首页 > 最新文献

2015 10th International Conference on Availability, Reliability and Security最新文献

英文 中文
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices 基于移动设备冷启动取证的轻量级框架
Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans P. Reiser, G. Sigl
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits theremanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main memory. This tool requires no more than five kilobytes of constant data in the kernel code section. We hence sustain all of the data relevant for the analysis of the previously running system. This makes it possible to analyze the memory with data acquisition tools. For this purpose, we extend the memory forensics tool Volatility in order to request parts of the main memory dynamically from our bare metal application. We show the feasibility of our approach by comparing it to a traditional memory dump based analysis using the Samsung Galaxy S4 mobile device.
移动设备,如平板电脑和智能手机,在日常生活中很常见。因此,这些设备能够提供的针对数字取证的安全程度是特别值得关注的。访问主存中任意数据的一种常用方法是冷启动攻击。冷启动攻击利用了在断电的情况下使DRAM模块中的数据不会立即丢失内容的持久性效应。这使得重新启动设备并从主存中提取数据成为可能。在本文中,我们提出了一种新的基于冷启动的数据采集框架,在移动设备上具有最小的裸机应用程序。与其他冷引导方法相比,我们的取证工具只覆盖主内存中最少量的数据。该工具在内核代码部分中需要的常量数据不超过5kb。因此,我们保留了所有与分析先前运行的系统相关的数据。这使得用数据采集工具分析内存成为可能。为此,我们扩展了内存取证工具波动性,以便从裸机应用程序动态请求部分主内存。我们通过将其与使用三星Galaxy S4移动设备的传统内存转储分析进行比较,证明了我们方法的可行性。
{"title":"A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices","authors":"Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans P. Reiser, G. Sigl","doi":"10.1109/ARES.2015.47","DOIUrl":"https://doi.org/10.1109/ARES.2015.47","url":null,"abstract":"Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits theremanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main memory. This tool requires no more than five kilobytes of constant data in the kernel code section. We hence sustain all of the data relevant for the analysis of the previously running system. This makes it possible to analyze the memory with data acquisition tools. For this purpose, we extend the memory forensics tool Volatility in order to request parts of the main memory dynamically from our bare metal application. We show the feasibility of our approach by comparing it to a traditional memory dump based analysis using the Samsung Galaxy S4 mobile device.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Malicious Insiders with Ties to the Internet Underground Community 与互联网地下社区有联系的恶意内部人士
Jason W. Clark, Matt Collins, Jeremy R. Strozer
In this paper, we investigate insider threat cases in which the insider had relationships with the Internet under-ground community. To this end, we begin by explaining our insider threat corpus and the current state of Internet underground forums. Next, we provide a discussion of each of the 17 cases that blend insider threat with the use of malicious Internet underground forums. Based on those cases, we provide an in-depth analysis to include:1) who the insiders are, 2) why they strike, 3) how they strike, 4) what sectors are most at risk, and 5) how the insiders were identified. Lastly, we describe our aggregated results and provide best practices to help mitigate the type of insider threat we describe.
在本文中,我们研究了内部人员与互联网地下社区有关系的内部人员威胁案例。为此,我们首先解释我们的内部威胁语料库和互联网地下论坛的现状。接下来,我们将对17个案例中的每一个进行讨论,这些案例将内部威胁与恶意互联网地下论坛的使用相结合。基于这些案例,我们提供了深入的分析,包括:1)内部人是谁,2)他们为什么罢工,3)他们如何罢工,4)哪些行业风险最大,以及5)如何识别内部人。最后,我们描述了我们的汇总结果,并提供了帮助减轻我们所描述的内部威胁类型的最佳实践。
{"title":"Malicious Insiders with Ties to the Internet Underground Community","authors":"Jason W. Clark, Matt Collins, Jeremy R. Strozer","doi":"10.1109/ARES.2015.63","DOIUrl":"https://doi.org/10.1109/ARES.2015.63","url":null,"abstract":"In this paper, we investigate insider threat cases in which the insider had relationships with the Internet under-ground community. To this end, we begin by explaining our insider threat corpus and the current state of Internet underground forums. Next, we provide a discussion of each of the 17 cases that blend insider threat with the use of malicious Internet underground forums. Based on those cases, we provide an in-depth analysis to include:1) who the insiders are, 2) why they strike, 3) how they strike, 4) what sectors are most at risk, and 5) how the insiders were identified. Lastly, we describe our aggregated results and provide best practices to help mitigate the type of insider threat we describe.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Measurement of Data Locations in the Cloud 云中数据位置的测量
Bernd Jäger, Reiner Kraft, Sebastian Luhn, Ann Selzer, Ulrich Waldmann
If a company uses cloud computing services to process their employees or their customers personal data, they need to ensure that the cloud provider complies with the relevant privacy statues. One of the things that need to be ensured is that all personal data are processed only in lawful locations. Data sources that can be used to automatically determine the current location of data processing could help cloud users to ful fill their duty and to strengthen the confidence in a privacy friendly processing of their personal data. For that, data location metrics need to be defined, appropriate data sources need to be determined and the measured data need to be combined reasonable. This paper describes the procedure and system architecture of such data location metrics.
如果一家公司使用云计算服务来处理其员工或客户的个人数据,则需要确保云提供商遵守相关的隐私法规。需要确保的一件事是,所有个人数据只在合法地点处理。可用于自动确定数据处理的当前位置的数据源可以帮助云用户充分履行其职责,并增强对其个人数据的友好隐私处理的信心。为此,需要定义数据位置度量,需要确定适当的数据源,需要合理地组合测量的数据。本文描述了这种数据位置度量的实现过程和系统结构。
{"title":"The Measurement of Data Locations in the Cloud","authors":"Bernd Jäger, Reiner Kraft, Sebastian Luhn, Ann Selzer, Ulrich Waldmann","doi":"10.1109/ARES.2015.37","DOIUrl":"https://doi.org/10.1109/ARES.2015.37","url":null,"abstract":"If a company uses cloud computing services to process their employees or their customers personal data, they need to ensure that the cloud provider complies with the relevant privacy statues. One of the things that need to be ensured is that all personal data are processed only in lawful locations. Data sources that can be used to automatically determine the current location of data processing could help cloud users to ful fill their duty and to strengthen the confidence in a privacy friendly processing of their personal data. For that, data location metrics need to be defined, appropriate data sources need to be determined and the measured data need to be combined reasonable. This paper describes the procedure and system architecture of such data location metrics.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment 虚拟化网络环境下新功能的监控与保护
B. Mathieu, G. Doyen, Wissam Mallouli, T. Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca
Network operators are currently very cautious before deploying a new network equipment. This is done only if the new networking solution is fully monitored, secured and can provide rapid revenues (short Return of Investment). For example, the NDN (Named Data Networking) solution is admitted as promising but still uncertain, thus making network operators reluctant to deploy it. Having a flexible environment would allow network operators to initiate the deployment of new network solutions at low cost and low risk. The virtualization techniques, appeared a few years ago, can help to provide such a flexible networking architecture. However, with it, emerge monitoring and security issues which should be solved. In this paper, we present our secure virtualized networking environment to deploy new functions and protocol stacks in the network, with a specific focus on the NDN use-case as one of the potential Future Internet technology. As strong requirements for a network operator, we then focus on monitoring and security components, highlighting where and how they can be deployed and used. Finally, we introduce our preliminary evaluation, with a focus on security, before presenting the test bed, involving end-users consuming real contents, that we will set up for the assessment of our approach.
网络运营商目前在部署新的网络设备之前非常谨慎。只有在新的网络解决方案得到充分监控、安全并能提供快速收益(短期投资回报)的情况下,才能做到这一点。例如,NDN(命名数据网络)解决方案被认为是有前途的,但仍然存在不确定性,从而使网络运营商不愿部署它。拥有一个灵活的环境将允许网络运营商以低成本和低风险启动新的网络解决方案的部署。几年前出现的虚拟化技术可以帮助提供这种灵活的网络架构。但是,随着它的出现,出现了需要解决的监控和安全问题。在本文中,我们提出了我们的安全虚拟化网络环境,以在网络中部署新的功能和协议栈,并特别关注NDN用例作为潜在的未来互联网技术之一。作为对网络运营商的强烈要求,我们将重点放在监控和安全组件上,强调在哪里以及如何部署和使用它们。最后,在展示测试平台之前,我们将介绍我们的初步评估,重点放在安全性上,包括最终用户消费的真实内容,我们将为评估我们的方法设置测试平台。
{"title":"Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment","authors":"B. Mathieu, G. Doyen, Wissam Mallouli, T. Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca","doi":"10.1109/ARES.2015.71","DOIUrl":"https://doi.org/10.1109/ARES.2015.71","url":null,"abstract":"Network operators are currently very cautious before deploying a new network equipment. This is done only if the new networking solution is fully monitored, secured and can provide rapid revenues (short Return of Investment). For example, the NDN (Named Data Networking) solution is admitted as promising but still uncertain, thus making network operators reluctant to deploy it. Having a flexible environment would allow network operators to initiate the deployment of new network solutions at low cost and low risk. The virtualization techniques, appeared a few years ago, can help to provide such a flexible networking architecture. However, with it, emerge monitoring and security issues which should be solved. In this paper, we present our secure virtualized networking environment to deploy new functions and protocol stacks in the network, with a specific focus on the NDN use-case as one of the potential Future Internet technology. As strong requirements for a network operator, we then focus on monitoring and security components, highlighting where and how they can be deployed and used. Finally, we introduce our preliminary evaluation, with a focus on security, before presenting the test bed, involving end-users consuming real contents, that we will set up for the assessment of our approach.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Empirical Study of Click Fraud in Mobile Advertising Networks 移动广告网络中点击欺诈的实证研究
Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim
Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of a type of mobile advertisement where advertisers are charged for their advertisements only when a user clicks (or touches) on the advertisements in their applications. In the Android platform, we design an automated click generation attack and empirically evaluate eight popular advertising networks by performing real attacks on them. Our experimental results show that six advertising networks (75%) out of eight (Millennial Media, App Lovin, Ad Fit, Mdot M, Rev Mob and Cauly Ads) are vulnerable to our attacks. We also discuss how to develop effective defense mechanisms to mitigate such automated click fraud attacks.
智能手机广告越来越多地出现在许多应用中,并允许开发者通过应用内广告获得收益。我们的研究旨在识别一种移动广告的潜在安全风险,即只有当用户在其应用程序中点击(或触摸)广告时,广告商才会为其广告付费。在Android平台上,我们设计了一种自动点击生成攻击,并通过对8个流行的广告网络进行实际攻击来对它们进行经验评估。我们的实验结果表明,8个广告网络中有6个(75%)(Millennial Media、App Lovin、Ad Fit、Mdot M、Rev Mob和Cauly Ads)容易受到我们的攻击。我们还讨论了如何开发有效的防御机制来减轻这种自动点击欺诈攻击。
{"title":"An Empirical Study of Click Fraud in Mobile Advertising Networks","authors":"Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim","doi":"10.1109/ARES.2015.62","DOIUrl":"https://doi.org/10.1109/ARES.2015.62","url":null,"abstract":"Smartphone advertisement is increasingly used among many applications and allows developers to obtain revenue through in-app advertising. Our study aims at identifying potential security risks of a type of mobile advertisement where advertisers are charged for their advertisements only when a user clicks (or touches) on the advertisements in their applications. In the Android platform, we design an automated click generation attack and empirically evaluate eight popular advertising networks by performing real attacks on them. Our experimental results show that six advertising networks (75%) out of eight (Millennial Media, App Lovin, Ad Fit, Mdot M, Rev Mob and Cauly Ads) are vulnerable to our attacks. We also discuss how to develop effective defense mechanisms to mitigate such automated click fraud attacks.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117281903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Incremental Development of RBAC-Controlled E-Marking System Using the B Method 基于B方法的rbac控制电子阅卷系统的增量开发
Nasser Al-Hadhrami, B. Aziz, S. Sardesai, L. B. Othmane
Role Based Access Control (RBAC) models are access policies that associate access rights to roles of subjects on objects. The incremental development of software by adding new features and the insertion of new access rules potentially render the model inconsistent and create security flaws. This paper proposes modeling RBAC models using the B language such that it is possible to reevaluate the consistency of the models following model changes. It shows the mechanism of formalizing RBAC policies of an Electronic Marking System (EMS) using B specifications and illustrates the verification of the consistency of the RBAC specification, using model checking and proof obligations.
基于角色的访问控制(RBAC)模型是将访问权限与对象上的主题角色关联起来的访问策略。通过添加新功能和插入新的访问规则而进行的软件增量开发可能会使模型不一致并产生安全缺陷。本文建议使用B语言对RBAC模型进行建模,以便在模型更改后重新评估模型的一致性。它展示了使用B规范形式化电子标识系统(EMS)的RBAC策略的机制,并说明了使用模型检查和证明义务对RBAC规范的一致性进行验证。
{"title":"Incremental Development of RBAC-Controlled E-Marking System Using the B Method","authors":"Nasser Al-Hadhrami, B. Aziz, S. Sardesai, L. B. Othmane","doi":"10.1109/ARES.2015.95","DOIUrl":"https://doi.org/10.1109/ARES.2015.95","url":null,"abstract":"Role Based Access Control (RBAC) models are access policies that associate access rights to roles of subjects on objects. The incremental development of software by adding new features and the insertion of new access rules potentially render the model inconsistent and create security flaws. This paper proposes modeling RBAC models using the B language such that it is possible to reevaluate the consistency of the models following model changes. It shows the mechanism of formalizing RBAC policies of an Electronic Marking System (EMS) using B specifications and illustrates the verification of the consistency of the RBAC specification, using model checking and proof obligations.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks PScore:在线社交网络中增强隐私意识的框架
Georgios Petkos, S. Papadopoulos, Y. Kompatsiaris
The phenomenal increase in the use of social media in recent years has raised a number of issues related to privacy. In this paper, we propose a framework for raising the awareness of Online Social Network (OSN) users with respect to the information about them that is disclosed and that can be inferred by OSN service operators as well as by third parties that can access their data. This framework takes the form of a semantic, hierarchical scoring structure, that enables users to easily browse over different privacy-related aspects of their presence in a social network. Contrary to previous privacy scoring approaches, the proposed framework provides a finer and more intuitive organization of privacy information. Importantly, it also takes into account both information that is explicitly mentioned in users' shared content, as well as implicit information, that may be inferred from it. We make available an open source implementation of the framework.
近年来,社交媒体使用的惊人增长引发了许多与隐私有关的问题。在本文中,我们提出了一个框架,用于提高在线社交网络(OSN)用户对其披露的信息的认识,这些信息可以被OSN服务运营商以及可以访问其数据的第三方推断出来。该框架采用语义、分层评分结构的形式,使用户能够轻松浏览他们在社交网络中存在的与隐私相关的不同方面。与以前的隐私评分方法相反,所提出的框架提供了更精细、更直观的隐私信息组织。重要的是,它还考虑了用户共享内容中明确提到的信息,以及可能从中推断出的隐含信息。我们提供了该框架的开源实现。
{"title":"PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks","authors":"Georgios Petkos, S. Papadopoulos, Y. Kompatsiaris","doi":"10.1109/ARES.2015.80","DOIUrl":"https://doi.org/10.1109/ARES.2015.80","url":null,"abstract":"The phenomenal increase in the use of social media in recent years has raised a number of issues related to privacy. In this paper, we propose a framework for raising the awareness of Online Social Network (OSN) users with respect to the information about them that is disclosed and that can be inferred by OSN service operators as well as by third parties that can access their data. This framework takes the form of a semantic, hierarchical scoring structure, that enables users to easily browse over different privacy-related aspects of their presence in a social network. Contrary to previous privacy scoring approaches, the proposed framework provides a finer and more intuitive organization of privacy information. Importantly, it also takes into account both information that is explicitly mentioned in users' shared content, as well as implicit information, that may be inferred from it. We make available an open source implementation of the framework.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches 看你穿什么:智能手表的初步法医分析
I. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee
This work presents preliminary forensic analysis of two popular smart watches, the Samsung Gear 2 Neo and LG G. These wearable computing devices have the form factor of watches and sync with smart phones to display notifications, track footsteps and record voice messages. We posit that as smart watches are adopted by more users, the potential for them becoming a haven for digital evidence will increase thus providing utility for this preliminary work. In our work, we examined the forensic artifacts that are left on a Samsung Galaxy S4 Active phone that was used to sync with the Samsung Gear 2 Neo watch and the LG G watch. We further outline a methodology for physically acquiring data from the watches after gaining root access to them. Our results show that we can recover a swath of digital evidence directly form the watches when compared to the data on the phone that is synced with the watches. Furthermore, to root the LG G watch, the watch has to be reset to its factory settings which is alarming because the process may delete data of forensic relevance. Although this method is forensically intrusive, it may be used for acquiring data from already rooted LG watches. It is our observation that the data at the core of the functionality of at least the two tested smart watches, messages, health and fitness data, e-mails, contacts, events and notifications are accessible directly from the acquired images of the watches, which affirms our claim that the forensic value of evidence from smart watches is worthy of further study and should be investigated both at a high level and with greater specificity and granularity.
这项工作对两款流行的智能手表,三星Gear 2 Neo和LG g进行了初步的分析。这些可穿戴的计算设备具有手表的外形,并与智能手机同步显示通知,跟踪脚步和记录语音信息。我们认为,随着越来越多的用户采用智能手表,它们成为数字证据避风港的可能性将会增加,从而为这项初步工作提供实用性。在工作中,我们检查了用于与三星Gear 2 Neo手表和LG G手表同步的三星Galaxy S4 Active手机上留下的法医文物。我们进一步概述了在获得根访问权限后从手表中物理获取数据的方法。我们的研究结果表明,与与手表同步的手机数据相比,我们可以直接从手表中恢复一段数字证据。另外,LG G手表要想重新启动,必须将手表重置为出厂设置,这一过程可能会删除与取证相关的数据,这令人担忧。虽然这种方法在法律上是侵入性的,但它可以用来获取已经扎根的LG手表的数据。根据我们的观察,至少在两款被测试的智能手表中,信息、健康和健身数据、电子邮件、联系人、事件和通知等功能的核心数据可以直接从获得的手表图像中获取,这证实了我们的说法,即智能手表证据的法医价值值得进一步研究,应该在更高的水平上进行更具体和更细的调查。
{"title":"Watch What You Wear: Preliminary Forensic Analysis of Smart Watches","authors":"I. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee","doi":"10.1109/ARES.2015.39","DOIUrl":"https://doi.org/10.1109/ARES.2015.39","url":null,"abstract":"This work presents preliminary forensic analysis of two popular smart watches, the Samsung Gear 2 Neo and LG G. These wearable computing devices have the form factor of watches and sync with smart phones to display notifications, track footsteps and record voice messages. We posit that as smart watches are adopted by more users, the potential for them becoming a haven for digital evidence will increase thus providing utility for this preliminary work. In our work, we examined the forensic artifacts that are left on a Samsung Galaxy S4 Active phone that was used to sync with the Samsung Gear 2 Neo watch and the LG G watch. We further outline a methodology for physically acquiring data from the watches after gaining root access to them. Our results show that we can recover a swath of digital evidence directly form the watches when compared to the data on the phone that is synced with the watches. Furthermore, to root the LG G watch, the watch has to be reset to its factory settings which is alarming because the process may delete data of forensic relevance. Although this method is forensically intrusive, it may be used for acquiring data from already rooted LG watches. It is our observation that the data at the core of the functionality of at least the two tested smart watches, messages, health and fitness data, e-mails, contacts, events and notifications are accessible directly from the acquired images of the watches, which affirms our claim that the forensic value of evidence from smart watches is worthy of further study and should be investigated both at a high level and with greater specificity and granularity.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127803754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
2020 Cybercrime Economic Costs: No Measure No Solution 2020网络犯罪的经济成本:无措施无解决方案
J. Armin, Bryn Thompson, Davide Ariu, G. Giacinto, F. Roli, P. Kijewski
Governments needs reliable data on crime in order to both devise adequate policies, and allocate the correct revenues so that the measures are cost-effective, i.e., The money spent in prevention, detection, and handling of security incidents is balanced with a decrease in losses from offences. The analysis of the actual scenario of government actions in cyber security shows that the availability of multiple contrasting figures on the impact of cyber-attacks is holding back the adoption of policies for cyber space as their cost-effectiveness cannot be clearly assessed. The most relevant literature on the topic is reviewed to highlight the research gaps and to determine the related future research issues that need addressing to provide a solid ground for future legislative and regulatory actions at national and international levels.
政府需要可靠的犯罪数据,以便制定适当的政策,并分配正确的收入,使这些措施具有成本效益,即,用于预防、侦查和处理安全事件的资金与犯罪损失的减少相平衡。对政府在网络安全方面行动的实际情况的分析表明,关于网络攻击影响的多种对比数据的可用性阻碍了网络空间政策的采用,因为它们的成本效益无法明确评估。本文回顾了与该主题最相关的文献,以突出研究差距,并确定需要解决的相关未来研究问题,为未来在国家和国际层面的立法和监管行动提供坚实的基础。
{"title":"2020 Cybercrime Economic Costs: No Measure No Solution","authors":"J. Armin, Bryn Thompson, Davide Ariu, G. Giacinto, F. Roli, P. Kijewski","doi":"10.1109/ARES.2015.56","DOIUrl":"https://doi.org/10.1109/ARES.2015.56","url":null,"abstract":"Governments needs reliable data on crime in order to both devise adequate policies, and allocate the correct revenues so that the measures are cost-effective, i.e., The money spent in prevention, detection, and handling of security incidents is balanced with a decrease in losses from offences. The analysis of the actual scenario of government actions in cyber security shows that the availability of multiple contrasting figures on the impact of cyber-attacks is holding back the adoption of policies for cyber space as their cost-effectiveness cannot be clearly assessed. The most relevant literature on the topic is reviewed to highlight the research gaps and to determine the related future research issues that need addressing to provide a solid ground for future legislative and regulatory actions at national and international levels.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Trust Negotiation Based Approach to Enforce MANET Routing Security 基于信任协商的MANET路由安全增强方法
Aida Ben Chehida Douss, S. Ayed, Ryma Abassi, N. Cuppens-Boulahia, S. Fatmi
MANETs (Mobile Ad hoc Networks) are described assets of mobile nodes connected with wireless links. To be efficient, routing protocols in MANETs should, in fact, manage mobility, handle nodes energy dissipation and ensure security. We argue in this paper that trust negotiation is appropriate in such context to enhance the network performances. Trust concept is of concern to communication and network protocol designers. Thus, building trust relationships among participating nodes is critical to enabling collaborative optimization of system metrics. The main contribution of this paper is an extension of our previous proposition DTMCA (Delegation Trust Mobility-based Clustering Approach) which defines a new clustering approach, a trust management process and a delegation process. This environment allows the localization and the isolation of malicious nodes in MANETs. The extension proposed in this paper extends the trust management process by adding a trust negotiation module used in order to minimize the risk that malicious nodes join the MANETs.
manet(移动自组织网络)被描述为通过无线链路连接的移动节点的资产。为了提高效率,路由协议实际上应该管理移动性、处理节点能量耗散和确保安全性。本文认为,在这种情况下,信任协商是提高网络性能的合适方法。信任概念是通信和网络协议设计者所关心的问题。因此,在参与节点之间建立信任关系对于实现系统度量的协作优化至关重要。本文的主要贡献是扩展了我们之前的提案DTMCA(基于委托信任移动的聚类方法),该提案定义了一种新的聚类方法,信任管理过程和委托过程。这种环境允许在manet中定位和隔离恶意节点。本文提出的扩展扩展了信任管理过程,增加了一个信任协商模块,用于最小化恶意节点加入manet的风险。
{"title":"Trust Negotiation Based Approach to Enforce MANET Routing Security","authors":"Aida Ben Chehida Douss, S. Ayed, Ryma Abassi, N. Cuppens-Boulahia, S. Fatmi","doi":"10.1109/ARES.2015.99","DOIUrl":"https://doi.org/10.1109/ARES.2015.99","url":null,"abstract":"MANETs (Mobile Ad hoc Networks) are described assets of mobile nodes connected with wireless links. To be efficient, routing protocols in MANETs should, in fact, manage mobility, handle nodes energy dissipation and ensure security. We argue in this paper that trust negotiation is appropriate in such context to enhance the network performances. Trust concept is of concern to communication and network protocol designers. Thus, building trust relationships among participating nodes is critical to enabling collaborative optimization of system metrics. The main contribution of this paper is an extension of our previous proposition DTMCA (Delegation Trust Mobility-based Clustering Approach) which defines a new clustering approach, a trust management process and a delegation process. This environment allows the localization and the isolation of malicious nodes in MANETs. The extension proposed in this paper extends the trust management process by adding a trust negotiation module used in order to minimize the risk that malicious nodes join the MANETs.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 10th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1