首页 > 最新文献

2020 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
The Suitability of RSA for Bulk Data Encryption RSA在批量数据加密中的适用性
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360899
Pranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt, R. Enbody
Symmetric ciphers are more efficient for bulk encryption than asymmetric ciphers, however there is a lack of published studies providing relevant metrics pertaining to bulk encryption with RSA in modern computing environments. As key escrow systems proposed against ransomware provide alternative routes for data restoration, ransomware developers will seek to deploy resistant cryptosystems. In this study, we examine the use of a popular asymmetric cipher (RSA) for bulk encryption. We provide metrics for both encryption time and ciphertext expansion while examining the impact of different encryption parameters such as key size and block size. In addition, we consider supplementing encryption with compression to combat both ciphertext expansion and encryption time. Our goal is to highlight the need for solutions against the ransomware that use externally generated asymmetric key pairs for bulk encryption.
对称密码比非对称密码更有效地进行批量加密,然而,在现代计算环境中,缺乏公开的研究提供与RSA批量加密相关的指标。由于针对勒索软件提出的密钥托管系统为数据恢复提供了替代途径,勒索软件开发人员将寻求部署抗加密系统。在这项研究中,我们研究了一种流行的非对称密码(RSA)用于批量加密。我们提供了加密时间和密文扩展的指标,同时检查了不同加密参数(如密钥大小和块大小)的影响。此外,我们考虑用压缩来补充加密,以对抗密文扩展和加密时间。我们的目标是强调针对使用外部生成的非对称密钥对进行批量加密的勒索软件的解决方案的必要性。
{"title":"The Suitability of RSA for Bulk Data Encryption","authors":"Pranshu Bajpai, Cody Carter, Daria Tarasova, David Ackley, Ian Masterson, Jamie Schmidt, R. Enbody","doi":"10.1109/WIFS49906.2020.9360899","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360899","url":null,"abstract":"Symmetric ciphers are more efficient for bulk encryption than asymmetric ciphers, however there is a lack of published studies providing relevant metrics pertaining to bulk encryption with RSA in modern computing environments. As key escrow systems proposed against ransomware provide alternative routes for data restoration, ransomware developers will seek to deploy resistant cryptosystems. In this study, we examine the use of a popular asymmetric cipher (RSA) for bulk encryption. We provide metrics for both encryption time and ciphertext expansion while examining the impact of different encryption parameters such as key size and block size. In addition, we consider supplementing encryption with compression to combat both ciphertext expansion and encryption time. Our goal is to highlight the need for solutions against the ransomware that use externally generated asymmetric key pairs for bulk encryption.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115528011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography 同步最小化统计可检测的侧面通知JPEG隐写
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360884
Quentin Giboulot, P. Bas, R. Cogranne
Current schemes in steganography relying on synchronization are all based on a general heuristic to take into account interactions between embedding changes. However these approaches, while often competitive, lack a clear model for the relationship between pixels/DCT coefficient and the distortion function, and, as such, do not give any guarantees in terms of detectabilty. To solve this problem, we herein propose a synchronized side-informed scheme in the JPEG domain based on minimizing statistical detectability which achieves state-of-the- art performances. This is done by exploiting a statistical model that takes into account correlations between DCT coefficients and adding an optimal steganographic-signal with covariance which is a scaled version of the cover noise covariance. This method allows a clear understanding of the reasons why, depending on the processing pipeline, synchronization using both intra and inter-block dependencies allows such gains in performance.
当前依赖于同步的隐写术方案都是基于一个通用的启发式来考虑嵌入变化之间的相互作用。然而,这些方法虽然经常具有竞争性,但缺乏像素/DCT系数与失真函数之间关系的清晰模型,因此,在可检测性方面不能提供任何保证。为了解决这一问题,本文提出了一种基于最小化统计可检测性的JPEG域同步侧通知方案,该方案达到了最先进的性能。这是通过利用一个统计模型来实现的,该模型考虑了DCT系数之间的相关性,并添加了一个带有协方差的最佳隐写信号,协方差是覆盖噪声协方差的缩放版本。这种方法可以让我们清楚地理解,根据处理管道的不同,使用块内和块间依赖项的同步可以提高性能的原因。
{"title":"Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography","authors":"Quentin Giboulot, P. Bas, R. Cogranne","doi":"10.1109/WIFS49906.2020.9360884","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360884","url":null,"abstract":"Current schemes in steganography relying on synchronization are all based on a general heuristic to take into account interactions between embedding changes. However these approaches, while often competitive, lack a clear model for the relationship between pixels/DCT coefficient and the distortion function, and, as such, do not give any guarantees in terms of detectabilty. To solve this problem, we herein propose a synchronized side-informed scheme in the JPEG domain based on minimizing statistical detectability which achieves state-of-the- art performances. This is done by exploiting a statistical model that takes into account correlations between DCT coefficients and adding an optimal steganographic-signal with covariance which is a scaled version of the cover noise covariance. This method allows a clear understanding of the reasons why, depending on the processing pipeline, synchronization using both intra and inter-block dependencies allows such gains in performance.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images 阿拉斯加#2:具有挑战性的学术研究与现实图像的隐写分析
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360896
R. Cogranne, Quentin Giboulot, P. Bas
This paper briefly summarizes the ALASKA#2 steganalysis challenge which has been organized on the Kaggle machine learning competition platform. We especially focus on the context, the organization (rules, timeline, evaluation and material) as well as on the outcome (number of competitors, submission, findings, and final results). While both steganography and steganalysis were new to most of the competitors, they were able to leverage their skills in Deep Learning in order to design detection methods that perform significantly better than current art in steganalysis. Despite the fact that these solutions come at an important computational cost, they clearly indicate new directions to explore in steganalysis research.
本文简要总结了在Kaggle机器学习竞赛平台上组织的ALASKA#2隐写分析挑战赛。我们特别关注背景、组织(规则、时间线、评估和材料)以及结果(竞争者数量、提交、发现和最终结果)。虽然隐写术和隐写分析对大多数竞争对手来说都是新的,但他们能够利用他们在深度学习方面的技能来设计比当前隐写分析技术性能更好的检测方法。尽管这些解决方案的计算成本很高,但它们清楚地表明了隐写分析研究的新方向。
{"title":"ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images","authors":"R. Cogranne, Quentin Giboulot, P. Bas","doi":"10.1109/WIFS49906.2020.9360896","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360896","url":null,"abstract":"This paper briefly summarizes the ALASKA#2 steganalysis challenge which has been organized on the Kaggle machine learning competition platform. We especially focus on the context, the organization (rules, timeline, evaluation and material) as well as on the outcome (number of competitors, submission, findings, and final results). While both steganography and steganalysis were new to most of the competitors, they were able to leverage their skills in Deep Learning in order to design detection methods that perform significantly better than current art in steganalysis. Despite the fact that these solutions come at an important computational cost, they clearly indicate new directions to explore in steganalysis research.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"23 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Reliable JPEG Forensics via Model Uncertainty 通过模型不确定性可靠的JPEG取证
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360893
Benedikt Lorch, Anatol Maier, C. Riess
Many methods in image forensics are sensitive to varying amounts of JPEG compression. To mitigate this issue, it is either possible to a) build detectors that better generalize to unknown JPEG settings, or to b) train multiple detectors, where each is specialized to a narrow range of JPEG qualities. While the first approach is currently an open challenge, the second approach may silently fail, even for only slight mismatches in training and testing distributions. To alleviate this challenge, we propose a forensic detector that is able to express uncertainty in its predictions. This allows detecting test samples for which the training distribution is not representative. More specifically, we propose Bayesian logistic regression as an instance of an infinite ensemble of classifiers. The ensemble agrees in its predictions from test samples similar to the training data but its predictions diverge for unknown test samples. The applicability of the proposed method is evaluated on the task of detecting JPEG double compression. The detector achieves high performance on two goals simultaneously: It accurately detects double-JPEG compression, and it accurately indicates when the test data is not covered by the training data. We assert that the proposed method can assist a forensic analyst in assessing detector reliability and in anticipating failure cases for specific inputs.
图像取证中的许多方法对不同数量的JPEG压缩很敏感。为了缓解这个问题,可以a)构建更好地泛化到未知JPEG设置的检测器,或者b)训练多个检测器,其中每个检测器专门用于窄范围的JPEG质量。虽然第一种方法目前是一个公开的挑战,但第二种方法可能会无声地失败,即使在训练和测试分布中只有轻微的不匹配。为了缓解这一挑战,我们提出了一种能够在其预测中表达不确定性的法医检测器。这允许检测训练分布不具有代表性的测试样本。更具体地说,我们提出贝叶斯逻辑回归作为一个实例的无限集合的分类器。该集合从与训练数据相似的测试样本中做出的预测是一致的,但对于未知的测试样本,其预测会出现分歧。最后对该方法在JPEG双压缩检测任务中的适用性进行了评价。检测器同时在两个目标上实现了高性能:一是准确检测双jpeg压缩,二是准确指出测试数据何时未被训练数据覆盖。我们认为,所提出的方法可以帮助法医分析人员评估检测器的可靠性,并预测特定输入的故障情况。
{"title":"Reliable JPEG Forensics via Model Uncertainty","authors":"Benedikt Lorch, Anatol Maier, C. Riess","doi":"10.1109/WIFS49906.2020.9360893","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360893","url":null,"abstract":"Many methods in image forensics are sensitive to varying amounts of JPEG compression. To mitigate this issue, it is either possible to a) build detectors that better generalize to unknown JPEG settings, or to b) train multiple detectors, where each is specialized to a narrow range of JPEG qualities. While the first approach is currently an open challenge, the second approach may silently fail, even for only slight mismatches in training and testing distributions. To alleviate this challenge, we propose a forensic detector that is able to express uncertainty in its predictions. This allows detecting test samples for which the training distribution is not representative. More specifically, we propose Bayesian logistic regression as an instance of an infinite ensemble of classifiers. The ensemble agrees in its predictions from test samples similar to the training data but its predictions diverge for unknown test samples. The applicability of the proposed method is evaluated on the task of detecting JPEG double compression. The detector achieves high performance on two goals simultaneously: It accurately detects double-JPEG compression, and it accurately indicates when the test data is not covered by the training data. We assert that the proposed method can assist a forensic analyst in assessing detector reliability and in anticipating failure cases for specific inputs.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128082677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Speech Audio Splicing Detection and Localization Exploiting Reverberation Cues 利用混响线索的语音音频拼接检测和定位
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360900
Davide Capoferri, Clara Borrelli, Paolo Bestagini, F. Antonacci, A. Sarti, S. Tubaro
Manipulating speech audio recordings through splicing is a task within everyone’s reach. Indeed, it is very easy to collect through social media multiple audio recordings from well-known public figures (e.g., actors, politicians, etc.). These can be cut into smaller excerpts that can be concatenated in order to generate new audio content. As a fake speech from a famous person can be used for fake news spreading and negatively impact on the society, the ability of detecting whether a speech recording has been manipulated is a task of great interest in the forensics community. In this work, we focus on speech audio splicing detection and localization. We leverage the idea that distinct recordings may be acquired in different environments, which are typically characterized by distinctive reverberation cues. Exploiting this property, our method estimates inconsistencies in the reverberation time throughout a speech recording. If reverberation inconsistencies are detected, the audio track is tagged as manipulated and the splicing point time instant is estimated.
通过拼接来操纵语音录音是每个人都能完成的任务。事实上,通过社交媒体收集知名公众人物(如演员、政治家等)的多段录音是非常容易的。这些内容可以被切割成更小的片段,并将其连接起来以生成新的音频内容。名人的假演讲有可能被用来传播假新闻,给社会带来负面影响,因此,能否检测出录音是否被篡改,是法医学界非常关注的课题。在这项工作中,我们主要研究语音音频拼接的检测和定位。我们利用不同的录音可以在不同的环境中获得的想法,这些环境通常具有不同的混响线索。利用这一特性,我们的方法估计了整个语音录音中混响时间的不一致性。如果混响不一致被检测到,音轨被标记为操纵和拼接点时间瞬间估计。
{"title":"Speech Audio Splicing Detection and Localization Exploiting Reverberation Cues","authors":"Davide Capoferri, Clara Borrelli, Paolo Bestagini, F. Antonacci, A. Sarti, S. Tubaro","doi":"10.1109/WIFS49906.2020.9360900","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360900","url":null,"abstract":"Manipulating speech audio recordings through splicing is a task within everyone’s reach. Indeed, it is very easy to collect through social media multiple audio recordings from well-known public figures (e.g., actors, politicians, etc.). These can be cut into smaller excerpts that can be concatenated in order to generate new audio content. As a fake speech from a famous person can be used for fake news spreading and negatively impact on the society, the ability of detecting whether a speech recording has been manipulated is a task of great interest in the forensics community. In this work, we focus on speech audio splicing detection and localization. We leverage the idea that distinct recordings may be acquired in different environments, which are typically characterized by distinctive reverberation cues. Exploiting this property, our method estimates inconsistencies in the reverberation time throughout a speech recording. If reverberation inconsistencies are detected, the audio track is tagged as manipulated and the splicing point time instant is estimated.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction Landmark Breaker:通过干扰Landmark Extraction来阻碍DeepFake
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360910
Pu Sun, Yuezun Li, H. Qi, Siwei Lyu
The recent development of Deep Neural Networks (DNN) has significantly increased the realism of AI-synthesized faces, with the most notable examples being the DeepFakes. The DeepFake technology can synthesize a face of target subject from a face of another subject, while retains the same face attributes. With the rapidly increased social media portals (Facebook, Instagram, etc), these realistic fake faces rapidly spread though the Internet, causing a broad negative impact to the society. In this paper, we describe Landmark Breaker, the first dedicated method to disrupt facial landmark extraction, and apply it to the obstruction of the generation of DeepFake videos. Our motivation is that disrupting the facial landmark extraction can affect the alignment of input face so as to degrade the DeepFake quality. Our method is achieved using adversarial perturbations. Compared to the detection methods that only work after DeepFake generation, Landmark Breaker goes one step ahead to prevent DeepFake generation. The experiments are conducted on three state-of-the-art facial landmark extractors using the recent Celeb-DF dataset.
深度神经网络(DNN)的最新发展显著提高了人工智能合成人脸的真实感,其中最著名的例子是DeepFakes。DeepFake技术可以从另一个对象的面部合成目标对象的面部,同时保留相同的面部属性。随着社交媒体门户网站(Facebook, Instagram等)的迅速增加,这些逼真的假脸在互联网上迅速传播,对社会造成了广泛的负面影响。在本文中,我们描述了Landmark Breaker,这是第一个专门用于破坏面部地标提取的方法,并将其应用于DeepFake视频生成的阻碍。我们的动机是破坏人脸地标提取会影响输入人脸的对齐,从而降低DeepFake的质量。我们的方法是使用对抗性扰动实现的。与DeepFake生成后才起作用的检测方法相比,Landmark Breaker在防止DeepFake生成方面领先一步。实验采用最新的Celeb-DF数据集,在三个最先进的面部地标提取器上进行。
{"title":"Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction","authors":"Pu Sun, Yuezun Li, H. Qi, Siwei Lyu","doi":"10.1109/WIFS49906.2020.9360910","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360910","url":null,"abstract":"The recent development of Deep Neural Networks (DNN) has significantly increased the realism of AI-synthesized faces, with the most notable examples being the DeepFakes. The DeepFake technology can synthesize a face of target subject from a face of another subject, while retains the same face attributes. With the rapidly increased social media portals (Facebook, Instagram, etc), these realistic fake faces rapidly spread though the Internet, causing a broad negative impact to the society. In this paper, we describe Landmark Breaker, the first dedicated method to disrupt facial landmark extraction, and apply it to the obstruction of the generation of DeepFake videos. Our motivation is that disrupting the facial landmark extraction can affect the alignment of input face so as to degrade the DeepFake quality. Our method is achieved using adversarial perturbations. Compared to the detection methods that only work after DeepFake generation, Landmark Breaker goes one step ahead to prevent DeepFake generation. The experiments are conducted on three state-of-the-art facial landmark extractors using the recent Celeb-DF dataset.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121330821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Syndrome-Trellis Sampler for Generative Steganography 用于生成隐写术的综合征-栅格采样器
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360885
Tamio-Vesa Nakajima, Andrew D. Ker
We adapt the Syndrome-Trellis Code algorithm to generative steganography, giving a method for sampling from a specified distribution subject to linear constraints. This allows the use of syndrome codes, popular in cover-modification methods, for cover-generation steganography. The SyndromeTrellis Sampler works directly on independent and Markov-chain distributions, and can be plugged into an existing STC-based method to extend it to Gibbs fields that can be decomposed into conditionally-independent sublattices. We give some experiments to show that the method is correct, and to quantify how the payload condition forces the sampled distribution away from the target. The results show that the secrecy of the parity-check matrix of the syndrome code is important. We also show how to exploit sparsity in the conditional cover distribution, in a simple example from linguistic steganography.
我们将综合征-栅格码算法应用于生成隐写,给出了一种在线性约束下从指定分布中采样的方法。这允许使用在封面修改方法中流行的综合征代码进行封面生成隐写。syndrome metrellis Sampler直接作用于独立和马尔可夫链分布,并且可以插入到现有的基于stc的方法中,将其扩展到可以分解为条件独立子格的Gibbs域。我们给出了一些实验来证明该方法是正确的,并量化了载荷条件如何迫使采样分布远离目标。结果表明,证码奇偶校验矩阵的保密性是很重要的。我们还展示了如何在条件覆盖分布中利用稀疏性,这是一个来自语言隐写的简单示例。
{"title":"The Syndrome-Trellis Sampler for Generative Steganography","authors":"Tamio-Vesa Nakajima, Andrew D. Ker","doi":"10.1109/WIFS49906.2020.9360885","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360885","url":null,"abstract":"We adapt the Syndrome-Trellis Code algorithm to generative steganography, giving a method for sampling from a specified distribution subject to linear constraints. This allows the use of syndrome codes, popular in cover-modification methods, for cover-generation steganography. The SyndromeTrellis Sampler works directly on independent and Markov-chain distributions, and can be plugged into an existing STC-based method to extend it to Gibbs fields that can be decomposed into conditionally-independent sublattices. We give some experiments to show that the method is correct, and to quantify how the payload condition forces the sampled distribution away from the target. The results show that the secrecy of the parity-check matrix of the syndrome code is important. We also show how to exploit sparsity in the conditional cover distribution, in a simple example from linguistic steganography.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125601690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks 基于强化的分而治之的侧信道攻击策略
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360908
Shan Jin, R. Bettati
Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.
以前的工作已经证明,功耗侧信道攻击,如模板攻击和随机模型,对小秘密有效,如8位或16位的秘密。然而,直接将这些侧信道攻击应用于具有大量秘密的系统,例如AES 128,在计算上是难以处理的。攻击者通常采用分而治之的策略对秘密进行分区,以便扩展到更大的比特数。对于AES,基于分而治之策略的侧信道攻击通常在AES加密的第一轮或最后一轮发起。在本文中,我们提出了一种高效实用的攻击策略,利用来自多轮的样本,与标准的分治策略相比,该策略显著提高了密钥恢复。
{"title":"Reinforcement-Based Divide-and-Conquer Strategy for Side-Channel Attacks","authors":"Shan Jin, R. Bettati","doi":"10.1109/WIFS49906.2020.9360908","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360908","url":null,"abstract":"Previous works have proven that power consumption side-channel attacks, such as the Template Attack and the Stochastic Model, are effective for small secrets, such as those with 8 or 16 bits. However, directly applying those side-channel attacks on systems with large secrets, for example AES 128, is computationally intractable. Attackers usually apply a divide-and-conquer strategy to partition the secret in order to scale to larger numbers of bits. In the case of AES, divide-and-conquer strategy based side-channel attacks are usually launched on either the first round or the last round of the AES encryption. In this paper, we propose an efficient and pragmatic attack strategy that exploits the samples from multiple rounds, which significantly improves the key recovery compared to standard divide-and-conquer strategies.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold audio secret sharing schemes encrypting audio secrets 阈值音频秘密共享方案对音频秘密进行加密
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360907
Tetsuro Ishizuka, Yodai Watanabe
Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. The aim of this paper is to extend the existing result of ASS schemes encrypting audio secrets to the general threshold case. For this purpose, the decryption function is extended from the sum of shares to the weighted sum of shares. Moreover, the notion of noise tolerance is introduced and used to generalize the existing formulation of ASS schemes. Based on this generalized formulation, a construction of ASS schemes encrypting audio secrets is provided and its security and noise tolerance are examined.
秘密共享是一种将秘密加密成称为共享的多个片段的方法,因此只有合格的共享集才能用于重建秘密。音频秘密共享(ASS)是秘密共享的一个例子,它的解密可以通过人的耳朵来完成。本文的目的是将现有的音频秘密加密方案的结果扩展到一般阈值情况。为此,将解密函数从股份的和扩展为股份的加权和。此外,还引入了噪声容忍的概念,并将其用于推广现有的ASS方案。在此基础上,提出了一种加密音频秘密的ASS方案结构,并对其安全性和噪声容忍度进行了检验。
{"title":"Threshold audio secret sharing schemes encrypting audio secrets","authors":"Tetsuro Ishizuka, Yodai Watanabe","doi":"10.1109/WIFS49906.2020.9360907","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360907","url":null,"abstract":"Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. The aim of this paper is to extend the existing result of ASS schemes encrypting audio secrets to the general threshold case. For this purpose, the decryption function is extended from the sum of shares to the weighted sum of shares. Moreover, the notion of noise tolerance is introduced and used to generalize the existing formulation of ASS schemes. Based on this generalized formulation, a construction of ASS schemes encrypting audio secrets is provided and its security and noise tolerance are examined.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic Fault Injection as a New Forensic Approach for SoCs 电磁故障注入作为一种新的soc取证方法
Pub Date : 2020-12-06 DOI: 10.1109/WIFS49906.2020.9360902
Clément Gaine, D. Aboulkassimi, S. Pontié, J. Nikolovski, J. Dutertre
Smartphones have a complex hardware and software architecture. Having access to their full memory space can help solve judicial investigations. We propose a new privilege escalation technique in order to access hidden contents and execute sensitive operations. While classical forensic tools mostly exploit software vulnerabilities, it is based on a hardware security evaluation technique. Electromagnetic fault injection is such a technique usually used for microcontrollers or FPGA security characterization. A security function running at 1.2GHz on a 64-bit SoC with a Linux-based OS was successfully attacked. The Linux authentication module uses this function to verify the password correctness by comparing two hash values. Hence, this work constitutes a step towards smartphones privilege escalation through electromagnetic fault injection. This approach is interesting for addressing forensic issues on smartphones.
智能手机拥有复杂的硬件和软件架构。访问他们的全部存储空间可以帮助解决司法调查。为了访问隐藏内容和执行敏感操作,我们提出了一种新的权限升级技术。虽然传统的取证工具主要利用软件漏洞,但它是基于硬件安全评估技术的。电磁故障注入是一种通常用于微控制器或FPGA安全表征的技术。事件解释在linux操作系统下,64位SoC上运行1.2GHz的安全功能被成功攻击。Linux认证模块使用该函数通过比较两个哈希值来验证密码的正确性。因此,这项工作构成了通过电磁故障注入实现智能手机特权升级的一步。这种方法对于解决智能手机上的法医问题很有趣。
{"title":"Electromagnetic Fault Injection as a New Forensic Approach for SoCs","authors":"Clément Gaine, D. Aboulkassimi, S. Pontié, J. Nikolovski, J. Dutertre","doi":"10.1109/WIFS49906.2020.9360902","DOIUrl":"https://doi.org/10.1109/WIFS49906.2020.9360902","url":null,"abstract":"Smartphones have a complex hardware and software architecture. Having access to their full memory space can help solve judicial investigations. We propose a new privilege escalation technique in order to access hidden contents and execute sensitive operations. While classical forensic tools mostly exploit software vulnerabilities, it is based on a hardware security evaluation technique. Electromagnetic fault injection is such a technique usually used for microcontrollers or FPGA security characterization. A security function running at 1.2GHz on a 64-bit SoC with a Linux-based OS was successfully attacked. The Linux authentication module uses this function to verify the password correctness by comparing two hash values. Hence, this work constitutes a step towards smartphones privilege escalation through electromagnetic fault injection. This approach is interesting for addressing forensic issues on smartphones.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2020 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1