首页 > 最新文献

2020 International Conference on Software Security and Assurance (ICSSA)最新文献

英文 中文
An Internet of Things (IoT) Security Assessment for Households 家庭物联网(IoT)安全评估
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00017
William Aiken, J. Ryoo, S. Rizvi
IoT is becoming a common term. More consumers are purchasing and installing household IoT devices such as thermostats, security cameras, and lighting solutions. These so-called smart home appliances supposedly make our lives easier, safer, and more sustainable. However, the benefits come with risks, especially in cybersecurity and privacy. As more IoT hosts connect to a home network, the possibility of potential security breaches also increases. The more hosts in a network, the more opportunities for attackers, which is why users should pay attention to security vulnerabilities and address them as much as possible. In this context, self-assessment of how well a household is doing with IoT security is of great use. This paper proposes an easy-to-use and intuitive assessment tool to realize this idea.
物联网正在成为一个常见的术语。越来越多的消费者正在购买和安装家用物联网设备,如恒温器、安全摄像头和照明解决方案。这些所谓的智能家电据说会让我们的生活更轻松、更安全、更可持续。然而,好处伴随着风险,尤其是在网络安全和隐私方面。随着越来越多的物联网主机连接到家庭网络,潜在的安全漏洞的可能性也在增加。网络中的主机越多,攻击者的机会就越多,这就是为什么用户应该关注安全漏洞并尽可能地解决它们的原因。在这种情况下,自我评估家庭在物联网安全方面的表现非常有用。本文提出了一个易于使用和直观的评估工具来实现这一想法。
{"title":"An Internet of Things (IoT) Security Assessment for Households","authors":"William Aiken, J. Ryoo, S. Rizvi","doi":"10.1109/ICSSA51305.2020.00017","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00017","url":null,"abstract":"IoT is becoming a common term. More consumers are purchasing and installing household IoT devices such as thermostats, security cameras, and lighting solutions. These so-called smart home appliances supposedly make our lives easier, safer, and more sustainable. However, the benefits come with risks, especially in cybersecurity and privacy. As more IoT hosts connect to a home network, the possibility of potential security breaches also increases. The more hosts in a network, the more opportunities for attackers, which is why users should pay attention to security vulnerabilities and address them as much as possible. In this context, self-assessment of how well a household is doing with IoT security is of great use. This paper proposes an easy-to-use and intuitive assessment tool to realize this idea.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115222463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Security through Integration Testing in an Electronic Health Records System 通过电子健康记录系统集成测试实现持续安全
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00012
S. Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, X. Zou
The estimated average cost of a healthcare data breach in 2019 was $6.45 million, which is the highest among all industries. Yet, security remains an afterthought in many digital health applications. Formal methods for testing for bugs are commonplace in software development through the use of unit testing, integration testing, system testing, and acceptance testing. More so, in modern software engineering, continuous integration is a well-known concept to run automated tests soon after any code change, when the system builds and notifies the development team of the test results. In this paper, we describe the use of a popular Python unit testing framework to implement a formal method of security testing. Common Vulnerability Scoring System (CVSS) is used to calculate metrics that represent the state of security of a deployed system. We developed a series of Pytest Behavioral Driven Development (BDD) scripts to test the Authentication and Availability of a widely used Electronic Health Records System called OpenMRS. The advantage of using the BDD approach is that testing scripts, called Gherkin files, can be read, and understood by the developers as well as the non-developer stakeholders. The use of Gherkin serves two purposes: firstly, it serves as the project’s documentation, and secondly, it automates the tests. The use of the CVSS score between 0 to 10 becomes an objective metric to compare every code change, thus achieving continuous security. We plan to expand BDD scripts to attacks like Denial of Service, Session Hijacking, SQL Injection, and other privilege escalation attacks.
2019年医疗保健数据泄露的平均成本估计为645万美元,是所有行业中最高的。然而,在许多数字健康应用程序中,安全性仍然是一个事后考虑的问题。在软件开发中,通过使用单元测试、集成测试、系统测试和验收测试来测试bug的正式方法是很常见的。更重要的是,在现代软件工程中,持续集成是一个众所周知的概念,在任何代码更改之后,当系统构建并通知开发团队测试结果时,运行自动化测试。在本文中,我们描述了使用流行的Python单元测试框架来实现正式的安全测试方法。通用漏洞评分系统(CVSS)用于计算表示已部署系统的安全状态的度量。我们开发了一系列Pytest行为驱动开发(BDD)脚本来测试广泛使用的电子健康记录系统OpenMRS的身份验证和可用性。使用BDD方法的优点是测试脚本(称为Gherkin文件)可以被开发人员和非开发人员涉众阅读和理解。使用Gherkin有两个目的:首先,它可以作为项目的文档,其次,它可以自动化测试。CVSS分数在0到10之间的使用成为比较每个代码更改的客观度量,从而实现持续的安全性。我们计划将BDD脚本扩展到拒绝服务、会话劫持、SQL注入和其他特权升级攻击等攻击。
{"title":"Continuous Security through Integration Testing in an Electronic Health Records System","authors":"S. Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, X. Zou","doi":"10.1109/ICSSA51305.2020.00012","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00012","url":null,"abstract":"The estimated average cost of a healthcare data breach in 2019 was $6.45 million, which is the highest among all industries. Yet, security remains an afterthought in many digital health applications. Formal methods for testing for bugs are commonplace in software development through the use of unit testing, integration testing, system testing, and acceptance testing. More so, in modern software engineering, continuous integration is a well-known concept to run automated tests soon after any code change, when the system builds and notifies the development team of the test results. In this paper, we describe the use of a popular Python unit testing framework to implement a formal method of security testing. Common Vulnerability Scoring System (CVSS) is used to calculate metrics that represent the state of security of a deployed system. We developed a series of Pytest Behavioral Driven Development (BDD) scripts to test the Authentication and Availability of a widely used Electronic Health Records System called OpenMRS. The advantage of using the BDD approach is that testing scripts, called Gherkin files, can be read, and understood by the developers as well as the non-developer stakeholders. The use of Gherkin serves two purposes: firstly, it serves as the project’s documentation, and secondly, it automates the tests. The use of the CVSS score between 0 to 10 becomes an objective metric to compare every code change, thus achieving continuous security. We plan to expand BDD scripts to attacks like Denial of Service, Session Hijacking, SQL Injection, and other privilege escalation attacks.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VM based Malware Security Protection on Android Platform Android平台基于虚拟机的恶意软件安全防护
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00014
Anthony Avella, Syed Rizvi, Andrew Gibson, Marcus Ryan, Ryan P. Strimple, Ian Menovich
This paper looks at the different ways in which Android phones can be attacked by android malware, and the different developments in malware protection and detection. The fight against mobile malware is an important one as most people today own cell phones and store valuable personal information on their phones. There are many ways in which a phone can be attacked by malware, and therefore there are many different methods to detect and defend against these attacks. Some experts suggest a decentralized data approach, while others suggest anti-malware hardware is the solution. There are many different Anti-malware hardware devices that all work in different ways and detect malware at different levels. However, there are no full-proof malware detection schemes. It is alarming that there is no common solution to protecting against malware and no way to completely detect malware every time. In this research, we focus on Android malware, specifically malware found on apps from the Google Play Store. One of the ways one would solve this problem is by using virtual machines and compiling malware detection programs on them. To support our VM based malware detection scheme, we develop an algorithm to provide implementation-level details. The practicality of our proposed scheme is shown using multiple case studies.
本文着眼于Android手机被Android恶意软件攻击的不同方式,以及恶意软件防护和检测的不同发展。与手机恶意软件的斗争是一项重要的工作,因为今天大多数人都拥有手机,并在手机上存储有价值的个人信息。手机被恶意软件攻击的方式有很多,因此有很多不同的方法来检测和防御这些攻击。一些专家建议采用分散的数据方法,而另一些专家则认为反恶意软件硬件是解决方案。有许多不同的反恶意软件硬件设备,它们都以不同的方式工作,并在不同的级别检测恶意软件。然而,目前还没有完全可靠的恶意软件检测方案。令人担忧的是,没有通用的解决方案来防止恶意软件,也没有办法每次都完全检测到恶意软件。在这项研究中,我们主要关注Android恶意软件,特别是在b谷歌Play Store应用程序中发现的恶意软件。解决这个问题的方法之一是使用虚拟机并在其上编译恶意软件检测程序。为了支持我们基于VM的恶意软件检测方案,我们开发了一种算法来提供实现级细节。通过多个案例研究表明了我们提出的方案的实用性。
{"title":"VM based Malware Security Protection on Android Platform","authors":"Anthony Avella, Syed Rizvi, Andrew Gibson, Marcus Ryan, Ryan P. Strimple, Ian Menovich","doi":"10.1109/ICSSA51305.2020.00014","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00014","url":null,"abstract":"This paper looks at the different ways in which Android phones can be attacked by android malware, and the different developments in malware protection and detection. The fight against mobile malware is an important one as most people today own cell phones and store valuable personal information on their phones. There are many ways in which a phone can be attacked by malware, and therefore there are many different methods to detect and defend against these attacks. Some experts suggest a decentralized data approach, while others suggest anti-malware hardware is the solution. There are many different Anti-malware hardware devices that all work in different ways and detect malware at different levels. However, there are no full-proof malware detection schemes. It is alarming that there is no common solution to protecting against malware and no way to completely detect malware every time. In this research, we focus on Android malware, specifically malware found on apps from the Google Play Store. One of the ways one would solve this problem is by using virtual machines and compiling malware detection programs on them. To support our VM based malware detection scheme, we develop an algorithm to provide implementation-level details. The practicality of our proposed scheme is shown using multiple case studies.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment 基于区块链的原生云环境下的服务性能评估方法
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00016
TaeYoung Kim, Hyung-Jong Kim
This study presents a performance evaluation system that helps Blockchain-based service planners make decisions. This system is offered as Docker and Kubernetes for portability and flexibility.
本研究提出了一个绩效评估系统,可以帮助基于区块链的服务规划者做出决策。该系统以Docker和Kubernetes的形式提供,具有可移植性和灵活性。
{"title":"Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment","authors":"TaeYoung Kim, Hyung-Jong Kim","doi":"10.1109/ICSSA51305.2020.00016","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00016","url":null,"abstract":"This study presents a performance evaluation system that helps Blockchain-based service planners make decisions. This system is offered as Docker and Kubernetes for portability and flexibility.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123219463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compiling and Analyzing Open Source Malware for Research Purposes 编译和分析开源恶意软件的研究目的
Pub Date : 2020-10-01 DOI: 10.1109/ICSSA51305.2020.00013
Daniel Judt, Patrick Kochberger, Peter Kieseberg, S. Schrittwieser
Malware obfuscation can make both automatic and manual analysis of its binary code and the contained functionality significantly more time consuming. For malware research it would therefore be useful to be able to study the effects of different obfuscation methods on the resulting binary code. While some obfuscations are applied through rewriting of the binary, others have to be applied at source code level or during compile time. However, the source code of in-the-wild malware is often not available. For this paper, we collected the source code of eleven open source malware samples from the past 12 years and analyzed if they still compile on current systems. Furthermore, basic static analysis was performed to evaluate the usefulness of the resulting binaries for further malware obfuscation research. Our results indicate, that it is possible to compile available samples with moderate effort and the resulting binaries are very well suited for research purposes.
恶意软件混淆可以使其二进制代码和包含的功能的自动和手动分析更加耗时。因此,对于恶意软件的研究,能够研究不同的混淆方法对产生的二进制代码的影响将是有用的。虽然有些混淆是通过重写二进制文件来应用的,但其他混淆必须在源代码级别或在编译期间应用。然而,野外恶意软件的源代码通常是不可用的。在本文中,我们收集了过去12年中11个开源恶意软件样本的源代码,并分析了它们是否仍然可以在当前系统上编译。此外,进行了基本的静态分析,以评估产生的二进制文件对进一步恶意软件混淆研究的有用性。我们的结果表明,用适度的努力编译可用的样本是可能的,并且得到的二进制文件非常适合研究目的。
{"title":"Compiling and Analyzing Open Source Malware for Research Purposes","authors":"Daniel Judt, Patrick Kochberger, Peter Kieseberg, S. Schrittwieser","doi":"10.1109/ICSSA51305.2020.00013","DOIUrl":"https://doi.org/10.1109/ICSSA51305.2020.00013","url":null,"abstract":"Malware obfuscation can make both automatic and manual analysis of its binary code and the contained functionality significantly more time consuming. For malware research it would therefore be useful to be able to study the effects of different obfuscation methods on the resulting binary code. While some obfuscations are applied through rewriting of the binary, others have to be applied at source code level or during compile time. However, the source code of in-the-wild malware is often not available. For this paper, we collected the source code of eleven open source malware samples from the past 12 years and analyzed if they still compile on current systems. Furthermore, basic static analysis was performed to evaluate the usefulness of the resulting binaries for further malware obfuscation research. Our results indicate, that it is possible to compile available samples with moderate effort and the resulting binaries are very well suited for research purposes.","PeriodicalId":346706,"journal":{"name":"2020 International Conference on Software Security and Assurance (ICSSA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126342101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Software Security and Assurance (ICSSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1