首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation ICS工程工作站检测DLL注入的PEB-LDR数据分析技术研究
Junwon Kim, Jiho Shin, Jung-Taek Seo
In the field of Industrial Control Systems (ICS), engineering workstations are used to manage and control processes better. It can involve monitoring the status of the PLC (Programming Logic Controller) constituting the ICS and observing the PLC data in real time using the HMI function. Nonetheless, it is possible to gain control of SCADA through a DLL injection, which can cause a fatal accident. Therefore, this paper proposes a method of detecting the DLL Injection of engineering workstations used in the ICS environment and a technique to detect data change due to DLL Injection by analyzing PEB-LDR data. We also propose a method of detecting malicious DLL when such is suspected to have been loaded. As a result, successful detection was realized using the suggested method when DLL Injection occurred, and a warning message could be displayed.
在工业控制系统(ICS)领域,工程工作站被用来更好地管理和控制过程。它可以包括监控构成ICS的PLC(编程逻辑控制器)的状态,并使用HMI功能实时观察PLC数据。尽管如此,还是有可能通过DLL注入获得对SCADA的控制,这可能会导致致命的事故。为此,本文提出了一种检测ICS环境下工程工作站DLL注入的方法,以及一种通过分析PEB-LDR数据来检测DLL注入引起的数据变化的技术。我们还提出了一种检测恶意DLL的方法,当这种方法被怀疑已经加载。结果表明,当发生DLL注入时,采用该方法可以成功检测,并显示警告信息。
{"title":"Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation","authors":"Junwon Kim, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444734","DOIUrl":"https://doi.org/10.1145/3440943.3444734","url":null,"abstract":"In the field of Industrial Control Systems (ICS), engineering workstations are used to manage and control processes better. It can involve monitoring the status of the PLC (Programming Logic Controller) constituting the ICS and observing the PLC data in real time using the HMI function. Nonetheless, it is possible to gain control of SCADA through a DLL injection, which can cause a fatal accident. Therefore, this paper proposes a method of detecting the DLL Injection of engineering workstations used in the ICS environment and a technique to detect data change due to DLL Injection by analyzing PEB-LDR data. We also propose a method of detecting malicious DLL when such is suspected to have been loaded. As a result, successful detection was realized using the suggested method when DLL Injection occurred, and a warning message could be displayed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125498134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective 绿色供应链视角下酒店业可持续经营指标构建
Kuo-Cheng Chung, Silvia Wan-Ju Liang
1The purpose of this paper is to propose an evaluation method which can help life hotel industry to select an appropriate green supply chain index for their green supply chain index sales representatives. The criteria for establishing the proposed algorithm are derived from a literature review and interviews with a group of experts in the hotel industry. The modified Fuzzy Delphi method is then adopted to analyze those results. This study aims to provide general green policies for hoteliers to reach sustainability, fill the gap of earlier studies to reshape green supply chain management of hotels, and offer weight of seventeen green practices as a means of measurement for hotel managers.
本文的目的是提出一种评价方法,可以帮助生活酒店行业为其绿色供应链指数销售代表选择合适的绿色供应链指数。建立所提出的算法的标准来源于文献综述和对酒店业一组专家的采访。然后采用改进的模糊德尔菲法对结果进行分析。本研究旨在为酒店经营者提供实现可持续发展的一般绿色政策,填补早期研究的空白,重塑酒店绿色供应链管理,并为酒店管理者提供17种绿色实践的权重作为衡量手段。
{"title":"Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective","authors":"Kuo-Cheng Chung, Silvia Wan-Ju Liang","doi":"10.1145/3440943.3444347","DOIUrl":"https://doi.org/10.1145/3440943.3444347","url":null,"abstract":"1The purpose of this paper is to propose an evaluation method which can help life hotel industry to select an appropriate green supply chain index for their green supply chain index sales representatives. The criteria for establishing the proposed algorithm are derived from a literature review and interviews with a group of experts in the hotel industry. The modified Fuzzy Delphi method is then adopted to analyze those results. This study aims to provide general green policies for hoteliers to reach sustainability, fill the gap of earlier studies to reshape green supply chain management of hotels, and offer weight of seventeen green practices as a means of measurement for hotel managers.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient data processing method for edge intelligence based on SVM 基于支持向量机的边缘智能数据处理方法
Namgyu Jung, Junho Yoon, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang-Hyun Choi
Recently, edge intelligence is emerging. It is widely used because it allows you to make business models more efficient through edge intelligence, but there is still a lack of models to use for edge intelligence. Artificial neural networks are being used a lot because they solve the problem of overfitting, which is a disadvantage of artificial neural networks and increase the speed by improving GPU performance. However as the independent variable to be learned increases, the learning time and characteristics of the artificial neural network slow down and the size of the neural network becomes very heavier. The shortage of these artificial neural networks make it difficult to make edge intelligence for classification or prediction in real life. Manufacturing lightweight models using heavy neural networks and high-performance GPUs also presents a lot of financial problems. However, SVM based on statistical mathematics exists between machine learning. Although it is relatively inferior to artificial intelligence, it is better light and has stable performing. To do this, we propose an efficient data processing method that improves the characteristics of the SVM (the overall performance, accuracy and learning speed of the SVM) and makes it easier for the SVM to learn the data. When four types of data processing were applied, the accuracy increased by more than 0.4% for the iris data set and 2% on average for the other data sets, and the training time for all data sets was also reduced. As a result, SVMs that can process data efficiently are much lighter than artificial neural networks and have very good training times versus accuracy. Therefore, in this paper, we propose an efficient data processing method based on SVM for edge intelligence.
最近,边缘智能正在兴起。它被广泛使用,因为它允许你通过边缘智能使商业模式更高效,但仍然缺乏用于边缘智能的模型。人工神经网络解决了人工神经网络的缺点——过拟合问题,并通过提高GPU的性能提高了运算速度,因此得到了广泛的应用。然而,随着需要学习的自变量的增加,人工神经网络的学习时间和特征变慢,神经网络的规模变得非常大。这些人工神经网络的不足使得在现实生活中很难做出用于分类或预测的边缘智能。使用重型神经网络和高性能gpu制造轻量级模型也会带来很多财务问题。然而,基于统计数学的SVM存在于机器学习之间。虽然相对逊色于人工智能,但它更轻,性能稳定。为此,我们提出了一种高效的数据处理方法,提高支持向量机的特性(SVM的整体性能、精度和学习速度),使支持向量机更容易学习数据。当采用四种数据处理方式时,虹膜数据集的准确率提高了0.4%以上,其他数据集的准确率平均提高了2%,并且所有数据集的训练时间也都减少了。因此,能够有效处理数据的支持向量机比人工神经网络轻得多,并且具有非常好的训练时间和准确性。因此,本文提出了一种基于支持向量机的边缘智能数据处理方法。
{"title":"Efficient data processing method for edge intelligence based on SVM","authors":"Namgyu Jung, Junho Yoon, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang-Hyun Choi","doi":"10.1145/3440943.3444728","DOIUrl":"https://doi.org/10.1145/3440943.3444728","url":null,"abstract":"Recently, edge intelligence is emerging. It is widely used because it allows you to make business models more efficient through edge intelligence, but there is still a lack of models to use for edge intelligence. Artificial neural networks are being used a lot because they solve the problem of overfitting, which is a disadvantage of artificial neural networks and increase the speed by improving GPU performance. However as the independent variable to be learned increases, the learning time and characteristics of the artificial neural network slow down and the size of the neural network becomes very heavier. The shortage of these artificial neural networks make it difficult to make edge intelligence for classification or prediction in real life. Manufacturing lightweight models using heavy neural networks and high-performance GPUs also presents a lot of financial problems. However, SVM based on statistical mathematics exists between machine learning. Although it is relatively inferior to artificial intelligence, it is better light and has stable performing. To do this, we propose an efficient data processing method that improves the characteristics of the SVM (the overall performance, accuracy and learning speed of the SVM) and makes it easier for the SVM to learn the data. When four types of data processing were applied, the accuracy increased by more than 0.4% for the iris data set and 2% on average for the other data sets, and the training time for all data sets was also reduced. As a result, SVMs that can process data efficiently are much lighter than artificial neural networks and have very good training times versus accuracy. Therefore, in this paper, we propose an efficient data processing method based on SVM for edge intelligence.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Smart Monitoring System in Fish Farm 养鱼场智能监控系统
Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shi Chen
Farming fisheries are popular in Penghu, and traditional fisheries require a lot of manpower and time. This research integrates thermometer, pH meter, dissolved oxygen meter, and water quality sensor into a circuit board, and transmits the sensed value to the server. User can obtain the real-time information of fish farm through the mobile APP
澎湖以养殖渔业为主,传统渔业需要大量人力和时间。本研究将温度计、pH计、溶解氧计、水质传感器集成在一块电路板上,并将传感值传输给服务器。用户可以通过手机APP获取养鱼场的实时信息
{"title":"A Smart Monitoring System in Fish Farm","authors":"Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shi Chen","doi":"10.1145/3440943.3444352","DOIUrl":"https://doi.org/10.1145/3440943.3444352","url":null,"abstract":"Farming fisheries are popular in Penghu, and traditional fisheries require a lot of manpower and time. This research integrates thermometer, pH meter, dissolved oxygen meter, and water quality sensor into a circuit board, and transmits the sensed value to the server. User can obtain the real-time information of fish farm through the mobile APP","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Establishment of E-referee for Sailing Ships Based on Deep Learning 基于深度学习的帆船电子裁判系统构建研究
Ying Ling, Jo-Hung Yu, Chih-Chien Shen, Chien-Hung Wu
The Taiwanese government is advocating the maritime activities of "Salute to the Sea". Nowadays, sailing is a popular leisure activity in Taiwan and it is also an Olympic event. Sailing competition is a large-scale competition, so it needs multiple referees and aerial photography to supervise. However, due to the large number of sailboats and the large range of activities, the need to supervise the audience through the referee is a big problem. This article builds on the basis of deep learning to build a sailing electronic referee. If there is a possibility that the sailboat may violate the rules by turning on the motor, this article will make a judgment and notify the referee. This article builds a system to help the referee's work, and uses the aerial shooting machine for compre-hensive shooting monitoring to facilitate the fairness of the sailing competition. From the experimental results, it can be known that the method proposed in this arti-cle is feasible, and the film can also be transmitted back to the platform for archiving.
台湾政府正在倡导“向海致敬”的海上活动。如今,帆船在台湾是一项很受欢迎的休闲活动,也是奥运会比赛项目。帆船比赛是一项大型比赛,需要多名裁判员和航拍进行监督。然而,由于帆船数量多,活动范围大,需要通过裁判员监督观众是一个大问题。本文在深度学习的基础上构建了一个帆船电子裁判。如果帆船有可能因启动电机而违反规则,本条将作出判断并通知裁判员。本文搭建了一个辅助裁判工作的系统,并利用航拍机进行全面的射击监控,以促进帆船比赛的公正性。从实验结果可以看出,本文提出的方法是可行的,并且可以将胶片传回平台进行存档。
{"title":"On the Establishment of E-referee for Sailing Ships Based on Deep Learning","authors":"Ying Ling, Jo-Hung Yu, Chih-Chien Shen, Chien-Hung Wu","doi":"10.1145/3440943.3444346","DOIUrl":"https://doi.org/10.1145/3440943.3444346","url":null,"abstract":"The Taiwanese government is advocating the maritime activities of \"Salute to the Sea\". Nowadays, sailing is a popular leisure activity in Taiwan and it is also an Olympic event. Sailing competition is a large-scale competition, so it needs multiple referees and aerial photography to supervise. However, due to the large number of sailboats and the large range of activities, the need to supervise the audience through the referee is a big problem. This article builds on the basis of deep learning to build a sailing electronic referee. If there is a possibility that the sailboat may violate the rules by turning on the motor, this article will make a judgment and notify the referee. This article builds a system to help the referee's work, and uses the aerial shooting machine for compre-hensive shooting monitoring to facilitate the fairness of the sailing competition. From the experimental results, it can be known that the method proposed in this arti-cle is feasible, and the film can also be transmitted back to the platform for archiving.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockChain Develops Student Positioning System on Campus 区块链开发校园学生定位系统
Yueh-Shiu Lee, Changqing Yang, Tsai-Yu Lai, Tzu-Hsuan Lin
1Firstly, each student will need to wear a Beacon launcher and install cameras at all wide-area spaces. When a student tested positive for the disease, the technique of BlockChain can track the past paths of the student and can further understand whom the student had met. Additionally, cameras can help to find out the gathering conditions. This research utilizes the features of BlockChain to protect the whereabouts information of students; moreover, the feature of tamper resistance of BlockChain ensures the data security.
首先,每个学生都需要佩戴Beacon发射器,并在所有广域空间安装摄像头。当一名学生的疾病检测呈阳性时,区块链技术可以跟踪该学生过去的路径,并进一步了解该学生见过谁。此外,相机可以帮助发现采集条件。本研究利用区块链的特点来保护学生的行踪信息;此外,区块链的抗篡改特性保证了数据的安全性。
{"title":"BlockChain Develops Student Positioning System on Campus","authors":"Yueh-Shiu Lee, Changqing Yang, Tsai-Yu Lai, Tzu-Hsuan Lin","doi":"10.1145/3440943.3444340","DOIUrl":"https://doi.org/10.1145/3440943.3444340","url":null,"abstract":"1Firstly, each student will need to wear a Beacon launcher and install cameras at all wide-area spaces. When a student tested positive for the disease, the technique of BlockChain can track the past paths of the student and can further understand whom the student had met. Additionally, cameras can help to find out the gathering conditions. This research utilizes the features of BlockChain to protect the whereabouts information of students; moreover, the feature of tamper resistance of BlockChain ensures the data security.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XGBoost based Packer Identification study using Entry point 基于XGBoost的入口点封隔器识别研究
Sejin Kim, Taejin Lee
With the development of IT technology, the number of new and variant malware is rapidly increasing. Malware developers make it difficult to analyze malware by applying techniques such as packing and obfuscation. In this paper, packing file detection and packer identification were tested using N bytes of data extracted from the entry point of the PE file as a feature. To verify the feature performance, the ensemble model XGBoost algorithm was used. As a result, the packing file was detected with an accuracy of 97.45% and the packer was identified with an accuracy of 98.41%. Through the experiment, it was confirmed that the feature extracted from the entry point is significant for the packing file detection and the packer detection.
随着信息技术的发展,新型和变型恶意软件的数量迅速增加。恶意软件开发人员通过应用诸如打包和混淆之类的技术使分析恶意软件变得困难。本文以从PE文件入口点提取的N字节数据为特征,对打包文件检测和打包器识别进行了测试。为了验证特征的性能,采用了集成模型XGBoost算法。结果表明,包装文件的检测准确率为97.45%,封隔器的识别准确率为98.41%。通过实验,证实了从入口点提取的特征对于打包文件检测和打包器检测都是有意义的。
{"title":"XGBoost based Packer Identification study using Entry point","authors":"Sejin Kim, Taejin Lee","doi":"10.1145/3440943.3444358","DOIUrl":"https://doi.org/10.1145/3440943.3444358","url":null,"abstract":"With the development of IT technology, the number of new and variant malware is rapidly increasing. Malware developers make it difficult to analyze malware by applying techniques such as packing and obfuscation. In this paper, packing file detection and packer identification were tested using N bytes of data extracted from the entry point of the PE file as a feature. To verify the feature performance, the ensemble model XGBoost algorithm was used. As a result, the packing file was detected with an accuracy of 97.45% and the packer was identified with an accuracy of 98.41%. Through the experiment, it was confirmed that the feature extracted from the entry point is significant for the packing file detection and the packer detection.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System He和zeally的imd环境辅助生活系统认证协议的正式安全性验证
Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, I. You
Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security and privacy of these devices is among the highest priorities, as failing to do so would jeopardize the life of the patient. One way of maintaining the safety of IMDs is to design an authentication protocol between the IMDs and the external devices. With this regard, although several authentication schemes exist, a significant number of these protocols did not include formal verification to prove their secrecy against known attacks. One such authentication scheme is the He and Zeadally protocol for IMD-Enabled Ambient Assisted Living System. Accordingly, in this paper, we analyzed the security of this protocol by using formal verification methods -BAN-Logic and AVISPA. As a result, despite the protocol's strong qualities, we found that the protocol is insecure and fell short of other essential such as emergency authentication and key-update procedures.
植入式医疗器械(IMDs)在医疗和非医疗领域都发挥着至关重要的作用。因此,保护这些设备的安全和隐私是重中之重,否则将危及患者的生命。在imd与外部设备之间设计认证协议是维护imd安全的一种方法。在这方面,虽然存在几种身份验证方案,但这些协议中有相当一部分不包括正式验证,以证明其对已知攻击的保密性。一个这样的认证方案是他和Zeadally协议为imd支持的环境辅助生活系统。因此,本文采用形式化验证方法-BAN-Logic和AVISPA对该协议的安全性进行了分析。因此,尽管该协议具有强大的特性,但我们发现该协议是不安全的,并且缺乏其他必要的功能,例如紧急身份验证和密钥更新过程。
{"title":"A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System","authors":"Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, I. You","doi":"10.1145/3440943.3444735","DOIUrl":"https://doi.org/10.1145/3440943.3444735","url":null,"abstract":"Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security and privacy of these devices is among the highest priorities, as failing to do so would jeopardize the life of the patient. One way of maintaining the safety of IMDs is to design an authentication protocol between the IMDs and the external devices. With this regard, although several authentication schemes exist, a significant number of these protocols did not include formal verification to prove their secrecy against known attacks. One such authentication scheme is the He and Zeadally protocol for IMD-Enabled Ambient Assisted Living System. Accordingly, in this paper, we analyzed the security of this protocol by using formal verification methods -BAN-Logic and AVISPA. As a result, despite the protocol's strong qualities, we found that the protocol is insecure and fell short of other essential such as emergency authentication and key-update procedures.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121626539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration 面向安全服务部署的软件定义移动目标防御,通过自定义业务流程增强
Ki-Wan Kang, K. Park
In recent years, cloud native computing, which involves the deployment of scalable applications enhanced with containers, microservices, and serverless functions, has been actively studied to maximize its efficiency, flexibility, and economic feasibility. In this regard, studies on the security of the cloud native computing environment have been conducted. Among various studies on the security of these systems, moving target defense (MTD), which is an area of research that blocks various security threats in advance by actively changing the main properties of the protected target to deceive attackers, has been actively studied and developed. However, cloud native computing is highly dynamic; it is difficult to apply MTD technologies that actively change static system properties. Therefore, a software-defined MTD framework was designed for easier application of MTD technology to the cloud native environment. In this study, the user-defined adaptability of the software-defined MTD framework was implemented, and it was verified that the properties of the target service were changed according to previously defined mutation properties.
近年来,人们积极研究云原生计算,以最大限度地提高其效率、灵活性和经济可行性。云原生计算涉及使用容器、微服务和无服务器功能增强的可伸缩应用程序的部署。对此,人们对云原生计算环境的安全性进行了研究。在这些系统的各种安全性研究中,移动目标防御(MTD)是一种通过主动改变被保护目标的主要属性来提前阻断各种安全威胁以欺骗攻击者的研究领域,得到了积极的研究和发展。然而,云原生计算是高度动态的;主动改变系统静态特性的MTD技术很难应用。因此,设计了一个软件定义的MTD框架,以便更容易地将MTD技术应用于云原生环境。本研究实现了软件定义MTD框架的自定义适应性,并验证了目标服务的属性是根据先前定义的突变属性发生变化的。
{"title":"Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration","authors":"Ki-Wan Kang, K. Park","doi":"10.1145/3440943.3444725","DOIUrl":"https://doi.org/10.1145/3440943.3444725","url":null,"abstract":"In recent years, cloud native computing, which involves the deployment of scalable applications enhanced with containers, microservices, and serverless functions, has been actively studied to maximize its efficiency, flexibility, and economic feasibility. In this regard, studies on the security of the cloud native computing environment have been conducted. Among various studies on the security of these systems, moving target defense (MTD), which is an area of research that blocks various security threats in advance by actively changing the main properties of the protected target to deceive attackers, has been actively studied and developed. However, cloud native computing is highly dynamic; it is difficult to apply MTD technologies that actively change static system properties. Therefore, a software-defined MTD framework was designed for easier application of MTD technology to the cloud native environment. In this study, the user-defined adaptability of the software-defined MTD framework was implemented, and it was verified that the properties of the target service were changed according to previously defined mutation properties.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Breaking a Masked AES Implementation Using a Deep Learning-based Attack 使用基于深度学习的攻击破解被屏蔽的AES实现
Daehyeon Bae, Jongbae Hwang, JaeCheol Ha
The block cipher AES (Advanced Encryption Standard) is a cryptographic algorithm used to guarantee the confidentiality of a message. A masked implementation of AES is often used to increase resistance against SCA (Side Channel Attacks). This paper presents some deep learning-based attacks for extracting AES secret keys embedded in cryptographic devices. The proposed attack methods represent new approaches to computing the secret key by applying the mask profiling techniques. The MLP (Multi-Layer Perceptron) and CNN (Convolutional Neural Network) deep learning models are developed to break the masked AES implementation. Our experimental results show the overwhelming advantages of the novel attack methods when targeting both unmasked and masked implementation of AES.
分组密码AES (Advanced Encryption Standard)是一种用于保证消息机密性的加密算法。AES的掩码实现通常用于增强对SCA(侧信道攻击)的抵抗力。提出了几种基于深度学习的加密设备AES密钥提取攻击方法。提出的攻击方法代表了利用掩码分析技术计算密钥的新方法。开发了MLP(多层感知器)和CNN(卷积神经网络)深度学习模型来破解掩码AES实现。我们的实验结果表明,当针对AES的未掩码和掩码实现时,这种新的攻击方法具有压倒性的优势。
{"title":"Breaking a Masked AES Implementation Using a Deep Learning-based Attack","authors":"Daehyeon Bae, Jongbae Hwang, JaeCheol Ha","doi":"10.1145/3440943.3444724","DOIUrl":"https://doi.org/10.1145/3440943.3444724","url":null,"abstract":"The block cipher AES (Advanced Encryption Standard) is a cryptographic algorithm used to guarantee the confidentiality of a message. A masked implementation of AES is often used to increase resistance against SCA (Side Channel Attacks). This paper presents some deep learning-based attacks for extracting AES secret keys embedded in cryptographic devices. The proposed attack methods represent new approaches to computing the secret key by applying the mask profiling techniques. The MLP (Multi-Layer Perceptron) and CNN (Convolutional Neural Network) deep learning models are developed to break the masked AES implementation. Our experimental results show the overwhelming advantages of the novel attack methods when targeting both unmasked and masked implementation of AES.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1