首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
A Deep Learning Approach for Network Intrusion Detection System 一种网络入侵检测系统的深度学习方法
Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262516
A. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam
A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in their organizations. However, many challenges arise while developing a flexible and efficient NIDS for unforeseen and unpredictable attacks. We propose a deep learning based approach for developing such an efficient and flexible NIDS. We use Self-taught Learning (STL), a deep learning based technique, on NSL-KDD - a benchmark dataset for network intrusion. We present the performance of our approach and compare it with a few previous work. Compared metrics include accuracy, precision, recall, and f-measure values.
网络入侵检测系统(NIDS)可以帮助系统管理员检测组织中的网络安全漏洞。然而,在为不可预见和不可预测的攻击开发灵活高效的NIDS时,会出现许多挑战。我们提出了一种基于深度学习的方法来开发这种高效灵活的NIDS。我们在网络入侵的基准数据集NSL-KDD上使用了基于深度学习的自学(STL)技术。我们介绍了我们的方法的性能,并将其与以前的一些工作进行了比较。比较指标包括准确性、精密度、召回率和f测量值。
{"title":"A Deep Learning Approach for Network Intrusion Detection System","authors":"A. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam","doi":"10.4108/eai.3-12-2015.2262516","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262516","url":null,"abstract":"A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in \u0000 \u0000their organizations. However, many challenges arise while \u0000 \u0000developing a flexible and efficient NIDS for unforeseen and unpredictable attacks. We propose a deep learning based approach for developing such an efficient and flexible NIDS. \u0000 \u0000We use Self-taught Learning (STL), a deep learning based technique, on NSL-KDD - a benchmark dataset for network \u0000 \u0000intrusion. We present the performance of our approach and compare it with a few previous work. Compared metrics include accuracy, precision, recall, and f-measure values.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132978952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 848
Identity Deception and Game Deterrence via Signaling Games 基于信号博弈的身份欺骗与博弈威慑
Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262519
W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra
Maintenance and verication of persistent identities is an important problem in the area of networking. Particularly, their critical roles in Wireless Ad-hoc networks (WANETs) have become even more prominent as they begin to be deployed in several application domains. In these contexts, Sybil attacks, making use of replicated deceptive identities, represent a major challenge for the designers of these networks. Inspired by biological models of ant colonies and their dynamics studied via information asymmetric signaling games, we propose an architecture that can withstand Sybil attacks, similar to ants, using complex chemical signaling systems and associated physical actions, naturally `authenticate' colony members. Here, we present a biomimetic authentication protocol with mechanisms similar to the physical processes of chemical diusion, and formalize approaches to tame the deceptive use of identities; we dub the resulting game anidentity management signaling game". To consider network system of nodes, pursuing non-cooperative and deceptive strategies, we develop an evolutionary game system allowing cooperative nodes to mutate deceptive strategies. We empirically study the dynamics using simulation experiments to select the parameters which aect the overall behaviors. Through experimentation we consider how an in- centive package in the form of a shared database can impact system behavior.
持久身份的维护和验证是网络领域的一个重要问题。特别是,它们在无线自组织网络(wanet)中的关键作用随着它们开始部署在多个应用领域而变得更加突出。在这些情况下,Sybil攻击,利用复制的欺骗性身份,代表了这些网络设计者的主要挑战。受蚁群的生物模型及其通过信息不对称信号博弈研究的动力学的启发,我们提出了一种可以抵御Sybil攻击的架构,类似于蚂蚁,使用复杂的化学信号系统和相关的物理动作,自然地“认证”蚁群成员。在这里,我们提出了一种仿生认证协议,其机制类似于化学扩散的物理过程,并形式化了驯服身份欺骗性使用的方法;我们把这个游戏称为“身份管理信号游戏”。考虑到节点网络系统追求非合作和欺骗策略,我们开发了一个允许合作节点变异欺骗策略的进化博弈系统。我们利用仿真实验对其动力学进行了实证研究,以选择影响整体行为的参数。通过实验,我们考虑了共享数据库形式的激励包如何影响系统行为。
{"title":"Identity Deception and Game Deterrence via Signaling Games","authors":"W. Casey, Parisa Memarmoshrefi, Ansgar Kellner, J. Morales, B. Mishra","doi":"10.4108/eai.3-12-2015.2262519","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262519","url":null,"abstract":"Maintenance and verication of persistent identities is an \u0000 \u0000important problem in the area of networking. Particularly, \u0000 \u0000their critical roles in Wireless Ad-hoc networks (WANETs) \u0000 \u0000have become even more prominent as they begin to be deployed \u0000 \u0000in several application domains. In these contexts, \u0000 \u0000Sybil attacks, making use of replicated deceptive identities, \u0000 \u0000represent a major challenge for the designers of these networks. \u0000 \u0000Inspired by biological models of ant colonies and \u0000 \u0000their dynamics studied via information asymmetric signaling \u0000 \u0000games, we propose an architecture that can withstand Sybil \u0000 \u0000attacks, similar to ants, using complex chemical signaling \u0000 \u0000systems and associated physical actions, naturally `authenticate' \u0000 \u0000colony members. Here, we present a biomimetic authentication \u0000 \u0000protocol with mechanisms similar to the physical \u0000 \u0000processes of chemical diusion, and formalize approaches \u0000 \u0000to tame the deceptive use of identities; we dub the resulting \u0000 \u0000game anidentity management signaling game\". To consider \u0000 \u0000network system of nodes, pursuing non-cooperative and deceptive \u0000 \u0000strategies, we develop an evolutionary game system \u0000 \u0000allowing cooperative nodes to mutate deceptive strategies. \u0000 \u0000We empirically study the dynamics using simulation experiments \u0000 \u0000to select the parameters which aect the overall behaviors. \u0000 \u0000Through experimentation we consider how an in- \u0000 \u0000centive package in the form of a shared database can impact \u0000 \u0000system behavior.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposing Multimodal Integration Model Using LSTM and Autoencoder 利用LSTM和自编码器提出多模态集成模型
Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262505
Wataru Noguchi, H. Iizuka, Masahito Yamamoto
We propose an architecture of neural network that can learn and integrate sequential multimodal information using Long Short Term Memory. Our model consists of encoder and decoder LSTMs and multimodal autoencoder. For integrating sequential multimodal information, firstly, the encoder LSTM encodes a sequential input to a fixed range feature vector for each modality. Secondly, the multimodal autoencoder integrates the feature vectors from each modality and generate a fused feature vector which contains sequential multimodal information in a mixed form. The original feature vectors from each modality are re-generated from the fused feature vector in the multimodal autoencoder. The decoder LSTM decodes the sequential inputs from the regenerated feature vector. Our model is trained with the visual and motion sequences of humans and is tested by recall tasks. The experimental results show that our model can learn and remember the sequential multimodal inputs and decrease the ambiguity generated at the learning stage of LSTMs using integrated multimodal information. Our model can also recall the visual sequences from the only motion sequences and vice versa.
我们提出了一种利用长短期记忆学习和整合顺序多模态信息的神经网络结构。我们的模型由编码器和解码器lstm和多模态自编码器组成。为了整合序列多模态信息,首先,编码器LSTM将序列输入编码为每个模态的固定范围特征向量;其次,多模态自编码器对各模态特征向量进行整合,生成融合特征向量,融合特征向量以混合形式包含顺序多模态信息;在多模态自编码器中,从融合的特征向量中重新生成每个模态的原始特征向量。解码器LSTM从重新生成的特征向量中解码顺序输入。我们的模型是用人类的视觉和动作序列进行训练的,并通过回忆任务进行测试。实验结果表明,该模型可以学习和记忆连续的多模态输入,并利用集成的多模态信息减少lstm学习阶段产生的歧义。我们的模型还可以从唯一的运动序列中召回视觉序列,反之亦然。
{"title":"Proposing Multimodal Integration Model Using LSTM and Autoencoder","authors":"Wataru Noguchi, H. Iizuka, Masahito Yamamoto","doi":"10.4108/eai.3-12-2015.2262505","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262505","url":null,"abstract":"We propose an architecture of neural network that can learn and integrate sequential multimodal information using Long Short Term Memory. Our model consists of encoder and decoder LSTMs and multimodal autoencoder. For integrating sequential multimodal information, firstly, the encoder LSTM encodes a sequential input to a fixed range feature vector for each modality. Secondly, the multimodal autoencoder integrates the feature vectors from each modality and generate a fused feature vector which contains sequential multimodal information in a mixed form. The original feature vectors from each modality are re-generated from the fused feature vector in the multimodal autoencoder. The decoder LSTM decodes the sequential inputs from the regenerated feature vector. Our model is trained with the visual and motion sequences of humans and is tested by recall tasks. The experimental results show that our model can learn and remember the sequential multimodal inputs and decrease the ambiguity generated at the learning stage of LSTMs using integrated multimodal information. Our model can also recall the visual sequences from the only motion sequences and vice versa.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks 移动Ad-hoc网络中自主认证学习阶段的研究
Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262465
Han Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, D. Hogrefe
In this work we focus on investigating the learning phase of an autonomous authentication mechanism. Through a series of simulation, an experimental best cutoff point and the aggression threshold values for different network size were calculated. In the test phase, those found values are proved by the average good accuracy.
在这项工作中,我们重点研究自主身份验证机制的学习阶段。通过一系列的仿真,计算出不同网络规模下的实验最佳截断点和攻击阈值。在测试阶段,这些发现的值被证明具有良好的平均精度。
{"title":"Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks","authors":"Han Zhang, Parisa Memarmoshrefi, Fatemeh Ashrafi, D. Hogrefe","doi":"10.4108/eai.3-12-2015.2262465","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262465","url":null,"abstract":"In this work we focus on investigating the learning phase of an autonomous authentication mechanism. Through a series of \u0000 \u0000simulation, an experimental best cutoff point and the aggression \u0000 \u0000threshold values for different network size were calculated. In the test phase, those found values are proved by the average good accuracy.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Cryptography Usage in Android Applications Android应用程序中加密使用的评估
Pub Date : 2016-05-24 DOI: 10.4108/eai.3-12-2015.2262471
Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, C. Xenakis
Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8% of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis. Finally, we suggest countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis.
移动应用程序开发人员正在他们的产品中使用加密技术来保护敏感数据,如密码、短信、文档等。本文研究了是否采用适当的密码学和相关技术来保护这些私有数据。为此,我们从Google Play市场下载了49个Android应用程序,并进行了静态和动态分析,试图检测可能的加密滥用。结果表明,87.8%的应用程序存在某种形式的滥用,而其余的应用程序在分析期间没有检测到加密使用。最后,我们提出了主要针对开发人员的对策,以缓解分析中发现的问题。
{"title":"Evaluation of Cryptography Usage in Android Applications","authors":"Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, C. Xenakis","doi":"10.4108/eai.3-12-2015.2262471","DOIUrl":"https://doi.org/10.4108/eai.3-12-2015.2262471","url":null,"abstract":"Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8% of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis. Finally, we suggest countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Evaluating the impact of eDoS attacks to cloud facilities 评估ddos攻击对云设施的影响
Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262650
Gian-Luca Dei Rossi, M. Iacono, A. Marin
The complexity of modern cloud facilities requires attentive management policies that should encompass all aspects of the system. Security is a critical issue, as intrusions, misuse or denial of service attacks may damage both the users and the cloud provider including its reputation on the market. Disruptive attacks happen fast, cause evident and short term damages and are usually the result of operations that are hard to disguise. On the other hand, Energy oriented Denial of Service (eDoS) attacks aim at producing continuous minor damages, eventually with long term consequences. These long lasting attacks are difficult to detect. In this paper we model and analyse the behaviour of a system under eDoS attack. We study the impact in terms of cloud energy consumption of an attack strategy previously proposed in the literature and compare it with other strategies that we propose. Our findings show that the strategy previously proposed in the literature, based on keeping the cloud close to saturation, is not optimal (from the point of view of the attacker) in presence of non-constant workload and that there is a trade-off between the aggressiveness of the attacker and the duration of the attack in order to maximise the damage.
现代云设施的复杂性需要细致的管理策略,这些策略应该包含系统的所有方面。安全是一个关键问题,因为入侵、滥用或拒绝服务攻击可能会损害用户和云提供商,包括其在市场上的声誉。破坏性攻击发生迅速,造成明显和短期的损害,通常是难以掩饰的操作的结果。另一方面,面向能量的拒绝服务(Energy - oriented Denial of Service, dos)攻击旨在造成持续的轻微损害,最终造成长期后果。这些持续时间很长的攻击很难被发现。本文对系统在dos攻击下的行为进行了建模和分析。我们研究了先前在文献中提出的攻击策略对云能源消耗的影响,并将其与我们提出的其他策略进行了比较。我们的研究结果表明,先前在文献中提出的策略,基于保持云接近饱和,在非恒定工作负载的存在下不是最佳的(从攻击者的角度来看),并且在攻击者的攻击性和攻击持续时间之间存在权衡,以便最大限度地造成损害。
{"title":"Evaluating the impact of eDoS attacks to cloud facilities","authors":"Gian-Luca Dei Rossi, M. Iacono, A. Marin","doi":"10.4108/eai.14-12-2015.2262650","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262650","url":null,"abstract":"The complexity of modern cloud facilities requires attentive management policies that \u0000 \u0000should encompass all aspects of the system. Security is a critical issue, as intrusions, misuse or denial of service attacks may damage both the users and the cloud provider including its reputation on the market. Disruptive attacks happen fast, cause evident and short term damages and are usually the result of operations that are hard to disguise. On the other hand, Energy oriented Denial of Service (eDoS) attacks aim at producing continuous minor damages, eventually with long term consequences. These long lasting attacks are difficult to detect. In this paper we model and analyse the behaviour of a system under eDoS attack. We study the impact in terms of cloud energy consumption of an attack strategy previously proposed in the literature and compare it with other strategies that we propose. Our findings show that the strategy previously proposed in the literature, based on keeping the cloud close to saturation, is not optimal (from the point of view of the attacker) in presence of non-constant workload and that there is a trade-off between the aggressiveness of the attacker and the duration of the attack in order to maximise the damage.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protecting Encryption Keys in Mobile Systems Against Memory Errors 保护移动系统中的加密密钥防止内存错误
Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262698
Jianing Zhao, P. Kemper
Beyond its use to encrypt data, an encryption key can be used as a mean to control access to data on a mobile de- vice by leveraging a cloud service. This implies that a key is present in a mobile device only when it is on demand and authorized by the cloud, the key is evicted when it is not in use. CleanOS is an example system that is based on this concept. For security reasons, keys are stored only in DRAM memory during execution, which makes them susceptible to memory errors. In this paper, we identify scenarios where a memory error that damages a key can escalate to an unrecoverable data loss in a mobile system.
除了用于加密数据之外,加密密钥还可以通过利用云服务来控制对移动设备上数据的访问。这意味着,只有当移动设备按需使用并得到云的授权时,密钥才会出现在移动设备中,当密钥不被使用时,密钥就会被删除。CleanOS就是一个基于这个概念的示例系统。出于安全原因,在执行期间,密钥仅存储在DRAM内存中,这使得它们容易受到内存错误的影响。在本文中,我们确定了在移动系统中损坏密钥的内存错误可能升级为不可恢复的数据丢失的场景。
{"title":"Protecting Encryption Keys in Mobile Systems Against Memory Errors","authors":"Jianing Zhao, P. Kemper","doi":"10.4108/eai.14-12-2015.2262698","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262698","url":null,"abstract":"Beyond its use to encrypt data, an encryption key can be used as a mean to control access to data on a mobile de- vice by leveraging a cloud service. This implies that a key is present in a mobile device only when it is on demand and authorized by the cloud, the key is evicted when it is not in use. CleanOS is an example system that is based on this concept. For security reasons, keys are stored only in DRAM memory during execution, which makes them susceptible to memory errors. In this paper, we identify scenarios where a memory error that damages a key can escalate to an unrecoverable data loss in a mobile system.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"94 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool 利用Möbius建模工具中的动态可靠性方框图进行可靠性分析
Pub Date : 2016-01-04 DOI: 10.4108/eai.14-12-2015.2262723
K. Keefe, W. Sanders
Reliability block diagram (RBD) models are a commonly used reliability analysis method. For static RBD models, combinatorial solution techniques are easy and efficient. However, static RBDs are limited in their ability to express varying system state, dependent events, and non-series-parallel topologies. A recent extension to RBDs, called Dynamic Reliability Block Diagrams (DRBD), has eliminated those limitations. This tool paper details the RBD implementation in the Mobius modeling framework and provides technical details for using RBDs independently or in composition with other Mobius modeling formalisms. The paper explains how the graphical front-end provides a user-friendly interface for specifying RBD models. The back-end implementation that interfaces with the Mobius AFI to dene and generate executable models that the Mobius tool uses to evaluate system metrics is also detailed.
可靠性框图(RBD)模型是一种常用的可靠性分析方法。对于静态RBD模型,组合求解技术简单有效。然而,静态rbd在表达变化的系统状态、相关事件和非串行并行拓扑的能力方面受到限制。最近对rbd的扩展,称为动态可靠性框图(DRBD),消除了这些限制。本文详细介绍了RBD在M - obius建模框架中的实现,并提供了单独使用RBD或与其他M - obius建模形式组合使用RBD的技术细节。本文解释了图形化前端如何为指定RBD模型提供一个用户友好的界面。与M - obius AFI接口以确定和生成M - obius工具用来评估系统度量的可执行模型的后端实现也被详细描述。
{"title":"Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool","authors":"K. Keefe, W. Sanders","doi":"10.4108/eai.14-12-2015.2262723","DOIUrl":"https://doi.org/10.4108/eai.14-12-2015.2262723","url":null,"abstract":"Reliability block diagram (RBD) models are a commonly used reliability analysis method. For static RBD models, combinatorial solution techniques are easy and efficient. However, static RBDs are limited in their ability to express varying system state, dependent events, and non-series-parallel topologies. A recent extension to RBDs, called Dynamic Reliability Block Diagrams (DRBD), has eliminated those limitations. This tool paper details the RBD implementation in the Mobius modeling framework and provides technical details for using RBDs independently or in composition with other Mobius modeling formalisms. The paper explains how the graphical front-end provides a user-friendly interface for specifying RBD models. The back-end implementation that interfaces with the Mobius AFI to dene and generate executable models that the Mobius tool uses to evaluate system metrics is also detailed.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Safer Interactive Medical Device Design: Insights from the CHI+MED Project 更安全的交互式医疗设备设计:来自CHI+MED项目的见解
Pub Date : 2015-12-22 DOI: 10.4108/EAI.14-10-2015.2261752
P. Curzon, A. Blandford, H. Thimbleby, A. Cox
Interactive medical devices such as infusion pumps, monitors and diagnostic devices help save lives. However, they are also safety critical in that they may fail in use and patient harm or death ensue. It is not just that the software and hardware should meet their specification. The design should help ensure users do not make mistakes. Safety factors become more important as medical devices become mobile and are used by patients as part of their everyday life rather than by trained professionals in well-defined hospital environments. Regulators are increasingly taking home-use seriously as a result of device recalls due to devices that have caused patient harm. We give insights from the research on the CHI+MED project (www.chi-med.ac.uk). It has focussed on understanding how the design of interactive medical devices can support safety. CHI+MED also developed practical tools and guidance that we review.
互动式医疗设备,如输液泵、监测器和诊断设备有助于挽救生命。然而,它们的安全性也很关键,因为它们可能在使用中失败,从而导致患者伤害或死亡。这不仅仅是软件和硬件应该满足它们的规格。设计应该有助于确保用户不会犯错误。随着医疗设备变得可移动,并被患者作为日常生活的一部分使用,而不是由训练有素的专业人员在明确的医院环境中使用,安全因素变得更加重要。由于设备对患者造成伤害而召回,监管机构越来越重视家庭使用。我们从CHI+MED项目(www.chi-med.ac.uk)的研究中提供见解。它的重点是理解交互式医疗设备的设计如何支持安全。CHI+MED还开发了我们审查的实用工具和指南。
{"title":"Safer Interactive Medical Device Design: Insights from the CHI+MED Project","authors":"P. Curzon, A. Blandford, H. Thimbleby, A. Cox","doi":"10.4108/EAI.14-10-2015.2261752","DOIUrl":"https://doi.org/10.4108/EAI.14-10-2015.2261752","url":null,"abstract":"Interactive medical devices such as infusion pumps, monitors and diagnostic devices help save lives. However, they are also safety critical in that they may fail in use and patient harm or death ensue. It is not just that the software and hardware should meet their specification. The design should help ensure users do not make mistakes. Safety factors become more important as medical devices become mobile and are used by patients as part of their everyday life rather than by trained professionals in well-defined hospital environments. Regulators are increasingly taking home-use seriously as a result of device recalls due to devices that have caused patient harm. We give insights from the research on the CHI+MED project (www.chi-med.ac.uk). It has focussed on understanding how the design of interactive medical devices can support safety. CHI+MED also developed practical tools and guidance that we review.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits 分离控制和数据栈,以减轻缓冲区溢出漏洞
Pub Date : 2015-10-05 DOI: 10.4108/eai.5-10-2015.150477
C. Kugler, Tilo Müller
Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this article, we present a novel compiler-level protection called SCADS: Separated Control and Data Stacks that protects return addresses and saved frame pointers on a separate stack, called the control stack. In common computer programs, a single user mode stack is used to store control information next to data buffers. By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. To substantiate the practicability of our approach, we provide SCADS as an open source patch for the LLVM compiler infrastructure. Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. As we make control flow information simply unreachable for buffer overflows, many exploits are stopped at an early stage of progression with only negligible performance overhead.
尽管像StackGuard、ASLR和NX这样的保护机制很普遍,但是针对基于堆栈的缓冲区溢出的新防御策略的开发还没有结束。在本文中,我们介绍了一种新的编译器级保护,称为SCADS:分离的控制和数据堆栈,它保护返回地址和保存在称为控制堆栈的单独堆栈上的帧指针。在普通计算机程序中,单用户模式堆栈用于在数据缓冲区旁边存储控制信息。通过将控制信息与数据栈分离,我们可以保护程序控制流的敏感指针不被缓冲区溢出覆盖。为了证明我们方法的实用性,我们提供了SCADS作为LLVM编译器基础架构的开源补丁。重点关注在AMD64架构上运行的Linux和FreeBSD,我们展示了兼容性,安全性和性能结果。由于我们使控制流信息在缓冲区溢出时无法访问,因此许多漏洞在进展的早期阶段就被阻止了,性能开销可以忽略不计。
{"title":"Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits","authors":"C. Kugler, Tilo Müller","doi":"10.4108/eai.5-10-2015.150477","DOIUrl":"https://doi.org/10.4108/eai.5-10-2015.150477","url":null,"abstract":"Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end. In this article, we present a novel compiler-level protection called SCADS: Separated Control and Data Stacks that protects return addresses and saved frame pointers on a separate stack, called the control stack. In common computer programs, a single user mode stack is used to store control information next to data buffers. By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. To substantiate the practicability of our approach, we provide SCADS as an open source patch for the LLVM compiler infrastructure. Focusing on Linux and FreeBSD running on the AMD64 architecture, we show compatibility, security and performance results. As we make control flow information simply unreachable for buffer overflows, many exploits are stopped at an early stage of progression with only negligible performance overhead.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1