首页 > 最新文献

2012 Tenth Annual International Conference on Privacy, Security and Trust最新文献

英文 中文
Aggregation and privacy in multi-relational databases 多关系数据库中的聚合和隐私
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297921
Yasser Jafer, H. Viktor, E. Paquet
The aim of privacy-preserving data mining is to construct highly accurate predictive models while not disclosing privacy information. Aggregation functions, such as sum and count are often used to pre-process the data prior to applying data mining techniques to relational databases. Often, it is implicitly assumed that the aggregated (or summarized) data are less likely to lead to privacy violations during data mining. This paper investigates this claim, within the relational database domain. We introduce the PBIRD (Privacy Breach Investigation in Relational Databases) methodology. Our experimental results show that aggregation potentially introduces new privacy violations. That is, potentially harmful attributes obtained with aggregation are often different from the ones obtained from non-aggregated databases. This indicates that, even when privacy is enforced on non-aggregated data, it is not automatically enforced on the corresponding aggregated data. Consequently, special care should be taken during model building in order to fully enforce privacy when the data are aggregated.
隐私保护数据挖掘的目的是在不泄露隐私信息的情况下构建高精度的预测模型。聚合函数(如sum和count)通常用于在将数据挖掘技术应用于关系数据库之前对数据进行预处理。通常,隐式地假设聚合(或汇总)数据在数据挖掘期间不太可能导致侵犯隐私。本文在关系数据库领域研究了这一说法。我们介绍了PBIRD(隐私泄露调查在关系数据库)的方法。我们的实验结果表明,聚合可能会引入新的隐私侵犯。也就是说,通过聚合获得的潜在有害属性通常不同于从非聚合数据库获得的属性。这表明,即使对非聚合数据强制执行隐私,也不会自动对相应的聚合数据强制执行隐私。因此,在模型构建期间应该特别小心,以便在聚合数据时完全强制执行隐私。
{"title":"Aggregation and privacy in multi-relational databases","authors":"Yasser Jafer, H. Viktor, E. Paquet","doi":"10.1109/PST.2012.6297921","DOIUrl":"https://doi.org/10.1109/PST.2012.6297921","url":null,"abstract":"The aim of privacy-preserving data mining is to construct highly accurate predictive models while not disclosing privacy information. Aggregation functions, such as sum and count are often used to pre-process the data prior to applying data mining techniques to relational databases. Often, it is implicitly assumed that the aggregated (or summarized) data are less likely to lead to privacy violations during data mining. This paper investigates this claim, within the relational database domain. We introduce the PBIRD (Privacy Breach Investigation in Relational Databases) methodology. Our experimental results show that aggregation potentially introduces new privacy violations. That is, potentially harmful attributes obtained with aggregation are often different from the ones obtained from non-aggregated databases. This indicates that, even when privacy is enforced on non-aggregated data, it is not automatically enforced on the corresponding aggregated data. Consequently, special care should be taken during model building in order to fully enforce privacy when the data are aggregated.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sticky policies for data control in the cloud 用于云中数据控制的粘性策略
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297922
S. Trabelsi, Jakub Sendor
One of the main security concerns related to the cloud hosting and virtualization, is the lack of Trust in the infrastructure. This lack of trust is due to the absence of transparency concerning the data handling and storage conditions. There are no concrete technical guarantees that can convince a potential cloud customer that he is fully controlling his data. In this paper we propose a security service (called SPACE) in the cloud that provides all the tools to data owner to impose his privacy preferences during the virtualization phase. SPACE is based on the sticky policy technology and offers access and usage control functionalities to the data anywhere in the cloud. In addition to the main security features offered by SPACE, new visualization and control functionalities are proposed to make the user fully aware on the storage condition of his private information.
与云托管和虚拟化相关的主要安全问题之一是对基础设施缺乏信任。这种信任的缺乏是由于数据处理和存储条件缺乏透明度。没有具体的技术保证可以让潜在的云计算客户相信他正在完全控制他的数据。在本文中,我们提出了一种云中的安全服务(称为SPACE),它为数据所有者提供了在虚拟化阶段强加其隐私偏好的所有工具。SPACE基于粘性策略技术,并为云中的任何位置的数据提供访问和使用控制功能。除了SPACE提供的主要安全功能外,还提出了新的可视化和控制功能,以使用户充分了解其私人信息的存储状况。
{"title":"Sticky policies for data control in the cloud","authors":"S. Trabelsi, Jakub Sendor","doi":"10.1109/PST.2012.6297922","DOIUrl":"https://doi.org/10.1109/PST.2012.6297922","url":null,"abstract":"One of the main security concerns related to the cloud hosting and virtualization, is the lack of Trust in the infrastructure. This lack of trust is due to the absence of transparency concerning the data handling and storage conditions. There are no concrete technical guarantees that can convince a potential cloud customer that he is fully controlling his data. In this paper we propose a security service (called SPACE) in the cloud that provides all the tools to data owner to impose his privacy preferences during the virtualization phase. SPACE is based on the sticky policy technology and offers access and usage control functionalities to the data anywhere in the cloud. In addition to the main security features offered by SPACE, new visualization and control functionalities are proposed to make the user fully aware on the storage condition of his private information.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Ethical and legal considerations of reCAPTCHA 验证码的道德和法律考量
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297942
Jonathan Lung
reCAPTCHA is a technology that aims to stop computers from abusing automated services (e.g., stop spamming) while harnessing a large amount of brainpower to complete tasks amenable to being broken into small quanta. The technology, currently owned by Google, is being used to make old documents searchable with digital text through the process of optical character recognition (OCR). It has proven to be accurate and effective. In this paper, the ethics and legality of reCAPTCHA as it is currently used is discussed. Solutions for improving reCAPTCHA in these two contexts are proposed.
reCAPTCHA是一种旨在阻止计算机滥用自动化服务(例如,停止垃圾邮件)的技术,同时利用大量的脑力来完成可被分解成小量子的任务。这项技术目前归谷歌所有,通过光学字符识别(OCR)的过程,可以用数字文本搜索旧文件。它已被证明是准确和有效的。本文讨论了目前使用的reCAPTCHA的伦理性和合法性。在这两种情况下,提出了改进reCAPTCHA的解决方案。
{"title":"Ethical and legal considerations of reCAPTCHA","authors":"Jonathan Lung","doi":"10.1109/PST.2012.6297942","DOIUrl":"https://doi.org/10.1109/PST.2012.6297942","url":null,"abstract":"reCAPTCHA is a technology that aims to stop computers from abusing automated services (e.g., stop spamming) while harnessing a large amount of brainpower to complete tasks amenable to being broken into small quanta. The technology, currently owned by Google, is being used to make old documents searchable with digital text through the process of optical character recognition (OCR). It has proven to be accurate and effective. In this paper, the ethics and legality of reCAPTCHA as it is currently used is discussed. Solutions for improving reCAPTCHA in these two contexts are proposed.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012) 可信自组织系统研讨会第三版(TSOS 2012)
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297949
C. Müller-Schloer, W. Reif, Jan-Philipp Steghöfer
Nietzsche describes what is at the core of the concept of trust as it is used in agent societies and self-organising systems. Trust describes the expectation of one entity that the other behaves according to a set of rules. If that trust is broken, it is very hard to repair. If it exists, however, it is the basis of cooperation and enables a collective effort that gives a society purpose and allows it to succeed in its respective goals. Self-organisation is often at the root of such collective efforts as it allows the restructuring of a society to adapt to changing objectives, a changing environment, and new cooperation partners. Trust arises in such systems from the interactions of agents and the experiences of attempts to collaborate. It is thus only natural to regard trust and self-organisation together and explore the concepts' relation.
尼采描述了信任概念的核心,因为它被用于代理社会和自组织系统。信任描述了一个实体对另一个实体按照一组规则行事的期望。如果这种信任被打破,就很难修复。然而,如果它存在,它就是合作的基础,并使集体努力成为可能,使社会有目的,并使其能够在各自的目标上取得成功。自我组织往往是这种集体努力的根源,因为它允许社会重组,以适应不断变化的目标、不断变化的环境和新的合作伙伴。在这样的系统中,信任产生于代理的相互作用和尝试合作的经历。因此,将信任和自组织放在一起并探索这两个概念的关系是很自然的。
{"title":"3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012)","authors":"C. Müller-Schloer, W. Reif, Jan-Philipp Steghöfer","doi":"10.1109/PST.2012.6297949","DOIUrl":"https://doi.org/10.1109/PST.2012.6297949","url":null,"abstract":"Nietzsche describes what is at the core of the concept of trust as it is used in agent societies and self-organising systems. Trust describes the expectation of one entity that the other behaves according to a set of rules. If that trust is broken, it is very hard to repair. If it exists, however, it is the basis of cooperation and enables a collective effort that gives a society purpose and allows it to succeed in its respective goals. Self-organisation is often at the root of such collective efforts as it allows the restructuring of a society to adapt to changing objectives, a changing environment, and new cooperation partners. Trust arises in such systems from the interactions of agents and the experiences of attempts to collaborate. It is thus only natural to regard trust and self-organisation together and explore the concepts' relation.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obligations in risk-aware access control 风险感知访问控制中的义务
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297931
Liang Chen, J. Crampton, M. Kollingbaum, T. Norman
The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. In this paper, we present a metamodel for risk-aware authorization that captures the key aspects of a system in relation to risk mitigation. In particular, we develop various risk-aware models as instances of the metamodel that broadly differ in the form of risk mitigation that is used (system obligations and user obligations respectively), and study how those obligations are applied to reduce and account for the risk incurred by granting access. Unlike system obligations, an access control system cannot guarantee that user obligations are fulfilled. We propose two approaches to defining risk-aware authorization semantics that takes unfulfilled obligations into account: one is to restrict users' future access because of prior failure to fulfill obligations, and the other is to “reward” users who have been diligent in fulfilling their obligations by permitting risky access requests.
在动态环境中共享信息的需求日益增长,这就产生了对风险感知访问控制系统的需求。在本文中,我们提出了一个用于风险感知授权的元模型,该模型捕获了与风险缓解相关的系统的关键方面。特别是,我们开发了各种风险感知模型作为元模型的实例,这些模型在所使用的风险缓解形式(分别为系统义务和用户义务)上存在很大差异,并研究了如何应用这些义务来减少和解释授予访问权限所产生的风险。与系统义务不同,访问控制系统不能保证用户义务的履行。我们提出了两种方法来定义考虑未履行义务的风险感知授权语义:一种是由于先前未能履行义务而限制用户未来的访问,另一种是通过允许有风险的访问请求来“奖励”那些勤奋履行义务的用户。
{"title":"Obligations in risk-aware access control","authors":"Liang Chen, J. Crampton, M. Kollingbaum, T. Norman","doi":"10.1109/PST.2012.6297931","DOIUrl":"https://doi.org/10.1109/PST.2012.6297931","url":null,"abstract":"The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. In this paper, we present a metamodel for risk-aware authorization that captures the key aspects of a system in relation to risk mitigation. In particular, we develop various risk-aware models as instances of the metamodel that broadly differ in the form of risk mitigation that is used (system obligations and user obligations respectively), and study how those obligations are applied to reduce and account for the risk incurred by granting access. Unlike system obligations, an access control system cannot guarantee that user obligations are fulfilled. We propose two approaches to defining risk-aware authorization semantics that takes unfulfilled obligations into account: one is to restrict users' future access because of prior failure to fulfill obligations, and the other is to “reward” users who have been diligent in fulfilling their obligations by permitting risky access requests.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
REM: A runtime browser extension manager with fine-grained access control REM:具有细粒度访问控制的运行时浏览器扩展管理器
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297947
S. Marouf, Mohamed Shehab, Adharsh Desikan
In this paper we implement a runtime framework that monitors the accesses made by third party Chrome extensions, informs users of the accesses, & allows them to customize extension permissions. The custom permission settings are enforced by the framework at runtime. We evaluated our framework on popular Chrome extensions and were successful in monitoring and controlling their accesses with little overhead.
在本文中,我们实现了一个运行时框架,监控第三方Chrome扩展的访问,通知用户访问,并允许他们自定义扩展权限。自定义权限设置由框架在运行时强制执行。我们在流行的Chrome扩展上评估了我们的框架,并成功地以很少的开销监视和控制了它们的访问。
{"title":"REM: A runtime browser extension manager with fine-grained access control","authors":"S. Marouf, Mohamed Shehab, Adharsh Desikan","doi":"10.1109/PST.2012.6297947","DOIUrl":"https://doi.org/10.1109/PST.2012.6297947","url":null,"abstract":"In this paper we implement a runtime framework that monitors the accesses made by third party Chrome extensions, informs users of the accesses, & allows them to customize extension permissions. The custom permission settings are enforced by the framework at runtime. We evaluated our framework on popular Chrome extensions and were successful in monitoring and controlling their accesses with little overhead.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated detection of session management vulnerabilities in web applications 自动检测web应用程序中的会话管理漏洞
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297927
Yusuke Takamatsu, Yuji Kosuga, K. Kono
Many web applications employ session management to keep track of visitors' activities across pages and over periods of time. A session is a period of time linked to a visitor, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks. Even though such session management vulnerabilities can be eliminated in the development phase of web applications, the test operator is required to have detailed knowledge on the attacks and to set up a test environment each time he/she attempts to detect vulnerabilities. We propose a technique that automatically detects session management vulnerabilities in web applications by simulating real attacks. Our technique requires the test operator to only enter a few pieces of basic information about the web application, without requiring a test environment to be set up or detailed knowledge on the web application. Our experiments demonstrated that our technique could detect vulnerabilities in five web applications deployed in the real world.
许多web应用程序使用会话管理来跟踪访问者在页面和时间段内的活动。会话是链接到访问者的一段时间,它在访问者到达web应用程序时开始,在关闭浏览器或经过一段时间的不活动后结束。攻击者可以利用会话固定和跨站点请求伪造攻击等手段,利用会话管理漏洞劫持用户的会话。尽管这种会话管理漏洞可以在web应用程序的开发阶段消除,但测试操作员需要对攻击有详细的了解,并且每次尝试检测漏洞时都需要设置测试环境。我们提出了一种通过模拟真实攻击来自动检测web应用程序会话管理漏洞的技术。我们的技术要求测试操作员只输入关于web应用程序的一些基本信息,而不需要设置测试环境或详细了解web应用程序。我们的实验表明,我们的技术可以检测到在现实世界中部署的五个web应用程序中的漏洞。
{"title":"Automated detection of session management vulnerabilities in web applications","authors":"Yusuke Takamatsu, Yuji Kosuga, K. Kono","doi":"10.1109/PST.2012.6297927","DOIUrl":"https://doi.org/10.1109/PST.2012.6297927","url":null,"abstract":"Many web applications employ session management to keep track of visitors' activities across pages and over periods of time. A session is a period of time linked to a visitor, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks. Even though such session management vulnerabilities can be eliminated in the development phase of web applications, the test operator is required to have detailed knowledge on the attacks and to set up a test environment each time he/she attempts to detect vulnerabilities. We propose a technique that automatically detects session management vulnerabilities in web applications by simulating real attacks. Our technique requires the test operator to only enter a few pieces of basic information about the web application, without requiring a test environment to be set up or detailed knowledge on the web application. Our experiments demonstrated that our technique could detect vulnerabilities in five web applications deployed in the real world.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
WhACKY! - What anyone could know about you from Twitter 怪诞的!-任何人都可以从推特上了解到你
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297918
D. Correa, A. Sureka, Raghav Sethi
Twitter is a popular micro-blogging website which allows users to post 140-character limit messages called tweets. We demonstrate a cheap and elegant solution - WhACKY! - to harness the multi-source information from tweets to link Twitter profiles across other external services. In particular, we exploit activity feed sharing patterns to map Twitter profiles to their corresponding external service accounts using publicly available APIs. We illustrate a proof-of-concept by mapping 69,496 Twitter profiles to at least one of the five popular external services : Flickr (photo-sharing service), Foursquare (location-based service), YouTube (video-sharing service), Facebook (a popular social network) and LastFM (music-sharing service). We evaluate our solution against a commercial social identity mapping service - FlipTop - and demonstrate the efficiency of our approach. WhACKY! guarantees that the mapped profiles are 100% true-positive and helps quantify the unintended leakage of Personally Identifiable Information (PII) attributes. During the process, WhACKY! is also able to detect duplicate Twitter profiles connected to multiple external services.We also develop a web application based on WhACKY!1 for perusal by Twitterers which can help them better understand unintended leakage of their PII.
推特是一个受欢迎的微博网站,允许用户发布140个字符的消息。我们展示了一个廉价而优雅的解决方案——WhACKY!-利用来自tweet的多源信息,跨其他外部服务链接Twitter配置文件。特别是,我们利用活动提要共享模式,使用公开可用的api将Twitter配置文件映射到相应的外部服务帐户。我们通过将69,496个Twitter个人资料映射到五种流行的外部服务中的至少一种来说明概念验证:Flickr(照片分享服务)、Foursquare(基于位置的服务)、YouTube(视频分享服务)、Facebook(一个流行的社交网络)和LastFM(音乐分享服务)。我们针对商业社会身份映射服务FlipTop评估了我们的解决方案,并证明了我们方法的效率。怪诞的!确保映射的配置文件是100%的真阳性,并有助于量化个人身份信息(PII)属性的意外泄漏。在这个过程中,WhACKY!还能够检测连接到多个外部服务的重复Twitter配置文件。我们还开发了一个基于WhACKY的web应用程序!1供twitter用户阅读,这可以帮助他们更好地理解个人信息的意外泄露。
{"title":"WhACKY! - What anyone could know about you from Twitter","authors":"D. Correa, A. Sureka, Raghav Sethi","doi":"10.1109/PST.2012.6297918","DOIUrl":"https://doi.org/10.1109/PST.2012.6297918","url":null,"abstract":"Twitter is a popular micro-blogging website which allows users to post 140-character limit messages called tweets. We demonstrate a cheap and elegant solution - WhACKY! - to harness the multi-source information from tweets to link Twitter profiles across other external services. In particular, we exploit activity feed sharing patterns to map Twitter profiles to their corresponding external service accounts using publicly available APIs. We illustrate a proof-of-concept by mapping 69,496 Twitter profiles to at least one of the five popular external services : Flickr (photo-sharing service), Foursquare (location-based service), YouTube (video-sharing service), Facebook (a popular social network) and LastFM (music-sharing service). We evaluate our solution against a commercial social identity mapping service - FlipTop - and demonstrate the efficiency of our approach. WhACKY! guarantees that the mapped profiles are 100% true-positive and helps quantify the unintended leakage of Personally Identifiable Information (PII) attributes. During the process, WhACKY! is also able to detect duplicate Twitter profiles connected to multiple external services.We also develop a web application based on WhACKY!1 for perusal by Twitterers which can help them better understand unintended leakage of their PII.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents PDF审查器:检测PDF文档中基于javascript的攻击
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297926
Florian Schmitt, Jan Gassen, E. Gerhards-Padilla
For a long time PDF documents have arrived in the everyday life of the average computer user, corporate businesses and critical structures, as authorities and military. Due to its wide spread in general, and because out-of-date versions of PDF readers are quite common, using PDF documents has become a popular malware distribution strategy. In this context, malicious documents have useful features: they are trustworthy, attacks can be camouflaged by inconspicuous document content, but still, they can often download and install malware undetected by firewall and anti-virus software. In this paper we present PDF Scrutinizer, a malicious PDF detection and analysis tool. We use static, as well as, dynamic techniques to detect malicious behavior in an emulated environment. We evaluate the quality and the performance of the tool with PDF documents from the wild, and show that PDF Scrutinizer reliably detects current malicious documents, while keeping a low false-positive rate and reasonable runtime performance.
很长一段时间以来,PDF文档已经进入了普通计算机用户的日常生活,公司业务和关键结构,如当局和军队。由于其广泛传播,并且由于过时版本的PDF阅读器相当普遍,使用PDF文档已成为一种流行的恶意软件分发策略。在这种情况下,恶意文档具有一些有用的特性:它们是值得信赖的,攻击可以通过不显眼的文档内容伪装起来,但仍然可以经常下载并安装恶意软件而不被防火墙和防病毒软件检测到。在本文中,我们提出PDF审查,一个恶意的PDF检测和分析工具。我们使用静态和动态技术来检测模拟环境中的恶意行为。我们用PDF文档评估了该工具的质量和性能,并表明PDF审查器能够可靠地检测当前的恶意文档,同时保持较低的误报率和合理的运行时性能。
{"title":"PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents","authors":"Florian Schmitt, Jan Gassen, E. Gerhards-Padilla","doi":"10.1109/PST.2012.6297926","DOIUrl":"https://doi.org/10.1109/PST.2012.6297926","url":null,"abstract":"For a long time PDF documents have arrived in the everyday life of the average computer user, corporate businesses and critical structures, as authorities and military. Due to its wide spread in general, and because out-of-date versions of PDF readers are quite common, using PDF documents has become a popular malware distribution strategy. In this context, malicious documents have useful features: they are trustworthy, attacks can be camouflaged by inconspicuous document content, but still, they can often download and install malware undetected by firewall and anti-virus software. In this paper we present PDF Scrutinizer, a malicious PDF detection and analysis tool. We use static, as well as, dynamic techniques to detect malicious behavior in an emulated environment. We evaluate the quality and the performance of the tool with PDF documents from the wild, and show that PDF Scrutinizer reliably detects current malicious documents, while keeping a low false-positive rate and reasonable runtime performance.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
The theory of creating trust with a set of mistrust-parties 一组互不信任的当事人建立信任的理论
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297939
Johannes Viehmann
This paper presents the idea for achieving trustworthiness by splitting responsibilities between different parties mutually mistrusting one another. These parties are called mistrust-parties because some kind of mistrust between these parties is actively created to prevent potentially manipulative cooperation. The birth of the S-Network, a universally applicable trustworthy repository, should enable users to make and access reliable publications and secure deposits. The S-Network combines secure long term data storage and preservation in a computer network with non-repudiation and legal validity. This paper describes how one can apply the concept of creating trust with the help of mistrust-parties for the S-Network so that the S-Network itself would be highly trustworthy. Besides being a potential application, the S-Network could also be used as a tool for vital parts in the measures for creating trust with a set of mistrust-parties described in this paper.
本文提出了通过在互不信任的各方之间划分责任来实现可信赖性的思想。这些方被称为不信任方,因为这些方之间的某种不信任是积极创造的,以防止潜在的操纵合作。S-Network的诞生,一个普遍适用的可信赖的存储库,应该使用户能够制作和访问可靠的出版物和安全的存款。S-Network结合了计算机网络中安全的长期数据存储和保存,具有不可否认性和法律有效性。本文描述了如何在不信任方的帮助下将创建信任的概念应用于S-Network,从而使S-Network本身具有高度可信赖性。除了作为一种潜在的应用之外,S-Network还可以作为一种工具,用于在本文中描述的与一组不信任方建立信任的措施的重要部分。
{"title":"The theory of creating trust with a set of mistrust-parties","authors":"Johannes Viehmann","doi":"10.1109/PST.2012.6297939","DOIUrl":"https://doi.org/10.1109/PST.2012.6297939","url":null,"abstract":"This paper presents the idea for achieving trustworthiness by splitting responsibilities between different parties mutually mistrusting one another. These parties are called mistrust-parties because some kind of mistrust between these parties is actively created to prevent potentially manipulative cooperation. The birth of the S-Network, a universally applicable trustworthy repository, should enable users to make and access reliable publications and secure deposits. The S-Network combines secure long term data storage and preservation in a computer network with non-repudiation and legal validity. This paper describes how one can apply the concept of creating trust with the help of mistrust-parties for the S-Network so that the S-Network itself would be highly trustworthy. Besides being a potential application, the S-Network could also be used as a tool for vital parts in the measures for creating trust with a set of mistrust-parties described in this paper.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 Tenth Annual International Conference on Privacy, Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1