首页 > 最新文献

2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Malware Detection by Eating a Whole APK 通过吃掉整个APK来检测恶意软件
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351333
Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan
As Android is one of the most popular and widely used open-source mobile platforms, the security and privacy of Android apps are very critical, especially that over 6000 apps are added to the Google Play Store every day. This makes Android a prime target for malware. This paper proposes a modeling technique with experiments conducted using a dataset with about 10,000 benign and 10,000 malicious Android Application Packages (APK), in addition to other experiments that were conducted on the same dataset with a reduction in the number of benign files to be equal to 578 files. These files are analyzed using image classification techniques, where the whole APK file is converted into a grayscale image, and Convolutional Neural Networks (CNNs) with transfer-learning models are applied; to efficiently construct classification models for malware detection. Experiments have shown that the proposed technique has achieved favorable accuracy in the CNN model.
由于Android是最受欢迎和广泛使用的开源移动平台之一,Android应用程序的安全性和隐私性非常重要,特别是每天有超过6000个应用程序添加到Google Play Store。这使得Android成为恶意软件的首要目标。本文提出了一种建模技术,通过使用大约10,000个良性和10,000个恶意Android应用程序包(APK)的数据集进行实验,以及在同一数据集上进行的其他实验,将良性文件的数量减少到等于578个文件。使用图像分类技术对这些文件进行分析,其中将整个APK文件转换为灰度图像,并应用带有迁移学习模型的卷积神经网络(cnn);有效地构建恶意软件检测的分类模型。实验表明,该方法在CNN模型中取得了较好的精度。
{"title":"Malware Detection by Eating a Whole APK","authors":"Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan","doi":"10.23919/ICITST51030.2020.9351333","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351333","url":null,"abstract":"As Android is one of the most popular and widely used open-source mobile platforms, the security and privacy of Android apps are very critical, especially that over 6000 apps are added to the Google Play Store every day. This makes Android a prime target for malware. This paper proposes a modeling technique with experiments conducted using a dataset with about 10,000 benign and 10,000 malicious Android Application Packages (APK), in addition to other experiments that were conducted on the same dataset with a reduction in the number of benign files to be equal to 578 files. These files are analyzed using image classification techniques, where the whole APK file is converted into a grayscale image, and Convolutional Neural Networks (CNNs) with transfer-learning models are applied; to efficiently construct classification models for malware detection. Experiments have shown that the proposed technique has achieved favorable accuracy in the CNN model.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122922774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy 一种提高入侵检测系统预测精度的多层堆栈集成方法
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351316
F. L. Aryeh, B. Alese
Intrusion is a series of activities that violate an organisation's existing security goals and procedures. Hence, an Intrusion Detection System (IDS) should be capable of analysing incoming network traffic (packet) and determining if it is an attack or otherwise. Lack of recent and up to date data sets for the training of IDS is a critical issue in the development of effective IDS. This paper focuses on creating a more realistic data set in our case UMaT-OD-20 using ONDaSCA and also the building a Multi-layer Stack Ensemble (MLS) IDS Model for Intrusion Detection Systems. Multi-layer Stacked Ensemble exploits the strengths of various base-level model predictions to build a more robust meta-classifier that meliorate classification accuracy and reduces False Alarm Rate (FAR). Five (5) Supervised Machine Learning (ML) based algorithms videlicet K Nearest Neighbor (KNN), Decision Tree (DT), Logistic Regression (LR), Random Forest (RF) and Naive Bayes' (NB) were employed to generate predictive models for all features. The Python programming language was used for the entire research and all programming and evaluation of data was done with an Inter Core i7, 16GB RAM and 1TB HDD Windows 10 Pro Laptop computer. The predictions of the Multi-layer stacked ensemble showed an improvement of 0.97% over the best base model. This improvement reduced the FAR during the classification of network connections types. Again, the evaluation of our work shows a significant improvement over similar works in literature.
入侵是一系列违反组织现有安全目标和程序的活动。因此,入侵检测系统(IDS)应该能够分析传入的网络流量(数据包)并确定它是否是攻击或其他。缺乏最近和最新的IDS训练数据集是发展有效IDS的一个关键问题。本文的重点是在我们的案例中使用ONDaSCA创建一个更真实的数据集UMaT-OD-20,并建立一个用于入侵检测系统的多层堆栈集成(MLS) IDS模型。多层堆叠集成利用各种基级模型预测的优势来构建更鲁棒的元分类器,从而提高分类精度并降低误报率(FAR)。采用五种基于监督机器学习(ML)的算法,分别为视频最小近邻(KNN)、决策树(DT)、逻辑回归(LR)、随机森林(RF)和朴素贝叶斯(NB),对所有特征生成预测模型。整个研究使用了Python编程语言,所有的编程和数据评估都是用一台Inter Core i7、16GB RAM和1TB HDD的Windows 10 Pro笔记本电脑完成的。多层叠加系综的预测结果比最佳基础模型提高了0.97%。这一改进降低了网络连接类型分类期间的FAR。再一次,我们的工作的评价显示出明显的进步,在文学上的同类作品。
{"title":"A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy","authors":"F. L. Aryeh, B. Alese","doi":"10.23919/ICITST51030.2020.9351316","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351316","url":null,"abstract":"Intrusion is a series of activities that violate an organisation's existing security goals and procedures. Hence, an Intrusion Detection System (IDS) should be capable of analysing incoming network traffic (packet) and determining if it is an attack or otherwise. Lack of recent and up to date data sets for the training of IDS is a critical issue in the development of effective IDS. This paper focuses on creating a more realistic data set in our case UMaT-OD-20 using ONDaSCA and also the building a Multi-layer Stack Ensemble (MLS) IDS Model for Intrusion Detection Systems. Multi-layer Stacked Ensemble exploits the strengths of various base-level model predictions to build a more robust meta-classifier that meliorate classification accuracy and reduces False Alarm Rate (FAR). Five (5) Supervised Machine Learning (ML) based algorithms videlicet K Nearest Neighbor (KNN), Decision Tree (DT), Logistic Regression (LR), Random Forest (RF) and Naive Bayes' (NB) were employed to generate predictive models for all features. The Python programming language was used for the entire research and all programming and evaluation of data was done with an Inter Core i7, 16GB RAM and 1TB HDD Windows 10 Pro Laptop computer. The predictions of the Multi-layer stacked ensemble showed an improvement of 0.97% over the best base model. This improvement reduced the FAR during the classification of network connections types. Again, the evaluation of our work shows a significant improvement over similar works in literature.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Session 7: Big Data and Wireless Networking 第七场:大数据和无线网络
Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351321
{"title":"Session 7: Big Data and Wireless Networking","authors":"","doi":"10.23919/icitst51030.2020.9351321","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351321","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128515316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study 资源有限环境下椭圆曲线密码的安全性与性能比较研究
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351327
Ali Raya, K. Mariyappn
Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.
如今,传感器和物联网设备等受限资源设备的使用正在迅速增加。这些设备通常处理敏感数据,同时具有有限的存储和低处理能力。这意味着在这些有限的环境中实现具有高级别安全性的协议可能相对困难,因为我们发现自己面临着性能和安全性之间的权衡。因此,最终的目标是找到一种既能达到良好的安全级别又能消耗很少资源的加密方案。本研究旨在通过比较ECC与其他公钥加密方案在密钥对生成、密钥交换和数字签名原语方面的性能和安全性来分析资源有限环境下椭圆曲线加密的性能和安全性。本文的比较结果促进了在资源有限的环境中使用ECC,并显示了ECC与其他公钥方案相比在时间和内存需求上的显著差异,特别是在安全性要求增加的情况下。
{"title":"Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study","authors":"Ali Raya, K. Mariyappn","doi":"10.23919/ICITST51030.2020.9351327","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351327","url":null,"abstract":"Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low processing capabilities. That means achieving protocols with high levels of security can be relatively difficult in these limited environments, as we find ourselves faced with a trade-off between performance and security. Therefore, the ultimate goal is to find a cryptographic scheme which achieve good levels of security and consume little resources. This study seeks to analyze the performance and security of Elliptic Curve Cryptography in resource-limited environments by comparing ECC to other public key cryptographic schemes over key pair generation, key exchange and digital signature primitives. The comparison results of this paper promote using ECC in resource-limited environments and show the significant differences between the time and memory requirements of ECC comparing to other public key schemes especially when the security requirements increase.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Easy Simple Factoring-based Digital Signature Scheme 简单的基于因子分解的数字签名方案
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351341
Sook-Yan Hue, N. Sarmin, E. S. Ismail, Ji-Jian Chin
A newly developed signature scheme, namely the Easy Simple Factoring-based (ESF) signature scheme is proposed in this paper. First, we construct a standard identification scheme based on the ESF assumption. Then, the standard identification scheme is converted to a signature scheme by utilizing the Fiat-Shamir transformation. Our signature scheme is provable secure in the random oracle model, and the security proof is shown. The efficiency analysis of our scheme is conducted and compared with the Full Domain Hash (FDH) signature scheme. Our scheme has a more powerful efficiency performance in signing and verifying algorithms than the FDH signature scheme when the public keys $u$ and γ in our signature scheme are fixed to small bit lengths.
本文提出了一种新的签名方案,即基于易简单分解(ESF)的签名方案。首先,我们基于ESF假设构造了一个标准的识别方案。然后,利用Fiat-Shamir变换将标准身份方案转换为签名方案。我们的签名方案在随机oracle模型下是安全的,并给出了安全性证明。对该方案进行了效率分析,并与全域哈希(FDH)签名方案进行了比较。当我们的签名方案中的公钥$u$和γ固定为较小的位长时,我们的方案在签名和验证算法方面具有比FDH签名方案更强大的效率性能。
{"title":"Easy Simple Factoring-based Digital Signature Scheme","authors":"Sook-Yan Hue, N. Sarmin, E. S. Ismail, Ji-Jian Chin","doi":"10.23919/ICITST51030.2020.9351341","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351341","url":null,"abstract":"A newly developed signature scheme, namely the Easy Simple Factoring-based (ESF) signature scheme is proposed in this paper. First, we construct a standard identification scheme based on the ESF assumption. Then, the standard identification scheme is converted to a signature scheme by utilizing the Fiat-Shamir transformation. Our signature scheme is provable secure in the random oracle model, and the security proof is shown. The efficiency analysis of our scheme is conducted and compared with the Full Domain Hash (FDH) signature scheme. Our scheme has a more powerful efficiency performance in signing and verifying algorithms than the FDH signature scheme when the public keys $u$ and γ in our signature scheme are fixed to small bit lengths.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Bitcoin Addresses from Security Perspectives 从安全角度看比特币地址的演变
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351346
Wai Kok Chan, Ji-Jian Chin, V. Goh
Since Satoshi Nakamoto launched bitcoin in 2009, there have been many improvements in bitcoin addresses that are required to fulfill newer requirements. These improvements have made the learning curve steeper for a regular user. Many readers do not know the real motivation why certain features are implemented or otherwise. In this paper, the evolution of bitcoin addresses is clearly described so that users can better understand the progress made in bitcoin. This paper also explains the motivation for some features' motivation and why these features were implemented in a certain way.
自2009年中本聪(Satoshi Nakamoto)推出比特币以来,比特币地址有了许多改进,以满足新的要求。这些改进使得普通用户的学习曲线更加陡峭。许多读者不知道实现某些特性的真正动机。在本文中,对比特币地址的演变进行了清晰的描述,以便用户更好地了解比特币的进展。本文还解释了一些功能的动机,以及为什么这些功能以某种方式实现。
{"title":"Evolution of Bitcoin Addresses from Security Perspectives","authors":"Wai Kok Chan, Ji-Jian Chin, V. Goh","doi":"10.23919/ICITST51030.2020.9351346","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351346","url":null,"abstract":"Since Satoshi Nakamoto launched bitcoin in 2009, there have been many improvements in bitcoin addresses that are required to fulfill newer requirements. These improvements have made the learning curve steeper for a regular user. Many readers do not know the real motivation why certain features are implemented or otherwise. In this paper, the evolution of bitcoin addresses is clearly described so that users can better understand the progress made in bitcoin. This paper also explains the motivation for some features' motivation and why these features were implemented in a certain way.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API 针对TensorFlow对象检测API的对抗性规避噪声攻击
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351331
R. Kannan, Ji-Jian Chin, Xiaoning Guo
TensorFlow Object Detection API is an open-source object detection machine learning program that has gained recent popularity and is being used in a variety of applications. Region-Based Fully Convolutional Network (R-FCN) and Faster Region-Based Convolutional Neural Network (Faster R-CNN) are two models of the API that are very popular in object detection. This paper compares the responses of the 2 models when trained and tested under the same datasets for the detection of potholes. The 2 models are compared in their results of evaluating datasets superimposed with simple additive noises such as impulse noise, Gaussian noise and Poisson noise. These models are also tested against different noise density levels of impulse noise to see the percentage of adversarial success. This paper shows the positive effect of low-density additive noise in terms of improving the performance of the ML models such that they could be considered to be added as a new feature vector. The datasets from the referenced paper are examined to find that some improvements such as using a higher resolution camera and placing the camera on the hood of the car with no window pane in between could be done to improve the performance of the API.
TensorFlow对象检测API是一个开源的对象检测机器学习程序,最近很受欢迎,并被用于各种应用程序。基于区域的全卷积网络(R-FCN)和更快的基于区域的卷积神经网络(Faster R-CNN)是在目标检测中非常流行的两种API模型。本文比较了两种模型在相同数据集下训练和测试时对坑穴检测的响应。比较了两种模型对叠加了脉冲噪声、高斯噪声和泊松噪声的数据集的评价结果。这些模型还针对不同的噪声密度和脉冲噪声水平进行了测试,以查看对抗成功的百分比。本文展示了低密度加性噪声在提高ML模型性能方面的积极作用,使得它们可以被视为添加为新的特征向量。对参考论文中的数据集进行了检查,发现可以进行一些改进,例如使用更高分辨率的摄像头,并将摄像头放置在汽车引擎盖上,中间没有窗玻璃,以提高API的性能。
{"title":"Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API","authors":"R. Kannan, Ji-Jian Chin, Xiaoning Guo","doi":"10.23919/ICITST51030.2020.9351331","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351331","url":null,"abstract":"TensorFlow Object Detection API is an open-source object detection machine learning program that has gained recent popularity and is being used in a variety of applications. Region-Based Fully Convolutional Network (R-FCN) and Faster Region-Based Convolutional Neural Network (Faster R-CNN) are two models of the API that are very popular in object detection. This paper compares the responses of the 2 models when trained and tested under the same datasets for the detection of potholes. The 2 models are compared in their results of evaluating datasets superimposed with simple additive noises such as impulse noise, Gaussian noise and Poisson noise. These models are also tested against different noise density levels of impulse noise to see the percentage of adversarial success. This paper shows the positive effect of low-density additive noise in terms of improving the performance of the ML models such that they could be considered to be added as a new feature vector. The datasets from the referenced paper are examined to find that some improvements such as using a higher resolution camera and placing the camera on the hood of the car with no window pane in between could be done to improve the performance of the API.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session 6: Information Security 第六部分:信息安全
Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351342
{"title":"Session 6: Information Security","authors":"","doi":"10.23919/icitst51030.2020.9351342","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351342","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"487 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency 基于空间频率人类视觉感知的抗刷肩彩色图像认证方法
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351349
Harris Anthonio, Y. Kam
Superimposing the high and low spatial frequencies of two different images allows different image interpretations, depending on the viewing distance between the viewer and the image. Previous works used this technique to produce greyscale keypads for PIN entry to prevent shoulder-surfing. Nevertheless, implementation in colour keypads would preserve the underlying look and feel of most applications which are in colour. Thus, the proposed method uses superimposition to produce hybrid image keypads in colour. From user testing and simulated shoulder surfing attacks, it was shown that the proposed method had a low error rate of 3.57% for user logins while none of the shoulder surfing attacks were successful.
叠加两幅不同图像的高、低空间频率,根据观看者与图像之间的观看距离,可以实现不同的图像解释。以前的工作使用这种技术来制作用于密码输入的灰度键盘,以防止肩部冲浪。然而,在彩色键盘中实现将保留大多数彩色应用程序的基本外观和感觉。因此,所提出的方法使用叠加来产生彩色混合图像键盘。从用户测试和模拟的刷肩攻击中可以发现,该方法对用户登录的误差率很低,只有3.57%,没有一次刷肩攻击成功。
{"title":"A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency","authors":"Harris Anthonio, Y. Kam","doi":"10.23919/ICITST51030.2020.9351349","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351349","url":null,"abstract":"Superimposing the high and low spatial frequencies of two different images allows different image interpretations, depending on the viewing distance between the viewer and the image. Previous works used this technique to produce greyscale keypads for PIN entry to prevent shoulder-surfing. Nevertheless, implementation in colour keypads would preserve the underlying look and feel of most applications which are in colour. Thus, the proposed method uses superimposition to produce hybrid image keypads in colour. From user testing and simulated shoulder surfing attacks, it was shown that the proposed method had a low error rate of 3.57% for user logins while none of the shoulder surfing attacks were successful.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher 基于混沌流密码的FPGA设计与实现
Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351328
Fethi Dridi, Carinelle Atamech, S. E. Assad, W. H. Youssef, Mohsen Machhout
Chaos based stream cipher (CSC) has caught the attention of various security applications, especially for military needs and protection in Internet of Things (IoT). In fact, computing and memory resources have been suited by chaos based stream cipher for real-time communication. In this paper, we designed a chaos-based stream cipher using a robust pseudo chaotic number generator (RPCNG). The simulation of the proposed CSC is done in VHDL using the ISE Design Suite 14.6 tool of Xilinx with finite computing precision N = 32-bit and the hardware implementation is realized on the SAKURA-G FPGA board. The proposed system requires 6036 slices L UTs as hardware cost, and achieves throughput of 301.184 Mbps. It is robust against statistical attacks and thus can be used in all applications that require confidentiality.
基于混沌的流密码(CSC)已经引起了各种安全应用的关注,特别是在军事需求和物联网(IoT)保护方面。实际上,混沌流密码在计算和存储资源上都非常适合实时通信。本文采用鲁棒伪混沌数发生器(RPCNG)设计了一种基于混沌的流密码。利用Xilinx公司的ISE Design Suite 14.6工具,以有限计算精度N = 32位的VHDL语言对所提出的CSC进行仿真,并在SAKURA-G FPGA板上实现硬件实现。该系统的硬件成本为6036片L - ut,吞吐量为301.184 Mbps。它对统计攻击是健壮的,因此可以用于所有需要保密性的应用程序。
{"title":"Design and Implementation on FPGA Board of a Chaos-based Stream Cipher","authors":"Fethi Dridi, Carinelle Atamech, S. E. Assad, W. H. Youssef, Mohsen Machhout","doi":"10.23919/ICITST51030.2020.9351328","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351328","url":null,"abstract":"Chaos based stream cipher (CSC) has caught the attention of various security applications, especially for military needs and protection in Internet of Things (IoT). In fact, computing and memory resources have been suited by chaos based stream cipher for real-time communication. In this paper, we designed a chaos-based stream cipher using a robust pseudo chaotic number generator (RPCNG). The simulation of the proposed CSC is done in VHDL using the ISE Design Suite 14.6 tool of Xilinx with finite computing precision N = 32-bit and the hardware implementation is realized on the SAKURA-G FPGA board. The proposed system requires 6036 slices L UTs as hardware cost, and achieves throughput of 301.184 Mbps. It is robust against statistical attacks and thus can be used in all applications that require confidentiality.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123110161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1