首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
What should we pay attention to when classifying violent videos? 在对暴力视频进行分类时,我们应该注意什么?
Marcos Vinícius Adão Teixeira, S. Avila
Many works on violent video classification have proposed solutions ranging from local descriptors to deep neural networks. Most approaches use the entire representation of the video as input to extract the appropriate features. However, some scenes may contain noisy and irrelevant parts that confuse the algorithm. We investigated the effectiveness of attention-based models to deal with this problem. We extended the initial implementations to work with multimodal features using the late fusion approach. We performed the experiments on three datasets with different concepts of violence: Hockey Fights, MediaEval 2015, and RWF-2000. We conducted quantitative experiments, analyzing the performance of attention-based models and comparing them with traditional methods, and qualitative, analyzing the relevance scores produced by the attention-based models. Attention-based models surpassed their traditional counterpart for all cases. Also, attention-based models have achieved better results than many more expensive approaches, highlighting the advantage of their use.
许多关于暴力视频分类的工作已经提出了从局部描述符到深度神经网络的解决方案。大多数方法使用视频的整个表示作为输入来提取适当的特征。然而,一些场景可能包含嘈杂和不相关的部分,使算法困惑。我们研究了基于注意的模型处理这一问题的有效性。我们扩展了最初的实现,使用后期融合方法来处理多模态特性。我们在三个具有不同暴力概念的数据集上进行了实验:Hockey Fights、MediaEval 2015和RWF-2000。我们进行了定量实验,分析了基于注意力的模型的性能,并与传统方法进行了比较;定性实验,分析了基于注意力的模型产生的相关分数。基于注意力的模型在所有情况下都优于传统模型。此外,基于注意力的模型比许多更昂贵的方法取得了更好的结果,突出了它们使用的优势。
{"title":"What should we pay attention to when classifying violent videos?","authors":"Marcos Vinícius Adão Teixeira, S. Avila","doi":"10.1145/3465481.3470059","DOIUrl":"https://doi.org/10.1145/3465481.3470059","url":null,"abstract":"Many works on violent video classification have proposed solutions ranging from local descriptors to deep neural networks. Most approaches use the entire representation of the video as input to extract the appropriate features. However, some scenes may contain noisy and irrelevant parts that confuse the algorithm. We investigated the effectiveness of attention-based models to deal with this problem. We extended the initial implementations to work with multimodal features using the late fusion approach. We performed the experiments on three datasets with different concepts of violence: Hockey Fights, MediaEval 2015, and RWF-2000. We conducted quantitative experiments, analyzing the performance of attention-based models and comparing them with traditional methods, and qualitative, analyzing the relevance scores produced by the attention-based models. Attention-based models surpassed their traditional counterpart for all cases. Also, attention-based models have achieved better results than many more expensive approaches, highlighting the advantage of their use.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116615841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods 用正式和实用的方法分析和保护某些/IP汽车服务
Daniel Zelle, Timm Lauser, Dustin Kern, C. Krauß
Automotive Ethernet is increasingly used in modern vehicles and complements or replaces legacy bus systems such as CAN. Ethernet also enables service-oriented communication with the Scalable service-Oriented MiddlewarE over IP (SOME/IP) middleware. In this paper, we present a formal and practical security analysis of Scalable service-Oriented MiddlewarE over IP (SOME/IP), the identified Man-in-the-Middle (MITM) attacks, and propose two security extensions. The attacks are possible even if SOME/IP is used in combination with link layer security mechanisms. The attacker can impersonate a service offering server and a service consuming client. The two most common communication methods, request/response and publish/subscribe, are both vulnerable. In most communication scenarios, we are able to route all messages over the attacker. Our security extensions for authentication and authorization of service provisioning and usage protect against these attacks. We formally analyze the security and evaluate the overhead with practical implementations.
汽车以太网越来越多地用于现代车辆,并补充或取代传统总线系统,如CAN。以太网还支持通过IP (SOME/IP)中间件与可扩展的面向服务的中间件进行面向服务的通信。本文对基于IP的可扩展面向服务中间件(SOME/IP)、已识别的中间人攻击(MITM)进行了形式化和实用的安全分析,并提出了两种安全扩展。即使将SOME/IP与链路层安全机制结合使用,也有可能受到攻击。攻击者可以模拟服务提供服务器和服务消费客户端。两种最常见的通信方法,请求/响应和发布/订阅,都是脆弱的。在大多数通信场景中,我们能够通过攻击者路由所有消息。我们用于服务供应和使用的身份验证和授权的安全扩展可以防止这些攻击。我们正式分析了安全性并评估了实际实现的开销。
{"title":"Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods","authors":"Daniel Zelle, Timm Lauser, Dustin Kern, C. Krauß","doi":"10.1145/3465481.3465748","DOIUrl":"https://doi.org/10.1145/3465481.3465748","url":null,"abstract":"Automotive Ethernet is increasingly used in modern vehicles and complements or replaces legacy bus systems such as CAN. Ethernet also enables service-oriented communication with the Scalable service-Oriented MiddlewarE over IP (SOME/IP) middleware. In this paper, we present a formal and practical security analysis of Scalable service-Oriented MiddlewarE over IP (SOME/IP), the identified Man-in-the-Middle (MITM) attacks, and propose two security extensions. The attacks are possible even if SOME/IP is used in combination with link layer security mechanisms. The attacker can impersonate a service offering server and a service consuming client. The two most common communication methods, request/response and publish/subscribe, are both vulnerable. In most communication scenarios, we are able to route all messages over the attacker. Our security extensions for authentication and authorization of service provisioning and usage protect against these attacks. We formally analyze the security and evaluate the overhead with practical implementations.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks 在分散的社交网络中实现隐私保护规则挖掘
A. Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser
Decentralized online social networks enhance users’ privacy by empowering them to control their data. However, these networks mostly lack for practical solutions for building recommender systems in a privacy-preserving manner that help to improve the network’s services. Association rule mining is one of the basic building blocks for many recommender systems. In this paper, we propose an efficient approach enabling rule mining on distributed data. We leverage the Metropolis-Hasting random walk sampling and distributed FP-Growth mining algorithm to maintain the users’ privacy. We evaluate our approach on three real-world datasets. Results reveal that the approach achieves high average precision scores () for as low as 1% sample size in well-connected social networks with remarkable reduction in communication and computational costs.
分散的在线社交网络通过授权用户控制自己的数据来增强用户的隐私。然而,这些网络大多缺乏以保护隐私的方式构建推荐系统的实际解决方案,这有助于改善网络的服务。关联规则挖掘是许多推荐系统的基本构建块之一。本文提出了一种对分布式数据进行规则挖掘的有效方法。我们利用Metropolis-Hasting随机漫步采样和分布式FP-Growth挖掘算法来维护用户的隐私。我们在三个真实世界的数据集上评估了我们的方法。结果表明,在连接良好的社交网络中,该方法在低至1%的样本量下获得了较高的平均精度分数(),并且显著降低了通信和计算成本。
{"title":"Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks","authors":"A. Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser","doi":"10.1145/3465481.3465482","DOIUrl":"https://doi.org/10.1145/3465481.3465482","url":null,"abstract":"Decentralized online social networks enhance users’ privacy by empowering them to control their data. However, these networks mostly lack for practical solutions for building recommender systems in a privacy-preserving manner that help to improve the network’s services. Association rule mining is one of the basic building blocks for many recommender systems. In this paper, we propose an efficient approach enabling rule mining on distributed data. We leverage the Metropolis-Hasting random walk sampling and distributed FP-Growth mining algorithm to maintain the users’ privacy. We evaluate our approach on three real-world datasets. Results reveal that the approach achieves high average precision scores () for as low as 1% sample size in well-connected social networks with remarkable reduction in communication and computational costs.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive 泛欧洲网络安全事件信息共享平台支持NIS指令
D. Skias, S. Tsekeridou, T. Zahariadis, Artemis C. Voulkidis, T. Velivassaki, K. Fotiadou
Cybersecurity in the Energy sector and relevant information sharing is at the foremost of European strategy towards the digital decade targeted by the EC for the years to come. The proposed Pan-European Incidents Information Sharing Platform (I2SP) offers a cyber-shield armour to European Electrical Power and Energy Systems (EPES) enabling cooperative detection of large scale, cyber-human security and privacy incidents and attacks. Via Incidents Information Sharing Platform, early detection and appropriate mitigation, guarantees the continuity of operations and minimization of cascading effects in the infrastructure itself, the environment, the citizens and the end-users.The Incidents’ Information Sharing Platform (I2SP) constitutes the software package which enables secure Cyber-Threat Intelligence (CTI) information sharing among EPES participants, as well as with trusted nominated entities, such as Information Sharing and Analysis Centers (ISACs), Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOC). I2SP facilitates technical information sharing in view of a warning system and incident reporting across the EU, aligning with the pillars of the new Network Code on Cybersecurity.
能源领域的网络安全和相关信息共享是欧盟未来几年数字化十年战略的重中之重。拟议的泛欧事件信息共享平台(I2SP)为欧洲电力和能源系统(EPES)提供了一个网络防护装甲,使其能够协作检测大规模的网络-人类安全和隐私事件和攻击。通过事件信息共享平台,早期发现和适当缓解,保证了运营的连续性,并将基础设施本身、环境、公民和最终用户的级联效应降至最低。事件信息共享平台(I2SP)是一个软件包,用于在EPES参与者之间以及与受信任的指定实体(如信息共享和分析中心(ISACs)、计算机安全事件响应小组(csirt)和安全运营中心(SOC)之间实现安全的网络威胁情报(CTI)信息共享。鉴于预警系统和整个欧盟的事件报告,I2SP促进了技术信息共享,与新的网络安全网络代码的支柱保持一致。
{"title":"Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive","authors":"D. Skias, S. Tsekeridou, T. Zahariadis, Artemis C. Voulkidis, T. Velivassaki, K. Fotiadou","doi":"10.1145/3465481.3470477","DOIUrl":"https://doi.org/10.1145/3465481.3470477","url":null,"abstract":"Cybersecurity in the Energy sector and relevant information sharing is at the foremost of European strategy towards the digital decade targeted by the EC for the years to come. The proposed Pan-European Incidents Information Sharing Platform (I2SP) offers a cyber-shield armour to European Electrical Power and Energy Systems (EPES) enabling cooperative detection of large scale, cyber-human security and privacy incidents and attacks. Via Incidents Information Sharing Platform, early detection and appropriate mitigation, guarantees the continuity of operations and minimization of cascading effects in the infrastructure itself, the environment, the citizens and the end-users.The Incidents’ Information Sharing Platform (I2SP) constitutes the software package which enables secure Cyber-Threat Intelligence (CTI) information sharing among EPES participants, as well as with trusted nominated entities, such as Information Sharing and Analysis Centers (ISACs), Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOC). I2SP facilitates technical information sharing in view of a warning system and incident reporting across the EU, aligning with the pillars of the new Network Code on Cybersecurity.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Userspace Software Integrity Measurement 用户空间软件完整性测量
Michael Eckel, Tim Riemann
Todays computing systems are more interconnected and sophisticated than ever before. Especially in healthcare 4.0, services and infrastructures rely on cyber-physical systemss (CPSess) and Internet of Things (IoT) devices. This adds to the complexity of these highly connected systems and their manageability. Even worse, the variety of emerging cyber attacks is becoming more severe and sophisticated, making healthcare one of the most important sectors with major security risks. The development of appropriate countermeasures constitutes one of the most complex and difficult challenges in cyber security research. Research areas include, among others, anomaly detection, network security, multi-layer event detection, cyber resiliency, and integrity protection. Securing the integrity of software running on a device is a desirable protection goal in the context of systems security. With a Trusted Platform Module (TPM), measured boot, and remote attestation there exist technologies to ensure that a system has booted up correctly and runs only authentic software. The Linux Integrity Measurement Architecture (IMA) extends these principles into the operating systems (OSes), measuring native binaries before they are loaded. However, interpreted language files, such as Java classes and Python scripts, are not considered executables and are not measured as such. Contemporary OSess ship with many of these and it is vital to consider them as security-critical as native binaries. In this paper, we introduce Userspace Software Integrity Measurement (USIM) for the Linux OSes. Userspace Software Integrity Measurement (USIM) enables interpreters to measure, log, and irrevocably anchor critical events in the TPM. We develop a software library in C which provides TPM-based measurement functionality as well as the USIM service, which provides concurrent access handling to the TPM based event logging. Further, we develop and implement a concept to realize highly frequent event logging on the slow TPM. We integrate this library into the Java Virtual Machine (JVM) to measure Java classes and show that it can be easily integrated into other interpreters. With performance measurements we demonstrate that our contribution is feasible and that overhead is negligible.
今天的计算系统比以往任何时候都更加互联和复杂。特别是在医疗保健4.0中,服务和基础设施依赖于网络物理系统(CPSess)和物联网(IoT)设备。这增加了这些高度连接的系统及其可管理性的复杂性。更糟糕的是,各种新兴的网络攻击正变得越来越严重和复杂,使医疗保健成为存在重大安全风险的最重要行业之一。制定适当的对策是网络安全研究中最复杂、最困难的挑战之一。研究领域包括异常检测、网络安全、多层事件检测、网络弹性、完整性保护等。在系统安全上下文中,确保在设备上运行的软件的完整性是一个理想的保护目标。有了可信平台模块(Trusted Platform Module, TPM)、可测量的引导和远程认证,现有的技术可以确保系统已经正确引导,并且只运行正版软件。Linux完整性度量体系结构(IMA)将这些原则扩展到操作系统中,在加载本机二进制文件之前对它们进行度量。但是,解释过的语言文件(如Java类和Python脚本)不被视为可执行文件,也不被视为可执行文件。当代OSess中有许多这样的代码,将它们视为与本地二进制代码一样具有安全性的关键代码是至关重要的。本文介绍了Linux操作系统的用户空间软件完整性度量(USIM)。用户空间软件完整性度量(USIM)允许解释器在TPM中度量、记录和不可撤销地锚定关键事件。我们用C语言开发了一个软件库,它提供了基于TPM的测量功能和USIM服务,USIM服务为基于TPM的事件日志提供并发访问处理。此外,我们开发并实现了在慢速TPM上实现高频率事件日志记录的概念。我们将这个库集成到Java虚拟机(JVM)中,以度量Java类,并表明它可以轻松集成到其他解释器中。通过性能度量,我们证明了我们的贡献是可行的,开销可以忽略不计。
{"title":"Userspace Software Integrity Measurement","authors":"Michael Eckel, Tim Riemann","doi":"10.1145/3465481.3470018","DOIUrl":"https://doi.org/10.1145/3465481.3470018","url":null,"abstract":"Todays computing systems are more interconnected and sophisticated than ever before. Especially in healthcare 4.0, services and infrastructures rely on cyber-physical systemss (CPSess) and Internet of Things (IoT) devices. This adds to the complexity of these highly connected systems and their manageability. Even worse, the variety of emerging cyber attacks is becoming more severe and sophisticated, making healthcare one of the most important sectors with major security risks. The development of appropriate countermeasures constitutes one of the most complex and difficult challenges in cyber security research. Research areas include, among others, anomaly detection, network security, multi-layer event detection, cyber resiliency, and integrity protection. Securing the integrity of software running on a device is a desirable protection goal in the context of systems security. With a Trusted Platform Module (TPM), measured boot, and remote attestation there exist technologies to ensure that a system has booted up correctly and runs only authentic software. The Linux Integrity Measurement Architecture (IMA) extends these principles into the operating systems (OSes), measuring native binaries before they are loaded. However, interpreted language files, such as Java classes and Python scripts, are not considered executables and are not measured as such. Contemporary OSess ship with many of these and it is vital to consider them as security-critical as native binaries. In this paper, we introduce Userspace Software Integrity Measurement (USIM) for the Linux OSes. Userspace Software Integrity Measurement (USIM) enables interpreters to measure, log, and irrevocably anchor critical events in the TPM. We develop a software library in C which provides TPM-based measurement functionality as well as the USIM service, which provides concurrent access handling to the TPM based event logging. Further, we develop and implement a concept to realize highly frequent event logging on the slow TPM. We integrate this library into the Java Virtual Machine (JVM) to measure Java classes and show that it can be easily integrated into other interpreters. With performance measurements we demonstrate that our contribution is feasible and that overhead is negligible.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems V2C:汽车系统基于信任的车辆到云异常检测框架
Thomas Rosenstatter, T. Olovsson, M. Almgren
Vehicles have become connected in many ways. They communicate with the cloud and will use Vehicle-to-Everything (V2X) communication to exchange warning messages and perform cooperative actions such as platooning. Vehicles have already been attacked and will become even more attractive targets due to their increasing connectivity, the amount of data they produce and their importance to our society. It is therefore crucial to provide cyber security measures to prevent and limit the impact of attacks. As it is problematic for a vehicle to reliably assess its own state when it is compromised, we investigate how vehicle trust can be used to identify compromised vehicles and how fleet-wide attacks can be detected at an early stage using cloud data. In our proposed V2C Anomaly Detection framework, peer vehicles assess each other based on their perceived behavior in traffic and V2X-enabled interactions, and upload these assessments to the cloud for analysis. This framework consists of four modules. For each module we define functional demands, interfaces and evaluate solutions proposed in literature allowing manufacturers and fleet owners to choose appropriate techniques. We detail attack scenarios where this type of framework is particularly useful in detecting and identifying potential attacks and failing software and hardware. Furthermore, we describe what basic vehicle data the cloud analysis can be based upon.
汽车已经在很多方面实现了互联。它们与云通信,并将使用车联网(V2X)通信来交换警告信息,并执行列队等合作行动。汽车已经受到过攻击,而且由于其日益增长的连接性、产生的数据量以及对我们社会的重要性,汽车将成为更具吸引力的目标。因此,提供预防和限制攻击影响的网络安全措施至关重要。由于车辆在受到攻击时难以可靠地评估自身状态,因此我们研究了如何使用车辆信任来识别受到攻击的车辆,以及如何使用云数据在早期阶段检测到车队范围内的攻击。在我们提出的V2C异常检测框架中,对等车辆根据其在交通和支持V2C的交互中的感知行为相互评估,并将这些评估上传到云端进行分析。该框架由四个模块组成。对于每个模块,我们定义了功能需求、接口并评估了文献中提出的解决方案,允许制造商和车队所有者选择适当的技术。我们详细介绍了这种类型的框架在检测和识别潜在攻击以及软件和硬件故障方面特别有用的攻击场景。此外,我们还描述了云分析可以基于哪些基本车辆数据。
{"title":"V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems","authors":"Thomas Rosenstatter, T. Olovsson, M. Almgren","doi":"10.1145/3465481.3465750","DOIUrl":"https://doi.org/10.1145/3465481.3465750","url":null,"abstract":"Vehicles have become connected in many ways. They communicate with the cloud and will use Vehicle-to-Everything (V2X) communication to exchange warning messages and perform cooperative actions such as platooning. Vehicles have already been attacked and will become even more attractive targets due to their increasing connectivity, the amount of data they produce and their importance to our society. It is therefore crucial to provide cyber security measures to prevent and limit the impact of attacks. As it is problematic for a vehicle to reliably assess its own state when it is compromised, we investigate how vehicle trust can be used to identify compromised vehicles and how fleet-wide attacks can be detected at an early stage using cloud data. In our proposed V2C Anomaly Detection framework, peer vehicles assess each other based on their perceived behavior in traffic and V2X-enabled interactions, and upload these assessments to the cloud for analysis. This framework consists of four modules. For each module we define functional demands, interfaces and evaluate solutions proposed in literature allowing manufacturers and fleet owners to choose appropriate techniques. We detail attack scenarios where this type of framework is particularly useful in detecting and identifying potential attacks and failing software and hardware. Furthermore, we describe what basic vehicle data the cloud analysis can be based upon.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"23 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Online Parking Based on Smart Contracts 基于智能合约的隐私保护在线停车
Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, L. Malina
This work presents a complex privacy-preserving solution based on attribute-based credentials and smart contract techniques for emerging parking services in city zones. Our system provides the full set of privacy-enhancing features such as anonymity, untraceability, and unlinkability of user parking registrations. Thanks to that it prevents the city and service providers from profiling and tracking the users (e.g., their movement). Furthermore, we involved smart contracts and the underlying decentralized Blockchain technology in payment and verification phases to prevent the presence of a single point of failure in those processes which can endanger the system’s security and availability. We provide the full cryptographic specification of the system, its security analysis, and the implementation results in this paper.
这项工作提出了一种复杂的隐私保护解决方案,该解决方案基于基于属性的凭据和智能合约技术,适用于城市区域的新兴停车服务。我们的系统提供了完整的隐私增强功能,如匿名性,不可追溯性和用户停车注册的不可链接性。因此,它可以防止城市和服务提供商分析和跟踪用户(例如,他们的移动)。此外,我们在支付和验证阶段涉及智能合约和底层去中心化区块链技术,以防止在这些过程中存在可能危及系统安全性和可用性的单点故障。本文给出了系统的完整密码规范、安全性分析和实现结果。
{"title":"Privacy-Preserving Online Parking Based on Smart Contracts","authors":"Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, L. Malina","doi":"10.1145/3465481.3470058","DOIUrl":"https://doi.org/10.1145/3465481.3470058","url":null,"abstract":"This work presents a complex privacy-preserving solution based on attribute-based credentials and smart contract techniques for emerging parking services in city zones. Our system provides the full set of privacy-enhancing features such as anonymity, untraceability, and unlinkability of user parking registrations. Thanks to that it prevents the city and service providers from profiling and tracking the users (e.g., their movement). Furthermore, we involved smart contracts and the underlying decentralized Blockchain technology in payment and verification phases to prevent the presence of a single point of failure in those processes which can endanger the system’s security and availability. We provide the full cryptographic specification of the system, its security analysis, and the implementation results in this paper.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PESTLE Analysis of Cybersecurity Education 网络安全教育的杵状分析
Sara Ricci, V. Janout, S. Parker, J. Jerabek, J. Hajny, Argyro Chatzopoulou, Rémi Badonnel
Cybersecurity is a vital part of digital economies and digital governing but the discipline is suffering from a pronounced skills shortage. Nevertheless, the reasons for the inability of academia to produce enough graduates with the skills that reflect the needs of the cybersecurity industry are not well understood. In this article, we have analysed the skills shortages, gaps, and mismatches affecting cybersecurity education. We performed a Political, Economic, Social, Technological, Legal, and Environmental (PESTLE) analysis, that allowed us to have an overview of the cybersecurity education environment from multiple perspectives. The results of this analysis highlight 31 different factors affecting cybersecurity education on a European level. These factors were further analysed from the specific perspectives of 11 European countries. In this further analysis, particular attention was given to the linkages between the identified factors. This helped to reveal which factors are connected and to describe how they are mutually dependent. A statistical approach was used to depict the results in a more general and comprehensive way and facilitated the development of our conclusions. Our analysis identifies a lack of European coordination and cooperation towards a common cybersecurity framework as one of the main factors affecting cybersecurity education.
网络安全是数字经济和数字治理的重要组成部分,但该学科正面临着明显的技能短缺。然而,学术界无法培养出足够多具备反映网络安全行业需求的技能的毕业生,其原因尚不清楚。在本文中,我们分析了影响网络安全教育的技能短缺、差距和不匹配。我们进行了政治、经济、社会、技术、法律和环境(PESTLE)分析,使我们能够从多个角度对网络安全教育环境进行概述。该分析的结果突出了影响欧洲网络安全教育的31个不同因素。从11个欧洲国家的具体角度进一步分析了这些因素。在进一步的分析中,特别注意了所确定因素之间的联系。这有助于揭示哪些因素是相互联系的,并描述它们是如何相互依赖的。采用统计方法以更一般和全面的方式描述结果,并促进了我们结论的发展。我们的分析表明,欧洲缺乏对共同网络安全框架的协调与合作是影响网络安全教育的主要因素之一。
{"title":"PESTLE Analysis of Cybersecurity Education","authors":"Sara Ricci, V. Janout, S. Parker, J. Jerabek, J. Hajny, Argyro Chatzopoulou, Rémi Badonnel","doi":"10.1145/3465481.3469184","DOIUrl":"https://doi.org/10.1145/3465481.3469184","url":null,"abstract":"Cybersecurity is a vital part of digital economies and digital governing but the discipline is suffering from a pronounced skills shortage. Nevertheless, the reasons for the inability of academia to produce enough graduates with the skills that reflect the needs of the cybersecurity industry are not well understood. In this article, we have analysed the skills shortages, gaps, and mismatches affecting cybersecurity education. We performed a Political, Economic, Social, Technological, Legal, and Environmental (PESTLE) analysis, that allowed us to have an overview of the cybersecurity education environment from multiple perspectives. The results of this analysis highlight 31 different factors affecting cybersecurity education on a European level. These factors were further analysed from the specific perspectives of 11 European countries. In this further analysis, particular attention was given to the linkages between the identified factors. This helped to reveal which factors are connected and to describe how they are mutually dependent. A statistical approach was used to depict the results in a more general and comprehensive way and facilitated the development of our conclusions. Our analysis identifies a lack of European coordination and cooperation towards a common cybersecurity framework as one of the main factors affecting cybersecurity education.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SoK: Remote Power Analysis 远程功率分析
M. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, B. Brumley
In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.
近年来,出现了许多攻击,其目的是利用功率侧信道矢量窃取受害者的秘密信息,但没有直接的物理访问。这些攻击被称为远程电源攻击或远程电源分析,利用受害者环境中本地存在的资源。然而,对于将强力攻击定义为远程攻击所需的限制,并没有统一的定义。本文旨在提出一个统一的定义和具体的威胁模型,以明确区分远程电源攻击和非远程电源攻击。此外,我们收集了迄今为止从文献中执行的主要远程电源攻击,并提出了避免它们的主要对策。对这种对策的研究表明,在技术层面上,在防止远程电力攻击方面存在明显差距。因此,学术界必须面对一个重要的挑战,以避免这种新出现的威胁,因为在处理私人信息的设备的防御和安全方面应该有明显的改进空间。
{"title":"SoK: Remote Power Analysis","authors":"M. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, B. Brumley","doi":"10.1145/3465481.3465773","DOIUrl":"https://doi.org/10.1145/3465481.3465773","url":null,"abstract":"In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs 在fpga上实现晶体-二锂签名方案
Sara Ricci, L. Malina, P. Jedlicka, D. Smekal, J. Hajny, Peter Cíbik, P. Dobias
In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). In this work, we present the first Very High Speed Integrated Circuit Hardware Description Language (VHDL) implementation of the CRYSTALS-Dilithium signature scheme for Field-Programmable Gate Arrays (FPGAs). Due to our parallelization-based design requiring only low numbers of cycles, running at high frequency and using reasonable amount of hardware resources on FPGA, our implementation is able to sign 15832 messages per second and verify 10524 signatures per second. In particular, the signing algorithm requires 68461 Look-Up Tables (LUTs), 86295 Flip-Flops (FFs), and the verification algorithm takes 61738 LUTs and 34963 FFs on Virtex 7 UltraScale+ FPGAs. In this article, experimental results for each Dilithium security level are provided and our VHDL-based implementation is compared with related High-Level Synthesis (HLS)-based implementations. Our solution is ca 114 times faster (in the signing algorithm) and requires less hardware resources.
2020年7月,基于晶格的晶体-锂数字签名方案被美国国家标准与技术研究院(NIST)选为后量子加密标准化过程的三个第三轮决赛入围者之一。在这项工作中,我们提出了用于现场可编程门阵列(fpga)的晶体-锂签名方案的第一个超高速集成电路硬件描述语言(VHDL)实现。由于我们基于并行的设计只需要少量的周期,在高频率下运行,并且在FPGA上使用合理数量的硬件资源,我们的实现每秒能够签署15832条消息,每秒验证10524个签名。其中签名算法在Virtex 7 UltraScale+ fpga上需要68461个查找表(lut)和86295个触发器(ff),验证算法需要61738个lut和34963个触发器。本文给出了每个安全级别的实验结果,并将我们基于vhdl的实现与相关的基于高级合成(High-Level Synthesis, HLS)的实现进行了比较。我们的解决方案大约要快114倍(在签名算法中),并且需要更少的硬件资源。
{"title":"Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs","authors":"Sara Ricci, L. Malina, P. Jedlicka, D. Smekal, J. Hajny, Peter Cíbik, P. Dobias","doi":"10.1145/3465481.3465756","DOIUrl":"https://doi.org/10.1145/3465481.3465756","url":null,"abstract":"In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). In this work, we present the first Very High Speed Integrated Circuit Hardware Description Language (VHDL) implementation of the CRYSTALS-Dilithium signature scheme for Field-Programmable Gate Arrays (FPGAs). Due to our parallelization-based design requiring only low numbers of cycles, running at high frequency and using reasonable amount of hardware resources on FPGA, our implementation is able to sign 15832 messages per second and verify 10524 signatures per second. In particular, the signing algorithm requires 68461 Look-Up Tables (LUTs), 86295 Flip-Flops (FFs), and the verification algorithm takes 61738 LUTs and 34963 FFs on Virtex 7 UltraScale+ FPGAs. In this article, experimental results for each Dilithium security level are provided and our VHDL-based implementation is compared with related High-Level Synthesis (HLS)-based implementations. Our solution is ca 114 times faster (in the signing algorithm) and requires less hardware resources.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1