首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Technologies to enable cyber deception 实现网络欺骗的技术
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167793
V. Urias, W. Stout, Jean-Luc Watson, C. Grim, L. Liebrock, Monzy Merza
Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these perimeter-planted security efforts ineffective in combating competent adversaries. In 2015 Gartner, Inc. examined the potential for organizations to use deception as a strategy for thwarting attackers and making it costlier for adversaries to engage in threat campaigns. In today's current research, there are a limited number of deception platforms (tools, etc.) that have successfully been shown to enable strategic deception in a computer network operations environment. Through a deception framework, we conjecture that deception platforms can aid and assist in deceiving the adversary by: obscuring the real target, devaluing information gathering, causing the adversary to waste time and resources, forcing the adversary to reveal advanced capabilities, exposing adversary intent, increasing the difficulty of attack planning, limiting the scope of the attack, and limiting the duration of a successful attack. The objective of this paper is to survey the technological trends in cyber deception research, identify gaps in the techniques, and provide research in the emergent environment. Current findings suggest that network deception tools are attracting the interest of researchers as a valuable security technique that can be implemented to learn more about the nature of cyber attacks; however, there are significant shortcomings in the current approaches and the ability to reason about the adversary.
计算机网络防御传统上是使用反动工具提供的,例如基于签名的检测器、白/黑名单、入侵检测/保护系统等。虽然事件检测/关联技术可以识别威胁,但这些威胁随后被手动处理,通常采用基于阻塞的响应(例如,阻塞)。随着威胁复杂性的增长,我们发现这些在周边部署的安全措施在打击有能力的对手方面是无效的。2015年,高德纳公司(Gartner, Inc.)研究了企业使用欺骗作为挫败攻击者的策略的可能性,并使对手参与威胁活动的成本更高。在目前的研究中,有有限数量的欺骗平台(工具等)已经成功地被证明能够在计算机网络操作环境中实现战略欺骗。通过欺骗框架,我们推测欺骗平台可以通过以下方式帮助和协助欺骗对手:模糊真实目标,贬低信息收集,导致对手浪费时间和资源,迫使对手透露先进能力,暴露对手意图,增加攻击计划的难度,限制攻击范围,限制成功攻击的持续时间。本文的目的是调查网络欺骗研究的技术趋势,找出技术上的差距,并在紧急环境中提供研究。目前的研究结果表明,网络欺骗工具作为一种有价值的安全技术正吸引着研究人员的兴趣,可以通过实施来更多地了解网络攻击的本质;然而,目前的方法和对对手进行推理的能力存在重大缺陷。
{"title":"Technologies to enable cyber deception","authors":"V. Urias, W. Stout, Jean-Luc Watson, C. Grim, L. Liebrock, Monzy Merza","doi":"10.1109/CCST.2017.8167793","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167793","url":null,"abstract":"Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these perimeter-planted security efforts ineffective in combating competent adversaries. In 2015 Gartner, Inc. examined the potential for organizations to use deception as a strategy for thwarting attackers and making it costlier for adversaries to engage in threat campaigns. In today's current research, there are a limited number of deception platforms (tools, etc.) that have successfully been shown to enable strategic deception in a computer network operations environment. Through a deception framework, we conjecture that deception platforms can aid and assist in deceiving the adversary by: obscuring the real target, devaluing information gathering, causing the adversary to waste time and resources, forcing the adversary to reveal advanced capabilities, exposing adversary intent, increasing the difficulty of attack planning, limiting the scope of the attack, and limiting the duration of a successful attack. The objective of this paper is to survey the technological trends in cyber deception research, identify gaps in the techniques, and provide research in the emergent environment. Current findings suggest that network deception tools are attracting the interest of researchers as a valuable security technique that can be implemented to learn more about the nature of cyber attacks; however, there are significant shortcomings in the current approaches and the ability to reason about the adversary.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy 为意大利阿西西的教皇大殿和圣方济各修道院提供的基于安全/安全/一般管理/访客服务的万物互联的新通信网络
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167795
Mauro Gambetti, F. Garzia, J. Vargas-Bonilla, David Ciarlariello, M. A. Ferrer-Ballester, Sergio Fusetti, M. Lombardi, S. Ramalingam, Mahalingam Ramasamy, S. Sacerdoti, Andrea Sdringola, Devi Thirupati, M. Faúndez-Zanuy
The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage status. Unique and complex cultural heritage sites, such as this, require a significant effort to ensure visitor security and safety. Along with such needs are cultural heritage preservation and protection as well as accessibility for visitors, with particular reference to visitors with disabilities, and for personnel normally present for site management, including the Friar's community. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. The purpose of this paper is to illustrate the methodology and show the results obtained from the study and the design of a new communication network for Internet of Everything based security/safety/general management and visitors' services of the Papal Basilica and Sacred Convent of Saint Francis in Assisi.
意大利阿西西的教皇大殿和圣方济各修道院共同代表了一个独特而具体的文化遗产,自公元1230年以来,圣方济各的遗体一直被安置在这里。每年有数百万来自世界各地的朝圣者和游客来此参观。公元2000年,它与周围地区的其他方济会遗址一起被联合国教科文组织列为世界遗产。像这样独特而复杂的文化遗产地,需要付出巨大的努力来确保游客的安全。伴随着这些需求的是文化遗产的保存和保护,以及游客的无障碍,特别是残疾人游客,以及包括修士社区在内的通常在场的现场管理人员。这些目标可以通过集成系统和创新技术来实现,例如万物互联(IoE),它可以连接人、物(移动终端、智能传感器、设备、执行器);可穿戴设备;等),数据/信息/知识和特定过程。本文的目的是说明方法,并展示从研究和设计一个新的通信网络中获得的结果,该网络用于基于亚西西教皇大殿和圣弗朗西斯圣修道院的安全/安全/一般管理和访客服务的万物互联。
{"title":"The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy","authors":"Mauro Gambetti, F. Garzia, J. Vargas-Bonilla, David Ciarlariello, M. A. Ferrer-Ballester, Sergio Fusetti, M. Lombardi, S. Ramalingam, Mahalingam Ramasamy, S. Sacerdoti, Andrea Sdringola, Devi Thirupati, M. Faúndez-Zanuy","doi":"10.1109/CCST.2017.8167795","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167795","url":null,"abstract":"The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage status. Unique and complex cultural heritage sites, such as this, require a significant effort to ensure visitor security and safety. Along with such needs are cultural heritage preservation and protection as well as accessibility for visitors, with particular reference to visitors with disabilities, and for personnel normally present for site management, including the Friar's community. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. The purpose of this paper is to illustrate the methodology and show the results obtained from the study and the design of a new communication network for Internet of Everything based security/safety/general management and visitors' services of the Papal Basilica and Sacred Convent of Saint Francis in Assisi.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding and granting android permissions: A user survey 理解和授予android权限:一项用户调查
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167834
Selvakumar Ramachandran, Andrea Dimitri, M. Galinium, Muhammad Tahir, Indirajith Viji Ananth, C. Schunck, M. Talamo
Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity to the users personal contacts. The implications on users' privacy and security are significant and therefore the users' ability to give informed consent is highly important. Previous work has identified low rates of user attention and comprehension to permission warnings and concluded that these fail to inform the majority of users. Here we focus on how users consider, interpret and react to differences in app permission information which is provided at three different instances of the app installation cycle: 1. Before installation in the Google Play Store 2. During the installation process 3. After installation in the Application Manager. The information provided in these instances varies considerably in its granularity and detail. For this purpose, an online survey was developed in which users were asked questions regarding the installation of a mirror app whose main functionality is to use the user facing camera of the phone to mirror the users face (i.e. display an image of the face) on the phone's screen. The survey participants were shown screen shots of the app description as presented in the Google Play Store as well as of the various permission lists as they appear on the screen of the phone. The questions focused on the respondents' perceptions and their hypothetical choices with regard to the installation of this app. Results show that the various presentations of permission information in Android versions KitKat or Lollipop cause concern and irritate a majority (51.67%) of users, especially those with some basic IT expertise. We conclude that the contextualization of app features and functionalities with the corresponding permissions needs to be improved especially for users with little IT expertise. Further user permission information should be made available at different and consistent levels of granularity.
每当用户在他们的智能设备上安装一个带有Android KitKat或Lollipop操作系统的新应用程序时,他们都被要求授予应用程序(应用程序)提供商访问设备功能的权限,从数据存储到设备位置,从设备身份到用户的个人联系人。对用户隐私和安全的影响是显著的,因此用户给予知情同意的能力是非常重要的。以前的工作已经确定了用户对许可警告的关注和理解率很低,并得出结论,这些警告不能通知大多数用户。在这里,我们关注用户如何考虑、解释和应对应用程序许可信息的差异,这些信息是在应用程序安装周期的三个不同实例中提供的:b谷歌Play Store安装前在安装过程中。在应用程序管理器中安装后。这些实例中提供的信息在粒度和细节上差别很大。为此,我们开展了一项在线调查,向用户询问有关安装镜像应用程序的问题,该应用程序的主要功能是使用手机的面向用户的摄像头在手机屏幕上镜像用户的脸(即显示面部图像)。研究人员向调查参与者展示了谷歌Play Store中应用描述的屏幕截图,以及出现在手机屏幕上的各种许可列表。问题集中在受访者对安装该应用程序的看法和假设选择上。结果表明,Android版本KitKat或Lollipop中权限信息的各种呈现引起了大多数(51.67%)用户的关注和愤怒,特别是那些具有一些基本IT专业知识的用户。我们的结论是,应用程序特性和功能的上下文化与相应的权限需要改进,特别是对于很少有IT专业知识的用户。应该在不同且一致的粒度级别上提供进一步的用户权限信息。
{"title":"Understanding and granting android permissions: A user survey","authors":"Selvakumar Ramachandran, Andrea Dimitri, M. Galinium, Muhammad Tahir, Indirajith Viji Ananth, C. Schunck, M. Talamo","doi":"10.1109/CCST.2017.8167834","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167834","url":null,"abstract":"Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity to the users personal contacts. The implications on users' privacy and security are significant and therefore the users' ability to give informed consent is highly important. Previous work has identified low rates of user attention and comprehension to permission warnings and concluded that these fail to inform the majority of users. Here we focus on how users consider, interpret and react to differences in app permission information which is provided at three different instances of the app installation cycle: 1. Before installation in the Google Play Store 2. During the installation process 3. After installation in the Application Manager. The information provided in these instances varies considerably in its granularity and detail. For this purpose, an online survey was developed in which users were asked questions regarding the installation of a mirror app whose main functionality is to use the user facing camera of the phone to mirror the users face (i.e. display an image of the face) on the phone's screen. The survey participants were shown screen shots of the app description as presented in the Google Play Store as well as of the various permission lists as they appear on the screen of the phone. The questions focused on the respondents' perceptions and their hypothetical choices with regard to the installation of this app. Results show that the various presentations of permission information in Android versions KitKat or Lollipop cause concern and irritate a majority (51.67%) of users, especially those with some basic IT expertise. We conclude that the contextualization of app features and functionalities with the corresponding permissions needs to be improved especially for users with little IT expertise. Further user permission information should be made available at different and consistent levels of granularity.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of anomalies in surveillance scenarios using mixture models 使用混合模型检测监测场景中的异常情况
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167830
Adrián Tomé, L. Salgado
In this paper we present a robust and simple method for the detection of anomalies in surveillance scenarios. We use a “bottom-up” approach that avoids any object tracking, making the system suitable for anomaly detection in crowds. A robust optical flow method is used for the extraction of accurate spatio-temporal motion information, which allows to get simple but discriminative descriptors that are employed to train a Gaussian mixture model. We evaluate our system in a publicly available dataset, concluding that our method outperforms similar anomaly detection approaches but with a simpler model and low-sized descriptors.
在本文中,我们提出了一种鲁棒和简单的方法来检测监视场景中的异常。我们使用“自下而上”的方法,避免了任何对象跟踪,使系统适合于人群中的异常检测。采用鲁棒光流方法提取准确的时空运动信息,得到简单而具有判别性的描述子,用于训练高斯混合模型。我们在一个公开可用的数据集中评估了我们的系统,得出的结论是,我们的方法优于类似的异常检测方法,但使用更简单的模型和较小的描述符。
{"title":"Detection of anomalies in surveillance scenarios using mixture models","authors":"Adrián Tomé, L. Salgado","doi":"10.1109/CCST.2017.8167830","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167830","url":null,"abstract":"In this paper we present a robust and simple method for the detection of anomalies in surveillance scenarios. We use a “bottom-up” approach that avoids any object tracking, making the system suitable for anomaly detection in crowds. A robust optical flow method is used for the extraction of accurate spatio-temporal motion information, which allows to get simple but discriminative descriptors that are employed to train a Gaussian mixture model. We evaluate our system in a publicly available dataset, concluding that our method outperforms similar anomaly detection approaches but with a simpler model and low-sized descriptors.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring a statistical method for touchscreen swipe biometrics 探索一种用于触摸屏滑动生物识别的统计方法
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167823
Ada Pozo, Julian Fierrez, M. Martinez-Diaz, Javier Galbally, A. Morales
The great popularity of smartphones and the increase in their use in everyday applications has led to sensitive information being carried in them, such as our bank account details, passwords or emails. Motivated by the limited security of traditional systems (e.g. PIN codes, secret patterns), that can be easily broken, this work focuses on the analysis of users normal interaction with touchscreens as a means for active authentication. Given the frequency in which touch operations are performed, characteristic habits, like the strength, rhythm or angle used result in discriminative patterns that can be exploited to authenticate users. In the present work, we explore a statistical approach based on adapted Gaussian Mixture Models. The performance across different kinds of touch operations, reveals that some gestures hold more user-specific information and are more discriminative than others (in particular, horizontal swipes appear to be more discriminative than vertical ones). The experimental results show that touch biometrics have enough discriminability for person recognition and that they are a promising method for active authentication.
智能手机的普及及其在日常应用中使用的增加导致其中携带敏感信息,例如我们的银行账户详细信息,密码或电子邮件。由于传统系统(例如PIN码,秘密模式)的安全性有限,很容易被破坏,因此这项工作的重点是分析用户与触摸屏的正常交互,作为主动认证的一种手段。考虑到执行触摸操作的频率,使用的强度、节奏或角度等特征习惯会产生可用于验证用户身份的判别模式。在目前的工作中,我们探索了一种基于自适应高斯混合模型的统计方法。不同类型触摸操作的表现表明,一些手势包含更多用户特定信息,并且比其他手势更具区别性(特别是水平滑动似乎比垂直滑动更具区别性)。实验结果表明,触摸生物特征识别具有足够的识别能力,是一种很有前途的主动身份认证方法。
{"title":"Exploring a statistical method for touchscreen swipe biometrics","authors":"Ada Pozo, Julian Fierrez, M. Martinez-Diaz, Javier Galbally, A. Morales","doi":"10.1109/CCST.2017.8167823","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167823","url":null,"abstract":"The great popularity of smartphones and the increase in their use in everyday applications has led to sensitive information being carried in them, such as our bank account details, passwords or emails. Motivated by the limited security of traditional systems (e.g. PIN codes, secret patterns), that can be easily broken, this work focuses on the analysis of users normal interaction with touchscreens as a means for active authentication. Given the frequency in which touch operations are performed, characteristic habits, like the strength, rhythm or angle used result in discriminative patterns that can be exploited to authenticate users. In the present work, we explore a statistical approach based on adapted Gaussian Mixture Models. The performance across different kinds of touch operations, reveals that some gestures hold more user-specific information and are more discriminative than others (in particular, horizontal swipes appear to be more discriminative than vertical ones). The experimental results show that touch biometrics have enough discriminability for person recognition and that they are a promising method for active authentication.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Ensuring information security by using Haskell's advanced type system 使用Haskell先进的类型系统,确保信息安全
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167844
M. Pirro, M. Conti, R. Lazzeretti
Protecting data confidentiality and integrity has become increasingly important in modern software. Sometimes, access control mechanisms come short and solutions on the application-level are needed. An approach can rely on enforcing information security using some features provided by certain programming languages. Several different solutions addressing this problem have been presented in literature, and entire new languages or libraries have been built from scratch. Some of them use type systems to let the compiler check for vulnerable code. In this way we are able to rule out those implementations which do not meet a certain security requirement. In this paper we use Haskell's type system to enforce three key properties of information security: non-interference and flexible declassification policies, strict input validation, and secure computations on untainted and trusted values. We present a functional lightweight library for applications with data integrity and confidentiality issues. Our contribute relies on a compile time enforcing of the aforementioned properties. Our library is wholly generalized and might be adapted for satisfying almost every security requirement.
保护数据的机密性和完整性在现代软件中变得越来越重要。有时,访问控制机制不足,需要应用程序级的解决方案。一种方法可以依赖于使用某些编程语言提供的某些特性来实施信息安全。文献中已经提出了解决这个问题的几种不同的解决方案,并且从头开始构建了全新的语言或库。其中一些使用类型系统让编译器检查易受攻击的代码。通过这种方式,我们能够排除那些不满足特定安全需求的实现。在本文中,我们使用Haskell的类型系统来实现信息安全的三个关键属性:不干扰和灵活的解密策略,严格的输入验证,以及对未污染和可信值的安全计算。我们为具有数据完整性和机密性问题的应用程序提供了一个功能轻量级库。我们的贡献依赖于上述属性的编译时强制执行。我们的库是完全一般化的,可以适应几乎所有的安全需求。
{"title":"Ensuring information security by using Haskell's advanced type system","authors":"M. Pirro, M. Conti, R. Lazzeretti","doi":"10.1109/CCST.2017.8167844","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167844","url":null,"abstract":"Protecting data confidentiality and integrity has become increasingly important in modern software. Sometimes, access control mechanisms come short and solutions on the application-level are needed. An approach can rely on enforcing information security using some features provided by certain programming languages. Several different solutions addressing this problem have been presented in literature, and entire new languages or libraries have been built from scratch. Some of them use type systems to let the compiler check for vulnerable code. In this way we are able to rule out those implementations which do not meet a certain security requirement. In this paper we use Haskell's type system to enforce three key properties of information security: non-interference and flexible declassification policies, strict input validation, and secure computations on untainted and trusted values. We present a functional lightweight library for applications with data integrity and confidentiality issues. Our contribute relies on a compile time enforcing of the aforementioned properties. Our library is wholly generalized and might be adapted for satisfying almost every security requirement.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SoTRAACE — Socio-technical risk-adaptable access control model SoTRAACE -社会技术风险适应性访问控制模型
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167835
Pedro Moura, Paulo A. P. Fazendeiro, Pedro Marques, A. Ferreira
Within the necessary security requirements, access control measures are essential to provide adequate means to protect data from unauthorized accesses. However, current and traditional solutions are commonly based on predefined access policies and roles and are therefore inflexible by assuming uniform access control decisions through people's different type of devices, environments and situational conditions, and across enterprises, location and time. We live in an age of the mobile paradigm of anytime/anywhere access as the smartphone is the most ubiquitous device that people now hold. In this new age, access control models need to determine adaptable access decisions based on multiple factors aggregated at the moment of request and not just perform a predefined comparison of attributes. This paper presents a new access control model: SoTRAACE — Socio-Technical Risk-Adaptable Access Control Model. This model aggregates attributes from various domains to help performing a risk assessment that is balanced against the operational needs at the moment of each request, so to provide the most accurate and secure access decision. As a proof of concept, SoTRAACE is used to model and compare two different use case scenarios in the healthcare sector.
在必要的安全需求范围内,访问控制措施对于提供足够的手段来保护数据免受未经授权的访问是必不可少的。然而,当前和传统的解决方案通常基于预定义的访问策略和角色,因此不灵活,因为它们假定通过人们不同类型的设备、环境和情景条件,以及跨企业、跨地点和跨时间的统一访问控制决策。我们生活在一个随时随地访问的移动范式时代,因为智能手机是人们现在拥有的最普遍的设备。在这个新时代,访问控制模型需要根据请求时刻聚合的多个因素确定适应性访问决策,而不仅仅是执行预定义的属性比较。本文提出了一种新的访问控制模型:SoTRAACE -社会技术风险适应性访问控制模型。该模型聚合了来自不同领域的属性,以帮助执行风险评估,该评估与每个请求时刻的操作需求相平衡,从而提供最准确和最安全的访问决策。作为概念验证,SoTRAACE用于对医疗保健部门的两种不同用例场景进行建模和比较。
{"title":"SoTRAACE — Socio-technical risk-adaptable access control model","authors":"Pedro Moura, Paulo A. P. Fazendeiro, Pedro Marques, A. Ferreira","doi":"10.1109/CCST.2017.8167835","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167835","url":null,"abstract":"Within the necessary security requirements, access control measures are essential to provide adequate means to protect data from unauthorized accesses. However, current and traditional solutions are commonly based on predefined access policies and roles and are therefore inflexible by assuming uniform access control decisions through people's different type of devices, environments and situational conditions, and across enterprises, location and time. We live in an age of the mobile paradigm of anytime/anywhere access as the smartphone is the most ubiquitous device that people now hold. In this new age, access control models need to determine adaptable access decisions based on multiple factors aggregated at the moment of request and not just perform a predefined comparison of attributes. This paper presents a new access control model: SoTRAACE — Socio-Technical Risk-Adaptable Access Control Model. This model aggregates attributes from various domains to help performing a risk assessment that is balanced against the operational needs at the moment of each request, so to provide the most accurate and secure access decision. As a proof of concept, SoTRAACE is used to model and compare two different use case scenarios in the healthcare sector.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131724768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Generation and evaluation of synthetic models for training people detectors 人员检测器训练综合模型的生成与评价
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167818
Rafael Martin Nieto, Jesus Molina Merchan, Álvaro García-Martín, J. Sanchez
There is a large demand in the area of video-surveillance, especially in people detection, which has caused a large increase in the number of researches and resources in this field. As training images and annotations are not always available, it is important to consider the cost involved in creating the detector models. For example, for elderly people detection, the detector must have into account different positions such as standing, sitting, in a wheelchair, etc. Therefore, this work has the main objective of reducing the amount of resources needed to generate the detection model, saving the cost of having to record new sequences and generate the associated annotations for a detector training. To achieve this, three synthetic image datasets have been created in order to train three different models, evaluating which model is optimal and finally analyzing its feasibility by comparing it with a people detector for wheelchair users trained with real images. Other people detection scenarios in which this technique could be applied are, for example, people riding horses or motorbikes, or people carrying supermarket carts. The synthetic datasets have been generated by combining images of standing people with wheelchair images, combining image patches, and segmenting sections of people (trunk, legs, etc.) to add them to the wheelchair image. As expected, the obtained results have a reduction of efficiency (between 21 and 25%) in exchange for the enormous saving in human annotation and resources to record real images.
在视频监控领域,特别是在人员检测方面有着巨大的需求,这导致了该领域的研究和资源的大量增加。由于训练图像和注释并不总是可用的,因此考虑创建检测器模型所涉及的成本是很重要的。例如,对于老年人的检测,探测器必须考虑到不同的位置,如站着、坐着、坐在轮椅上等。因此,这项工作的主要目标是减少生成检测模型所需的资源量,节省必须记录新序列并为检测器训练生成相关注释的成本。为了实现这一目标,我们创建了三个合成图像数据集来训练三个不同的模型,评估哪一个模型是最优的,最后通过将其与使用真实图像训练的轮椅使用者的人检测器进行比较,分析其可行性。其他可以应用该技术的人员检测场景,例如,骑马或骑摩托车的人,或推着超市购物车的人。合成数据集是通过将站立的人图像与轮椅图像结合,结合图像patch,对人的部分(躯干、腿部等)进行分割添加到轮椅图像中生成的。正如预期的那样,获得的结果降低了效率(在21%到25%之间),以换取大量节省人工注释和记录真实图像的资源。
{"title":"Generation and evaluation of synthetic models for training people detectors","authors":"Rafael Martin Nieto, Jesus Molina Merchan, Álvaro García-Martín, J. Sanchez","doi":"10.1109/CCST.2017.8167818","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167818","url":null,"abstract":"There is a large demand in the area of video-surveillance, especially in people detection, which has caused a large increase in the number of researches and resources in this field. As training images and annotations are not always available, it is important to consider the cost involved in creating the detector models. For example, for elderly people detection, the detector must have into account different positions such as standing, sitting, in a wheelchair, etc. Therefore, this work has the main objective of reducing the amount of resources needed to generate the detection model, saving the cost of having to record new sequences and generate the associated annotations for a detector training. To achieve this, three synthetic image datasets have been created in order to train three different models, evaluating which model is optimal and finally analyzing its feasibility by comparing it with a people detector for wheelchair users trained with real images. Other people detection scenarios in which this technique could be applied are, for example, people riding horses or motorbikes, or people carrying supermarket carts. The synthetic datasets have been generated by combining images of standing people with wheelchair images, combining image patches, and segmenting sections of people (trunk, legs, etc.) to add them to the wheelchair image. As expected, the obtained results have a reduction of efficiency (between 21 and 25%) in exchange for the enormous saving in human annotation and resources to record real images.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131897732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and tagging 使用程序切片、仪器和标记的混合方法检测Android应用程序中的信息泄漏
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167856
Luis Menezes, Roland Wismüller
With the increasingly amount of private information stored in mobile devices, the need for more secure ways to detect, control and avoid malicious behaviors has become higher. The too coarse-grained permission system implemented in the Android platform does not cover problems such as preventing an application to send a previously acquired information over SMS or Internet to another device or server. This problem arises because the permission systems implemented in the Android platform works only in the access control and does not handle how the acquired information is handled by the application. In order to enhance detection and awareness of such unwanted information flows, we propose a hybrid information-flow analysis, known as FlowSlicer, that mixes the benefits of static and dynamic analysis, using slicing on a system dependency graph and instrumenting statements found to be important. In order to analyse properly the obtained results, tests regarding overhead and also leak detection rate were performed in the applications present in the category AndroidSpecific from the DroidBench repository, since FlowSlicer intends to work mainly for applications designed for the Android platform. The results show that FlowSlicer is effective in detecting leaks, detects all leaks present in the evaluated applications, and only includes an imperceptible overhead to the instrumented application. The obtained results also show how both static and dynamic analysis work together and help each other in their disadvantages: static analysis helps dynamic analysis by reducing the set of statements to be analysed and dynamic analysis helps to prove false positives from static analysis not to be true.
随着移动设备中存储的私人信息越来越多,对检测、控制和避免恶意行为的更安全方法的需求也越来越高。Android平台中实现的过于粗粒度的权限系统无法解决诸如阻止应用程序通过SMS或Internet向另一个设备或服务器发送先前获取的信息之类的问题。出现这个问题是因为Android平台中实现的权限系统只在访问控制中工作,而不处理应用程序如何处理获取的信息。为了增强对这些不需要的信息流的检测和意识,我们提出了一种混合信息流分析,称为FlowSlicer,它混合了静态和动态分析的优点,在系统依赖关系图上使用切片,并对发现重要的语句进行检测。为了正确分析所获得的结果,在DroidBench存储库中存在的AndroidSpecific类别中的应用程序中执行了有关开销和泄漏检测率的测试,因为FlowSlicer打算主要用于为Android平台设计的应用程序。结果表明,FlowSlicer在检测泄漏方面是有效的,可以检测到评估应用程序中存在的所有泄漏,并且只包括对测量应用程序的难以察觉的开销。获得的结果还显示了静态分析和动态分析如何协同工作,并在各自的缺点上相互帮助:静态分析通过减少要分析的语句集来帮助动态分析,动态分析有助于证明静态分析的误报不正确。
{"title":"Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and tagging","authors":"Luis Menezes, Roland Wismüller","doi":"10.1109/CCST.2017.8167856","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167856","url":null,"abstract":"With the increasingly amount of private information stored in mobile devices, the need for more secure ways to detect, control and avoid malicious behaviors has become higher. The too coarse-grained permission system implemented in the Android platform does not cover problems such as preventing an application to send a previously acquired information over SMS or Internet to another device or server. This problem arises because the permission systems implemented in the Android platform works only in the access control and does not handle how the acquired information is handled by the application. In order to enhance detection and awareness of such unwanted information flows, we propose a hybrid information-flow analysis, known as FlowSlicer, that mixes the benefits of static and dynamic analysis, using slicing on a system dependency graph and instrumenting statements found to be important. In order to analyse properly the obtained results, tests regarding overhead and also leak detection rate were performed in the applications present in the category AndroidSpecific from the DroidBench repository, since FlowSlicer intends to work mainly for applications designed for the Android platform. The results show that FlowSlicer is effective in detecting leaks, detects all leaks present in the evaluated applications, and only includes an imperceptible overhead to the instrumented application. The obtained results also show how both static and dynamic analysis work together and help each other in their disadvantages: static analysis helps dynamic analysis by reducing the set of statements to be analysed and dynamic analysis helps to prove false positives from static analysis not to be true.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132990105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructure 作为斯洛伐克关键基础设施一部分的自来水物理保护系统稳健性评估用例
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167811
T. Loveček, Anton Siser, L. Mariš
The article presents a use case evaluation of the robustness of a physical protection system for the Vodňany water tank, designated as a national critical infrastructure element. The evaluation will be performed based on three probable attack scenarios; the aim of these would be poisoning the drinking water source and intoxication of the population of the nearby city or destruction of the water tank and the resulting cutting off of residents from a source of drinking water. To check the robustness of the water tank itself and its physical protection system as a part of an overall robustness of the water tank area, a new software — SATANO (Security Assessment Of Terrorist Attack In A Network Of Objects) will be used. It allows for modelling physical protection system objects onto 2D maps and then simulate custom attack scenarios. This process of quantitative evaluation of a system's protection level may be accepted as part of the risk management process which is required by European Council as well as various national regulations from all operators of critical infrastructure elements.
本文介绍了Vodňany水箱物理保护系统稳健性的用例评估,该水箱被指定为国家关键基础设施要素。评估将基于三种可能的攻击场景进行;这样做的目的是使饮用水源中毒,使附近城市的居民中毒,或者破坏水箱,从而切断居民的饮用水源。为了检查水箱本身及其物理保护系统作为水箱区域整体稳健性的一部分的稳健性,将使用一种新的软件- SATANO(对象网络恐怖袭击安全评估)。它允许将物理保护系统对象建模到2D地图上,然后模拟自定义攻击场景。系统保护水平的定量评估过程可以被接受为风险管理过程的一部分,这是欧洲理事会以及所有关键基础设施要素运营商的各种国家法规所要求的。
{"title":"Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructure","authors":"T. Loveček, Anton Siser, L. Mariš","doi":"10.1109/CCST.2017.8167811","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167811","url":null,"abstract":"The article presents a use case evaluation of the robustness of a physical protection system for the Vodňany water tank, designated as a national critical infrastructure element. The evaluation will be performed based on three probable attack scenarios; the aim of these would be poisoning the drinking water source and intoxication of the population of the nearby city or destruction of the water tank and the resulting cutting off of residents from a source of drinking water. To check the robustness of the water tank itself and its physical protection system as a part of an overall robustness of the water tank area, a new software — SATANO (Security Assessment Of Terrorist Attack In A Network Of Objects) will be used. It allows for modelling physical protection system objects onto 2D maps and then simulate custom attack scenarios. This process of quantitative evaluation of a system's protection level may be accepted as part of the risk management process which is required by European Council as well as various national regulations from all operators of critical infrastructure elements.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1