首页 > 最新文献

2022 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness 具有社会意识的随机无效设备场景下的设备到设备任务卸载
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888905
Mingchu Li, Linlin Yang, Kun Lu, S. B. H. Shah, Xiao Zheng
Direct communication with D2D (device-to-device) between resource devices can reduce the communication burden, and D2D resource devices closer to users have high computing power. Therefore, offloading tasks to D2D devices can calculate tasks faster and reduce delays to improve the user experience. Firstly, since D2D devices are usually held by users and there are certain social attributes between users, we consider the impact of social attributes on task offloading and resource allocation in the real offloading system and allocate the responsive computing resources according to the social attributes. Secondly, when D2D devices are vulnerable to attack, damage, and other uncertain factors, it will affect the strategy of task offloading. We introduce the offloading mechanism under the invalid scenario of random invalid probability to convert the uncertain offloading scenario into the offloading situation of multiple deterministic scenarios, so as to enhance the robustness of the whole offloading system. Finally, considering the conditions of social awareness, resource allocation, invalid scenario, and energy constraints, we express it as a nonlinear integer programming problem with a minimum expected time. We use the MLS(maximum-likelihood sampling) algorithm to estimate the sample space of the invalid scenarios and the meta heuristic Discrete Whale Optimization Algorithm (DWOA) to solve the optimization problem to obtain the offloading scheme and resource allocation strategy.
资源设备之间直接与D2D (device-to-device)通信可以减少通信负担,距离用户更近的D2D资源设备具有较高的计算能力。因此,将任务卸载到D2D设备可以更快地计算任务,减少延迟,从而改善用户体验。首先,由于D2D设备通常由用户持有,并且用户之间存在一定的社会属性,因此我们在真实的卸载系统中考虑社会属性对任务卸载和资源分配的影响,并根据社会属性来分配响应的计算资源。其次,当D2D设备容易受到攻击、损坏等不确定因素影响时,会影响任务卸载策略。引入随机无效概率无效情景下的卸载机制,将不确定的卸载情景转化为多确定性情景下的卸载情景,从而增强整个卸载系统的鲁棒性。最后,考虑到社会意识、资源分配、无效场景和能量约束等条件,将其表示为具有最小期望时间的非线性整数规划问题。采用最大似然抽样(MLS)算法估计无效场景的样本空间,采用元启发式离散鲸优化算法(DWOA)求解优化问题,得到卸载方案和资源分配策略。
{"title":"Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness","authors":"Mingchu Li, Linlin Yang, Kun Lu, S. B. H. Shah, Xiao Zheng","doi":"10.1109/DSC54232.2022.9888905","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888905","url":null,"abstract":"Direct communication with D2D (device-to-device) between resource devices can reduce the communication burden, and D2D resource devices closer to users have high computing power. Therefore, offloading tasks to D2D devices can calculate tasks faster and reduce delays to improve the user experience. Firstly, since D2D devices are usually held by users and there are certain social attributes between users, we consider the impact of social attributes on task offloading and resource allocation in the real offloading system and allocate the responsive computing resources according to the social attributes. Secondly, when D2D devices are vulnerable to attack, damage, and other uncertain factors, it will affect the strategy of task offloading. We introduce the offloading mechanism under the invalid scenario of random invalid probability to convert the uncertain offloading scenario into the offloading situation of multiple deterministic scenarios, so as to enhance the robustness of the whole offloading system. Finally, considering the conditions of social awareness, resource allocation, invalid scenario, and energy constraints, we express it as a nonlinear integer programming problem with a minimum expected time. We use the MLS(maximum-likelihood sampling) algorithm to estimate the sample space of the invalid scenarios and the meta heuristic Discrete Whale Optimization Algorithm (DWOA) to solve the optimization problem to obtain the offloading scheme and resource allocation strategy.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129021205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Botnet Detection Based on the Behaviors of DNS Queries 基于DNS查询行为的物联网僵尸网络检测
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888913
Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi
In recent years, the Botnet attacks towards the Internet of Things have been considered to be the attacks with the most extensive impact on internet infrastructure. Many well-known enterprises or organizations have become victims. The Internet of Things Botnet uses a large number of connected devices to attack a target. For example, infected devices can be used to perform DDoS attacks on certain (critical) network servers. Before the infected hosts receive any commands, they must obtain the IP address of the control and command server. Hence, there are lots of behaviors and information of IoT Botnet hiding in the DNS traffic. Considering that situation, we utilize features captured from the DNS queries to analyze whether IoT Botnet has infected a device or not. We found that the DNS queries of an infected device will be issued in a specific periodical time frequency. Based on the features, a novel IoT Bonet detection scheme is presented in the manuscript. As compared to other works, the proposed scheme significantly reduces the computation cost by applying Shannon's entropy and the variances among the DNS queries.
近年来,针对物联网的僵尸网络攻击被认为是对互联网基础设施影响最广泛的攻击。许多知名企业或组织已经成为受害者。物联网僵尸网络利用大量连接的设备对目标进行攻击。例如,受感染的设备可以对某些(关键)网络服务器进行DDoS攻击。被感染的主机在接收命令前,必须先获取控制和命令服务器的IP地址。因此,在DNS流量中隐藏着大量物联网僵尸网络的行为和信息。考虑到这种情况,我们利用从DNS查询中捕获的功能来分析物联网僵尸网络是否感染了设备。我们发现受感染设备的DNS查询会以特定的周期时间频率发出。基于这些特征,本文提出了一种新的物联网Bonet检测方案。该方案利用Shannon’s熵和DNS查询间的方差,大大降低了计算成本。
{"title":"IoT Botnet Detection Based on the Behaviors of DNS Queries","authors":"Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi","doi":"10.1109/DSC54232.2022.9888913","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888913","url":null,"abstract":"In recent years, the Botnet attacks towards the Internet of Things have been considered to be the attacks with the most extensive impact on internet infrastructure. Many well-known enterprises or organizations have become victims. The Internet of Things Botnet uses a large number of connected devices to attack a target. For example, infected devices can be used to perform DDoS attacks on certain (critical) network servers. Before the infected hosts receive any commands, they must obtain the IP address of the control and command server. Hence, there are lots of behaviors and information of IoT Botnet hiding in the DNS traffic. Considering that situation, we utilize features captured from the DNS queries to analyze whether IoT Botnet has infected a device or not. We found that the DNS queries of an infected device will be issued in a specific periodical time frequency. Based on the features, a novel IoT Bonet detection scheme is presented in the manuscript. As compared to other works, the proposed scheme significantly reduces the computation cost by applying Shannon's entropy and the variances among the DNS queries.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Engineering Process Framework for Cybersecurity Incident Response Assessment 网络安全事件响应评估的工程过程框架
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888795
Robert L. Freas, Heather F. Adair, Eman M. Hammad
Recent incidents and continuous cyber attacks highlight that most currently adopted cybersecurity solutions and processes remain highly reactive, with short-lived remedies. The critical need for more proactive and mature response processes has never been more critical. We look at engineering and borrow concepts from mature systematic processes such as the engineering design process to develop a new framework for activer cyber incident response processes. Currently, cybersecurity incident response structure and processes are outlined in multiple frameworks including the MITRE ATT&CK framework, NIST's Cybersecurity framework, and the traditional incident response (IR) lifecycle. Using a blend of those frameworks and the concepts from the engineering design process we propose O2I that is more adept to a more proactive and sustainable security response. With proper implementation, O2I's iterative processes could provide a sustainable and adaptable approach to assess and improve cyber security response processes. To validate the benefits and feasibility of the proposed framework, we utilize it to evaluate recent attacks using publicly available information.
最近的事件和持续的网络攻击表明,目前采用的大多数网络安全解决方案和流程仍然是高度被动的,只有短暂的补救措施。对更加主动和成熟的反应过程的迫切需要从未像现在这样迫切。我们着眼于工程,并从成熟的系统过程(如工程设计过程)中借用概念,为主动网络事件响应过程开发一个新的框架。目前,网络安全事件响应结构和流程概述在多个框架中,包括MITRE ATT&CK框架、NIST网络安全框架和传统事件响应(IR)生命周期。结合这些框架和工程设计过程中的概念,我们提出了更适合于更主动、更可持续的安全响应的O2I。通过适当的实施,O2I的迭代过程可以提供一种可持续的、适应性强的方法来评估和改进网络安全响应过程。为了验证所提议的框架的优点和可行性,我们利用它来评估最近使用公开可用信息的攻击。
{"title":"An Engineering Process Framework for Cybersecurity Incident Response Assessment","authors":"Robert L. Freas, Heather F. Adair, Eman M. Hammad","doi":"10.1109/DSC54232.2022.9888795","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888795","url":null,"abstract":"Recent incidents and continuous cyber attacks highlight that most currently adopted cybersecurity solutions and processes remain highly reactive, with short-lived remedies. The critical need for more proactive and mature response processes has never been more critical. We look at engineering and borrow concepts from mature systematic processes such as the engineering design process to develop a new framework for activer cyber incident response processes. Currently, cybersecurity incident response structure and processes are outlined in multiple frameworks including the MITRE ATT&CK framework, NIST's Cybersecurity framework, and the traditional incident response (IR) lifecycle. Using a blend of those frameworks and the concepts from the engineering design process we propose O2I that is more adept to a more proactive and sustainable security response. With proper implementation, O2I's iterative processes could provide a sustainable and adaptable approach to assess and improve cyber security response processes. To validate the benefits and feasibility of the proposed framework, we utilize it to evaluate recent attacks using publicly available information.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems 三输入三模型机器学习系统的可靠性模型与分析
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888825
Qiang Wen, F. Machida
Machine learning (ML) models have been widely applied to real-world systems. However, outputs of ML models are generally uncertain and sensitive to real input data, which is a big challenge in designing highly reliable ML-based software systems. Our study aims to improve the ML system reliability through a software architecture approach inspired by N-version programming. N-version ML architectures considered in our study combine multiple input data sets with multiple versions of ML models to determine the final system output by consensus. In this paper, we focus on three-version ML architectures and propose the reliability models for analyzing the system reliability by using diversity metrics for ML models and input data sets. The proposed model allows us to compare the reliability of a triple-model with triple-input (TMTI) architecture with other variants of three-version and two-version architectures. Through the numerical analysis of the proposed models, we find that i) the reliability of TMTI architecture is higher than other three-version architectures, but interestingly ii) it is generally lower than the reliability of double model with double input system (DMDI). Furthermore, we also find that a larger variance of model diversities negatively impacts the TMTI reliability, while a larger variance of input diversity has opposed impacts.
机器学习(ML)模型已经广泛应用于现实世界的系统中。然而,机器学习模型的输出通常是不确定的,并且对实际输入数据很敏感,这对设计高可靠的基于机器学习的软件系统是一个很大的挑战。我们的研究旨在通过受n版本编程启发的软件架构方法来提高机器学习系统的可靠性。在我们的研究中考虑的n版本机器学习架构将多个输入数据集与多个版本的机器学习模型结合起来,以确定最终的系统输出。本文主要研究了三版本机器学习体系结构,并通过对机器学习模型和输入数据集使用多样性度量,提出了用于分析系统可靠性的可靠性模型。提出的模型允许我们比较具有三输入(TMTI)体系结构的三模型与其他三版本和两版本体系结构的变体的可靠性。通过对所提出模型的数值分析,我们发现:1)TMTI架构的可靠性高于其他三版本架构,但有趣的是,2)它普遍低于双输入系统双模型(DMDI)的可靠性。此外,我们还发现较大的模型多样性方差对TMTI信度有负向影响,而较大的输入多样性方差对TMTI信度有相反的影响。
{"title":"Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems","authors":"Qiang Wen, F. Machida","doi":"10.1109/DSC54232.2022.9888825","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888825","url":null,"abstract":"Machine learning (ML) models have been widely applied to real-world systems. However, outputs of ML models are generally uncertain and sensitive to real input data, which is a big challenge in designing highly reliable ML-based software systems. Our study aims to improve the ML system reliability through a software architecture approach inspired by N-version programming. N-version ML architectures considered in our study combine multiple input data sets with multiple versions of ML models to determine the final system output by consensus. In this paper, we focus on three-version ML architectures and propose the reliability models for analyzing the system reliability by using diversity metrics for ML models and input data sets. The proposed model allows us to compare the reliability of a triple-model with triple-input (TMTI) architecture with other variants of three-version and two-version architectures. Through the numerical analysis of the proposed models, we find that i) the reliability of TMTI architecture is higher than other three-version architectures, but interestingly ii) it is generally lower than the reliability of double model with double input system (DMDI). Furthermore, we also find that a larger variance of model diversities negatively impacts the TMTI reliability, while a larger variance of input diversity has opposed impacts.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks 告诉我你的附加请求,我会告诉你你是谁:4G和5G移动网络中的实用指纹攻击
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888899
Daniel Fraunholz, Richard Schörghofer-Vrinssen, H. König, Richard M. Zahoransky
Both attacks are valid for 4G and 5G NSA. 4G will most likely relevant for many years to come. Even if 4G networks will be deactivated in several of years (as it is with GSM or UMTS networks right now), the baseband chips on the UE side will still support 4G and will be prone to 4G-based attacks in the future. In this paper, we leverage a previously introduced vulnerability for 4G mobile communications and present new means for its exploitation. Based on the vulnerability, we introduce a fingerprinting technique and two new attacks to demonstrate how the privacy of mobile devices may be compromised during the initialization procedure of 4G and 5G NSA mobile commu-nications. For this, we exploit information that is exposed in the attach request of the attach procedure sent from a mobile device to the network. This is particularly critical because the confidentiality of this information is not cryptographically protected. In our experiments, we evaluate our attacks against a set of approximately 110 mobile phones from 22 different vendors. Please note that we use pseudonyms (Vendor A etc.) to refer to device vendors to not disadvantage vendors. We demonstrate that our attacks enable to re-identify previously observed mobile devices for tracking purposes and to identify the device vendor and model, respectively, to derive potential sensitive information for tracking their owners.
这两种攻击都适用于4G和5G NSA。4G很可能在未来的许多年里都很重要。即使4G网络将在几年内停用(就像现在的GSM或UMTS网络一样),终端端的基带芯片仍将支持4G,并且在未来很容易受到基于4G的攻击。在本文中,我们利用之前介绍的4G移动通信漏洞,并提出了利用它的新方法。基于此漏洞,我们介绍了一种指纹识别技术和两种新的攻击,以演示在4G和5G NSA移动通信初始化过程中移动设备的隐私如何受到损害。为此,我们利用从移动设备发送到网络的附加过程的附加请求中暴露的信息。这一点尤其重要,因为这些信息的机密性没有加密保护。在我们的实验中,我们对来自22个不同供应商的大约110部手机进行了攻击评估。请注意,我们使用假名(供应商A等)来指代设备供应商,而不是不利供应商。我们证明,我们的攻击能够重新识别以前观察到的移动设备用于跟踪目的,并分别识别设备供应商和型号,以获得跟踪其所有者的潜在敏感信息。
{"title":"Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks","authors":"Daniel Fraunholz, Richard Schörghofer-Vrinssen, H. König, Richard M. Zahoransky","doi":"10.1109/DSC54232.2022.9888899","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888899","url":null,"abstract":"Both attacks are valid for 4G and 5G NSA. 4G will most likely relevant for many years to come. Even if 4G networks will be deactivated in several of years (as it is with GSM or UMTS networks right now), the baseband chips on the UE side will still support 4G and will be prone to 4G-based attacks in the future. In this paper, we leverage a previously introduced vulnerability for 4G mobile communications and present new means for its exploitation. Based on the vulnerability, we introduce a fingerprinting technique and two new attacks to demonstrate how the privacy of mobile devices may be compromised during the initialization procedure of 4G and 5G NSA mobile commu-nications. For this, we exploit information that is exposed in the attach request of the attach procedure sent from a mobile device to the network. This is particularly critical because the confidentiality of this information is not cryptographically protected. In our experiments, we evaluate our attacks against a set of approximately 110 mobile phones from 22 different vendors. Please note that we use pseudonyms (Vendor A etc.) to refer to device vendors to not disadvantage vendors. We demonstrate that our attacks enable to re-identify previously observed mobile devices for tracking purposes and to identify the device vendor and model, respectively, to derive potential sensitive information for tracking their owners.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification 一种基于区块链的低成本框架,用于使用分类保存医疗保健物联网系统中的关键数据
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888800
Heba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad
Security and privacy of Internet of Things (IoT) data are highly essential for a wide spectrum of applications, on top of which are medical systems. In medical systems, we need to guarantee the confidentiality, integrity, and availability (CIA triad) of the data generated from IoT devices in order to investigate medical malpractices. Blockchain provides an immutable storage without relying on an external third party to build trust and transparency. Therefore, blockchain is a suitable option to securely store such data. However, the excessive reliance on IoT devices in medical applications results in producing a large amount of data periodically, and thus, makes its solely storage on blockchain extremely expensive. In this paper, we propose a cost-efficient comprehensive framework to store IoT medical devices data on the blockchain by using a data-driven classifier. The classifier in the proposed framework is driven by a range of normal data for each sensor type. All data whether normal or abnormal is stored on a typical cloud. Only data that is classified as abnormal (critical) is stored on the blockchain for cost saving purposes. Furthermore, a distributed file system (IPFS) is utilized for extra cost reduction. Experimental results show that our proposed framework reduces the cost of storing healthcare IoT data by an average of 84% if compared with solely storing all data on the blockchain.
物联网(IoT)数据的安全性和隐私性对于广泛的应用至关重要,其中最重要的是医疗系统。在医疗系统中,我们需要保证物联网设备生成的数据的机密性、完整性和可用性(CIA triad),以便调查医疗事故。区块链提供不可变的存储,而不依赖于外部第三方来建立信任和透明度。因此,区块链是安全存储此类数据的合适选择。然而,医疗应用中对物联网设备的过度依赖导致定期产生大量数据,因此,将其单独存储在区块链上非常昂贵。在本文中,我们提出了一个经济高效的综合框架,通过使用数据驱动的分类器将物联网医疗设备数据存储在区块链上。所提出的框架中的分类器由每种传感器类型的一系列正常数据驱动。所有正常或异常的数据都存储在一个典型的云上。为了节省成本,区块链只存储异常(紧急)级别的数据。此外,还使用分布式文件系统(IPFS)来降低额外的成本。实验结果表明,与将所有数据单独存储在区块链上相比,我们提出的框架将医疗保健物联网数据的存储成本平均降低了84%。
{"title":"A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification","authors":"Heba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad","doi":"10.1109/DSC54232.2022.9888800","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888800","url":null,"abstract":"Security and privacy of Internet of Things (IoT) data are highly essential for a wide spectrum of applications, on top of which are medical systems. In medical systems, we need to guarantee the confidentiality, integrity, and availability (CIA triad) of the data generated from IoT devices in order to investigate medical malpractices. Blockchain provides an immutable storage without relying on an external third party to build trust and transparency. Therefore, blockchain is a suitable option to securely store such data. However, the excessive reliance on IoT devices in medical applications results in producing a large amount of data periodically, and thus, makes its solely storage on blockchain extremely expensive. In this paper, we propose a cost-efficient comprehensive framework to store IoT medical devices data on the blockchain by using a data-driven classifier. The classifier in the proposed framework is driven by a range of normal data for each sensor type. All data whether normal or abnormal is stored on a typical cloud. Only data that is classified as abnormal (critical) is stored on the blockchain for cost saving purposes. Furthermore, a distributed file system (IPFS) is utilized for extra cost reduction. Experimental results show that our proposed framework reduces the cost of storing healthcare IoT data by an average of 84% if compared with solely storing all data on the blockchain.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131949150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems 在嵌入式系统中防止内存窥探的缓存锁定和加密
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888802
Jason DeJesus, J. Chandy
Embedded systems are designed to have security measures in place that protect users' data from software and network attacks, but these measures can prove useless when the attacker gains physical access to the system. Research has shown that dynamic random access memory (DRAM) is vulnerable to attacks that take advantage of its remanence property where data remains in DRAM shortly after the system is powered off. In this paper, we propose a method utilizing both cache locking and encryption to secure the DRAM on any embedded system by modifying the cache architecture of the CPU. We demonstrate an implementation using a MicroBlaze CPU, but the design can be used with any FPGA soft-core CPU, even if it does not have pre-existing cache locking capabilities. The cache modifications introduce almost no impact on performance and minimal extra hardware utilization.
嵌入式系统被设计为具有适当的安全措施,以保护用户的数据免受软件和网络攻击,但是当攻击者获得对系统的物理访问权限时,这些措施可能被证明是无用的。研究表明,动态随机存取存储器(DRAM)很容易受到利用其残余特性的攻击,即在系统断电后不久,数据仍保留在DRAM中。在本文中,我们提出了一种利用缓存锁定和加密的方法,通过修改CPU的缓存架构来保护任何嵌入式系统上的DRAM。我们演示了使用MicroBlaze CPU的实现,但该设计可以与任何FPGA软核CPU一起使用,即使它没有预先存在的缓存锁定功能。缓存修改几乎不会对性能产生任何影响,而且额外的硬件利用率也很少。
{"title":"Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems","authors":"Jason DeJesus, J. Chandy","doi":"10.1109/DSC54232.2022.9888802","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888802","url":null,"abstract":"Embedded systems are designed to have security measures in place that protect users' data from software and network attacks, but these measures can prove useless when the attacker gains physical access to the system. Research has shown that dynamic random access memory (DRAM) is vulnerable to attacks that take advantage of its remanence property where data remains in DRAM shortly after the system is powered off. In this paper, we propose a method utilizing both cache locking and encryption to secure the DRAM on any embedded system by modifying the cache architecture of the CPU. We demonstrate an implementation using a MicroBlaze CPU, but the design can be used with any FPGA soft-core CPU, even if it does not have pre-existing cache locking capabilities. The cache modifications introduce almost no impact on performance and minimal extra hardware utilization.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130382689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimising user security recommendations for AI-powered smart-homes 优化人工智能智能家居的用户安全建议
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888829
Emma Scott, S. Panda, G. Loukas, E. Panaousis
Research in the context of user awareness has shown that smart-home occupants often lack cybersecurity awareness even when it comes to frequently used technologies such as online social networks and email. To cope with the risks, smart-homes must be equipped with adequate cybersecurity measures besides the knowledge and time required by smart-home occupants to implement security measures. In this paper, we explore potential threats in AI-powered smart-homes and identify a list of cybersecurity controls required to mitigate their potential impact considering attack vectors, as well as the time and knowledge required to implement a control. We use optimisation to identify the best set of controls to minimise the risk exposure considering these metrics. Our comparative analysis against a random selection approach highlight that our approach is at least 25% better at minimising risk. Finally, we show how improved knowledge or time impacts the risk.
用户意识方面的研究表明,智能家居用户往往缺乏网络安全意识,即使涉及到在线社交网络和电子邮件等常用技术。为了应对这些风险,除了智能家居使用者实施安全措施所需的知识和时间外,智能家居还必须配备足够的网络安全措施。在本文中,我们探讨了人工智能智能家居中的潜在威胁,并确定了考虑到攻击向量以及实施控制所需的时间和知识,以减轻其潜在影响所需的网络安全控制列表。考虑到这些指标,我们使用优化来确定最佳控制集,以最大限度地减少风险暴露。我们对随机选择方法的比较分析强调,我们的方法在最小化风险方面至少好25%。最后,我们展示了改进的知识或时间如何影响风险。
{"title":"Optimising user security recommendations for AI-powered smart-homes","authors":"Emma Scott, S. Panda, G. Loukas, E. Panaousis","doi":"10.1109/DSC54232.2022.9888829","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888829","url":null,"abstract":"Research in the context of user awareness has shown that smart-home occupants often lack cybersecurity awareness even when it comes to frequently used technologies such as online social networks and email. To cope with the risks, smart-homes must be equipped with adequate cybersecurity measures besides the knowledge and time required by smart-home occupants to implement security measures. In this paper, we explore potential threats in AI-powered smart-homes and identify a list of cybersecurity controls required to mitigate their potential impact considering attack vectors, as well as the time and knowledge required to implement a control. We use optimisation to identify the best set of controls to minimise the risk exposure considering these metrics. Our comparative analysis against a random selection approach highlight that our approach is at least 25% better at minimising risk. Finally, we show how improved knowledge or time impacts the risk.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments 展望未来:新兴计算环境中的高级持续威胁
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888873
Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine
The last decade witnessed a gradual shift from cloud-based computing towards ubiquitous computing, which has put at a greater security risk every element of the computing ecosystem including devices, data, network, and decision making. Indeed, emerging pervasive computing paradigms have introduced an un-charted territory of security vulnerabilities and a wider attack surface, mainly due to network openness, the underlying mechanics that enable intelligent functions, and the deeply integrated physical and cyber spaces. Furthermore, interconnected computing environments now enjoy many unconventional characteristics that mandate a radical change in security engineering tools. This need is further exacerbated by the rapid emergence of new Advanced Persistent Threats (APTs) that target critical infrastructures and aim to stealthily undermine their operations in innovative and intelligent ways. To enable system and network designers to be prepared to face this new wave of dangerous threats, this paper overviews recent APTs in emerging computing systems and proposes a new approach to APTs that is more tailored towards such systems compared to traditional IT infrastructures. The proposed APT lifecycle will inform security decisions and implementation choices in future pervasive networked systems.
过去十年见证了从基于云的计算向无处不在的计算的逐渐转变,这给计算生态系统的每个元素(包括设备、数据、网络和决策)带来了更大的安全风险。事实上,新兴的普及计算范式已经引入了一个未知的安全漏洞领域和更广泛的攻击面,这主要是由于网络的开放性,实现智能功能的底层机制,以及深度集成的物理和网络空间。此外,互连的计算环境现在具有许多非常规的特征,这些特征要求对安全工程工具进行根本性的改变。新的高级持续威胁(apt)的迅速出现进一步加剧了这一需求,这些威胁以关键基础设施为目标,旨在以创新和智能的方式暗中破坏其运营。为了使系统和网络设计人员能够准备好面对这一新的危险威胁浪潮,本文概述了新兴计算系统中最近出现的apt,并提出了一种新的apt方法,与传统IT基础设施相比,该方法更适合此类系统。拟议的APT生命周期将为未来普及网络系统的安全决策和实现选择提供信息。
{"title":"A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments","authors":"Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine","doi":"10.1109/DSC54232.2022.9888873","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888873","url":null,"abstract":"The last decade witnessed a gradual shift from cloud-based computing towards ubiquitous computing, which has put at a greater security risk every element of the computing ecosystem including devices, data, network, and decision making. Indeed, emerging pervasive computing paradigms have introduced an un-charted territory of security vulnerabilities and a wider attack surface, mainly due to network openness, the underlying mechanics that enable intelligent functions, and the deeply integrated physical and cyber spaces. Furthermore, interconnected computing environments now enjoy many unconventional characteristics that mandate a radical change in security engineering tools. This need is further exacerbated by the rapid emergence of new Advanced Persistent Threats (APTs) that target critical infrastructures and aim to stealthily undermine their operations in innovative and intelligent ways. To enable system and network designers to be prepared to face this new wave of dangerous threats, this paper overviews recent APTs in emerging computing systems and proposes a new approach to APTs that is more tailored towards such systems compared to traditional IT infrastructures. The proposed APT lifecycle will inform security decisions and implementation choices in future pervasive networked systems.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method 一种基于协同进化算法的恶意软件对抗样本生成方法
Pub Date : 2022-06-22 DOI: 10.1109/DSC54232.2022.9888884
Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai
The study of adversarial attacks on malicious code detection models will help identify and improve the flaws of detection models, improve the detection ability of adversarial attacks, and enhance the security of AI (Artificial Intelligent) algorithm-based applications. To address the problems of low efficiency, long time, and low evasion rate in generating adversarial samples, we propose a co-evolutionary algorithm-based adversarial sample generation method. We decompose the adversarial sample generation problem into three sub-problems, which are minimizing the number of modification actions, injecting less content, and being detected as benign by the target model. The two sub-problems of injecting less content and being detected as benign by the target model can be completed by minimizing the fitness function through the cooperation of two populations in coevolution. Minimizing the number of actions is achieved by a selection operation in the evolutionary process. We perform attack experiments on static malicious detection models and commercial detection engines. The experimental results show the generated adversarial samples can improve the evasion rate of some detection engines while ensuring the minimum number of modification actions and injecting less content. On the two static malicious detection models, our approach achieves more than an 80% evasion rate with fewer modification actions and injected content. The evasion rate on three commercial detection engines can reach 58.9%. Uploading the generated adversarial samples to the VirusTotal platform can evade an average of 54.0% of the anti-virus programs on the platform. Our approach is also compared with the adversarial attack approach based on an evolutionary algorithm to verify the necessity of minimizing the number of modification actions and injecting less content in adversarial sample generation.
研究针对恶意代码检测模型的对抗性攻击,有助于识别和改进检测模型的缺陷,提高对抗性攻击的检测能力,增强基于AI(人工智能)算法的应用的安全性。针对生成对抗样本效率低、时间长、逃避率低等问题,提出了一种基于协同进化算法的对抗样本生成方法。我们将对抗性样本生成问题分解为三个子问题,即最小化修改动作次数、注入较少内容和被目标模型检测为良性。注入较少的内容和被目标模型检测为良性的两个子问题可以通过两个种群在共同进化中的合作最小化适应度函数来完成。在进化过程中,通过选择操作来实现动作数量的最小化。我们在静态恶意检测模型和商业检测引擎上进行了攻击实验。实验结果表明,生成的对抗样本可以在保证修改动作次数最少和注入较少内容的情况下,提高某些检测引擎的逃避率。在两种静态恶意检测模型上,我们的方法以更少的修改动作和注入的内容实现了80%以上的逃避率。三款商用检测引擎的逃避率可达58.9%。将生成的对抗样本上传到VirusTotal平台,平均可以躲过平台上54.0%的杀毒程序。并将该方法与基于进化算法的对抗攻击方法进行了比较,验证了在对抗样本生成中最小化修改动作数量和注入较少内容的必要性。
{"title":"A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method","authors":"Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai","doi":"10.1109/DSC54232.2022.9888884","DOIUrl":"https://doi.org/10.1109/DSC54232.2022.9888884","url":null,"abstract":"The study of adversarial attacks on malicious code detection models will help identify and improve the flaws of detection models, improve the detection ability of adversarial attacks, and enhance the security of AI (Artificial Intelligent) algorithm-based applications. To address the problems of low efficiency, long time, and low evasion rate in generating adversarial samples, we propose a co-evolutionary algorithm-based adversarial sample generation method. We decompose the adversarial sample generation problem into three sub-problems, which are minimizing the number of modification actions, injecting less content, and being detected as benign by the target model. The two sub-problems of injecting less content and being detected as benign by the target model can be completed by minimizing the fitness function through the cooperation of two populations in coevolution. Minimizing the number of actions is achieved by a selection operation in the evolutionary process. We perform attack experiments on static malicious detection models and commercial detection engines. The experimental results show the generated adversarial samples can improve the evasion rate of some detection engines while ensuring the minimum number of modification actions and injecting less content. On the two static malicious detection models, our approach achieves more than an 80% evasion rate with fewer modification actions and injected content. The evasion rate on three commercial detection engines can reach 58.9%. Uploading the generated adversarial samples to the VirusTotal platform can evade an average of 54.0% of the anti-virus programs on the platform. Our approach is also compared with the adversarial attack approach based on an evolutionary algorithm to verify the necessity of minimizing the number of modification actions and injecting less content in adversarial sample generation.","PeriodicalId":368903,"journal":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1