In the field of Industrial Control Systems (ICS), engineering workstations are used to manage and control processes better. It can involve monitoring the status of the PLC (Programming Logic Controller) constituting the ICS and observing the PLC data in real time using the HMI function. Nonetheless, it is possible to gain control of SCADA through a DLL injection, which can cause a fatal accident. Therefore, this paper proposes a method of detecting the DLL Injection of engineering workstations used in the ICS environment and a technique to detect data change due to DLL Injection by analyzing PEB-LDR data. We also propose a method of detecting malicious DLL when such is suspected to have been loaded. As a result, successful detection was realized using the suggested method when DLL Injection occurred, and a warning message could be displayed.
{"title":"Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation","authors":"Junwon Kim, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444734","DOIUrl":"https://doi.org/10.1145/3440943.3444734","url":null,"abstract":"In the field of Industrial Control Systems (ICS), engineering workstations are used to manage and control processes better. It can involve monitoring the status of the PLC (Programming Logic Controller) constituting the ICS and observing the PLC data in real time using the HMI function. Nonetheless, it is possible to gain control of SCADA through a DLL injection, which can cause a fatal accident. Therefore, this paper proposes a method of detecting the DLL Injection of engineering workstations used in the ICS environment and a technique to detect data change due to DLL Injection by analyzing PEB-LDR data. We also propose a method of detecting malicious DLL when such is suspected to have been loaded. As a result, successful detection was realized using the suggested method when DLL Injection occurred, and a warning message could be displayed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125498134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
1The purpose of this paper is to propose an evaluation method which can help life hotel industry to select an appropriate green supply chain index for their green supply chain index sales representatives. The criteria for establishing the proposed algorithm are derived from a literature review and interviews with a group of experts in the hotel industry. The modified Fuzzy Delphi method is then adopted to analyze those results. This study aims to provide general green policies for hoteliers to reach sustainability, fill the gap of earlier studies to reshape green supply chain management of hotels, and offer weight of seventeen green practices as a means of measurement for hotel managers.
{"title":"Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective","authors":"Kuo-Cheng Chung, Silvia Wan-Ju Liang","doi":"10.1145/3440943.3444347","DOIUrl":"https://doi.org/10.1145/3440943.3444347","url":null,"abstract":"1The purpose of this paper is to propose an evaluation method which can help life hotel industry to select an appropriate green supply chain index for their green supply chain index sales representatives. The criteria for establishing the proposed algorithm are derived from a literature review and interviews with a group of experts in the hotel industry. The modified Fuzzy Delphi method is then adopted to analyze those results. This study aims to provide general green policies for hoteliers to reach sustainability, fill the gap of earlier studies to reshape green supply chain management of hotels, and offer weight of seventeen green practices as a means of measurement for hotel managers.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, edge intelligence is emerging. It is widely used because it allows you to make business models more efficient through edge intelligence, but there is still a lack of models to use for edge intelligence. Artificial neural networks are being used a lot because they solve the problem of overfitting, which is a disadvantage of artificial neural networks and increase the speed by improving GPU performance. However as the independent variable to be learned increases, the learning time and characteristics of the artificial neural network slow down and the size of the neural network becomes very heavier. The shortage of these artificial neural networks make it difficult to make edge intelligence for classification or prediction in real life. Manufacturing lightweight models using heavy neural networks and high-performance GPUs also presents a lot of financial problems. However, SVM based on statistical mathematics exists between machine learning. Although it is relatively inferior to artificial intelligence, it is better light and has stable performing. To do this, we propose an efficient data processing method that improves the characteristics of the SVM (the overall performance, accuracy and learning speed of the SVM) and makes it easier for the SVM to learn the data. When four types of data processing were applied, the accuracy increased by more than 0.4% for the iris data set and 2% on average for the other data sets, and the training time for all data sets was also reduced. As a result, SVMs that can process data efficiently are much lighter than artificial neural networks and have very good training times versus accuracy. Therefore, in this paper, we propose an efficient data processing method based on SVM for edge intelligence.
{"title":"Efficient data processing method for edge intelligence based on SVM","authors":"Namgyu Jung, Junho Yoon, Vially Kazadi Mutombo, Seungyeon Lee, Jusuk Lee, Chang-Hyun Choi","doi":"10.1145/3440943.3444728","DOIUrl":"https://doi.org/10.1145/3440943.3444728","url":null,"abstract":"Recently, edge intelligence is emerging. It is widely used because it allows you to make business models more efficient through edge intelligence, but there is still a lack of models to use for edge intelligence. Artificial neural networks are being used a lot because they solve the problem of overfitting, which is a disadvantage of artificial neural networks and increase the speed by improving GPU performance. However as the independent variable to be learned increases, the learning time and characteristics of the artificial neural network slow down and the size of the neural network becomes very heavier. The shortage of these artificial neural networks make it difficult to make edge intelligence for classification or prediction in real life. Manufacturing lightweight models using heavy neural networks and high-performance GPUs also presents a lot of financial problems. However, SVM based on statistical mathematics exists between machine learning. Although it is relatively inferior to artificial intelligence, it is better light and has stable performing. To do this, we propose an efficient data processing method that improves the characteristics of the SVM (the overall performance, accuracy and learning speed of the SVM) and makes it easier for the SVM to learn the data. When four types of data processing were applied, the accuracy increased by more than 0.4% for the iris data set and 2% on average for the other data sets, and the training time for all data sets was also reduced. As a result, SVMs that can process data efficiently are much lighter than artificial neural networks and have very good training times versus accuracy. Therefore, in this paper, we propose an efficient data processing method based on SVM for edge intelligence.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shi Chen
Farming fisheries are popular in Penghu, and traditional fisheries require a lot of manpower and time. This research integrates thermometer, pH meter, dissolved oxygen meter, and water quality sensor into a circuit board, and transmits the sensed value to the server. User can obtain the real-time information of fish farm through the mobile APP
{"title":"A Smart Monitoring System in Fish Farm","authors":"Yung-Cheng Yao, Yang-Chen Fan, Hsin-Fu Yu, Shi Chen","doi":"10.1145/3440943.3444352","DOIUrl":"https://doi.org/10.1145/3440943.3444352","url":null,"abstract":"Farming fisheries are popular in Penghu, and traditional fisheries require a lot of manpower and time. This research integrates thermometer, pH meter, dissolved oxygen meter, and water quality sensor into a circuit board, and transmits the sensed value to the server. User can obtain the real-time information of fish farm through the mobile APP","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Taiwanese government is advocating the maritime activities of "Salute to the Sea". Nowadays, sailing is a popular leisure activity in Taiwan and it is also an Olympic event. Sailing competition is a large-scale competition, so it needs multiple referees and aerial photography to supervise. However, due to the large number of sailboats and the large range of activities, the need to supervise the audience through the referee is a big problem. This article builds on the basis of deep learning to build a sailing electronic referee. If there is a possibility that the sailboat may violate the rules by turning on the motor, this article will make a judgment and notify the referee. This article builds a system to help the referee's work, and uses the aerial shooting machine for compre-hensive shooting monitoring to facilitate the fairness of the sailing competition. From the experimental results, it can be known that the method proposed in this arti-cle is feasible, and the film can also be transmitted back to the platform for archiving.
{"title":"On the Establishment of E-referee for Sailing Ships Based on Deep Learning","authors":"Ying Ling, Jo-Hung Yu, Chih-Chien Shen, Chien-Hung Wu","doi":"10.1145/3440943.3444346","DOIUrl":"https://doi.org/10.1145/3440943.3444346","url":null,"abstract":"The Taiwanese government is advocating the maritime activities of \"Salute to the Sea\". Nowadays, sailing is a popular leisure activity in Taiwan and it is also an Olympic event. Sailing competition is a large-scale competition, so it needs multiple referees and aerial photography to supervise. However, due to the large number of sailboats and the large range of activities, the need to supervise the audience through the referee is a big problem. This article builds on the basis of deep learning to build a sailing electronic referee. If there is a possibility that the sailboat may violate the rules by turning on the motor, this article will make a judgment and notify the referee. This article builds a system to help the referee's work, and uses the aerial shooting machine for compre-hensive shooting monitoring to facilitate the fairness of the sailing competition. From the experimental results, it can be known that the method proposed in this arti-cle is feasible, and the film can also be transmitted back to the platform for archiving.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yueh-Shiu Lee, Changqing Yang, Tsai-Yu Lai, Tzu-Hsuan Lin
1Firstly, each student will need to wear a Beacon launcher and install cameras at all wide-area spaces. When a student tested positive for the disease, the technique of BlockChain can track the past paths of the student and can further understand whom the student had met. Additionally, cameras can help to find out the gathering conditions. This research utilizes the features of BlockChain to protect the whereabouts information of students; moreover, the feature of tamper resistance of BlockChain ensures the data security.
{"title":"BlockChain Develops Student Positioning System on Campus","authors":"Yueh-Shiu Lee, Changqing Yang, Tsai-Yu Lai, Tzu-Hsuan Lin","doi":"10.1145/3440943.3444340","DOIUrl":"https://doi.org/10.1145/3440943.3444340","url":null,"abstract":"1Firstly, each student will need to wear a Beacon launcher and install cameras at all wide-area spaces. When a student tested positive for the disease, the technique of BlockChain can track the past paths of the student and can further understand whom the student had met. Additionally, cameras can help to find out the gathering conditions. This research utilizes the features of BlockChain to protect the whereabouts information of students; moreover, the feature of tamper resistance of BlockChain ensures the data security.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of IT technology, the number of new and variant malware is rapidly increasing. Malware developers make it difficult to analyze malware by applying techniques such as packing and obfuscation. In this paper, packing file detection and packer identification were tested using N bytes of data extracted from the entry point of the PE file as a feature. To verify the feature performance, the ensemble model XGBoost algorithm was used. As a result, the packing file was detected with an accuracy of 97.45% and the packer was identified with an accuracy of 98.41%. Through the experiment, it was confirmed that the feature extracted from the entry point is significant for the packing file detection and the packer detection.
{"title":"XGBoost based Packer Identification study using Entry point","authors":"Sejin Kim, Taejin Lee","doi":"10.1145/3440943.3444358","DOIUrl":"https://doi.org/10.1145/3440943.3444358","url":null,"abstract":"With the development of IT technology, the number of new and variant malware is rapidly increasing. Malware developers make it difficult to analyze malware by applying techniques such as packing and obfuscation. In this paper, packing file detection and packer identification were tested using N bytes of data extracted from the entry point of the PE file as a feature. To verify the feature performance, the ensemble model XGBoost algorithm was used. As a result, the packing file was detected with an accuracy of 97.45% and the packer was identified with an accuracy of 98.41%. Through the experiment, it was confirmed that the feature extracted from the entry point is significant for the packing file detection and the packer detection.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, I. You
Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security and privacy of these devices is among the highest priorities, as failing to do so would jeopardize the life of the patient. One way of maintaining the safety of IMDs is to design an authentication protocol between the IMDs and the external devices. With this regard, although several authentication schemes exist, a significant number of these protocols did not include formal verification to prove their secrecy against known attacks. One such authentication scheme is the He and Zeadally protocol for IMD-Enabled Ambient Assisted Living System. Accordingly, in this paper, we analyzed the security of this protocol by using formal verification methods -BAN-Logic and AVISPA. As a result, despite the protocol's strong qualities, we found that the protocol is insecure and fell short of other essential such as emergency authentication and key-update procedures.
{"title":"A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System","authors":"Daniel Gerbi Duguma, Jiyoon Kim, Bonam Kim, I. You","doi":"10.1145/3440943.3444735","DOIUrl":"https://doi.org/10.1145/3440943.3444735","url":null,"abstract":"Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security and privacy of these devices is among the highest priorities, as failing to do so would jeopardize the life of the patient. One way of maintaining the safety of IMDs is to design an authentication protocol between the IMDs and the external devices. With this regard, although several authentication schemes exist, a significant number of these protocols did not include formal verification to prove their secrecy against known attacks. One such authentication scheme is the He and Zeadally protocol for IMD-Enabled Ambient Assisted Living System. Accordingly, in this paper, we analyzed the security of this protocol by using formal verification methods -BAN-Logic and AVISPA. As a result, despite the protocol's strong qualities, we found that the protocol is insecure and fell short of other essential such as emergency authentication and key-update procedures.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121626539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, cloud native computing, which involves the deployment of scalable applications enhanced with containers, microservices, and serverless functions, has been actively studied to maximize its efficiency, flexibility, and economic feasibility. In this regard, studies on the security of the cloud native computing environment have been conducted. Among various studies on the security of these systems, moving target defense (MTD), which is an area of research that blocks various security threats in advance by actively changing the main properties of the protected target to deceive attackers, has been actively studied and developed. However, cloud native computing is highly dynamic; it is difficult to apply MTD technologies that actively change static system properties. Therefore, a software-defined MTD framework was designed for easier application of MTD technology to the cloud native environment. In this study, the user-defined adaptability of the software-defined MTD framework was implemented, and it was verified that the properties of the target service were changed according to previously defined mutation properties.
{"title":"Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration","authors":"Ki-Wan Kang, K. Park","doi":"10.1145/3440943.3444725","DOIUrl":"https://doi.org/10.1145/3440943.3444725","url":null,"abstract":"In recent years, cloud native computing, which involves the deployment of scalable applications enhanced with containers, microservices, and serverless functions, has been actively studied to maximize its efficiency, flexibility, and economic feasibility. In this regard, studies on the security of the cloud native computing environment have been conducted. Among various studies on the security of these systems, moving target defense (MTD), which is an area of research that blocks various security threats in advance by actively changing the main properties of the protected target to deceive attackers, has been actively studied and developed. However, cloud native computing is highly dynamic; it is difficult to apply MTD technologies that actively change static system properties. Therefore, a software-defined MTD framework was designed for easier application of MTD technology to the cloud native environment. In this study, the user-defined adaptability of the software-defined MTD framework was implemented, and it was verified that the properties of the target service were changed according to previously defined mutation properties.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The block cipher AES (Advanced Encryption Standard) is a cryptographic algorithm used to guarantee the confidentiality of a message. A masked implementation of AES is often used to increase resistance against SCA (Side Channel Attacks). This paper presents some deep learning-based attacks for extracting AES secret keys embedded in cryptographic devices. The proposed attack methods represent new approaches to computing the secret key by applying the mask profiling techniques. The MLP (Multi-Layer Perceptron) and CNN (Convolutional Neural Network) deep learning models are developed to break the masked AES implementation. Our experimental results show the overwhelming advantages of the novel attack methods when targeting both unmasked and masked implementation of AES.
{"title":"Breaking a Masked AES Implementation Using a Deep Learning-based Attack","authors":"Daehyeon Bae, Jongbae Hwang, JaeCheol Ha","doi":"10.1145/3440943.3444724","DOIUrl":"https://doi.org/10.1145/3440943.3444724","url":null,"abstract":"The block cipher AES (Advanced Encryption Standard) is a cryptographic algorithm used to guarantee the confidentiality of a message. A masked implementation of AES is often used to increase resistance against SCA (Side Channel Attacks). This paper presents some deep learning-based attacks for extracting AES secret keys embedded in cryptographic devices. The proposed attack methods represent new approaches to computing the secret key by applying the mask profiling techniques. The MLP (Multi-Layer Perceptron) and CNN (Convolutional Neural Network) deep learning models are developed to break the masked AES implementation. Our experimental results show the overwhelming advantages of the novel attack methods when targeting both unmasked and masked implementation of AES.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}