首页 > 最新文献

Proceedings of the 16th International Conference on Availability, Reliability and Security最新文献

英文 中文
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs 基于CNN-LSTM混合方法的sdn异常检测系统
Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, A. Jurcut
Software-Defined Networking (SDN) is a promising technology for the future Internet. However, the SDN paradigm introduces new attack vectors that do not exist in the conventional distributed networks. This paper develops a hybrid Intrusion Detection System (IDS) by combining the Convolutional Neural Network (CNN) and Long Short-Term Memory Network (LSTM). The proposed model is capable of capturing the spatial and temporal features of the network traffic. Two regularization techniques i.e., L2 Regularization () and dropout method are used to overcome with the overfitting problem. The proposed method improves the intrusion detection performance of zero-day attacks. The InSDN dataset — the most recent dataset for SDN networks is used to test and evaluate the performance of the proposed model. The results indicate that integrating the CNN with LSTM improves the intrusion detection performance and achieves an accuracy of 96.32%. The estimated accuracy is higher than the accuracy of each individual model. In addition, it is established that the regularization techniques improves the performance of the CNN algorithms in detecting new intrusions when compared to the standard CNN. The findings of this study facilitates the development of robust IDS systems for SDN environment.
软件定义网络(SDN)是未来互联网的一项很有前途的技术。然而,SDN范式引入了传统分布式网络中不存在的新的攻击向量。本文将卷积神经网络(CNN)和长短期记忆网络(LSTM)相结合,开发了一种混合入侵检测系统(IDS)。该模型能够捕捉网络流量的时空特征。利用L2正则化()和dropout法两种正则化技术克服了过拟合问题。该方法提高了零日攻击的入侵检测性能。InSDN数据集- SDN网络的最新数据集用于测试和评估所提出模型的性能。结果表明,将CNN与LSTM相结合提高了入侵检测性能,准确率达到96.32%。估计的精度高于每个单独模型的精度。此外,与标准CNN相比,正则化技术提高了CNN算法检测新入侵的性能。本研究的结果有助于SDN环境下健壮的IDS系统的开发。
{"title":"A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs","authors":"Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, A. Jurcut","doi":"10.1145/3465481.3469190","DOIUrl":"https://doi.org/10.1145/3465481.3469190","url":null,"abstract":"Software-Defined Networking (SDN) is a promising technology for the future Internet. However, the SDN paradigm introduces new attack vectors that do not exist in the conventional distributed networks. This paper develops a hybrid Intrusion Detection System (IDS) by combining the Convolutional Neural Network (CNN) and Long Short-Term Memory Network (LSTM). The proposed model is capable of capturing the spatial and temporal features of the network traffic. Two regularization techniques i.e., L2 Regularization () and dropout method are used to overcome with the overfitting problem. The proposed method improves the intrusion detection performance of zero-day attacks. The InSDN dataset — the most recent dataset for SDN networks is used to test and evaluate the performance of the proposed model. The results indicate that integrating the CNN with LSTM improves the intrusion detection performance and achieves an accuracy of 96.32%. The estimated accuracy is higher than the accuracy of each individual model. In addition, it is established that the regularization techniques improves the performance of the CNN algorithms in detecting new intrusions when compared to the standard CNN. The findings of this study facilitates the development of robust IDS systems for SDN environment.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121544525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning DISSIMILAR:利用信息隐藏、信号处理和机器学习来检测假新闻
D. Megías, M. Kuribayashi, A. Rosales, W. Mazurczyk
Digital media have changed the classical model of mass media that considers the transmitter of a message and a passive receiver, to a model where users of the digital media can appropriate the contents, recreate, and circulate them. In this context, online social media are a suitable circuit for the distribution of fake news and the spread of disinformation. Particularly, photo and video editing tools and recent advances in artificial intelligence allow non-professionals to easily counterfeit multimedia documents and create deep fakes. To avoid the spread of disinformation, some online social media deploy methods to filter fake content. Although this can be an effective method, its centralized approach gives an enormous power to the manager of these services. Considering the above, this paper outlines the main principles and research approach of the ongoing DISSIMILAR project, which is focused on the detection of fake news on social media platforms using information hiding techniques, in particular, digital watermarking, combined with machine learning approaches.
数字媒体已经改变了传统的大众传媒模式,即信息的发送者和被动的接收者,到数字媒体的用户可以占用内容,重新创作和传播它们的模式。在这种背景下,在线社交媒体是假新闻传播和虚假信息传播的合适渠道。特别是,照片和视频编辑工具以及人工智能的最新进展使非专业人员可以轻松伪造多媒体文档并创建深度伪造。为了避免虚假信息的传播,一些在线社交媒体采用了过滤虚假内容的方法。尽管这可能是一种有效的方法,但它的集中方法给了这些服务的管理人员巨大的权力。综上所述,本文概述了正在进行的DISSIMILAR项目的主要原则和研究方法,该项目的重点是使用信息隐藏技术(特别是数字水印)结合机器学习方法检测社交媒体平台上的假新闻。
{"title":"DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning","authors":"D. Megías, M. Kuribayashi, A. Rosales, W. Mazurczyk","doi":"10.1145/3465481.3470088","DOIUrl":"https://doi.org/10.1145/3465481.3470088","url":null,"abstract":"Digital media have changed the classical model of mass media that considers the transmitter of a message and a passive receiver, to a model where users of the digital media can appropriate the contents, recreate, and circulate them. In this context, online social media are a suitable circuit for the distribution of fake news and the spread of disinformation. Particularly, photo and video editing tools and recent advances in artificial intelligence allow non-professionals to easily counterfeit multimedia documents and create deep fakes. To avoid the spread of disinformation, some online social media deploy methods to filter fake content. Although this can be an effective method, its centralized approach gives an enormous power to the manager of these services. Considering the above, this paper outlines the main principles and research approach of the ongoing DISSIMILAR project, which is focused on the detection of fake news on social media platforms using information hiding techniques, in particular, digital watermarking, combined with machine learning approaches.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124031777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SoK: Remote Power Analysis 远程功率分析
M. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, B. Brumley
In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.
近年来,出现了许多攻击,其目的是利用功率侧信道矢量窃取受害者的秘密信息,但没有直接的物理访问。这些攻击被称为远程电源攻击或远程电源分析,利用受害者环境中本地存在的资源。然而,对于将强力攻击定义为远程攻击所需的限制,并没有统一的定义。本文旨在提出一个统一的定义和具体的威胁模型,以明确区分远程电源攻击和非远程电源攻击。此外,我们收集了迄今为止从文献中执行的主要远程电源攻击,并提出了避免它们的主要对策。对这种对策的研究表明,在技术层面上,在防止远程电力攻击方面存在明显差距。因此,学术界必须面对一个重要的挑战,以避免这种新出现的威胁,因为在处理私人信息的设备的防御和安全方面应该有明显的改进空间。
{"title":"SoK: Remote Power Analysis","authors":"M. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, B. Brumley","doi":"10.1145/3465481.3465773","DOIUrl":"https://doi.org/10.1145/3465481.3465773","url":null,"abstract":"In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching MI-LXC:小型类互联网环境下的网络安全教学
François Lesueur, Camille Noûs
MI-LXC is a framework to simulate an internet-like infrastructure on top of LXC to practice cybersecurity on a realistic environment. MI-LXC follows the infrastructure-as-code paradigm to program the topology of the system and the provisioning of the different hosts. This construction is highly customizable, allowing to create hosts ranging from webservers to graphical desktops. Provisioning of similar subsets of features on different hosts is attained through a template mechanism. MI-LXC currently provides 28 hosts in 11 AS, allowing to simulate BGP routing, DNS, SMTP, HTTP, Certification authorities as well as attacks against these protocols. In this article, we present the MI-LXC framework, the generated infrastructure and some labs on top of it. MI-LXC is a free software (AGPL).
MI-LXC是一个框架,用于在LXC之上模拟类似互联网的基础设施,以在现实环境中实践网络安全。MI-LXC遵循基础设施即代码范式,对系统拓扑和不同主机的供应进行编程。这种结构是高度可定制的,允许创建从web服务器到图形桌面的主机。通过模板机制可以在不同主机上提供相似的特性子集。MI-LXC目前在11个AS中提供28个主机,允许模拟BGP路由、DNS、SMTP、HTTP、证书颁发机构以及针对这些协议的攻击。在本文中,我们介绍了MI-LXC框架、生成的基础设施和基于它的一些实验。MI-LXC是一个自由软件(AGPL)。
{"title":"MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching","authors":"François Lesueur, Camille Noûs","doi":"10.1145/3465481.3469181","DOIUrl":"https://doi.org/10.1145/3465481.3469181","url":null,"abstract":"MI-LXC is a framework to simulate an internet-like infrastructure on top of LXC to practice cybersecurity on a realistic environment. MI-LXC follows the infrastructure-as-code paradigm to program the topology of the system and the provisioning of the different hosts. This construction is highly customizable, allowing to create hosts ranging from webservers to graphical desktops. Provisioning of similar subsets of features on different hosts is attained through a template mechanism. MI-LXC currently provides 28 hosts in 11 AS, allowing to simulate BGP routing, DNS, SMTP, HTTP, Certification authorities as well as attacks against these protocols. In this article, we present the MI-LXC framework, the generated infrastructure and some labs on top of it. MI-LXC is a free software (AGPL).","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks 在分散的社交网络中实现隐私保护规则挖掘
A. Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser
Decentralized online social networks enhance users’ privacy by empowering them to control their data. However, these networks mostly lack for practical solutions for building recommender systems in a privacy-preserving manner that help to improve the network’s services. Association rule mining is one of the basic building blocks for many recommender systems. In this paper, we propose an efficient approach enabling rule mining on distributed data. We leverage the Metropolis-Hasting random walk sampling and distributed FP-Growth mining algorithm to maintain the users’ privacy. We evaluate our approach on three real-world datasets. Results reveal that the approach achieves high average precision scores () for as low as 1% sample size in well-connected social networks with remarkable reduction in communication and computational costs.
分散的在线社交网络通过授权用户控制自己的数据来增强用户的隐私。然而,这些网络大多缺乏以保护隐私的方式构建推荐系统的实际解决方案,这有助于改善网络的服务。关联规则挖掘是许多推荐系统的基本构建块之一。本文提出了一种对分布式数据进行规则挖掘的有效方法。我们利用Metropolis-Hasting随机漫步采样和分布式FP-Growth挖掘算法来维护用户的隐私。我们在三个真实世界的数据集上评估了我们的方法。结果表明,在连接良好的社交网络中,该方法在低至1%的样本量下获得了较高的平均精度分数(),并且显著降低了通信和计算成本。
{"title":"Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks","authors":"A. Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser","doi":"10.1145/3465481.3465482","DOIUrl":"https://doi.org/10.1145/3465481.3465482","url":null,"abstract":"Decentralized online social networks enhance users’ privacy by empowering them to control their data. However, these networks mostly lack for practical solutions for building recommender systems in a privacy-preserving manner that help to improve the network’s services. Association rule mining is one of the basic building blocks for many recommender systems. In this paper, we propose an efficient approach enabling rule mining on distributed data. We leverage the Metropolis-Hasting random walk sampling and distributed FP-Growth mining algorithm to maintain the users’ privacy. We evaluate our approach on three real-world datasets. Results reveal that the approach achieves high average precision scores () for as low as 1% sample size in well-connected social networks with remarkable reduction in communication and computational costs.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovery of Single-Vendor Marketplace Operators in the Tor-Network tor网络中单一供应商市场运营商的发现
Fabian Brenner, Florian Platzer, M. Steinebach
In the Tor-network are many single-vendor marketplace web sites with a wide range of offers. Some of these vendor websites could be hosted by the same operators. In this paper, a method is presented to find out similarities between these vendor websites to discover possible operational structures between them. In order to accomplish this, similarity values are determined between the darknet websites by combining various features from the different categories structure, content and metadata. A dataset is determined by a first execution of the method and manual validation. Based on this data set, important features are extracted using decision trees. The features of the category structure HTML-Tag, HTML-Class, HTML-DOM-Tree as well as the metadata features File Content and Links-To have proven to be particularly important and can very effectively highlight similarities between darknet web sites. Supported by the similarity detection method, it was found that only 49% of 258 single-vendor marketplaces were unique, i.e. no similar sites existed. In addition, it was possible to find several duplicates of vendor websites, which made up 20%.
tor网络中有许多单一供应商的市场网站,提供各种各样的服务。其中一些供应商网站可能由同一家运营商托管。本文提出了一种找出这些供应商网站之间相似点的方法,以发现它们之间可能的操作结构。为了实现这一点,通过结合不同类别结构、内容和元数据的各种特征来确定暗网网站之间的相似性值。数据集由该方法的首次执行和手动验证确定。基于该数据集,使用决策树提取重要特征。分类结构的特征HTML-Tag, HTML-Class, HTML-DOM-Tree以及元数据特征File Content和Links-To已被证明是特别重要的,可以非常有效地突出暗网网站之间的相似性。在相似度检测方法的支持下,258个单一供应商市场中只有49%是唯一的,即不存在类似的网站。此外,有可能找到几个重复的供应商网站,占20%。
{"title":"Discovery of Single-Vendor Marketplace Operators in the Tor-Network","authors":"Fabian Brenner, Florian Platzer, M. Steinebach","doi":"10.1145/3465481.3470026","DOIUrl":"https://doi.org/10.1145/3465481.3470026","url":null,"abstract":"In the Tor-network are many single-vendor marketplace web sites with a wide range of offers. Some of these vendor websites could be hosted by the same operators. In this paper, a method is presented to find out similarities between these vendor websites to discover possible operational structures between them. In order to accomplish this, similarity values are determined between the darknet websites by combining various features from the different categories structure, content and metadata. A dataset is determined by a first execution of the method and manual validation. Based on this data set, important features are extracted using decision trees. The features of the category structure HTML-Tag, HTML-Class, HTML-DOM-Tree as well as the metadata features File Content and Links-To have proven to be particularly important and can very effectively highlight similarities between darknet web sites. Supported by the similarity detection method, it was found that only 49% of 258 single-vendor marketplaces were unique, i.e. no similar sites existed. In addition, it was possible to find several duplicates of vendor websites, which made up 20%.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Open Fronthaul Interface for 5G Networks 5G网络安全开放前传接口
J. Cho, Andrew Sergeev
The open fronthaul interface is a standard protocol for a link between the radio units and the distributed unit in RAN, enabling different vendors interoperable. We study the security requirements of the open fronthaul interface for 5G networks. The O-RAN management plane (M-plane) mandates an end-to-end security using SSHv2, whereas the O-RAN control and user plane (CU-plane) do not support any security measure yet. We investigate MACsec for the CU-plane security, which is recommended as one of security options in the eCPRI specification. Furthermore, we implemented quantum-safe crypto solutions using a hybrid mode key exchange and signature schemes, which can be applied for the post-quantum SSH and MACsec protocols.
开放前传接口是无线局域网中无线单元和分布式单元之间链路的标准协议,使不同的供应商能够互操作。研究了5G网络开放前传接口的安全需求。O-RAN管理平面(m平面)要求使用SSHv2实现端到端的安全,而O-RAN控制平面和用户平面(cu平面)还不支持任何安全措施。我们研究了cu平面安全性的MACsec,这是eCPRI规范中推荐的安全选项之一。此外,我们使用混合模式密钥交换和签名方案实现了量子安全加密解决方案,该方案可应用于后量子SSH和MACsec协议。
{"title":"Secure Open Fronthaul Interface for 5G Networks","authors":"J. Cho, Andrew Sergeev","doi":"10.1145/3465481.3470080","DOIUrl":"https://doi.org/10.1145/3465481.3470080","url":null,"abstract":"The open fronthaul interface is a standard protocol for a link between the radio units and the distributed unit in RAN, enabling different vendors interoperable. We study the security requirements of the open fronthaul interface for 5G networks. The O-RAN management plane (M-plane) mandates an end-to-end security using SSHv2, whereas the O-RAN control and user plane (CU-plane) do not support any security measure yet. We investigate MACsec for the CU-plane security, which is recommended as one of security options in the eCPRI specification. Furthermore, we implemented quantum-safe crypto solutions using a hybrid mode key exchange and signature schemes, which can be applied for the post-quantum SSH and MACsec protocols.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs 在fpga上实现晶体-二锂签名方案
Sara Ricci, L. Malina, P. Jedlicka, D. Smekal, J. Hajny, Peter Cíbik, P. Dobias
In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). In this work, we present the first Very High Speed Integrated Circuit Hardware Description Language (VHDL) implementation of the CRYSTALS-Dilithium signature scheme for Field-Programmable Gate Arrays (FPGAs). Due to our parallelization-based design requiring only low numbers of cycles, running at high frequency and using reasonable amount of hardware resources on FPGA, our implementation is able to sign 15832 messages per second and verify 10524 signatures per second. In particular, the signing algorithm requires 68461 Look-Up Tables (LUTs), 86295 Flip-Flops (FFs), and the verification algorithm takes 61738 LUTs and 34963 FFs on Virtex 7 UltraScale+ FPGAs. In this article, experimental results for each Dilithium security level are provided and our VHDL-based implementation is compared with related High-Level Synthesis (HLS)-based implementations. Our solution is ca 114 times faster (in the signing algorithm) and requires less hardware resources.
2020年7月,基于晶格的晶体-锂数字签名方案被美国国家标准与技术研究院(NIST)选为后量子加密标准化过程的三个第三轮决赛入围者之一。在这项工作中,我们提出了用于现场可编程门阵列(fpga)的晶体-锂签名方案的第一个超高速集成电路硬件描述语言(VHDL)实现。由于我们基于并行的设计只需要少量的周期,在高频率下运行,并且在FPGA上使用合理数量的硬件资源,我们的实现每秒能够签署15832条消息,每秒验证10524个签名。其中签名算法在Virtex 7 UltraScale+ fpga上需要68461个查找表(lut)和86295个触发器(ff),验证算法需要61738个lut和34963个触发器。本文给出了每个安全级别的实验结果,并将我们基于vhdl的实现与相关的基于高级合成(High-Level Synthesis, HLS)的实现进行了比较。我们的解决方案大约要快114倍(在签名算法中),并且需要更少的硬件资源。
{"title":"Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs","authors":"Sara Ricci, L. Malina, P. Jedlicka, D. Smekal, J. Hajny, Peter Cíbik, P. Dobias","doi":"10.1145/3465481.3465756","DOIUrl":"https://doi.org/10.1145/3465481.3465756","url":null,"abstract":"In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been chosen as one of the three third-round finalists in the post-quantum cryptography standardization process by the National Institute of Standards and Technology (NIST). In this work, we present the first Very High Speed Integrated Circuit Hardware Description Language (VHDL) implementation of the CRYSTALS-Dilithium signature scheme for Field-Programmable Gate Arrays (FPGAs). Due to our parallelization-based design requiring only low numbers of cycles, running at high frequency and using reasonable amount of hardware resources on FPGA, our implementation is able to sign 15832 messages per second and verify 10524 signatures per second. In particular, the signing algorithm requires 68461 Look-Up Tables (LUTs), 86295 Flip-Flops (FFs), and the verification algorithm takes 61738 LUTs and 34963 FFs on Virtex 7 UltraScale+ FPGAs. In this article, experimental results for each Dilithium security level are provided and our VHDL-based implementation is compared with related High-Level Synthesis (HLS)-based implementations. Our solution is ca 114 times faster (in the signing algorithm) and requires less hardware resources.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems V2C:汽车系统基于信任的车辆到云异常检测框架
Thomas Rosenstatter, T. Olovsson, M. Almgren
Vehicles have become connected in many ways. They communicate with the cloud and will use Vehicle-to-Everything (V2X) communication to exchange warning messages and perform cooperative actions such as platooning. Vehicles have already been attacked and will become even more attractive targets due to their increasing connectivity, the amount of data they produce and their importance to our society. It is therefore crucial to provide cyber security measures to prevent and limit the impact of attacks. As it is problematic for a vehicle to reliably assess its own state when it is compromised, we investigate how vehicle trust can be used to identify compromised vehicles and how fleet-wide attacks can be detected at an early stage using cloud data. In our proposed V2C Anomaly Detection framework, peer vehicles assess each other based on their perceived behavior in traffic and V2X-enabled interactions, and upload these assessments to the cloud for analysis. This framework consists of four modules. For each module we define functional demands, interfaces and evaluate solutions proposed in literature allowing manufacturers and fleet owners to choose appropriate techniques. We detail attack scenarios where this type of framework is particularly useful in detecting and identifying potential attacks and failing software and hardware. Furthermore, we describe what basic vehicle data the cloud analysis can be based upon.
汽车已经在很多方面实现了互联。它们与云通信,并将使用车联网(V2X)通信来交换警告信息,并执行列队等合作行动。汽车已经受到过攻击,而且由于其日益增长的连接性、产生的数据量以及对我们社会的重要性,汽车将成为更具吸引力的目标。因此,提供预防和限制攻击影响的网络安全措施至关重要。由于车辆在受到攻击时难以可靠地评估自身状态,因此我们研究了如何使用车辆信任来识别受到攻击的车辆,以及如何使用云数据在早期阶段检测到车队范围内的攻击。在我们提出的V2C异常检测框架中,对等车辆根据其在交通和支持V2C的交互中的感知行为相互评估,并将这些评估上传到云端进行分析。该框架由四个模块组成。对于每个模块,我们定义了功能需求、接口并评估了文献中提出的解决方案,允许制造商和车队所有者选择适当的技术。我们详细介绍了这种类型的框架在检测和识别潜在攻击以及软件和硬件故障方面特别有用的攻击场景。此外,我们还描述了云分析可以基于哪些基本车辆数据。
{"title":"V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems","authors":"Thomas Rosenstatter, T. Olovsson, M. Almgren","doi":"10.1145/3465481.3465750","DOIUrl":"https://doi.org/10.1145/3465481.3465750","url":null,"abstract":"Vehicles have become connected in many ways. They communicate with the cloud and will use Vehicle-to-Everything (V2X) communication to exchange warning messages and perform cooperative actions such as platooning. Vehicles have already been attacked and will become even more attractive targets due to their increasing connectivity, the amount of data they produce and their importance to our society. It is therefore crucial to provide cyber security measures to prevent and limit the impact of attacks. As it is problematic for a vehicle to reliably assess its own state when it is compromised, we investigate how vehicle trust can be used to identify compromised vehicles and how fleet-wide attacks can be detected at an early stage using cloud data. In our proposed V2C Anomaly Detection framework, peer vehicles assess each other based on their perceived behavior in traffic and V2X-enabled interactions, and upload these assessments to the cloud for analysis. This framework consists of four modules. For each module we define functional demands, interfaces and evaluate solutions proposed in literature allowing manufacturers and fleet owners to choose appropriate techniques. We detail attack scenarios where this type of framework is particularly useful in detecting and identifying potential attacks and failing software and hardware. Furthermore, we describe what basic vehicle data the cloud analysis can be based upon.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"23 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Online Parking Based on Smart Contracts 基于智能合约的隐私保护在线停车
Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, L. Malina
This work presents a complex privacy-preserving solution based on attribute-based credentials and smart contract techniques for emerging parking services in city zones. Our system provides the full set of privacy-enhancing features such as anonymity, untraceability, and unlinkability of user parking registrations. Thanks to that it prevents the city and service providers from profiling and tracking the users (e.g., their movement). Furthermore, we involved smart contracts and the underlying decentralized Blockchain technology in payment and verification phases to prevent the presence of a single point of failure in those processes which can endanger the system’s security and availability. We provide the full cryptographic specification of the system, its security analysis, and the implementation results in this paper.
这项工作提出了一种复杂的隐私保护解决方案,该解决方案基于基于属性的凭据和智能合约技术,适用于城市区域的新兴停车服务。我们的系统提供了完整的隐私增强功能,如匿名性,不可追溯性和用户停车注册的不可链接性。因此,它可以防止城市和服务提供商分析和跟踪用户(例如,他们的移动)。此外,我们在支付和验证阶段涉及智能合约和底层去中心化区块链技术,以防止在这些过程中存在可能危及系统安全性和可用性的单点故障。本文给出了系统的完整密码规范、安全性分析和实现结果。
{"title":"Privacy-Preserving Online Parking Based on Smart Contracts","authors":"Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, L. Malina","doi":"10.1145/3465481.3470058","DOIUrl":"https://doi.org/10.1145/3465481.3470058","url":null,"abstract":"This work presents a complex privacy-preserving solution based on attribute-based credentials and smart contract techniques for emerging parking services in city zones. Our system provides the full set of privacy-enhancing features such as anonymity, untraceability, and unlinkability of user parking registrations. Thanks to that it prevents the city and service providers from profiling and tracking the users (e.g., their movement). Furthermore, we involved smart contracts and the underlying decentralized Blockchain technology in payment and verification phases to prevent the presence of a single point of failure in those processes which can endanger the system’s security and availability. We provide the full cryptographic specification of the system, its security analysis, and the implementation results in this paper.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 16th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1