首页 > 最新文献

2020 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures 打击药品包装假冒:凹版印刷机与气缸签名
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360883
Iuliia Tkachenko, A. Trémeau, T. Fournel
The number of medicine counterfeits increases significantly. This problem affects not only expensive medicines, but also some low cost ones. In this paper, we study the characteristics of medicine packages printed using rotogravure printing on blister foils and propose an authentication system that identifies the equipment used for printing medicine foils. The rotogravure printing process uses an engraved cylinder and a rotogravure press. Each of these elements has its own signature that can be used for process identification and for packaging authentication. Using constructed database, we show that the signature of engraved cylinder impacts more on printed patterns in comparison with the signature of rotogravure press. The experiments done show that we can identify the cylinder used for the printing using a classical machine learning methods from a small number of training samples.
药品假药数量明显增加。这个问题不仅影响昂贵的药物,也影响一些低成本的药物。本文研究了吸塑箔上凹版印刷药品包装的特点,并提出了一种用于药品箔印刷设备的认证系统。凹版印刷过程使用凹版滚筒和凹版印刷机。每个元素都有自己的签名,可用于流程标识和包装身份验证。利用构建的数据库,我们发现与凹印机的特征相比,雕刻圆柱的特征对印刷图案的影响更大。实验表明,我们可以使用经典的机器学习方法从少量的训练样本中识别出用于打印的圆柱体。
{"title":"Fighting against medicine packaging counterfeits: rotogravure press vs cylinder signatures","authors":"Iuliia Tkachenko, A. Trémeau, T. Fournel","doi":"10.1109/WIFS49906.2020.9360883","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360883","url":null,"abstract":"The number of medicine counterfeits increases significantly. This problem affects not only expensive medicines, but also some low cost ones. In this paper, we study the characteristics of medicine packages printed using rotogravure printing on blister foils and propose an authentication system that identifies the equipment used for printing medicine foils. The rotogravure printing process uses an engraved cylinder and a rotogravure press. Each of these elements has its own signature that can be used for process identification and for packaging authentication. Using constructed database, we show that the signature of engraved cylinder impacts more on printed patterns in comparison with the signature of rotogravure press. The experiments done show that we can identify the cylinder used for the printing using a classical machine learning methods from a small number of training samples.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RF Waveform Synthesis Guided by Deep Reinforcement Learning 基于深度强化学习的射频波形合成
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360894
T. S. Brandes, Scott Kuzdeba, J. McClelland, N. Bomberger, Andrew Radlbeck
In this work, we demonstrate a system that enhances radio frequency (RF) fingerprints of individual transmitters via waveform modification to uniquely identify them amidst an ensemble of identical transmitters. This has the potential to enable secure identification, even in the presence of stolen and retransmitted unique device identifiers that are present in the transmitted waveforms, and ensures robust communications. This approach also lends itself to steganography as the waveform modifications can themselves encode information. Our system uses Bayesian program learning to learn specific characteristics of a set of emitters, and integrates the learned programs into a reinforcement learning architecture to build a policy for actions applied to the digital waveform before transmission. This allows the system to learn how to modify waveforms that leverage and emphasize inherent differences within RF front-ends to enhance their distinct characteristics while maintaining robust communications. In this ongoing research, we demonstrate our system in a small population, and provide a road map to expand it to larger populations that are expected in today’s interconnected spaces.
在这项工作中,我们展示了一个系统,该系统通过波形修改来增强单个发射机的射频(RF)指纹,以便在一组相同的发射机中唯一地识别它们。即使在传输波形中存在被盗和重传的唯一设备标识符的情况下,这也有可能实现安全识别,并确保可靠的通信。这种方法也适用于隐写术,因为波形修改本身可以编码信息。我们的系统使用贝叶斯程序学习来学习一组发射器的特定特征,并将学习到的程序集成到强化学习架构中,以建立在传输前应用于数字波形的动作策略。这使系统能够学习如何修改利用和强调RF前端固有差异的波形,以增强其独特特性,同时保持稳健的通信。在这项正在进行的研究中,我们在一个小群体中展示了我们的系统,并提供了一个路线图,将其扩展到今天互联空间中预期的更大群体。
{"title":"RF Waveform Synthesis Guided by Deep Reinforcement Learning","authors":"T. S. Brandes, Scott Kuzdeba, J. McClelland, N. Bomberger, Andrew Radlbeck","doi":"10.1109/WIFS49906.2020.9360894","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360894","url":null,"abstract":"In this work, we demonstrate a system that enhances radio frequency (RF) fingerprints of individual transmitters via waveform modification to uniquely identify them amidst an ensemble of identical transmitters. This has the potential to enable secure identification, even in the presence of stolen and retransmitted unique device identifiers that are present in the transmitted waveforms, and ensures robust communications. This approach also lends itself to steganography as the waveform modifications can themselves encode information. Our system uses Bayesian program learning to learn specific characteristics of a set of emitters, and integrates the learned programs into a reinforcement learning architecture to build a policy for actions applied to the digital waveform before transmission. This allows the system to learn how to modify waveforms that leverage and emphasize inherent differences within RF front-ends to enhance their distinct characteristics while maintaining robust communications. In this ongoing research, we demonstrate our system in a small population, and provide a road map to expand it to larger populations that are expected in today’s interconnected spaces.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AmpleDroid Recovering Large Object Files from Android Application Memory AmpleDroid从Android应用程序内存中恢复大对象文件
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360906
Sneha Sudhakaran, Aisha I. Ali-Gombe, A. Orgah, Andrew Case, G. Richard
Analysis of app-specific behavior has become an increasingly important capability in the fields of digital forensics and incident response. The ability to determine the precise actions performed by a user, such as URLs visited, files downloaded, messages sent and received, images and video viewed, and personal files accessed can be the difference between a successful analysis and one that fails to meet its goals. Unfortunately, proper analysis of volatile app-specific evidence, especially the recovery of large objects such as multimedia and large text files stored in memory has not been explored. This is mainly because the allocation function in the various Android memory management algorithms handles large objects differently and in separate memory regions than small objects. Thus, in this paper our effort is focused on developing an app-agnostic memory analysis tool capable of recovering and reconstructing large objects from process memory captures. We present AmpleDroid, a tool that identifies and extracts large objects loaded in an application memory space. Our methodology involves the inspection of the process image to identify vital Android runtime data structures utilized during large object allocation. AmpleDroid is evaluated on a number of apps and the results shows the recovery of almost 91% of the allocated large objects from process memory
在数字取证和事件响应领域,对应用程序特定行为的分析已经成为一项越来越重要的能力。确定用户执行的精确操作的能力,例如访问的url、下载的文件、发送和接收的消息、查看的图像和视频以及访问的个人文件,可能是成功分析与无法实现其目标之间的差异。不幸的是,对易失性应用程序特定证据的适当分析,特别是对存储在内存中的多媒体和大型文本文件等大型对象的恢复,尚未进行探索。这主要是因为各种Android内存管理算法中的分配函数处理大对象的方式不同,并且在单独的内存区域中处理小对象。因此,在本文中,我们的工作重点是开发一种与应用程序无关的内存分析工具,该工具能够从进程内存捕获中恢复和重建大型对象。我们介绍了AmpleDroid,一个识别和提取加载在应用程序内存空间中的大型对象的工具。我们的方法包括检查进程映像,以识别在大型对象分配期间使用的重要Android运行时数据结构。AmpleDroid在许多应用程序上进行了评估,结果显示从进程内存中恢复了几乎91%的已分配大对象
{"title":"AmpleDroid Recovering Large Object Files from Android Application Memory","authors":"Sneha Sudhakaran, Aisha I. Ali-Gombe, A. Orgah, Andrew Case, G. Richard","doi":"10.1109/WIFS49906.2020.9360906","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360906","url":null,"abstract":"Analysis of app-specific behavior has become an increasingly important capability in the fields of digital forensics and incident response. The ability to determine the precise actions performed by a user, such as URLs visited, files downloaded, messages sent and received, images and video viewed, and personal files accessed can be the difference between a successful analysis and one that fails to meet its goals. Unfortunately, proper analysis of volatile app-specific evidence, especially the recovery of large objects such as multimedia and large text files stored in memory has not been explored. This is mainly because the allocation function in the various Android memory management algorithms handles large objects differently and in separate memory regions than small objects. Thus, in this paper our effort is focused on developing an app-agnostic memory analysis tool capable of recovering and reconstructing large objects from process memory captures. We present AmpleDroid, a tool that identifies and extracts large objects loaded in an application memory space. Our methodology involves the inspection of the process image to identify vital Android runtime data structures utilized during large object allocation. AmpleDroid is evaluated on a number of apps and the results shows the recovery of almost 91% of the allocated large objects from process memory","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115295268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris 基于虹膜清晰度损失指标的高效超分辨率单幅图像网络
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360886
Juan E. Tapia, M. Gomez-Barrero, C. Busch
Most of the state of the art super-resolution methods use deep networks with large filter sizes. Therefore, they need to train and store a correspondingly large number of parameters, thereby making their use difficult for mobile devices applications such as recognition of individuals from selfie images. To achieve an efficient super-resolution method, we propose an Efficient Single Image Super-Resolution (ESISR) algorithm, which takes into account a trade-off among the efficiency of the deep neural network, the size of the filters, and the sharpness of the images. To that end, the method implements a novel loss function based on the Sharpness metric. This metric turns out to be more suitable for recovering the quality of the eye images. Our method drastically reduces the number of parameters when compared with Deep CNNs with Skip Connection and Network (DCSCN): from 1,754,942 to 27,209 parameters when the image size is increased by a factor of 2 (x2), from 2,170,142 to 28,654 parameters when increased by 3 (x3), and from 2,087,102 to 64,201 parameters when increased by 4 (x4). Furthermore, the proposed method maintains the sharpness quality of the images.
大多数最先进的超分辨率方法都使用具有大滤波器尺寸的深度网络。因此,它们需要训练和存储相应的大量参数,从而使它们难以用于移动设备应用,例如从自拍图像中识别个人。为了实现高效的超分辨率方法,我们提出了一种高效的单图像超分辨率(ESISR)算法,该算法考虑了深度神经网络的效率、滤波器的大小和图像的清晰度之间的权衡。为此,该方法实现了一种基于锐度度量的损失函数。结果表明,该指标更适合于人眼图像质量的恢复。与具有跳过连接和网络(DCSCN)的深度cnn相比,我们的方法大大减少了参数的数量:当图像大小增加2倍(x2)时,参数从1,754,942减少到27,209,当图像大小增加3倍(x3)时,参数从2,170,142减少到28,654,当图像大小增加4倍(x4)时,参数从2,087,102减少到64,201。此外,该方法还能保持图像的清晰度。
{"title":"An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris","authors":"Juan E. Tapia, M. Gomez-Barrero, C. Busch","doi":"10.1109/WIFS49906.2020.9360886","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360886","url":null,"abstract":"Most of the state of the art super-resolution methods use deep networks with large filter sizes. Therefore, they need to train and store a correspondingly large number of parameters, thereby making their use difficult for mobile devices applications such as recognition of individuals from selfie images. To achieve an efficient super-resolution method, we propose an Efficient Single Image Super-Resolution (ESISR) algorithm, which takes into account a trade-off among the efficiency of the deep neural network, the size of the filters, and the sharpness of the images. To that end, the method implements a novel loss function based on the Sharpness metric. This metric turns out to be more suitable for recovering the quality of the eye images. Our method drastically reduces the number of parameters when compared with Deep CNNs with Skip Connection and Network (DCSCN): from 1,754,942 to 27,209 parameters when the image size is increased by a factor of 2 (x2), from 2,170,142 to 28,654 parameters when increased by 3 (x3), and from 2,087,102 to 64,201 parameters when increased by 4 (x4). Furthermore, the proposed method maintains the sharpness quality of the images.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127779218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ImageNet Pre-trained CNNs for JPEG Steganalysis ImageNet预训练cnn用于JPEG隐写分析
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360897
Yassine Yousfi, Jan Butora, Eugene Khvedchenya, J. Fridrich
In this paper, we investigate pre-trained computer-vision deep architectures, such as the EfficientNet, MixNet, and ResNet for steganalysis. These models pre-trained on ImageNet can be rather quickly refined for JPEG steganalysis while offering significantly better performance than CNNs designed purposely for steganalysis, such as the SRNet, trained from scratch. We show how different architectures compare on the ALASKA II dataset. We demonstrate that avoiding pooling/stride in the first layers enables better performance, as noticed by other top competitors, which aligns with the design choices of many CNNs designed for steganalysis. We also show how pre-trained computer-vision deep architectures perform on the ALASKA I dataset.
在本文中,我们研究了预训练的计算机视觉深度架构,如用于隐写分析的EfficientNet、MixNet和ResNet。这些在ImageNet上预先训练的模型可以相当快地为JPEG隐写分析进行改进,同时提供比专门为隐写分析设计的cnn(例如从头开始训练的SRNet)更好的性能。我们将展示不同的架构如何在ALASKA II数据集上进行比较。正如其他顶级竞争对手所注意到的那样,我们证明在第一层避免池化/跨步可以获得更好的性能,这与许多为隐写分析而设计的cnn的设计选择一致。我们还展示了预训练的计算机视觉深度架构如何在ALASKA I数据集上执行。
{"title":"ImageNet Pre-trained CNNs for JPEG Steganalysis","authors":"Yassine Yousfi, Jan Butora, Eugene Khvedchenya, J. Fridrich","doi":"10.1109/WIFS49906.2020.9360897","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360897","url":null,"abstract":"In this paper, we investigate pre-trained computer-vision deep architectures, such as the EfficientNet, MixNet, and ResNet for steganalysis. These models pre-trained on ImageNet can be rather quickly refined for JPEG steganalysis while offering significantly better performance than CNNs designed purposely for steganalysis, such as the SRNet, trained from scratch. We show how different architectures compare on the ALASKA II dataset. We demonstrate that avoiding pooling/stride in the first layers enables better performance, as noticed by other top competitors, which aligns with the design choices of many CNNs designed for steganalysis. We also show how pre-trained computer-vision deep architectures perform on the ALASKA I dataset.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"SE-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Fuzzing Framework for ESP32 Microcontrollers ESP32微控制器模糊测试框架
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360889
Matthias Börsig, Sven Nitzsche, Max Eisele, Roland Gröll, J. Becker, I. Baumgart
With the increasing popularity of the Internet of Things (IoT), security issues in this domain have become a major concern in recent years. In favor of a fast time to market and low cost, security is often neglected during IoT development and little effort has been spent to enhance security tools to support the most common IoT architectures. Therefore, this work investigates fuzzing, an emerging security analysis technique, on the popular ESP32 IoT architecture. Instead of performing fuzzing directly on the target IoT system, we propose a full-system emulator that runs ESP32 firmware images and is able to perform fuzzing several orders of magnitude faster than the actual system. Using this emulator, we were able to fuzz a commercial IoT device with more than 300 requests per second and identify a bug in it within a few minutes. The developed framework can not only be used for discovering security issues in released products, but also for automated fuzzing tests during development.
随着物联网(IoT)的日益普及,该领域的安全问题近年来已成为人们关注的主要问题。为了加快上市时间和降低成本,在物联网开发过程中,安全性往往被忽视,并且很少花精力来增强安全工具以支持最常见的物联网架构。因此,这项工作研究了流行的ESP32物联网架构上的模糊分析,这是一种新兴的安全分析技术。我们不是直接在目标物联网系统上执行模糊测试,而是提出了一个运行ESP32固件映像的全系统模拟器,并且能够比实际系统快几个数量级地执行模糊测试。使用这个模拟器,我们能够模糊一个每秒超过300个请求的商业物联网设备,并在几分钟内识别出其中的错误。开发的框架不仅可以用于发现已发布产品中的安全问题,还可以用于开发过程中的自动化模糊测试。
{"title":"Fuzzing Framework for ESP32 Microcontrollers","authors":"Matthias Börsig, Sven Nitzsche, Max Eisele, Roland Gröll, J. Becker, I. Baumgart","doi":"10.1109/WIFS49906.2020.9360889","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360889","url":null,"abstract":"With the increasing popularity of the Internet of Things (IoT), security issues in this domain have become a major concern in recent years. In favor of a fast time to market and low cost, security is often neglected during IoT development and little effort has been spent to enhance security tools to support the most common IoT architectures. Therefore, this work investigates fuzzing, an emerging security analysis technique, on the popular ESP32 IoT architecture. Instead of performing fuzzing directly on the target IoT system, we propose a full-system emulator that runs ESP32 firmware images and is able to perform fuzzing several orders of magnitude faster than the actual system. Using this emulator, we were able to fuzz a commercial IoT device with more than 300 requests per second and identify a bug in it within a few minutes. The developed framework can not only be used for discovering security issues in released products, but also for automated fuzzing tests during development.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124793839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis 基于不同域cnn的ALASKA2图像隐写集成模型
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360892
Kaizaburo Chubachi
We present our third place solution for the ALASKA2 Image Steganalysis competition. We develop detectors using convolutional neural networks (CNNs) on both the spatial domain and the frequency domain of the discrete cosine transform used in JPEG compression. Our CNN detectors use state-of-the-art architectures in image classification tasks. We adjust the architecture to better capture the features of steganography methods in the frequency domain. We build an ensemble model of these CNNs, in which both spatial and frequency domain models contribute to performance. In this paper, we describe those models in detail and explain how the techniques used in them improve accuracy through experiments.
我们为ALASKA2图像隐写分析比赛提出了第三名的解决方案。我们在JPEG压缩中使用的离散余弦变换的空间域和频域上使用卷积神经网络(cnn)开发检测器。我们的CNN检测器在图像分类任务中使用最先进的架构。我们调整了结构,以便更好地捕捉隐写方法在频域的特征。我们建立了这些cnn的集成模型,其中空间和频域模型都有助于性能。在本文中,我们详细描述了这些模型,并通过实验说明了这些模型中使用的技术是如何提高精度的。
{"title":"An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis","authors":"Kaizaburo Chubachi","doi":"10.1109/WIFS49906.2020.9360892","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360892","url":null,"abstract":"We present our third place solution for the ALASKA2 Image Steganalysis competition. We develop detectors using convolutional neural networks (CNNs) on both the spatial domain and the frequency domain of the discrete cosine transform used in JPEG compression. Our CNN detectors use state-of-the-art architectures in image classification tasks. We adjust the architecture to better capture the features of steganography methods in the frequency domain. We build an ensemble model of these CNNs, in which both spatial and frequency domain models contribute to performance. In this paper, we describe those models in detail and explain how the techniques used in them improve accuracy through experiments.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133330105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space 加密HTTP/2流量监控:经得起时间和空间的考验
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360895
Pierre-Olivier Brissaud, J. François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan
Encrypted HTTP/2 (h2) has been worldwide adopted since its official release in 2015. The major services over Internet use it to protect the user privacy against traffic interception. However, under the guise of privacy, one can hide the abnormal or even illegal use of a service. It has been demonstrated that machine learning algorithms combined with a proper set of features are still able to identify the incriminated traffic even when it is encrypted with h2. However, it can also be used to track normal service use and so endanger privacy of Internet users. Independently of the final objective, it is extremely important for a security practitioner to understand the efficiency of such a technique and its limit. No existing research has been achieved to assess how generic is it to be directly applicable to any service or website and how long an acceptable accuracy can be maintained.This paper addresses these challenges by defining an experimental methodology applied on more than 3000 different websites and also over four months continuously. The results highlight that an off-the-shelf machine-learning method to classify h2 traffic is applicable to many websites but a weekly training may be needed to keep the model accurate.
加密HTTP/2 (h2)自2015年正式发布以来,已在全球范围内采用。互联网上的主要业务都使用它来保护用户隐私,防止流量被截获。然而,在隐私的幌子下,人们可以隐藏对服务的异常甚至非法使用。已经证明,机器学习算法与一组适当的功能相结合,即使使用h2加密,仍然能够识别受犯罪的流量。但是,它也可以用来跟踪正常的服务使用,从而危及互联网用户的隐私。独立于最终目标之外,对于安全从业者来说,了解这种技术的效率及其局限性是极其重要的。目前还没有研究来评估它直接适用于任何服务或网站的通用程度,以及可接受的准确性可以维持多久。本文通过定义一种实验方法来解决这些挑战,该方法在3000多个不同的网站上连续应用了四个多月。结果表明,一种现成的机器学习方法对h2流量进行分类,适用于许多网站,但可能需要每周进行一次培训,以保持模型的准确性。
{"title":"Encrypted HTTP/2 Traffic Monitoring: Standing the Test of Time and Space","authors":"Pierre-Olivier Brissaud, J. François, Isabelle Chrisment, Thibault Cholez, Olivier Bettan","doi":"10.1109/WIFS49906.2020.9360895","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360895","url":null,"abstract":"Encrypted HTTP/2 (h2) has been worldwide adopted since its official release in 2015. The major services over Internet use it to protect the user privacy against traffic interception. However, under the guise of privacy, one can hide the abnormal or even illegal use of a service. It has been demonstrated that machine learning algorithms combined with a proper set of features are still able to identify the incriminated traffic even when it is encrypted with h2. However, it can also be used to track normal service use and so endanger privacy of Internet users. Independently of the final objective, it is extremely important for a security practitioner to understand the efficiency of such a technique and its limit. No existing research has been achieved to assess how generic is it to be directly applicable to any service or website and how long an acceptable accuracy can be maintained.This paper addresses these challenges by defining an experimental methodology applied on more than 3000 different websites and also over four months continuously. The results highlight that an off-the-shelf machine-learning method to classify h2 traffic is applicable to many websites but a weekly training may be needed to keep the model accurate.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game 非零和随机窃听干扰对策的前景理论推广
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360898
A. Garnaev, W. Trappe, N. Mandayam, H. Poor
Wireless networks are susceptible to malicious attacks, especially those involving jamming and eavesdropping. In this paper, we consider a sophisticated adversary with the dual capability of either eavesdropping passively or jamming any ongoing transmission. We investigate a new aspect to consider when designing an anti-adversary strategy to maintain secure and reliable communication: how subjective behavior can impact multi-time slotted communication in the presence of such a sophisticated adversary. To model this scenario we develop a Prospect Theory (PT) extension of a non-zero-sum stochastic game, and derive its PT-equilibrium in closed form for any probability weighting functions. Uniqueness of the PT-equilibrium is proven. Our theoretical results, also supported by simulations, suggest that the anti-adversary strategy is more sensitive to varying network parameters and subjective factors when compared to the adversary’s strategy.
无线网络容易受到恶意攻击,尤其是那些涉及干扰和窃听的攻击。在本文中,我们考虑了一个具有被动窃听或干扰任何正在进行的传输的双重能力的复杂对手。我们研究了在设计反对手策略以保持安全可靠通信时要考虑的一个新方面:在如此复杂的对手存在的情况下,主观行为如何影响多时间槽通信。为了模拟这种情况,我们开发了一个非零和随机博弈的前景理论(PT)扩展,并推导了任何概率加权函数的封闭形式的PT均衡。证明了pt平衡的唯一性。我们的理论结果也得到了仿真的支持,表明与对手的策略相比,反对手策略对网络参数和主观因素的变化更为敏感。
{"title":"A Prospect Theoretic Extension of a Non-Zero-Sum Stochastic Eavesdropping and Jamming Game","authors":"A. Garnaev, W. Trappe, N. Mandayam, H. Poor","doi":"10.1109/WIFS49906.2020.9360898","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360898","url":null,"abstract":"Wireless networks are susceptible to malicious attacks, especially those involving jamming and eavesdropping. In this paper, we consider a sophisticated adversary with the dual capability of either eavesdropping passively or jamming any ongoing transmission. We investigate a new aspect to consider when designing an anti-adversary strategy to maintain secure and reliable communication: how subjective behavior can impact multi-time slotted communication in the presence of such a sophisticated adversary. To model this scenario we develop a Prospect Theory (PT) extension of a non-zero-sum stochastic game, and derive its PT-equilibrium in closed form for any probability weighting functions. Uniqueness of the PT-equilibrium is proven. Our theoretical results, also supported by simulations, suggest that the anti-adversary strategy is more sensitive to varying network parameters and subjective factors when compared to the adversary’s strategy.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127353543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection 虹膜生物识别模板保护的后量子安全两方计算
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360881
Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch
Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.
考虑到生物识别数据的保护,未来使用量子计算机的攻击需要生物识别验证系统的足够抵抗。这类系统通常是长期部署的,由于它们所包含的数据的敏感性和持久性,应该得到强有力的保护。为了实现高效的模板保护,我们将后量子安全两方计算与秘密共享相结合,应用了第一个实际实现的后量子安全两方计算协议来保护生物特征模板。该系统确保了模板在加密域中存储和比较时对生物特征数据的永久保护。对于验证,我们提出了两种可以作为实时交易实现的选项:一个成熟的经典两方计算方案或该方案的最近后量子升级。这两种方法都保持了完全的生物识别性能。参考模板数据库是生物识别系统中攻击的目标,在这两种验证方案中都保持了后量子安全性。关于我们提出的系统的计算效率,我们提供了实时计算事务时间,使我们的解决方案与实际应用相关。
{"title":"Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection","authors":"Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch","doi":"10.1109/WIFS49906.2020.9360881","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360881","url":null,"abstract":"Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1