首页 > 最新文献

arXiv - CS - Cryptography and Security最新文献

英文 中文
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field 双索引微积分算法:更快解决有限素数域中的离散对数问题
Pub Date : 2024-09-13 DOI: arxiv-2409.08784
Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Yongjian Liao, Yuyu Wang
Solving the discrete logarithm problem in a finite prime field is anextremely important computing problem in modern cryptography. The hardness ofsolving the discrete logarithm problem in a finite prime field is the securityfoundation of numerous cryptography schemes. In this paper, we propose thedouble index calculus algorithm to solve the discrete logarithm problem in afinite prime field. Our algorithm is faster than the index calculus algorithm,which is the state-of-the-art algorithm for solving the discrete logarithmproblem in a finite prime field. Empirical experiment results indicate that ouralgorithm could be more than a 30-fold increase in computing speed than theindex calculus algorithm when the bit length of the order of prime field is 70bits. In addition, our algorithm is more general than the index calculusalgorithm. Specifically, when the base of the target discrete logarithm problemis not the multiplication generator, the index calculus algorithm may fail tosolve the discrete logarithm problem while our algorithm still can work.
解决有限素域中的离散对数问题是现代密码学中一个极其重要的计算问题。求解有限素域离散对数问题的难度是众多密码方案的安全基础。在本文中,我们提出了双索引微积分算法来解决无限素域中的离散对数问题。我们的算法比索引微积分算法更快,而索引微积分算法是解决有限素域离散对数问题的最先进算法。实证实验结果表明,当质数域阶的比特长度为 70 比特时,我们的算法比索引微积分算法的运算速度提高了 30 多倍。此外,我们的算法比索引计算算法更具通用性。具体来说,当目标离散对数问题的基数不是乘法发生器时,索引微积分算法可能无法解决离散对数问题,而我们的算法仍然可以工作。
{"title":"Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field","authors":"Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Yongjian Liao, Yuyu Wang","doi":"arxiv-2409.08784","DOIUrl":"https://doi.org/arxiv-2409.08784","url":null,"abstract":"Solving the discrete logarithm problem in a finite prime field is an\u0000extremely important computing problem in modern cryptography. The hardness of\u0000solving the discrete logarithm problem in a finite prime field is the security\u0000foundation of numerous cryptography schemes. In this paper, we propose the\u0000double index calculus algorithm to solve the discrete logarithm problem in a\u0000finite prime field. Our algorithm is faster than the index calculus algorithm,\u0000which is the state-of-the-art algorithm for solving the discrete logarithm\u0000problem in a finite prime field. Empirical experiment results indicate that our\u0000algorithm could be more than a 30-fold increase in computing speed than the\u0000index calculus algorithm when the bit length of the order of prime field is 70\u0000bits. In addition, our algorithm is more general than the index calculus\u0000algorithm. Specifically, when the base of the target discrete logarithm problem\u0000is not the multiplication generator, the index calculus algorithm may fail to\u0000solve the discrete logarithm problem while our algorithm still can work.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National Treasure: The Call for e-Democracy and US Election Security 国宝:呼吁电子民主和美国选举安全
Pub Date : 2024-09-13 DOI: arxiv-2409.08952
Adam Dorian Wong
Faith in the US electoral system is at risk. This issue stems from trust orlack thereof. Poor leaders ranted and attempted to sew discord in thedemocratic process and even tried to influence election results. Historically,the US has relied on paper ballots to cast private votes. Votes are watereddown by the Electoral College. Elections are contested due to voter IDs andproof of citizenship. Methods of voting are nonsensically complex. In thetechnology age, this can be solved with a Smartcard National ID backed byPublic-Key Infrastructure (PKI). This could be a method to restore hope indemocracy and move the country back towards elections under a Popular Vote.Numbers are empirical and immutable and can solve the issue of ElectionSecurity in a bipartisan way. NATO allies like Estonia have already brokenground in using technology for eDemocracy or (Internet-based) iVoting.Acknowledging cyber attacks will happen, this is an opportunity for DHS and DOD(CYBERCOM) to collaborate on domestic operations and protect critical electioninfrastructure. This idea will not fix malicious information operations orcivil stupidity. However, this is the way forward to securing elections now andforever. The views expressed by this whitepaper are those of the author and donot reflect the official policy or position of Dakota State University, theN.H. Army National Guard, the U.S. Army, the Department of Defense, or the U.S.Government. Cleared for release by DOPSR on 13 SEP 2024.
对美国选举制度的信任岌岌可危。这个问题源于信任或缺乏信任。拙劣的领导人肆意妄为,试图在民主进程中制造不和谐,甚至试图影响选举结果。历史上,美国一直依靠纸质选票进行私人投票。选票被选举团冲淡。由于选民身份证和公民身份的证明,选举备受争议。投票方法复杂得毫无意义。在科技时代,这个问题可以通过由公钥基础设施(PKI)支持的智能卡国民身份证来解决。数字是经验之谈,不可更改,可以通过两党合作的方式解决选举安全问题。北约盟国(如爱沙尼亚)已经在利用技术实现电子民主或(基于互联网的)iVoting 方面取得了突破。由于认识到网络攻击将会发生,国土安全部和国防部(CYBERCOM)有机会在国内行动中开展合作,保护重要的选举基础设施。这一想法无法解决恶意信息行动或公民的愚蠢行为。但是,这是确保选举安全的必由之路。本白皮书所表达的观点仅代表作者本人,并不反映达科他州立大学、新罕布什尔州陆军国民警卫队、美国陆军、国防部或美国政府的官方政策或立场。已于 2024 年 9 月 13 日通过 DOPSR 发布。
{"title":"National Treasure: The Call for e-Democracy and US Election Security","authors":"Adam Dorian Wong","doi":"arxiv-2409.08952","DOIUrl":"https://doi.org/arxiv-2409.08952","url":null,"abstract":"Faith in the US electoral system is at risk. This issue stems from trust or\u0000lack thereof. Poor leaders ranted and attempted to sew discord in the\u0000democratic process and even tried to influence election results. Historically,\u0000the US has relied on paper ballots to cast private votes. Votes are watered\u0000down by the Electoral College. Elections are contested due to voter IDs and\u0000proof of citizenship. Methods of voting are nonsensically complex. In the\u0000technology age, this can be solved with a Smartcard National ID backed by\u0000Public-Key Infrastructure (PKI). This could be a method to restore hope in\u0000democracy and move the country back towards elections under a Popular Vote.\u0000Numbers are empirical and immutable and can solve the issue of Election\u0000Security in a bipartisan way. NATO allies like Estonia have already broken\u0000ground in using technology for eDemocracy or (Internet-based) iVoting.\u0000Acknowledging cyber attacks will happen, this is an opportunity for DHS and DOD\u0000(CYBERCOM) to collaborate on domestic operations and protect critical election\u0000infrastructure. This idea will not fix malicious information operations or\u0000civil stupidity. However, this is the way forward to securing elections now and\u0000forever. The views expressed by this whitepaper are those of the author and do\u0000not reflect the official policy or position of Dakota State University, the\u0000N.H. Army National Guard, the U.S. Army, the Department of Defense, or the U.S.\u0000Government. Cleared for release by DOPSR on 13 SEP 2024.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Software Tool Evaluation Using a 'Perfect' Network Model 使用 "完美 "网络模型评估网络安全软件工具
Pub Date : 2024-09-13 DOI: arxiv-2409.09175
Jeremy Straub
Cybersecurity software tool evaluation is difficult due to the inherentlyadversarial nature of the field. A penetration testing (or offensive) tool mustbe tested against a viable defensive adversary and a defensive tool must,similarly, be tested against a viable offensive adversary. Characterizing thetool's performance inherently depends on the quality of the adversary, whichcan vary from test to test. This paper proposes the use of a 'perfect' network,representing computing systems, a network and the attack pathways through it asa methodology to use for testing cybersecurity decision-making tools. Thisfacilitates testing by providing a known and consistent standard forcomparison. It also allows testing to include researcher-selected levels oferror, noise and uncertainty to evaluate cybersecurity tools under theseexperimental conditions.
网络安全软件工具评估的难度在于该领域固有的对抗性。渗透测试(或进攻)工具必须针对可行的防御对手进行测试,而防御工具同样必须针对可行的进攻对手进行测试。鉴定工具的性能本质上取决于对手的质量,而对手的质量在不同的测试中会有所不同。本文提出使用 "完美 "网络(代表计算系统、网络和通过网络的攻击路径)作为测试网络安全决策工具的方法。这为测试提供了一个已知的、一致的比较标准。它还允许测试包括研究人员选择的错误、噪音和不确定性水平,以便在这些实验条件下评估网络安全工具。
{"title":"Cybersecurity Software Tool Evaluation Using a 'Perfect' Network Model","authors":"Jeremy Straub","doi":"arxiv-2409.09175","DOIUrl":"https://doi.org/arxiv-2409.09175","url":null,"abstract":"Cybersecurity software tool evaluation is difficult due to the inherently\u0000adversarial nature of the field. A penetration testing (or offensive) tool must\u0000be tested against a viable defensive adversary and a defensive tool must,\u0000similarly, be tested against a viable offensive adversary. Characterizing the\u0000tool's performance inherently depends on the quality of the adversary, which\u0000can vary from test to test. This paper proposes the use of a 'perfect' network,\u0000representing computing systems, a network and the attack pathways through it as\u0000a methodology to use for testing cybersecurity decision-making tools. This\u0000facilitates testing by providing a known and consistent standard for\u0000comparison. It also allows testing to include researcher-selected levels of\u0000error, noise and uncertainty to evaluate cybersecurity tools under these\u0000experimental conditions.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography 协助软件可执行文件向后量子加密技术迁移的工具链
Pub Date : 2024-09-12 DOI: arxiv-2409.07852
Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun
Quantum computing poses a significant global threat to today's securitymechanisms. As a result, security experts and public sectors have issuedguidelines to help organizations migrate their software to post-quantumcryptography (PQC). Despite these efforts, there is a lack of (semi-)automatictools to support this transition especially when software is used and deployedas binary executables. To address this gap, in this work, we first propose aset of requirements necessary for a tool to detect quantum-vulnerable softwareexecutables. Following these requirements, we introduce QED: a toolchain forQuantum-vulnerable Executable Detection. QED uses a three-phase approach toidentify quantum-vulnerable dependencies in a given set of executables, fromfile-level to API-level, and finally, precise identification of a static tracethat triggers a quantum-vulnerable API. We evaluate QED on both a syntheticdataset with four cryptography libraries and a real-world dataset with over 200software executables. The results demonstrate that: (1) QED discernsquantum-vulnerable from quantum-safe executables with 100% accuracy in thesynthetic dataset; (2) QED is practical and scalable, completing analyses onaverage in less than 4 seconds per real-world executable; and (3) QED reducesthe manual workload required by analysts to identify quantum-vulnerableexecutables in the real-world dataset by more than 90%. We hope that QED canbecome a crucial tool to facilitate the transition to PQC, particularly forsmall and medium-sized businesses with limited resources.
量子计算对当今的安全机制构成了重大的全球性威胁。因此,安全专家和公共部门发布了指导方针,帮助企业将其软件迁移到后量子加密技术(PQC)。尽管做出了这些努力,但仍缺乏(半)自动工具来支持这一过渡,尤其是在软件作为二进制可执行文件使用和部署时。为了填补这一空白,我们首先提出了检测量子漏洞软件可执行文件的工具所需的一系列要求。根据这些要求,我们介绍了 QED:量子漏洞可执行文件检测工具链。QED 采用三阶段方法识别给定可执行文件集中的量子漏洞依赖关系,从文件级到 API 级,最后精确识别触发量子漏洞 API 的静态轨迹。我们在包含四个密码学库的合成数据集和包含 200 多个软件可执行文件的真实世界数据集上对 QED 进行了评估。结果表明(1) 在合成数据集中,QED 从量子安全的可执行文件中识别量子漏洞的准确率达到 100%;(2) QED 实用且可扩展,平均每个真实世界可执行文件只需不到 4 秒就能完成分析;(3) QED 将分析师识别真实世界数据集中量子漏洞可执行文件所需的人工工作量减少了 90% 以上。我们希望 QED 能够成为促进向 PQC 过渡的重要工具,尤其是对资源有限的中小型企业而言。
{"title":"A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Crytography","authors":"Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun","doi":"arxiv-2409.07852","DOIUrl":"https://doi.org/arxiv-2409.07852","url":null,"abstract":"Quantum computing poses a significant global threat to today's security\u0000mechanisms. As a result, security experts and public sectors have issued\u0000guidelines to help organizations migrate their software to post-quantum\u0000cryptography (PQC). Despite these efforts, there is a lack of (semi-)automatic\u0000tools to support this transition especially when software is used and deployed\u0000as binary executables. To address this gap, in this work, we first propose a\u0000set of requirements necessary for a tool to detect quantum-vulnerable software\u0000executables. Following these requirements, we introduce QED: a toolchain for\u0000Quantum-vulnerable Executable Detection. QED uses a three-phase approach to\u0000identify quantum-vulnerable dependencies in a given set of executables, from\u0000file-level to API-level, and finally, precise identification of a static trace\u0000that triggers a quantum-vulnerable API. We evaluate QED on both a synthetic\u0000dataset with four cryptography libraries and a real-world dataset with over 200\u0000software executables. The results demonstrate that: (1) QED discerns\u0000quantum-vulnerable from quantum-safe executables with 100% accuracy in the\u0000synthetic dataset; (2) QED is practical and scalable, completing analyses on\u0000average in less than 4 seconds per real-world executable; and (3) QED reduces\u0000the manual workload required by analysts to identify quantum-vulnerable\u0000executables in the real-world dataset by more than 90%. We hope that QED can\u0000become a crucial tool to facilitate the transition to PQC, particularly for\u0000small and medium-sized businesses with limited resources.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding 镊子:通过以事件归属为中心的推特嵌入进行安全事件检测的框架
Pub Date : 2024-09-12 DOI: arxiv-2409.08221
Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao
Twitter is recognized as a crucial platform for the dissemination andgathering of Cyber Threat Intelligence (CTI). Its capability to providereal-time, actionable intelligence makes it an indispensable tool for detectingsecurity events, helping security professionals cope with ever-growing threats.However, the large volume of tweets and inherent noises of human-crafted tweetspose significant challenges in accurately identifying security events. Whilemany studies tried to filter out event-related tweets based on keywords, theyare not effective due to their limitation in understanding the semantics oftweets. Another challenge in security event detection from Twitter is thecomprehensive coverage of security events. Previous studies emphasized theimportance of early detection of security events, but they overlooked theimportance of event coverage. To cope with these challenges, in our study, weintroduce a novel event attribution-centric tweet embedding method to enablethe high precision and coverage of events. Our experiment result shows that theproposed method outperforms existing text and graph-based tweet embeddingmethods in identifying security events. Leveraging this novel embeddingapproach, we have developed and implemented a framework, Tweezers, that isapplicable to security event detection from Twitter for CTI gathering. Thisframework has demonstrated its effectiveness, detecting twice as many eventscompared to established baselines. Additionally, we have showcased twoapplications, built on Tweezers for the integration and inspection of securityevents, i.e., security event trend analysis and informative security useridentification.
Twitter 被认为是传播和收集网络威胁情报 (CTI) 的重要平台。它能够提供实时、可操作的情报,是检测安全事件不可或缺的工具,可帮助安全专业人员应对日益增长的威胁。然而,大量的推文和人为推文固有的噪音给准确识别安全事件带来了巨大挑战。虽然许多研究试图根据关键字过滤出与事件相关的推文,但由于对推文语义的理解有限,因此效果不佳。从 Twitter 中检测安全事件的另一个挑战是安全事件的全面覆盖。以往的研究强调了安全事件早期检测的重要性,但忽略了事件覆盖范围的重要性。为了应对这些挑战,我们在研究中引入了一种新颖的以事件归因为中心的推文嵌入方法,以实现事件的高精度和高覆盖率。实验结果表明,该方法在识别安全事件方面优于现有的基于文本和图的推文嵌入方法。利用这种新颖的嵌入方法,我们开发并实现了一个框架 Tweezers,该框架适用于从 Twitter 收集 CTI 的安全事件检测。该框架已经证明了它的有效性,检测到的事件数量是既定基线的两倍。此外,我们还展示了基于 Tweezers 的两个应用程序,用于整合和检查安全事件,即安全事件趋势分析和信息安全用户识别。
{"title":"Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding","authors":"Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao","doi":"arxiv-2409.08221","DOIUrl":"https://doi.org/arxiv-2409.08221","url":null,"abstract":"Twitter is recognized as a crucial platform for the dissemination and\u0000gathering of Cyber Threat Intelligence (CTI). Its capability to provide\u0000real-time, actionable intelligence makes it an indispensable tool for detecting\u0000security events, helping security professionals cope with ever-growing threats.\u0000However, the large volume of tweets and inherent noises of human-crafted tweets\u0000pose significant challenges in accurately identifying security events. While\u0000many studies tried to filter out event-related tweets based on keywords, they\u0000are not effective due to their limitation in understanding the semantics of\u0000tweets. Another challenge in security event detection from Twitter is the\u0000comprehensive coverage of security events. Previous studies emphasized the\u0000importance of early detection of security events, but they overlooked the\u0000importance of event coverage. To cope with these challenges, in our study, we\u0000introduce a novel event attribution-centric tweet embedding method to enable\u0000the high precision and coverage of events. Our experiment result shows that the\u0000proposed method outperforms existing text and graph-based tweet embedding\u0000methods in identifying security events. Leveraging this novel embedding\u0000approach, we have developed and implemented a framework, Tweezers, that is\u0000applicable to security event detection from Twitter for CTI gathering. This\u0000framework has demonstrated its effectiveness, detecting twice as many events\u0000compared to established baselines. Additionally, we have showcased two\u0000applications, built on Tweezers for the integration and inspection of security\u0000events, i.e., security event trend analysis and informative security user\u0000identification.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Cybersecurity Compliance and Threat Response Using AI, Blockchain & Smart Contracts 利用人工智能、区块链和智能合约实现网络安全合规性和威胁响应自动化
Pub Date : 2024-09-12 DOI: arxiv-2409.08390
Lampis Alevizos, Vinh Thong Ta
To address the challenges of internal security policy compliance and dynamicthreat response in organizations, we present a novel framework that integratesartificial intelligence (AI), blockchain, and smart contracts. We propose asystem that automates the enforcement of security policies, reducing manualeffort and potential human error. Utilizing AI, we can analyse cyber threatintelligence rapidly, identify non-compliances and automatically adjust cyberdefence mechanisms. Blockchain technology provides an immutable ledger fortransparent logging of compliance actions, while smart contracts ensure uniformapplication of security measures. The framework's effectiveness is demonstratedthrough simulations, showing improvements in compliance enforcement rates andresponse times compared to traditional methods. Ultimately, our approachprovides for a scalable solution for managing complex security policies,reducing costs and enhancing the efficiency while achieving compliance.Finally, we discuss practical implications and propose future researchdirections to further refine the system and address implementation challenges.
为了应对组织内部安全政策合规性和动态威胁响应方面的挑战,我们提出了一个整合了人工智能(AI)、区块链和智能合约的新型框架。我们提出的系统可以自动执行安全策略,减少人工操作和潜在的人为错误。利用人工智能,我们可以快速分析网络威胁情报、识别违规行为并自动调整网络防御机制。区块链技术提供了一个不可变的分类账,可对合规行动进行透明记录,而智能合约则确保了安全措施的统一应用。该框架的有效性通过模拟得到了证明,与传统方法相比,合规执行率和响应时间都有所提高。最终,我们的方法为管理复杂的安全策略提供了一个可扩展的解决方案,在实现合规的同时降低了成本并提高了效率。最后,我们讨论了实际意义,并提出了未来的研究方向,以进一步完善系统并解决实施难题。
{"title":"Automated Cybersecurity Compliance and Threat Response Using AI, Blockchain & Smart Contracts","authors":"Lampis Alevizos, Vinh Thong Ta","doi":"arxiv-2409.08390","DOIUrl":"https://doi.org/arxiv-2409.08390","url":null,"abstract":"To address the challenges of internal security policy compliance and dynamic\u0000threat response in organizations, we present a novel framework that integrates\u0000artificial intelligence (AI), blockchain, and smart contracts. We propose a\u0000system that automates the enforcement of security policies, reducing manual\u0000effort and potential human error. Utilizing AI, we can analyse cyber threat\u0000intelligence rapidly, identify non-compliances and automatically adjust cyber\u0000defence mechanisms. Blockchain technology provides an immutable ledger for\u0000transparent logging of compliance actions, while smart contracts ensure uniform\u0000application of security measures. The framework's effectiveness is demonstrated\u0000through simulations, showing improvements in compliance enforcement rates and\u0000response times compared to traditional methods. Ultimately, our approach\u0000provides for a scalable solution for managing complex security policies,\u0000reducing costs and enhancing the efficiency while achieving compliance.\u0000Finally, we discuss practical implications and propose future research\u0000directions to further refine the system and address implementation challenges.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142261619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking 释放蠕虫和提取数据:利用 "越狱 "技术扩大对基于 RAG 推断的攻击结果的规模和严重程度
Pub Date : 2024-09-12 DOI: arxiv-2409.08045
Stav Cohen, Ron Bitton, Ben Nassi
In this paper, we show that with the ability to jailbreak a GenAI model,attackers can escalate the outcome of attacks against RAG-based GenAI-poweredapplications in severity and scale. In the first part of the paper, we showthat attackers can escalate RAG membership inference attacks and RAG entityextraction attacks to RAG documents extraction attacks, forcing a more severeoutcome compared to existing attacks. We evaluate the results obtained fromthree extraction methods, the influence of the type and the size of fiveembeddings algorithms employed, the size of the provided context, and the GenAIengine. We show that attackers can extract 80%-99.8% of the data stored in thedatabase used by the RAG of a Q&A chatbot. In the second part of the paper, weshow that attackers can escalate the scale of RAG data poisoning attacks fromcompromising a single GenAI-powered application to compromising the entireGenAI ecosystem, forcing a greater scale of damage. This is done by crafting anadversarial self-replicating prompt that triggers a chain reaction of acomputer worm within the ecosystem and forces each affected application toperform a malicious activity and compromise the RAG of additional applications.We evaluate the performance of the worm in creating a chain of confidentialdata extraction about users within a GenAI ecosystem of GenAI-powered emailassistants and analyze how the performance of the worm is affected by the sizeof the context, the adversarial self-replicating prompt used, the type and sizeof the embeddings algorithm employed, and the number of hops in thepropagation. Finally, we review and analyze guardrails to protect RAG-basedinference and discuss the tradeoffs.
在本文中,我们展示了利用 GenAI 模型越狱的能力,攻击者可以在严重程度和规模上升级对基于 RAG 的 GenAI-powered 应用程序的攻击结果。在本文的第一部分,我们展示了攻击者可以将RAG成员推理攻击和RAG实体提取攻击升级为RAG文档提取攻击,从而迫使攻击结果比现有攻击更加严重。我们评估了三种提取方法的结果、所采用的五种嵌入算法的类型和大小、所提供上下文的大小以及 GenAIengine 的影响。我们的研究表明,攻击者可以提取存储在问答聊天机器人 RAG 使用的数据库中的 80%-99.8% 的数据。在论文的第二部分,我们展示了攻击者可以将 RAG 数据中毒攻击的规模从破坏单个 GenAI 驱动的应用程序升级到破坏整个 GenAI 生态系统,从而造成更大范围的破坏。具体做法是制作一个对抗性的自我复制提示,在生态系统中触发计算机蠕虫的连锁反应,迫使每个受影响的应用程序执行恶意活动,并破坏其他应用程序的 RAG。我们评估了该蠕虫在由 GenAI 驱动的电子邮件助手组成的 GenAI 生态系统中创建用户机密数据提取链时的性能,并分析了蠕虫的性能如何受到上下文大小、所使用的对抗性自我复制提示、所使用的嵌入算法类型和大小以及传播跳数的影响。最后,我们回顾并分析了保护基于 RAG 的推理的防护措施,并讨论了其中的权衡问题。
{"title":"Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking","authors":"Stav Cohen, Ron Bitton, Ben Nassi","doi":"arxiv-2409.08045","DOIUrl":"https://doi.org/arxiv-2409.08045","url":null,"abstract":"In this paper, we show that with the ability to jailbreak a GenAI model,\u0000attackers can escalate the outcome of attacks against RAG-based GenAI-powered\u0000applications in severity and scale. In the first part of the paper, we show\u0000that attackers can escalate RAG membership inference attacks and RAG entity\u0000extraction attacks to RAG documents extraction attacks, forcing a more severe\u0000outcome compared to existing attacks. We evaluate the results obtained from\u0000three extraction methods, the influence of the type and the size of five\u0000embeddings algorithms employed, the size of the provided context, and the GenAI\u0000engine. We show that attackers can extract 80%-99.8% of the data stored in the\u0000database used by the RAG of a Q&A chatbot. In the second part of the paper, we\u0000show that attackers can escalate the scale of RAG data poisoning attacks from\u0000compromising a single GenAI-powered application to compromising the entire\u0000GenAI ecosystem, forcing a greater scale of damage. This is done by crafting an\u0000adversarial self-replicating prompt that triggers a chain reaction of a\u0000computer worm within the ecosystem and forces each affected application to\u0000perform a malicious activity and compromise the RAG of additional applications.\u0000We evaluate the performance of the worm in creating a chain of confidential\u0000data extraction about users within a GenAI ecosystem of GenAI-powered email\u0000assistants and analyze how the performance of the worm is affected by the size\u0000of the context, the adversarial self-replicating prompt used, the type and size\u0000of the embeddings algorithm employed, and the number of hops in the\u0000propagation. Finally, we review and analyze guardrails to protect RAG-based\u0000inference and discuss the tradeoffs.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Large Language Models: Addressing Bias, Misinformation, and Prompt Attacks 确保大型语言模型的安全:应对偏见、错误信息和提示性攻击
Pub Date : 2024-09-12 DOI: arxiv-2409.08087
Benji Peng, Keyu Chen, Ming Li, Pohsun Feng, Ziqian Bi, Junyu Liu, Qian Niu
Large Language Models (LLMs) demonstrate impressive capabilities acrossvarious fields, yet their increasing use raises critical security concerns.This article reviews recent literature addressing key issues in LLM security,with a focus on accuracy, bias, content detection, and vulnerability toattacks. Issues related to inaccurate or misleading outputs from LLMs isdiscussed, with emphasis on the implementation from fact-checking methodologiesto enhance response reliability. Inherent biases within LLMs are criticallyexamined through diverse evaluation techniques, including controlled inputstudies and red teaming exercises. A comprehensive analysis of bias mitigationstrategies is presented, including approaches from pre-processing interventionsto in-training adjustments and post-processing refinements. The article alsoprobes the complexity of distinguishing LLM-generated content fromhuman-produced text, introducing detection mechanisms like DetectGPT andwatermarking techniques while noting the limitations of machine learningenabled classifiers under intricate circumstances. Moreover, LLMvulnerabilities, including jailbreak attacks and prompt injection exploits, areanalyzed by looking into different case studies and large-scale competitionslike HackAPrompt. This review is concluded by retrospecting defense mechanismsto safeguard LLMs, accentuating the need for more extensive research into theLLM security field.
大型语言模型(LLMs)在各个领域都展现出了令人印象深刻的能力,然而它们越来越多的使用却引发了严重的安全问题。本文回顾了近期有关 LLM 安全关键问题的文献,重点关注准确性、偏差、内容检测和易受攻击性。本文讨论了与 LLM 不准确或误导性输出有关的问题,重点是如何采用事实检查方法来提高响应的可靠性。通过不同的评估技术,包括受控输入研究和红队演习,对 LLM 中固有的偏见进行了批判性审查。文章全面分析了偏差缓解策略,包括从预处理干预到训练中调整和后处理完善等方法。文章还探讨了区分 LLM 生成的内容与人工生成的文本的复杂性,介绍了 DetectGPT 和水印技术等检测机制,同时指出了机器学习分类器在复杂情况下的局限性。此外,通过研究不同的案例研究和 HackAPrompt 等大型竞赛,分析了包括越狱攻击和提示注入漏洞在内的 LLM 漏洞。本综述最后回顾了保护 LLM 的防御机制,强调了在 LLM 安全领域开展更广泛研究的必要性。
{"title":"Securing Large Language Models: Addressing Bias, Misinformation, and Prompt Attacks","authors":"Benji Peng, Keyu Chen, Ming Li, Pohsun Feng, Ziqian Bi, Junyu Liu, Qian Niu","doi":"arxiv-2409.08087","DOIUrl":"https://doi.org/arxiv-2409.08087","url":null,"abstract":"Large Language Models (LLMs) demonstrate impressive capabilities across\u0000various fields, yet their increasing use raises critical security concerns.\u0000This article reviews recent literature addressing key issues in LLM security,\u0000with a focus on accuracy, bias, content detection, and vulnerability to\u0000attacks. Issues related to inaccurate or misleading outputs from LLMs is\u0000discussed, with emphasis on the implementation from fact-checking methodologies\u0000to enhance response reliability. Inherent biases within LLMs are critically\u0000examined through diverse evaluation techniques, including controlled input\u0000studies and red teaming exercises. A comprehensive analysis of bias mitigation\u0000strategies is presented, including approaches from pre-processing interventions\u0000to in-training adjustments and post-processing refinements. The article also\u0000probes the complexity of distinguishing LLM-generated content from\u0000human-produced text, introducing detection mechanisms like DetectGPT and\u0000watermarking techniques while noting the limitations of machine learning\u0000enabled classifiers under intricate circumstances. Moreover, LLM\u0000vulnerabilities, including jailbreak attacks and prompt injection exploits, are\u0000analyzed by looking into different case studies and large-scale competitions\u0000like HackAPrompt. This review is concluded by retrospecting defense mechanisms\u0000to safeguard LLMs, accentuating the need for more extensive research into the\u0000LLM security field.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking LOCKEY:模型认证和深度伪造追踪的新方法
Pub Date : 2024-09-12 DOI: arxiv-2409.07743
Mayank Kumar Singh, Naoya Takahashi, Wei-Hsiang Liao, Yuki Mitsufuji
This paper presents a novel approach to deter unauthorized deepfakes andenable user tracking in generative models, even when the user has full accessto the model parameters, by integrating key-based model authentication withwatermarking techniques. Our method involves providing users with modelparameters accompanied by a unique, user-specific key. During inference, themodel is conditioned upon the key along with the standard input. A valid keyresults in the expected output, while an invalid key triggers a degradedoutput, thereby enforcing key-based model authentication. For user tracking,the model embeds the user's unique key as a watermark within the generatedcontent, facilitating the identification of the user's ID. We demonstrate theeffectiveness of our approach on two types of models, audio codecs andvocoders, utilizing the SilentCipher watermarking method. Additionally, weassess the robustness of the embedded watermarks against various distortions,validating their reliability in various scenarios.
本文提出了一种新方法,通过将基于密钥的模型验证与水印技术相结合,在生成模型中阻止未经授权的深度伪造并实现用户跟踪,即使用户可以完全访问模型参数。我们的方法是向用户提供模型参数,并附带用户专用的唯一密钥。在推理过程中,模型以密钥和标准输入为条件。有效的密钥会产生预期的输出,而无效的密钥则会触发降级输出,从而实现基于密钥的模型验证。在用户跟踪方面,该模型将用户的唯一密钥作为水印嵌入生成的内容中,便于识别用户的 ID。我们利用 SilentCipher 水印方法,在音频编解码器和视频编码器这两类模型上演示了我们的方法的有效性。此外,我们还评估了嵌入式水印对各种失真的鲁棒性,验证了它们在各种场景下的可靠性。
{"title":"LOCKEY: A Novel Approach to Model Authentication and Deepfake Tracking","authors":"Mayank Kumar Singh, Naoya Takahashi, Wei-Hsiang Liao, Yuki Mitsufuji","doi":"arxiv-2409.07743","DOIUrl":"https://doi.org/arxiv-2409.07743","url":null,"abstract":"This paper presents a novel approach to deter unauthorized deepfakes and\u0000enable user tracking in generative models, even when the user has full access\u0000to the model parameters, by integrating key-based model authentication with\u0000watermarking techniques. Our method involves providing users with model\u0000parameters accompanied by a unique, user-specific key. During inference, the\u0000model is conditioned upon the key along with the standard input. A valid key\u0000results in the expected output, while an invalid key triggers a degraded\u0000output, thereby enforcing key-based model authentication. For user tracking,\u0000the model embeds the user's unique key as a watermark within the generated\u0000content, facilitating the identification of the user's ID. We demonstrate the\u0000effectiveness of our approach on two types of models, audio codecs and\u0000vocoders, utilizing the SilentCipher watermarking method. Additionally, we\u0000assess the robustness of the embedded watermarks against various distortions,\u0000validating their reliability in various scenarios.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Standard for NFT Fractionalization NFT 小数化安全标准
Pub Date : 2024-09-12 DOI: arxiv-2409.08190
Wejdene Haouari, Marios Fokaefs
Non-fungible tokens (NFTs) offer a unique method for representing digital andphysical assets on the blockchain. However, the NFT market has recentlyexperienced a downturn in interest, mainly due to challenges related to highentry barriers and limited market liquidity. Fractionalization emerges as apromising solution, allowing multiple parties to hold a stake in a single NFT.By breaking down ownership into fractional shares, this approach lowers theentry barrier for investors, enhances market liquidity, and democratizes accessto valuable digital assets. Despite these benefits, the current landscape ofNFT fractionalization is fragmented, with no standardized framework to guidethe secure and interoperable implementation of fractionalization mechanisms.This paper contributions are twofold: first, we provide a detailed analysis ofthe current NFT fractionalization landscape focusing on security challenges;second, we introduce a standardized approach that addresses these challenges,paving the way for more secure, interoperable, and accessible NFTfractionalization platforms.
不可兑换代币(NFT)提供了一种在区块链上代表数字和实物资产的独特方法。然而,NFT 市场最近经历了兴趣低迷期,主要原因是与高门槛和有限的市场流动性有关的挑战。通过将所有权分解为零碎份额,这种方法降低了投资者的进入门槛,提高了市场流动性,并使获取有价值数字资产的途径民主化。尽管有这些好处,但目前的 NFT 小数化仍很分散,没有一个标准化的框架来指导安全、可互操作地实施 小数化机制。本文有两方面的贡献:首先,我们对目前的 NFT 小数化情况进行了详细分析,重点关注安全挑战;其次,我们介绍了一种标准化的方法来应对这些挑战,为更安全、可互操作和可访问的 NFT 小数化平台铺平道路。
{"title":"A Secure Standard for NFT Fractionalization","authors":"Wejdene Haouari, Marios Fokaefs","doi":"arxiv-2409.08190","DOIUrl":"https://doi.org/arxiv-2409.08190","url":null,"abstract":"Non-fungible tokens (NFTs) offer a unique method for representing digital and\u0000physical assets on the blockchain. However, the NFT market has recently\u0000experienced a downturn in interest, mainly due to challenges related to high\u0000entry barriers and limited market liquidity. Fractionalization emerges as a\u0000promising solution, allowing multiple parties to hold a stake in a single NFT.\u0000By breaking down ownership into fractional shares, this approach lowers the\u0000entry barrier for investors, enhances market liquidity, and democratizes access\u0000to valuable digital assets. Despite these benefits, the current landscape of\u0000NFT fractionalization is fragmented, with no standardized framework to guide\u0000the secure and interoperable implementation of fractionalization mechanisms.\u0000This paper contributions are twofold: first, we provide a detailed analysis of\u0000the current NFT fractionalization landscape focusing on security challenges;\u0000second, we introduce a standardized approach that addresses these challenges,\u0000paving the way for more secure, interoperable, and accessible NFT\u0000fractionalization platforms.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Cryptography and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1