首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Competence measure in social networks 社交网络中的能力测量
Pub Date : 2017-12-07 DOI: 10.1109/CCST.2017.8167845
S. Albladi, G. Weir
The current research aims to gain insight on user competence in detecting security threats in the context of online social networks (OSNs) and investigates the multidimensional space that determines this user competence level. The role of user competence and its dimensions in facilitating the detection of online threats is still a controversial topic in the information security field. The dimensions used to measure the concept are self-efficacy, security awareness, privacy awareness, and cybercrime experience. The scales used to measure those factors can determine the level of user competence in evaluating risks associated with social network usage. The measurement scales employed here have been validated using an item-categorization approach that, to our knowledge, has never before been used in information security research. The result of this study provides evidence for the suitability and validity of the user competence dimensions and associated measurement scales.
当前的研究旨在深入了解在线社交网络(OSNs)背景下用户检测安全威胁的能力,并调查决定用户能力水平的多维空间。在信息安全领域,用户能力及其维度在促进在线威胁检测中的作用仍然是一个有争议的话题。用来衡量这一概念的维度是自我效能感、安全意识、隐私意识和网络犯罪体验。用于测量这些因素的量表可以确定用户在评估与社交网络使用相关的风险方面的能力水平。这里使用的测量量表已经使用项目分类方法进行了验证,据我们所知,该方法从未在信息安全研究中使用过。本研究结果为用户能力维度及相关测量量表的适宜性和有效性提供了证据。
{"title":"Competence measure in social networks","authors":"S. Albladi, G. Weir","doi":"10.1109/CCST.2017.8167845","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167845","url":null,"abstract":"The current research aims to gain insight on user competence in detecting security threats in the context of online social networks (OSNs) and investigates the multidimensional space that determines this user competence level. The role of user competence and its dimensions in facilitating the detection of online threats is still a controversial topic in the information security field. The dimensions used to measure the concept are self-efficacy, security awareness, privacy awareness, and cybercrime experience. The scales used to measure those factors can determine the level of user competence in evaluating risks associated with social network usage. The measurement scales employed here have been validated using an item-categorization approach that, to our knowledge, has never before been used in information security research. The result of this study provides evidence for the suitability and validity of the user competence dimensions and associated measurement scales.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Stability of a dynamic biometric signature created on various devices 在各种设备上创建的动态生物特征签名的稳定性
Pub Date : 2017-10-26 DOI: 10.1109/CCST.2017.8167814
V. Smejkal, J. Kodl, L. Sieger, Frantisek Hortai, P. Tesar
The paper directly follows on from the prior research on the dynamic biometric signature (DBS), its properties, security, its resistance to forgery, and its stability. In our experiments, we used all the available pads produced by Signotec, which differ from each other in terms of their design, the size of the signature field, resolution, sampling rate, and even the scanning method used — a regular pen or a special pen using the ERT (Electromagnetic Resonance Technology). A less heterogenous sample was used than in the previous cases, as the objective of the experiments was to demonstrate a potential change in the DBS connected with the use of a different device, nevertheless the size of the sample means it is sufficiently statistically representative. The results showed that irrespective of the device used, the stability of scanning of the dynamic biometric signature was high for each person. The signature variability did not significantly differ between the devices for individual people. Once again it was confirmed that the use of the first signature as a “trial”, not included in the results, reduces the signature variability for each participant.
本文直接继承了前人对动态生物特征签名(DBS)的特性、安全性、抗伪造性和稳定性的研究。在我们的实验中,我们使用了siignotec生产的所有可用的pad,它们在设计、签名场的大小、分辨率、采样率甚至使用的扫描方法(普通笔或使用ERT(电磁共振技术)的特殊笔)方面都有所不同。与之前的案例相比,使用了较少的异质样本,因为实验的目的是证明与使用不同设备相关的DBS的潜在变化,然而样本的大小意味着它具有足够的统计代表性。结果表明,无论使用何种设备,对每个人来说,动态生物特征扫描的稳定性都很高。在不同的设备之间,个体的签名可变性没有显著差异。再次证实,使用第一个签名作为“试验”,不包括在结果中,减少了每个参与者的签名可变性。
{"title":"Stability of a dynamic biometric signature created on various devices","authors":"V. Smejkal, J. Kodl, L. Sieger, Frantisek Hortai, P. Tesar","doi":"10.1109/CCST.2017.8167814","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167814","url":null,"abstract":"The paper directly follows on from the prior research on the dynamic biometric signature (DBS), its properties, security, its resistance to forgery, and its stability. In our experiments, we used all the available pads produced by Signotec, which differ from each other in terms of their design, the size of the signature field, resolution, sampling rate, and even the scanning method used — a regular pen or a special pen using the ERT (Electromagnetic Resonance Technology). A less heterogenous sample was used than in the previous cases, as the objective of the experiments was to demonstrate a potential change in the DBS connected with the use of a different device, nevertheless the size of the sample means it is sufficiently statistically representative. The results showed that irrespective of the device used, the stability of scanning of the dynamic biometric signature was high for each person. The signature variability did not significantly differ between the devices for individual people. Once again it was confirmed that the use of the first signature as a “trial”, not included in the results, reduces the signature variability for each participant.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ECG biosignals in biometric recognition 生物特征识别中的心电生物信号
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167817
Jorge Sanchez-Casanova, Antonio Miranda-Escalada, R. Sánchez-Reillo, Pablo Bartolome-Molina
In this paper authors have studied the current state of the art, noting the achievements and gaps existing in published works. Most of the gaps are related to the testing data used, and therefore the reliability of the results obtained. With this in mind, the paper not only covers such review of the literature, but also the efforts of the authors in developing a solution that could demonstrate the real potential of this biometric modality.
在本文中,作者研究了目前的艺术现状,注意到已发表的作品中存在的成就和差距。大多数差距与所使用的测试数据有关,因此与所获得结果的可靠性有关。考虑到这一点,本文不仅涵盖了对文献的回顾,而且还介绍了作者在开发一种解决方案方面的努力,该解决方案可以展示这种生物识别模式的真正潜力。
{"title":"ECG biosignals in biometric recognition","authors":"Jorge Sanchez-Casanova, Antonio Miranda-Escalada, R. Sánchez-Reillo, Pablo Bartolome-Molina","doi":"10.1109/CCST.2017.8167817","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167817","url":null,"abstract":"In this paper authors have studied the current state of the art, noting the achievements and gaps existing in published works. Most of the gaps are related to the testing data used, and therefore the reliability of the results obtained. With this in mind, the paper not only covers such review of the literature, but also the efforts of the authors in developing a solution that could demonstrate the real potential of this biometric modality.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object-size invariant anomaly detection in video-surveillance 视频监控中对象大小不变异常检测
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167826
Juan C. Sanmiguel, J. Sanchez, Luis Caro Campos
Nowadays, there is a growing demand for automated video-based surveillance systems due to increase security concerns. Anomaly detection is a popular application in this area where anomalous events of interest are defined as observed behavior that stands out from its context in space and time. In this paper, we present an approach for the detection of anomalous motion based on the extraction of object-size features that is independent of object size and video resolution. The proposed approach relies on a variable spatial window based on object size that has shown robustness in scenarios that present motion of objects of different sizes. We propose a system composed of four building blocks: background subtraction, feature extraction, event modeling and outlier detection. The proposed approach is evaluated on publicly available datasets which contain instances of abandoned objects of different sizes (considered as anomalies). The experiments carried out demonstrate that our approach outperforms the related state-of-the-art in the selected datasets. The proposal can identify anomalies associated to objects with different sizes and motion without increasing the number of false positives.
如今,由于安全问题的增加,对自动视频监控系统的需求不断增长。异常检测是该领域的一个流行应用,其中感兴趣的异常事件被定义为在空间和时间上从其上下文中脱颖而出的观察行为。在本文中,我们提出了一种基于对象大小特征提取的异常运动检测方法,该方法与对象大小和视频分辨率无关。所提出的方法依赖于基于物体大小的可变空间窗口,该窗口在呈现不同大小物体运动的场景中显示出鲁棒性。我们提出了一个由四个模块组成的系统:背景减除、特征提取、事件建模和离群点检测。该方法在公开可用的数据集上进行了评估,这些数据集包含不同大小的废弃物体(被认为是异常)的实例。所进行的实验表明,我们的方法在选定的数据集中优于相关的最新技术。该方案可以识别与不同大小和运动的物体相关的异常,而不会增加误报的数量。
{"title":"Object-size invariant anomaly detection in video-surveillance","authors":"Juan C. Sanmiguel, J. Sanchez, Luis Caro Campos","doi":"10.1109/CCST.2017.8167826","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167826","url":null,"abstract":"Nowadays, there is a growing demand for automated video-based surveillance systems due to increase security concerns. Anomaly detection is a popular application in this area where anomalous events of interest are defined as observed behavior that stands out from its context in space and time. In this paper, we present an approach for the detection of anomalous motion based on the extraction of object-size features that is independent of object size and video resolution. The proposed approach relies on a variable spatial window based on object size that has shown robustness in scenarios that present motion of objects of different sizes. We propose a system composed of four building blocks: background subtraction, feature extraction, event modeling and outlier detection. The proposed approach is evaluated on publicly available datasets which contain instances of abandoned objects of different sizes (considered as anomalies). The experiments carried out demonstrate that our approach outperforms the related state-of-the-art in the selected datasets. The proposal can identify anomalies associated to objects with different sizes and motion without increasing the number of false positives.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Malware family identification with BIRCH clustering 基于BIRCH聚类的恶意软件家族识别
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167802
Gregorio Pitolli, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni, R. Baldoni
Identifying families of malware is today considered a fundamental problem in the context of computer security. The correct mapping of a malicious sample to a known family simplifies its analysis and allows experts to focus their efforts only on those samples presenting unknown characteristics or behaviours, thus improving the efficiency of the malware analysis process. Grouping malware in families is an activity that can be performed using widely different approaches, but that currently lacks a globally accepted ground truth to be used for comparison. This problem stems from the absence of a formal definition of what a malware family is. As a consequence, in the last few years researchers proposed different methodologies to group a dataset of malicious samples in families. Notable examples include solutions combining labels of commercial anti-malware software, where possible disagreements are solved by majority voting (e.g., AVclass), and dedicated solutions based on machine learning algorithms (e.g., Malheur). In this paper we first present an evaluation to assess the quality of two distinct malware family ground truth datasets. Both include the same set of malware, but one has labels produced by AVclass while the other is based on the clusters identified by Malheur. Then we propose a novel solution for identifying families of similar samples starting from an unlabelled dataset of malware. We leverage features extracted through both static and dynamic analysis, and cluster samples using the BIRCH clustering algorithm. The paper includes an experimental evaluation which shows that BIRCH fits well in the context of malware family identification. Indeed, we prove that BIRCH can be tuned to obtain an accuracy higher than or comparable to standard clustering algorithms, using the ground truths based on AVclass and Malheur. Furthermore, we provide a performance comparison where BIRCH stands out for the low clustering time it provides.
如今,识别恶意软件的家族被认为是计算机安全领域的一个基本问题。将恶意样本正确映射到已知家族可以简化其分析,并允许专家将精力集中在那些呈现未知特征或行为的样本上,从而提高恶意软件分析过程的效率。将恶意软件分类为家族是一种可以使用多种不同方法来执行的活动,但目前缺乏一个全球公认的基本事实来进行比较。这个问题源于缺乏对恶意软件家族的正式定义。因此,在过去的几年里,研究人员提出了不同的方法来对家庭恶意样本数据集进行分组。值得注意的例子包括结合商业反恶意软件标签的解决方案,其中可能的分歧通过多数投票解决(例如,AVclass),以及基于机器学习算法的专用解决方案(例如,Malheur)。在本文中,我们首先提出了一种评估方法来评估两个不同恶意软件家族的真实数据集的质量。两者都包含相同的恶意软件集,但一个具有AVclass生成的标签,而另一个基于Malheur识别的集群。然后,我们提出了一种新的解决方案,用于从未标记的恶意软件数据集开始识别相似样本的家族。我们利用静态和动态分析提取的特征,并使用BIRCH聚类算法对样本进行聚类。实验结果表明,该算法非常适合恶意软件家族识别。事实上,我们证明了使用基于AVclass和Malheur的ground truth, BIRCH可以获得比标准聚类算法更高或相当的精度。此外,我们还提供了一个性能比较,其中BIRCH因其提供的低聚类时间而脱颖而出。
{"title":"Malware family identification with BIRCH clustering","authors":"Gregorio Pitolli, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni, R. Baldoni","doi":"10.1109/CCST.2017.8167802","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167802","url":null,"abstract":"Identifying families of malware is today considered a fundamental problem in the context of computer security. The correct mapping of a malicious sample to a known family simplifies its analysis and allows experts to focus their efforts only on those samples presenting unknown characteristics or behaviours, thus improving the efficiency of the malware analysis process. Grouping malware in families is an activity that can be performed using widely different approaches, but that currently lacks a globally accepted ground truth to be used for comparison. This problem stems from the absence of a formal definition of what a malware family is. As a consequence, in the last few years researchers proposed different methodologies to group a dataset of malicious samples in families. Notable examples include solutions combining labels of commercial anti-malware software, where possible disagreements are solved by majority voting (e.g., AVclass), and dedicated solutions based on machine learning algorithms (e.g., Malheur). In this paper we first present an evaluation to assess the quality of two distinct malware family ground truth datasets. Both include the same set of malware, but one has labels produced by AVclass while the other is based on the clusters identified by Malheur. Then we propose a novel solution for identifying families of similar samples starting from an unlabelled dataset of malware. We leverage features extracted through both static and dynamic analysis, and cluster samples using the BIRCH clustering algorithm. The paper includes an experimental evaluation which shows that BIRCH fits well in the context of malware family identification. Indeed, we prove that BIRCH can be tuned to obtain an accuracy higher than or comparable to standard clustering algorithms, using the ground truths based on AVclass and Malheur. Furthermore, we provide a performance comparison where BIRCH stands out for the low clustering time it provides.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Trustworthy design architecture: Cyber-physical system 可信赖的设计架构:信息物理系统
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167827
Sung Choi, A. Chavez, Marcos Torres, Cheolhyeon Kwon, Inseok Hwang
Conventional cyber defenses require continual maintenance: virus, firmware, and software updates; costly functional impact tests; and dedicated staff within a security operations center. The conventional defenses require access to external sources for the latest updates. The whitelisted system, however, is ideally a system that can sustain itself freed from external inputs. Cyber-Physical Systems (CPS), have the following unique traits: digital commands are physically observable and verifiable; possible combinations of commands are limited and finite. These CPS traits, combined with a trust anchor to secure an unclonable digital identity (i.e., digitally unclonable function [DUF] — Patent Application #15/183,454; CodeLock), offers an excellent opportunity to explore defenses built on whitelisting approach called “Trustworthy Design Architecture (TDA).” There exist significant research challenges in defining what are the physically verifiable whitelists as well as the criteria for cyber-physical traits that can be used as the unclonable identity. One goal of the project is to identify a set of physical and/or digital characteristics that can uniquely identify an endpoint. The measurements must have the properties of being reliable, reproducible, and trustworthy. Given that adversaries naturally evolve with any defense, the adversary will have the goal of disrupting or spoofing this process. To protect against such disruptions, we provide a unique system engineering technique, when applied to CPSs (e.g., nuclear processing facilities, critical infrastructures), that will sustain a secure operational state without ever needing external information or active inputs from cybersecurity subject-matter experts (i.e., virus updates, IDS scans, patch management, vulnerability updates). We do this by eliminating system dependencies on external sources for protection. Instead, all internal communication is actively sealed and protected with integrity, authenticity and assurance checks that only cyber identities bound to the physical component can deliver. As CPSs continue to advance (i.e., IoTs, drones, ICSs), resilient-maintenance free solutions are needed to neutralize/reduce cyber risks. TDA is a conceptual system engineering framework specifically designed to address cyber-physical systems that can potentially be maintained and operated without the persistent need or demand for vulnerability or security patch updates.
传统的网络防御需要持续的维护:病毒、固件和软件更新;昂贵的功能冲击测试;以及安全行动中心的专职人员。常规防御需要访问外部资源以获得最新的更新。然而,白名单系统是一个理想的系统,它可以维持自己不受外部输入的影响。网络物理系统(CPS)具有以下独特特征:数字命令在物理上是可观察和可验证的;命令的可能组合是有限的。这些CPS特征与信任锚相结合,以确保不可克隆的数字身份(即数字不可克隆功能[DUF]) -专利申请#15/183,454;CodeLock),提供了一个极好的机会来探索建立在白名单方法上的防御,该方法被称为“可信设计架构(TDA)”。在确定什么是物理上可验证的白名单以及可用作不可克隆身份的网络物理特征标准方面存在重大的研究挑战。该项目的一个目标是确定一组可以唯一标识端点的物理和/或数字特征。测量必须具有可靠、可重复和可信的特性。考虑到对手自然地演变为任何防御,对手的目标将是破坏或欺骗这一过程。为了防止此类中断,我们提供了一种独特的系统工程技术,当应用于cps(例如,核处理设施,关键基础设施)时,该技术将维持安全的运行状态,而无需外部信息或网络安全主题专家的主动输入(例如,病毒更新,IDS扫描,补丁管理,漏洞更新)。我们通过消除系统对外部资源的依赖来实现这一点。相反,所有内部通信都是主动密封的,并受到完整性、真实性和保证检查的保护,只有与物理组件绑定的网络身份才能提供这些检查。随着cps(即物联网、无人机、集成电路系统)的不断发展,需要无弹性维护的解决方案来抵消/降低网络风险。TDA是一个概念性的系统工程框架,专门设计用于解决网络物理系统的维护和运行,而不需要持续的漏洞或安全补丁更新。
{"title":"Trustworthy design architecture: Cyber-physical system","authors":"Sung Choi, A. Chavez, Marcos Torres, Cheolhyeon Kwon, Inseok Hwang","doi":"10.1109/CCST.2017.8167827","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167827","url":null,"abstract":"Conventional cyber defenses require continual maintenance: virus, firmware, and software updates; costly functional impact tests; and dedicated staff within a security operations center. The conventional defenses require access to external sources for the latest updates. The whitelisted system, however, is ideally a system that can sustain itself freed from external inputs. Cyber-Physical Systems (CPS), have the following unique traits: digital commands are physically observable and verifiable; possible combinations of commands are limited and finite. These CPS traits, combined with a trust anchor to secure an unclonable digital identity (i.e., digitally unclonable function [DUF] — Patent Application #15/183,454; CodeLock), offers an excellent opportunity to explore defenses built on whitelisting approach called “Trustworthy Design Architecture (TDA).” There exist significant research challenges in defining what are the physically verifiable whitelists as well as the criteria for cyber-physical traits that can be used as the unclonable identity. One goal of the project is to identify a set of physical and/or digital characteristics that can uniquely identify an endpoint. The measurements must have the properties of being reliable, reproducible, and trustworthy. Given that adversaries naturally evolve with any defense, the adversary will have the goal of disrupting or spoofing this process. To protect against such disruptions, we provide a unique system engineering technique, when applied to CPSs (e.g., nuclear processing facilities, critical infrastructures), that will sustain a secure operational state without ever needing external information or active inputs from cybersecurity subject-matter experts (i.e., virus updates, IDS scans, patch management, vulnerability updates). We do this by eliminating system dependencies on external sources for protection. Instead, all internal communication is actively sealed and protected with integrity, authenticity and assurance checks that only cyber identities bound to the physical component can deliver. As CPSs continue to advance (i.e., IoTs, drones, ICSs), resilient-maintenance free solutions are needed to neutralize/reduce cyber risks. TDA is a conceptual system engineering framework specifically designed to address cyber-physical systems that can potentially be maintained and operated without the persistent need or demand for vulnerability or security patch updates.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"52 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CUDA-SSL: SSL/TLS accelerated by GPU CUDA-SSL:由GPU加速SSL/TLS
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167848
W. Lee, Xian-Fu Wong, B. Goi, R. Phan
With the advent of Cloud Computing and IoT, secure communication has becoming an important aspect to protect the users and service providers from malicious attack. However, the adoption SSL/TLS is still not popular, due to the heavy computational requirements to implement them on the server side. Current solutions often rely on installing costly hardware accelerator to compute the cryptographic algorithms in order to offer responsive experience to the users (e.g. online payment and cloud storage). In this paper, we proposed to utilize GPU as an accelerator to compute the cryptographic algorithms, which is more cost effective compare to dedicated hardware accelerator. Firstly, we present several techniques to utilize the massively parallel architecture in GPU compute block ciphers (AES, Camelia, CAST5 and SEED) and public key cryptography (RSA). Secondly, we present a novel idea that utilizes warp shuffle instruction to speed up the implementation of SHA-3. Thirdly, we evaluated the performance of our implementation with state of the art GPU (Pascal architecture). Through extensive experiments, we show that CUDA-SSL is capable of achieving high-speed cryptography computation comparable to hardware accelerators, with only a fraction of their cost.
随着云计算和物联网的出现,安全通信已成为保护用户和服务提供商免受恶意攻击的重要方面。然而,采用SSL/TLS仍然不流行,因为在服务器端实现它们需要大量的计算需求。目前的解决方案通常依赖于安装昂贵的硬件加速器来计算加密算法,以便为用户提供响应式体验(例如在线支付和云存储)。在本文中,我们提出利用GPU作为加速器来计算密码算法,与专用硬件加速器相比,它更具成本效益。首先,我们提出了几种在GPU计算块密码(AES, Camelia, CAST5和SEED)和公钥加密(RSA)中利用大规模并行架构的技术。其次,我们提出了一种利用warp shuffle指令加速SHA-3实现的新思路。第三,我们用最先进的GPU (Pascal架构)评估了我们实现的性能。通过大量的实验,我们证明CUDA-SSL能够实现与硬件加速器相当的高速加密计算,而成本仅为硬件加速器的一小部分。
{"title":"CUDA-SSL: SSL/TLS accelerated by GPU","authors":"W. Lee, Xian-Fu Wong, B. Goi, R. Phan","doi":"10.1109/CCST.2017.8167848","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167848","url":null,"abstract":"With the advent of Cloud Computing and IoT, secure communication has becoming an important aspect to protect the users and service providers from malicious attack. However, the adoption SSL/TLS is still not popular, due to the heavy computational requirements to implement them on the server side. Current solutions often rely on installing costly hardware accelerator to compute the cryptographic algorithms in order to offer responsive experience to the users (e.g. online payment and cloud storage). In this paper, we proposed to utilize GPU as an accelerator to compute the cryptographic algorithms, which is more cost effective compare to dedicated hardware accelerator. Firstly, we present several techniques to utilize the massively parallel architecture in GPU compute block ciphers (AES, Camelia, CAST5 and SEED) and public key cryptography (RSA). Secondly, we present a novel idea that utilizes warp shuffle instruction to speed up the implementation of SHA-3. Thirdly, we evaluated the performance of our implementation with state of the art GPU (Pascal architecture). Through extensive experiments, we show that CUDA-SSL is capable of achieving high-speed cryptography computation comparable to hardware accelerators, with only a fraction of their cost.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121194860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyber-physical risk management for PV photovoltaic plants 光伏电站的网络物理风险管理
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167813
Alexander W. Miranda, S. Goldsmith
This paper presents a risk assessment method for evaluating a grid-connected Commercial Photovoltaic (PV) plants. Commercial PV plants are heavily dependent on technical information from control systems, some of which are dated relative to modern processors and communications. Through an initial case study of an existing PV plant, this paper explores the cybersecurity posture of a PV plant, examines the vulnerabilities and attack vectors against a PV plant, and identifies some issues that are unique to its Industrial Control System (ICS) architecture. Finally, the paper presents an initial risk management framework that addresses cybersecurity finding and best practices.
提出了一种评价并网商用光伏电站的风险评估方法。商业光伏电站严重依赖来自控制系统的技术信息,其中一些系统相对于现代处理器和通信来说已经过时。通过对现有光伏电站的初步案例研究,本文探讨了光伏电站的网络安全状况,检查了针对光伏电站的漏洞和攻击向量,并确定了其工业控制系统(ICS)架构特有的一些问题。最后,本文提出了一个解决网络安全发现和最佳实践的初始风险管理框架。
{"title":"Cyber-physical risk management for PV photovoltaic plants","authors":"Alexander W. Miranda, S. Goldsmith","doi":"10.1109/CCST.2017.8167813","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167813","url":null,"abstract":"This paper presents a risk assessment method for evaluating a grid-connected Commercial Photovoltaic (PV) plants. Commercial PV plants are heavily dependent on technical information from control systems, some of which are dated relative to modern processors and communications. Through an initial case study of an existing PV plant, this paper explores the cybersecurity posture of a PV plant, examines the vulnerabilities and attack vectors against a PV plant, and identifies some issues that are unique to its Industrial Control System (ICS) architecture. Finally, the paper presents an initial risk management framework that addresses cybersecurity finding and best practices.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Minutia-based enhancement of fingerprint samples 基于细节的指纹样本增强
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167824
Patrick Schuch, Simon-Daniel Schulz, C. Busch
Image enhancement is a common pre-processing step before the extraction of biometric features from a fingerprint sample. This can be essential especially for images of low image quality. An ideal fingerprint image enhancement should intend to improve the end-to-end biometric performance, i.e. the performance achieved on biometric features extracted from enhanced fingerprint samples. We use a model from Deep Learning for the task of image enhancement. This work's main contribution is a dedicated cost function which is optimized during training The cost function takes into account the biometric feature extraction. Our approach intends to improve the accuracy and reliability of the biometric feature extraction process: No feature should be missed and all features should be extracted as precise as possible. By doing so, the loss function forced the image enhancement to learn how to improve the suitability of a fingerprint sample for a biometric comparison process. The effectivity of the cost function was demonstrated for two different biometric feature extraction algorithms.
图像增强是从指纹样本中提取生物特征之前常见的预处理步骤。这对于图像质量较低的图像尤其重要。理想的指纹图像增强应该旨在提高端到端的生物特征性能,即从增强的指纹样本中提取的生物特征所取得的性能。我们使用深度学习的模型来完成图像增强的任务。本工作的主要贡献是在训练过程中优化了一个专用的代价函数,该代价函数考虑了生物特征的提取。我们的方法旨在提高生物特征提取过程的准确性和可靠性:不应遗漏任何特征,并尽可能精确地提取所有特征。通过这样做,损失函数迫使图像增强学习如何提高指纹样本对生物特征比较过程的适用性。在两种不同的生物特征提取算法中验证了代价函数的有效性。
{"title":"Minutia-based enhancement of fingerprint samples","authors":"Patrick Schuch, Simon-Daniel Schulz, C. Busch","doi":"10.1109/CCST.2017.8167824","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167824","url":null,"abstract":"Image enhancement is a common pre-processing step before the extraction of biometric features from a fingerprint sample. This can be essential especially for images of low image quality. An ideal fingerprint image enhancement should intend to improve the end-to-end biometric performance, i.e. the performance achieved on biometric features extracted from enhanced fingerprint samples. We use a model from Deep Learning for the task of image enhancement. This work's main contribution is a dedicated cost function which is optimized during training The cost function takes into account the biometric feature extraction. Our approach intends to improve the accuracy and reliability of the biometric feature extraction process: No feature should be missed and all features should be extracted as precise as possible. By doing so, the loss function forced the image enhancement to learn how to improve the suitability of a fingerprint sample for a biometric comparison process. The effectivity of the cost function was demonstrated for two different biometric feature extraction algorithms.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encrypted computing: Speed, security and provable obfuscation against insiders 加密计算:速度,安全性和可证明的对内部人员的混淆
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167847
Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
Over the past few years we have articulated theory that describes ‘encrypted computing’, in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen research and development on a standards-compliant processor that shows that near-conventional speeds are attainable via this approach. Benchmark performance with the US AES-128 flagship encryption and a 1GHz clock is now equivalent to a 433MHz classic Pentium, and most block encryptions fit in AES's place. This summary article details how user data is protected by a system based on the processor from being read or interfered with by the computer operator, for those computing paradigms that entail trust in data-oriented computation in remote locations where it may be accessible to powerful and dishonest insiders. We combine: (i) the processor that runs encrypted; (ii) a slightly modified conventional machine code instruction set architecture with which security is achievable; (iii) an ‘obfuscating’ compiler that takes advantage of its possibilities, forming a three-point system that provably provides cryptographic ‘semantic security’ for user data against the operator and system insiders.
在过去的几年里,我们已经有了描述“加密计算”的清晰理论,其中数据在处理器内处理时保持加密形式,凭借改进的算法。在过去的两年里,对符合标准的处理器的研究和开发表明,通过这种方法可以实现接近传统的速度。美国AES-128旗舰加密和1GHz时钟的基准性能现在相当于433MHz的经典奔腾,大多数块加密适合AES的位置。这篇摘要文章详细介绍了基于处理器的系统如何保护用户数据不被计算机操作员读取或干扰,对于那些需要信任远程位置的面向数据的计算的计算范式,这些计算范式可能被强大和不诚实的内部人员访问。我们结合:(i)运行加密的处理器;(ii)对可实现安全性的传统机器代码指令集架构稍加修改;(iii)利用其可能性的“混淆”编译器,形成一个三点系统,可证明为用户数据提供针对操作员和系统内部人员的加密“语义安全”。
{"title":"Encrypted computing: Speed, security and provable obfuscation against insiders","authors":"Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu","doi":"10.1109/CCST.2017.8167847","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167847","url":null,"abstract":"Over the past few years we have articulated theory that describes ‘encrypted computing’, in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen research and development on a standards-compliant processor that shows that near-conventional speeds are attainable via this approach. Benchmark performance with the US AES-128 flagship encryption and a 1GHz clock is now equivalent to a 433MHz classic Pentium, and most block encryptions fit in AES's place. This summary article details how user data is protected by a system based on the processor from being read or interfered with by the computer operator, for those computing paradigms that entail trust in data-oriented computation in remote locations where it may be accessible to powerful and dishonest insiders. We combine: (i) the processor that runs encrypted; (ii) a slightly modified conventional machine code instruction set architecture with which security is achievable; (iii) an ‘obfuscating’ compiler that takes advantage of its possibilities, forming a three-point system that provably provides cryptographic ‘semantic security’ for user data against the operator and system insiders.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1