Curricula Designer, we get a simple yet powerful tool that helps to identify the right content of cybersecurity curricula using rigorous, deterministic methods, applicable at any higher education provider. At the time of the paper submission, the Curricula Designer is the first practical application that is based on ECSF. However, due to its focus on practicality, usability and simplicity, we expect ECSF to become the dominant framework for cybersecurity knowledge and skills identification in Europe.
我们提供了课程设计师的更新版本,这是一个致力于帮助研究项目管理者和教育提供者创建现代网络安全课程并反映就业市场需求的工具。我们的主要贡献是将ENISA开发的欧洲网络安全技能框架(ECSF)纳入课程设计师。ECSF使知识和技能与专业概况直接联系起来成为可能,而专业概况又反映了就业市场上的实际工作角色。通过将ECSF添加到课程设计器中,我们得到了一个简单而强大的工具,可以使用严格的、确定性的方法来帮助确定网络安全课程的正确内容,适用于任何高等教育提供商。在论文提交时,课程设计器是第一个基于ECSF的实际应用程序。然而,由于其对实用性、可用性和简单性的关注,我们预计ECSF将成为欧洲网络安全知识和技能识别的主要框架。
{"title":"Adding European Cybersecurity Skills Framework into Curricula Designer","authors":"J. Hajny, Marek Sikora, A. Grammatopoulos, Fabio Di Franco","doi":"10.1145/3538969.3543799","DOIUrl":"https://doi.org/10.1145/3538969.3543799","url":null,"abstract":"We present the updated version of the Curricula Designer, a tool that is devoted to helping study program administrators and education providers to create cybersecurity curricula that are modern and reflect the needs of the job market. Our main contribution is the inclusion of the European Cybersecurity Skills Framework (ECSF) developed by ENISA to the Curricula Designer. The ECSF makes it possible to directly link knowledge and skills with professional profiles, which in turn reflect actual work roles on the job market. By adding ECSF to the Curricula Designer, we get a simple yet powerful tool that helps to identify the right content of cybersecurity curricula using rigorous, deterministic methods, applicable at any higher education provider. At the time of the paper submission, the Curricula Designer is the first practical application that is based on ECSF. However, due to its focus on practicality, usability and simplicity, we expect ECSF to become the dominant framework for cybersecurity knowledge and skills identification in Europe.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DevSecOps In Embedded Systems: An Empirical Study Of Past Literature 嵌入式系统中的DevSecOps:对过去文献的实证研究
Hasan Yasar, Sam E Teplov
Over the last decade, DevSecOps principles have gained widespread acceptance, replacing many traditional approaches to software development. DevSecOps has helped developers shorten the overall software development life cycle, and as a result, decreased the time to market. Following the broad success of DevSecOps, the next logical progression is to apply DevSecOps principles to other fields to achieve similar results, such as embedded systems. While embedded systems practices may stand to benefit greatly from the inclusion of DevSecOps principles, the field offers many new and unique challenges that have not been faced with traditional software systems. Existing DevSecOps frameworks cannot simply be applied to embedded systems. It is necessary to adapt current DevSecOps frameworks specifically to embedded systems. This piece will first lay out current DevSecOps principles and their application to software systems. Then, an empirical examination of existing work on DevSecOps in embedded systems will be presented. The required components of a DevSecOps framework that have been excluded from previous research will be highlighted, and from this, future areas of research in DevSecOps for embedded systems will be presented. The goal of this work is to summarize and analyze the current state of knowledge on DevSecOps in embedded systems and outline a path for future research. • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability.
在过去的十年中,DevSecOps原则获得了广泛的接受,取代了许多传统的软件开发方法。DevSecOps帮助开发人员缩短了整个软件开发生命周期,从而缩短了上市时间。随着DevSecOps的广泛成功,下一个合乎逻辑的进展是将DevSecOps原理应用到其他领域以获得类似的结果,例如嵌入式系统。虽然嵌入式系统实践可能会从DevSecOps原则中获益良多,但该领域提供了许多传统软件系统没有面临的新的和独特的挑战。现有的DevSecOps框架不能简单地应用于嵌入式系统。有必要将当前的DevSecOps框架专门用于嵌入式系统。本文将首先阐述当前的DevSecOps原则及其在软件系统中的应用。然后,将对嵌入式系统中DevSecOps的现有工作进行实证检查。DevSecOps框架中被排除在之前研究之外的必要组件将被强调,并从这一点出发,将介绍嵌入式系统DevSecOps的未来研究领域。这项工作的目标是总结和分析嵌入式系统中DevSecOps的当前知识状态,并概述未来研究的路径。•计算机系统组织→嵌入式系统;冗余;机器人技术;•网络→网络可靠性。
{"title":"DevSecOps In Embedded Systems: An Empirical Study Of Past Literature","authors":"Hasan Yasar, Sam E Teplov","doi":"10.1145/3538969.3544451","DOIUrl":"https://doi.org/10.1145/3538969.3544451","url":null,"abstract":"Over the last decade, DevSecOps principles have gained widespread acceptance, replacing many traditional approaches to software development. DevSecOps has helped developers shorten the overall software development life cycle, and as a result, decreased the time to market. Following the broad success of DevSecOps, the next logical progression is to apply DevSecOps principles to other fields to achieve similar results, such as embedded systems. While embedded systems practices may stand to benefit greatly from the inclusion of DevSecOps principles, the field offers many new and unique challenges that have not been faced with traditional software systems. Existing DevSecOps frameworks cannot simply be applied to embedded systems. It is necessary to adapt current DevSecOps frameworks specifically to embedded systems. This piece will first lay out current DevSecOps principles and their application to software systems. Then, an empirical examination of existing work on DevSecOps in embedded systems will be presented. The required components of a DevSecOps framework that have been excluded from previous research will be highlighted, and from this, future areas of research in DevSecOps for embedded systems will be presented. The goal of this work is to summarize and analyze the current state of knowledge on DevSecOps in embedded systems and outline a path for future research. • Computer systems organization → Embedded systems; Redundancy; Robotics; • Networks → Network reliability.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI VALKYRIES:欧盟MCI上第一响应者的技术、训练和战术协调行动的协调和预标准化
Y. Yanakiev, Marta Irene García Cid, J. M. Vidal, N. Stoianov, Marco Antonio Sotelo Monge
A methodology for tracking and analysing the needs for standardization and certification harmonization thorough the project life cycle will be defined and enforced, which will allow the early identification of issues related to the conceptualization, design, implementation, integration and deployment of tools for support the EU disaster resiliency; which will be facilitated by a complete consultation strategy to the different stakeholders that are expected to act at each capability development phase, ranging from providers to end users. On these grounds H2020-VALKYRIES will develop, integrate and demonstrate capabilities for enabling immediate and coordinated emergency response including search and rescue, security and health, in scenarios of natural/provoked catastrophes with multiple victims, with special application in cases in which several regions or countries are affected and hence greater interoperability being required. H2020-VALKYRIES will propose both design and development of a modular, interoperable, scalable and secure-oriented reference integration, called SIGRUN, which will allow the integration between legacy solutions and new technologies in a framework of harmonized solutions. SIGRUN will be able to deploy services and dynamically adapt its behaviour, as the emergency requires it. A series of demonstration scenarios will be developed placing an emphasis on cross-border and cross-sectorial BLOS (Beyond Line of Sight) scenarios, where the usual communications infrastructure could have been damaged, and emergency response teams are deployed without an accurate view of the operation environment.
将定义和实施一种方法,用于跟踪和分析整个项目生命周期的标准化和认证协调需求,这将允许早期识别与概念化、设计、实施、集成和部署工具相关的问题,以支持欧盟的灾害恢复能力;这将通过一个完整的咨询策略来促进不同的利益相关者,这些利益相关者预计将在每个能力开发阶段采取行动,从供应商到最终用户。基于这些理由,H2020-VALKYRIES将开发、整合和展示在有多名受害者的自然/引发的灾难情况下实现即时和协调的应急反应的能力,包括搜索和救援、安全和卫生,并在几个区域或国家受到影响的情况下特别应用,因此需要更大的互操作性。H2020-VALKYRIES将提出设计和开发模块化、可互操作、可扩展和面向安全的参考集成,称为SIGRUN,这将允许在协调解决方案框架中集成传统解决方案和新技术。SIGRUN将能够根据紧急情况的需要部署服务并动态调整其行为。将制定一系列示范情景,重点是跨国界和跨部门的视线外情景,在这些情景中,通常的通信基础设施可能已经遭到破坏,部署应急小组时无法准确了解行动环境。
{"title":"VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI","authors":"Y. Yanakiev, Marta Irene García Cid, J. M. Vidal, N. Stoianov, Marco Antonio Sotelo Monge","doi":"10.1145/3538969.3544482","DOIUrl":"https://doi.org/10.1145/3538969.3544482","url":null,"abstract":"A methodology for tracking and analysing the needs for standardization and certification harmonization thorough the project life cycle will be defined and enforced, which will allow the early identification of issues related to the conceptualization, design, implementation, integration and deployment of tools for support the EU disaster resiliency; which will be facilitated by a complete consultation strategy to the different stakeholders that are expected to act at each capability development phase, ranging from providers to end users. On these grounds H2020-VALKYRIES will develop, integrate and demonstrate capabilities for enabling immediate and coordinated emergency response including search and rescue, security and health, in scenarios of natural/provoked catastrophes with multiple victims, with special application in cases in which several regions or countries are affected and hence greater interoperability being required. H2020-VALKYRIES will propose both design and development of a modular, interoperable, scalable and secure-oriented reference integration, called SIGRUN, which will allow the integration between legacy solutions and new technologies in a framework of harmonized solutions. SIGRUN will be able to deploy services and dynamically adapt its behaviour, as the emergency requires it. A series of demonstration scenarios will be developed placing an emphasis on cross-border and cross-sectorial BLOS (Beyond Line of Sight) scenarios, where the usual communications infrastructure could have been damaged, and emergency response teams are deployed without an accurate view of the operation environment.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewing review platforms: a privacy perspective 审查评论平台:隐私视角
Kevin De Boeck, Jenno Verdonck, M. Willocx, Jorn Lapon, Vincent Naessens
Many tourists heavily rely on online review platforms for decisions with respect to food, visits and hotel bookings today. Review communities rigorously log all experiences on popular online platforms such as Google Maps, Tripadvisor and Yelp. However, many contributors are unaware that, along with experiences, a lot of sensitive information is often indirectly exposed to platform visitors. Examples are reviewer’s locations in the privacy sphere, age, medical information and financial status. Malicious entities could potentially employ this information in various ways, for example during extortion or targeted phishing attempts. This work outlines the potential risks for contributors on review platforms. The Google Maps review platform is applied as a prototypical example, with a special focus on predicting the reviewer’s home location. The accuracy of our predictions is assessed by relying on ground truth datasets. This paper further presents and evaluates strategies to tackle common problems.
如今,许多游客在食物、旅游和酒店预订方面严重依赖在线评论平台。评论社区严格记录谷歌地图、Tripadvisor和Yelp等流行在线平台上的所有体验。然而,许多贡献者没有意识到,随着体验的增加,许多敏感信息通常会间接地暴露给平台访问者。例如审稿人在隐私领域的位置、年龄、医疗信息和财务状况。恶意实体可能以各种方式使用这些信息,例如在敲诈勒索或有针对性的网络钓鱼尝试期间。这项工作概述了审查平台上贡献者的潜在风险。Google Maps评论平台是一个典型的例子,它特别关注于预测评论者的家的位置。我们预测的准确性是通过依赖地面真实数据集来评估的。本文进一步提出并评价了解决常见问题的策略。
{"title":"Reviewing review platforms: a privacy perspective","authors":"Kevin De Boeck, Jenno Verdonck, M. Willocx, Jorn Lapon, Vincent Naessens","doi":"10.1145/3538969.3538974","DOIUrl":"https://doi.org/10.1145/3538969.3538974","url":null,"abstract":"Many tourists heavily rely on online review platforms for decisions with respect to food, visits and hotel bookings today. Review communities rigorously log all experiences on popular online platforms such as Google Maps, Tripadvisor and Yelp. However, many contributors are unaware that, along with experiences, a lot of sensitive information is often indirectly exposed to platform visitors. Examples are reviewer’s locations in the privacy sphere, age, medical information and financial status. Malicious entities could potentially employ this information in various ways, for example during extortion or targeted phishing attempts. This work outlines the potential risks for contributors on review platforms. The Google Maps review platform is applied as a prototypical example, with a special focus on predicting the reviewer’s home location. The accuracy of our predictions is assessed by relying on ground truth datasets. This paper further presents and evaluates strategies to tackle common problems.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Mobile Agents on Embedded Boards: a TPM based solution 嵌入式板上的安全移动代理:基于TPM的解决方案
A. Muñoz
Security can be considered one of the essential aspects of any software system today. The current landscape is constantly evolving and new computing models are appearing at the same time as different attacks emerge. All this means that there is an increasing need for new security solutions. Among the different aspects that are opening up, this work focuses on the protection of sensitive data. In particular, an environment based on mobile agents is considered, which contains sensitive information that needs to be protected. To simulate an Internet of Things (IoT) environment, the agencies on which the agents run are deployed on Raspberry Pi devices.
安全性可以被认为是当今任何软件系统的基本方面之一。当前的形势在不断发展,随着不同攻击的出现,新的计算模型也在不断出现。所有这些都意味着对新的安全解决方案的需求越来越大。在开放的不同方面中,这项工作的重点是保护敏感数据。特别考虑了基于移动代理的环境,其中包含需要保护的敏感信息。为了模拟物联网(IoT)环境,在Raspberry Pi设备上部署代理运行的代理。
{"title":"Secure Mobile Agents on Embedded Boards: a TPM based solution","authors":"A. Muñoz","doi":"10.1145/3538969.3544419","DOIUrl":"https://doi.org/10.1145/3538969.3544419","url":null,"abstract":"Security can be considered one of the essential aspects of any software system today. The current landscape is constantly evolving and new computing models are appearing at the same time as different attacks emerge. All this means that there is an increasing need for new security solutions. Among the different aspects that are opening up, this work focuses on the protection of sensitive data. In particular, an environment based on mobile agents is considered, which contains sensitive information that needs to be protected. To simulate an Internet of Things (IoT) environment, the agencies on which the agents run are deployed on Raspberry Pi devices.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the feasibility of detecting injections in malicious npm packages 关于检测恶意npm包中注入的可行性
Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, F. Massacci
Open-source packages typically have their source code available on a source code repository (e.g., on GitHub), but developers prefer to use pre-built artifacts directly from the package repositories (such as npm for JavaScript). Between the source code and the distributed artifacts, there could be differences that pose security risks (e.g., attackers deploy malicious code during package installation) in the software supply chain. Existing package scanners focus on the entire artifact of a package to detect this kind of attacks. These procedures are not only time consuming, but also generate high irrelevant alerts (FPs). An approach called LastPyMile by Vu et al. (ESEC/FSE’21) has been shown to be effective in detecting discrepancies and reducing false alerts in vetting Python packages on PyPI by focusing only on the differences between the source and the package. In this work, we propose to port that approach to scan JavaScript packages in the npm ecosystem. We presented a preliminary evaluation of our implementation on a set of real malicious npm packages and the top popular packages. The results show that while being 20.7x faster than git-log approach, our approach managed to reduce the percentage of false alerts produced by package scanner by 69%.
开源包通常在源代码存储库(例如GitHub)上提供源代码,但开发人员更喜欢直接使用包存储库中预构建的构件(例如JavaScript的npm)。在源代码和分布式构件之间,在软件供应链中可能存在构成安全风险的差异(例如,攻击者在包安装期间部署恶意代码)。现有的包扫描器专注于包的整个工件来检测这类攻击。这些过程不仅耗时,而且会产生高的不相关警报(FPs)。Vu等人(ESEC/FSE ' 21)提出的一种名为LastPyMile的方法已被证明在PyPI上审查Python包时,通过只关注源和包之间的差异,可以有效地检测差异并减少错误警报。在这项工作中,我们建议将这种方法移植到npm生态系统中的JavaScript包扫描中。我们在一组真正的恶意npm软件包和最流行的软件包上对我们的实现进行了初步评估。结果表明,虽然我们的方法比git-log方法快20.7倍,但我们的方法成功地将包扫描器产生的错误警报的百分比减少了69%。
{"title":"On the feasibility of detecting injections in malicious npm packages","authors":"Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, F. Massacci","doi":"10.1145/3538969.3543815","DOIUrl":"https://doi.org/10.1145/3538969.3543815","url":null,"abstract":"Open-source packages typically have their source code available on a source code repository (e.g., on GitHub), but developers prefer to use pre-built artifacts directly from the package repositories (such as npm for JavaScript). Between the source code and the distributed artifacts, there could be differences that pose security risks (e.g., attackers deploy malicious code during package installation) in the software supply chain. Existing package scanners focus on the entire artifact of a package to detect this kind of attacks. These procedures are not only time consuming, but also generate high irrelevant alerts (FPs). An approach called LastPyMile by Vu et al. (ESEC/FSE’21) has been shown to be effective in detecting discrepancies and reducing false alerts in vetting Python packages on PyPI by focusing only on the differences between the source and the package. In this work, we propose to port that approach to scan JavaScript packages in the npm ecosystem. We presented a preliminary evaluation of our implementation on a set of real malicious npm packages and the top popular packages. The results show that while being 20.7x faster than git-log approach, our approach managed to reduce the percentage of false alerts produced by package scanner by 69%.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Scenarios for Process-Aware Insider Attack Detection in Manufacturing 制造业中过程感知内部攻击检测的场景
M. Macák, Radek Vaclavek, Dasa Kusnirakova, Raimundas Matulevičius, Barbora Buhnova
Manufacturing production heavily depends on the processes that need to be followed during manufacturing. As there might be many reasons behind possible deviations from these processes, the deviations can also cover ongoing insider attacks, e.g., intended to perform sabotage or espionage on these infrastructures. Insider attacks can cause tremendous damage to a manufacturing company because an insider knows how to act inconspicuously, making insider attacks very hard to detect. In this paper, we examine the potential of process-mining methods for insider-attack detection in the context of manufacturing, which is a new and promising application context for process-aware methods. To this end, we present five manufacturing-related scenarios of insider threats identified in cooperation with a manufacturing company, where the process mining could be most helpful in the detection of their respective attack events. We describe these scenarios and demonstrate the utilization of process mining in this context, creating ground for further future research.
制造生产在很大程度上取决于制造过程中需要遵循的流程。由于在这些过程的可能偏差背后可能有许多原因,这些偏差也可能包括正在进行的内部攻击,例如,意图在这些基础设施上执行破坏或间谍活动。内部攻击会给制造企业造成巨大损失,因为内部人员知道如何悄无声息地行动,这使得内部攻击很难被发现。在本文中,我们研究了过程挖掘方法在制造环境中进行内部攻击检测的潜力,这是过程感知方法的一个新的和有前途的应用环境。为此,我们提出了与制造公司合作确定的内部威胁的五个与制造相关的场景,其中流程挖掘可能对检测各自的攻击事件最有帮助。我们描述了这些场景,并在此背景下演示了过程挖掘的使用,为进一步的未来研究奠定了基础。
{"title":"Scenarios for Process-Aware Insider Attack Detection in Manufacturing","authors":"M. Macák, Radek Vaclavek, Dasa Kusnirakova, Raimundas Matulevičius, Barbora Buhnova","doi":"10.1145/3538969.3544449","DOIUrl":"https://doi.org/10.1145/3538969.3544449","url":null,"abstract":"Manufacturing production heavily depends on the processes that need to be followed during manufacturing. As there might be many reasons behind possible deviations from these processes, the deviations can also cover ongoing insider attacks, e.g., intended to perform sabotage or espionage on these infrastructures. Insider attacks can cause tremendous damage to a manufacturing company because an insider knows how to act inconspicuously, making insider attacks very hard to detect. In this paper, we examine the potential of process-mining methods for insider-attack detection in the context of manufacturing, which is a new and promising application context for process-aware methods. To this end, we present five manufacturing-related scenarios of insider threats identified in cooperation with a manufacturing company, where the process mining could be most helpful in the detection of their respective attack events. We describe these scenarios and demonstrate the utilization of process mining in this context, creating ground for further future research.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and prediction of web proxies misbehavior web代理不当行为的分析与预测
Zahra Nezhadian, Enrico Branca, Natalia Stakhanova
The need for anonymity and privacy has given a rise to open web proxies that act as gateways relaying traffic between web servers and their clients, allowing users to access otherwise not accessible content. As the open web proxy ecosystem continues to grow, research studies point out the extent of content alteration on the Internet. While the previous studies focused on detection and analysis of content manipulation by proxies, we focus on the feasibility of predicting these manipulations. In this work, we present a new approach for predicting the types of content alterations that might be silently introduced by open proxies. Our approach is designed to proactively indicate changes without a need to fetch the data through a proxy first. We explore the feasibility of the approach on a website content of 1028 domains fetched through 1293 proxies. We leverage our approach to proactively and accurately identify various content manipulations with 87% - 92% accuracy. Our study reveals an important observation that the majority of proxies manipulate website content based on technical information of the website and its web server.
对匿名和隐私的需求导致了开放网络代理的兴起,这些代理作为网关在网络服务器和客户端之间传输流量,允许用户访问否则无法访问的内容。随着开放web代理生态系统的不断发展,研究指出了互联网上内容变化的程度。以往的研究主要集中在通过代理检测和分析内容操纵,而我们关注的是预测这些操纵的可行性。在这项工作中,我们提出了一种新的方法来预测可能由开放代理悄无声息地引入的内容更改类型。我们的方法旨在主动指示更改,而不需要首先通过代理获取数据。我们在一个通过1293个代理获取的1028个域名的网站内容上探索了该方法的可行性。我们利用我们的方法主动准确地识别各种内容操纵,准确率为87% - 92%。我们的研究揭示了一个重要的观察结果,即大多数代理根据网站及其web服务器的技术信息操纵网站内容。
{"title":"Analysis and prediction of web proxies misbehavior","authors":"Zahra Nezhadian, Enrico Branca, Natalia Stakhanova","doi":"10.1145/3538969.3544412","DOIUrl":"https://doi.org/10.1145/3538969.3544412","url":null,"abstract":"The need for anonymity and privacy has given a rise to open web proxies that act as gateways relaying traffic between web servers and their clients, allowing users to access otherwise not accessible content. As the open web proxy ecosystem continues to grow, research studies point out the extent of content alteration on the Internet. While the previous studies focused on detection and analysis of content manipulation by proxies, we focus on the feasibility of predicting these manipulations. In this work, we present a new approach for predicting the types of content alterations that might be silently introduced by open proxies. Our approach is designed to proactively indicate changes without a need to fetch the data through a proxy first. We explore the feasibility of the approach on a website content of 1028 domains fetched through 1293 proxies. We leverage our approach to proactively and accurately identify various content manipulations with 87% - 92% accuracy. Our study reveals an important observation that the majority of proxies manipulate website content based on technical information of the website and its web server.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 17th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1