首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge 基于实时儿童识别和边缘人脸置乱的未成年人隐私保护
Pub Date : 2020-05-14 DOI: 10.4108/eai.13-7-2018.164560
Alem Fitwi, Meng Yuan, S. Nikouei, Yu Chen
The collection of personal information about individuals, including the minor members of a family, by closedcircuit television (CCTV) cameras creates a lot of privacy concerns. Revealing children’s identifications or activities may compromise their well-being. In this paper, we propose a novel Minor Privacy protection solution using Real-time video processing at the Edge (MiPRE). It is refined to be feasible and accurate to identify minors and apply appropriate privacy-preserving measures accordingly. State of the art deep learning architectures are modified and repurposed to maximize the accuracy of MiPRE. A pipeline extracts face from the input frames and identify minors. Then, a lightweight algorithm scrambles the faces of the minors to anonymize them. Over 20,000 labeled sample points collected from open sources are used for classification. The quantitative experimental results show the superiority of MiPRE with an accuracy of 92.1% with nearreal-time performance. Received on 01 May 2020; accepted on 12 May 2020; published on 14 May 2020
闭路电视(CCTV)摄像头收集个人信息,包括家庭未成年成员的个人信息,引发了很多隐私问题。暴露孩子的身份或活动可能会损害他们的健康。在本文中,我们提出了一种新的使用边缘实时视频处理(MiPRE)的未成年人隐私保护解决方案。为使识别未成年人并采取适当的隐私保护措施更加可行和准确,对其进行了改进。最先进的深度学习架构被修改和重新利用,以最大限度地提高MiPRE的准确性。流水线从输入帧中提取人脸并识别次要帧。然后,一种轻量级算法对未成年人的面部进行加密,使他们匿名。从开放来源收集的超过20,000个标记样本点用于分类。定量实验结果表明,MiPRE的精度达到92.1%,具有较好的实时性。2020年5月1日收到;2020年5月12日接受;发布于2020年5月14日
{"title":"Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge","authors":"Alem Fitwi, Meng Yuan, S. Nikouei, Yu Chen","doi":"10.4108/eai.13-7-2018.164560","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.164560","url":null,"abstract":"The collection of personal information about individuals, including the minor members of a family, by closedcircuit television (CCTV) cameras creates a lot of privacy concerns. Revealing children’s identifications or activities may compromise their well-being. In this paper, we propose a novel Minor Privacy protection solution using Real-time video processing at the Edge (MiPRE). It is refined to be feasible and accurate to identify minors and apply appropriate privacy-preserving measures accordingly. State of the art deep learning architectures are modified and repurposed to maximize the accuracy of MiPRE. A pipeline extracts face from the input frames and identify minors. Then, a lightweight algorithm scrambles the faces of the minors to anonymize them. Over 20,000 labeled sample points collected from open sources are used for classification. The quantitative experimental results show the superiority of MiPRE with an accuracy of 92.1% with nearreal-time performance. Received on 01 May 2020; accepted on 12 May 2020; published on 14 May 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network 使用分层注意网络自动识别漏洞修复提交
Pub Date : 2020-05-12 DOI: 10.4108/eai.13-7-2018.164552
Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang
The application of machine learning and deep learning in the field of vulnerability detection is a hot topic in security research, but currently it faces the problem of lack of dataset. Considering vulnerable code can be obtained from vulnerability fix commits, we propose an automatic vulnerability commit identification tool based on hierarchical attention network (HAN) to expand existing vulnerability dataset. HAN can model the input data at the word and sentence levels respectively and pay attention to the changes in the characteristics of different words in different categories, which improves the classification performance. Experimental results show that the accuracy and F1 of our model both achieve 92%. Through the vulnerability fix commit, researchers can quickly locate the vulnerable code. And extracting vulnerable code from open-source software can effectively expand the current dataset due to the enormous number of open-source software. Received on 14 April 2020; accepted on 05 May 2020; published on 12 May 2020
机器学习和深度学习在漏洞检测领域的应用是安全研究的热点,但目前面临着缺乏数据集的问题。考虑到漏洞修复提交可以获取漏洞代码,提出了一种基于层次关注网络(HAN)的漏洞提交自动识别工具,对现有漏洞数据集进行扩展。HAN可以分别在词和句子两个层面对输入数据进行建模,关注不同类别中不同词的特征变化,提高了分类性能。实验结果表明,该模型的准确率和F1均达到92%。通过漏洞修复提交,研究人员可以快速定位漏洞代码。由于开源软件数量庞大,从开源软件中提取漏洞代码可以有效地扩展现有数据集。2020年4月14日收到;2020年5月5日接受;发布于2020年5月12日
{"title":"Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network","authors":"Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang","doi":"10.4108/eai.13-7-2018.164552","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.164552","url":null,"abstract":"The application of machine learning and deep learning in the field of vulnerability detection is a hot topic in security research, but currently it faces the problem of lack of dataset. Considering vulnerable code can be obtained from vulnerability fix commits, we propose an automatic vulnerability commit identification tool based on hierarchical attention network (HAN) to expand existing vulnerability dataset. HAN can model the input data at the word and sentence levels respectively and pay attention to the changes in the characteristics of different words in different categories, which improves the classification performance. Experimental results show that the accuracy and F1 of our model both achieve 92%. Through the vulnerability fix commit, researchers can quickly locate the vulnerable code. And extracting vulnerable code from open-source software can effectively expand the current dataset due to the enormous number of open-source software. Received on 14 April 2020; accepted on 05 May 2020; published on 12 May 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116957115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring the Cost of Software Vulnerabilities 衡量软件漏洞的成本
Pub Date : 2020-05-12 DOI: 10.4108/eai.13-7-2018.164551
Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, Daehun Nyang, David A. Mohaisen
Enterprises are increasingly considering security as an added cost, making it necessary for those enterprises to see a tangible incentive in adopting security measures. Despite data breach laws, prior studies have suggested that only 4% of reported data breach incidents have resulted in litigation in federal courts, showing the limited legal ramifications of security breaches and vulnerabilities. In this paper, we study the hidden cost of software vulnerabilities reported in the National Vulnerability Database (NVD) through stock price analysis. We perform a high-fidelity data augmentation to ensure data reliability and to estimate vulnerability disclosure dates as a baseline for estimating the implication of software vulnerabilities. We further build a model for stock price prediction using the nonlinear autoregressive neural network with exogenous factors (NARX) Neural Network model to estimate the e ff ect of vulnerability disclosure on the stock price. Compared to prior work, which relies on linear regression models, our approach is shown to provide better prediction performance. Our analysis also shows that the e ff ect of vulnerabilities on vendors varies, and greatly depends on the specific software industry. Whereas some industries are shown statistically to be a ff ected negatively by the release of software vulnerabilities, even when those vulnerabilities are not broadly covered by the media, some others were not a ff ected at all.
企业越来越多地将安全视为一项额外成本,因此有必要让这些企业看到采取安全措施的切实激励。尽管有数据泄露法律,但之前的研究表明,只有4%的报告数据泄露事件导致联邦法院提起诉讼,这表明安全漏洞和漏洞的法律后果有限。本文通过股票价格分析,研究了国家漏洞数据库(NVD)中报告的软件漏洞的隐藏成本。我们执行高保真数据增强,以确保数据可靠性,并估计漏洞披露日期作为估计软件漏洞影响的基线。我们进一步利用非线性自回归神经网络外生因素(NARX)神经网络模型建立股价预测模型,估计脆弱性披露对股价的影响。与先前依赖线性回归模型的工作相比,我们的方法显示出更好的预测性能。我们的分析还表明,漏洞对供应商的影响各不相同,并且很大程度上取决于特定的软件行业。尽管从统计数据来看,有些行业受到软件漏洞发布的负面影响,即使这些漏洞没有被媒体广泛报道,但其他一些行业根本没有受到影响。
{"title":"Measuring the Cost of Software Vulnerabilities","authors":"Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, Daehun Nyang, David A. Mohaisen","doi":"10.4108/eai.13-7-2018.164551","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.164551","url":null,"abstract":"Enterprises are increasingly considering security as an added cost, making it necessary for those enterprises to see a tangible incentive in adopting security measures. Despite data breach laws, prior studies have suggested that only 4% of reported data breach incidents have resulted in litigation in federal courts, showing the limited legal ramifications of security breaches and vulnerabilities. In this paper, we study the hidden cost of software vulnerabilities reported in the National Vulnerability Database (NVD) through stock price analysis. We perform a high-fidelity data augmentation to ensure data reliability and to estimate vulnerability disclosure dates as a baseline for estimating the implication of software vulnerabilities. We further build a model for stock price prediction using the nonlinear autoregressive neural network with exogenous factors (NARX) Neural Network model to estimate the e ff ect of vulnerability disclosure on the stock price. Compared to prior work, which relies on linear regression models, our approach is shown to provide better prediction performance. Our analysis also shows that the e ff ect of vulnerabilities on vendors varies, and greatly depends on the specific software industry. Whereas some industries are shown statistically to be a ff ected negatively by the release of software vulnerabilities, even when those vulnerabilities are not broadly covered by the media, some others were not a ff ected at all.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131522723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Device Authentication Codes based on RF Fingerprinting using Deep Learning 基于深度学习的射频指纹设备认证码
Pub Date : 2020-04-19 DOI: 10.4108/eai.30-11-2021.172305
J. Bassey, Xiangfang Li, Lijun Qian
In this paper, we propose Device Authentication Code (DAC), a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures. The proposed DAC is based on RF fingerprinting, information theoretic method, feature learning, and discriminatory power of deep learning. Specifically, an autoencoder is used to automatically extract features from the RF traces, and the reconstruction error is used as the DAC and this DAC is unique to the device and the particular message of interest. Then Kolmogorov-Smirnov (K-S) test is used to match the distribution of the reconstruction error generated by the autoencoder and the received message, and the result will determine whether the device of interest belongs to an authorized user. We validate this concept on two experimentally collected RF traces from six ZigBee and five universal software defined radio peripheral (USRP) devices, respectively. The traces span a range of Signalto- Noise Ratio by varying locations and mobility of the devices and channel interference and noise to ensure robustness of the model. Experimental results demonstrate that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest and can be used to identify RF devices. Furthermore, the proposed method does not need the RF traces of the intruder during model training yet be able to identify devices not seen during training, which makes it practical.
在本文中,我们提出了设备认证码(DAC),这是一种通过利用无线接口的射频(RF)签名来认证物联网设备的新方法。所提出的DAC是基于射频指纹、信息论方法、特征学习和深度学习的鉴别能力。具体来说,自动编码器用于自动从射频跟踪中提取特征,重构误差用作DAC,并且该DAC对于设备和感兴趣的特定消息是唯一的。然后使用柯尔莫戈洛夫-斯米尔诺夫(K-S)检验将自编码器产生的重构误差的分布与接收到的消息进行匹配,结果将确定感兴趣的设备是否属于授权用户。我们分别在六个ZigBee和五个通用软件定义无线电外设(USRP)设备的两个实验收集的RF走线上验证了这一概念。走线通过改变设备的位置和移动性以及通道干扰和噪声来跨越一系列信噪比,以确保模型的鲁棒性。实验结果表明,DAC能够通过提取任何感兴趣的无线设备所独有的显著特征来防止设备模拟,并可用于识别RF设备。此外,该方法在模型训练期间不需要入侵者的射频痕迹,但能够识别训练期间未见的设备,使其具有实用性。
{"title":"Device Authentication Codes based on RF Fingerprinting using Deep Learning","authors":"J. Bassey, Xiangfang Li, Lijun Qian","doi":"10.4108/eai.30-11-2021.172305","DOIUrl":"https://doi.org/10.4108/eai.30-11-2021.172305","url":null,"abstract":"In this paper, we propose Device Authentication Code (DAC), a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures. The proposed DAC is based on RF fingerprinting, information theoretic method, feature learning, and discriminatory power of deep learning. Specifically, an autoencoder is used to automatically extract features from the RF traces, and the reconstruction error is used as the DAC and this DAC is unique to the device and the particular message of interest. Then Kolmogorov-Smirnov (K-S) test is used to match the distribution of the reconstruction error generated by the autoencoder and the received message, and the result will determine whether the device of interest belongs to an authorized user. We validate this concept on two experimentally collected RF traces from six ZigBee and five universal software defined radio peripheral (USRP) devices, respectively. The traces span a range of Signalto- Noise Ratio by varying locations and mobility of the devices and channel interference and noise to ensure robustness of the model. Experimental results demonstrate that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest and can be used to identify RF devices. Furthermore, the proposed method does not need the RF traces of the intruder during model training yet be able to identify devices not seen during training, which makes it practical.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis 基于环境噪声合成的多因素安全协议系统的开发
Pub Date : 2020-04-15 DOI: 10.4108/eai.13-7-2018.163979
A. Imoize, Boluwatife Samuel Ben-Adeola, J. Adebisi
The escalating cases of security threats on the global scene, especially in the cyberspace, demands urgent need to deploy sophisticated measures to mitigate these calamitous threats. To this end, various lock mechanisms have been developed and deployed to prevent access to control systems from potential intruders. This paper provides a solution to this pervasive problem, addressing concerns on the physical and virtual components of an access control system. A locally generated One-Time-Passkeys (OTPs) was created, leveraging ambient noise as entropy input. The system was deployed on an Arduino microcontroller embedded in a safe-cabinet secured with a 12V solenoid lock. The design was implemented and tested against standard metrics. Results achieved include algorithmic optimizations of existing local OTP protocol implementations, and the realization of a safe lock module, which interfaces with a mobile application developed on Android over a secured Bluetooth connection.
全球范围内,特别是网络空间安全威胁不断升级,迫切需要部署复杂的措施来缓解这些灾难性威胁。为此,已经开发和部署了各种锁机制,以防止潜在入侵者访问控制系统。本文针对这个普遍存在的问题提供了一个解决方案,解决了对访问控制系统的物理和虚拟组件的关注。利用环境噪声作为熵输入,创建了本地生成的一次性密钥(otp)。该系统部署在Arduino微控制器上,该微控制器嵌入一个安全柜中,并使用12V电磁锁固定。该设计是根据标准指标实现和测试的。所取得的成果包括对现有本地OTP协议实现的算法优化,以及安全锁模块的实现,该模块通过安全的蓝牙连接与Android上开发的移动应用程序接口。
{"title":"Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis","authors":"A. Imoize, Boluwatife Samuel Ben-Adeola, J. Adebisi","doi":"10.4108/eai.13-7-2018.163979","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163979","url":null,"abstract":"The escalating cases of security threats on the global scene, especially in the cyberspace, demands urgent need to deploy sophisticated measures to mitigate these calamitous threats. To this end, various lock mechanisms have been developed and deployed to prevent access to control systems from potential intruders. This paper provides a solution to this pervasive problem, addressing concerns on the physical and virtual components of an access control system. A locally generated One-Time-Passkeys (OTPs) was created, leveraging ambient noise as entropy input. The system was deployed on an Arduino microcontroller embedded in a safe-cabinet secured with a 12V solenoid lock. The design was implemented and tested against standard metrics. Results achieved include algorithmic optimizations of existing local OTP protocol implementations, and the realization of a safe lock module, which interfaces with a mobile application developed on Android over a secured Bluetooth connection.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"131 4-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside 操纵用户对亚马逊Echo的信任:从外部损害智能家居
Pub Date : 2020-04-07 DOI: 10.4108/eai.13-7-2018.163924
Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang
Nowadays, voice control becomes a popular application that allows people to communicate with their devices more conveniently. Amazon Echo, designed around Alexa, is capable of controlling devices, e.g., smart lights, etc. Moreover, with the help of IFTTT (if-this-then-that) service, Amazon Echo’s skill set gets improved significantly. However, people who are enjoying these conveniences may not take security into account. Hence, it becomes important to carefully scrutinize the Echo’s voice control attack surface and the corresponding impacts. In this paper, we proposed MUTAE (Manipulating Users’ Trust on Amazon Echo) attack to remotely compromise Echo’s voice control interface. We also conducted security analysis and performed taxonomy based on different consequences considering the level of trust that users have placed on Echo. Finally, we also proposed mitigation techniques that protect Echo from MUTAE attack. Received on 29 March 2020; accepted on 02 April 2020; published on 07 April 2020
如今,语音控制成为一种流行的应用程序,它允许人们更方便地与他们的设备进行通信。亚马逊Echo是围绕Alexa设计的,能够控制设备,例如智能灯等。此外,在IFTTT (if-this-then-that)服务的帮助下,亚马逊Echo的技能组合得到了显著提高。然而,享受这些便利的人们可能不会考虑安全问题。因此,仔细研究Echo的语音控制攻击面和相应的影响变得非常重要。在本文中,我们提出了MUTAE (manipulation Users ' Trust on Amazon Echo)攻击来远程破坏Echo的语音控制接口。考虑到用户对Echo的信任程度,我们还进行了安全分析,并根据不同的后果进行了分类。最后,我们还提出了保护Echo免受MUTAE攻击的缓解技术。2020年3月29日收到;2020年4月2日验收;发布于2020年4月7日
{"title":"Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside","authors":"Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang","doi":"10.4108/eai.13-7-2018.163924","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163924","url":null,"abstract":"Nowadays, voice control becomes a popular application that allows people to communicate with their devices more conveniently. Amazon Echo, designed around Alexa, is capable of controlling devices, e.g., smart lights, etc. Moreover, with the help of IFTTT (if-this-then-that) service, Amazon Echo’s skill set gets improved significantly. However, people who are enjoying these conveniences may not take security into account. Hence, it becomes important to carefully scrutinize the Echo’s voice control attack surface and the corresponding impacts. In this paper, we proposed MUTAE (Manipulating Users’ Trust on Amazon Echo) attack to remotely compromise Echo’s voice control interface. We also conducted security analysis and performed taxonomy based on different consequences considering the level of trust that users have placed on Echo. Finally, we also proposed mitigation techniques that protect Echo from MUTAE attack. Received on 29 March 2020; accepted on 02 April 2020; published on 07 April 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems 可控的BTG:在可互操作的医疗系统中实现灵活的紧急覆盖
Pub Date : 2020-02-19 DOI: 10.4108/eai.13-7-2018.163213
Qais Tasali, Christine Sublett, Eugene Y. Vasserman
INTRODUCTION: In medical cyber-physical systems (mCPS), availability must be prioritized over other security properties, making it challenging to craft least-privilege authorization policies which preserve patient safety and confidentiality even during emergency situations. For example, unauthorized access to device(s) connected to a patient or an app controlling these devices could result in patient harm. Previous work has suggested a virtual version of “Break the Glass” (BTG), an analogy to breaking a physical barrier to access a protected emergency resource such as a fire extinguisher or “crash cart”. In healthcare, BTG is used to override access controls and allow for unrestricted access to resources, e.g. Electronic Health Records. After a “BTG event” completes, the actions of all concerned parties are audited to validate the reasons and legitimacy for the override. OBJECTIVES: Medical BTG has largely been treated as an all-or-nothing scenario: either a means to obtain unrestricted access is provided, or BTG is not supported. We show how to handle BTG natively within the ABAC model, maintaining full compatibility with existing access control frameworks, putting BTG in the policy domain rather than requiring framework modifications. This approach also makes BTG more flexible, allowing for fine-grained facility-specific policies, and even automates auditing in many situations, while maintaining the principle of least-privilege. METHODS: We do this by constructing a BTG “meta-policy” which works with existing access control policies by explicitly allowing override when requested. RESULTS: We present a sample BTG policy and formally verify that the resulting combined set of access control policies correctly satisfies the goals of the original policy set and allows expanded access during a BTG event. We show how to use the same verification methods to check new policies, easing the process of crafting least-privilege policies. Received on 21 December 2019; accepted on 18 February 2020; published on 19 February 2020
简介:在医疗网络物理系统(mCPS)中,可用性必须优先于其他安全属性,这使得即使在紧急情况下也要制定保护患者安全和保密性的最低权限授权策略具有挑战性。例如,未经授权访问连接到患者的设备或控制这些设备的应用程序可能会对患者造成伤害。先前的研究提出了虚拟版的“打破玻璃”(BTG),类似于打破物理障碍,进入受保护的紧急资源,如灭火器或“急救车”。在医疗保健领域,BTG用于覆盖访问控制并允许对资源(例如电子健康记录)的无限制访问。在“BTG事件”完成后,对所有相关方的行为进行审计,以验证推翻的原因和合法性。目的:医疗BTG在很大程度上被视为一个要么全有要么全无的方案:要么提供获得无限制访问的手段,要么不支持BTG。我们将展示如何在ABAC模型中原生地处理BTG,保持与现有访问控制框架的完全兼容性,将BTG置于策略域中,而不需要修改框架。这种方法还使BTG更加灵活,允许细粒度的特定于设施的策略,甚至在许多情况下自动化审计,同时保持最少特权原则。方法:我们通过构建一个BTG“元策略”来实现这一点,该策略通过显式允许在请求时重写与现有的访问控制策略一起工作。结果:我们提供了一个示例BTG策略,并正式验证了所得到的访问控制策略组合集正确地满足了原始策略集的目标,并允许在BTG事件期间扩展访问。我们将展示如何使用相同的验证方法来检查新策略,从而简化制定最少特权策略的过程。2019年12月21日收到;2020年2月18日接受;发布于2020年2月19日
{"title":"Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems","authors":"Qais Tasali, Christine Sublett, Eugene Y. Vasserman","doi":"10.4108/eai.13-7-2018.163213","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163213","url":null,"abstract":"INTRODUCTION: In medical cyber-physical systems (mCPS), availability must be prioritized over other security properties, making it challenging to craft least-privilege authorization policies which preserve patient safety and confidentiality even during emergency situations. For example, unauthorized access to device(s) connected to a patient or an app controlling these devices could result in patient harm. Previous work has suggested a virtual version of “Break the Glass” (BTG), an analogy to breaking a physical barrier to access a protected emergency resource such as a fire extinguisher or “crash cart”. In healthcare, BTG is used to override access controls and allow for unrestricted access to resources, e.g. Electronic Health Records. After a “BTG event” completes, the actions of all concerned parties are audited to validate the reasons and legitimacy for the override. OBJECTIVES: Medical BTG has largely been treated as an all-or-nothing scenario: either a means to obtain unrestricted access is provided, or BTG is not supported. We show how to handle BTG natively within the ABAC model, maintaining full compatibility with existing access control frameworks, putting BTG in the policy domain rather than requiring framework modifications. This approach also makes BTG more flexible, allowing for fine-grained facility-specific policies, and even automates auditing in many situations, while maintaining the principle of least-privilege. METHODS: We do this by constructing a BTG “meta-policy” which works with existing access control policies by explicitly allowing override when requested. RESULTS: We present a sample BTG policy and formally verify that the resulting combined set of access control policies correctly satisfies the goals of the original policy set and allows expanded access during a BTG event. We show how to use the same verification methods to check new policies, easing the process of crafting least-privilege policies. Received on 21 December 2019; accepted on 18 February 2020; published on 19 February 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125135704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? 人工生成和机器生成的密码强度评级:用户更信任哪一个?
Pub Date : 2019-08-01 DOI: 10.4108/eai.13-7-2018.162797
S. Alqahtani, Shujun Li, Haiyue Yuan, P. Rusconi
Proactive password checkers have been widely used to persuade users to select stronger passwords by providing machine-generated strength ratings of passwords. If such ratings do not match human-generated ratings of human users, there can be a loss of trust in PPCs. In order to study the effectiveness of PPCs, it would be useful to investigate how human users perceive such machine- and human-generated ratings in terms of their trust, which has been rarely studied in the literature. To fill this gap, we report a large-scale crowdsourcing study with over 1,000 workers. The participants were asked to choose which of the two ratings they trusted more. The passwords were selected based on a survey of over 100 human password experts. The results revealed that participants exhibited four distinct behavioral patterns when the passwords were hidden, and many changed their behaviors significantly after the passwords were disclosed, suggesting their reported trust was influenced by their own judgments.
主动密码检查器已被广泛用于通过提供机器生成的密码强度评级来说服用户选择更强的密码。如果这样的评级与人类用户产生的评级不匹配,那么就会失去对ppc的信任。为了研究PPCs的有效性,调查人类用户如何看待这种机器和人类产生的信任评级将是有用的,这在文献中很少研究。为了填补这一空白,我们报告了一项有1000多名员工参与的大规模众包研究。参与者被要求选择他们更信任哪一个评级。这些密码是根据对100多名人类密码专家的调查选出的。结果显示,当密码被隐藏时,参与者表现出四种不同的行为模式,许多人在密码被披露后显著改变了他们的行为模式,这表明他们报告的信任受到他们自己判断的影响。
{"title":"Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?","authors":"S. Alqahtani, Shujun Li, Haiyue Yuan, P. Rusconi","doi":"10.4108/eai.13-7-2018.162797","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.162797","url":null,"abstract":"Proactive password checkers have been widely used to persuade users to select stronger passwords by providing machine-generated strength ratings of passwords. If such ratings do not match human-generated ratings of human users, there can be a loss of trust in PPCs. In order to study the effectiveness of PPCs, it would be useful to investigate how human users perceive such machine- and human-generated ratings in terms of their trust, which has been rarely studied in the literature. To fill this gap, we report a large-scale crowdsourcing study with over 1,000 workers. The participants were asked to choose which of the two ratings they trusted more. The passwords were selected based on a survey of over 100 human password experts. The results revealed that participants exhibited four distinct behavioral patterns when the passwords were hidden, and many changed their behaviors significantly after the passwords were disclosed, suggesting their reported trust was influenced by their own judgments.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attacker Capability based Dynamic Deception Model for Large-Scale Networks 基于攻击者能力的大规模网络动态欺骗模型
Pub Date : 2019-08-01 DOI: 10.4108/eai.13-7-2018.162808
Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, Charles Kamouha
In modern days, cyber networks need continuous monitoring to keep the network secure and available to legitimate users. Cyber attackers use reconnaissance mission to collect critical network information and using that information, they make an advanced level cyber-attack plan. To thwart the reconnaissance mission and counterattack plan, the cyber defender needs to come up with a state-of-the-art cyber defense strategy. In this paper, we model a dynamic deception system (DDS) which will not only thwart reconnaissance mission but also steer the attacker towards fake network to achieve a fake goal state. In our model, we also capture the attacker’s capability using a belief matrix which is a joint probability distribution over the security states and attacker types. Experiments conducted on the prototype implementation of our DDS confirm that the defender can make the decision whether to spend more resources or save resources based on attacker types and thwart reconnaissance mission.
在现代,网络需要持续监控,以保证网络的安全,并对合法用户可用。网络攻击者利用侦察任务收集关键网络信息,并利用这些信息制定高级网络攻击计划。为了阻止侦察任务和反击计划,网络防御者需要制定最先进的网络防御战略。在本文中,我们建立了一个动态欺骗系统(DDS),该系统不仅可以阻止侦察任务,还可以引导攻击者走向虚假网络,以达到虚假的目标状态。在我们的模型中,我们还使用一个信念矩阵来捕获攻击者的能力,该矩阵是安全状态和攻击者类型的联合概率分布。在我们的DDS原型实现上进行的实验证实,防御者可以根据攻击者的类型来决定是花费更多的资源还是节省资源,从而阻止侦察任务。
{"title":"Attacker Capability based Dynamic Deception Model for Large-Scale Networks","authors":"Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, Charles Kamouha","doi":"10.4108/eai.13-7-2018.162808","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.162808","url":null,"abstract":"In modern days, cyber networks need continuous monitoring to keep the network secure and available to legitimate users. Cyber attackers use reconnaissance mission to collect critical network information and using that information, they make an advanced level cyber-attack plan. To thwart the reconnaissance mission and counterattack plan, the cyber defender needs to come up with a state-of-the-art cyber defense strategy. In this paper, we model a dynamic deception system (DDS) which will not only thwart reconnaissance mission but also steer the attacker towards fake network to achieve a fake goal state. In our model, we also capture the attacker’s capability using a belief matrix which is a joint probability distribution over the security states and attacker types. Experiments conducted on the prototype implementation of our DDS confirm that the defender can make the decision whether to spend more resources or save resources based on attacker types and thwart reconnaissance mission.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur 应用机器学习技术来理解网络钓鱼攻击发生时的用户行为
Pub Date : 2019-08-01 DOI: 10.4108/eai.13-7-2018.162809
Yi Li, Kaiqi Xiong, Xiangyang Li
Emails have been widely used in our daily life. It is important to understand user behaviors regarding email security situation assessments. However, there are very challenging and limited studies on email user behaviors. To study user security-related behaviors, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. Specifically, we conduct two experimental studies, where participants take part in our experiments on site in a lab contained environment and online through Amazon Mechanical Turk that are referred to on-site study and online study, respectively. In the two experimental studies, we design questionnaires for the two studies and use a set of emails including phishing emails from the real world with some necessary modifications for personal information protection. Furthermore, we develop necessary software tools to collect experimental data include participants’ basic background information, time measurement, mouse movement, and their answers to survey questions. Based on the collected data, we investigate what factors, such as intervention, phishing types, and an incentive mechanism, play a key role in user behaviors when phishing attacks occur. The difficulty of such investigation is due to the qualitative analysis of user behaviors and the limited number of data in the on-site study. For these reasons, we develop an approach to quantify user behavior metrics and reduce the number of user attributes by evaluating the significance of each attribute and analyzing the correlation of attributes. Moreover, we propose a machine learning framework, which contains attribute reduction, to find a critical point that classifies the performance of a participant into either ‘good’ or ‘bad’ through 10-fold cross-validation with randomly selected attributes cross-validation models. The proposed machine learning model can be used to predict the performance of a user based on the user profile. Our data analysis shows that intervention and an incentive mechanism play a significant role while phishing type I is more harmful to users compared to the other two types. The findings of this research can be used to help a user identify a phishing attack and prevent the user from being a victim of such an attack. Received on 21 November 2019; accepted on 13 January 2020; published on 29 January 2020
电子邮件在我们的日常生活中被广泛使用。了解用户在电子邮件安全状况评估方面的行为是非常重要的。然而,关于电子邮件用户行为的研究非常具有挑战性和局限性。为了研究用户安全相关行为,我们设计并调查了一个电子邮件测试平台,以了解用户在阅读电子邮件时的不同行为,其中一些是网络钓鱼。具体来说,我们进行了两项实验研究,参与者在实验室包含的环境中现场参与我们的实验,并通过Amazon Mechanical Turk在线参与我们的实验,分别称为现场研究和在线研究。在这两项实验研究中,我们为这两项研究设计了问卷,并使用了一组电子邮件,其中包括来自现实世界的网络钓鱼邮件,并对个人信息保护进行了必要的修改。此外,我们开发了必要的软件工具来收集实验数据,包括参与者的基本背景信息、时间测量、鼠标移动以及他们对调查问题的回答。基于收集到的数据,我们研究了当网络钓鱼攻击发生时,干预、网络钓鱼类型和激励机制等因素在用户行为中起关键作用。这种调查的困难在于对用户行为的定性分析和现场研究的数据数量有限。基于这些原因,我们开发了一种量化用户行为指标的方法,并通过评估每个属性的重要性和分析属性之间的相关性来减少用户属性的数量。此外,我们提出了一个包含属性约简的机器学习框架,通过随机选择属性交叉验证模型的10倍交叉验证,找到一个临界点,将参与者的表现分类为“好”或“坏”。提出的机器学习模型可用于基于用户配置文件预测用户的性能。我们的数据分析表明,干预和激励机制发挥了重要作用,而网络钓鱼类型I比其他两种类型对用户的危害更大。这项研究的结果可用于帮助用户识别网络钓鱼攻击,并防止用户成为此类攻击的受害者。2019年11月21日收到;2020年1月13日接受;于2020年1月29日发布
{"title":"Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur","authors":"Yi Li, Kaiqi Xiong, Xiangyang Li","doi":"10.4108/eai.13-7-2018.162809","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.162809","url":null,"abstract":"Emails have been widely used in our daily life. It is important to understand user behaviors regarding email security situation assessments. However, there are very challenging and limited studies on email user behaviors. To study user security-related behaviors, we design and investigate an email test platform to understand how users behave differently when they read emails, some of which are phishing. Specifically, we conduct two experimental studies, where participants take part in our experiments on site in a lab contained environment and online through Amazon Mechanical Turk that are referred to on-site study and online study, respectively. In the two experimental studies, we design questionnaires for the two studies and use a set of emails including phishing emails from the real world with some necessary modifications for personal information protection. Furthermore, we develop necessary software tools to collect experimental data include participants’ basic background information, time measurement, mouse movement, and their answers to survey questions. Based on the collected data, we investigate what factors, such as intervention, phishing types, and an incentive mechanism, play a key role in user behaviors when phishing attacks occur. The difficulty of such investigation is due to the qualitative analysis of user behaviors and the limited number of data in the on-site study. For these reasons, we develop an approach to quantify user behavior metrics and reduce the number of user attributes by evaluating the significance of each attribute and analyzing the correlation of attributes. Moreover, we propose a machine learning framework, which contains attribute reduction, to find a critical point that classifies the performance of a participant into either ‘good’ or ‘bad’ through 10-fold cross-validation with randomly selected attributes cross-validation models. The proposed machine learning model can be used to predict the performance of a user based on the user profile. Our data analysis shows that intervention and an incentive mechanism play a significant role while phishing type I is more harmful to users compared to the other two types. The findings of this research can be used to help a user identify a phishing attack and prevent the user from being a victim of such an attack. Received on 21 November 2019; accepted on 13 January 2020; published on 29 January 2020","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1