首页 > 最新文献

2014 IEEE Eighth International Conference on Software Security and Reliability-Companion最新文献

英文 中文
FRanC: A Ranking Framework for the Prioritization of Software Maintenance FRanC:软件维护优先级排序框架
D. Chaudhari, Mohammad Zulkernine, Komminist Weldemariam
Software components are meant to be reusable and flexible by design. These characteristics and others continue attracting software developers to adapt a component (typically designed elsewhere) into their systems. However, software components are also believed to be most vulnerable to reliability and security problems due to the existence of non-obvious faults. In this paper, we present a framework that can help software system developers in detecting and ranking components failures systematically. Our approach can allow monitoring critical components within a software system under instrumentation and detecting failures based on specifications. Furthermore, the approach uses failure data and input from developers and rank the components accordingly. A prototype tool is designed along with a number of failure scenarios to detect specific failure types within a component of software system. We conducted an experimental evaluation to assess the effectiveness of the proposed approach and prototype tool and to measure its performance overhead. Our experimental results show that the approach can benefit system developers by prioritizing the maintenance of components with a minimal overhead.
软件组件在设计上是可重用和灵活的。这些特征和其他特征继续吸引软件开发人员将组件(通常是在其他地方设计的)调整到他们的系统中。然而,由于存在非明显的故障,软件组件也被认为是最容易受到可靠性和安全性问题的影响。在本文中,我们提出了一个框架,可以帮助软件系统开发人员系统地检测和排序组件故障。我们的方法允许在仪器下监视软件系统中的关键组件,并根据规范检测故障。此外,该方法使用来自开发人员的故障数据和输入,并相应地对组件进行排序。原型工具是与许多故障场景一起设计的,用于检测软件系统组件中的特定故障类型。我们进行了实验评估,以评估所提出的方法和原型工具的有效性,并测量其性能开销。我们的实验结果表明,该方法能够以最小的开销优先维护组件,从而使系统开发人员受益。
{"title":"FRanC: A Ranking Framework for the Prioritization of Software Maintenance","authors":"D. Chaudhari, Mohammad Zulkernine, Komminist Weldemariam","doi":"10.1109/SERE-C.2014.20","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.20","url":null,"abstract":"Software components are meant to be reusable and flexible by design. These characteristics and others continue attracting software developers to adapt a component (typically designed elsewhere) into their systems. However, software components are also believed to be most vulnerable to reliability and security problems due to the existence of non-obvious faults. In this paper, we present a framework that can help software system developers in detecting and ranking components failures systematically. Our approach can allow monitoring critical components within a software system under instrumentation and detecting failures based on specifications. Furthermore, the approach uses failure data and input from developers and rank the components accordingly. A prototype tool is designed along with a number of failure scenarios to detect specific failure types within a component of software system. We conducted an experimental evaluation to assess the effectiveness of the proposed approach and prototype tool and to measure its performance overhead. Our experimental results show that the approach can benefit system developers by prioritizing the maintenance of components with a minimal overhead.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting DoS Attacks on Notification Services 检测通知服务的DoS攻击
J. J. Li, T. Savor
A notification service alerts a large number of recipients of important or emergency events in a timely manner. A Denial of Service (DoS) attack inserts unnecessary traffic to slow down or choke the notification service. A challenge of detecting DoS attacks lies in distinguishing them from temporary surges in normal traffic. This paper proposes an escalation hierarchy to detect DoS attacks by monitoring performance degradations at various levels. Our analysis shows the effectiveness of the approach. Further trials are underway.
通知服务是将重要事件或紧急事件及时通知给大量收件人的服务。拒绝服务(DoS)攻击插入不必要的流量以减慢或阻塞通知服务。检测DoS攻击的一个挑战在于将它们与正常流量中的临时激增区分开来。本文提出了一种升级层次结构,通过监测不同级别的性能下降来检测DoS攻击。我们的分析表明了这种方法的有效性。进一步的试验正在进行中。
{"title":"Detecting DoS Attacks on Notification Services","authors":"J. J. Li, T. Savor","doi":"10.1109/SERE-C.2014.38","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.38","url":null,"abstract":"A notification service alerts a large number of recipients of important or emergency events in a timely manner. A Denial of Service (DoS) attack inserts unnecessary traffic to slow down or choke the notification service. A challenge of detecting DoS attacks lies in distinguishing them from temporary surges in normal traffic. This paper proposes an escalation hierarchy to detect DoS attacks by monitoring performance degradations at various levels. Our analysis shows the effectiveness of the approach. Further trials are underway.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116634655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Gen2v2-Based Mutual Authentication Schemes 新的基于gen2v2的相互认证方案
H. Chien
Since EPCglobal announced Class 1 Generation 2 tag (Gen2) as the standard tag for supply chain management applications and Gen2 was ratified as an ISO 18000-6C standard, much effort has been devoted to promoting various Gen2-based applications and improving the security of Gen2. However, as many Gen2-based applications go beyond the original supply chain management and the security requirements of these applications could not be fulfilled without modifying the original Gen2 standards, EPC Global recently (2013/11) announced the revised Gen2 standard-called Gen2 version 2 (Gen2v2 for short), Gen2v2 includes several new security and file management features to fit various possible application requirements. Inspired by these new features, Engels et al. proposed two Gen2v2-based mutual authentication schemes. In this paper, we cryptanalyze the protocols, show the security weaknesses, and proposed our improvements.
自EPCglobal宣布将Class 1 Generation 2 tag (Gen2)作为供应链管理应用的标准标签,并批准Gen2为ISO 18000-6C标准以来,EPCglobal一直致力于推广各种基于Gen2的应用并提高Gen2的安全性。然而,由于许多基于Gen2的应用超出了原有的供应链管理,并且这些应用的安全需求无法在不修改原始Gen2标准的情况下得到满足,EPC Global最近(2013/11)宣布了修订后的Gen2标准-称为Gen2 version 2(简称Gen2v2), Gen2v2包含了几个新的安全和文件管理功能,以适应各种可能的应用需求。受这些新特性的启发,Engels等人提出了两种基于gen2v2的相互认证方案。本文对协议进行了密码分析,指出了协议的安全弱点,并提出了改进方案。
{"title":"New Gen2v2-Based Mutual Authentication Schemes","authors":"H. Chien","doi":"10.1109/SERE-C.2014.26","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.26","url":null,"abstract":"Since EPCglobal announced Class 1 Generation 2 tag (Gen2) as the standard tag for supply chain management applications and Gen2 was ratified as an ISO 18000-6C standard, much effort has been devoted to promoting various Gen2-based applications and improving the security of Gen2. However, as many Gen2-based applications go beyond the original supply chain management and the security requirements of these applications could not be fulfilled without modifying the original Gen2 standards, EPC Global recently (2013/11) announced the revised Gen2 standard-called Gen2 version 2 (Gen2v2 for short), Gen2v2 includes several new security and file management features to fit various possible application requirements. Inspired by these new features, Engels et al. proposed two Gen2v2-based mutual authentication schemes. In this paper, we cryptanalyze the protocols, show the security weaknesses, and proposed our improvements.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift 存在概念漂移的部分标记恶意Web流量分类
Goce Anastasovski, K. Goseva-Popstojanova
Attacks to Web systems have shown an increasing trend in the recent past. A contributing factor to this trend is the deployment of Web 2.0 technologies. While work related to characterization and classification of malicious Web traffic using supervised learning exists, little work has been done using semi-supervised learning with partially labeled data. In this paper an incremental semi-supervised algorithm (CSL-Stream) is used to classify malicious Web traffic to multiple classes, as well as to analyze the concept drift and concept evolution phenomena. The work is based on data collected in duration of nine months by a high-interaction honeypot running Web 2.0 applications. The results showed that on completely labeled data semi-supervised learning performed only slightly worse than the supervised learning algorithm. More importantly, multiclass classification of the partially labeled malicious Web traffic (i.e., 50% or 25% labeled sessions) was almost as good as the classification of completely labeled data.
近年来,针对Web系统的攻击呈现出日益增长的趋势。促成这一趋势的一个因素是Web 2.0技术的部署。虽然存在使用监督学习对恶意Web流量进行表征和分类的相关工作,但使用半监督学习对部分标记数据进行的工作很少。本文采用增量式半监督算法(CSL-Stream)对恶意Web流量进行多类分类,并对概念漂移和概念演化现象进行分析。这项工作基于运行Web 2.0应用程序的高交互性蜜罐在长达9个月的时间内收集的数据。结果表明,在完全标记数据上,半监督学习算法的表现仅略差于监督学习算法。更重要的是,对部分标记的恶意Web流量(即50%或25%标记的会话)进行多类分类几乎与对完全标记的数据进行分类一样好。
{"title":"Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift","authors":"Goce Anastasovski, K. Goseva-Popstojanova","doi":"10.1109/SERE-C.2014.31","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.31","url":null,"abstract":"Attacks to Web systems have shown an increasing trend in the recent past. A contributing factor to this trend is the deployment of Web 2.0 technologies. While work related to characterization and classification of malicious Web traffic using supervised learning exists, little work has been done using semi-supervised learning with partially labeled data. In this paper an incremental semi-supervised algorithm (CSL-Stream) is used to classify malicious Web traffic to multiple classes, as well as to analyze the concept drift and concept evolution phenomena. The work is based on data collected in duration of nine months by a high-interaction honeypot running Web 2.0 applications. The results showed that on completely labeled data semi-supervised learning performed only slightly worse than the supervised learning algorithm. More importantly, multiclass classification of the partially labeled malicious Web traffic (i.e., 50% or 25% labeled sessions) was almost as good as the classification of completely labeled data.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems 嵌入式实时系统中的虚拟机迁移容错技术
Stefan Grösbrink
Virtualization's architectural abstraction and encapsulation of guest systems in virtual machines facilitate migration, but existing real-time virtualization solutions are characterized by a static mapping of virtual machines to processors. This work studies migration of virtual machines with real-time constraints on homogeneous multiprocessor architectures as a service restoration in response to hardware faults. The migration policy respects real-time requirements and minimizes and predicts deadline misses based on a preceding comparison of downtime caused by the migration and slack-based computation of the virtual machine's maximum affordable downtime. The distributed design is characterized by a communication between the paravirtualized operating system and the hypervisor in order to provide the required scheduling information. The overhead regarding memory footprint, execution times, and paravirtualization effort is analyzed. The evaluation identifies ranges for virtual machine size and timing characteristics for which the approach is feasible. A reliability analysis based on a combinatorial model is used to quantify the impact of migration on reliability.
虚拟化的架构抽象和虚拟机中来宾系统的封装促进了迁移,但是现有的实时虚拟化解决方案的特点是虚拟机到处理器的静态映射。本工作研究了在同构多处理器架构下具有实时约束的虚拟机迁移作为硬件故障响应的服务恢复。迁移策略尊重实时需求,并根据先前迁移和基于空闲的虚拟机最大可承受停机时间的计算所导致的停机时间的比较,最大限度地减少和预测截止日期。分布式设计的特点是在半虚拟化的操作系统和管理程序之间进行通信,以提供所需的调度信息。分析了有关内存占用、执行时间和半虚拟化工作的开销。评估确定了该方法可行的虚拟机大小和定时特征的范围。采用基于组合模型的可靠性分析来量化迁移对可靠性的影响。
{"title":"Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems","authors":"Stefan Grösbrink","doi":"10.1109/SERE-C.2014.16","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.16","url":null,"abstract":"Virtualization's architectural abstraction and encapsulation of guest systems in virtual machines facilitate migration, but existing real-time virtualization solutions are characterized by a static mapping of virtual machines to processors. This work studies migration of virtual machines with real-time constraints on homogeneous multiprocessor architectures as a service restoration in response to hardware faults. The migration policy respects real-time requirements and minimizes and predicts deadline misses based on a preceding comparison of downtime caused by the migration and slack-based computation of the virtual machine's maximum affordable downtime. The distributed design is characterized by a communication between the paravirtualized operating system and the hypervisor in order to provide the required scheduling information. The overhead regarding memory footprint, execution times, and paravirtualization effort is analyzed. The evaluation identifies ranges for virtual machine size and timing characteristics for which the approach is feasible. A reliability analysis based on a combinatorial model is used to quantify the impact of migration on reliability.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Defending ROP Attacks Using Basic Block Level Randomization 使用基本块级随机化防御ROP攻击
Xun Zhan, Tao Zheng, Shixiang Gao
Code reuse attacks such as return-oriented programming, one of the most powerful threats to software system, rely on the absolute address of instructions. Therefore, address space randomization should be an effective defending method. However, current randomization techniques either are lack of enough entropy or have significant time or space overhead. In this paper, we present a novel fine-grained randomization technique at basic block level. In contrast to previous work, our technique dealt with critical technical challenges including indirect branches, callbacks and position independent codes properly at least cost. We implement an efficient prototype randomization system which supports Linux ELF file format and x86 architecture. Our evaluation demonstrated that it can defend ROP attacks with tiny performance overhead (4% on average) successfully.
代码重用攻击,如面向返回的编程,是对软件系统最强大的威胁之一,依赖于指令的绝对地址。因此,地址空间随机化应该是一种有效的防御方法。然而,当前的随机化技术要么缺乏足够的熵,要么有大量的时间或空间开销。在本文中,我们提出了一种新的基本块级细粒度随机化技术。与以前的工作相比,我们的技术处理了关键的技术挑战,包括间接分支、回调和位置独立代码,成本最低。我们实现了一个支持Linux ELF文件格式和x86架构的高效原型随机化系统。我们的评估表明,它可以成功地以很小的性能开销(平均4%)防御ROP攻击。
{"title":"Defending ROP Attacks Using Basic Block Level Randomization","authors":"Xun Zhan, Tao Zheng, Shixiang Gao","doi":"10.1109/SERE-C.2014.28","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.28","url":null,"abstract":"Code reuse attacks such as return-oriented programming, one of the most powerful threats to software system, rely on the absolute address of instructions. Therefore, address space randomization should be an effective defending method. However, current randomization techniques either are lack of enough entropy or have significant time or space overhead. In this paper, we present a novel fine-grained randomization technique at basic block level. In contrast to previous work, our technique dealt with critical technical challenges including indirect branches, callbacks and position independent codes properly at least cost. We implement an efficient prototype randomization system which supports Linux ELF file format and x86 architecture. Our evaluation demonstrated that it can defend ROP attacks with tiny performance overhead (4% on average) successfully.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Anomaly Detection Module for Firefox OS Firefox操作系统的异常检测模块
Borting Chen, Ming-Wei Shih, Yu-Lun Huang
Firefox OS, a new Web-based OS developed by Mozilla mainly for mobile platforms, is designed to realize the "Boot to the Web" concept for the open Web. It supports users booting to the network directly, launching remote applications and accessing remote data with the standard Web technologies. Although Firefox OS has adopted several mechanisms to enhance its security, its current design is lack of a mechanism to detect 1) applications calling Web API with unusual frequency, and 2) applications consuming abnormal amount of resources. In this paper, we propose an anomaly detection module which takes the system resource usage and the amount of inter-process communication as the inputs to detect whether the system has an anomaly. We also conduct several experiments to examine the ability of the proposed module. The results show that detection accuracy of our module is 0% in false negative rate and 12.5% in false positive rate.
Firefox OS是Mozilla为移动平台开发的一款基于Web的新操作系统,旨在实现面向开放Web的“Boot to the Web”理念。它支持用户直接引导到网络,启动远程应用程序,并使用标准的Web技术访问远程数据。尽管Firefox OS采用了几种机制来增强其安全性,但其目前的设计缺乏一种机制来检测1)异常频率调用Web API的应用程序,以及2)消耗异常数量资源的应用程序。本文提出了一种以系统资源使用情况和进程间通信量为输入来检测系统是否存在异常的异常检测模块。我们还进行了几个实验来检验所提出的模块的能力。结果表明,该模块的假阴性检测准确率为0%,假阳性检测准确率为12.5%。
{"title":"An Anomaly Detection Module for Firefox OS","authors":"Borting Chen, Ming-Wei Shih, Yu-Lun Huang","doi":"10.1109/SERE-C.2014.36","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.36","url":null,"abstract":"Firefox OS, a new Web-based OS developed by Mozilla mainly for mobile platforms, is designed to realize the \"Boot to the Web\" concept for the open Web. It supports users booting to the network directly, launching remote applications and accessing remote data with the standard Web technologies. Although Firefox OS has adopted several mechanisms to enhance its security, its current design is lack of a mechanism to detect 1) applications calling Web API with unusual frequency, and 2) applications consuming abnormal amount of resources. In this paper, we propose an anomaly detection module which takes the system resource usage and the amount of inter-process communication as the inputs to detect whether the system has an anomaly. We also conduct several experiments to examine the ability of the proposed module. The results show that detection accuracy of our module is 0% in false negative rate and 12.5% in false positive rate.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130832107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS 基于PARADIS的移动设备识别MAC协议安全性分析
Niansheng Liu, H. Dai, Donghui Guo
Authenticating wireless devices based on PARADIS technique draws increasing research interest recently, providing security access services in wireless networks. This paper provides an overview of various schemes for PARADIS identification using physical layer characteristics. Firstly, this work systematizes the existing knowledge on this topic for a better understanding of PARADIS device identification, its implications on the analysis and design of security solutions in wireless mobile networks, and possible applications. Secondly, we review the development progress of PARADIS identification techniques, discuss the merits and demerits of existing PARADIS identification schemes and provide a summary of the current state of the art. Moreover, we propose a new authentication scheme based on PRARDIS and discuss its security and feasibility in the SAE/LTE application. We also highlight the open problems of PRARDIS and motivate future works.
基于PARADIS技术的无线设备认证技术为无线网络提供安全接入服务,近年来引起了越来越多的研究兴趣。本文概述了利用物理层特征进行PARADIS识别的各种方案。首先,本工作系统化了关于该主题的现有知识,以便更好地理解PARADIS设备识别,其对无线移动网络安全解决方案的分析和设计的影响,以及可能的应用。其次,我们回顾了PARADIS识别技术的发展进展,讨论了现有的PARADIS识别方案的优缺点,并对目前的技术状况进行了总结。此外,我们提出了一种新的基于PRARDIS的认证方案,并讨论了其在SAE/LTE应用中的安全性和可行性。我们还强调了PRARDIS的开放性问题,并激发了未来的工作。
{"title":"Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS","authors":"Niansheng Liu, H. Dai, Donghui Guo","doi":"10.1109/SERE-C.2014.45","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.45","url":null,"abstract":"Authenticating wireless devices based on PARADIS technique draws increasing research interest recently, providing security access services in wireless networks. This paper provides an overview of various schemes for PARADIS identification using physical layer characteristics. Firstly, this work systematizes the existing knowledge on this topic for a better understanding of PARADIS device identification, its implications on the analysis and design of security solutions in wireless mobile networks, and possible applications. Secondly, we review the development progress of PARADIS identification techniques, discuss the merits and demerits of existing PARADIS identification schemes and provide a summary of the current state of the art. Moreover, we propose a new authentication scheme based on PRARDIS and discuss its security and feasibility in the SAE/LTE application. We also highlight the open problems of PRARDIS and motivate future works.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Light-Weight Software Environment for Confining Android Malware 用于限制Android恶意软件的轻量级软件环境
Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin
Mobile devices are becoming increasingly general-purpose, and therefore the physical boundary used to separate important resources disappears. As a result, malicious applications (apps) get chances to abuse resources that are available on the mobile platform. In this paper, we propose resource virtualization as a security mechanism for the Android system to strengthen the physical barrier between many types of resources and confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of these apps. We implement a system prototype, RVL, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign Android apps.
移动设备正变得越来越通用,因此用于分离重要资源的物理边界消失了。因此,恶意应用程序(app)有机会滥用移动平台上可用的资源。本文提出将资源虚拟化作为Android系统的一种安全机制,加强多种资源之间的物理屏障,限制滥用资源的Android应用程序。移动设备上的物理资源被虚拟化到不同的虚拟视图中,用于选定的Android应用程序。资源虚拟化模拟了Android资源的部分但一致的虚拟视图。因此,它不仅可以有效地限制滥用资源的应用程序,而且可以保证这些应用程序的可用性。我们实现了一个系统原型,RVL,并用各种类型的实际应用程序对其进行评估。我们的结果证明了它对恶意Android应用程序的有效性,以及它对良性Android应用程序的兼容性和可用性。
{"title":"A Light-Weight Software Environment for Confining Android Malware","authors":"Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin","doi":"10.1109/SERE-C.2014.34","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.34","url":null,"abstract":"Mobile devices are becoming increasingly general-purpose, and therefore the physical boundary used to separate important resources disappears. As a result, malicious applications (apps) get chances to abuse resources that are available on the mobile platform. In this paper, we propose resource virtualization as a security mechanism for the Android system to strengthen the physical barrier between many types of resources and confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of these apps. We implement a system prototype, RVL, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign Android apps.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices 超越可见性:在移动设备上实现高效可用安全的用户认证的四向融合
F. Rahman, Md Osman Gani, G. Ahsan, Sheikh Iqbal Ahamed
Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for authentication. This system silently does authentication using location traces and gait pattern of its user. If the silent authentication fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based authentication technique can be useful for numerous real life scenarios where mobile device security is important.
在当今的计算机、移动和基于技术的系统中,安全性和可用性在成功中起着重要作用。在这些系统中,由于采取了高安全性的措施,安全得到了更高的优先级,而忽略了系统可能导致不可用的事实。然而,日常技术用户需要一个可用且安全的系统。在本文中,我们提出了一种新的移动系统可用性安全方法,即移动系统既可用又安全。传统的移动设备身份验证技术不考虑用户生物特征、环境信息和普适性系统中传感器提供的信息的组合。在本文中,我们提出了一种四路融合的用户认证技术,以提高移动设备的可用安全性。在这种方法中,用户不需要记住任何字母数字密码。使用位置痕迹、步态模式、用户情感和图像上下文作为认证的度量。该系统使用用户的位置痕迹和步态模式静默地进行身份验证。如果静默认证失败,则系统根据用户的情感序列和用户先前存储的图像上下文对其用户进行身份验证。我们提出的基于融合的身份验证技术对于移动设备安全性很重要的许多现实场景都很有用。
{"title":"Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices","authors":"F. Rahman, Md Osman Gani, G. Ahsan, Sheikh Iqbal Ahamed","doi":"10.1109/SERE-C.2014.30","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.30","url":null,"abstract":"Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for authentication. This system silently does authentication using location traces and gait pattern of its user. If the silent authentication fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based authentication technique can be useful for numerous real life scenarios where mobile device security is important.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1