首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers 系统的安全和隐私审查:物联网层的攻击和预防机制
Pub Date : 2022-08-05 DOI: 10.4108/eetss.v8i30.590
M. Akhtar, Tao Feng
In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive). The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT. This paper provides an outline of IoT security attacks on Three-Layer Architecture: Three-layer such as application layer, network layer, perception layer/physical layer and attacks that are associated with these layers will be discussed. Moreover, this paper will provide some possible solution mechanisms for such attacks. The aim is to produce a radical survey associated with the privacy and security challenges of the IoT. This paper addresses these challenges from the attitude of technologies and design used. The objective of this paper is to rendering possible solution for various attacks on different layers of IoT architecture. It also presents comparison based on reviewing multiple solutions and defines the best one solution for a specific attack on particular layer.
在这个当代时代,物联网被应用于生活的各个领域。最近的软件(例如,车辆网络,智能电网和可穿戴)是在其使用的结果中建立起来的;此外,作为各种古老领域(例如,医疗和汽车)的发展,巩固和革命。连接的设备数量以及系统的临时性质可能会加剧这种情况。因此,安全和隐私已成为物联网面临的一大挑战。本文概述了三层架构下的物联网安全攻击:将讨论应用层、网络层、感知层/物理层等三层,以及与这些层相关的攻击。此外,本文还将提供一些可能的解决机制。目的是针对物联网的隐私和安全挑战进行一项激进的调查。本文从技术的态度和所使用的设计来解决这些挑战。本文的目的是为物联网架构不同层的各种攻击提供可能的解决方案。它还提供了基于审查多个解决方案的比较,并定义了针对特定层的特定攻击的最佳解决方案。
{"title":"A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers","authors":"M. Akhtar, Tao Feng","doi":"10.4108/eetss.v8i30.590","DOIUrl":"https://doi.org/10.4108/eetss.v8i30.590","url":null,"abstract":"In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive). The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT. This paper provides an outline of IoT security attacks on Three-Layer Architecture: Three-layer such as application layer, network layer, perception layer/physical layer and attacks that are associated with these layers will be discussed. Moreover, this paper will provide some possible solution mechanisms for such attacks. The aim is to produce a radical survey associated with the privacy and security challenges of the IoT. This paper addresses these challenges from the attitude of technologies and design used. The objective of this paper is to rendering possible solution for various attacks on different layers of IoT architecture. It also presents comparison based on reviewing multiple solutions and defines the best one solution for a specific attack on particular layer.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mitigating Vulnerabilities in Closed Source Software 减少闭源软件中的漏洞
Pub Date : 2022-08-04 DOI: 10.4108/eetss.v8i30.253
Zhen Huang, Gang Tan, Xiaowei Yu
Many techniques have been proposed to harden programs with protection mechanisms to defend against vulnerability exploits. Unfortunately the vast majority of them cannot be applied to closed source software because they require access to program source code. This paper presents our work on automatically hardening binary code with security workarounds, a protection mechanism that prevents vulnerabilities from being triggered by disabling vulnerable code. By working solely with binary code, our approach is applicable to closed source software. To automatically synthesize security workarounds, we develop binary program analysis techniques to identify existing error handling code in binary code, synthesize security workarounds in the form of binary code, and instrument security workarounds into binary programs. We designed and implemented a prototype or our approach for Windows and Linux binary programs. Our evaluation shows that our approach can apply security workarounds to an average of 69.3% of program code and the security workarounds successfully prevents exploits to trigger real-world vulnerabilities.
已经提出了许多技术,通过保护机制来强化程序,以防御漏洞利用。不幸的是,它们中的绝大多数不能应用于闭源软件,因为它们需要访问程序源代码。本文介绍了我们在使用安全解决方案自动强化二进制代码方面的工作,这是一种保护机制,可以防止通过禁用易受攻击的代码来触发漏洞。通过单独处理二进制代码,我们的方法适用于闭源软件。为了自动合成安全解决方案,我们开发了二进制程序分析技术,以识别二进制代码中存在的错误处理代码,以二进制代码的形式合成安全解决方案,并将安全解决方案导入二进制程序。我们为Windows和Linux二进制程序设计并实现了我们的方法的原型。我们的评估表明,我们的方法可以对平均69.3%的程序代码应用安全解决方案,并且安全解决方案成功地阻止了触发现实世界漏洞的攻击。
{"title":"Mitigating Vulnerabilities in Closed Source Software","authors":"Zhen Huang, Gang Tan, Xiaowei Yu","doi":"10.4108/eetss.v8i30.253","DOIUrl":"https://doi.org/10.4108/eetss.v8i30.253","url":null,"abstract":"Many techniques have been proposed to harden programs with protection mechanisms to defend against vulnerability exploits. Unfortunately the vast majority of them cannot be applied to closed source software because they require access to program source code. This paper presents our work on automatically hardening binary code with security workarounds, a protection mechanism that prevents vulnerabilities from being triggered by disabling vulnerable code. By working solely with binary code, our approach is applicable to closed source software. To automatically synthesize security workarounds, we develop binary program analysis techniques to identify existing error handling code in binary code, synthesize security workarounds in the form of binary code, and instrument security workarounds into binary programs. We designed and implemented a prototype or our approach for Windows and Linux binary programs. Our evaluation shows that our approach can apply security workarounds to an average of 69.3% of program code and the security workarounds successfully prevents exploits to trigger real-world vulnerabilities.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Online Surveys for Cybersecurity: SONA and MTurk 比较网络安全在线调查:SONA和MTurk
Pub Date : 2022-02-08 DOI: 10.4108/eai.8-2-2022.173334
Anne Wagner, Anna M Bakas, S. Kennison, Eric Chan-Tin
People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA survey. This is mostly attributed to the age di ff erence. However, the distribution of the results was similar for both MTurk and SONA. In the second part of our study, we found that security behaviors actually went down – this could be due to the pandemic or indicative of a need for more regular messaging/training.
人们有许多帐户,通常需要为每个帐户创建一个密码。他们倾向于创建不安全的密码并重复使用密码,这可能导致数据泄露。这项研究考察了两组参与者:SONA和MTurk中的不同参与者的性格类型和密码安全性之间是否存在联系。两项调查中的每个参与者都回答了基于密码安全性和他们个性类型的问题。我们的研究结果表明,与SONA调查的参与者相比,MTurk调查的参与者更有可能选择强密码,并表现出更好的安全行为和知识。这主要归因于年龄差距。然而,MTurk和SONA的结果分布相似。在我们研究的第二部分,我们发现安全行为实际上下降了——这可能是由于大流行或表明需要更定期的信息/培训。
{"title":"Comparing Online Surveys for Cybersecurity: SONA and MTurk","authors":"Anne Wagner, Anna M Bakas, S. Kennison, Eric Chan-Tin","doi":"10.4108/eai.8-2-2022.173334","DOIUrl":"https://doi.org/10.4108/eai.8-2-2022.173334","url":null,"abstract":"People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA survey. This is mostly attributed to the age di ff erence. However, the distribution of the results was similar for both MTurk and SONA. In the second part of our study, we found that security behaviors actually went down – this could be due to the pandemic or indicative of a need for more regular messaging/training.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems 大型信息物理系统的动态风险评估与分析框架
Pub Date : 2022-01-25 DOI: 10.4108/eai.25-1-2022.172997
Adeel A. Malik, Deepak K. Tosh
Cyberspace is growing at full tilt creating an amalgamation of disparate systems. This heterogeneity leads to increased system complexity and security flaws. It is crucial to understand and identify these flaws to prevent catastrophic events. However, the current state-of-the-art solutions are threat-specific and focus on either risk, vulnerabilities, or adversary emulation. In this work, we present a scalable Cyber-threats and Vulnerability Information Analyzer (CyVIA) framework. CyVIA analyzes cyber risks and abnormalities in real-time using multi-formatted knowledge bases derived from open-source vulnerability databases. CyVIA achieves the following goals: 1) assess the target network for risk and vulnerabilities, 2) map services and policies to network nodes, 3) classify nodes based on severity, and 4) provide consequences, mitigation, and relationships for the found vulnerabilities. We use CyVIA and other tools to examine a simulated network for threats and compare the results.
网络空间正在全速发展,创造了不同系统的融合。这种异构性导致系统复杂性和安全性缺陷的增加。理解和识别这些缺陷对于防止灾难性事件至关重要。然而,当前最先进的解决方案是针对特定威胁的,并且关注风险、漏洞或对手模拟。在这项工作中,我们提出了一个可扩展的网络威胁和漏洞信息分析器(CyVIA)框架。CyVIA利用源自开源漏洞数据库的多格式知识库,实时分析网络风险和异常。CyVIA实现了以下目标:1)评估目标网络的风险和漏洞;2)将服务和策略映射到网络节点;3)根据严重性对节点进行分类;4)提供发现漏洞的后果、缓解措施和关系。我们使用CyVIA和其他工具来检查模拟网络中的威胁并比较结果。
{"title":"Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems","authors":"Adeel A. Malik, Deepak K. Tosh","doi":"10.4108/eai.25-1-2022.172997","DOIUrl":"https://doi.org/10.4108/eai.25-1-2022.172997","url":null,"abstract":"Cyberspace is growing at full tilt creating an amalgamation of disparate systems. This heterogeneity leads to increased system complexity and security flaws. It is crucial to understand and identify these flaws to prevent catastrophic events. However, the current state-of-the-art solutions are threat-specific and focus on either risk, vulnerabilities, or adversary emulation. In this work, we present a scalable Cyber-threats and Vulnerability Information Analyzer (CyVIA) framework. CyVIA analyzes cyber risks and abnormalities in real-time using multi-formatted knowledge bases derived from open-source vulnerability databases. CyVIA achieves the following goals: 1) assess the target network for risk and vulnerabilities, 2) map services and policies to network nodes, 3) classify nodes based on severity, and 4) provide consequences, mitigation, and relationships for the found vulnerabilities. We use CyVIA and other tools to examine a simulated network for threats and compare the results.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123590288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis 数据共享如何影响人们的隐私偏好:基于机器学习的分析
Pub Date : 2021-12-21 DOI: 10.4108/eai.21-12-2021.172440
Yang Lu, Shujun Li, A. Freitas, A. Ioannou
INTRODUCTION: Many online services use data-sharing nudges to solicit personal data from their customers for personalized services. OBJECTIVES: This study aims to study people’s privacy preferences in sharing di ff erent types of personal data under di ff erent nudging conditions, how digital nudging can change their data sharing willingness, and if people’s data sharing preferences can be predicted using their responses to a questionnaire. METHODS: This paper reports a machine learning-based analysis on people’s privacy preference patterns under four di ff erent data-sharing nudging conditions (without nudging, monetary incentives, non-monetary incentives, and privacy assurance). The analysis is based on data collected from 685 UK residents who participated in a panel survey. Their self-reported willingness levels towards sharing 23 di ff erent types of personal data were analyzed by using both unsupervised (clustering) and supervised (classification) machine learning algorithms. RESULTS: The results led to a better understanding of people’s privacy preference patterns across di ff erent data-sharing nudging conditions, e.g., our participants’ preferences are distributed in a space of 48 possible profiles more sparsely than we expected, and the unexpected observation that all the three data-sharing nudging strategies led to an overall negative e ff ect: they led to a reduced level of self-reported willingness for more participants, comparing with the case of no nudging at all. Our experiments with supervised machine learning models also showed that people’s privacy (data-sharing) preference profiles can be automatically predicted with a good accuracy, even when a small questionnaire with just seven questions is used. CONCLUSION: Our work revealed a more complicated structure of people’s privacy preference profiles, which have some dependencies on the type of data nudging and the type of personal data shared. Such complicated privacy preference profiles can be e ff ectively analyzed using machine learning methods, including automatic prediction based on a small questionnaire. The negative results on the overall e ff ect of di ff erent data-sharing nudges imply that service providers should consider if and how to use such mechanisms to incentivise their consumers to share personal data. We believe that more consumer-centric and transparent methods and tools should be used to help improve trust between consumers and service providers.
导读:许多在线服务使用数据共享的方式向客户索取个人数据,以提供个性化服务。目的:本研究旨在研究人们在不同助推条件下分享不同类型个人数据的隐私偏好,数字助推如何改变他们的数据共享意愿,以及是否可以通过他们对问卷的回答来预测人们的数据共享偏好。方法:本文基于机器学习分析了四种不同数据共享助推条件下(无助推、货币激励、非货币激励和隐私保障)人们的隐私偏好模式。该分析基于685名参与小组调查的英国居民收集的数据。通过使用无监督(聚类)和监督(分类)机器学习算法,分析了他们自我报告的分享23种不同类型个人数据的意愿水平。结果:结果使我们更好地理解了不同数据共享助推条件下人们的隐私偏好模式,例如,我们的参与者的偏好分布在48个可能的配置文件的空间中,比我们预期的更稀疏,并且意外地观察到所有三种数据共享助推策略都导致了整体的负影响。与完全没有轻推的情况相比,轻推导致更多参与者的自我报告意愿水平降低。我们对监督机器学习模型的实验也表明,即使使用只有七个问题的小问卷,人们的隐私(数据共享)偏好配置文件也可以以很高的准确性自动预测。结论:我们的研究揭示了人们的隐私偏好结构更为复杂,这与数据推送的类型和共享的个人数据类型有一定的关系。这种复杂的隐私偏好配置文件可以使用机器学习方法进行有效分析,包括基于小问卷的自动预测。不同的数据共享推动对整体效果的负面影响意味着,服务提供商应该考虑是否以及如何使用这些机制来激励其消费者共享个人数据。我们认为,应该使用更多以消费者为中心和透明的方法和工具来帮助提高消费者和服务提供商之间的信任。
{"title":"How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis","authors":"Yang Lu, Shujun Li, A. Freitas, A. Ioannou","doi":"10.4108/eai.21-12-2021.172440","DOIUrl":"https://doi.org/10.4108/eai.21-12-2021.172440","url":null,"abstract":"INTRODUCTION: Many online services use data-sharing nudges to solicit personal data from their customers for personalized services. OBJECTIVES: This study aims to study people’s privacy preferences in sharing di ff erent types of personal data under di ff erent nudging conditions, how digital nudging can change their data sharing willingness, and if people’s data sharing preferences can be predicted using their responses to a questionnaire. METHODS: This paper reports a machine learning-based analysis on people’s privacy preference patterns under four di ff erent data-sharing nudging conditions (without nudging, monetary incentives, non-monetary incentives, and privacy assurance). The analysis is based on data collected from 685 UK residents who participated in a panel survey. Their self-reported willingness levels towards sharing 23 di ff erent types of personal data were analyzed by using both unsupervised (clustering) and supervised (classification) machine learning algorithms. RESULTS: The results led to a better understanding of people’s privacy preference patterns across di ff erent data-sharing nudging conditions, e.g., our participants’ preferences are distributed in a space of 48 possible profiles more sparsely than we expected, and the unexpected observation that all the three data-sharing nudging strategies led to an overall negative e ff ect: they led to a reduced level of self-reported willingness for more participants, comparing with the case of no nudging at all. Our experiments with supervised machine learning models also showed that people’s privacy (data-sharing) preference profiles can be automatically predicted with a good accuracy, even when a small questionnaire with just seven questions is used. CONCLUSION: Our work revealed a more complicated structure of people’s privacy preference profiles, which have some dependencies on the type of data nudging and the type of personal data shared. Such complicated privacy preference profiles can be e ff ectively analyzed using machine learning methods, including automatic prediction based on a small questionnaire. The negative results on the overall e ff ect of di ff erent data-sharing nudges imply that service providers should consider if and how to use such mechanisms to incentivise their consumers to share personal data. We believe that more consumer-centric and transparent methods and tools should be used to help improve trust between consumers and service providers.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning 基于联邦学习的联合异常检测和移动预测框架
Pub Date : 2021-10-21 DOI: 10.4108/eai.21-10-2021.171595
Zezhang Yang, Jian Li, Ping Yang
With the proliferation of mobile devices and smart cameras, detecting anomalies and predicting their mobility are critical for enhancing safety in ubiquitous computing systems. Due to data privacy regulations and limited communication bandwidth, it is infeasible to collect, transmit, and store all data from mobile devices at a central location. To overcome this challenge, we propose FedADMP, a federated learning based joint Anomaly Detection and Mobility Prediction framework. FedADMP adaptively splits the training process between the server and clients to reduce computation loads on clients. To protect the privacy of user data, clients in FedADMP upload only intermediate model parameters to the cloud server. We also develop a di ff erential privacy method to prevent the cloud server and external attackers from inferring private information during the model upload procedure. Extensive experiments using real-world datasets show that FedADMP consistently outperforms existing methods.
随着移动设备和智能摄像头的普及,检测异常并预测其移动性对于提高普适计算系统的安全性至关重要。由于数据隐私法规和有限的通信带宽,在一个中心位置收集、传输和存储来自移动设备的所有数据是不可行的。为了克服这一挑战,我们提出了基于联邦学习的联合异常检测和移动预测框架FedADMP。FedADMP自适应地在服务器和客户端之间分割训练过程,以减少客户端的计算负荷。为了保护用户数据的隐私,FedADMP中的客户端只将中间模型参数上传到云服务器。我们还开发了一种差分隐私方法,以防止云服务器和外部攻击者在模型上传过程中推断隐私信息。使用真实数据集的大量实验表明,FedADMP始终优于现有方法。
{"title":"FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning","authors":"Zezhang Yang, Jian Li, Ping Yang","doi":"10.4108/eai.21-10-2021.171595","DOIUrl":"https://doi.org/10.4108/eai.21-10-2021.171595","url":null,"abstract":"With the proliferation of mobile devices and smart cameras, detecting anomalies and predicting their mobility are critical for enhancing safety in ubiquitous computing systems. Due to data privacy regulations and limited communication bandwidth, it is infeasible to collect, transmit, and store all data from mobile devices at a central location. To overcome this challenge, we propose FedADMP, a federated learning based joint Anomaly Detection and Mobility Prediction framework. FedADMP adaptively splits the training process between the server and clients to reduce computation loads on clients. To protect the privacy of user data, clients in FedADMP upload only intermediate model parameters to the cloud server. We also develop a di ff erential privacy method to prevent the cloud server and external attackers from inferring private information during the model upload procedure. Extensive experiments using real-world datasets show that FedADMP consistently outperforms existing methods.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems 能源输送系统中基于临界性的最优网络防御补救
Pub Date : 2021-09-10 DOI: 10.4108/eai.10-9-2021.170949
Kamrul Hasan, S. Shetty, Sharif Ullah, Amin Hassanzadeh, T. Islam
A prioritized cyber defense remediation plan is critical for effective risk management in Energy Delivery System (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending Information Technology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and critical processes tasks, prioritized remediations should be applied gradually to protect critical assets. In this work, we propose a methodology for a prioritized cyber risk remediation plan by detecting and evaluating paths to critical nodes in EDS. We propose critical nodes characteristics evaluation based on nodes’ architectural positions, a measure of centrality based on nodes’ connectivity and frequency of network traffic, as well as the controlled amount of physical loads. The paper also examines the relationship between cost models of budget allocation for the removal of vulnerabilities on critical nodes and its impact on gradual readiness. Received on 15 June 2021; accepted on 01 September 2021; published on 10 September 2021
优先的网络防御补救计划对于能源输送系统(EDS)的有效风险管理至关重要。由于信息技术(IT)、操作技术(OT)和工业控制系统(ICS)的异构性、规模和关键过程任务的复杂性,应逐步应用优先级修复来保护关键资产。在这项工作中,我们提出了一种方法,通过检测和评估到EDS关键节点的路径,来制定优先的网络风险修复计划。我们提出了基于节点架构位置的关键节点特征评估,基于节点连接和网络流量频率以及物理负载控制量的中心性度量。本文还研究了消除关键节点脆弱性的预算分配成本模型及其对逐步准备的影响之间的关系。2021年6月15日收到;2021年9月1日接受;于2021年9月10日发布
{"title":"Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems","authors":"Kamrul Hasan, S. Shetty, Sharif Ullah, Amin Hassanzadeh, T. Islam","doi":"10.4108/eai.10-9-2021.170949","DOIUrl":"https://doi.org/10.4108/eai.10-9-2021.170949","url":null,"abstract":"A prioritized cyber defense remediation plan is critical for effective risk management in Energy Delivery System (EDS). Due to the complexity of EDS in terms of heterogeneous nature blending Information Technology (IT) and Operation Technology (OT) and Industrial Control System (ICS), scale and critical processes tasks, prioritized remediations should be applied gradually to protect critical assets. In this work, we propose a methodology for a prioritized cyber risk remediation plan by detecting and evaluating paths to critical nodes in EDS. We propose critical nodes characteristics evaluation based on nodes’ architectural positions, a measure of centrality based on nodes’ connectivity and frequency of network traffic, as well as the controlled amount of physical loads. The paper also examines the relationship between cost models of budget allocation for the removal of vulnerabilities on critical nodes and its impact on gradual readiness. Received on 15 June 2021; accepted on 01 September 2021; published on 10 September 2021","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure 弹性智能计量基础设施的自动配置综合
Pub Date : 2021-09-10 DOI: 10.4108/eai.10-9-2021.170948
M. Rahman, Amarjit Datta, E. Al-Shaer
An Advanced Metering Infrastructure (AMI) comprises a large number of smart meters along with heterogeneous cyber-physical components that are interconnected through di ff erent communication media, protocols, and delivery modes for transmitting usage reports or control commands between meters and the utility. Due to misconfigurations or lack of security controls, there can be operational disruptions leading to economic damage in an AMI. Therefore, the resiliency of an AMI is crucial. In this paper, we present an automated configuration synthesis framework that mitigates potential threats by eliminating misconfigurations and keeps the damage limited under contingencies by introducing robustness. We formally model AMI configurations, including operational integrity and robustness properties considering the interdependencies among AMI devices’ configurations, attacks or failures, and resiliency guidelines. We implement the model using Satisfiability Modulo Theories (SMT) and demonstrate its execution on an example case study that illustrates the synthesis of AMI configurations satisfying resiliency requirements. We also evaluate the framework on synthetic AMI networks.
高级计量基础设施(AMI)由大量智能电表和异构网络物理组件组成,这些组件通过不同的通信媒体、协议和交付模式相互连接,用于在电表和公用事业公司之间传输使用报告或控制命令。由于配置错误或缺乏安全控制,可能会导致AMI的操作中断,从而造成经济损失。因此,AMI的弹性至关重要。在本文中,我们提出了一个自动化配置综合框架,通过消除错误配置来减轻潜在的威胁,并通过引入鲁棒性来限制意外情况下的损害。我们正式建模AMI配置,包括考虑AMI设备配置、攻击或故障以及弹性指导方针之间的相互依赖性的操作完整性和健壮性属性。我们使用可满足模理论(Satisfiability Modulo Theories, SMT)实现了该模型,并通过一个示例案例研究演示了其执行情况,该案例研究说明了满足弹性需求的AMI配置的综合。我们还在合成AMI网络上对该框架进行了评估。
{"title":"Automated Configuration Synthesis for Resilient Smart Metering Infrastructure","authors":"M. Rahman, Amarjit Datta, E. Al-Shaer","doi":"10.4108/eai.10-9-2021.170948","DOIUrl":"https://doi.org/10.4108/eai.10-9-2021.170948","url":null,"abstract":"An Advanced Metering Infrastructure (AMI) comprises a large number of smart meters along with heterogeneous cyber-physical components that are interconnected through di ff erent communication media, protocols, and delivery modes for transmitting usage reports or control commands between meters and the utility. Due to misconfigurations or lack of security controls, there can be operational disruptions leading to economic damage in an AMI. Therefore, the resiliency of an AMI is crucial. In this paper, we present an automated configuration synthesis framework that mitigates potential threats by eliminating misconfigurations and keeps the damage limited under contingencies by introducing robustness. We formally model AMI configurations, including operational integrity and robustness properties considering the interdependencies among AMI devices’ configurations, attacks or failures, and resiliency guidelines. We implement the model using Satisfiability Modulo Theories (SMT) and demonstrate its execution on an example case study that illustrates the synthesis of AMI configurations satisfying resiliency requirements. We also evaluate the framework on synthetic AMI networks.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy Preserving Collaborative Machine Learning 隐私保护协同机器学习
Pub Date : 2021-07-14 DOI: 10.4108/EAI.14-7-2021.170295
Zheyuan Liu, Rui Zhang
Collaborative machine learning is a promising paradigm that allows multiple participants to jointly train a machine learning model without exposing their private datasets to other parties. Although collaborative machine learning is more privacy-friendly compared with conventional machine learning methods, the intermediate model parameters exchanged among different participants in the training process may still reveal sensitive information about participants’ local datasets. In this paper, we introduce a novel privacypreserving collaborative machine learning mechanism by utilizing two non-colluding servers to perform secure aggregation of the intermediate parameters from participants. Compared with other existing solutions, our solution can achieve the same level of accuracy while incurring significantly lower computational cost. Received on 23 February 2021; accepted on 15 June 2021; published on 14 July 2021
协作机器学习是一个很有前途的范例,它允许多个参与者共同训练机器学习模型,而不会将他们的私有数据集暴露给其他方。尽管与传统的机器学习方法相比,协作机器学习更加隐私友好,但在训练过程中不同参与者之间交换的中间模型参数仍然可能泄露参与者本地数据集的敏感信息。在本文中,我们引入了一种新的保护隐私的协作机器学习机制,该机制利用两个非串通服务器对参与者的中间参数进行安全聚合。与其他现有的解决方案相比,我们的解决方案可以在显著降低计算成本的同时达到相同的精度水平。2021年2月23日收到;2021年6月15日接受;于2021年7月14日发布
{"title":"Privacy Preserving Collaborative Machine Learning","authors":"Zheyuan Liu, Rui Zhang","doi":"10.4108/EAI.14-7-2021.170295","DOIUrl":"https://doi.org/10.4108/EAI.14-7-2021.170295","url":null,"abstract":"Collaborative machine learning is a promising paradigm that allows multiple participants to jointly train a machine learning model without exposing their private datasets to other parties. Although collaborative machine learning is more privacy-friendly compared with conventional machine learning methods, the intermediate model parameters exchanged among different participants in the training process may still reveal sensitive information about participants’ local datasets. In this paper, we introduce a novel privacypreserving collaborative machine learning mechanism by utilizing two non-colluding servers to perform secure aggregation of the intermediate parameters from participants. Compared with other existing solutions, our solution can achieve the same level of accuracy while incurring significantly lower computational cost. Received on 23 February 2021; accepted on 15 June 2021; published on 14 July 2021","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Side-channel Programming for Software Integrity Checking 软件完整性检查的边信道编程
Pub Date : 2021-06-02 DOI: 10.4108/EAI.2-6-2021.170013
Hong Liu, Eugene Y. Vasserman
Verifying software integrity for embedded systems, especially legacy and deployed systems, is very challenging. Ordinary integrity protection and verification methods rely on sophisticated processors or security hardware, and cannot be applied to many embedded systems due to cost, energy consumption, and inability of update. Furthermore, embedded systems are often small computers on a single chip, making it more difficult to verify integrity without invasive access to the hardware. In this work, we propose “side-channel programming”, a novel method to assist with non-intrusive software integrity checking by transforming code in a functionality-preserving manner while making it possible to verify the internal state of a running device via side-channels. To do so, we first need to accurately profile the side-channel emanations of an embedded device. Using new black-box side-channel profiling techniques, we show that it is possible to build accurate side-channel models of a PIC microcontroller with no prior knowledge of the detailed microcontroller architecture. It even allows us to uncover undocumented behavior of the microcontroller. Then we show how to “side-channel program” the target device in a way that we can verify its internal state from simply measuring the passive side-channel emanations. Received on 23 March 2021; accepted on 27 May 2021; published on 02 June 2021
验证嵌入式系统,特别是遗留系统和已部署系统的软件完整性是非常具有挑战性的。普通的完整性保护和验证方法依赖于复杂的处理器或安全硬件,由于成本、能耗和无法更新等原因,无法应用于许多嵌入式系统。此外,嵌入式系统通常是单芯片上的小型计算机,这使得在不侵入式访问硬件的情况下验证完整性变得更加困难。在这项工作中,我们提出了“侧通道编程”,这是一种新颖的方法,通过以保留功能的方式转换代码来协助非侵入式软件完整性检查,同时使通过侧通道验证运行设备的内部状态成为可能。要做到这一点,我们首先需要准确地分析嵌入式设备的侧信道发射。使用新的黑盒侧通道分析技术,我们表明可以在没有详细微控制器架构的先验知识的情况下构建PIC微控制器的精确侧通道模型。它甚至允许我们发现微控制器未记录的行为。然后,我们展示了如何“侧通道程序”的目标器件,我们可以验证其内部状态,从简单地测量被动侧通道发射的方式。2021年3月23日收到;2021年5月27日接受;出版于2021年6月2日
{"title":"Side-channel Programming for Software Integrity Checking","authors":"Hong Liu, Eugene Y. Vasserman","doi":"10.4108/EAI.2-6-2021.170013","DOIUrl":"https://doi.org/10.4108/EAI.2-6-2021.170013","url":null,"abstract":"Verifying software integrity for embedded systems, especially legacy and deployed systems, is very challenging. Ordinary integrity protection and verification methods rely on sophisticated processors or security hardware, and cannot be applied to many embedded systems due to cost, energy consumption, and inability of update. Furthermore, embedded systems are often small computers on a single chip, making it more difficult to verify integrity without invasive access to the hardware. In this work, we propose “side-channel programming”, a novel method to assist with non-intrusive software integrity checking by transforming code in a functionality-preserving manner while making it possible to verify the internal state of a running device via side-channels. To do so, we first need to accurately profile the side-channel emanations of an embedded device. Using new black-box side-channel profiling techniques, we show that it is possible to build accurate side-channel models of a PIC microcontroller with no prior knowledge of the detailed microcontroller architecture. It even allows us to uncover undocumented behavior of the microcontroller. Then we show how to “side-channel program” the target device in a way that we can verify its internal state from simply measuring the passive side-channel emanations. Received on 23 March 2021; accepted on 27 May 2021; published on 02 June 2021","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"3 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127265236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1