首页 > 最新文献

2017 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Principal component analysis for ear-based biometric verification 基于耳的生物特征验证主成分分析
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167843
David Querencias-Uceta, Belén Ríos-Sánchez, C. S. Ávila
Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear geometry-based biometric verification system oriented to recognition through mobile phones is presented and evaluated. Feature extraction is carried out by means of Principal Component Analysis and feature matching is performed by a distance-based classifier including Euclidean and Eigen distances. The evaluation has been made according to the specifications included in the ISO/IDE 19795 norm following a zero-effort falsification scenario. To this end, a database including ear images of different users has been captured using the camera of a smartphone. The obtained Equal Error Rate matches 1.11% when Euclidean distance is applied for feature comparison and 5.56% in the case of Eigendistance.
生物识别是一个活跃的研究领域,越来越多地与当前的技术相结合。因此,越来越多的人开始熟悉指纹或面部识别等生物识别技术。然而,有一些创新技术,如基于耳朵的生物识别技术,由于它们还处于研究的初始阶段,所以还不是很为人所知。本文提出并评估了一种基于耳朵几何的、面向手机识别的生物特征验证系统。通过主成分分析进行特征提取,并通过基于距离的分类器进行特征匹配,包括欧几里得距离和特征距离。评估是根据ISO/IDE 19795标准中包含的规范在零努力伪造情况下进行的。为此,利用智能手机的摄像头,建立了包含不同用户耳朵图像的数据库。得到的等错误率在欧氏距离下为1.11%,在特征距离下为5.56%。
{"title":"Principal component analysis for ear-based biometric verification","authors":"David Querencias-Uceta, Belén Ríos-Sánchez, C. S. Ávila","doi":"10.1109/CCST.2017.8167843","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167843","url":null,"abstract":"Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear geometry-based biometric verification system oriented to recognition through mobile phones is presented and evaluated. Feature extraction is carried out by means of Principal Component Analysis and feature matching is performed by a distance-based classifier including Euclidean and Eigen distances. The evaluation has been made according to the specifications included in the ISO/IDE 19795 norm following a zero-effort falsification scenario. To this end, a database including ear images of different users has been captured using the camera of a smartphone. The obtained Equal Error Rate matches 1.11% when Euclidean distance is applied for feature comparison and 5.56% in the case of Eigendistance.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Technologies to enable cyber deception 实现网络欺骗的技术
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167793
V. Urias, W. Stout, Jean-Luc Watson, C. Grim, L. Liebrock, Monzy Merza
Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these perimeter-planted security efforts ineffective in combating competent adversaries. In 2015 Gartner, Inc. examined the potential for organizations to use deception as a strategy for thwarting attackers and making it costlier for adversaries to engage in threat campaigns. In today's current research, there are a limited number of deception platforms (tools, etc.) that have successfully been shown to enable strategic deception in a computer network operations environment. Through a deception framework, we conjecture that deception platforms can aid and assist in deceiving the adversary by: obscuring the real target, devaluing information gathering, causing the adversary to waste time and resources, forcing the adversary to reveal advanced capabilities, exposing adversary intent, increasing the difficulty of attack planning, limiting the scope of the attack, and limiting the duration of a successful attack. The objective of this paper is to survey the technological trends in cyber deception research, identify gaps in the techniques, and provide research in the emergent environment. Current findings suggest that network deception tools are attracting the interest of researchers as a valuable security technique that can be implemented to learn more about the nature of cyber attacks; however, there are significant shortcomings in the current approaches and the ability to reason about the adversary.
计算机网络防御传统上是使用反动工具提供的,例如基于签名的检测器、白/黑名单、入侵检测/保护系统等。虽然事件检测/关联技术可以识别威胁,但这些威胁随后被手动处理,通常采用基于阻塞的响应(例如,阻塞)。随着威胁复杂性的增长,我们发现这些在周边部署的安全措施在打击有能力的对手方面是无效的。2015年,高德纳公司(Gartner, Inc.)研究了企业使用欺骗作为挫败攻击者的策略的可能性,并使对手参与威胁活动的成本更高。在目前的研究中,有有限数量的欺骗平台(工具等)已经成功地被证明能够在计算机网络操作环境中实现战略欺骗。通过欺骗框架,我们推测欺骗平台可以通过以下方式帮助和协助欺骗对手:模糊真实目标,贬低信息收集,导致对手浪费时间和资源,迫使对手透露先进能力,暴露对手意图,增加攻击计划的难度,限制攻击范围,限制成功攻击的持续时间。本文的目的是调查网络欺骗研究的技术趋势,找出技术上的差距,并在紧急环境中提供研究。目前的研究结果表明,网络欺骗工具作为一种有价值的安全技术正吸引着研究人员的兴趣,可以通过实施来更多地了解网络攻击的本质;然而,目前的方法和对对手进行推理的能力存在重大缺陷。
{"title":"Technologies to enable cyber deception","authors":"V. Urias, W. Stout, Jean-Luc Watson, C. Grim, L. Liebrock, Monzy Merza","doi":"10.1109/CCST.2017.8167793","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167793","url":null,"abstract":"Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these perimeter-planted security efforts ineffective in combating competent adversaries. In 2015 Gartner, Inc. examined the potential for organizations to use deception as a strategy for thwarting attackers and making it costlier for adversaries to engage in threat campaigns. In today's current research, there are a limited number of deception platforms (tools, etc.) that have successfully been shown to enable strategic deception in a computer network operations environment. Through a deception framework, we conjecture that deception platforms can aid and assist in deceiving the adversary by: obscuring the real target, devaluing information gathering, causing the adversary to waste time and resources, forcing the adversary to reveal advanced capabilities, exposing adversary intent, increasing the difficulty of attack planning, limiting the scope of the attack, and limiting the duration of a successful attack. The objective of this paper is to survey the technological trends in cyber deception research, identify gaps in the techniques, and provide research in the emergent environment. Current findings suggest that network deception tools are attracting the interest of researchers as a valuable security technique that can be implemented to learn more about the nature of cyber attacks; however, there are significant shortcomings in the current approaches and the ability to reason about the adversary.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123827976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Person authentication using nearest feature line embedding transformation and biased discriminant analysis 基于最近特征线嵌入变换和有偏判别分析的人物认证
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167858
Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan
Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.
智能手机上的个人认证(PA)在移动支付中起着至关重要的作用。当我们使用智能手机作为支付设备时,面部特征是最方便用户使用的生物特征,因为它内置了摄像头。本文提出了一种基于人脸特征的人脸识别方法,该方法将特征线嵌入(FLE)变换与有偏判别分析(BDA)相结合。由于训练样本较少,学习的判别能力受到限制。在特征空间中,将特征线视为两个训练样本之间的特征组合,无限模拟各种条件下可能出现的特征进行训练。在PA中,只使用正样本计算类内散点,使用BDA策略也使用负样本计算类间散点。与传统的两类分类和BDA问题相比,FLE与BDA相结合,获得了更好的降维变换。进一步训练支持向量机(SVM)分类器来判断查询样本是真实样本还是伪造样本。
{"title":"Person authentication using nearest feature line embedding transformation and biased discriminant analysis","authors":"Chen-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan","doi":"10.1109/CCST.2017.8167858","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167858","url":null,"abstract":"Personal authentication (PA) on smartphones plays the crucial role in mobile payment. Facial features are the most user-friendly biometric feature because of the build-in camera, when we use smartphones as the payment devices. In this study, a novel authenticated method is proposed for PA by integrating feature line embedding (FLE) transformation and biased discriminant analysis (BDA) by using facial features. Due to the few training samples, the discriminant power is limited for learning. In feature spaces, feature lines are regarded as the feature combination between two training samples and infinitely simulate the possible features of various conditions for training. In PA, only positive samples is used to calculate the within-class scatter, and the between class scatter is also calculated using negative samples by the BDA strategy. Compared with the traditional two-class classification and BDA problems, the FLE integrates with BDA to obtain a better dimension reduction transformation. A support vector machine (SVM) classifier is further trained to determine a query sample is a real or a forged sample.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ensuring information security by using Haskell's advanced type system 使用Haskell先进的类型系统,确保信息安全
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167844
M. Pirro, M. Conti, R. Lazzeretti
Protecting data confidentiality and integrity has become increasingly important in modern software. Sometimes, access control mechanisms come short and solutions on the application-level are needed. An approach can rely on enforcing information security using some features provided by certain programming languages. Several different solutions addressing this problem have been presented in literature, and entire new languages or libraries have been built from scratch. Some of them use type systems to let the compiler check for vulnerable code. In this way we are able to rule out those implementations which do not meet a certain security requirement. In this paper we use Haskell's type system to enforce three key properties of information security: non-interference and flexible declassification policies, strict input validation, and secure computations on untainted and trusted values. We present a functional lightweight library for applications with data integrity and confidentiality issues. Our contribute relies on a compile time enforcing of the aforementioned properties. Our library is wholly generalized and might be adapted for satisfying almost every security requirement.
保护数据的机密性和完整性在现代软件中变得越来越重要。有时,访问控制机制不足,需要应用程序级的解决方案。一种方法可以依赖于使用某些编程语言提供的某些特性来实施信息安全。文献中已经提出了解决这个问题的几种不同的解决方案,并且从头开始构建了全新的语言或库。其中一些使用类型系统让编译器检查易受攻击的代码。通过这种方式,我们能够排除那些不满足特定安全需求的实现。在本文中,我们使用Haskell的类型系统来实现信息安全的三个关键属性:不干扰和灵活的解密策略,严格的输入验证,以及对未污染和可信值的安全计算。我们为具有数据完整性和机密性问题的应用程序提供了一个功能轻量级库。我们的贡献依赖于上述属性的编译时强制执行。我们的库是完全一般化的,可以适应几乎所有的安全需求。
{"title":"Ensuring information security by using Haskell's advanced type system","authors":"M. Pirro, M. Conti, R. Lazzeretti","doi":"10.1109/CCST.2017.8167844","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167844","url":null,"abstract":"Protecting data confidentiality and integrity has become increasingly important in modern software. Sometimes, access control mechanisms come short and solutions on the application-level are needed. An approach can rely on enforcing information security using some features provided by certain programming languages. Several different solutions addressing this problem have been presented in literature, and entire new languages or libraries have been built from scratch. Some of them use type systems to let the compiler check for vulnerable code. In this way we are able to rule out those implementations which do not meet a certain security requirement. In this paper we use Haskell's type system to enforce three key properties of information security: non-interference and flexible declassification policies, strict input validation, and secure computations on untainted and trusted values. We present a functional lightweight library for applications with data integrity and confidentiality issues. Our contribute relies on a compile time enforcing of the aforementioned properties. Our library is wholly generalized and might be adapted for satisfying almost every security requirement.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of anomalies in surveillance scenarios using mixture models 使用混合模型检测监测场景中的异常情况
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167830
Adrián Tomé, L. Salgado
In this paper we present a robust and simple method for the detection of anomalies in surveillance scenarios. We use a “bottom-up” approach that avoids any object tracking, making the system suitable for anomaly detection in crowds. A robust optical flow method is used for the extraction of accurate spatio-temporal motion information, which allows to get simple but discriminative descriptors that are employed to train a Gaussian mixture model. We evaluate our system in a publicly available dataset, concluding that our method outperforms similar anomaly detection approaches but with a simpler model and low-sized descriptors.
在本文中,我们提出了一种鲁棒和简单的方法来检测监视场景中的异常。我们使用“自下而上”的方法,避免了任何对象跟踪,使系统适合于人群中的异常检测。采用鲁棒光流方法提取准确的时空运动信息,得到简单而具有判别性的描述子,用于训练高斯混合模型。我们在一个公开可用的数据集中评估了我们的系统,得出的结论是,我们的方法优于类似的异常检测方法,但使用更简单的模型和较小的描述符。
{"title":"Detection of anomalies in surveillance scenarios using mixture models","authors":"Adrián Tomé, L. Salgado","doi":"10.1109/CCST.2017.8167830","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167830","url":null,"abstract":"In this paper we present a robust and simple method for the detection of anomalies in surveillance scenarios. We use a “bottom-up” approach that avoids any object tracking, making the system suitable for anomaly detection in crowds. A robust optical flow method is used for the extraction of accurate spatio-temporal motion information, which allows to get simple but discriminative descriptors that are employed to train a Gaussian mixture model. We evaluate our system in a publicly available dataset, concluding that our method outperforms similar anomaly detection approaches but with a simpler model and low-sized descriptors.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring a statistical method for touchscreen swipe biometrics 探索一种用于触摸屏滑动生物识别的统计方法
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167823
Ada Pozo, Julian Fierrez, M. Martinez-Diaz, Javier Galbally, A. Morales
The great popularity of smartphones and the increase in their use in everyday applications has led to sensitive information being carried in them, such as our bank account details, passwords or emails. Motivated by the limited security of traditional systems (e.g. PIN codes, secret patterns), that can be easily broken, this work focuses on the analysis of users normal interaction with touchscreens as a means for active authentication. Given the frequency in which touch operations are performed, characteristic habits, like the strength, rhythm or angle used result in discriminative patterns that can be exploited to authenticate users. In the present work, we explore a statistical approach based on adapted Gaussian Mixture Models. The performance across different kinds of touch operations, reveals that some gestures hold more user-specific information and are more discriminative than others (in particular, horizontal swipes appear to be more discriminative than vertical ones). The experimental results show that touch biometrics have enough discriminability for person recognition and that they are a promising method for active authentication.
智能手机的普及及其在日常应用中使用的增加导致其中携带敏感信息,例如我们的银行账户详细信息,密码或电子邮件。由于传统系统(例如PIN码,秘密模式)的安全性有限,很容易被破坏,因此这项工作的重点是分析用户与触摸屏的正常交互,作为主动认证的一种手段。考虑到执行触摸操作的频率,使用的强度、节奏或角度等特征习惯会产生可用于验证用户身份的判别模式。在目前的工作中,我们探索了一种基于自适应高斯混合模型的统计方法。不同类型触摸操作的表现表明,一些手势包含更多用户特定信息,并且比其他手势更具区别性(特别是水平滑动似乎比垂直滑动更具区别性)。实验结果表明,触摸生物特征识别具有足够的识别能力,是一种很有前途的主动身份认证方法。
{"title":"Exploring a statistical method for touchscreen swipe biometrics","authors":"Ada Pozo, Julian Fierrez, M. Martinez-Diaz, Javier Galbally, A. Morales","doi":"10.1109/CCST.2017.8167823","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167823","url":null,"abstract":"The great popularity of smartphones and the increase in their use in everyday applications has led to sensitive information being carried in them, such as our bank account details, passwords or emails. Motivated by the limited security of traditional systems (e.g. PIN codes, secret patterns), that can be easily broken, this work focuses on the analysis of users normal interaction with touchscreens as a means for active authentication. Given the frequency in which touch operations are performed, characteristic habits, like the strength, rhythm or angle used result in discriminative patterns that can be exploited to authenticate users. In the present work, we explore a statistical approach based on adapted Gaussian Mixture Models. The performance across different kinds of touch operations, reveals that some gestures hold more user-specific information and are more discriminative than others (in particular, horizontal swipes appear to be more discriminative than vertical ones). The experimental results show that touch biometrics have enough discriminability for person recognition and that they are a promising method for active authentication.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy 为意大利阿西西的教皇大殿和圣方济各修道院提供的基于安全/安全/一般管理/访客服务的万物互联的新通信网络
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167795
Mauro Gambetti, F. Garzia, J. Vargas-Bonilla, David Ciarlariello, M. A. Ferrer-Ballester, Sergio Fusetti, M. Lombardi, S. Ramalingam, Mahalingam Ramasamy, S. Sacerdoti, Andrea Sdringola, Devi Thirupati, M. Faúndez-Zanuy
The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage status. Unique and complex cultural heritage sites, such as this, require a significant effort to ensure visitor security and safety. Along with such needs are cultural heritage preservation and protection as well as accessibility for visitors, with particular reference to visitors with disabilities, and for personnel normally present for site management, including the Friar's community. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. The purpose of this paper is to illustrate the methodology and show the results obtained from the study and the design of a new communication network for Internet of Everything based security/safety/general management and visitors' services of the Papal Basilica and Sacred Convent of Saint Francis in Assisi.
意大利阿西西的教皇大殿和圣方济各修道院共同代表了一个独特而具体的文化遗产,自公元1230年以来,圣方济各的遗体一直被安置在这里。每年有数百万来自世界各地的朝圣者和游客来此参观。公元2000年,它与周围地区的其他方济会遗址一起被联合国教科文组织列为世界遗产。像这样独特而复杂的文化遗产地,需要付出巨大的努力来确保游客的安全。伴随着这些需求的是文化遗产的保存和保护,以及游客的无障碍,特别是残疾人游客,以及包括修士社区在内的通常在场的现场管理人员。这些目标可以通过集成系统和创新技术来实现,例如万物互联(IoE),它可以连接人、物(移动终端、智能传感器、设备、执行器);可穿戴设备;等),数据/信息/知识和特定过程。本文的目的是说明方法,并展示从研究和设计一个新的通信网络中获得的结果,该网络用于基于亚西西教皇大殿和圣弗朗西斯圣修道院的安全/安全/一般管理和访客服务的万物互联。
{"title":"The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy","authors":"Mauro Gambetti, F. Garzia, J. Vargas-Bonilla, David Ciarlariello, M. A. Ferrer-Ballester, Sergio Fusetti, M. Lombardi, S. Ramalingam, Mahalingam Ramasamy, S. Sacerdoti, Andrea Sdringola, Devi Thirupati, M. Faúndez-Zanuy","doi":"10.1109/CCST.2017.8167795","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167795","url":null,"abstract":"The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage status. Unique and complex cultural heritage sites, such as this, require a significant effort to ensure visitor security and safety. Along with such needs are cultural heritage preservation and protection as well as accessibility for visitors, with particular reference to visitors with disabilities, and for personnel normally present for site management, including the Friar's community. These aims can be achieved using integrated systems and innovative technologies, such as Internet of Everything (IoE) which can connect people, things (mobile terminals, smart sensors, devices, actuators; wearable devices; etc.), data/information/knowledge and particular processes. The purpose of this paper is to illustrate the methodology and show the results obtained from the study and the design of a new communication network for Internet of Everything based security/safety/general management and visitors' services of the Papal Basilica and Sacred Convent of Saint Francis in Assisi.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding and granting android permissions: A user survey 理解和授予android权限:一项用户调查
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167834
Selvakumar Ramachandran, Andrea Dimitri, M. Galinium, Muhammad Tahir, Indirajith Viji Ananth, C. Schunck, M. Talamo
Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity to the users personal contacts. The implications on users' privacy and security are significant and therefore the users' ability to give informed consent is highly important. Previous work has identified low rates of user attention and comprehension to permission warnings and concluded that these fail to inform the majority of users. Here we focus on how users consider, interpret and react to differences in app permission information which is provided at three different instances of the app installation cycle: 1. Before installation in the Google Play Store 2. During the installation process 3. After installation in the Application Manager. The information provided in these instances varies considerably in its granularity and detail. For this purpose, an online survey was developed in which users were asked questions regarding the installation of a mirror app whose main functionality is to use the user facing camera of the phone to mirror the users face (i.e. display an image of the face) on the phone's screen. The survey participants were shown screen shots of the app description as presented in the Google Play Store as well as of the various permission lists as they appear on the screen of the phone. The questions focused on the respondents' perceptions and their hypothetical choices with regard to the installation of this app. Results show that the various presentations of permission information in Android versions KitKat or Lollipop cause concern and irritate a majority (51.67%) of users, especially those with some basic IT expertise. We conclude that the contextualization of app features and functionalities with the corresponding permissions needs to be improved especially for users with little IT expertise. Further user permission information should be made available at different and consistent levels of granularity.
每当用户在他们的智能设备上安装一个带有Android KitKat或Lollipop操作系统的新应用程序时,他们都被要求授予应用程序(应用程序)提供商访问设备功能的权限,从数据存储到设备位置,从设备身份到用户的个人联系人。对用户隐私和安全的影响是显著的,因此用户给予知情同意的能力是非常重要的。以前的工作已经确定了用户对许可警告的关注和理解率很低,并得出结论,这些警告不能通知大多数用户。在这里,我们关注用户如何考虑、解释和应对应用程序许可信息的差异,这些信息是在应用程序安装周期的三个不同实例中提供的:b谷歌Play Store安装前在安装过程中。在应用程序管理器中安装后。这些实例中提供的信息在粒度和细节上差别很大。为此,我们开展了一项在线调查,向用户询问有关安装镜像应用程序的问题,该应用程序的主要功能是使用手机的面向用户的摄像头在手机屏幕上镜像用户的脸(即显示面部图像)。研究人员向调查参与者展示了谷歌Play Store中应用描述的屏幕截图,以及出现在手机屏幕上的各种许可列表。问题集中在受访者对安装该应用程序的看法和假设选择上。结果表明,Android版本KitKat或Lollipop中权限信息的各种呈现引起了大多数(51.67%)用户的关注和愤怒,特别是那些具有一些基本IT专业知识的用户。我们的结论是,应用程序特性和功能的上下文化与相应的权限需要改进,特别是对于很少有IT专业知识的用户。应该在不同且一致的粒度级别上提供进一步的用户权限信息。
{"title":"Understanding and granting android permissions: A user survey","authors":"Selvakumar Ramachandran, Andrea Dimitri, M. Galinium, Muhammad Tahir, Indirajith Viji Ananth, C. Schunck, M. Talamo","doi":"10.1109/CCST.2017.8167834","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167834","url":null,"abstract":"Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity to the users personal contacts. The implications on users' privacy and security are significant and therefore the users' ability to give informed consent is highly important. Previous work has identified low rates of user attention and comprehension to permission warnings and concluded that these fail to inform the majority of users. Here we focus on how users consider, interpret and react to differences in app permission information which is provided at three different instances of the app installation cycle: 1. Before installation in the Google Play Store 2. During the installation process 3. After installation in the Application Manager. The information provided in these instances varies considerably in its granularity and detail. For this purpose, an online survey was developed in which users were asked questions regarding the installation of a mirror app whose main functionality is to use the user facing camera of the phone to mirror the users face (i.e. display an image of the face) on the phone's screen. The survey participants were shown screen shots of the app description as presented in the Google Play Store as well as of the various permission lists as they appear on the screen of the phone. The questions focused on the respondents' perceptions and their hypothetical choices with regard to the installation of this app. Results show that the various presentations of permission information in Android versions KitKat or Lollipop cause concern and irritate a majority (51.67%) of users, especially those with some basic IT expertise. We conclude that the contextualization of app features and functionalities with the corresponding permissions needs to be improved especially for users with little IT expertise. Further user permission information should be made available at different and consistent levels of granularity.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and tagging 使用程序切片、仪器和标记的混合方法检测Android应用程序中的信息泄漏
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167856
Luis Menezes, Roland Wismüller
With the increasingly amount of private information stored in mobile devices, the need for more secure ways to detect, control and avoid malicious behaviors has become higher. The too coarse-grained permission system implemented in the Android platform does not cover problems such as preventing an application to send a previously acquired information over SMS or Internet to another device or server. This problem arises because the permission systems implemented in the Android platform works only in the access control and does not handle how the acquired information is handled by the application. In order to enhance detection and awareness of such unwanted information flows, we propose a hybrid information-flow analysis, known as FlowSlicer, that mixes the benefits of static and dynamic analysis, using slicing on a system dependency graph and instrumenting statements found to be important. In order to analyse properly the obtained results, tests regarding overhead and also leak detection rate were performed in the applications present in the category AndroidSpecific from the DroidBench repository, since FlowSlicer intends to work mainly for applications designed for the Android platform. The results show that FlowSlicer is effective in detecting leaks, detects all leaks present in the evaluated applications, and only includes an imperceptible overhead to the instrumented application. The obtained results also show how both static and dynamic analysis work together and help each other in their disadvantages: static analysis helps dynamic analysis by reducing the set of statements to be analysed and dynamic analysis helps to prove false positives from static analysis not to be true.
随着移动设备中存储的私人信息越来越多,对检测、控制和避免恶意行为的更安全方法的需求也越来越高。Android平台中实现的过于粗粒度的权限系统无法解决诸如阻止应用程序通过SMS或Internet向另一个设备或服务器发送先前获取的信息之类的问题。出现这个问题是因为Android平台中实现的权限系统只在访问控制中工作,而不处理应用程序如何处理获取的信息。为了增强对这些不需要的信息流的检测和意识,我们提出了一种混合信息流分析,称为FlowSlicer,它混合了静态和动态分析的优点,在系统依赖关系图上使用切片,并对发现重要的语句进行检测。为了正确分析所获得的结果,在DroidBench存储库中存在的AndroidSpecific类别中的应用程序中执行了有关开销和泄漏检测率的测试,因为FlowSlicer打算主要用于为Android平台设计的应用程序。结果表明,FlowSlicer在检测泄漏方面是有效的,可以检测到评估应用程序中存在的所有泄漏,并且只包括对测量应用程序的难以察觉的开销。获得的结果还显示了静态分析和动态分析如何协同工作,并在各自的缺点上相互帮助:静态分析通过减少要分析的语句集来帮助动态分析,动态分析有助于证明静态分析的误报不正确。
{"title":"Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and tagging","authors":"Luis Menezes, Roland Wismüller","doi":"10.1109/CCST.2017.8167856","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167856","url":null,"abstract":"With the increasingly amount of private information stored in mobile devices, the need for more secure ways to detect, control and avoid malicious behaviors has become higher. The too coarse-grained permission system implemented in the Android platform does not cover problems such as preventing an application to send a previously acquired information over SMS or Internet to another device or server. This problem arises because the permission systems implemented in the Android platform works only in the access control and does not handle how the acquired information is handled by the application. In order to enhance detection and awareness of such unwanted information flows, we propose a hybrid information-flow analysis, known as FlowSlicer, that mixes the benefits of static and dynamic analysis, using slicing on a system dependency graph and instrumenting statements found to be important. In order to analyse properly the obtained results, tests regarding overhead and also leak detection rate were performed in the applications present in the category AndroidSpecific from the DroidBench repository, since FlowSlicer intends to work mainly for applications designed for the Android platform. The results show that FlowSlicer is effective in detecting leaks, detects all leaks present in the evaluated applications, and only includes an imperceptible overhead to the instrumented application. The obtained results also show how both static and dynamic analysis work together and help each other in their disadvantages: static analysis helps dynamic analysis by reducing the set of statements to be analysed and dynamic analysis helps to prove false positives from static analysis not to be true.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132990105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructure 作为斯洛伐克关键基础设施一部分的自来水物理保护系统稳健性评估用例
Pub Date : 2017-10-01 DOI: 10.1109/CCST.2017.8167811
T. Loveček, Anton Siser, L. Mariš
The article presents a use case evaluation of the robustness of a physical protection system for the Vodňany water tank, designated as a national critical infrastructure element. The evaluation will be performed based on three probable attack scenarios; the aim of these would be poisoning the drinking water source and intoxication of the population of the nearby city or destruction of the water tank and the resulting cutting off of residents from a source of drinking water. To check the robustness of the water tank itself and its physical protection system as a part of an overall robustness of the water tank area, a new software — SATANO (Security Assessment Of Terrorist Attack In A Network Of Objects) will be used. It allows for modelling physical protection system objects onto 2D maps and then simulate custom attack scenarios. This process of quantitative evaluation of a system's protection level may be accepted as part of the risk management process which is required by European Council as well as various national regulations from all operators of critical infrastructure elements.
本文介绍了Vodňany水箱物理保护系统稳健性的用例评估,该水箱被指定为国家关键基础设施要素。评估将基于三种可能的攻击场景进行;这样做的目的是使饮用水源中毒,使附近城市的居民中毒,或者破坏水箱,从而切断居民的饮用水源。为了检查水箱本身及其物理保护系统作为水箱区域整体稳健性的一部分的稳健性,将使用一种新的软件- SATANO(对象网络恐怖袭击安全评估)。它允许将物理保护系统对象建模到2D地图上,然后模拟自定义攻击场景。系统保护水平的定量评估过程可以被接受为风险管理过程的一部分,这是欧洲理事会以及所有关键基础设施要素运营商的各种国家法规所要求的。
{"title":"Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructure","authors":"T. Loveček, Anton Siser, L. Mariš","doi":"10.1109/CCST.2017.8167811","DOIUrl":"https://doi.org/10.1109/CCST.2017.8167811","url":null,"abstract":"The article presents a use case evaluation of the robustness of a physical protection system for the Vodňany water tank, designated as a national critical infrastructure element. The evaluation will be performed based on three probable attack scenarios; the aim of these would be poisoning the drinking water source and intoxication of the population of the nearby city or destruction of the water tank and the resulting cutting off of residents from a source of drinking water. To check the robustness of the water tank itself and its physical protection system as a part of an overall robustness of the water tank area, a new software — SATANO (Security Assessment Of Terrorist Attack In A Network Of Objects) will be used. It allows for modelling physical protection system objects onto 2D maps and then simulate custom attack scenarios. This process of quantitative evaluation of a system's protection level may be accepted as part of the risk management process which is required by European Council as well as various national regulations from all operators of critical infrastructure elements.","PeriodicalId":371622,"journal":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1