首页 > 最新文献

2016 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication 持有和签名:一种用于智能手机用户认证的新型行为生物识别技术
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.20
Attaullah Buriro, B. Crispo, Filippo Del Frari, K. Wrona
The search for new authentication methods to replace passwords for modern mobile devices such as smartphones and tablets has attracted a substantial amount of research in recent years. As a result, several new behavioral biometric schemes have been proposed. Most of these schemes, however, are uni-modal. This paper presents a new, bi-modal behavioral biometric solution for user authentication. The proposed mechanism takes into account micro-movements of a phone and movements of the user's finger during writing or signing on the touchscreen. More specifically, it profiles a user based on how he holds the phone and based on the characteristics of the points being pressed on the touchscreen, and not the produced signature image. We have implemented and evaluated our scheme on commercially available smartphones. Using Multilayer Perceptron (MLP) 1-class verifier, we achieved approx. 95% True Acceptance Rate (TAR) with 3.1% False Acceptance Rate (FAR) on a dataset of 30 volunteers. Preliminary results on usability show a positive opinion about our system.
近年来,寻找新的身份验证方法来取代智能手机和平板电脑等现代移动设备的密码吸引了大量的研究。因此,人们提出了几种新的行为生物识别方案。然而,这些方案中的大多数是单模态的。本文提出了一种新的双模态行为生物识别用户认证解决方案。该提议的机制考虑了手机的微运动和用户在触摸屏上书写或签名时手指的运动。更具体地说,它根据用户拿手机的方式和触摸屏上按下的点的特征来描述用户,而不是生成的签名图像。我们已经在商用智能手机上实施并评估了我们的方案。使用多层感知器(MLP) 1类验证器,我们实现了近似。在30名志愿者的数据集上,95%的真实接受率(TAR)和3.1%的错误接受率(FAR)。初步的可用性测试结果表明,用户对系统的评价是积极的。
{"title":"Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication","authors":"Attaullah Buriro, B. Crispo, Filippo Del Frari, K. Wrona","doi":"10.1109/SPW.2016.20","DOIUrl":"https://doi.org/10.1109/SPW.2016.20","url":null,"abstract":"The search for new authentication methods to replace passwords for modern mobile devices such as smartphones and tablets has attracted a substantial amount of research in recent years. As a result, several new behavioral biometric schemes have been proposed. Most of these schemes, however, are uni-modal. This paper presents a new, bi-modal behavioral biometric solution for user authentication. The proposed mechanism takes into account micro-movements of a phone and movements of the user's finger during writing or signing on the touchscreen. More specifically, it profiles a user based on how he holds the phone and based on the characteristics of the points being pressed on the touchscreen, and not the produced signature image. We have implemented and evaluated our scheme on commercially available smartphones. Using Multilayer Perceptron (MLP) 1-class verifier, we achieved approx. 95% True Acceptance Rate (TAR) with 3.1% False Acceptance Rate (FAR) on a dataset of 30 volunteers. Preliminary results on usability show a positive opinion about our system.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127735130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Research Report: Analysis of Software for Restricted Computational Environment Applicability 研究报告:有限计算环境软件适用性分析
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.38
Jacob I. Torrey, Jonathan Miodownik
Preliminary experiment design and research goals are presented to measure the applicability of restricted computational complexity environments in general purpose development efforts. The Linux kernel is examined through the lens of LangSec in order to gain insight into the make-up of the kernel code vis-à-vis the complexity class of recognizer for input to each component on the Chomsky Hierarchy. Manual analysis is assisted with LLVM Passes and comparison with the real-time Linux fork. This paper describes an on-going effort with the goals of justifying further research in the field of restricted computational environments.
提出了初步的实验设计和研究目标,以衡量限制计算复杂性环境在通用开发工作中的适用性。通过LangSec的镜头检查Linux内核,以便深入了解内核代码的构成,参见-à-vis乔姆斯基层次结构上每个组件输入的识别器的复杂性类。通过LLVM pass和与实时Linux分支的比较,可以帮助进行手动分析。本文描述了一项正在进行的努力,其目标是证明在受限计算环境领域进一步研究的合理性。
{"title":"Research Report: Analysis of Software for Restricted Computational Environment Applicability","authors":"Jacob I. Torrey, Jonathan Miodownik","doi":"10.1109/SPW.2016.38","DOIUrl":"https://doi.org/10.1109/SPW.2016.38","url":null,"abstract":"Preliminary experiment design and research goals are presented to measure the applicability of restricted computational complexity environments in general purpose development efforts. The Linux kernel is examined through the lens of LangSec in order to gain insight into the make-up of the kernel code vis-à-vis the complexity class of recognizer for input to each component on the Chomsky Hierarchy. Manual analysis is assisted with LLVM Passes and comparison with the real-time Linux fork. This paper describes an on-going effort with the goals of justifying further research in the field of restricted computational environments.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection Directive 从欧洲数据保护指令中提取访问控制规则的半自动化方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.16
K. Fatema, C. Debruyne, D. Lewis, D. O’Sullivan, J. Morrison, Abdullah-Al Mazed
Handling personal data in a legally compliant way is an important factor for ensuring the trustworthiness of a service provider. The EU data protection directive (EU DPD) is built in such a way that the outcomes of rules are subject to explanations, contexts with dependencies, and human interpretation. Therefore, the process of obtaining deterministic and formal rules in policy languages from the EU DPD is difficult to fully automate. To tackle this problem, we demonstrate in this paper the use of a Controlled Natural Language (CNL) to encode the rules of the EU DPD, in a manner that can be automatically converted into the policy languages XACML and PERMIS. We also show that forming machine executable rules automatically from the controlled natural language grammar not only has the benefit of ensuring the correctness of those rules but also has potential of making the overall process more efficient.
以符合法律规定的方式处理个人资料,是确保服务提供者值得信赖的重要因素。欧盟数据保护指令(EU DPD)是以这样一种方式构建的,即规则的结果受制于解释、具有依赖关系的上下文和人为解释。因此,从EU DPD中获得政策语言的确定性和形式化规则的过程很难完全自动化。为了解决这个问题,我们在本文中演示了使用受控自然语言(CNL)来编码EU DPD的规则,这种方式可以自动转换为策略语言XACML和PERMIS。我们还表明,从受控的自然语言语法自动形成机器可执行的规则不仅有利于确保这些规则的正确性,而且有可能使整个过程更有效率。
{"title":"A Semi-Automated Methodology for Extracting Access Control Rules from the European Data Protection Directive","authors":"K. Fatema, C. Debruyne, D. Lewis, D. O’Sullivan, J. Morrison, Abdullah-Al Mazed","doi":"10.1109/SPW.2016.16","DOIUrl":"https://doi.org/10.1109/SPW.2016.16","url":null,"abstract":"Handling personal data in a legally compliant way is an important factor for ensuring the trustworthiness of a service provider. The EU data protection directive (EU DPD) is built in such a way that the outcomes of rules are subject to explanations, contexts with dependencies, and human interpretation. Therefore, the process of obtaining deterministic and formal rules in policy languages from the EU DPD is difficult to fully automate. To tackle this problem, we demonstrate in this paper the use of a Controlled Natural Language (CNL) to encode the rules of the EU DPD, in a manner that can be automatically converted into the policy languages XACML and PERMIS. We also show that forming machine executable rules automatically from the controlled natural language grammar not only has the benefit of ensuring the correctness of those rules but also has potential of making the overall process more efficient.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks 基于传感器的移动Web指纹识别和跨站输入推理攻击
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.17
Chuan Yue
Smartphone motion sensor data are not only accessible to native mobile apps, but have also become accessible to the webpages rendered in either mobile browsers or the WebView components of mobile apps. In this position paper, we highlight four types of broad and severe user fingerprinting and cross-site input inference attacks that can exploit the smartphone motion sensor data to compromise mobile web users' privacy and security, we also discuss some research topics for further investigating the effectiveness of these attacks and designing usable defense mechanisms.
智能手机的运动传感器数据不仅可以被本地移动应用访问,也可以被移动浏览器或移动应用的WebView组件所呈现的网页访问。在本文中,我们重点介绍了四种类型的广泛而严重的用户指纹和跨站点输入推理攻击,它们可以利用智能手机运动传感器数据来危害移动网络用户的隐私和安全,我们还讨论了一些研究课题,以进一步研究这些攻击的有效性和设计可用的防御机制。
{"title":"Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks","authors":"Chuan Yue","doi":"10.1109/SPW.2016.17","DOIUrl":"https://doi.org/10.1109/SPW.2016.17","url":null,"abstract":"Smartphone motion sensor data are not only accessible to native mobile apps, but have also become accessible to the webpages rendered in either mobile browsers or the WebView components of mobile apps. In this position paper, we highlight four types of broad and severe user fingerprinting and cross-site input inference attacks that can exploit the smartphone motion sensor data to compromise mobile web users' privacy and security, we also discuss some research topics for further investigating the effectiveness of these attacks and designing usable defense mechanisms.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131795686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Polymorphic Malware Detection Using Sequence Classification Methods 基于序列分类方法的多态恶意软件检测
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.30
Jake Drew, T. Moore, Michael Hahsler
Polymorphic malware detection is challenging due to the continual mutations miscreants introduce to successive instances of a particular virus. Such changes are akin to mutations in biological sequences. Recently, high-throughput methods for gene sequence classification have been developed by the bioinformatics and computational biology communities. In this paper, we argue that these methods can be usefully applied to malware detection. Unfortunately, gene classification tools are usually optimized for and restricted to an alphabet of four letters (nucleic acids). Consequently, we have selected the Strand gene sequence classifier, which offers a robust classification strategy that can easily accommodate unstructured data with any alphabet including source code or compiled machine code. To demonstrate Stand's suitability for classifying malware, we execute it on approximately 500GB of malware data provided by the Kaggle Microsoft Malware Classification Challenge (BIG 2015) used for predicting 9 classes of polymorphic malware. Experiments show that, with minimal adaptation, the method achieves accuracy levels well above 95% requiring only a fraction of the training times used by the winning team's method.
多态恶意软件的检测是具有挑战性的,因为连续突变的不法分子引入到一个特定的病毒的连续实例。这种变化类似于生物序列的突变。近年来,生物信息学和计算生物学领域发展了高通量的基因序列分类方法。在本文中,我们认为这些方法可以有效地应用于恶意软件检测。不幸的是,基因分类工具通常是针对四个字母(核酸)的字母表进行优化和限制的。因此,我们选择了Strand基因序列分类器,它提供了一个强大的分类策略,可以很容易地适应任何字母表的非结构化数据,包括源代码或编译的机器码。为了证明Stand对恶意软件分类的适用性,我们在Kaggle微软恶意软件分类挑战赛(BIG 2015)提供的大约500GB的恶意软件数据上执行它,用于预测9类多态恶意软件。实验表明,在最小的适应性下,该方法只需要获胜团队所用训练时间的一小部分,就能达到95%以上的准确率。
{"title":"Polymorphic Malware Detection Using Sequence Classification Methods","authors":"Jake Drew, T. Moore, Michael Hahsler","doi":"10.1109/SPW.2016.30","DOIUrl":"https://doi.org/10.1109/SPW.2016.30","url":null,"abstract":"Polymorphic malware detection is challenging due to the continual mutations miscreants introduce to successive instances of a particular virus. Such changes are akin to mutations in biological sequences. Recently, high-throughput methods for gene sequence classification have been developed by the bioinformatics and computational biology communities. In this paper, we argue that these methods can be usefully applied to malware detection. Unfortunately, gene classification tools are usually optimized for and restricted to an alphabet of four letters (nucleic acids). Consequently, we have selected the Strand gene sequence classifier, which offers a robust classification strategy that can easily accommodate unstructured data with any alphabet including source code or compiled machine code. To demonstrate Stand's suitability for classifying malware, we execute it on approximately 500GB of malware data provided by the Kaggle Microsoft Malware Classification Challenge (BIG 2015) used for predicting 9 classes of polymorphic malware. Experiments show that, with minimal adaptation, the method achieves accuracy levels well above 95% requiring only a fraction of the training times used by the winning team's method.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
From Privacy Impact Assessment to Social Impact Assessment 从隐私影响评估到社会影响评估
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.19
L. Edwards, Derek McAuley, Laurence Diver
In order to address the continued decline in consumer trust in all things digital, and specifically the Internet of Things (IoT), we propose a radical overhaul of IoT design processes. Privacy by Design has been proposed as a suitable framework, but we argue the current approach has two failings: it presents too abstract a framework to inform design, and it is often applied after many critical design decisions have been made in defining the business opportunity. To rebuild trust we need the philosophy of Privacy by Design to be transformed into a wider Social Impact Assessment and delivered with practical guidance to be applied at product/service concept stage as well as throughout the system's engineering.
为了解决消费者对所有数字事物,特别是物联网(IoT)信任度持续下降的问题,我们建议对物联网设计流程进行彻底改革。设计隐私被认为是一个合适的框架,但我们认为目前的方法有两个缺点:它提供了一个过于抽象的框架,无法为设计提供信息,而且它通常是在定义商业机会时做出许多关键设计决策之后应用的。为了重建信任,我们需要将隐私设计理念转化为更广泛的社会影响评估,并提供实际指导,应用于产品/服务概念阶段以及整个系统工程。
{"title":"From Privacy Impact Assessment to Social Impact Assessment","authors":"L. Edwards, Derek McAuley, Laurence Diver","doi":"10.1109/SPW.2016.19","DOIUrl":"https://doi.org/10.1109/SPW.2016.19","url":null,"abstract":"In order to address the continued decline in consumer trust in all things digital, and specifically the Internet of Things (IoT), we propose a radical overhaul of IoT design processes. Privacy by Design has been proposed as a suitable framework, but we argue the current approach has two failings: it presents too abstract a framework to inform design, and it is often applied after many critical design decisions have been made in defining the business opportunity. To rebuild trust we need the philosophy of Privacy by Design to be transformed into a wider Social Impact Assessment and delivered with practical guidance to be applied at product/service concept stage as well as throughout the system's engineering.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132969372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec Post-Hoc LangSec的语法推理和机器学习方法
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.26
Sheridan S. Curley, Richard E. Harang
Formal Language Theory for Security (LangSec) applies the tools of theoretical computer science to the problem of protocol design and analysis. In practice, most results have focused on protocol design, showing that by restricting the complexity of protocols it is possible to design parsers with desirable and formally verifiable properties, such as correctness and equivalence. When we consider existing protocols, however, many of these were not subjected to formal analysis during their design, and many are not implemented in a manner consistent with their formal documentation. Determining a grammar for such protocols is the first step in analyzing them, which places this problem in the domain of grammatical inference, for which a deep theoretical literature exists. In particular, although it has been shown that the higher level categories of the Chomsky hierarchy cannot be generically learned, it is also known that certain subcategories of that hierarchy can be effectively learned. In this paper, we summarize some theoretical results for inferring well-known Chomsky grammars, with special attention to context-free grammars (CFGs) and their generated languages (CFLs). We then demonstrate that, despite negative learnability results in the theoretical regime, we can use long short-term memory (LSTM) networks, a type of recurrent neural network (RNN) architecture, to learn a grammar for URIs that appear in Apache HTTP access logs for a particular server with high accuracy. We discuss these results in the context of grammatical inference, and suggest avenues for further research into learnability of a subgroup of the context-free grammars.
形式语言安全理论(LangSec)将理论计算机科学的工具应用于协议设计和分析问题。在实践中,大多数结果都集中在协议设计上,表明通过限制协议的复杂性,可以设计出具有理想和正式可验证属性的解析器,例如正确性和等价性。然而,当我们考虑现有的协议时,其中许多协议在设计期间没有经过正式分析,并且许多协议没有以与其正式文档一致的方式实现。确定这些协议的语法是分析它们的第一步,这将这个问题置于语法推理领域,对此存在着深厚的理论文献。特别是,虽然已经证明乔姆斯基层次结构的更高层次的类别不能被一般地学习,但也知道该层次结构的某些子类别可以被有效地学习。在本文中,我们总结了一些理论结果来推断著名的乔姆斯基语法,特别关注上下文无关语法(CFGs)和它们的生成语言(cfl)。然后,我们证明,尽管在理论体系中有负的可学习性结果,但我们可以使用长短期记忆(LSTM)网络,一种循环神经网络(RNN)架构,以高精度的方式学习出现在Apache HTTP访问日志中的特定服务器的uri语法。我们在语法推理的背景下讨论了这些结果,并提出了进一步研究上下文无关语法子集的可学习性的途径。
{"title":"Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec","authors":"Sheridan S. Curley, Richard E. Harang","doi":"10.1109/SPW.2016.26","DOIUrl":"https://doi.org/10.1109/SPW.2016.26","url":null,"abstract":"Formal Language Theory for Security (LangSec) applies the tools of theoretical computer science to the problem of protocol design and analysis. In practice, most results have focused on protocol design, showing that by restricting the complexity of protocols it is possible to design parsers with desirable and formally verifiable properties, such as correctness and equivalence. When we consider existing protocols, however, many of these were not subjected to formal analysis during their design, and many are not implemented in a manner consistent with their formal documentation. Determining a grammar for such protocols is the first step in analyzing them, which places this problem in the domain of grammatical inference, for which a deep theoretical literature exists. In particular, although it has been shown that the higher level categories of the Chomsky hierarchy cannot be generically learned, it is also known that certain subcategories of that hierarchy can be effectively learned. In this paper, we summarize some theoretical results for inferring well-known Chomsky grammars, with special attention to context-free grammars (CFGs) and their generated languages (CFLs). We then demonstrate that, despite negative learnability results in the theoretical regime, we can use long short-term memory (LSTM) networks, a type of recurrent neural network (RNN) architecture, to learn a grammar for URIs that appear in Apache HTTP access logs for a particular server with high accuracy. We discuss these results in the context of grammatical inference, and suggest avenues for further research into learnability of a subgroup of the context-free grammars.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133101389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Critical Analysis of Privacy Design Strategies 隐私设计策略的批判性分析
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.23
Michael Colesky, J. Hoepman, Christiaan Hillen
The upcoming General Data Protection Regulation is quickly becoming of great concern to organizations which process personal data of European citizens. It is however nontrivial to translate these legal requirements into privacy friendly designs. One recently proposed approach to make 'privacy by design' more practical is privacy design strategies. This paper improves the strategy definitions and suggests an additional level of abstraction between strategies and privacy patterns: 'tactics'. We have identified a collection of such tactics based on an extensive literature review, in particular a catalogue of surveyed privacy patterns. We explore the relationships between the concepts we introduce and similar concepts used in software engineering. This paper helps bridge the gap between data protection requirements set out in law, and system development practice.
即将出台的《通用数据保护条例》正迅速成为处理欧洲公民个人数据的组织非常关注的问题。然而,将这些法律要求转化为隐私友好型设计并非易事。最近提出的一种使“设计隐私”更实用的方法是隐私设计策略。本文改进了策略定义,并在策略和隐私模式之间提出了一个额外的抽象层次:“战术”。我们根据广泛的文献回顾,特别是调查隐私模式的目录,确定了此类策略的集合。我们探讨了我们引入的概念和软件工程中使用的类似概念之间的关系。本文有助于弥合法律规定的数据保护要求与系统开发实践之间的差距。
{"title":"A Critical Analysis of Privacy Design Strategies","authors":"Michael Colesky, J. Hoepman, Christiaan Hillen","doi":"10.1109/SPW.2016.23","DOIUrl":"https://doi.org/10.1109/SPW.2016.23","url":null,"abstract":"The upcoming General Data Protection Regulation is quickly becoming of great concern to organizations which process personal data of European citizens. It is however nontrivial to translate these legal requirements into privacy friendly designs. One recently proposed approach to make 'privacy by design' more practical is privacy design strategies. This paper improves the strategy definitions and suggests an additional level of abstraction between strategies and privacy patterns: 'tactics'. We have identified a collection of such tactics based on an extensive literature review, in particular a catalogue of surveyed privacy patterns. We explore the relationships between the concepts we introduce and similar concepts used in software engineering. This paper helps bridge the gap between data protection requirements set out in law, and system development practice.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 132
Compliance Monitoring of Third-Party Applications in Online Social Networks 在线社交网络中第三方应用合规监控
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.13
Florian Kelbert, Alexander Fromm
With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users' data. However, in practice, they might store, use, and distribute that data in all kinds of unapproved ways. We present an approach that transparently enforces security and privacy policies on TPAs that integrate with OSNs. To this end, we integrate concepts and implementations from the research areas of data usage control and information flow control. We instantiate these results in the context of TPAs in OSNs in order to enforce compliance with security and privacy policies that are provided by the OSN operator. We perform a preliminary evaluation of our approach on the basis of a TPA that integrates with the Facebook API.
随着在线社交网络(Online Social Networks, osn)的广泛应用,用户也越来越多地使用相应的第三方应用程序(tpa),如社交游戏和协作应用程序。为了提升社交体验,tpa通过OSN提供的API访问用户的个人数据。应用程序在处理用户数据时需要遵守特定的安全和隐私政策。然而,在实践中,他们可能会以各种未经批准的方式存储、使用和分发这些数据。我们提出了一种透明地在与osn集成的tpa上执行安全和隐私策略的方法。为此,我们整合了数据使用控制和信息流控制研究领域的概念和实现。我们在OSN的tpa上下文中实例化这些结果,以便强制遵守OSN运营商提供的安全和隐私策略。我们基于与Facebook API集成的TPA对我们的方法进行了初步评估。
{"title":"Compliance Monitoring of Third-Party Applications in Online Social Networks","authors":"Florian Kelbert, Alexander Fromm","doi":"10.1109/SPW.2016.13","DOIUrl":"https://doi.org/10.1109/SPW.2016.13","url":null,"abstract":"With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users' data. However, in practice, they might store, use, and distribute that data in all kinds of unapproved ways. We present an approach that transparently enforces security and privacy policies on TPAs that integrate with OSNs. To this end, we integrate concepts and implementations from the research areas of data usage control and information flow control. We instantiate these results in the context of TPAs in OSNs in order to enforce compliance with security and privacy policies that are provided by the OSN operator. We perform a preliminary evaluation of our approach on the basis of a TPA that integrates with the Facebook API.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116094836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Activity Pattern Discovery from Network Captures 从网络捕获中发现活动模式
Pub Date : 2016-05-22 DOI: 10.1109/SPW.2016.22
Alan C. Lin, Gilbert L. Peterson
Investigating insider threat cases is challenging because activities are conducted with legitimate access that makes distinguishing malicious activities from normal activities difficult. To assist with identifying non-normal activities, we propose using two types of pattern discovery to identify a person's behavioral patterns in network data. The behavioral patterns serve to deemphasize normal behavior so that insider threat investigations can focus attention on potentially more relevant. Results from a controlled experiment demonstrate the highlighting of a suspicious event through the reduction of events belonging to discovered patterns.
调查内部威胁案例具有挑战性,因为活动是通过合法访问进行的,这使得区分恶意活动和正常活动变得困难。为了帮助识别非正常活动,我们建议使用两种类型的模式发现来识别网络数据中的个人行为模式。这些行为模式弱化了对正常行为的重视,这样内部威胁调查就可以把注意力集中在可能更相关的事情上。一个对照实验的结果表明,通过减少属于发现模式的事件来突出可疑事件。
{"title":"Activity Pattern Discovery from Network Captures","authors":"Alan C. Lin, Gilbert L. Peterson","doi":"10.1109/SPW.2016.22","DOIUrl":"https://doi.org/10.1109/SPW.2016.22","url":null,"abstract":"Investigating insider threat cases is challenging because activities are conducted with legitimate access that makes distinguishing malicious activities from normal activities difficult. To assist with identifying non-normal activities, we propose using two types of pattern discovery to identify a person's behavioral patterns in network data. The behavioral patterns serve to deemphasize normal behavior so that insider threat investigations can focus attention on potentially more relevant. Results from a controlled experiment demonstrate the highlighting of a suspicious event through the reduction of events belonging to discovered patterns.","PeriodicalId":341207,"journal":{"name":"2016 IEEE Security and Privacy Workshops (SPW)","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1