首页 > 最新文献

EAI Endorsed Trans. Security Safety最新文献

英文 中文
Efficient Public Blockchain Client for Lightweight Users 轻量级用户的高效公共区块链客户端
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153528
Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, W. Shi
Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and smartphones. In order to cope with the problem, several solutions have been proposed to reduce the storage burden. However, existing solutions either achieve a limited storage reduction (e.g., simple payment verification), or rely on some strong security assumption (e.g., the use of trusted server). In this paper, we propose a new approach to solving the problem. Specifically, we propose an underline{e}fficient verification protocol for underline{p}ublic underline{b}lockunderline{c}hains, or EPBC for short. EPBC is particularly suitable for lightweight users, who only need to store a small amount of data that is {it independent of} the size of the blockchain. We analyze EPBC's performance and security, and discuss its integration with existing public ledger systems. Experimental results confirm that EPBC is practical for lightweight users.
公共区块链为存储交易数据提供了一种去中心化的方法,在不同的领域有许多应用。为了让用户跟踪交易,一个简单的方法是让他们保留整个公共分类账的本地副本。由于分类帐的规模不断增长,这种方法变得越来越不实用,特别是对于物联网设备和智能手机等轻量级用户。为了解决这个问题,已经提出了几种解决方案来减少存储负担。然而,现有的解决方案要么实现了有限的存储减少(例如,简单的支付验证),要么依赖于一些强安全性假设(例如,使用可信服务器)。在本文中,我们提出了一种新的方法来解决这个问题。具体来说,我们为underline{p}公共underline{b}锁underline{c}链(简称EPBC)提出了一个underline{e}有效的验证协议。EPBC特别适合轻量级用户,他们只需要存储与区块链大小无关的少量数据。我们分析了EPBC的性能和安全性,并讨论了它与现有公共分类账系统的集成。实验结果证实了EPBC对于轻型用户是实用的。
{"title":"Efficient Public Blockchain Client for Lightweight Users","authors":"Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, W. Shi","doi":"10.4108/eai.4-1-2018.153528","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153528","url":null,"abstract":"Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and smartphones. In order to cope with the problem, several solutions have been proposed to reduce the storage burden. However, existing solutions either achieve a limited storage reduction (e.g., simple payment verification), or rely on some strong security assumption (e.g., the use of trusted server). In this paper, we propose a new approach to solving the problem. Specifically, we propose an underline{e}fficient verification protocol for underline{p}ublic underline{b}lockunderline{c}hains, or EPBC for short. EPBC is particularly suitable for lightweight users, who only need to store a small amount of data that is {it independent of} the size of the blockchain. We analyze EPBC's performance and security, and discuss its integration with existing public ledger systems. Experimental results confirm that EPBC is practical for lightweight users.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud 云环境下企业网络间隐形桥的概率推断
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153526
Xiaoyan Sun, Jun Dai, A. Singhal, Peng Liu
Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other. However, some “stealthy bridges” could be established to break such isolation due to two features of the public cloud: virtual machine image sharing and virtual machine co-residency. This paper proposes to use cross-layer Bayesian networks to infer the stealthy bridges existing between enterprise network islands. Cloud-level attack graphs are firstly built to capture the potential attacks enabled by stealthy bridges and reveal hidden possible attack paths. Cross-layer Bayesian networks are then constructed to infer the probability of stealthy bridge existence. The experiment results show that the cross-layer Bayesian networks are capable of inferring the existence of stealthy bridges given supporting evidence from other intrusion steps in a multi-step attack. Received on 25 December 2017; accepted on 26 December 2017; published on 4 January 2018
云计算将计算作为一种实用工具,具有显著改变IT行业的潜力。被云的高效率、低成本和高灵活性所吸引,企业开始将大部分网络迁移到云上。云成为多个“租户”居住的公共空间。除了一些公共服务外,云中的企业网络之间应该是绝对隔离的。然而,由于公共云的两个特性:虚拟机映像共享和虚拟机共同驻留,可以建立一些“隐形桥梁”来打破这种隔离。本文提出使用跨层贝叶斯网络来推断企业网络孤岛之间存在的隐形桥。首先构建云级攻击图,以捕获隐形桥接器所启用的潜在攻击,并揭示隐藏的可能攻击路径。然后构建跨层贝叶斯网络来推断隐形桥存在的概率。实验结果表明,在多步攻击中,基于其他入侵步骤的支持证据,跨层贝叶斯网络能够推断出隐形桥的存在。2017年12月25日收到;于2017年12月26日接受;于2018年1月4日发布
{"title":"Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud","authors":"Xiaoyan Sun, Jun Dai, A. Singhal, Peng Liu","doi":"10.4108/eai.4-1-2018.153526","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153526","url":null,"abstract":"Cloud computing, with the paradigm of computing as a utility, has the potential to significantly tranform the IT industry. Attracted by the high efficiency, low cost, and great flexibility of cloud, enterprises began to migrate large parts of their networks into cloud. The cloud becomes a public space where multiple “tenants” reside. Except for some public services, the enterprise networks in cloud should be absolutely isolated from each other. However, some “stealthy bridges” could be established to break such isolation due to two features of the public cloud: virtual machine image sharing and virtual machine co-residency. This paper proposes to use cross-layer Bayesian networks to infer the stealthy bridges existing between enterprise network islands. Cloud-level attack graphs are firstly built to capture the potential attacks enabled by stealthy bridges and reveal hidden possible attack paths. Cross-layer Bayesian networks are then constructed to infer the probability of stealthy bridge existence. The experiment results show that the cross-layer Bayesian networks are capable of inferring the existence of stealthy bridges given supporting evidence from other intrusion steps in a multi-step attack. Received on 25 December 2017; accepted on 26 December 2017; published on 4 January 2018","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process 基于层次分析法的移动目标防御评价框架
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153527
Chu Huang, Sencun Zhu, Yi Yang
A Moving Target Defense (MTD)-enabled system is one which can dynamically and rapidly change its properties and code such that the attackers do not have sufficient time to exploit it. Although a variety of MTD systems have been proposed, fewwork has focused on assessing the relative cost-effectiveness of differentMTD approaches. In this paper, based on a generic MTD theory, we propose five general evaluation metrics and an assessment framework on top of Analytic Hierarchy Process (AHP), which aggregates these five metrics and systematically evaluates/compares security strengths and costs of multiple MTD-based approaches in the same category. This framework could be widely used in different MTD categories under various attacks and it will enable a security specialist to choose the best MTD approach from a set of possible alternatives based on his/her goal and understanding of the problem. A detailed case study on a specific MTD category called software diversification validates the effectiveness of this framework. Our evaluation results rank three software diversity algorithms and choose the best one among three based on problem setting and situation constraints. Received on XXXX; accepted on XXXX; published on XXXX
启用移动目标防御(MTD)的系统可以动态快速地更改其属性和代码,使攻击者没有足够的时间利用它。尽管已经提出了各种MTD系统,但很少有人关注于评估不同MTD方法的相对成本效益。本文在通用MTD理论的基础上,提出了5个通用的评价指标,并在层次分析法(AHP)的基础上提出了一个评价框架,该框架综合了这5个指标,系统地评价/比较了同一类别中基于MTD的多种方法的安全强度和成本。这个框架可以广泛用于各种攻击下的不同MTD类别,它将使安全专家能够根据他/她的目标和对问题的理解,从一组可能的替代方案中选择最佳的MTD方法。对称为软件多样化的特定MTD类别的详细案例研究验证了该框架的有效性。我们的评估结果对三种软件多样性算法进行了排序,并根据问题设置和情境约束在三种算法中选择了最佳算法。XXXX年收到;XXXX日验收;发表于XXXX
{"title":"An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process","authors":"Chu Huang, Sencun Zhu, Yi Yang","doi":"10.4108/eai.4-1-2018.153527","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153527","url":null,"abstract":"A Moving Target Defense (MTD)-enabled system is one which can dynamically and rapidly change its properties and code such that the attackers do not have sufficient time to exploit it. Although a variety of MTD systems have been proposed, fewwork has focused on assessing the relative cost-effectiveness of differentMTD approaches. In this paper, based on a generic MTD theory, we propose five general evaluation metrics and an assessment framework on top of Analytic Hierarchy Process (AHP), which aggregates these five metrics and systematically evaluates/compares security strengths and costs of multiple MTD-based approaches in the same category. This framework could be widely used in different MTD categories under various attacks and it will enable a security specialist to choose the best MTD approach from a set of possible alternatives based on his/her goal and understanding of the problem. A detailed case study on a specific MTD category called software diversification validates the effectiveness of this framework. Our evaluation results rank three software diversity algorithms and choose the best one among three based on problem setting and situation constraints. Received on XXXX; accepted on XXXX; published on XXXX","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Defence Mechanisms for Public Systems 公共系统防御机制
Pub Date : 2018-01-04 DOI: 10.4108/eai.4-1-2018.153524
Sencun Zhu, Kevin I. Jones, L. Maglaras
{"title":"Defence Mechanisms for Public Systems","authors":"Sencun Zhu, Kevin I. Jones, L. Maglaras","doi":"10.4108/eai.4-1-2018.153524","DOIUrl":"https://doi.org/10.4108/eai.4-1-2018.153524","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems 现代通信系统的漏洞分析、入侵检测与隐私保护
Pub Date : 2017-12-28 DOI: 10.4108/eai.28-12-2017.153514
Sencun Zhu, Kevin I. Jones, L. Maglaras
The second issue of the fourth volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of modern systems, such as Software-Defined Systems (SDNs), Cognitive radio networks (CRNs) or 802.11wireless networks. The articles that constitute this issue can be divided into two main classes. The first one consists of novel methods that can strengthen either intrusion detection or encryption capabilities of the system under consideration, while the second one is based on the analysis of collected data from different wireless access points in order to reveal vulnerabilities and security level of the providers. In particular, in the area of novel security and privacy methods the issue presents (i) a deep learning based DDoS detection system for multi-vector attack detection in an SDN environment, (ii) an adaptive parameter and component selection mechanism for online anomaly detection problem in CRNs (iii) a compact homomorphic symmetric encryption scheme based on learning with errors (LWE) principle. In the area of the data collection and analysis study, the issue presents an overview of the security level of wireless networks in Romania.
EAI安全与安全事务第四卷第二期提供了提高现代系统(如软件定义系统(sdn),认知无线网络(crn)或802.11无线网络)的安全性,安全性和隐私性的方法和技术的见解。本期文章可分为两大类。第一种方法是采用新颖的方法来增强系统的入侵检测或加密能力,而第二种方法是基于对从不同无线接入点收集的数据的分析,以揭示提供商的漏洞和安全级别。特别是,在新的安全和隐私方法领域,该问题提出了(i)基于深度学习的DDoS检测系统,用于SDN环境中的多向量攻击检测;(ii)用于crn在线异常检测问题的自适应参数和组件选择机制;(iii)基于错误学习(LWE)原理的紧凑同态对称加密方案。在数据收集和分析研究领域,该问题概述了罗马尼亚无线网络的安全水平。
{"title":"Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems","authors":"Sencun Zhu, Kevin I. Jones, L. Maglaras","doi":"10.4108/eai.28-12-2017.153514","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153514","url":null,"abstract":"The second issue of the fourth volume of the EAI transactions on Security and Safety provides an insight to methods and techniques that improve security, safety and privacy of modern systems, such as Software-Defined Systems (SDNs), Cognitive radio networks (CRNs) or 802.11wireless networks. The articles that constitute this issue can be divided into two main classes. The first one consists of novel methods that can strengthen either intrusion detection or encryption capabilities of the system under consideration, while the second one is based on the analysis of collected data from different wireless access points in order to reveal vulnerabilities and security level of the providers. In particular, in the area of novel security and privacy methods the issue presents (i) a deep learning based DDoS detection system for multi-vector attack detection in an SDN environment, (ii) an adaptive parameter and component selection mechanism for online anomaly detection problem in CRNs (iii) a compact homomorphic symmetric encryption scheme based on learning with errors (LWE) principle. In the area of the data collection and analysis study, the issue presents an overview of the security level of wireless networks in Romania.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs 奇异谱分析在CRNs在线异常检测中的应用
Pub Date : 2017-12-28 DOI: 10.4108/eai.28-12-2017.153516
Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng
Cognitive radio networks (CRNs) have been recognized as a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window online anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.
认知无线网络(crn)被认为是一种很有前途的技术,它允许辅助用户(su)广泛地探索频谱资源的使用效率,同时不会给许可用户带来干扰。由于无线网络环境的不规范,crn容易受到各种恶意实体的攻击。因此,首先检测异常是至关重要的。然而,从crn的内在特征来看,几乎没有一种普遍适用的异常检测方案。奇异谱分析(SSA)在理论上已被证明是一种准确、快速检测运行(随机)过程特征变化的最佳方法。此外,SSA是一种无模型的方法,对于不同类型的异常不需要假设参数模型,这使其成为一种通用的异常检测方案。本文引入了一种基于相干性的自适应SSA方法参数和分量选择机制,并在此基础上建立了CRNs滑动窗口在线异常检测器。实验结果表明,基于ssa的异常检测器对多种异常具有较高的检测精度。
{"title":"Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs","authors":"Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, K. Zeng","doi":"10.4108/eai.28-12-2017.153516","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153516","url":null,"abstract":"Cognitive radio networks (CRNs) have been recognized as a promising technology that allows secondary users (SUs) extensively explore spectrum resource usage efficiency, while not introducing interference to licensed users. Due to the unregulated wireless network environment, CRNs are susceptible to various malicious entities. Thus, it is critical to detect anomalies in the first place. However, from the perspective of intrinsic features of CRNs, there is hardly in existence of an universal applicable anomaly detection scheme. Singular Spectrum Analysis (SSA) has been theoretically proven an optimal approach for accurate and quick detection of changes in the characteristics of a running (random) process. In addition, SSA is a model-free method and no parametric models have to be assumed for different types of anomalies, which makes it a universal anomaly detection scheme. In this paper, we introduce an adaptive parameter and component selection mechanism based on coherence for basic SSA method, upon which we built up a sliding window online anomaly detector in CRNs. Our experimental results indicate great accuracy of the SSA-based anomaly detector for multiple anomalies.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Overview of Romania 802.11Wireless Security & Statistics 罗马尼亚802.11无线安全和统计概述
Pub Date : 2017-12-28 DOI: 10.4108/eai.28-12-2017.153518
C. Leca
This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on security issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes more than 100000 unique wireless networks gathered in Bucharest, major urban areas and the surrounding rural areas. The results of the study cover security protocol usage, the percentage in which known vulnerabilities are still deployed in wireless networks and statistics regarding channel and band usage, common SSIDs in Romania, top equipment manufacturers and the situation of provider wireless access points. The study also shows that provider wireless access points on average offer better security than private networks. Received on 28 January 2017; accepted on 20 April 2017; published on 28 December 2017
本文介绍了罗马尼亚无线网络安全和统计数据的研究,旨在提高公众对安全问题的认识,并强调商业设备中已知漏洞的普遍性。研究中使用的数据是采用战争驱动技术获取的无线网络广播数据。为了确保全面的概述,收集的数据包括在布加勒斯特、主要城市地区和周围农村地区收集的100,000多个独特的无线网络。研究结果涵盖了安全协议的使用情况,已知漏洞在无线网络中部署的百分比,以及有关信道和频带使用情况的统计数据,罗马尼亚的常用ssid,顶级设备制造商和提供商无线接入点的情况。该研究还表明,供应商的无线接入点平均提供比专用网络更好的安全性。2017年1月28日收到;2017年4月20日接受;发布于2017年12月28日
{"title":"Overview of Romania 802.11Wireless Security & Statistics","authors":"C. Leca","doi":"10.4108/eai.28-12-2017.153518","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153518","url":null,"abstract":"This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on security issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes more than 100000 unique wireless networks gathered in Bucharest, major urban areas and the surrounding rural areas. The results of the study cover security protocol usage, the percentage in which known vulnerabilities are still deployed in wireless networks and statistics regarding channel and band usage, common SSIDs in Romania, top equipment manufacturers and the situation of provider wireless access points. The study also shows that provider wireless access points on average offer better security than private networks. Received on 28 January 2017; accepted on 20 April 2017; published on 28 December 2017","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"2472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact lossy and all-but-one trapdoor functions from lattice 晶格上的紧致有损和除一个以外的所有活门函数
Pub Date : 2017-12-13 DOI: 10.4108/eai.28-12-2017.153517
Leixiao Cheng, Quanshui Wu, Yunlei Zhao
Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop new and improved lattice-based LTDF and ABO-TDF. In this work, we provide more compact constructions of LTDF and ABO-TDF based on the learning with errors (LWE) problem. In addition, our LWE-based ABO-TDF can allow smaller system parameters to support super-polynomially many injective branches in the construction of CCA secure public key encryption. As a core building tool, we provide a more compact homomorphic symmetric encryption schemes based on LWE, which might be of independent interest. To further optimize the ABO-TDF construction, we employ the full rank difference encoding technique. As a consequence, the results presented in this work can substantially improve the performance of all the previous LWE-based cryptographic constructions based upon LTDF and ABO-TDF.
有损陷门函数(LTDF)和除一个以外的所有陷门函数(ABO-TDF)是基本的加密基元。鉴于量子计算的最新进展,开发新的和改进的基于晶格的LTDF和ABO-TDF将是非常可取的。在这项工作中,我们基于带误差学习(LWE)问题提供了更紧凑的LTDF和ABO-TDF结构。此外,我们的基于lwe的ABO-TDF可以在构建CCA安全公钥加密时允许更小的系统参数支持超多项式多注入分支。作为核心构建工具,我们提供了一种基于LWE的更紧凑的同态对称加密方案,这可能是独立的兴趣。为了进一步优化ABO-TDF结构,我们采用了全秩差编码技术。因此,本研究的结果可以大大提高以前基于LTDF和ABO-TDF的所有基于lwe的加密结构的性能。
{"title":"Compact lossy and all-but-one trapdoor functions from lattice","authors":"Leixiao Cheng, Quanshui Wu, Yunlei Zhao","doi":"10.4108/eai.28-12-2017.153517","DOIUrl":"https://doi.org/10.4108/eai.28-12-2017.153517","url":null,"abstract":"Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop new and improved lattice-based LTDF and ABO-TDF. In this work, we provide more compact constructions of LTDF and ABO-TDF based on the learning with errors (LWE) problem. In addition, our LWE-based ABO-TDF can allow smaller system parameters to support super-polynomially many injective branches in the construction of CCA secure public key encryption. As a core building tool, we provide a more compact homomorphic symmetric encryption schemes based on LWE, which might be of independent interest. To further optimize the ABO-TDF construction, we employ the full rank difference encoding technique. As a consequence, the results presented in this work can substantially improve the performance of all the previous LWE-based cryptographic constructions based upon LTDF and ABO-TDF.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks 基于片段生命周期建模和回调的Android平台数据流分析
Pub Date : 2017-12-07 DOI: 10.4108/eai.7-12-2017.153394
Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo
Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misuses of sensitive information for apps. On the one hand, careless programmers may leak the data by accident. On the other hand, the attackers develop malware to collect sensitive data intentionally. Many researchers apply data flow analysis to detect data leakages of an app. However, data flow analysis on Android platform is quite di ff erent from the programs on desktop. Many researchers have solved some problems of data flow analysis on Android platform, like Activity lifecycle, callback methods, inter-component communication. We find that Fragment’s lifecycle also has an e ff ect on the data flow analysis of Android apps. Some data will be leaked if we don’t take Fragment’s lifecycle into consideration when performing data flow analysis in Android apps. So in this paper, we propose an approach to model Fragment’s lifecycle and its relationship with Activity’s lifecycle, then introduce a tool called FragDroid based on FlowDroid [7]. We conduct some experiments to evaluate the e ff ectiveness of our tool and the results show that there are 8% of apps in our data set using Fragment. In particular, for popular apps, the result is 50.8%. We also evaluate the performance of using FragDroid to analyze Android apps, the result shows the average overhead is 17%.
智能手机承载着大量的敏感信息来满足人们的各种需求,但是信息的使用方式对于保证用户隐私的安全至关重要。对应用程序敏感信息的滥用有两种。一方面,粗心的程序员可能会意外泄露数据。另一方面,攻击者故意开发恶意软件来收集敏感数据。许多研究人员使用数据流分析来检测应用程序的数据泄露。然而,Android平台上的数据流分析与桌面上的程序有很大的不同。许多研究者已经解决了Android平台上的一些数据流分析问题,如Activity生命周期、回调方法、组件间通信等。我们发现Fragment的生命周期也会对Android应用的数据流分析产生影响。如果我们在Android应用中执行数据流分析时不考虑Fragment的生命周期,就会有一些数据泄露。因此,在本文中,我们提出了一种方法来建模Fragment的生命周期及其与Activity的生命周期的关系,然后介绍了一个基于FlowDroid的工具FragDroid[7]。我们进行了一些实验来评估我们的工具的有效性,结果表明,我们的数据集中有8%的应用程序使用Fragment。在热门应用中,这一比例为50.8%。我们还评估了使用FragDroid分析Android应用程序的性能,结果显示平均开销为17%。
{"title":"Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks","authors":"Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo","doi":"10.4108/eai.7-12-2017.153394","DOIUrl":"https://doi.org/10.4108/eai.7-12-2017.153394","url":null,"abstract":"Smartphones carry a large quantity of sensitive information to satisfy people’s various requirements, but the way of using information is important to keep the security of users’ privacy. There are two kinds of misuses of sensitive information for apps. On the one hand, careless programmers may leak the data by accident. On the other hand, the attackers develop malware to collect sensitive data intentionally. Many researchers apply data flow analysis to detect data leakages of an app. However, data flow analysis on Android platform is quite di ff erent from the programs on desktop. Many researchers have solved some problems of data flow analysis on Android platform, like Activity lifecycle, callback methods, inter-component communication. We find that Fragment’s lifecycle also has an e ff ect on the data flow analysis of Android apps. Some data will be leaked if we don’t take Fragment’s lifecycle into consideration when performing data flow analysis in Android apps. So in this paper, we propose an approach to model Fragment’s lifecycle and its relationship with Activity’s lifecycle, then introduce a tool called FragDroid based on FlowDroid [7]. We conduct some experiments to evaluate the e ff ectiveness of our tool and the results show that there are 8% of apps in our data set using Fragment. In particular, for popular apps, the result is 50.8%. We also evaluate the performance of using FragDroid to analyze Android apps, the result shows the average overhead is 17%.","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks 基于软件定义网络的企业系统多阶段攻击归因
Pub Date : 2017-12-07 DOI: 10.4108/EAI.7-12-2017.153396
S. Kannan, Paul C. Wood, S. Chaterji, S. Bagchi, Larry Deatrick, Patricia Beane
{"title":"MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks","authors":"S. Kannan, Paul C. Wood, S. Chaterji, S. Bagchi, Larry Deatrick, Patricia Beane","doi":"10.4108/EAI.7-12-2017.153396","DOIUrl":"https://doi.org/10.4108/EAI.7-12-2017.153396","url":null,"abstract":"","PeriodicalId":335727,"journal":{"name":"EAI Endorsed Trans. Security Safety","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EAI Endorsed Trans. Security Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1