首页 > 最新文献

Proceedings of the Third Central European Cybersecurity Conference最新文献

英文 中文
Cybercrime victimization and seeking help: A survey of students in Slovenia 网络犯罪受害和寻求帮助:斯洛文尼亚学生的调查
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360731
Kaja Prislan, Igor Bernik, Gorazd Meško, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec
Most cyberspace users fell victim to some cybercrime. This poster reports on a survey of students conducted to provide an overview of cybercrime victimization and related help-seeking behaviors. The results suggest that unwelcome private messages with sexual content or requests, infections with a virus, unauthorized access to online accounts, and offensive and hostile messages were most common cybercrimes. Respondents would most often turn to their friends, the police, and family members for help.
大多数网络用户都是网络犯罪的受害者。这张海报报告了对学生进行的一项调查,以提供网络犯罪受害者和相关求助行为的概述。结果表明,带有性内容或性要求的不受欢迎的私人信息、感染病毒、未经授权访问在线账户以及攻击性和敌意信息是最常见的网络犯罪。受访者通常会向他们的朋友、警察和家人求助。
{"title":"Cybercrime victimization and seeking help: A survey of students in Slovenia","authors":"Kaja Prislan, Igor Bernik, Gorazd Meško, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec","doi":"10.1145/3360664.3360731","DOIUrl":"https://doi.org/10.1145/3360664.3360731","url":null,"abstract":"Most cyberspace users fell victim to some cybercrime. This poster reports on a survey of students conducted to provide an overview of cybercrime victimization and related help-seeking behaviors. The results suggest that unwelcome private messages with sexual content or requests, infections with a virus, unauthorized access to online accounts, and offensive and hostile messages were most common cybercrimes. Respondents would most often turn to their friends, the police, and family members for help.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does 比特币的采用:诈骗和匿名可能并不重要,但对比特币安全性的信任至关重要
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360679
Aleksander Murko, Simon L. R. Vrhovec
Bitcoin is the most successful cryptocurrency with more than half of the market capitalization of all more than 2,000 currently existing cryptocurrencies. In recent years, there have been several high-profile hacks and scams that resulted in billions of stolen funds. In this paper, we focus on the impact of Bitcoin cybersecurity and privacy characteristics on its adoption. A survey (N = 152) has been conducted among users and non-users of Bitcoin in Slovenia to test the proposed research model. The results suggest that in addition to known factors (i.e., usefulness, ease of use and subjective norm) trust into Bitcoin security also influences Bitcoin adoption. The results however show no support for the influence of perceived threat of Bitcoin scams or Bitcoin anonymity on Bitcoin adoption.
比特币是最成功的加密货币,占目前2000多种加密货币市值的一半以上。近年来,发生了几起备受瞩目的黑客和骗局,导致数十亿美元的资金被盗。在本文中,我们关注比特币的网络安全和隐私特征对其采用的影响。在斯洛文尼亚的比特币用户和非用户中进行了一项调查(N = 152),以测试所提出的研究模型。结果表明,除了已知因素(即有用性,易用性和主观规范)之外,对比特币安全性的信任也会影响比特币的采用。然而,研究结果并不支持比特币诈骗或比特币匿名对比特币采用的感知威胁的影响。
{"title":"Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does","authors":"Aleksander Murko, Simon L. R. Vrhovec","doi":"10.1145/3360664.3360679","DOIUrl":"https://doi.org/10.1145/3360664.3360679","url":null,"abstract":"Bitcoin is the most successful cryptocurrency with more than half of the market capitalization of all more than 2,000 currently existing cryptocurrencies. In recent years, there have been several high-profile hacks and scams that resulted in billions of stolen funds. In this paper, we focus on the impact of Bitcoin cybersecurity and privacy characteristics on its adoption. A survey (N = 152) has been conducted among users and non-users of Bitcoin in Slovenia to test the proposed research model. The results suggest that in addition to known factors (i.e., usefulness, ease of use and subjective norm) trust into Bitcoin security also influences Bitcoin adoption. The results however show no support for the influence of perceived threat of Bitcoin scams or Bitcoin anonymity on Bitcoin adoption.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing 将威胁建模和自动化测试用例生成集成到工业化软件安全测试中
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3362698
Stefan Marksteiner, R. Ramler, Hannes Sochor
Industrial Internet of Things (IIoT) application provide a whole new set of possibilities to drive efficiency of industrial production forward. However, with the higher degree of integration among systems, comes a plethora of new threats to the latter, as they are not yet designed to be broadly reachable and interoperable. To mitigate these vast amount of new threats, systematic and automated test methods are necessary. This comprehensiveness can be achieved by thorough threat modeling. In order to automate security test, we present an approach to automate the testing process from threat modeling onward, closing the gap between threat modeling and automated test case generation.
工业物联网(IIoT)的应用为提高工业生产效率提供了全新的可能性。然而,随着系统之间集成程度的提高,后者也面临着大量的新威胁,因为它们还没有被设计成可广泛访问和可互操作的。为了减轻这些大量的新威胁,系统和自动化的测试方法是必要的。这种全面性可以通过彻底的威胁建模来实现。为了自动化安全测试,我们提出了一种从威胁建模开始自动化测试过程的方法,缩小了威胁建模和自动化测试用例生成之间的差距。
{"title":"Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing","authors":"Stefan Marksteiner, R. Ramler, Hannes Sochor","doi":"10.1145/3360664.3362698","DOIUrl":"https://doi.org/10.1145/3360664.3362698","url":null,"abstract":"Industrial Internet of Things (IIoT) application provide a whole new set of possibilities to drive efficiency of industrial production forward. However, with the higher degree of integration among systems, comes a plethora of new threats to the latter, as they are not yet designed to be broadly reachable and interoperable. To mitigate these vast amount of new threats, systematic and automated test methods are necessary. This comprehensiveness can be achieved by thorough threat modeling. In order to automate security test, we present an approach to automate the testing process from threat modeling onward, closing the gap between threat modeling and automated test case generation.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? 数字取证与正当程序:相互冲突的标准还是互补的方法?
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3362697
U. Ewald
Cybersecurity and digital forensics are closely related to current and even more to future criminal proceedings due to the fact that digital evidence is more and more dominating the body of evidence in criminal trials. It is also fair to say that digital forensics to a large extent performs in cybersecurity as a production of digital evidence. Not only in cybercrime but also in ordinary crimes like car theft, drug related crimes and forms of traditional organized crimes judicial decision-making and reasoning at trials and finally in judgments are more and more based on references to digital traces and data which are provided by forensic IT experts as exhibits. At the first glance providing digital data as evidence to criminal courts appears to be a straightforward more technical process. This paper claims that turning digital traces into digital evidence is anything but a simple and linear technical process just having to respect state-of-the-art technical standards and following rules for the chain of custody. Instead it will demonstrate that digital forensics is one part in a more complex social construction process where standards and methods of IT forensics of the 21st century meet evidentiary procedural rules in criminal justice of the 19th century, hence applied by a judiciary of the 20th century. This state of asynchrony leads to basic conflicts between digital forensics on the one side, rule of law, to process and fair trial on the other. The paper will reflect upon the central question if and how this conflict between digital forensics and traditional due process in the transition from analog to digital evidence in criminal justice proceedings can be turned into an integrated and complementary approach for the final sake of justice and security in the society. While the current situation is leading to a gap between data and judicial decision (digital divide), new standards for producing procedural truth in a comprehensible data-to-decision-cycle covering both the forensic acquisition, preparation and analysis at the pretrial stage, as well as presenting, testing (verifying/falsifying) and interpreting digital evidence at trial by judges, prosecutors and defense attorneys. Only if both sides, the forensic and judicial, are in balance the digital divide in today's criminal justice practice will fade away. Firstly, the paper will outline a conceptual view on the challenges electronic evidence based on digital code and machine language poses to a traditional judicial method of communicating evidentiary information relying on natural language and unstructured narratives in direct personal communication during trial which inevitably will lead to a paradigm shift in the judicial hermeneutic method. Criminal proceedings and judgments as their outcome are traditionally based on enlightenment principles of oral and direct communication in public hearings, hence human language and narrative is the crucial medium of communication and understanding d
德国在欧洲人权法院表明了今后在刑事诉讼中处理数字证据的前景,特别是指出辩护律师(应该)通过建立自己在处理和分析数字数据方面的独立资源和能力,在检验数字证据方面发挥特殊作用。第三,在上述概述的概念框架和(选择性)实际问题的背景下,本文将试图提供一个视角,旨在将数字取证和正当程序标准整合为一种平衡和互补的方法,使法院能够可靠地评估数字数据的证明价值,并在现有标准和测试不允许法官独立和知情的情况下,为数字数据作为证据的可采性划定一条红线决定,以蜂窝基站证据为例。只有这样,信息技术法医行业与执法部门和司法部门共同努力,为审判中测试电子证据提供可靠的标准,才能缩小目前在刑事司法中处理数字证据方面的数字差距。另一方面,审判中的司法人员、法官、检察官、辩护律师将被要求发展必要的技能和能力,以便在正当程序中应用这些标准。结论性评论将总结具有挑战性的核心问题,以及“数字证据的综合法医-司法标准”的可行性,这些标准最终应保障法治原则和公平审判,以保障无罪推定等程序原则,并防止它们被基于数字数据的风险概率和(网络)威胁评分等新概念所取代。
{"title":"Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches?","authors":"U. Ewald","doi":"10.1145/3360664.3362697","DOIUrl":"https://doi.org/10.1145/3360664.3362697","url":null,"abstract":"Cybersecurity and digital forensics are closely related to current and even more to future criminal proceedings due to the fact that digital evidence is more and more dominating the body of evidence in criminal trials. It is also fair to say that digital forensics to a large extent performs in cybersecurity as a production of digital evidence. Not only in cybercrime but also in ordinary crimes like car theft, drug related crimes and forms of traditional organized crimes judicial decision-making and reasoning at trials and finally in judgments are more and more based on references to digital traces and data which are provided by forensic IT experts as exhibits. At the first glance providing digital data as evidence to criminal courts appears to be a straightforward more technical process. This paper claims that turning digital traces into digital evidence is anything but a simple and linear technical process just having to respect state-of-the-art technical standards and following rules for the chain of custody. Instead it will demonstrate that digital forensics is one part in a more complex social construction process where standards and methods of IT forensics of the 21st century meet evidentiary procedural rules in criminal justice of the 19th century, hence applied by a judiciary of the 20th century. This state of asynchrony leads to basic conflicts between digital forensics on the one side, rule of law, to process and fair trial on the other. The paper will reflect upon the central question if and how this conflict between digital forensics and traditional due process in the transition from analog to digital evidence in criminal justice proceedings can be turned into an integrated and complementary approach for the final sake of justice and security in the society. While the current situation is leading to a gap between data and judicial decision (digital divide), new standards for producing procedural truth in a comprehensible data-to-decision-cycle covering both the forensic acquisition, preparation and analysis at the pretrial stage, as well as presenting, testing (verifying/falsifying) and interpreting digital evidence at trial by judges, prosecutors and defense attorneys. Only if both sides, the forensic and judicial, are in balance the digital divide in today's criminal justice practice will fade away. Firstly, the paper will outline a conceptual view on the challenges electronic evidence based on digital code and machine language poses to a traditional judicial method of communicating evidentiary information relying on natural language and unstructured narratives in direct personal communication during trial which inevitably will lead to a paradigm shift in the judicial hermeneutic method. Criminal proceedings and judgments as their outcome are traditionally based on enlightenment principles of oral and direct communication in public hearings, hence human language and narrative is the crucial medium of communication and understanding d","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Consistency of Software Updates against Strong Attackers 实现针对强大攻击者的软件更新一致性
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360670
Lamya Abdullah, S. Hahn, F. Freiling
Update systems regularly distribute updates for installed software to end users. Problems arise when the update system is misused and malicious updates are sent to a small set of users only. Such situations can occur if the software supplier has been successfully attacked or is coerced by government agencies to distribute handcrafted updates containing promiscuous functionality like backdoors. In this paper, we define a set of general security requirements for update systems that encompass protection against malicious updates. We then introduce the design of an update system that satisfies the requirements and present an implementation as an extension to the advanced package tool (APT) for the Debian OS. We evaluate the strengths and weaknesses of the system and discuss its large-scale applicability with respect to security and performance overhead.
更新系统定期向最终用户发布已安装软件的更新。当更新系统被滥用,恶意更新只发送给一小部分用户时,问题就出现了。如果软件供应商被成功攻击,或者被政府机构强迫发布包含后门等混杂功能的手工更新,就会发生这种情况。在本文中,我们为更新系统定义了一组通用的安全需求,这些需求包含对恶意更新的保护。然后,我们介绍了一个满足需求的更新系统的设计,并作为Debian OS的高级包工具(APT)的扩展提供了一个实现。我们评估了系统的优点和缺点,并讨论了它在安全性和性能开销方面的大规模适用性。
{"title":"Achieving Consistency of Software Updates against Strong Attackers","authors":"Lamya Abdullah, S. Hahn, F. Freiling","doi":"10.1145/3360664.3360670","DOIUrl":"https://doi.org/10.1145/3360664.3360670","url":null,"abstract":"Update systems regularly distribute updates for installed software to end users. Problems arise when the update system is misused and malicious updates are sent to a small set of users only. Such situations can occur if the software supplier has been successfully attacked or is coerced by government agencies to distribute handcrafted updates containing promiscuous functionality like backdoors. In this paper, we define a set of general security requirements for update systems that encompass protection against malicious updates. We then introduce the design of an update system that satisfies the requirements and present an implementation as an extension to the advanced package tool (APT) for the Debian OS. We evaluate the strengths and weaknesses of the system and discuss its large-scale applicability with respect to security and performance overhead.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks OPC UA网络中不可信客户端攻击的模拟与检测
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360675
C. V. Neu, Ina Schiering, A. Zorzo
The usage of machine to machine communication and Industrial Internet of Things is increasing nowadays, in particular in industry environments. Devices with low hardware capabilities may e.g. be used for sensing data, for example, on an industrial network. Specific protocols and frameworks were being developed for these use cases. One such framework is OPC UA, which allows signed and encrypted communication and therefore addresses already important security requirements. However, an attacker may also be able to encrypt malicious packets so that it may bypass security systems and/or empower the attack, as encrypted packets typically need more hardware consumption to be handled. In this paper the focus is on Denial of Service attacks in OPC UA networks. An analysis of possible Denial of Service attacks is presented and an approach to detect such attacks is implemented in the context of a simulation scenario. Our evaluations show how such attacks may affect server CPU consumption and could be very powerful when a large number of devices is compromised.
如今,机器对机器通信和工业物联网的使用越来越多,特别是在工业环境中。具有低硬件能力的设备可以例如用于传感数据,例如在工业网络上。正在为这些用例开发特定的协议和框架。一个这样的框架是OPC UA,它允许签名和加密通信,因此解决了已经很重要的安全需求。然而,攻击者也可以加密恶意数据包,这样它就可以绕过安全系统和/或授权攻击,因为加密的数据包通常需要更多的硬件消耗来处理。本文主要研究OPC UA网络中的拒绝服务攻击。对可能的拒绝服务攻击进行了分析,并在模拟场景中实现了检测此类攻击的方法。我们的评估显示了这种攻击如何影响服务器CPU消耗,并且在大量设备受到损害时可能非常强大。
{"title":"Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks","authors":"C. V. Neu, Ina Schiering, A. Zorzo","doi":"10.1145/3360664.3360675","DOIUrl":"https://doi.org/10.1145/3360664.3360675","url":null,"abstract":"The usage of machine to machine communication and Industrial Internet of Things is increasing nowadays, in particular in industry environments. Devices with low hardware capabilities may e.g. be used for sensing data, for example, on an industrial network. Specific protocols and frameworks were being developed for these use cases. One such framework is OPC UA, which allows signed and encrypted communication and therefore addresses already important security requirements. However, an attacker may also be able to encrypt malicious packets so that it may bypass security systems and/or empower the attack, as encrypted packets typically need more hardware consumption to be handled. In this paper the focus is on Denial of Service attacks in OPC UA networks. An analysis of possible Denial of Service attacks is presented and an approach to detect such attacks is implemented in the context of a simulation scenario. Our evaluations show how such attacks may affect server CPU consumption and could be very powerful when a large number of devices is compromised.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology 从假新闻到虚拟现实:现代科技时代的假新闻和数字操纵
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3361145
Tal Pavel
The cyberspace, the new and only man-made domain, presents a wide range of new advantages and challenges -- as well as risks to the end user, organizations, states and even humanity. Modern mankind is dependent completely on ICT, the internet and the cyberspace for daily operation and existence. The cyberspace has several unique features including the attribution problem, no meaning for boundaries, time, or threshold as an entry level for different malicious players to create potential diversity of damages. Disruption, or even shutdown of this dimension may be fatal and constitutes new means and weapons in the hands of various players, among them, non-state actors, such as terrorist organizations, cybercriminals and state actors, in a matter that cyber capabilities are seen as even a doomsday weapon. But the cyberspace can be the trigger to physical wars, criminal activities, social unrest, political changes. All created by not only by fake news but by creating new, alternative and manipulated reality. Fake news is "a type of yellow journalism or propaganda that consists of deliberate disinformation or hoaxes spread via traditional print and broadcast news media or online social media". Therefore, in the hands of a given nation, armed with motivation and online abilities, rumors and disinformation can be spread, in order to create distrust, nationalistic feelings among minorities, denying the government legitimacy, panic, havoc and mayhem. Those can create riots, uprising and revolt from the inside boundaries on one hand, as well as war with neighbouring states from the outside boundaries on the other hand. All those without the need of the perpetrator firing a single shot.
网络空间作为人类唯一的新领域,给最终用户、组织、国家乃至人类带来了一系列新的优势和挑战,也带来了风险。现代人类的日常运作和生存完全依赖于信息通信技术、互联网和网络空间。网络空间有几个独特的特征,包括归属问题,没有边界、时间或阈值的意义,作为不同恶意参与者的入口水平,以造成潜在的多样性损害。这一维度的中断甚至关闭可能是致命的,并构成各种参与者手中的新手段和武器,其中包括非国家行为者,如恐怖组织、网络犯罪分子和国家行为者,在这个问题上,网络能力甚至被视为世界末日武器。但网络空间可能引发物理战争、犯罪活动、社会动荡和政治变革。这一切不仅是由假新闻造成的,而且是由创造新的、可替代的、被操纵的现实造成的。假新闻是“一种黄色新闻或宣传,包括通过传统的印刷和广播新闻媒体或在线社交媒体传播的故意虚假信息或骗局”。因此,在一个特定的国家手中,有了动机和网络能力,谣言和虚假信息可以传播,以在少数民族中制造不信任,民族主义情绪,否认政府的合法性,恐慌,破坏和混乱。一方面,这些可以从内部边界制造骚乱,起义和叛乱,另一方面,也可以从外部边界与邻国发生战争。所有这些都不需要行凶者开一枪。
{"title":"From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology","authors":"Tal Pavel","doi":"10.1145/3360664.3361145","DOIUrl":"https://doi.org/10.1145/3360664.3361145","url":null,"abstract":"The cyberspace, the new and only man-made domain, presents a wide range of new advantages and challenges -- as well as risks to the end user, organizations, states and even humanity. Modern mankind is dependent completely on ICT, the internet and the cyberspace for daily operation and existence. The cyberspace has several unique features including the attribution problem, no meaning for boundaries, time, or threshold as an entry level for different malicious players to create potential diversity of damages. Disruption, or even shutdown of this dimension may be fatal and constitutes new means and weapons in the hands of various players, among them, non-state actors, such as terrorist organizations, cybercriminals and state actors, in a matter that cyber capabilities are seen as even a doomsday weapon. But the cyberspace can be the trigger to physical wars, criminal activities, social unrest, political changes. All created by not only by fake news but by creating new, alternative and manipulated reality. Fake news is \"a type of yellow journalism or propaganda that consists of deliberate disinformation or hoaxes spread via traditional print and broadcast news media or online social media\". Therefore, in the hands of a given nation, armed with motivation and online abilities, rumors and disinformation can be spread, in order to create distrust, nationalistic feelings among minorities, denying the government legitimacy, panic, havoc and mayhem. Those can create riots, uprising and revolt from the inside boundaries on one hand, as well as war with neighbouring states from the outside boundaries on the other hand. All those without the need of the perpetrator firing a single shot.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain 基于区块链的工业控制系统安全日志的可行性研究
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360668
Stefan Schorradt, Edita Bajramovic, F. Freiling
With industrial control systems (ICSs) being increasingly networked, the need for sound forensic capabilities for such systems increases. One vital source of information in forensic investigation are log files. Techniques for secure logging aim to protect log files from manipulation. We investigate how a blockchain can enable secure logging for ICSs. We argue that a blockchain fits well both into general models of secure logging and into the Purdue model for ICSs. We report on experiences from connecting the syslog functionality of a Siemens SIMATIC S7-1500 programmable logic controller to the public Ethereum blockchain network. While the level of manipulation protection is comparably high, the transaction time for the public Ethereum blockchain severely limits the usefulness of this type of secure logging for ICSs.
随着工业控制系统(ics)日益网络化,对此类系统的可靠取证能力的需求也在增加。日志文件是法医调查中一个重要的信息来源。安全日志记录技术旨在保护日志文件不受操纵。我们研究了区块链如何为ics实现安全日志记录。我们认为,区块链既适合安全日志的一般模型,也适合普渡大学的ics模型。我们报告了将西门子SIMATIC S7-1500可编程逻辑控制器的syslog功能连接到公共以太坊区块链网络的经验。虽然操作保护水平相对较高,但公共以太坊区块链的交易时间严重限制了这种类型的安全日志对ics的有用性。
{"title":"On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain","authors":"Stefan Schorradt, Edita Bajramovic, F. Freiling","doi":"10.1145/3360664.3360668","DOIUrl":"https://doi.org/10.1145/3360664.3360668","url":null,"abstract":"With industrial control systems (ICSs) being increasingly networked, the need for sound forensic capabilities for such systems increases. One vital source of information in forensic investigation are log files. Techniques for secure logging aim to protect log files from manipulation. We investigate how a blockchain can enable secure logging for ICSs. We argue that a blockchain fits well both into general models of secure logging and into the Purdue model for ICSs. We report on experiences from connecting the syslog functionality of a Siemens SIMATIC S7-1500 programmable logic controller to the public Ethereum blockchain network. While the level of manipulation protection is comparably high, the transaction time for the public Ethereum blockchain severely limits the usefulness of this type of secure logging for ICSs.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets 符合GDPR移动接入网络数据集的嫌疑人回顾性跟踪
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360680
Louis Tajan, D. Westhoff
This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloom filter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to perform some privacy saving set relations on a mobile telco's access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.
本工作讨论了几个需要隐私的事后移动设备跟踪用例,例如,由于客户保密协议和来自政府机构以及移动电信提供商的数据敏感性。我们认为,我们提出的基于布隆过滤器的隐私方法是该领域出现的通用数据保护条例(GDPR)要求的有价值的技术构建块。简而言之,我们应用了一个基于Bloom过滤器数据结构的解决方案,该解决方案允许第三方在移动电信公司的访问日志文件或来自收集方的其他移动访问日志文件上执行一些隐私保存集关系,而不会泄露移动基站附近的任何其他移动用户,但仍然允许跟踪肇事者。
{"title":"Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets","authors":"Louis Tajan, D. Westhoff","doi":"10.1145/3360664.3360680","DOIUrl":"https://doi.org/10.1145/3360664.3360680","url":null,"abstract":"This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloom filter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to perform some privacy saving set relations on a mobile telco's access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic Investigations in Vehicle Data Stores 车辆数据仓库的法医调查
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360665
Nico Vinzenz, Tobias Eggendorfer
This research locates vehicle data stores and analyzes their forensic information value based on digital forensic principles. Four distinct data store types were located in this process -- airbag Event Data Recorder (EDR), Electronic Control Unit (ECU), Telematic Platform and Infotainment System. Based on the analysis of approximately 11,000 samples from vehicle crashes the airbag EDR is found useful for getting a high resolution short-term snapshot of a vehicle crash. The investigated telematic platform did not store any forensically valuable data by default. Nevertheless, with an architectural optimization, it could store data valuable for both post-crime and post-crash investigations.
本研究基于数字取证原理对车辆数据存储进行定位,分析其取证信息价值。在这个过程中,有四种不同的数据存储类型——安全气囊事件数据记录器(EDR)、电子控制单元(ECU)、远程信息处理平台和信息娱乐系统。根据对大约11,000个车辆碰撞样本的分析,发现安全气囊EDR对于获得车辆碰撞的高分辨率短期快照很有用。被调查的远程信息处理平台在默认情况下没有存储任何有法医价值的数据。然而,通过架构优化,它可以存储对犯罪后和事故后调查都有价值的数据。
{"title":"Forensic Investigations in Vehicle Data Stores","authors":"Nico Vinzenz, Tobias Eggendorfer","doi":"10.1145/3360664.3360665","DOIUrl":"https://doi.org/10.1145/3360664.3360665","url":null,"abstract":"This research locates vehicle data stores and analyzes their forensic information value based on digital forensic principles. Four distinct data store types were located in this process -- airbag Event Data Recorder (EDR), Electronic Control Unit (ECU), Telematic Platform and Infotainment System. Based on the analysis of approximately 11,000 samples from vehicle crashes the airbag EDR is found useful for getting a high resolution short-term snapshot of a vehicle crash. The investigated telematic platform did not store any forensically valuable data by default. Nevertheless, with an architectural optimization, it could store data valuable for both post-crime and post-crash investigations.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133330167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the Third Central European Cybersecurity Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1