首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Efficient Public Blockchain Client for Lightweight Users 轻量级用户的高效公共区块链客户端
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153528
Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, W. Shi
Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and smartphones. In order to cope with the problem, several solutions have been proposed to reduce the storage burden. However, existing solutions either achieve a limited storage reduction (e.g., simple payment verification), or rely on some strong security assumption (e.g., the use of trusted server). In this paper, we propose a new approach to solving the problem. Specifically, we propose an underline{e}fficient verification protocol for underline{p}ublic underline{b}lockunderline{c}hains, or EPBC for short. EPBC is particularly suitable for lightweight users, who only need to store a small amount of data that is {it independent of} the size of the blockchain. We analyze EPBC's performance and security, and discuss its integration with existing public ledger systems. Experimental results confirm that EPBC is practical for lightweight users.
公共区块链为存储交易数据提供了一种去中心化的方法,在不同的领域有许多应用。为了让用户跟踪交易,一个简单的方法是让他们保留整个公共分类账的本地副本。由于分类帐的规模不断增长,这种方法变得越来越不实用,特别是对于物联网设备和智能手机等轻量级用户。为了解决这个问题,已经提出了几种解决方案来减少存储负担。然而,现有的解决方案要么实现了有限的存储减少(例如,简单的支付验证),要么依赖于一些强安全性假设(例如,使用可信服务器)。在本文中,我们提出了一种新的方法来解决这个问题。具体来说,我们为underline{p}公共underline{b}锁underline{c}链(简称EPBC)提出了一个underline{e}有效的验证协议。EPBC特别适合轻量级用户,他们只需要存储与区块链大小无关的少量数据。我们分析了EPBC的性能和安全性,并讨论了它与现有公共分类账系统的集成。实验结果证实了EPBC对于轻型用户是实用的。
{"title":"Efficient Public Blockchain Client for Lightweight Users","authors":"Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, W. Shi","doi":"10.4108/eai.4-1-2018.153528","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153528","url":null,"abstract":"Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and smartphones. In order to cope with the problem, several solutions have been proposed to reduce the storage burden. However, existing solutions either achieve a limited storage reduction (e.g., simple payment verification), or rely on some strong security assumption (e.g., the use of trusted server). In this paper, we propose a new approach to solving the problem. Specifically, we propose an underline{e}fficient verification protocol for underline{p}ublic underline{b}lockunderline{c}hains, or EPBC for short. EPBC is particularly suitable for lightweight users, who only need to store a small amount of data that is {it independent of} the size of the blockchain. We analyze EPBC's performance and security, and discuss its integration with existing public ledger systems. Experimental results confirm that EPBC is practical for lightweight users.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud 云环境下企业网络间隐形桥的概率推断
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153526
Xiaoyan Sun, Jun Dai, A. Singhal, Peng Liu
Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other. However, some “stealthy bridges” could be established to break such isolation due to two features of the public cloud: virtual machine image sharing and virtual machine co-residency. This paper proposes to use cross-layer Bayesian networks to infer the stealthy bridges existing between enterprise network islands. Cloud-level attack graphs are firstly built to capture the potential attacks enabled by stealthy bridges and reveal hidden possible attack paths. Cross-layer Bayesian networks are then constructed to infer the probability of stealthy bridge existence. The experiment results show that the cross-layer Bayesian networks are capable of inferring the existence of stealthy bridges given supporting evidence from other intrusion steps in a multi-step attack. Received on 25 December 2017; accepted on 26 December 2017; published on 4 January 2018
云计算将计算作为一种实用工具,具有显著改变IT行业的潜力。被云的高效率、低成本和高灵活性所吸引,企业开始将大部分网络迁移到云上。云成为多个“租户”居住的公共空间。除了一些公共服务外,云中的企业网络之间应该是绝对隔离的。然而,由于公共云的两个特性:虚拟机映像共享和虚拟机共同驻留,可以建立一些“隐形桥梁”来打破这种隔离。本文提出使用跨层贝叶斯网络来推断企业网络孤岛之间存在的隐形桥。首先构建云级攻击图,以捕获隐形桥接器所启用的潜在攻击,并揭示隐藏的可能攻击路径。然后构建跨层贝叶斯网络来推断隐形桥存在的概率。实验结果表明,在多步攻击中,基于其他入侵步骤的支持证据,跨层贝叶斯网络能够推断出隐形桥的存在。2017年12月25日收到;于2017年12月26日接受;于2018年1月4日发布
{"title":"Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud","authors":"Xiaoyan Sun, Jun Dai, A. Singhal, Peng Liu","doi":"10.4108/eai.4-1-2018.153526","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153526","url":null,"abstract":"Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other. However, some “stealthy bridges” could be established to break such isolation due to two features of the public cloud: virtual machine image sharing and virtual machine co-residency. This paper proposes to use cross-layer Bayesian networks to infer the stealthy bridges existing between enterprise network islands. Cloud-level attack graphs are firstly built to capture the potential attacks enabled by stealthy bridges and reveal hidden possible attack paths. Cross-layer Bayesian networks are then constructed to infer the probability of stealthy bridge existence. The experiment results show that the cross-layer Bayesian networks are capable of inferring the existence of stealthy bridges given supporting evidence from other intrusion steps in a multi-step attack. Received on 25 December 2017; accepted on 26 December 2017; published on 4 January 2018","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs 奇异谱分析在CRNs在线异常检测中的应用
Pub Date : 2017-12-28 DOI: 10.4108/eai.28-12-2017.153516
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng
Cognitive radio networks (CRNs) have been recognized as a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window online anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.
认知无线网络(crn)被认为是一种很有前途的技术,它允许辅助用户(su)广泛地探索频谱资源的使用效率,同时不会给许可用户带来干扰。由于无线网络环境的不规范,crn容易受到各种恶意实体的攻击。因此,首先检测异常是至关重要的。然而,从crn的内在特征来看,几乎没有一种普遍适用的异常检测方案。奇异谱分析(SSA)在理论上已被证明是一种准确、快速检测运行(随机)过程特征变化的最佳方法。此外,SSA是一种无模型的方法,对于不同类型的异常不需要假设参数模型,这使其成为一种通用的异常检测方案。本文引入了一种基于相干性的自适应SSA方法参数和分量选择机制,并在此基础上建立了CRNs滑动窗口在线异常检测器。实验结果表明,基于ssa的异常检测器对多种异常具有较高的检测精度。
{"title":"Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs","authors":"Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng","doi":"10.4108/eai.28-12-2017.153516","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153516","url":null,"abstract":"Cognitive radio networks (CRNs) have been recognized as a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window online anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Overview of Romania 802.11Wireless Security & Statistics 罗马尼亚802.11无线安全和统计概述
Pub Date : 2017-12-28 DOI: 10.4108/eai.28-12-2017.153518
C. Leca
This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on security issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes more than 100000 unique wireless networks gathered in Bucharest, major urban areas and the surrounding rural areas. The results of the study cover security protocol usage, the percentage in which known vulnerabilities are still deployed in wireless networks and statistics regarding channel and band usage, common SSIDs in Romania, top equipment manufacturers and the situation of provider wireless access points. The study also shows that provider wireless access points on average offer better security than private networks. Received on 28 January 2017; accepted on 20 April 2017; published on 28 December 2017
本文介绍了罗马尼亚无线网络安全和统计数据的研究,旨在提高公众对安全问题的认识,并强调商业设备中已知漏洞的普遍性。研究中使用的数据是采用战争驱动技术获取的无线网络广播数据。为了确保全面的概述,收集的数据包括在布加勒斯特、主要城市地区和周围农村地区收集的100,000多个独特的无线网络。研究结果涵盖了安全协议的使用情况,已知漏洞在无线网络中部署的百分比,以及有关信道和频带使用情况的统计数据,罗马尼亚的常用ssid,顶级设备制造商和提供商无线接入点的情况。该研究还表明,供应商的无线接入点平均提供比专用网络更好的安全性。2017年1月28日收到;2017年4月20日接受;发布于2017年12月28日
{"title":"Overview of Romania 802.11Wireless Security & Statistics","authors":"C. Leca","doi":"10.4108/eai.28-12-2017.153518","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153518","url":null,"abstract":"This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on security issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes more than 100000 unique wireless networks gathered in Bucharest, major urban areas and the surrounding rural areas. The results of the study cover security protocol usage, the percentage in which known vulnerabilities are still deployed in wireless networks and statistics regarding channel and band usage, common SSIDs in Romania, top equipment manufacturers and the situation of provider wireless access points. The study also shows that provider wireless access points on average offer better security than private networks. Received on 28 January 2017; accepted on 20 April 2017; published on 28 December 2017","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"2472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact lossy and all-but-one trapdoor functions from lattice 晶格上的紧致有损和除一个以外的所有活门函数
Pub Date : 2017-12-13 DOI: 10.4108/eai.28-12-2017.153517
Leixiao Cheng, Quanshui Wu, Yunlei Zhao
Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop new and improved lattice-based LTDF and ABO-TDF. In this work, we provide more compact constructions of LTDF and ABO-TDF based on the learning with errors (LWE) problem. In addition, our LWE-based ABO-TDF can allow smaller system parameters to support super-polynomially many injective branches in the construction of CCA secure public key encryption. As a core building tool, we provide a more compact homomorphic symmetric encryption schemes based on LWE, which might be of independent interest. To further optimize the ABO-TDF construction, we employ the full rank difference encoding technique. As a consequence, the results presented in this work can substantially improve the performance of all the previous LWE-based cryptographic constructions based upon LTDF and ABO-TDF.
有损陷门函数(LTDF)和除一个以外的所有陷门函数(ABO-TDF)是基本的加密基元。鉴于量子计算的最新进展,开发新的和改进的基于晶格的LTDF和ABO-TDF将是非常可取的。在这项工作中,我们基于带误差学习(LWE)问题提供了更紧凑的LTDF和ABO-TDF结构。此外,我们的基于lwe的ABO-TDF可以在构建CCA安全公钥加密时允许更小的系统参数支持超多项式多注入分支。作为核心构建工具,我们提供了一种基于LWE的更紧凑的同态对称加密方案,这可能是独立的兴趣。为了进一步优化ABO-TDF结构,我们采用了全秩差编码技术。因此,本研究的结果可以大大提高以前基于LTDF和ABO-TDF的所有基于lwe的加密结构的性能。
{"title":"Compact lossy and all-but-one trapdoor functions from lattice","authors":"Leixiao Cheng, Quanshui Wu, Yunlei Zhao","doi":"10.4108/eai.28-12-2017.153517","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153517","url":null,"abstract":"Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop new and improved lattice-based LTDF and ABO-TDF. In this work, we provide more compact constructions of LTDF and ABO-TDF based on the learning with errors (LWE) problem. In addition, our LWE-based ABO-TDF can allow smaller system parameters to support super-polynomially many injective branches in the construction of CCA secure public key encryption. As a core building tool, we provide a more compact homomorphic symmetric encryption schemes based on LWE, which might be of independent interest. To further optimize the ABO-TDF construction, we employ the full rank difference encoding technique. As a consequence, the results presented in this work can substantially improve the performance of all the previous LWE-based cryptographic constructions based upon LTDF and ABO-TDF.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks 基于片段生命周期建模和回调的Android平台数据流分析
Pub Date : 2017-12-07 DOI: 10.4108/eai.7-12-2017.153394
Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misuses of sensitive information for apps. On the one hand, careless programmers may leak the data by accident. On the other hand, the attackers develop malware to collect sensitive data intentionally. Many researchers apply data flow analysis to detect data leakages of an app. However, data flow analysis on Android platform is quite di ff erent from the programs on desktop. Many researchers have solved some problems of data flow analysis on Android platform, like Activity lifecycle, callback methods, inter-component communication. We find that Fragment’s lifecycle also has an e ff ect on the data flow analysis of Android apps. Some data will be leaked if we don’t take Fragment’s lifecycle into consideration when performing data flow analysis in Android apps. So in this paper, we propose an approach to model Fragment’s lifecycle and its relationship with Activity’s lifecycle, then introduce a tool called FragDroid based on FlowDroid [7]. We conduct some experiments to evaluate the e ff ectiveness of our tool and the results show that there are 8% of apps in our data set using Fragment. In particular, for popular apps, the result is 50.8%. We also evaluate the performance of using FragDroid to analyze Android apps, the result shows the average overhead is 17%.
智能手机承载着大量的敏感信息来满足人们的各种需求,但是信息的使用方式对于保证用户隐私的安全至关重要。对应用程序敏感信息的滥用有两种。一方面,粗心的程序员可能会意外泄露数据。另一方面,攻击者故意开发恶意软件来收集敏感数据。许多研究人员使用数据流分析来检测应用程序的数据泄露。然而,Android平台上的数据流分析与桌面上的程序有很大的不同。许多研究者已经解决了Android平台上的一些数据流分析问题,如Activity生命周期、回调方法、组件间通信等。我们发现Fragment的生命周期也会对Android应用的数据流分析产生影响。如果我们在Android应用中执行数据流分析时不考虑Fragment的生命周期,就会有一些数据泄露。因此,在本文中,我们提出了一种方法来建模Fragment的生命周期及其与Activity的生命周期的关系,然后介绍了一个基于FlowDroid的工具FragDroid[7]。我们进行了一些实验来评估我们的工具的有效性,结果表明,我们的数据集中有8%的应用程序使用Fragment。在热门应用中,这一比例为50.8%。我们还评估了使用FragDroid分析Android应用程序的性能,结果显示平均开销为17%。
{"title":"Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks","authors":"Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo","doi":"10.4108/eai.7-12-2017.153394","DOIUrl":"https://doi.org/10.4108/eai.7-12-2017.153394","url":null,"abstract":"Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misuses of sensitive information for apps. On the one hand, careless programmers may leak the data by accident. On the other hand, the attackers develop malware to collect sensitive data intentionally. Many researchers apply data flow analysis to detect data leakages of an app. However, data flow analysis on Android platform is quite di ff erent from the programs on desktop. Many researchers have solved some problems of data flow analysis on Android platform, like Activity lifecycle, callback methods, inter-component communication. We find that Fragment’s lifecycle also has an e ff ect on the data flow analysis of Android apps. Some data will be leaked if we don’t take Fragment’s lifecycle into consideration when performing data flow analysis in Android apps. So in this paper, we propose an approach to model Fragment’s lifecycle and its relationship with Activity’s lifecycle, then introduce a tool called FragDroid based on FlowDroid [7]. We conduct some experiments to evaluate the e ff ectiveness of our tool and the results show that there are 8% of apps in our data set using Fragment. In particular, for popular apps, the result is 50.8%. We also evaluate the performance of using FragDroid to analyze Android apps, the result shows the average overhead is 17%.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Targeted Mouse Movements for Gender Classification 目标鼠标运动的性别分类分析
Pub Date : 2017-12-07 DOI: 10.4108/eai.7-12-2017.153395
Nicolas Van Balen, C. Ball, Haining Wang
Gender is one of the essential characteristics of personal identity that is often misused by online impostors for malicious purposes. This paper proposes a naturalistic approach for identity protection with a specific focus on using mouse biometrics to ensure accurate gender identification. Our underpinning rationale lies in the fact that men and women differ in their natural aiming movements of a hand held object in twodimensional space due to anthropometric, biomechanical, and perceptual-motor control differences between the genders. Although some research has been done on classifying user by gender using biometrics, to the best of our knowledge, no research has provided a comprehensive list of which metrics (features) of movements are actually relevant to gender classification, or method by which these metrics may be chosen. This can lead to researchers making unguided decisions on which metrics to extract from the data, doing so for convenience or personal preference. Making choices this way can lead to negatively affecting the accuracy of the model by the inclusion of metrics with little relevance to the problem, and excluding metrics of high relevance. In this paper, we outline a method for choosing metrics based on empirical evidence of natural differences in the genders, and make recommendations on the choice of metrics. The efficacy of our method is then tested through the use of a logistic regression model. Received on 29 November 2017; accepted on 02 December 2017; published on 07 December 2017
性别是个人身份的基本特征之一,经常被网络冒名顶替者恶意利用。本文提出了一种自然的身份保护方法,特别关注使用小鼠生物特征来确保准确的性别识别。我们的基本原理是,由于人体测量学、生物力学和感知运动控制的性别差异,男性和女性在二维空间中手持物体的自然瞄准运动是不同的。虽然已经有一些使用生物识别技术对用户进行性别分类的研究,但据我们所知,还没有研究提供一个全面的列表,说明哪些动作指标(特征)实际上与性别分类有关,或者选择这些指标的方法。这可能导致研究人员出于方便或个人偏好,在从数据中提取哪些指标方面做出没有指导的决定。以这种方式做出选择可能会对模型的准确性产生负面影响,因为它包含了与问题无关的度量标准,并排除了高度相关的度量标准。在本文中,我们概述了一种基于性别自然差异的经验证据选择指标的方法,并就指标的选择提出了建议。然后通过使用逻辑回归模型来测试我们方法的有效性。2017年11月29日收到;2017年12月2日录用;发布于2017年12月7日
{"title":"Analysis of Targeted Mouse Movements for Gender Classification","authors":"Nicolas Van Balen, C. Ball, Haining Wang","doi":"10.4108/eai.7-12-2017.153395","DOIUrl":"https://doi.org/10.4108/eai.7-12-2017.153395","url":null,"abstract":"Gender is one of the essential characteristics of personal identity that is often misused by online impostors for malicious purposes. This paper proposes a naturalistic approach for identity protection with a specific focus on using mouse biometrics to ensure accurate gender identification. Our underpinning rationale lies in the fact that men and women differ in their natural aiming movements of a hand held object in twodimensional space due to anthropometric, biomechanical, and perceptual-motor control differences between the genders. Although some research has been done on classifying user by gender using biometrics, to the best of our knowledge, no research has provided a comprehensive list of which metrics (features) of movements are actually relevant to gender classification, or method by which these metrics may be chosen. This can lead to researchers making unguided decisions on which metrics to extract from the data, doing so for convenience or personal preference. Making choices this way can lead to negatively affecting the accuracy of the model by the inclusion of metrics with little relevance to the problem, and excluding metrics of high relevance. In this paper, we outline a method for choosing metrics based on empirical evidence of natural differences in the genders, and make recommendations on the choice of metrics. The efficacy of our method is then tested through the use of a logistic regression model. Received on 29 November 2017; accepted on 02 December 2017; published on 07 December 2017","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Re-identification of Vehicular Location-Based Metadata 基于车辆位置的元数据重新识别
Pub Date : 2017-12-07 DOI: 10.4108/EAI.7-12-2017.153393
Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han
{"title":"Re-identification of Vehicular Location-Based Metadata","authors":"Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han","doi":"10.4108/EAI.7-12-2017.153393","DOIUrl":"https://doi.org/10.4108/EAI.7-12-2017.153393","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bootstrapping trust in software defined networks 在软件定义网络中引导信任
Pub Date : 2017-12-07 DOI: 10.4108/EAI.7-12-2017.153397
Nicolae Paladi, C. Gehrmann
Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN components and protect communication between network endpoints. We introduce ephemeral flow-specific preshared keys and propose a novel defense against cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary model, with a minor performance overhead. (Less)
软件定义网络(SDN)是云网络基础设施的一种新型体系结构模型,可提高资源利用率、可扩展性和管理能力。SDN部署越来越依赖于在具有大型代码库的商用操作系统上执行的虚拟交换机,这些操作系统是攻击网络基础设施的对手的主要目标。我们描述并实现了TruSDN,这是一个使用英特尔软件保护扩展(SGX)在SDN基础设施中引导信任的框架,允许安全部署SDN组件并保护网络端点之间的通信。我们引入了临时流特定的预共享密钥,并提出了一种针对SGX飞地布谷鸟攻击的新防御方法。在强大的对手模型下,TruSDN是安全的,性能开销很小。(少)
{"title":"Bootstrapping trust in software defined networks","authors":"Nicolae Paladi, C. Gehrmann","doi":"10.4108/EAI.7-12-2017.153397","DOIUrl":"https://doi.org/10.4108/EAI.7-12-2017.153397","url":null,"abstract":"Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN components and protect communication between network endpoints. We introduce ephemeral flow-specific preshared keys and propose a novel defense against cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary model, with a minor performance overhead. (Less)","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identifying forensically uninteresting files in a large corpus 在大型语料库中识别法医上不感兴趣的文件
Pub Date : 2016-12-08 DOI: 10.4108/eai.8-12-2016.151725
N. Rowe
For digital forensics, eliminating the uninteresting is often more critical than finding the interesting since there is so much more of it. Published software-file hash values like those of the National Software Reference Library (NSRL) have limited scope. We discuss methods based on analysis of file context using the metadata of a large corpus. Tests were done with an international corpus of 262.7 million files obtained from 4018 drives. For malware investigations, we identify clues to malware in context, and show that using a Bayesian ranking formula on metadata can increase recall by 5.1 while increasing precision by 1.7 times over inspecting executables alone. For more general investigations, we show that using together two of nine criteria for uninteresting files, with exceptions for some special interesting files, can exclude 77.4% of our corpus instead of the 23.8% that were excluded by NSRL. For a test set of 19,784 randomly selected files from our corpus that were manually inspected, false positives after file exclusion (interesting files identified as uninteresting) were 0.18% and false negatives (uninteresting files identified as interesting) were 29.31% using our methods. The generality of the methods was confirmed by separately testing two halves of our corpus. Few of our excluded files were matched in two commercial hash sets. This work provides both new uninteresting hash values and programs for finding more.
对于数字取证来说,消除无趣的信息往往比发现有趣的信息更重要,因为有太多有趣的信息了。发布的软件文件散列值,如国家软件参考图书馆(NSRL)的散列值,范围有限。我们讨论了基于使用大型语料库的元数据分析文件上下文的方法。测试使用了从4018个驱动器获得的2.627亿个文件的国际语料库。对于恶意软件调查,我们在上下文中识别恶意软件的线索,并表明在元数据上使用贝叶斯排序公式可以将召回率提高5.1倍,同时将精度提高1.7倍。对于更一般的调查,我们表明,除了一些特别有趣的文件之外,将9个标准中的2个一起使用,可以排除77.4%的语料库,而不是NSRL排除的23.8%。对于从语料库中随机选择的19,784个文件进行手动检查的测试集,使用我们的方法,文件排除后的假阳性(将感兴趣的文件识别为无兴趣的)为0.18%,假阴性(将无兴趣的文件识别为感兴趣的)为29.31%。通过对语料库的两部分分别进行测试,证实了方法的通用性。我们排除的文件很少在两个商业哈希集中匹配。这项工作既提供了新的无趣的哈希值,也提供了查找更多哈希值的程序。
{"title":"Identifying forensically uninteresting files in a large corpus","authors":"N. Rowe","doi":"10.4108/eai.8-12-2016.151725","DOIUrl":"https://doi.org/10.4108/eai.8-12-2016.151725","url":null,"abstract":"For digital forensics, eliminating the uninteresting is often more critical than finding the interesting since there is so much more of it. Published software-file hash values like those of the National Software Reference Library (NSRL) have limited scope. We discuss methods based on analysis of file context using the metadata of a large corpus. Tests were done with an international corpus of 262.7 million files obtained from 4018 drives. For malware investigations, we identify clues to malware in context, and show that using a Bayesian ranking formula on metadata can increase recall by 5.1 while increasing precision by 1.7 times over inspecting executables alone. For more general investigations, we show that using together two of nine criteria for uninteresting files, with exceptions for some special interesting files, can exclude 77.4% of our corpus instead of the 23.8% that were excluded by NSRL. For a test set of 19,784 randomly selected files from our corpus that were manually inspected, false positives after file exclusion (interesting files identified as uninteresting) were 0.18% and false negatives (uninteresting files identified as interesting) were 29.31% using our methods. The generality of the methods was confirmed by separately testing two halves of our corpus. Few of our excluded files were matched in two commercial hash sets. This work provides both new uninteresting hash values and programs for finding more.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130305831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1