首页 > 最新文献

Proceedings of the Third Central European Cybersecurity Conference最新文献

英文 中文
Accommodating Time-Triggered Authentication to FlexRay Demands 适应FlexRay需求的时间触发认证
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360666
Pal-Stefan Murvay, L. Popa, B. Groza
Research efforts related to in-vehicle communication security were largely focused on the Controller Area Network (CAN) protocol. While CAN is still the most widely used protocol for building in-vehicle networks, many safety critical functionalities are based on other communication protocols such as FlexRay or Ethernet which constantly expand their use inside vehicles. In this paper we address the problem of authenticating transmissions in FlexRay networks. We approach this task by adapting an authentication protocol to the time-triggered nature of FlexRay communication while also accounting for non-deterministic transmissions that may occur in the FlexRay dynamic segment. We illustrate the effects of introducing authentication on keeping strict message deadlines by evaluating our proposal based on a real-life scenario from a major vehicle manufacturer.
与车载通信安全相关的研究工作主要集中在控制器局域网(CAN)协议上。虽然CAN仍然是构建车载网络最广泛使用的协议,但许多安全关键功能是基于其他通信协议,如FlexRay或以太网,这些协议在车内的应用范围不断扩大。在本文中,我们解决了FlexRay网络中传输的认证问题。我们通过使认证协议适应FlexRay通信的时间触发性质来完成这项任务,同时也考虑到FlexRay动态段中可能发生的不确定性传输。通过基于一家主要汽车制造商的真实场景评估我们的提议,我们演示了引入身份验证对保持严格消息截止日期的影响。
{"title":"Accommodating Time-Triggered Authentication to FlexRay Demands","authors":"Pal-Stefan Murvay, L. Popa, B. Groza","doi":"10.1145/3360664.3360666","DOIUrl":"https://doi.org/10.1145/3360664.3360666","url":null,"abstract":"Research efforts related to in-vehicle communication security were largely focused on the Controller Area Network (CAN) protocol. While CAN is still the most widely used protocol for building in-vehicle networks, many safety critical functionalities are based on other communication protocols such as FlexRay or Ethernet which constantly expand their use inside vehicles. In this paper we address the problem of authenticating transmissions in FlexRay networks. We approach this task by adapting an authentication protocol to the time-triggered nature of FlexRay communication while also accounting for non-deterministic transmissions that may occur in the FlexRay dynamic segment. We illustrate the effects of introducing authentication on keeping strict message deadlines by evaluating our proposal based on a real-life scenario from a major vehicle manufacturer.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125759234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IPv6 Covert Channels in the Wild IPv6隐蔽通道在野外
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360674
W. Mazurczyk, Krystian Powójski, L. Caviglione
The increasing diffusion of malware endowed with steganographic techniques requires to carefully identify and evaluate a new set of threats. The creation of a covert channel to hide a communication within network traffic is one of the most relevant, as it can be used to exfiltrate information or orchestrate attacks. Even if network steganography is becoming a well-studied topic, only few works focus on IPv6 and consider real network scenarios. Therefore, this paper investigates IPv6 covert channels deployed in the wild. Also, it presents a performance evaluation of six different data hiding techniques for IPv6 including their ability to bypass some intrusion detection systems. Lastly, ideas to detect IPv6 covert channels are presented.
具有隐写技术的恶意软件日益扩散,需要仔细识别和评估一组新的威胁。创建隐蔽通道以在网络流量中隐藏通信是最相关的方法之一,因为它可用于泄露信息或组织攻击。即使网络隐写术正在成为一个研究得很好的话题,但只有少数作品关注IPv6并考虑到真实的网络场景。因此,本文研究了在野外部署的IPv6隐蔽通道。此外,它还提出了六种不同的IPv6数据隐藏技术的性能评估,包括它们绕过一些入侵检测系统的能力。最后,提出了检测IPv6隐蔽通道的方法。
{"title":"IPv6 Covert Channels in the Wild","authors":"W. Mazurczyk, Krystian Powójski, L. Caviglione","doi":"10.1145/3360664.3360674","DOIUrl":"https://doi.org/10.1145/3360664.3360674","url":null,"abstract":"The increasing diffusion of malware endowed with steganographic techniques requires to carefully identify and evaluate a new set of threats. The creation of a covert channel to hide a communication within network traffic is one of the most relevant, as it can be used to exfiltrate information or orchestrate attacks. Even if network steganography is becoming a well-studied topic, only few works focus on IPv6 and consider real network scenarios. Therefore, this paper investigates IPv6 covert channels deployed in the wild. Also, it presents a performance evaluation of six different data hiding techniques for IPv6 including their ability to bypass some intrusion detection systems. Lastly, ideas to detect IPv6 covert channels are presented.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Obfuscated Android Application Development 混淆Android应用程序开发
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3361144
Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong
Obfuscation techniques help developers to hide their code when distributing an Android application. The used techniques are linked to the features provided by the programming language but also with the way the application is executed. Using obfuscation is now a common practice and specialized companies sell tools or services for automatizing the manipulation of the source code. In this paper, we present how to develop obfuscated applications and how obfuscation technique usage is evolving in the wild. First, using advanced obfuscation techniques requires some advanced knowledge about the development of Android applications. We describe how to build such applications for helping researchers to generate samples of obfuscated applications for their own research. Second, the use of obfuscation techniques is evolving for both regular applications or malicious ones. We aim at measuring the development of these usages by studying application and malware samples and the artifacts that indicate the use of obfuscation techniques.
混淆技术帮助开发人员在分发Android应用程序时隐藏代码。所使用的技术与编程语言提供的特性相关联,但也与应用程序的执行方式相关联。使用混淆现在是一种常见的做法,专门的公司出售用于自动化源代码操作的工具或服务。在本文中,我们介绍了如何开发混淆的应用程序,以及混淆技术的使用是如何在野外发展的。首先,使用高级混淆技术需要一些关于Android应用程序开发的高级知识。我们描述了如何构建这样的应用程序,以帮助研究人员为他们自己的研究生成混淆应用程序的样本。其次,对于常规应用程序或恶意应用程序,混淆技术的使用正在不断发展。我们的目标是通过研究应用程序和恶意软件样本以及表明使用混淆技术的工件来衡量这些用法的发展。
{"title":"Obfuscated Android Application Development","authors":"Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong","doi":"10.1145/3360664.3361144","DOIUrl":"https://doi.org/10.1145/3360664.3361144","url":null,"abstract":"Obfuscation techniques help developers to hide their code when distributing an Android application. The used techniques are linked to the features provided by the programming language but also with the way the application is executed. Using obfuscation is now a common practice and specialized companies sell tools or services for automatizing the manipulation of the source code. In this paper, we present how to develop obfuscated applications and how obfuscation technique usage is evolving in the wild. First, using advanced obfuscation techniques requires some advanced knowledge about the development of Android applications. We describe how to build such applications for helping researchers to generate samples of obfuscated applications for their own research. Second, the use of obfuscation techniques is evolving for both regular applications or malicious ones. We aim at measuring the development of these usages by studying application and malware samples and the artifacts that indicate the use of obfuscation techniques.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Combined side-channels malware detection for NFV infrastructure 结合侧通道恶意软件检测NFV基础设施
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360727
Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar
Network Function Virtualization (NFV) is an emerging approach gaining popularity among network providers. Nowadays, NFV infrastructure platforms are, predominantly based on x86 architecture CPUs. However, vulnerabilities of the CPU architecture may allow an attacker to obtain root privileges and to plant malware. Among such malware is crypto mining, which is hardly detectable either by malware scanner or by a firewall. In this paper we investigate the applicability of side-channels Key Performance Indicators (KPIs) for malware detection. We propose detecting the abnormal behavior using Machine Learning tools. Upon analyzing different side-channel technologies, we suggest using a combination of CPU performance KPIs with KPIs for the forwarding latency of NFV applications as an input to a Neural Network model. The model shall be trained in advance using two data sets: one set representing a clean system and the second set -- a compromised system (containing planted crypto-mining malware). The proposed approach would allow us to detect abnormal behavior caused by activation of the malware.
网络功能虚拟化(NFV)是一种新兴的方法,在网络提供商中越来越受欢迎。目前,NFV基础设施平台主要基于x86架构的cpu。然而,CPU架构的漏洞可能允许攻击者获得根权限并植入恶意软件。其中一种恶意软件是加密挖掘,它很难被恶意软件扫描器或防火墙检测到。本文研究了边信道关键性能指标(kpi)在恶意软件检测中的适用性。我们建议使用机器学习工具检测异常行为。在分析了不同的侧信道技术后,我们建议将CPU性能kpi与NFV应用程序转发延迟的kpi相结合,作为神经网络模型的输入。该模型应事先使用两个数据集进行训练:一个数据集代表一个干净的系统,另一个数据集代表一个受损的系统(包含植入的加密挖矿恶意软件)。提出的方法将允许我们检测由激活恶意软件引起的异常行为。
{"title":"Combined side-channels malware detection for NFV infrastructure","authors":"Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar","doi":"10.1145/3360664.3360727","DOIUrl":"https://doi.org/10.1145/3360664.3360727","url":null,"abstract":"Network Function Virtualization (NFV) is an emerging approach gaining popularity among network providers. Nowadays, NFV infrastructure platforms are, predominantly based on x86 architecture CPUs. However, vulnerabilities of the CPU architecture may allow an attacker to obtain root privileges and to plant malware. Among such malware is crypto mining, which is hardly detectable either by malware scanner or by a firewall. In this paper we investigate the applicability of side-channels Key Performance Indicators (KPIs) for malware detection. We propose detecting the abnormal behavior using Machine Learning tools. Upon analyzing different side-channel technologies, we suggest using a combination of CPU performance KPIs with KPIs for the forwarding latency of NFV applications as an input to a Neural Network model. The model shall be trained in advance using two data sets: one set representing a clean system and the second set -- a compromised system (containing planted crypto-mining malware). The proposed approach would allow us to detect abnormal behavior caused by activation of the malware.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Forensic Investigation in OpenContrail Environments 开放轨迹环境下的网络取证调查
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360676
Alexander Heckel, Daniel Spiekermann
The requirements of today's data center networks include scalability, multi-tenancy and isolation from the underlying infrastructure, which are primarily achieved through the use of network virtualization. As a downside, the overall complexity increases with the number of technologies involved, which has a significant impact upon network forensic investigation. In this context we investigated OpenContrail, an open source framework for network virtualization that provides built-in methods for collecting network traffic. In our research, we concluded that these methods work in principle, but are not suitable to capture network traffic that can be used in court. The packet mirroring turned out to be incomplete and the capture process can be detected by the virtual machine under investigation. Based on these findings, we developed a more flexible agent that especially ensures the transparency of the capture process for the suspicious virtual machine.
当今数据中心网络的需求包括可伸缩性、多租户和与底层基础设施的隔离,这些主要是通过使用网络虚拟化实现的。缺点是,随着所涉及的技术数量的增加,总体复杂性也会增加,这对网络取证调查产生了重大影响。在这种情况下,我们研究了OpenContrail,这是一个用于网络虚拟化的开源框架,它提供了收集网络流量的内置方法。在我们的研究中,我们得出结论,这些方法原则上是有效的,但不适合捕获可以在法庭上使用的网络流量。数据包镜像被证明是不完整的,捕获过程可以被正在调查的虚拟机检测到。基于这些发现,我们开发了一个更灵活的代理,特别确保了可疑虚拟机捕获过程的透明性。
{"title":"Network Forensic Investigation in OpenContrail Environments","authors":"Alexander Heckel, Daniel Spiekermann","doi":"10.1145/3360664.3360676","DOIUrl":"https://doi.org/10.1145/3360664.3360676","url":null,"abstract":"The requirements of today's data center networks include scalability, multi-tenancy and isolation from the underlying infrastructure, which are primarily achieved through the use of network virtualization. As a downside, the overall complexity increases with the number of technologies involved, which has a significant impact upon network forensic investigation. In this context we investigated OpenContrail, an open source framework for network virtualization that provides built-in methods for collecting network traffic. In our research, we concluded that these methods work in principle, but are not suitable to capture network traffic that can be used in court. The packet mirroring turned out to be incomplete and the capture process can be detected by the virtual machine under investigation. Based on these findings, we developed a more flexible agent that especially ensures the transparency of the capture process for the suspicious virtual machine.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Minimum Hash Width for Hash Chains 确定哈希链的最小哈希宽度
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360682
Martin Dietzfelbinger, J. Keller
Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the required level of security. We present a new proof for a known result by Flajolet and Odlyzko (Euro-crypt 1989), using only elementary combinatoric and probabilistic arguments. Using this result, we derive a bound on the expected number of hash values still reachable after a given number of steps in the hash chain, so that given any two of the three parameters hash chain length, width of the hash value, and security level, the remaining parameter can be computed. Furthermore, we illustrate how to "refresh" a hash chain to increase the number of reachable hash values if the initial seed is long enough. Based on this, we present a scheme that allows reduced width of hash values, and thus reduced energy consumption in the device, for a hash chain of similar length and similar security level. We illustrate our findings with experiments.
身份验证中使用加密哈希函数,通信协议中使用哈希链中的重复应用。在嵌入式设备中,哈希值的宽度和计算哈希函数的相关工作是至关重要的,因此哈希值应尽可能短,但仍应足以保证所需的安全级别。对于Flajolet和Odlyzko (Euro-crypt 1989)的一个已知结果,我们只用初等组合和概率论证给出了一个新的证明。使用这个结果,我们推导出在哈希链中给定的步数之后仍然可以到达的哈希值的期望数量的界限,这样,给定哈希链长度、哈希值宽度和安全级别三个参数中的任意两个,就可以计算出剩余的参数。此外,我们将演示如何“刷新”哈希链,以便在初始种子足够长的情况下增加可访问哈希值的数量。基于此,我们提出了一种方案,允许减少哈希值的宽度,从而减少设备中的能耗,对于相似长度和相似安全级别的哈希链。我们用实验来说明我们的发现。
{"title":"Determining Minimum Hash Width for Hash Chains","authors":"Martin Dietzfelbinger, J. Keller","doi":"10.1145/3360664.3360682","DOIUrl":"https://doi.org/10.1145/3360664.3360682","url":null,"abstract":"Cryptographic hash functions are used in authentication, and repeated application in hash chains is used in communication protocols. In embedded devices, the width of hash values and the associated effort to evaluate the hash function is crucial, and hence the hash values should be as short as possible but should still be sufficient to guarantee the required level of security. We present a new proof for a known result by Flajolet and Odlyzko (Euro-crypt 1989), using only elementary combinatoric and probabilistic arguments. Using this result, we derive a bound on the expected number of hash values still reachable after a given number of steps in the hash chain, so that given any two of the three parameters hash chain length, width of the hash value, and security level, the remaining parameter can be computed. Furthermore, we illustrate how to \"refresh\" a hash chain to increase the number of reachable hash values if the initial seed is long enough. Based on this, we present a scheme that allows reduced width of hash values, and thus reduced energy consumption in the device, for a hash chain of similar length and similar security level. We illustrate our findings with experiments.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A practical view on IT risk management process 对IT风险管理过程的实际看法
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360730
Maksim Goman
Risk management (RM) process is one of the key aspects in IT management standards. However, additionally to the existing ambiguity about risk concept in IT management standards and guidelines, IT RM process is usually very simplistic and brief. We propose an improved IT RM process in this paper. The enchanced process is based on an advanced definition of risk and its consequences.
风险管理(RM)过程是IT管理标准中的一个关键方面。然而,除了IT管理标准和指南中存在的风险概念模糊之外,IT RM过程通常非常简单和简短。本文提出了一种改进的IT RM流程。增强的过程基于对风险及其后果的高级定义。
{"title":"A practical view on IT risk management process","authors":"Maksim Goman","doi":"10.1145/3360664.3360730","DOIUrl":"https://doi.org/10.1145/3360664.3360730","url":null,"abstract":"Risk management (RM) process is one of the key aspects in IT management standards. However, additionally to the existing ambiguity about risk concept in IT management standards and guidelines, IT RM process is usually very simplistic and brief. We propose an improved IT RM process in this paper. The enchanced process is based on an advanced definition of risk and its consequences.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Platform Authorship Verification 多平台作者验证
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360677
Abdulaziz Altamimi, N. Clarke, S. Furnell, Fudong Li
At the present time, there has been a rapid increase in the variety and popularity of messaging systems such as social network messaging, text messages, email and Twitter, with users frequently exchanging messages across various platforms. Unfortunately, in amongst the legitimate messages, there is a host of illegitimate and inappropriate content - with cyber stalking, trolling and computerassisted crime all taking place. Therefore, there is a need to identify individuals using messaging systems. Stylometry is the study of linguistic features in a text which consists of verifying an author based on his writing style that consists of checking whether a target text was written or not by a specific individual author. Whilst much research has taken place within authorship verification, studies have focused upon singular platforms, often had limited datasets and restricted methodologies that have meant it is difficult to appreciate the real-world value of the approach. This paper seeks to overcome these limitations through providing an analysis of authorship verification across four common messaging systems. This approach enables a direct comparison of recognition performance and provides a basis for analyzing the feature vectors across platforms to better understand what aspects each capitalize upon in order to achieve good classification. The experiments also include an investigation into the feature vector creation, utilizing population and user-based techniques to compare and contrast performance. The experiment involved 50 participants across four common platforms with a total 13,617; 106,359; 4,539; and 6,540 samples for Twitter, SMS, Facebook, and Email achieving an Equal Error Rate (EER) of 20.16%, 7.97%, 25% and 13.11% respectively.
目前,社交网络消息、短信、电子邮件和Twitter等消息传递系统的种类和普及程度迅速增加,用户频繁地在各种平台上交换消息。不幸的是,在合法的信息中,有大量的非法和不适当的内容——网络跟踪、钓鱼和计算机辅助犯罪都在发生。因此,有必要识别使用消息传递系统的个人。文体学是对文本语言特征的研究,它包括根据作者的写作风格来验证作者,包括检查目标文本是否由特定的个人作者所写。虽然在作者身份验证方面进行了大量研究,但研究主要集中在单一平台上,通常具有有限的数据集和有限的方法,这意味着很难欣赏该方法的现实价值。本文试图通过提供跨四种常见消息传递系统的作者身份验证分析来克服这些限制。这种方法可以直接比较识别性能,并为分析跨平台的特征向量提供基础,以便更好地了解每个方面都利用哪些方面来实现良好的分类。实验还包括对特征向量创建的研究,利用人口和基于用户的技术来比较和对比性能。该实验涉及四个公共平台的50名参与者,共有13,617人;106359;4539;Twitter、SMS、Facebook和Email的6540个样本的平均错误率(EER)分别为20.16%、7.97%、25%和13.11%。
{"title":"Multi-Platform Authorship Verification","authors":"Abdulaziz Altamimi, N. Clarke, S. Furnell, Fudong Li","doi":"10.1145/3360664.3360677","DOIUrl":"https://doi.org/10.1145/3360664.3360677","url":null,"abstract":"At the present time, there has been a rapid increase in the variety and popularity of messaging systems such as social network messaging, text messages, email and Twitter, with users frequently exchanging messages across various platforms. Unfortunately, in amongst the legitimate messages, there is a host of illegitimate and inappropriate content - with cyber stalking, trolling and computerassisted crime all taking place. Therefore, there is a need to identify individuals using messaging systems. Stylometry is the study of linguistic features in a text which consists of verifying an author based on his writing style that consists of checking whether a target text was written or not by a specific individual author. Whilst much research has taken place within authorship verification, studies have focused upon singular platforms, often had limited datasets and restricted methodologies that have meant it is difficult to appreciate the real-world value of the approach. This paper seeks to overcome these limitations through providing an analysis of authorship verification across four common messaging systems. This approach enables a direct comparison of recognition performance and provides a basis for analyzing the feature vectors across platforms to better understand what aspects each capitalize upon in order to achieve good classification. The experiments also include an investigation into the feature vector creation, utilizing population and user-based techniques to compare and contrast performance. The experiment involved 50 participants across four common platforms with a total 13,617; 106,359; 4,539; and 6,540 samples for Twitter, SMS, Facebook, and Email achieving an Equal Error Rate (EER) of 20.16%, 7.97%, 25% and 13.11% respectively.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116959367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Secure String Class Compliant with PCI DSS 一种符合PCI DSS的安全字符串类
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360681
Katarína Amrichová, Terézia Mézesová
Computer programs often work with a variety of sensitive data and class String is widely used in object-oriented programming languages for this purpose. However, saving sensitive data to a String object is not safe as it is not encrypted and may still be in the operating memory even after it is no longer needed. Due to non-deterministic behaviour of mechanism responsible for removing unused items from the memory, we cannot say with certainty when String with sensitive data will actually be removed. If an attacker gets either part of or even the entire memory image, then they can easily read these sensitive data. This paper discusses the options in object oriented languages that provide programmers with a way of storing the data in memory in an encrypted form. We present a pseudo code for a secure String class that is compliant with Data retention and Cryptography requirements of the PCI DSS standard.
计算机程序经常处理各种敏感数据,类字符串在面向对象编程语言中被广泛用于此目的。然而,将敏感数据保存到String对象是不安全的,因为它没有加密,即使不再需要它也可能仍然在操作内存中。由于负责从内存中删除未使用项的机制的不确定性行为,我们不能确定地说什么时候包含敏感数据的String将被实际删除。如果攻击者获得部分甚至整个内存映像,那么他们就可以轻松读取这些敏感数据。本文讨论了面向对象语言中的选项,这些选项为程序员提供了一种以加密形式在内存中存储数据的方法。我们提出了一个安全字符串类的伪代码,它符合PCI DSS标准的数据保留和加密要求。
{"title":"A Secure String Class Compliant with PCI DSS","authors":"Katarína Amrichová, Terézia Mézesová","doi":"10.1145/3360664.3360681","DOIUrl":"https://doi.org/10.1145/3360664.3360681","url":null,"abstract":"Computer programs often work with a variety of sensitive data and class String is widely used in object-oriented programming languages for this purpose. However, saving sensitive data to a String object is not safe as it is not encrypted and may still be in the operating memory even after it is no longer needed. Due to non-deterministic behaviour of mechanism responsible for removing unused items from the memory, we cannot say with certainty when String with sensitive data will actually be removed. If an attacker gets either part of or even the entire memory image, then they can easily read these sensitive data. This paper discusses the options in object oriented languages that provide programmers with a way of storing the data in memory in an encrypted form. We present a pseudo code for a secure String class that is compliant with Data retention and Cryptography requirements of the PCI DSS standard.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Password Literacy in North Macedonia: A Case Study 北马其顿的密码读写能力:个案研究
Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360678
Andrej Cvetkovski, Flavio Esposito
Following the repeated reports of high prevalence of functional illiteracy in the countries of the Western Balkans, we go on to study the password composition habits of cultural groups from this region. Ina password cracking experiment, we obtain and analyze a number of passwords composed for use in learning management systems (LMS) by recent high-school graduates from North Macedonia. We estimate the strength of these passwords and their crackability by methods adjusted to local cultural specifics. Our results indicate that high extent of general illiteracy is intertwined with low awareness about good password practices, which in turn may lead to creating various vulnerabilities to deployed systems and confidential data. We conclude that, in the studied region, there is an immediate need for educating the population of good password practices and good system and data security practices in general.
在西巴尔干国家功能性文盲高流行的反复报道之后,我们继续研究该地区文化群体的密码构成习惯。在密码破解实验中,我们获得并分析了北马其顿最近高中毕业生在学习管理系统(LMS)中使用的一些密码。我们估计这些密码的强度和他们的破解方法调整到当地的文化特点。我们的研究结果表明,普遍文盲的高度程度与对良好密码实践的低认识交织在一起,这反过来可能导致对部署的系统和机密数据产生各种漏洞。我们的结论是,在所研究的地区,迫切需要对人们进行良好的密码实践和良好的系统和数据安全实践的教育。
{"title":"The Password Literacy in North Macedonia: A Case Study","authors":"Andrej Cvetkovski, Flavio Esposito","doi":"10.1145/3360664.3360678","DOIUrl":"https://doi.org/10.1145/3360664.3360678","url":null,"abstract":"Following the repeated reports of high prevalence of functional illiteracy in the countries of the Western Balkans, we go on to study the password composition habits of cultural groups from this region. Ina password cracking experiment, we obtain and analyze a number of passwords composed for use in learning management systems (LMS) by recent high-school graduates from North Macedonia. We estimate the strength of these passwords and their crackability by methods adjusted to local cultural specifics. Our results indicate that high extent of general illiteracy is intertwined with low awareness about good password practices, which in turn may lead to creating various vulnerabilities to deployed systems and confidential data. We conclude that, in the studied region, there is an immediate need for educating the population of good password practices and good system and data security practices in general.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the Third Central European Cybersecurity Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1