首页 > 最新文献

Proceedings of the 11th Annual Cyber and Information Security Research Conference最新文献

英文 中文
An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans 一种植入抗检测隐蔽硬件木马的算法
Kyle J. Temkin, D. Summerville
This work presents a new class of Covert Hardware Trojan Horses (Covert HTHs), which can be algorithmically implanted with no change to their host circuit's functional behavior and without the need for additional unrelated logic. As a result, Covert HTHs are invulnerable to functional detection methods. This work also proposes a formal methodology for implantation of Covert HTHs, which allows covert hardware to be embedded in any sufficiently-sized synchronous circuit. Synthesis results indicate that covert implantation results in nearly a 75% reduction in integrated circuit area used by the HTH. Furthermore, the covert implantation causes no increase in the host circuit's delay and, compared to the effect of an overtly implanted HTH on its host, the covert implantation results in a significantly lower dynamic and leakage power. These significant reductions in area, delay and power make a covertly implanted HTH highly resistant to existing non-functional detection methods.
这项工作提出了一类新的隐蔽硬件特洛伊木马(隐蔽HTHs),它可以在不改变其主电路功能行为的情况下通过算法植入,并且不需要额外的不相关逻辑。因此,隐蔽HTHs不受功能检测方法的影响。这项工作还提出了隐蔽HTHs植入的正式方法,该方法允许隐蔽硬件嵌入任何足够大小的同步电路中。合成结果表明,隐蔽植入使HTH的集成电路面积减少了近75%。隐蔽植入不会增加宿主电路的延迟,与隐蔽植入的HTH对宿主电路的影响相比,隐蔽植入的动态功率和泄漏功率明显降低。这些显著减少的面积,延迟和功率使得隐蔽植入的HTH对现有的非功能检测方法具有很强的抵抗力。
{"title":"An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans","authors":"Kyle J. Temkin, D. Summerville","doi":"10.1145/2897795.2897811","DOIUrl":"https://doi.org/10.1145/2897795.2897811","url":null,"abstract":"This work presents a new class of Covert Hardware Trojan Horses (Covert HTHs), which can be algorithmically implanted with no change to their host circuit's functional behavior and without the need for additional unrelated logic. As a result, Covert HTHs are invulnerable to functional detection methods. This work also proposes a formal methodology for implantation of Covert HTHs, which allows covert hardware to be embedded in any sufficiently-sized synchronous circuit. Synthesis results indicate that covert implantation results in nearly a 75% reduction in integrated circuit area used by the HTH. Furthermore, the covert implantation causes no increase in the host circuit's delay and, compared to the effect of an overtly implanted HTH on its host, the covert implantation results in a significantly lower dynamic and leakage power. These significant reductions in area, delay and power make a covertly implanted HTH highly resistant to existing non-functional detection methods.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126464774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure 给定访问结构下构造完美秘密共享方案的高效算法
M. Atici
The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function φ from a set of participants into a vector space, that is, φ: P → (Zp)d. This function φ must satisfy certain conditions in order to recover the secret key. There is no known algorithm to construct such a function φ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithm to construct such φ function(s) for given access structures. Using the φ function, we also give an algorithm to construct secret sharing scheme for the access structures.
阈值方案、单调电路构造和向量空间构造是密码学中较为著名的秘密共享方案。对于任何给定的访问结构,阈值和单调电路秘密共享方案都是相当容易构建的Γ。构造一个用向量空间构造实现给定访问结构Γ的秘密共享方案,要求存在一个从参与者集合到向量空间的函数φ,即φ: P→(Zp)d。这个函数φ必须满足一定的条件才能恢复密钥。一般来说,没有已知的算法来构造这样的函数φ。建筑主要是通过试错来完成的。对于给定的访问结构,我们提出了多项式算法来构造这样的φ函数。利用φ函数,给出了一种构造访问结构秘密共享方案的算法。
{"title":"Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure","authors":"M. Atici","doi":"10.1145/2897795.2897810","DOIUrl":"https://doi.org/10.1145/2897795.2897810","url":null,"abstract":"The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any given access structure Γ. The construction of a secret sharing scheme realizing a given access structure Γ with Vector Space Construction requires the existence of a function φ from a set of participants into a vector space, that is, φ: P → (Zp)d. This function φ must satisfy certain conditions in order to recover the secret key. There is no known algorithm to construct such a function φ in general. Constructions are mainly done by trial and error. In this paper, we develop polynomial algorithm to construct such φ function(s) for given access structures. Using the φ function, we also give an algorithm to construct secret sharing scheme for the access structures.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122244335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SCADA Intrusion Detection Framework that Incorporates Process Semantics 一种融合进程语义的SCADA入侵检测框架
Jeyasingam Nivethan, M. Papa
SCADA security is an increasingly important research area as these systems, used for process control and automation, are being exposed to the Internet due to their use of TCP/IP protocols as a transport mechanism for control messages. Most of the existing research work on SCADA systems has focused on addressing SCADA security by monitoring attacks or anomalies at the network level. The main issue affecting these systems today is that by focusing our attention on network-level monitoring needs, security practitioners may remain unaware of process level constraints. The proposed framework helps ensure that a mechanism is in place to help map process level constraints, as described by process engineers, to network level monitoring needs. Existing solutions have tried to address this problem but have not been able to fully bridge the gap between the process and the network. The goal of this research is to provide a solution that (i) leverages the knowledge process engineers have about the system (to help strengthen cyber security) and that has the ability to (ii) seamlessly monitors process constraints at the network level using standard network security tools. A prototype system for the Modbus TCP protocol and the Bro IDS has been built to validate the approach.
SCADA安全是一个越来越重要的研究领域,因为这些用于过程控制和自动化的系统由于使用TCP/IP协议作为控制消息的传输机制而暴露在互联网上。现有的SCADA系统研究工作大多集中在通过监测网络层面的攻击或异常来解决SCADA的安全问题。今天影响这些系统的主要问题是,由于我们将注意力集中在网络级监视需求上,安全从业人员可能仍然没有意识到过程级约束。建议的框架有助于确保适当的机制,以帮助将过程级约束映射到网络级监视需求,如过程工程师所描述的那样。现有的解决办法已试图解决这一问题,但未能完全弥合进程与网络之间的差距。本研究的目标是提供一种解决方案,该解决方案(i)利用流程工程师对系统的知识(帮助加强网络安全),并具有(ii)使用标准网络安全工具在网络级别无缝监控流程约束的能力。建立了Modbus TCP协议和Bro IDS的原型系统来验证该方法。
{"title":"A SCADA Intrusion Detection Framework that Incorporates Process Semantics","authors":"Jeyasingam Nivethan, M. Papa","doi":"10.1145/2897795.2897814","DOIUrl":"https://doi.org/10.1145/2897795.2897814","url":null,"abstract":"SCADA security is an increasingly important research area as these systems, used for process control and automation, are being exposed to the Internet due to their use of TCP/IP protocols as a transport mechanism for control messages. Most of the existing research work on SCADA systems has focused on addressing SCADA security by monitoring attacks or anomalies at the network level. The main issue affecting these systems today is that by focusing our attention on network-level monitoring needs, security practitioners may remain unaware of process level constraints. The proposed framework helps ensure that a mechanism is in place to help map process level constraints, as described by process engineers, to network level monitoring needs. Existing solutions have tried to address this problem but have not been able to fully bridge the gap between the process and the network. The goal of this research is to provide a solution that (i) leverages the knowledge process engineers have about the system (to help strengthen cyber security) and that has the ability to (ii) seamlessly monitors process constraints at the network level using standard network security tools. A prototype system for the Modbus TCP protocol and the Bro IDS has been built to validate the approach.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121070443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Detection of Tunnels in PCAP Data by Random Forests 随机森林在PCAP数据中的隧道检测
A. Buczak, Paul A. Hanke, G. Cancro, Michael K. Toma, Lanier A Watkins, Jeffrey S. Chavis
This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate the training data sufficient to build models to detect DNS tunneling activity, a penetration testing effort was employed. We extracted features from this data and trained random forest classifiers to distinguish normal DNS activity from tunneling activity. The classifiers successfully detected the presence of tunnels we trained on, and four other types of tunnels that were not a part of the training set.
本文描述了一种检测网络流量中是否存在域名系统(DNS)隧道的方法。DNS隧道是黑客用来建立命令和控制节点以及从网络中窃取数据的常用技术。为了生成足够的训练数据来构建检测DNS隧道活动的模型,我们使用了渗透测试。我们从这些数据中提取特征,并训练随机森林分类器来区分正常的DNS活动和隧道活动。分类器成功地检测到我们训练的隧道的存在,以及其他四种不属于训练集的隧道类型。
{"title":"Detection of Tunnels in PCAP Data by Random Forests","authors":"A. Buczak, Paul A. Hanke, G. Cancro, Michael K. Toma, Lanier A Watkins, Jeffrey S. Chavis","doi":"10.1145/2897795.2897804","DOIUrl":"https://doi.org/10.1145/2897795.2897804","url":null,"abstract":"This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate the training data sufficient to build models to detect DNS tunneling activity, a penetration testing effort was employed. We extracted features from this data and trained random forest classifiers to distinguish normal DNS activity from tunneling activity. The classifiers successfully detected the presence of tunnels we trained on, and four other types of tunnels that were not a part of the training set.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function 一种新的基于准绝热逻辑的物理不可克隆函数
S. D. Kumar, H. Thapliyal
In the recent years, silicon based Physical Unclonable Function (PUF) has evolved as one of the popular hardware security primitives. PUFs are a class of circuits that use the inherent variations in the Integrated Circuit (IC) manufacturing process to create unique and unclonable IDs. There are various security related applications of PUFs such as IC counterfeiting, piracy detection, secure key management etc. In this paper, we are presenting a novel QUasi-Adiabatic Logic based PUF (QUALPUF) which is designed using energy recovery technique. To the best of our knowledge, this is the first work on the hardware design of PUF using adiabatic logic. The proposed design is energy efficient compared to recent designs of hardware PUFs proposed in the literature. Further, we are proposing a novel bit extraction method for our proposed PUF which improves the space set of challenge-response pairs. QUALPUF is evaluated in security metrics including reliability, uniqueness, uniformity and bit-aliasing. Power and area of QUALPUF is also presented. SPICE simulations show that QUALPUF consumes 0.39μ Watt of power to generate a response bit.
近年来,基于硅的物理不可克隆函数(PUF)已经发展成为流行的硬件安全原语之一。puf是一类电路,它使用集成电路(IC)制造过程中的固有变化来创建唯一且不可克隆的id。puf有各种与安全相关的应用,如IC防伪、盗版检测、安全密钥管理等。本文提出了一种基于能量回收技术的准绝热逻辑PUF (QUALPUF)。据我们所知,这是第一个使用绝热逻辑进行PUF硬件设计的工作。与文献中提出的硬件puf的最新设计相比,所提出的设计是节能的。此外,我们还提出了一种新的PUF位提取方法,该方法改进了挑战-响应对的空间集。QUALPUF的安全性指标包括可靠性、唯一性、一致性和位混叠。介绍了QUALPUF的功率和面积。SPICE仿真表明,QUALPUF产生一个响应位的功耗为0.39μ w。
{"title":"QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function","authors":"S. D. Kumar, H. Thapliyal","doi":"10.1145/2897795.2897798","DOIUrl":"https://doi.org/10.1145/2897795.2897798","url":null,"abstract":"In the recent years, silicon based Physical Unclonable Function (PUF) has evolved as one of the popular hardware security primitives. PUFs are a class of circuits that use the inherent variations in the Integrated Circuit (IC) manufacturing process to create unique and unclonable IDs. There are various security related applications of PUFs such as IC counterfeiting, piracy detection, secure key management etc. In this paper, we are presenting a novel QUasi-Adiabatic Logic based PUF (QUALPUF) which is designed using energy recovery technique. To the best of our knowledge, this is the first work on the hardware design of PUF using adiabatic logic. The proposed design is energy efficient compared to recent designs of hardware PUFs proposed in the literature. Further, we are proposing a novel bit extraction method for our proposed PUF which improves the space set of challenge-response pairs. QUALPUF is evaluated in security metrics including reliability, uniqueness, uniformity and bit-aliasing. Power and area of QUALPUF is also presented. SPICE simulations show that QUALPUF consumes 0.39μ Watt of power to generate a response bit.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Proceedings of the 11th Annual Cyber and Information Security Research Conference 第十一届网络与信息安全研究年会论文集
Joseph P. Trien, S. Prowell, J. Goodall, R. A. Bridges
This volume contains the papers presented at CISRC: Cyber and Information Security Research Conference held on April 5-7, 2016 at Oak Ridge National Laboratory in Oak Ridge, Tennessee.
本卷包含2016年4月5日至7日在田纳西州橡树岭国家实验室举行的CISRC:网络与信息安全研究会议上发表的论文。
{"title":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","authors":"Joseph P. Trien, S. Prowell, J. Goodall, R. A. Bridges","doi":"10.1145/2897795","DOIUrl":"https://doi.org/10.1145/2897795","url":null,"abstract":"This volume contains the papers presented at CISRC: Cyber and Information Security Research Conference held on April 5-7, 2016 at Oak Ridge National Laboratory in Oak Ridge, Tennessee.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical implications and requirements of diversifying interpreted languages 翻译语言多样化的现实意义和要求
J. Uitto, Sampsa Rauti, V. Leppänen
Instruction set randomization (ISR) provides a strong defense against all types of injection attacks, especially in interpreted environments. However, fully enabling a system to benefit from language interpreters that support programs diversified with ISR requires several alterations and considerations. In this paper we identify core challenges related to enabling system-wide interpreter diversification. We also propose possible solutions to each challenge and expand upon the existing diversification schemes for interpreted languages.
指令集随机化(ISR)提供了对所有类型注入攻击的强大防御,特别是在解释环境中。然而,要使系统充分受益于支持具有ISR的多种程序的语言解释器,需要进行一些更改和考虑。在本文中,我们确定了与实现系统范围解释器多样化相关的核心挑战。我们还针对每个挑战提出了可能的解决方案,并对现有的解释语言多样化方案进行了扩展。
{"title":"Practical implications and requirements of diversifying interpreted languages","authors":"J. Uitto, Sampsa Rauti, V. Leppänen","doi":"10.1145/2897795.2897796","DOIUrl":"https://doi.org/10.1145/2897795.2897796","url":null,"abstract":"Instruction set randomization (ISR) provides a strong defense against all types of injection attacks, especially in interpreted environments. However, fully enabling a system to benefit from language interpreters that support programs diversified with ISR requires several alterations and considerations. In this paper we identify core challenges related to enabling system-wide interpreter diversification. We also propose possible solutions to each challenge and expand upon the existing diversification schemes for interpreted languages.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131902057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks 安全弹性:探索Windows域级防御后开发身份验证攻击
Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass-the-Ticket, two prominent post-exploitation, credential theft attacks. An operating system's security resilience consists of its native features that allow for containing a detected attack. Post-exploitation refers to an attacker's activities subsequent to penetration. Specifically, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing its use by attackers. After triggered, the user is forced to contact the domain administrators to re-authenticate to the Domain Controller (DC) to continue. This could become the basis for a response Windows system administrators could use to halt the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.
我们调查了当前Windows Active Directory (AD)环境对Pass-the-Hash和Pass-the-Ticket这两种突出的利用后凭证盗窃攻击的安全弹性。操作系统的安全弹性由允许包含检测到的攻击的本机功能组成。后利用是指攻击者在渗透之后的活动。具体来说,我们发现了一种方法,可以触发删除以前为客户端发布的所有身份验证凭据,从而防止攻击者使用它。触发后,用户必须联系域管理员重新认证到DC (domain Controller)才能继续。这可能成为响应的基础,Windows系统管理员可以使用它来阻止检测到的攻击的传播。在虚拟化的XenServer环境中,我们能够仔细确定并重新创建导致此响应的必要条件。
{"title":"Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks","authors":"Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis","doi":"10.1145/2897795.2897800","DOIUrl":"https://doi.org/10.1145/2897795.2897800","url":null,"abstract":"We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass-the-Ticket, two prominent post-exploitation, credential theft attacks. An operating system's security resilience consists of its native features that allow for containing a detected attack. Post-exploitation refers to an attacker's activities subsequent to penetration. Specifically, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing its use by attackers. After triggered, the user is forced to contact the domain administrators to re-authenticate to the Domain Controller (DC) to continue. This could become the basis for a response Windows system administrators could use to halt the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114032646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Linear Cryptanalysis of Quasigroup Block Cipher 拟群分组密码的线性密码分析
Leonora Gerlock, Abhishek Parakh
This paper presents the results of a linear cryptanalysis of quasigroup block cipher. The quasigroup block cipher is being developed for resource constrained environments, especially SCADA systems. Here we determine if any key material can be found by conducting a linear cryptanalysis on a simplified quasigroup block cipher. Using Matsui's algorithm we seek to determine a suitable linear approximation of the quasigroup block cipher, the number of plaintext-ciphertext pairs to test, and the amount of time and space required to mount a known-plaintext attack on the quasigroup block cipher. Since the quasigroup does not use a Feistel network, the focus of the linear cryptanalysis is on the keyed transformation during table lookup operations of the quasigroup in order to 1) determine how the key bits used during encryption impact the ciphertext and from this 2) find a linear approximation that is non-negligible. Our results showed that no key material is recovered using linear cryptanalysis and consequently quasigroup cipher is resistant to such an attack.
本文给出了拟群分组密码的一个线性密码分析结果。准群分组密码是针对资源受限环境,特别是SCADA系统而开发的。在这里,我们通过对简化的拟群分组密码进行线性密码分析来确定是否可以找到任何密钥材料。使用Matsui的算法,我们试图确定拟群分组密码的合适线性逼近,要测试的明文-密文对的数量,以及对拟群分组密码进行已知明文攻击所需的时间和空间。由于拟群不使用Feistel网络,线性密码分析的重点是在拟群的表查找操作期间的密钥转换,以便1)确定加密过程中使用的密钥位如何影响密文,并从中2)找到一个不可忽略的线性近似。我们的研究结果表明,使用线性密码分析没有恢复密钥材料,因此准群密码可以抵抗这种攻击。
{"title":"Linear Cryptanalysis of Quasigroup Block Cipher","authors":"Leonora Gerlock, Abhishek Parakh","doi":"10.1145/2897795.2897818","DOIUrl":"https://doi.org/10.1145/2897795.2897818","url":null,"abstract":"This paper presents the results of a linear cryptanalysis of quasigroup block cipher. The quasigroup block cipher is being developed for resource constrained environments, especially SCADA systems. Here we determine if any key material can be found by conducting a linear cryptanalysis on a simplified quasigroup block cipher. Using Matsui's algorithm we seek to determine a suitable linear approximation of the quasigroup block cipher, the number of plaintext-ciphertext pairs to test, and the amount of time and space required to mount a known-plaintext attack on the quasigroup block cipher. Since the quasigroup does not use a Feistel network, the focus of the linear cryptanalysis is on the keyed transformation during table lookup operations of the quasigroup in order to 1) determine how the key bits used during encryption impact the ciphertext and from this 2) find a linear approximation that is non-negligible. Our results showed that no key material is recovered using linear cryptanalysis and consequently quasigroup cipher is resistant to such an attack.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124684068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting Zero-Day Vulnerabilities 零日漏洞预测
David C. Last
It seems that computer network defenders are always two steps behind attackers. This is due in part to the need for defenders to protect against the exploitation of zero-day vulnerabilities which they may not yet know exist. If network defenders were able to forecast the location and severity of zero-day vulnerabilities that would be discovered in the near future, this would be a valuable tool. This paper describes ongoing research that seeks to develop Vulnerability Discovery Models that will provide forecasts for zero-day vulnerability discovery rates. The initial work addresses forecasts at the global and category (web browser, operating system, and video player) levels, and this will be extended to individual software applications in the future. This research has developed three distinct zero-day vulnerability forecast suites, one based on regression and two based on machine learning. The accuracy of several of the forecast models from each forecast suite is evaluated, and the results are promising for the future development of these forecast models. Future work in this area will involve combining individual forecast models into a consensus forecast model, as well as extending the forecast models to the software application level.
计算机网络防御者似乎总是比攻击者落后两步。这部分是由于防御者需要防止他们可能还不知道存在的零日漏洞被利用。如果网络防御者能够预测在不久的将来会发现的零日漏洞的位置和严重程度,这将是一个有价值的工具。本文描述了正在进行的研究,旨在开发漏洞发现模型,以提供零日漏洞发现率的预测。最初的工作针对全球和类别(网络浏览器、操作系统和视频播放器)级别的预测,这将在未来扩展到单个软件应用程序。这项研究开发了三个不同的零日漏洞预测套件,一个基于回归,两个基于机器学习。对每个预测套件中的几个预测模型的精度进行了评估,结果对这些预测模型的未来发展有希望。该领域的未来工作将包括将单个预测模型组合成一个一致的预测模型,以及将预测模型扩展到软件应用级别。
{"title":"Forecasting Zero-Day Vulnerabilities","authors":"David C. Last","doi":"10.1145/2897795.2897813","DOIUrl":"https://doi.org/10.1145/2897795.2897813","url":null,"abstract":"It seems that computer network defenders are always two steps behind attackers. This is due in part to the need for defenders to protect against the exploitation of zero-day vulnerabilities which they may not yet know exist. If network defenders were able to forecast the location and severity of zero-day vulnerabilities that would be discovered in the near future, this would be a valuable tool. This paper describes ongoing research that seeks to develop Vulnerability Discovery Models that will provide forecasts for zero-day vulnerability discovery rates. The initial work addresses forecasts at the global and category (web browser, operating system, and video player) levels, and this will be extended to individual software applications in the future. This research has developed three distinct zero-day vulnerability forecast suites, one based on regression and two based on machine learning. The accuracy of several of the forecast models from each forecast suite is evaluated, and the results are promising for the future development of these forecast models. Future work in this area will involve combining individual forecast models into a consensus forecast model, as well as extending the forecast models to the software application level.","PeriodicalId":427043,"journal":{"name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 11th Annual Cyber and Information Security Research Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1