首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems 适合基于物联网的医疗系统的隐私保护相互认证方案
Pub Date : 2021-08-28 DOI: 10.22042/ISECURE.2021.183936.463
M. Ebrahimi, M. Bayat, Behnam Zahednejad
The medical system remains among the fastest to adopt the Internet of Things. The reason for this trend is that integration Internet of Things(IoT) features into medical devices greatly improve the quality and effectiveness of service. However, there are many unsolved security problems. Due to medical information is critical and important, authentication between users and medical servers is an essential issue. Recently, Park et al. proposed an authentication scheme using Shamir's threshold technique for IoT-based medical information system and claimed that their scheme satisfies all security requirements and is immune to various types of attacks. However, in this paper, we show that Park et al.'s scheme does not achieve user anonymity, forward security, and mutual authentication and it is not resistant to the DoS attacks and then we introduce an improved mutual authentication scheme based on Elliptic Curve Cryptography (ECC) and Shamir 's secret sharing for IoT-based medical information system.In this paper, we formally analyze the security properties of our scheme via the ProVerif. Moreover, we compare our proposed scheme with other related schemes in terms of security and performance.
医疗系统仍然是采用物联网最快的领域之一。出现这种趋势的原因是,将物联网功能集成到医疗设备中可以大大提高服务质量和效率。然而,还有许多安全问题尚未解决。由于医疗信息非常关键和重要,用户和医疗服务器之间的身份验证是一个至关重要的问题。最近,Park 等人针对基于物联网的医疗信息系统提出了一种使用 Shamir 门限技术的身份验证方案,并声称他们的方案满足所有安全要求,并能抵御各种类型的攻击。然而,在本文中,我们发现 Park 等人的方案无法实现用户匿名性、前向安全性和相互认证,也无法抵御 DoS 攻击,因此我们为基于物联网的医疗信息系统引入了一种基于椭圆曲线加密(ECC)和 Shamir 秘密共享的改进型相互认证方案。此外,我们还将我们提出的方案与其他相关方案在安全性和性能方面进行了比较。
{"title":"A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems","authors":"M. Ebrahimi, M. Bayat, Behnam Zahednejad","doi":"10.22042/ISECURE.2021.183936.463","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.183936.463","url":null,"abstract":"The medical system remains among the fastest to adopt the Internet of Things. The reason for this trend is that integration Internet of Things(IoT) features into medical devices greatly improve the quality and effectiveness of service. However, there are many unsolved security problems. Due to medical information is critical and important, authentication between users and medical servers is an essential issue. Recently, Park et al. proposed an authentication scheme using Shamir's threshold technique for IoT-based medical information system and claimed that their scheme satisfies all security requirements and is immune to various types of attacks. However, in this paper, we show that Park et al.'s scheme does not achieve user anonymity, forward security, and mutual authentication and it is not resistant to the DoS attacks and then we introduce an improved mutual authentication scheme based on Elliptic Curve Cryptography (ECC) and Shamir 's secret sharing for IoT-based medical information system.In this paper, we formally analyze the security properties of our scheme via the ProVerif. Moreover, we compare our proposed scheme with other related schemes in terms of security and performance.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126728385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ransomware Detection Based on PE Header Using Convolutional Neural Networks 基于卷积神经网络的PE头勒索软件检测
Pub Date : 2021-08-28 DOI: 10.22042/ISECURE.2021.262846.595
F. Manavi, A. Hamzeh
With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, restricts users' access to the system or their data, and then request a ransom payment. Many types of research have been proposed for ransomware detection. Most of these methods attempt to identify ransomware by relying on program behavior during execution. The main weakness of these methods is that it is not explicit how long the program should be monitored to show its real behavior. Therefore, sometimes, these researches cannot detect ransomware early. In this paper, a new method for ransomware detection is proposed that does not need executing the program and uses the PE header of the executable file. To extract effective features from the PE header file, an image is constructed based on PE header. Then, according to the advantages of Convolutional Neural Networks in extracting features from images and classifying them, CNN is used. The proposed method achieves high detection rates. Our results indicate the usefulness and practicality of our method for ransomware detection.
随着信息技术在人类生活中的普及,数据保护是一项至关重要的任务。另一方面,恶意程序被开发出来,可以操纵敏感和关键数据并限制对这些数据的访问。勒索软件就是这样一种恶意程序,它对数据进行加密,限制用户对系统或其数据的访问,然后要求支付赎金。针对勒索软件检测,已经提出了许多类型的研究。这些方法中的大多数都试图通过依赖程序在执行期间的行为来识别勒索软件。这些方法的主要缺点是不明确应该监视程序多长时间以显示其真实行为。因此,这些研究有时无法及早发现勒索软件。本文提出了一种不需要执行程序,利用可执行文件的PE头进行勒索软件检测的新方法。为了从PE头文件中提取有效特征,基于PE头文件构造图像。然后,根据卷积神经网络在提取图像特征和分类方面的优势,使用CNN。该方法具有较高的检测率。我们的结果表明了我们的方法在勒索软件检测中的有效性和实用性。
{"title":"Ransomware Detection Based on PE Header Using Convolutional Neural Networks","authors":"F. Manavi, A. Hamzeh","doi":"10.22042/ISECURE.2021.262846.595","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.262846.595","url":null,"abstract":"With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, restricts users' access to the system or their data, and then request a ransom payment. Many types of research have been proposed for ransomware detection. Most of these methods attempt to identify ransomware by relying on program behavior during execution. The main weakness of these methods is that it is not explicit how long the program should be monitored to show its real behavior. Therefore, sometimes, these researches cannot detect ransomware early. In this paper, a new method for ransomware detection is proposed that does not need executing the program and uses the PE header of the executable file. To extract effective features from the PE header file, an image is constructed based on PE header. Then, according to the advantages of Convolutional Neural Networks in extracting features from images and classifying them, CNN is used. The proposed method achieves high detection rates. Our results indicate the usefulness and practicality of our method for ransomware detection.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134365019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IDOT: Black-Box Detection of Access Control Violations in Web Applications IDOT: Web应用程序中访问控制违规的黑盒检测
Pub Date : 2021-07-01 DOI: 10.22042/isecure.2021.254089.580
M. A. Hadavi, Arash Bagherdaei, Simin Ghasemi
Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such tools may detect the absence of access control by static or dynamic testing, they cannot verify if it is properly functioning when it is present. When a tool detects requesting access to an object, it is not aware of access control policies to infer whether the request is permitted. This completely depends on the access control logic and there is no automatic way to fully and precisely capture it from software behavior. Taking this challenge into consideration, this article proposes a black-box method to detect IDOR vulnerabilities in web applications without knowing access control logic. To this purpose, we first, gather information from the web application by a semi-automatic crawling process. Then, we tricksily manipulate legal requests to create effective attacks on the web application. Finally, we analyze received responses to check whether the requests are vulnerable to IDOR. The detection process in the analysis phase is supported by our set theory based formal modeling of such vulnerabilities. The proposed method has been implemented as an IDOR detection tool (IDOT) and evaluated on a couple of vulnerable web applications. Evaluation results show that the method can effectively detect IDOR vulnerabilities provided that enough information is gathered in the crawling phase.
软件应用中访问控制违规的自动检测是一个具有挑战性的问题。不安全直接对象引用(IDOR)是排名靠前的漏洞之一,它违反了访问控制策略,目前还不能被自动漏洞扫描器检测到。虽然这些工具可以通过静态或动态测试检测访问控制的缺失,但它们无法验证访问控制存在时是否正常工作。当工具检测到请求访问对象时,它不知道访问控制策略来推断请求是否被允许。这完全取决于访问控制逻辑,并且没有自动的方法可以完全准确地从软件行为中捕获它。考虑到这一挑战,本文提出了一种黑盒方法,在不知道访问控制逻辑的情况下检测web应用中的IDOR漏洞。为此,我们首先通过半自动爬行过程从web应用程序收集信息。然后,我们巧妙地操纵合法请求来对web应用程序进行有效的攻击。最后,我们分析收到的响应,以检查请求是否容易受到IDOR攻击。分析阶段的检测过程由我们基于集合理论的此类漏洞形式化建模来支持。该方法已作为IDOT检测工具实现,并在几个易受攻击的web应用程序上进行了评估。评估结果表明,只要在爬行阶段收集到足够的信息,该方法可以有效地检测到IDOR漏洞。
{"title":"IDOT: Black-Box Detection of Access Control Violations in Web Applications","authors":"M. A. Hadavi, Arash Bagherdaei, Simin Ghasemi","doi":"10.22042/isecure.2021.254089.580","DOIUrl":"https://doi.org/10.22042/isecure.2021.254089.580","url":null,"abstract":"Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such tools may detect the absence of access control by static or dynamic testing, they cannot verify if it is properly functioning when it is present. When a tool detects requesting access to an object, it is not aware of access control policies to infer whether the request is permitted. This completely depends on the access control logic and there is no automatic way to fully and precisely capture it from software behavior. Taking this challenge into consideration, this article proposes a black-box method to detect IDOR vulnerabilities in web applications without knowing access control logic. To this purpose, we first, gather information from the web application by a semi-automatic crawling process. Then, we tricksily manipulate legal requests to create effective attacks on the web application. Finally, we analyze received responses to check whether the requests are vulnerable to IDOR. The detection process in the analysis phase is supported by our set theory based formal modeling of such vulnerabilities. The proposed method has been implemented as an IDOR detection tool (IDOT) and evaluated on a couple of vulnerable web applications. Evaluation results show that the method can effectively detect IDOR vulnerabilities provided that enough information is gathered in the crawling phase.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Obfuscation Method Based on CFGLUTs for Security of FPGAs 一种基于CFGLUTs的fpga安全性混淆方法
Pub Date : 2021-07-01 DOI: 10.22042/ISECURE.2021.234848.557
Mansoureh Labafniya, S. E. Borujeni
There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. Our obfuscation method is using ConFiGurable Look Up Tables (CFGLUTs). We suggest to insert CFGLUTs randomly or based on some optional parameters in the design. In this way, some parts of the design are on a secure memory, which contains the bitstream of the CFGLUTs so that the attacker does not have any access to it. We program the CFGLUTs in run-time to complete the bitstream of the FPGA and functionality of the design. If an attacker can reverse engineer the bitstream of the FPGA, he cannot detect the design because some part of it is composed of CFGLUTs, which their bitstream is on a secure memory. The first article uses CFGLUTs for securing FPGAs against HTHs insertion, which are results of reverse engineering. Our methods do not have any power and hardware overhead but 32 clock cycles time overhead.
有许多不同的方法来保护fpga,以防止成功的逆向工程。一种常见的形式是混淆方法。在本文中,我们提出了一种基于混淆的方法来防止fpga成功的逆向工程,从而防止硬件特洛伊木马(HTHs)插入。我们的混淆方法是使用可配置查找表(CFGLUTs)。我们建议在设计中随机或根据一些可选参数插入CFGLUTs。通过这种方式,设计的某些部分位于安全内存上,该内存包含CFGLUTs的比特流,因此攻击者无法访问它。我们在运行时对CFGLUTs进行编程,以完成FPGA的位流和设计的功能。如果攻击者可以对FPGA的比特流进行反向工程,则他无法检测到设计,因为它的某些部分由cfglut组成,其比特流位于安全存储器上。第一篇文章使用CFGLUTs保护fpga免受HTHs插入,这是逆向工程的结果。我们的方法没有任何电源和硬件开销,但有32个时钟周期的时间开销。
{"title":"An Obfuscation Method Based on CFGLUTs for Security of FPGAs","authors":"Mansoureh Labafniya, S. E. Borujeni","doi":"10.22042/ISECURE.2021.234848.557","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.234848.557","url":null,"abstract":"There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. Our obfuscation method is using ConFiGurable Look Up Tables (CFGLUTs). We suggest to insert CFGLUTs randomly or based on some optional parameters in the design. In this way, some parts of the design are on a secure memory, which contains the bitstream of the CFGLUTs so that the attacker does not have any access to it. We program the CFGLUTs in run-time to complete the bitstream of the FPGA and functionality of the design. If an attacker can reverse engineer the bitstream of the FPGA, he cannot detect the design because some part of it is composed of CFGLUTs, which their bitstream is on a secure memory. The first article uses CFGLUTs for securing FPGAs against HTHs insertion, which are results of reverse engineering. Our methods do not have any power and hardware overhead but 32 clock cycles time overhead.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks 针对远程侧信道攻击的功率传感器物理参数深入分析
Pub Date : 2021-07-01 DOI: 10.22042/ISECURE.2021.262549.591
Milad Salimian, A. Jahanian
Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent studies show that it is possible to gather information about power consumption from FPGAs without any physical access. High flexibilities of modern FPGAs cause that they are used for cloud accelerator in Platform as a Service (PaaS) system; however, new serious vulnerabilities emerged for these platforms. Although there are some reports about how switching activities from one region of FPGA affect other regions, details of this technique are not analyzed. In this paper, we analyzed the strength of this kind of attack and examined the impact of geometrical and electrical parameters of the victim/attacker modules on the efficiency of this attack. We utilized a Zynq-based Xilinx platform as the device under attack. Experimental results and analyses show that the distance between the victim module and the sensor modules is not the only effective parameter on the quality of attack; the influence of the relational location of victim/attacker modules could be more considerable on the quality of attack.
边信道分析方法通过分析所实现的密码算法的功耗与秘密数据之间的依赖关系来揭示数字电子系统的秘密信息。最近的研究表明,可以在没有任何物理访问的情况下从fpga收集有关功耗的信息。现代fpga的高灵活性使其成为平台即服务(PaaS)系统中的云加速器;然而,这些平台出现了新的严重漏洞。虽然有一些关于FPGA一个区域的切换活动如何影响其他区域的报道,但没有分析该技术的细节。在本文中,我们分析了这种攻击的强度,并检查了受害者/攻击者模块的几何和电气参数对这种攻击效率的影响。我们使用基于zynq的Xilinx平台作为被攻击的设备。实验结果和分析表明,被攻击模块与传感器模块之间的距离并不是影响攻击质量的唯一有效参数;受害者/攻击者模块的关系位置对攻击质量的影响可能更大。
{"title":"Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks","authors":"Milad Salimian, A. Jahanian","doi":"10.22042/ISECURE.2021.262549.591","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.262549.591","url":null,"abstract":"Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent studies show that it is possible to gather information about power consumption from FPGAs without any physical access. High flexibilities of modern FPGAs cause that they are used for cloud accelerator in Platform as a Service (PaaS) system; however, new serious vulnerabilities emerged for these platforms. Although there are some reports about how switching activities from one region of FPGA affect other regions, details of this technique are not analyzed. In this paper, we analyzed the strength of this kind of attack and examined the impact of geometrical and electrical parameters of the victim/attacker modules on the efficiency of this attack. We utilized a Zynq-based Xilinx platform as the device under attack. Experimental results and analyses show that the distance between the victim module and the sensor modules is not the only effective parameter on the quality of attack; the influence of the relational location of victim/attacker modules could be more considerable on the quality of attack.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131547398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Better Sampling Method of Enumeration Solution for BKZ-Simulation bkz仿真中枚举解的更好采样方法
Pub Date : 2021-07-01 DOI: 10.22042/ISECURE.2021.225886.531
G. R. Moghissi, A. Payandeh
The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration solution vector v is one of the main components of designing BKZ-simulation and can be divided into two phases: sampling norm of solution vector v and sampling corresponding coefficient vectors. This paper introduces a simple and efficient idea for sampling the norm of enumeration solution v for any success probability of enumeration bounding functions, while to the best of our knowledge, no such sampling method for norm of enumeration solution is proposed in former studies. Next, this paper analyzes the structure and probability distribution of coefficient vectors (corresponding with enumeration solution v), and consequently introduces the sampling methods for these coefficient vectors which are verified by our test results, while no such a deep analysis for sampling coefficient vectors is considered in design of former BKZ-simulations. Moreover, this paper proposes an approximation for cost of enumerations pruned by optimal bounding functions.
实际运行无法研究BKZ算法在较大块大小时的确切方式,因此可以通过BKZ的仿真来预测BKZ算法的总成本和输出质量。枚举解向量v的采样方法是设计bkz仿真的主要组成部分之一,可分为两个阶段:解向量v的采样范数和采样对应系数向量。本文介绍了对任意枚举边界函数的成功概率对枚举解v的范数进行采样的一种简单有效的思路,而据我们所知,以往的研究中没有提出过对枚举解的范数进行采样的方法。其次,本文分析了系数向量的结构和概率分布(对应于枚举解v),进而介绍了这些系数向量的采样方法,并通过我们的测试结果进行了验证,而以往的bkz -simulation设计中并没有对采样系数向量进行深入的分析。此外,本文还提出了用最优边界函数剪枝的枚举代价的近似。
{"title":"Better Sampling Method of Enumeration Solution for BKZ-Simulation","authors":"G. R. Moghissi, A. Payandeh","doi":"10.22042/ISECURE.2021.225886.531","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.225886.531","url":null,"abstract":"The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration solution vector v is one of the main components of designing BKZ-simulation and can be divided into two phases: sampling norm of solution vector v and sampling corresponding coefficient vectors. This paper introduces a simple and efficient idea for sampling the norm of enumeration solution v for any success probability of enumeration bounding functions, while to the best of our knowledge, no such sampling method for norm of enumeration solution is proposed in former studies. Next, this paper analyzes the structure and probability distribution of coefficient vectors (corresponding with enumeration solution v), and consequently introduces the sampling methods for these coefficient vectors which are verified by our test results, while no such a deep analysis for sampling coefficient vectors is considered in design of former BKZ-simulations. Moreover, this paper proposes an approximation for cost of enumerations pruned by optimal bounding functions.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware Curious-Monkey:在Android恶意软件中触发恶意载荷的进化猴子
Pub Date : 2021-06-12 DOI: 10.22042/ISECURE.2021.262208.589
Hayyan Hasan, B. T. Ladani, B. Zamani
Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic analysis of Android malware as well. Monkey provides high code coverage and yet high speed in generating events. However, in the case of malware analysis, Monkey suffers from several limitations. It only considers UI events but no system events, and because of random behavior in generating UI events, it may lose dropping the connectivity of the test environment during the analysis process. Moreover, it provides no defense against malware evasion techniques. In this paper, we try to enhance Monkey by reducing its limitations while preserving its advantages. The proposed approach has been implemented as an extended version of Monkey, named Curious-Monkey. Curious-Monkey provides facilities for handling system events, handling evasion techniques, and keeping the test environment's connectivity up during the analysis process. We conducted many experiments to evaluate the effectiveness of the proposed tool regarding two important criteria in dynamic malware analysis: the ability to trigger malicious payloads and the code coverage. In the evaluation process, we used the Evadroid benchmark and the AMD malware dataset. Moreover, we compared Curious-Monkey with Monkey and Ares tools. The results show that the Curious-Monkey provides better results in case of triggering malicious payloads, as well as better code coverage.
动态分析是分析Android应用行为的重要方法。为了执行动态分析,我们需要一个事件生成器来为在模拟器中执行应用程序提供适当的环境。Monkey是Android应用程序中最受欢迎的事件生成器,也用于Android恶意软件的动态分析。Monkey提供了高代码覆盖率和高事件生成速度。然而,在恶意软件分析的情况下,Monkey受到一些限制。它只考虑UI事件而不考虑系统事件,并且由于在生成UI事件时的随机行为,它可能会在分析过程中丢失测试环境的连通性。此外,它不提供针对恶意软件规避技术的防御。在本文中,我们试图通过减少其局限性来增强Monkey,同时保留其优势。提出的方法已经作为Monkey的扩展版本实现,命名为Curious-Monkey。Curious-Monkey提供了一些工具来处理系统事件、处理规避技术,并在分析过程中保持测试环境的连接性。我们进行了许多实验来评估所提出的工具在动态恶意软件分析中的两个重要标准的有效性:触发恶意有效载荷的能力和代码覆盖率。在评估过程中,我们使用了Evadroid基准测试和AMD恶意软件数据集。此外,我们将Curious-Monkey与Monkey和Ares工具进行了比较。结果表明,在触发恶意负载的情况下,Curious-Monkey提供了更好的结果,以及更好的代码覆盖率。
{"title":"Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware","authors":"Hayyan Hasan, B. T. Ladani, B. Zamani","doi":"10.22042/ISECURE.2021.262208.589","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.262208.589","url":null,"abstract":"Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic analysis of Android malware as well. Monkey provides high code coverage and yet high speed in generating events. However, in the case of malware analysis, Monkey suffers from several limitations. It only considers UI events but no system events, and because of random behavior in generating UI events, it may lose dropping the connectivity of the test environment during the analysis process. Moreover, it provides no defense against malware evasion techniques. In this paper, we try to enhance Monkey by reducing its limitations while preserving its advantages. The proposed approach has been implemented as an extended version of Monkey, named Curious-Monkey. Curious-Monkey provides facilities for handling system events, handling evasion techniques, and keeping the test environment's connectivity up during the analysis process. We conducted many experiments to evaluate the effectiveness of the proposed tool regarding two important criteria in dynamic malware analysis: the ability to trigger malicious payloads and the code coverage. In the evaluation process, we used the Evadroid benchmark and the AMD malware dataset. Moreover, we compared Curious-Monkey with Monkey and Ares tools. The results show that the Curious-Monkey provides better results in case of triggering malicious payloads, as well as better code coverage.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"98 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134476262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blind Multipurpose Image Watermarking with Perfect Security 具有完美安全性的盲多用途图像水印
Pub Date : 2021-05-29 DOI: 10.22042/ISECURE.2021.223025.527
Sorour Sheidani, Ziba Eslami
Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking emerged in order to simultaneously accomplish multimedia authentication and copyright protection. In this paper, we propose a multipurpose watermarking method which achieves perfect security, the ability to detect tampered areas of the watermarked image as well as a lower BER rate, at the cost of reducing capacity by half. This watermarking scheme is blind in the sense that on the receiver side, neither the original host image nor the embedded watermark is needed for ownership watermark extraction or tamper detection. Experimental results show that our method is able to reconstruct extracted tampered watermarks even after various attacks such as JPEG compression, average filtering, gamma correction, median filtering, speckle noise, JPEG compression, sharpening, Wiener filter, and median filtering. Comparisons are provided with other multipurpose watermarking methods which primarily aim at simultaneous goals of copyright protection and authentication. We also show the superiority of our proposed method to three watermarking methods attaining these objectives on a one-goal-at-a-time basis.
如今,一方面多媒体认证技术被广泛用于实现可信赖性,另一方面,由于图像处理软件技术的快速发展,有一种安全的方法来保护这些数据的版权显得非常必要。为了同时实现多媒体认证和版权保护,多功能水印应运而生。在本文中,我们提出了一种多用途的水印方法,该方法既能达到良好的安全性,又能检测出水印图像的篡改区域,而且误码率较低,但代价是将容量减少一半。该水印方案是盲的,即在接收端,既不需要原始主机图像,也不需要嵌入水印进行所有权水印提取或篡改检测。实验结果表明,即使经过JPEG压缩、平均滤波、伽玛校正、中值滤波、散斑噪声、JPEG压缩、锐化、维纳滤波和中值滤波等多种攻击,该方法仍能重建提取的篡改水印。并与其他多用途水印方法进行了比较,这些方法主要是为了同时实现版权保护和身份验证的目标。我们还展示了我们所提出的方法与三种水印方法相比的优越性,这些方法在一次一个目标的基础上实现了这些目标。
{"title":"Blind Multipurpose Image Watermarking with Perfect Security","authors":"Sorour Sheidani, Ziba Eslami","doi":"10.22042/ISECURE.2021.223025.527","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.223025.527","url":null,"abstract":"Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking emerged in order to simultaneously accomplish multimedia authentication and copyright protection. In this paper, we propose a multipurpose watermarking method which achieves perfect security, the ability to detect tampered areas of the watermarked image as well as a lower BER rate, at the cost of reducing capacity by half. This watermarking scheme is blind in the sense that on the receiver side, neither the original host image nor the embedded watermark is needed for ownership watermark extraction or tamper detection. Experimental results show that our method is able to reconstruct extracted tampered watermarks even after various attacks such as JPEG compression, average filtering, gamma correction, median filtering, speckle noise, JPEG compression, sharpening, Wiener filter, and median filtering. Comparisons are provided with other multipurpose watermarking methods which primarily aim at simultaneous goals of copyright protection and authentication. We also show the superiority of our proposed method to three watermarking methods attaining these objectives on a one-goal-at-a-time basis.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud 云环境下电子健康记录的基于属性的隐私保护加密和联合关键字搜索
Pub Date : 2021-05-08 DOI: 10.22042/ISECURE.2021.227562.542
Aniseh Najafi, M. Bayat, H. Javadi
The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising way to ensure the security of and facilitate access control over outsourced data. However, conventional CP-ABE schemes have security flaws such as lack of attribute privacy and resistance to the keywords guessing attacks as well as the disability to multi-keyword searches. To meet such shortcomings, we present a scheme supporting multi-keyword search and fine-grained access control, simultaneously. The proposed scheme is resistant to the offline keywords guessing attack. Privacy-preserving in the access structure is another feature of the proposed scheme. The security analysis indicates that our scheme is selectively secure in the standard model. Finally, the performance evaluation of the proposed scheme shows the efficiency is reasonable despite the added functionalities.
云计算在医疗保健系统中的出现提高了准确性和速度,降低了成本,并广泛使用了医疗服务。然而,系统用户总是非常关心外包数据的安全性。基于密文策略属性的加密(cipher -policy - attribute-based encryption, CP-ABE)是一种很有前途的方法,可以确保外包数据的安全性并方便对其进行访问控制。然而,传统的CP-ABE方案存在缺乏属性隐私和抗关键字猜测攻击以及不能进行多关键字搜索等安全缺陷。为了克服这些缺点,我们提出了一种同时支持多关键字搜索和细粒度访问控制的方案。该方案能够抵抗离线关键字猜测攻击。访问结构中的隐私保护是该方案的另一个特点。安全性分析表明,该方案在标准模型下具有选择性的安全性。最后,对该方案进行了性能评估,结果表明,尽管增加了功能,但效率合理。
{"title":"Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud","authors":"Aniseh Najafi, M. Bayat, H. Javadi","doi":"10.22042/ISECURE.2021.227562.542","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.227562.542","url":null,"abstract":"The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising way to ensure the security of and facilitate access control over outsourced data. However, conventional CP-ABE schemes have security flaws such as lack of attribute privacy and resistance to the keywords guessing attacks as well as the disability to multi-keyword searches. To meet such shortcomings, we present a scheme supporting multi-keyword search and fine-grained access control, simultaneously. The proposed scheme is resistant to the offline keywords guessing attack. Privacy-preserving in the access structure is another feature of the proposed scheme. The security analysis indicates that our scheme is selectively secure in the standard model. Finally, the performance evaluation of the proposed scheme shows the efficiency is reasonable despite the added functionalities.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
File Fragment Type Classification by Bag-Of-Visual-Words 基于Bag-Of-Visual-Words的文件片段类型分类
Pub Date : 2021-05-08 DOI: 10.22042/ISECURE.2021.243876.570
Mina Erfan, S. Jalili
File fragments’ type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, a substantial amount of effort has been put into developing methods to classify file fragments. Meanwhile, there has been little innovation on the basics of approaches given into file and fragment type classification. In this research, by mapping each fragment as an 8-bit grayscale image, a method of texture analysis has been used in place of a classifier. Essentially, we show how to construct a vocabulary of visual words with the Bag-of-Visual-Words method. Using the n-gram technique, the feature vector is comprised of visual words occurrence. On the classification of 31 file types over 31000 fragments, our approach reached a maximum overall accuracy of 74.9% in classifying 512 byte fragments and 87.3% in classifying 4096 byte fragments.
在没有文件头和文件系统信息的情况下,文件片段的类型分类是各种致力于文件雕刻、内存分析和网络取证的解决方案的主要组成部分。在过去的几十年里,人们在开发文件片段分类的方法上付出了大量的努力。与此同时,在文件和片段类型分类的基本方法上几乎没有创新。在本研究中,通过将每个片段映射为8位灰度图像,使用纹理分析方法代替分类器。从本质上讲,我们展示了如何使用视觉词袋方法构建视觉词的词汇表。使用n-gram技术,特征向量由视觉词出现组成。在超过31000个片段的31种文件类型的分类中,我们的方法在512字节片段的分类中达到了74.9%的最大总体准确率,在4096字节片段的分类中达到了87.3%。
{"title":"File Fragment Type Classification by Bag-Of-Visual-Words","authors":"Mina Erfan, S. Jalili","doi":"10.22042/ISECURE.2021.243876.570","DOIUrl":"https://doi.org/10.22042/ISECURE.2021.243876.570","url":null,"abstract":"File fragments’ type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, a substantial amount of effort has been put into developing methods to classify file fragments. Meanwhile, there has been little innovation on the basics of approaches given into file and fragment type classification. In this research, by mapping each fragment as an 8-bit grayscale image, a method of texture analysis has been used in place of a classifier. Essentially, we show how to construct a vocabulary of visual words with the Bag-of-Visual-Words method. Using the n-gram technique, the feature vector is comprised of visual words occurrence. On the classification of 31 file types over 31000 fragments, our approach reached a maximum overall accuracy of 74.9% in classifying 512 byte fragments and 87.3% in classifying 4096 byte fragments.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123021253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1