首页 > 最新文献

Foundations and Practice of Security最新文献

英文 中文
Deep-Learning-based Vulnerability Detection in Binary Executables 基于深度学习的二进制可执行文件漏洞检测
Pub Date : 2022-11-25 DOI: 10.48550/arXiv.2212.01254
A. Schaad, Dominik Binder
The identification of vulnerabilities is an important element in the software development life cycle to ensure the security of software. While vulnerability identification based on the source code is a well studied field, the identification of vulnerabilities on basis of a binary executable without the corresponding source code is more challenging. Recent research [1] has shown, how such detection can be achieved by deep learning methods. However, that particular approach is limited to the identification of only 4 types of vulnerabilities. Subsequently, we analyze to what extent we could cover the identification of a larger variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. The underlying basis is a dataset with 50,651 samples of vulnerable code in the form of a standardized LLVM Intermediate Representation. The vectorised features of a Word2Vec model are used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). A binary classification was established for detecting the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, the methodology presented allows an accurate detection of 23 (compared to 4 [1]) vulnerabilities.
漏洞识别是软件开发生命周期中保证软件安全的重要环节。虽然基于源代码的漏洞识别是一个研究得很好的领域,但基于没有相应源代码的二进制可执行文件的漏洞识别更具挑战性。最近的研究b[1]已经展示了如何通过深度学习方法实现这种检测。然而,这种特殊的方法仅限于识别4种类型的漏洞。随后,我们分析在多大程度上我们可以覆盖更多种类漏洞的识别。因此,基于二进制可执行文件的漏洞检测使用了一种使用递归神经网络的监督深度学习方法。底层基础是一个以标准化LLVM中间表示形式包含50,651个易受攻击代码样本的数据集。Word2Vec模型的矢量化特征用于训练三种循环神经网络基本架构(GRU, LSTM, SRNN)的不同变体。建立二值分类来检测任意漏洞的存在,训练多类模型来识别准确的漏洞,样本外准确率分别达到88%和77%。我们还观察到不同漏洞的检测差异,非漏洞样本的检测精度特别高,超过98%。因此,所提出的方法可以准确检测23个漏洞(与4[1]相比)。
{"title":"Deep-Learning-based Vulnerability Detection in Binary Executables","authors":"A. Schaad, Dominik Binder","doi":"10.48550/arXiv.2212.01254","DOIUrl":"https://doi.org/10.48550/arXiv.2212.01254","url":null,"abstract":"The identification of vulnerabilities is an important element in the software development life cycle to ensure the security of software. While vulnerability identification based on the source code is a well studied field, the identification of vulnerabilities on basis of a binary executable without the corresponding source code is more challenging. Recent research [1] has shown, how such detection can be achieved by deep learning methods. However, that particular approach is limited to the identification of only 4 types of vulnerabilities. Subsequently, we analyze to what extent we could cover the identification of a larger variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. The underlying basis is a dataset with 50,651 samples of vulnerable code in the form of a standardized LLVM Intermediate Representation. The vectorised features of a Word2Vec model are used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). A binary classification was established for detecting the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, the methodology presented allows an accurate detection of 23 (compared to 4 [1]) vulnerabilities.","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts 基于IOTA智能合约的多机器人系统中基于分散视觉的拜占庭代理检测
Pub Date : 2022-10-07 DOI: 10.48550/arXiv.2210.03441
Sahar Salimpour, Farhad Keramat, J. P. Queralta, Tomi Westerlund
Multiple opportunities lie at the intersection of multi-robot systems and distributed ledger technologies (DLTs). In this work, we investigate the potential of new DLT solutions such as IOTA, for detecting anomalies and byzantine agents in multi-robot systems in a decentralized manner. Traditional blockchain approaches are not applicable to real-world networked and decentralized robotic systems where connectivity conditions are not ideal. To address this, we leverage recent advances in partition-tolerant and byzantine-tolerant collaborative decision-making processes with IOTA smart contracts. We show how our work in vision-based anomaly and change detection can be applied to detecting byzantine agents within multiple robots operating in the same environment. We show that IOTA smart contracts add a low computational overhead while allowing to build trust within the multi-robot system. The proposed approach effectively enables byzantine robot detection based on the comparison of images submitted by the different robots and detection of anomalies and changes between them.
多个机会存在于多机器人系统和分布式账本技术(dlt)的交叉点。在这项工作中,我们研究了新的DLT解决方案(如IOTA)的潜力,用于以分散的方式检测多机器人系统中的异常和拜占庭代理。传统的区块链方法不适用于连接条件不理想的现实世界网络化和去中心化机器人系统。为了解决这个问题,我们利用IOTA智能合约在分区容忍和拜占庭容忍协作决策过程方面的最新进展。我们展示了我们在基于视觉的异常和变化检测方面的工作如何应用于检测在同一环境中操作的多个机器人中的拜占庭代理。我们表明,IOTA智能合约增加了较低的计算开销,同时允许在多机器人系统中建立信任。该方法通过对不同机器人提交的图像进行比较,并检测它们之间的异常和变化,有效地实现了拜占庭机器人检测。
{"title":"Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts","authors":"Sahar Salimpour, Farhad Keramat, J. P. Queralta, Tomi Westerlund","doi":"10.48550/arXiv.2210.03441","DOIUrl":"https://doi.org/10.48550/arXiv.2210.03441","url":null,"abstract":"Multiple opportunities lie at the intersection of multi-robot systems and distributed ledger technologies (DLTs). In this work, we investigate the potential of new DLT solutions such as IOTA, for detecting anomalies and byzantine agents in multi-robot systems in a decentralized manner. Traditional blockchain approaches are not applicable to real-world networked and decentralized robotic systems where connectivity conditions are not ideal. To address this, we leverage recent advances in partition-tolerant and byzantine-tolerant collaborative decision-making processes with IOTA smart contracts. We show how our work in vision-based anomaly and change detection can be applied to detecting byzantine agents within multiple robots operating in the same environment. We show that IOTA smart contracts add a low computational overhead while allowing to build trust within the multi-robot system. The proposed approach effectively enables byzantine robot detection based on the comparison of images submitted by the different robots and detection of anomalies and changes between them.","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Characterizing IoT Software Update Practices 描述物联网软件更新实践
Pub Date : 2022-09-20 DOI: 10.1007/978-3-031-30122-3_25
Conner Bradley, David Barrera
{"title":"Towards Characterizing IoT Software Update Practices","authors":"Conner Bradley, David Barrera","doi":"10.1007/978-3-031-30122-3_25","DOIUrl":"https://doi.org/10.1007/978-3-031-30122-3_25","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a maturity model for crypto-agility assessment 迈向加密敏捷性评估的成熟度模型
Pub Date : 2022-02-15 DOI: 10.1007/978-3-031-30122-3_7
Julian Hohm, A. Heinemann, A. Wiesmaier
{"title":"Towards a maturity model for crypto-agility assessment","authors":"Julian Hohm, A. Heinemann, A. Wiesmaier","doi":"10.1007/978-3-031-30122-3_7","DOIUrl":"https://doi.org/10.1007/978-3-031-30122-3_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts 结合自主身份和智能合约的物联网自动化身份和访问管理系统
Pub Date : 2022-01-01 DOI: 10.1007/978-3-031-08147-7_14
Montassar Naghmouchi, Hella Kaffel, M. Laurent-Maknavicius
{"title":"An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts","authors":"Montassar Naghmouchi, Hella Kaffel, M. Laurent-Maknavicius","doi":"10.1007/978-3-031-08147-7_14","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"54 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection 物联网入侵检测中机器学习技术的比较分析
Pub Date : 2021-11-25 DOI: 10.1007/978-3-031-08147-7_13
João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia
{"title":"A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection","authors":"João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia","doi":"10.1007/978-3-031-08147-7_13","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"176 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Creation and Detection of German Voice Deepfakes 德语语音深度假音的产生与检测
Pub Date : 2021-08-02 DOI: 10.1007/978-3-031-08147-7_24
Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, A. Schaad, Felix Schmieder
{"title":"Creation and Detection of German Voice Deepfakes","authors":"Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, A. Schaad, Felix Schmieder","doi":"10.1007/978-3-031-08147-7_24","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_24","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware Network Traffic Analysis for Pre-encryption Alert 基于预加密警报的勒索软件网络流量分析
Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_2
Routa Moussaileb, N. Cuppens-Boulahia, Jean-Louis Lanet, Hélène Le Bouder
{"title":"Ransomware Network Traffic Analysis for Pre-encryption Alert","authors":"Routa Moussaileb, N. Cuppens-Boulahia, Jean-Louis Lanet, Hélène Le Bouder","doi":"10.1007/978-3-030-45371-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125038866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme U-EPS:一种超小型、高效的后量子签名方案
Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_16
G. Gong, Morgan He, R. Rohit, Yunjie Yi
{"title":"U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme","authors":"G. Gong, Morgan He, R. Rohit, Yunjie Yi","doi":"10.1007/978-3-030-45371-8_16","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Labelled Network Capture Generation for Anomaly Detection 异常检测的标记网络捕获生成
Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_7
Maël Nogues, David Brosset, Hanan Hindy, X. Bellekens, Y. Kermarrec
{"title":"Labelled Network Capture Generation for Anomaly Detection","authors":"Maël Nogues, David Brosset, Hanan Hindy, X. Bellekens, Y. Kermarrec","doi":"10.1007/978-3-030-45371-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Foundations and Practice of Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1