首页 > 最新文献

IT-Information Technology最新文献

英文 中文
Approximate Computing 近似计算
IF 0.9 Q2 Computer Science Pub Date : 2022-05-05 DOI: 10.1007/978-3-030-98347-5
Christian Plessl, M. Platzner, P. Schreier
{"title":"Approximate Computing","authors":"Christian Plessl, M. Platzner, P. Schreier","doi":"10.1007/978-3-030-98347-5","DOIUrl":"https://doi.org/10.1007/978-3-030-98347-5","url":null,"abstract":"","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42591358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and error analysis of accuracy-configurable sequential multipliers via segmented carry chains 分段进位链可配置精度序列乘法器的设计与误差分析
IF 0.9 Q2 Computer Science Pub Date : 2022-04-06 DOI: 10.1515/itit-2021-0040
Jorge Echavarria, S. Wildermann, Oliver Keszocze, Faramarz Khosravi, A. Becher, Jürgen Teich
Abstract We present the design and a closed-form error analysis of accuracy-configurable multipliers via segmented carry chains. To address this problem, we model the approximate partial-product accumulations as a sequential process. According to a given splitting point of the carry chains, the technique herein discussed allows varying the quality of the accumulations and, consequently, the overall product. Due to these shorter critical paths, such kinds of approximate multipliers can trade-off accuracy for an increased performance whilst exploiting the inherent area savings of sequential over combinatorial approaches. We implemented multiple architectures targeting FPGAs and ASICs with different bit-widths and accuracy configurations to 1) estimate resources, power consumption, and delay, as well as to 2) evaluate those error metrics that belong to the so-called #P-complete class.
摘要我们提出了通过分段进位链的精度可配置乘法器的设计和闭环误差分析。为了解决这个问题,我们将近似偏积累积建模为一个序列过程。根据输送链的给定分割点,本文讨论的技术允许改变累积的质量,从而改变整个产品的质量。由于这些较短的关键路径,这类近似乘法器可以在提高性能的同时权衡精度,同时利用顺序方法相对于组合方法的固有面积节约。我们实现了针对具有不同位宽和精度配置的FPGA和ASIC的多个体系结构,以1)估计资源、功耗和延迟,以及2)评估属于所谓的#P-完全类的错误度量。
{"title":"Design and error analysis of accuracy-configurable sequential multipliers via segmented carry chains","authors":"Jorge Echavarria, S. Wildermann, Oliver Keszocze, Faramarz Khosravi, A. Becher, Jürgen Teich","doi":"10.1515/itit-2021-0040","DOIUrl":"https://doi.org/10.1515/itit-2021-0040","url":null,"abstract":"Abstract We present the design and a closed-form error analysis of accuracy-configurable multipliers via segmented carry chains. To address this problem, we model the approximate partial-product accumulations as a sequential process. According to a given splitting point of the carry chains, the technique herein discussed allows varying the quality of the accumulations and, consequently, the overall product. Due to these shorter critical paths, such kinds of approximate multipliers can trade-off accuracy for an increased performance whilst exploiting the inherent area savings of sequential over combinatorial approaches. We implemented multiple architectures targeting FPGAs and ASICs with different bit-widths and accuracy configurations to 1) estimate resources, power consumption, and delay, as well as to 2) evaluate those error metrics that belong to the so-called #P-complete class.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42424060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of approximate arithmetic circuits and blocks 概论近似算术电路和模块
IF 0.9 Q2 Computer Science Pub Date : 2022-04-05 DOI: 10.1515/itit-2021-0055
Ke Chen, Peipei Yin, Weiqiang Liu, Fabrizio Lombardi
Abstract Approximate computing has become an emerging research topic for energy-efficient design of circuits and systems. Many approximate arithmetic circuits have been proposed, therefore it is critical to summarize the available approximation techniques to improve performance and energy efficiency at a acceptable accuracy loss. This paper presents an overview of circuit-level techniques used for approximate arithmetic. This paper provides a detailed review of circuit-level approximation techniques for the arithmetic data path. Its focus is on identifying critical circuit-level approximation techniques that apply to computational units and blocks. Approximate adders, multipliers, dividers, and squarer are introduced and classified according to their approximation methods. FFT and MAC are discussed as computational blocks that employ an approximate algorithm for implementation.
摘要近似计算已成为电路和系统节能设计的一个新兴研究课题。许多近似算术电路已经被提出,因此总结现有的近似技术以在可接受的精度损失下提高性能和能源效率是至关重要的。本文概述了用于近似算法的电路级技术。本文详细介绍了算术数据路径的电路级近似技术。它的重点是确定适用于计算单元和块的关键电路级近似技术。介绍了近似加法器、乘法器、除法器和平方器,并根据它们的近似方法进行了分类。FFT和MAC作为采用近似算法实现的计算块进行讨论。
{"title":"A survey of approximate arithmetic circuits and blocks","authors":"Ke Chen, Peipei Yin, Weiqiang Liu, Fabrizio Lombardi","doi":"10.1515/itit-2021-0055","DOIUrl":"https://doi.org/10.1515/itit-2021-0055","url":null,"abstract":"Abstract Approximate computing has become an emerging research topic for energy-efficient design of circuits and systems. Many approximate arithmetic circuits have been proposed, therefore it is critical to summarize the available approximation techniques to improve performance and energy efficiency at a acceptable accuracy loss. This paper presents an overview of circuit-level techniques used for approximate arithmetic. This paper provides a detailed review of circuit-level approximation techniques for the arithmetic data path. Its focus is on identifying critical circuit-level approximation techniques that apply to computational units and blocks. Approximate adders, multipliers, dividers, and squarer are introduced and classified according to their approximation methods. FFT and MAC are discussed as computational blocks that employ an approximate algorithm for implementation.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47588057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards practical privacy-preserving protocols 走向实用的隐私保护协议
IF 0.9 Q2 Computer Science Pub Date : 2022-04-01 DOI: 10.1515/itit-2022-0005
Daniel Demmler
Abstract Protecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are the privacy-preserving protocols secure multi-party computation (MPC) and private information retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In the dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving Protocols”. Diss. Darmstadt: Technische Universität, 2018. url: http://tuprints.ulb.tu-darmstadt.de/8605/], summarized in this article, we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the GDPR in the European Union, that enforces privacy protection of user data by design.
摘要随着时间的推移,随着存储和交换的数据量稳步增长,以及系统越来越多地参与和连接,在数字系统中保护用户隐私变得更加复杂和具有挑战性。试图解决这一问题的两种技术是隐私保护协议——安全多方计算(MPC)和私有信息检索(PIR),它们旨在实现实际计算,同时保持敏感数据的私有性。论文[Daniel Demmler,“走向实用的隐私保护协议”,德国达姆施塔特工业大学,2018。网址:http://tuprints.ulb.tu-darmstadt.de/8605/],在本文中进行了总结,我们展示了如何以保护隐私的方式执行现实世界中的应用程序的结果。这不仅是此类应用程序的用户所希望的,而且自2018年以来,这也是基于欧盟GDPR的强大法律基础,GDPR通过设计强制保护用户数据的隐私。
{"title":"Towards practical privacy-preserving protocols","authors":"Daniel Demmler","doi":"10.1515/itit-2022-0005","DOIUrl":"https://doi.org/10.1515/itit-2022-0005","url":null,"abstract":"Abstract Protecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are the privacy-preserving protocols secure multi-party computation (MPC) and private information retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In the dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving Protocols”. Diss. Darmstadt: Technische Universität, 2018. url: http://tuprints.ulb.tu-darmstadt.de/8605/], summarized in this article, we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the GDPR in the European Union, that enforces privacy protection of user data by design.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45935385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest editorial: Information security methodology and replication studies 客座社论:信息安全方法论和复制研究
IF 0.9 Q2 Computer Science Pub Date : 2022-04-01 DOI: 10.1515/itit-2022-0016
S. Wendzel, L. Caviglione, A. Mileva, Jean-François Lalande, W. Mazurczyk
Abstract This special issue presents five articles that address the topic of replicability and scientific methodology in information security research, featuring two extended articles from the 2021 International Workshop on Information Security Methodology and Replication Studies (IWSMR). This special issue also comprises two distinguished dissertations.
本特刊介绍了五篇关于信息安全研究中的可复制性和科学方法论的文章,其中包括两篇来自2021年信息安全方法论和可复制性研究国际研讨会(IWSMR)的扩展文章。本期特刊还收录了两篇著名的论文。
{"title":"Guest editorial: Information security methodology and replication studies","authors":"S. Wendzel, L. Caviglione, A. Mileva, Jean-François Lalande, W. Mazurczyk","doi":"10.1515/itit-2022-0016","DOIUrl":"https://doi.org/10.1515/itit-2022-0016","url":null,"abstract":"Abstract This special issue presents five articles that address the topic of replicability and scientific methodology in information security research, featuring two extended articles from the 2021 International Workshop on Information Security Methodology and Replication Studies (IWSMR). This special issue also comprises two distinguished dissertations.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47210367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring syntactical features for anomaly detection in application logs 探索应用程序日志中异常检测的语法特性
IF 0.9 Q2 Computer Science Pub Date : 2022-03-23 DOI: 10.1515/itit-2021-0064
R. Copstein, Egil Karlsen, Jeff Schwartzentruber, N. Zincir-Heywood, M. Heywood
Abstract In this research, we analyze the effect of lightweight syntactical feature extraction techniques from the field of information retrieval for log abstraction in information security. To this end, we evaluate three feature extraction techniques and three clustering algorithms on four different security datasets for anomaly detection. Results demonstrate that these techniques have a role to play for log abstraction in the form of extracting syntactic features which improves the identification of anomalous minority classes, specifically in homogeneous security datasets.
摘要在本研究中,我们分析了信息检索领域的轻量级语法特征提取技术在信息安全中对日志抽象的影响。为此,我们在四个不同的安全数据集上评估了用于异常检测的三种特征提取技术和三种聚类算法。结果表明,这些技术以提取句法特征的形式在日志抽象中发挥了作用,这改进了异常少数类的识别,特别是在同质安全数据集中。
{"title":"Exploring syntactical features for anomaly detection in application logs","authors":"R. Copstein, Egil Karlsen, Jeff Schwartzentruber, N. Zincir-Heywood, M. Heywood","doi":"10.1515/itit-2021-0064","DOIUrl":"https://doi.org/10.1515/itit-2021-0064","url":null,"abstract":"Abstract In this research, we analyze the effect of lightweight syntactical feature extraction techniques from the field of information retrieval for log abstraction in information security. To this end, we evaluate three feature extraction techniques and three clustering algorithms on four different security datasets for anomaly detection. Results demonstrate that these techniques have a role to play for log abstraction in the form of extracting syntactic features which improves the identification of anomalous minority classes, specifically in homogeneous security datasets.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43217183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-preserving Web single sign-on: Formal security analysis and design 保护隐私的Web单点登录:正式的安全性分析与设计
IF 0.9 Q2 Computer Science Pub Date : 2022-02-19 DOI: 10.1515/itit-2022-0003
G. Schmitz
Abstract Single sign-on (SSO) systems, such as OpenID and OAuth, allow Web sites to delegate user authentication to third parties, such as Facebook or Google. These systems provide a convenient mechanism for users to log in and ease the burden of user authentication for Web sites. Conversely, by integrating such SSO systems, they become a crucial part of the security of the modern Web. So far, it has been hard to prove if Web standards and protocols actually meet their security goals. SSO systems, in particular, need to satisfy strong security and privacy properties. In this thesis, we develop a new systematic approach to rigorously and formally analyze and verify such strong properties with the Web Infrastructure Model (WIM), the most comprehensive model of the Web infrastructure to date. Our analyses reveal severe vulnerabilities in SSO systems that lead to critical attacks against their security and privacy. We propose fixes and formally verify that our proposals are sufficient to establish security. Our analyses, however, also show that even Mozilla’s proposal for a privacy-preserving SSO system does not meet its unique privacy goal. To fill this gap, we use our novel approach to develop a new SSO system, SPRESSO, and formally prove that our system indeed enjoys strong security and privacy properties.
抽象单点登录(SSO)系统,如OpenID和OAuth,允许网站将用户身份验证委托给第三方,如Facebook或Google。这些系统为用户登录提供了一种方便的机制,并减轻了网站用户身份验证的负担。相反,通过集成此类SSO系统,它们将成为现代Web安全的重要组成部分。到目前为止,还很难证明Web标准和协议是否真的达到了它们的安全目标。SSO系统尤其需要满足强大的安全性和隐私特性。在本文中,我们开发了一种新的系统方法,用Web基础设施模型(WIM)严格而正式地分析和验证这些强属性,WIM是迄今为止最全面的Web基础设施的模型。我们的分析揭示了SSO系统中的严重漏洞,这些漏洞会导致对其安全和隐私的严重攻击。我们提出了修复方案,并正式验证我们的建议是否足以建立安全性。然而,我们的分析也表明,即使Mozilla提出的保护隐私的SSO系统也不能达到其独特的隐私目标。为了填补这一空白,我们使用我们的新方法开发了一个新的SSO系统SPRESSO,并正式证明我们的系统确实具有强大的安全性和隐私特性。
{"title":"Privacy-preserving Web single sign-on: Formal security analysis and design","authors":"G. Schmitz","doi":"10.1515/itit-2022-0003","DOIUrl":"https://doi.org/10.1515/itit-2022-0003","url":null,"abstract":"Abstract Single sign-on (SSO) systems, such as OpenID and OAuth, allow Web sites to delegate user authentication to third parties, such as Facebook or Google. These systems provide a convenient mechanism for users to log in and ease the burden of user authentication for Web sites. Conversely, by integrating such SSO systems, they become a crucial part of the security of the modern Web. So far, it has been hard to prove if Web standards and protocols actually meet their security goals. SSO systems, in particular, need to satisfy strong security and privacy properties. In this thesis, we develop a new systematic approach to rigorously and formally analyze and verify such strong properties with the Web Infrastructure Model (WIM), the most comprehensive model of the Web infrastructure to date. Our analyses reveal severe vulnerabilities in SSO systems that lead to critical attacks against their security and privacy. We propose fixes and formally verify that our proposals are sufficient to establish security. Our analyses, however, also show that even Mozilla’s proposal for a privacy-preserving SSO system does not meet its unique privacy goal. To fill this gap, we use our novel approach to develop a new SSO system, SPRESSO, and formally prove that our system indeed enjoys strong security and privacy properties.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41626010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling data-centric AI through data quality management and data literacy 通过数据质量管理和数据素养实现以数据为中心的人工智能
IF 0.9 Q2 Computer Science Pub Date : 2022-02-18 DOI: 10.1515/itit-2021-0048
Ziawasch Abedjan
Abstract Data is being produced at an intractable pace. At the same time, there is an insatiable interest in using such data for use cases that span all imaginable domains, including health, climate, business, and gaming. Beyond the novel socio-technical challenges that surround data-driven innovations, there are still open data processing challenges that impede the usability of data-driven techniques. It is commonly acknowledged that overcoming heterogeneity of data with regard to syntax and semantics to combine various sources for a common goal is a major bottleneck. Furthermore, the quality of such data is always under question as the data science pipelines today are highly ad-hoc and without the necessary care for provenance. Finally, quality criteria that go beyond the syntactical and semantic correctness of individual values but also incorporate population-level constraints, such as equal parity and opportunity with regard to protected groups, play a more and more important role in this process. Traditional research on data integration was focused on post-merger integration of companies, where customer or product databases had to be integrated. While this is often hard enough, today the challenges aggravate because of the fact that more stakeholders are using data analytics tools to derive domain-specific insights. I call this phenomenon the democratization of data science, a process, which is both challenging and necessary. Novel systems need to be user-friendly in a way that not only trained database admins can handle them but also less computer science savvy stakeholders. Thus, our research focuses on scalable example-driven techniques for data preparation and curation. Furthermore, we believe that it is important to educate the breadth of society on implications of a data-driven world and actively promote the concept of data literacy as a fundamental competence.
摘要数据的生成速度非常缓慢。与此同时,人们对将这些数据用于涵盖所有可以想象的领域的用例有着永不满足的兴趣,包括健康、气候、商业和游戏。除了围绕数据驱动创新的新的社会技术挑战之外,仍然存在阻碍数据驱动技术可用性的开放数据处理挑战。人们普遍认为,克服语法和语义方面的数据异构性,将各种来源组合起来以实现共同目标是一个主要瓶颈。此外,这些数据的质量总是受到质疑,因为今天的数据科学管道是高度临时的,没有必要关心来源。最后,质量标准超越了个人价值观的语法和语义正确性,但也包含了群体层面的约束,如与受保护群体的平等平等和机会,在这一过程中发挥着越来越重要的作用。传统的数据集成研究主要集中在公司合并后的集成,其中必须集成客户或产品数据库。虽然这通常已经够难的了,但今天的挑战加剧了,因为越来越多的利益相关者正在使用数据分析工具来获得特定领域的见解。我把这种现象称为数据科学的民主化,这是一个具有挑战性和必要性的过程。新型系统需要用户友好,不仅受过培训的数据库管理员可以处理这些系统,而且需要不太懂计算机科学的利益相关者。因此,我们的研究重点是用于数据准备和管理的可扩展示例驱动技术。此外,我们认为,重要的是教育全社会了解数据驱动世界的影响,并积极宣传数据素养这一基本能力的概念。
{"title":"Enabling data-centric AI through data quality management and data literacy","authors":"Ziawasch Abedjan","doi":"10.1515/itit-2021-0048","DOIUrl":"https://doi.org/10.1515/itit-2021-0048","url":null,"abstract":"Abstract Data is being produced at an intractable pace. At the same time, there is an insatiable interest in using such data for use cases that span all imaginable domains, including health, climate, business, and gaming. Beyond the novel socio-technical challenges that surround data-driven innovations, there are still open data processing challenges that impede the usability of data-driven techniques. It is commonly acknowledged that overcoming heterogeneity of data with regard to syntax and semantics to combine various sources for a common goal is a major bottleneck. Furthermore, the quality of such data is always under question as the data science pipelines today are highly ad-hoc and without the necessary care for provenance. Finally, quality criteria that go beyond the syntactical and semantic correctness of individual values but also incorporate population-level constraints, such as equal parity and opportunity with regard to protected groups, play a more and more important role in this process. Traditional research on data integration was focused on post-merger integration of companies, where customer or product databases had to be integrated. While this is often hard enough, today the challenges aggravate because of the fact that more stakeholders are using data analytics tools to derive domain-specific insights. I call this phenomenon the democratization of data science, a process, which is both challenging and necessary. Novel systems need to be user-friendly in a way that not only trained database admins can handle them but also less computer science savvy stakeholders. Thus, our research focuses on scalable example-driven techniques for data preparation and curation. Furthermore, we believe that it is important to educate the breadth of society on implications of a data-driven world and actively promote the concept of data literacy as a fundamental competence.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42557398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extracting network based attack narratives through use of the cyber kill chain: A replication study 通过使用网络杀伤链提取基于网络的攻击叙事:一项复制研究
IF 0.9 Q2 Computer Science Pub Date : 2022-02-18 DOI: 10.1515/itit-2021-0059
Aaron Weathersby, M. Washington
Abstract The defense of a computer network requires defenders to both understand when an attack is taking place and understand the larger strategic goals of their attackers. In this paper we explore this topic through the replication of a prior study “Extracting Attack Narratives from Traffic Datasets” by Mireles et al. [Athanasiades, N., et al., Intrusion detection testing and benchmarking methodologies, in First IEEE International Workshop on Information Assurance. 2003, IEEE: Darmstadt, Germany]. In their original research Mireles et al. proposed a framework linking a particular cyber-attack model (the Mandiant Life Cycle Model) and identification of individual attack signatures into a process as to provide a higher-level insight of an attacker in what they termed as attack narratives. In our study we both replicate the original authors work while also moving the research forward by integrating many of the suggestions Mireles et al. provided that would have improved their study. Through our analysis, we confirm the concept that attack narratives can provide additional insight beyond the review of individual cyber-attacks. We also built upon one of their suggested areas by exploring their framework through the lens of Lockheed Martin Cyber Kill Chain. While we found the concept to be novel and potentially useful, we found challenges replicating the clarity Mireles et al. described. In our research we identify the need for additional research into describing additional components of an attack narrative including the nonlinear nature of cyber-attacks and issues of identity and attribution.
计算机网络的防御要求防御者既要了解攻击何时发生,又要了解攻击者更大的战略目标。在本文中,我们通过复制Mireles等人先前的研究“从流量数据集中提取攻击叙述”来探索这个主题。[a] thanasiades, N.,等。,入侵检测与测试方法,在第一届IEEE国际信息安全研讨会。2003,IEEE: Darmstadt,德国。在他们最初的研究中,Mireles等人。提出了一个框架,将特定的网络攻击模型(Mandiant生命周期模型)和单个攻击签名的识别连接到一个过程中,以便在他们所谓的攻击叙述中提供对攻击者的更高层次的洞察。在我们的研究中,我们既复制了原作者的工作,又通过整合Mireles等人的许多建议推动了研究的发展。前提是这样可以提高他们的研究水平。通过我们的分析,我们确认了这样一个概念,即攻击叙述可以提供超越个人网络攻击审查的额外见解。我们还通过洛克希德·马丁公司的网络杀伤链来探索他们的框架,从而建立了他们建议的一个领域。虽然我们发现这个概念是新颖的,并且可能有用,但我们发现复制Mireles等人的清晰度存在挑战。描述。在我们的研究中,我们确定需要进一步研究描述攻击叙述的其他组成部分,包括网络攻击的非线性性质以及身份和归属问题。
{"title":"Extracting network based attack narratives through use of the cyber kill chain: A replication study","authors":"Aaron Weathersby, M. Washington","doi":"10.1515/itit-2021-0059","DOIUrl":"https://doi.org/10.1515/itit-2021-0059","url":null,"abstract":"Abstract The defense of a computer network requires defenders to both understand when an attack is taking place and understand the larger strategic goals of their attackers. In this paper we explore this topic through the replication of a prior study “Extracting Attack Narratives from Traffic Datasets” by Mireles et al. [Athanasiades, N., et al., Intrusion detection testing and benchmarking methodologies, in First IEEE International Workshop on Information Assurance. 2003, IEEE: Darmstadt, Germany]. In their original research Mireles et al. proposed a framework linking a particular cyber-attack model (the Mandiant Life Cycle Model) and identification of individual attack signatures into a process as to provide a higher-level insight of an attacker in what they termed as attack narratives. In our study we both replicate the original authors work while also moving the research forward by integrating many of the suggestions Mireles et al. provided that would have improved their study. Through our analysis, we confirm the concept that attack narratives can provide additional insight beyond the review of individual cyber-attacks. We also built upon one of their suggested areas by exploring their framework through the lens of Lockheed Martin Cyber Kill Chain. While we found the concept to be novel and potentially useful, we found challenges replicating the clarity Mireles et al. described. In our research we identify the need for additional research into describing additional components of an attack narrative including the nonlinear nature of cyber-attacks and issues of identity and attribution.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46091062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unlocking approximation for in-memory computing with Cartesian genetic programming and computer algebra for arithmetic circuits 用笛卡尔遗传规划和计算电路的计算机代数解锁内存计算中的近似
IF 0.9 Q2 Computer Science Pub Date : 2022-02-16 DOI: 10.1515/itit-2021-0042
Saman Froehlich, R. Drechsler
Abstract With ReRAM being a non-volative memory technology, which features low power consumption, high scalability and allows for in-memory computing, it is a promising candidate for future computer architectures. Approximate computing is a design paradigm, which aims at reducing the complexity of hardware by trading off accuracy for area and/or delay. In this article, we introduce approximate computing techniques to in-memory computing. We extend existing compilation techniques for the Programmable Logic in-Memory (PLiM) computer architecture, by adapting state-of-the-art approximate computing techniques for arithmetic circuits. We use Cartesian Genetic Programming for the generation of approximate circuits and evaluate them using a Symbolic Computer Algebra-based technique with respect to error-metrics. In our experiments, we show that we can outperform state-of-the-art handcrafted approximate adder designs.
ReRAM作为一种非挥发性存储技术,具有低功耗、高可扩展性和允许内存内计算的特点,是未来计算机体系结构的一个很有前途的候选者。近似计算是一种设计范例,其目的是通过权衡精度和/或延迟来降低硬件的复杂性。在本文中,我们将介绍内存中计算的近似计算技术。我们扩展现有的编译技术的可编程逻辑在内存(PLiM)计算机体系结构,通过采用最先进的近似计算技术的算术电路。我们使用笛卡尔遗传规划来生成近似电路,并使用基于符号计算机代数的技术对误差度量进行评估。在我们的实验中,我们证明我们可以胜过最先进的手工制作的近似加法器设计。
{"title":"Unlocking approximation for in-memory computing with Cartesian genetic programming and computer algebra for arithmetic circuits","authors":"Saman Froehlich, R. Drechsler","doi":"10.1515/itit-2021-0042","DOIUrl":"https://doi.org/10.1515/itit-2021-0042","url":null,"abstract":"Abstract With ReRAM being a non-volative memory technology, which features low power consumption, high scalability and allows for in-memory computing, it is a promising candidate for future computer architectures. Approximate computing is a design paradigm, which aims at reducing the complexity of hardware by trading off accuracy for area and/or delay. In this article, we introduce approximate computing techniques to in-memory computing. We extend existing compilation techniques for the Programmable Logic in-Memory (PLiM) computer architecture, by adapting state-of-the-art approximate computing techniques for arithmetic circuits. We use Cartesian Genetic Programming for the generation of approximate circuits and evaluate them using a Symbolic Computer Algebra-based technique with respect to error-metrics. In our experiments, we show that we can outperform state-of-the-art handcrafted approximate adder designs.","PeriodicalId":43953,"journal":{"name":"IT-Information Technology","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46374296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
IT-Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1