首页 > 最新文献

Computers & Security最新文献

英文 中文
Hardware information flow tracking based on lightweight path awareness 基于轻量级路径感知的硬件信息流跟踪
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104072

Vulnerabilities and Trojans in hardware design may cause sensitive data to be leaked and tampered. Information flow tracking technology can effectively verify the confidentiality and integrity of hardware design. Currently, this technology mainly analyzes the reachability of information flow and lacks fine-grained analysis of information flow paths. It is difficult to find structural defects in information flow paths and malicious sensitive information processes in hardware design. To solve above problem, we propose Path-aware Dynamic Information Flow Tracking (PDIFT) technology, which performs taint tracking and path tracking while sensitive information is propagated. It analyzes the propagation of sensitive information in hardware design with fine-grained taint label propagation logic and inserts path label propagation logic only on basic blocks divided by branch nodes, which greatly simplifies the path tracing overhead compared to the full node sequence tracing on the path. Experiments have shown that compared to CellIFT, PDIFT has a 12.1% increase in static analysis time and a 0.1% increase in dynamic validation time. The average instrumentation area cost of each basic block has increased by 16.4 um2. In terms of detection capability, PDIFT makes up for the limitation of false negatives in traditional taint tracking technology through joint analysis of path labels and taint labels, then detect problems such as insufficient iterations of encryption components and malicious processing of important assets, thereby improving the accuracy of hardware security verification.

硬件设计中的漏洞和木马可能导致敏感数据被泄露和篡改。信息流跟踪技术可以有效验证硬件设计的保密性和完整性。目前,该技术主要分析信息流的可达性,缺乏对信息流路径的细粒度分析。很难发现硬件设计中信息流路径的结构缺陷和恶意敏感信息流程。为解决上述问题,我们提出了路径感知动态信息流跟踪(PDIFT)技术,在敏感信息传播的同时进行污点跟踪和路径跟踪。它通过细粒度的污点标签传播逻辑分析硬件设计中敏感信息的传播,仅在分支节点划分的基本块上插入路径标签传播逻辑,与路径上的全节点序列跟踪相比,大大简化了路径跟踪开销。实验表明,与 CellIFT 相比,PDIFT 的静态分析时间增加了 12.1%,动态验证时间增加了 0.1%。每个基本区块的平均仪器面积成本增加了 16.4 um2。在检测能力方面,PDIFT 通过对路径标签和污点标签的联合分析,弥补了传统污点跟踪技术假阴性的局限性,进而检测出加密组件迭代不足、重要资产被恶意处理等问题,从而提高了硬件安全验证的准确性。
{"title":"Hardware information flow tracking based on lightweight path awareness","authors":"","doi":"10.1016/j.cose.2024.104072","DOIUrl":"10.1016/j.cose.2024.104072","url":null,"abstract":"<div><p>Vulnerabilities and Trojans in hardware design may cause sensitive data to be leaked and tampered. Information flow tracking technology can effectively verify the confidentiality and integrity of hardware design. Currently, this technology mainly analyzes the reachability of information flow and lacks fine-grained analysis of information flow paths. It is difficult to find structural defects in information flow paths and malicious sensitive information processes in hardware design. To solve above problem, we propose Path-aware Dynamic Information Flow Tracking (PDIFT) technology, which performs taint tracking and path tracking while sensitive information is propagated. It analyzes the propagation of sensitive information in hardware design with fine-grained taint label propagation logic and inserts path label propagation logic only on basic blocks divided by branch nodes, which greatly simplifies the path tracing overhead compared to the full node sequence tracing on the path. Experiments have shown that compared to CellIFT, PDIFT has a 12.1% increase in static analysis time and a 0.1% increase in dynamic validation time. The average instrumentation area cost of each basic block has increased by 16.4 <span><math><msup><mrow><mi>um</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>. In terms of detection capability, PDIFT makes up for the limitation of false negatives in traditional taint tracking technology through joint analysis of path labels and taint labels, then detect problems such as insufficient iterations of encryption components and malicious processing of important assets, thereby improving the accuracy of hardware security verification.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003778/pdfft?md5=b98f852225af08d31a041ec15070650b&pid=1-s2.0-S0167404824003778-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cosine similarity-based labeling technique for vulnerability type detection using source codes 利用源代码检测漏洞类型的余弦相似性标记技术
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-21 DOI: 10.1016/j.cose.2024.104059

Vulnerability detection is of great importance in providing reliability to software systems. Although existing methods achieve remarkable success in vulnerability detection, they have several disadvantages as follows: (1) The irrelevant information is removed from source codes, which have a high noise ratio, thereby utilizing deep learning methods and devising experiments featuring high accuracy. However, deep learning-based detection methods necessitate large-scale datasets. This results in computational hardship with respect to vulnerability detection in small-scale software systems. (2) The majority of the studies perform feature selection by processing vulnerability commits. Despite tremendous endeavors, there are few works detecting vulnerability with source codes. To solve these two problems, in this study, a novel labeling and vulnerability detection algorithm is proposed. The algorithm first exploits source codes with the help of a keyword vulnerability matrix. After that, an ultimate encoded matrix is generated by word2vec, thereby combining the labeling vector with the source code matrix to reveal a trainable dataset for a generalized linear model (GLM). Different from preceding studies, our method performs vulnerability detection without requiring vulnerability commits but using source codes. In addition to this, similar studies generally aim to bring sophisticated solutions for just one type of programming language. Conversely, our study develops vulnerability keywords for three programming languages including C#, Java, and C++, and creates the related labeling vectors by regarding the keyword matrix. The proposed method outperformed the baseline approaches for most of the experimental datasets with over 90% of the area under the curve (AUC). Further, there is a 7.7% margin between our method and the alternatives on average for Recall, Precision, and F1-score with respect to five types of vulnerabilities.

漏洞检测对提高软件系统的可靠性具有重要意义。虽然现有方法在漏洞检测方面取得了显著成效,但也存在以下几个缺点:(1) 从具有高噪声比的源代码中剔除无关信息,从而利用深度学习方法并设计出具有高准确性的实验。然而,基于深度学习的检测方法需要大规模的数据集。这给小型软件系统的漏洞检测带来了计算上的困难。(2)大多数研究通过处理漏洞提交来进行特征选择。尽管做了大量的工作,但利用源代码检测漏洞的工作还很少。为了解决这两个问题,本研究提出了一种新型标签和漏洞检测算法。该算法首先借助关键字漏洞矩阵检测源代码。然后,通过 word2vec 生成最终编码矩阵,从而将标签向量与源代码矩阵结合起来,为广义线性模型(GLM)提供可训练的数据集。与之前的研究不同,我们的方法不需要漏洞提交,而是使用源代码来进行漏洞检测。除此之外,类似的研究通常只针对一种编程语言提出复杂的解决方案。相反,我们的研究为 C#、Java 和 C++ 等三种编程语言开发了漏洞关键字,并通过关键字矩阵创建了相关的标记向量。在大多数实验数据集上,所提出的方法都优于基线方法,曲线下面积(AUC)超过 90%。此外,就五类漏洞而言,我们的方法与其他方法在召回率、精确率和 F1 分数上平均相差 7.7%。
{"title":"A cosine similarity-based labeling technique for vulnerability type detection using source codes","authors":"","doi":"10.1016/j.cose.2024.104059","DOIUrl":"10.1016/j.cose.2024.104059","url":null,"abstract":"<div><p>Vulnerability detection is of great importance in providing reliability to software systems. Although existing methods achieve remarkable success in vulnerability detection, they have several disadvantages as follows: (1) The irrelevant information is removed from source codes, which have a high noise ratio, thereby utilizing deep learning methods and devising experiments featuring high accuracy. However, deep learning-based detection methods necessitate large-scale datasets. This results in computational hardship with respect to vulnerability detection in small-scale software systems. (2) The majority of the studies perform feature selection by processing vulnerability commits. Despite tremendous endeavors, there are few works detecting vulnerability with source codes. To solve these two problems, in this study, a novel labeling and vulnerability detection algorithm is proposed. The algorithm first exploits source codes with the help of a keyword vulnerability matrix. After that, an ultimate encoded matrix is generated by word2vec, thereby combining the labeling vector with the source code matrix to reveal a trainable dataset for a generalized linear model (GLM). Different from preceding studies, our method performs vulnerability detection without requiring vulnerability commits but using source codes. In addition to this, similar studies generally aim to bring sophisticated solutions for just one type of programming language. Conversely, our study develops vulnerability keywords for three programming languages including C#, Java, and C++, and creates the related labeling vectors by regarding the keyword matrix. The proposed method outperformed the baseline approaches for most of the experimental datasets with over 90% of the area under the curve (AUC). Further, there is a 7.7% margin between our method and the alternatives on average for Recall, Precision, and F1-score with respect to five types of vulnerabilities.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What do we need to know about the Chief Information Security Officer? A literature review and research agenda 关于首席信息安全官,我们需要了解什么?文献综述和研究议程
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-21 DOI: 10.1016/j.cose.2024.104063

Since its establishment in the 1990s, the role of chief information security officer (CISO) has become critical to organizations in managing cybersecurity risks. However, despite widespread recognition of the importance of this role in industry, research about CISOs and the problems they face in protecting organizations is nascent. We review the academic and practitioner literature on CISOs to identify existing themes and highlight a range of challenges related to CISOs in which further research is needed, such as establishing legitimacy within C-suite executive teams, appropriate accountability for cybersecurity incidents, CISO turnover, and promoting security in the face of human factors, business realities, and budget constraints. We also propose a research agenda to address these challenges using potential theoretical lenses. In these ways, this study lays the groundwork for future research on CISOs and their essential role in ensuring the cybersecurity of organizations.

自 20 世纪 90 年代设立以来,首席信息安全官(CISO)的角色已成为企业管理网络安全风险的关键。然而,尽管业界普遍认识到这一角色的重要性,但有关首席信息安全官及其在保护组织时所面临问题的研究却刚刚起步。我们回顾了有关 CISO 的学术和实践文献,确定了现有的主题,并强调了与 CISO 有关的一系列挑战,这些挑战需要进一步研究,例如在 C-suite 高管团队中建立合法性、对网络安全事件的适当问责、CISO 更替,以及在面临人为因素、业务现实和预算限制的情况下促进安全。我们还提出了一个研究议程,利用潜在的理论视角来应对这些挑战。通过这些方式,本研究为今后研究 CISO 及其在确保组织网络安全方面的重要作用奠定了基础。
{"title":"What do we need to know about the Chief Information Security Officer? A literature review and research agenda","authors":"","doi":"10.1016/j.cose.2024.104063","DOIUrl":"10.1016/j.cose.2024.104063","url":null,"abstract":"<div><p>Since its establishment in the 1990s, the role of chief information security officer (CISO) has become critical to organizations in managing cybersecurity risks. However, despite widespread recognition of the importance of this role in industry, research about CISOs and the problems they face in protecting organizations is nascent. We review the academic and practitioner literature on CISOs to identify existing themes and highlight a range of challenges related to CISOs in which further research is needed, such as establishing legitimacy within C-suite executive teams, appropriate accountability for cybersecurity incidents, CISO turnover, and promoting security in the face of human factors, business realities, and budget constraints. We also propose a research agenda to address these challenges using potential theoretical lenses. In these ways, this study lays the groundwork for future research on CISOs and their essential role in ensuring the cybersecurity of organizations.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MDADroid: A novel malware detection method by constructing functionality-API mapping MDADroid:通过构建功能-API 映射的新型恶意软件检测方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.cose.2024.104061

As the Android ecosystem develops, malware also evolves to adapt to the changes. Consequently, malware remains a significant threat, posing a challenge in developing a low-resource consumption malware detection method that can adjust to updates in the Android API versions. We propose a novel method called MDADroid, which detects malware based on self-built Functionality-API mapping. We start by building a set of permission-related APIs using open-source knowledge. Then, we construct a Functionality-App-API heterogeneous graph based on collected data and establish a Functionality-API mapping from it. Finally, MDADroid transforms app features from the API level to the functionality level for malware detection, ensuring model resilience to API changes. We also design an API similarity calculation method that updates the Functionality-API mapping at a low cost. We evaluate MDADroid on multiple datasets, and the results show that MDADroid achieves an accuracy of 95.22%, 96.23%, 98.77%, and 99.56% on the AndroZoo, CICAndMal 2017, CICMalDroid 2020, and Drebin datasets, respectively, with training and testing times of 2 s, 0.6188 s, 1.34 s, and 1.02 s. Moreover, our method demonstrates excellent performance in the tests for resilience capabilities.

随着安卓生态系统的发展,恶意软件也在不断进化以适应变化。因此,恶意软件仍然是一个重大威胁,这给开发一种能适应安卓应用程序接口版本更新的低资源消耗恶意软件检测方法带来了挑战。我们提出了一种名为 MDADroid 的新方法,该方法基于自建的功能-API 映射来检测恶意软件。我们首先利用开源知识构建一组与权限相关的 API。然后,我们根据收集到的数据构建功能-应用程序-API 异构图,并从中建立功能-API 映射。最后,MDADroid 将应用程序特征从 API 层转换到功能层,用于恶意软件检测,确保模型对 API 变化的适应性。我们还设计了一种 API 相似性计算方法,可以低成本更新功能性-API 映射。我们在多个数据集上对 MDADroid 进行了评估,结果表明,MDADroid 在 AndroZoo、CICAndMal 2017、CICMalDroid 2020 和 Drebin 数据集上的准确率分别达到了 95.22%、96.23%、98.77% 和 99.56%,训练和测试时间分别为 2 秒、0.6188 秒、1.34 秒和 1.02 秒。
{"title":"MDADroid: A novel malware detection method by constructing functionality-API mapping","authors":"","doi":"10.1016/j.cose.2024.104061","DOIUrl":"10.1016/j.cose.2024.104061","url":null,"abstract":"<div><p>As the Android ecosystem develops, malware also evolves to adapt to the changes. Consequently, malware remains a significant threat, posing a challenge in developing a low-resource consumption malware detection method that can adjust to updates in the Android API versions. We propose a novel method called MDADroid, which detects malware based on self-built Functionality-API mapping. We start by building a set of permission-related APIs using open-source knowledge. Then, we construct a Functionality-App-API heterogeneous graph based on collected data and establish a Functionality-API mapping from it. Finally, MDADroid transforms app features from the API level to the functionality level for malware detection, ensuring model resilience to API changes. We also design an API similarity calculation method that updates the Functionality-API mapping at a low cost. We evaluate MDADroid on multiple datasets, and the results show that MDADroid achieves an accuracy of 95.22%, 96.23%, 98.77%, and 99.56% on the AndroZoo, CICAndMal 2017, CICMalDroid 2020, and Drebin datasets, respectively, with training and testing times of 2 s, 0.6188 s, 1.34 s, and 1.02 s. Moreover, our method demonstrates excellent performance in the tests for resilience capabilities.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks 增强人员检测的鲁棒性:对抗性补丁攻击的通用防御过滤器
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1016/j.cose.2024.104066

Person detection is one of the most popular object detection applications, and has been widely used in safety-critical systems such as autonomous driving. However, recent studies have revealed that person detectors are vulnerable to physically adversarial patch attacks and may suffer detection failure. Data-side defense is an effective approach to address this issue, owing to its low computational cost and ease of deployment. However, existing data-side defenses have limited effectiveness in resisting adaptive patch attacks. To overcome this challenge, we propose a new data-side defense, called Universal Defense Filter (UDFilter). UDFilter covers the input images with an equal-size defense filter to weaken the negative impact of adversarial patches. The defense filter is generated using a self-adaptive learning algorithm that facilitates iterative competition between adversarial patch and defense filter, thus bolstering UDFilter’s ability to defense adaptive attacks. Furthermore, to maintain the clean performance, we propose a plug-and-play Joint Detection Strategy (JDS) during the model testing phase. Extensive experiments have shown that UDFilter can significantly enhance robustness of person detection against adversarial patch attacks. Moreover, UDFilter does not result in a discernible reduction in the model’s clean performance.

人员检测是最流行的物体检测应用之一,已被广泛应用于自动驾驶等安全关键型系统中。然而,最近的研究发现,人员检测器很容易受到物理对抗补丁攻击,并可能导致检测失败。数据侧防御因其计算成本低、易于部署而成为解决这一问题的有效方法。然而,现有的数据侧防御在抵御自适应补丁攻击方面效果有限。为了克服这一挑战,我们提出了一种新的数据侧防御方法,称为通用防御过滤器(UDFilter)。UDFilter 使用等大小的防御滤波器覆盖输入图像,以削弱对抗性补丁的负面影响。防御滤波器是通过自适应学习算法生成的,这种算法促进了对抗补丁和防御滤波器之间的迭代竞争,从而增强了 UDFilter 防御自适应攻击的能力。此外,为了保持良好的性能,我们在模型测试阶段提出了即插即用联合检测策略(JDS)。广泛的实验表明,UDFilter 能够显著增强人员检测对对抗性补丁攻击的鲁棒性。此外,UDFilter 不会明显降低模型的清洁性能。
{"title":"Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks","authors":"","doi":"10.1016/j.cose.2024.104066","DOIUrl":"10.1016/j.cose.2024.104066","url":null,"abstract":"<div><p>Person detection is one of the most popular object detection applications, and has been widely used in safety-critical systems such as autonomous driving. However, recent studies have revealed that person detectors are vulnerable to physically adversarial patch attacks and may suffer detection failure. Data-side defense is an effective approach to address this issue, owing to its low computational cost and ease of deployment. However, existing data-side defenses have limited effectiveness in resisting adaptive patch attacks. To overcome this challenge, we propose a new data-side defense, called Universal Defense Filter (UDFilter). UDFilter covers the input images with an equal-size defense filter to weaken the negative impact of adversarial patches. The defense filter is generated using a self-adaptive learning algorithm that facilitates iterative competition between adversarial patch and defense filter, thus bolstering UDFilter’s ability to defense adaptive attacks. Furthermore, to maintain the clean performance, we propose a plug-and-play Joint Detection Strategy (JDS) during the model testing phase. Extensive experiments have shown that UDFilter can significantly enhance robustness of person detection against adversarial patch attacks. Moreover, UDFilter does not result in a discernible reduction in the model’s clean performance.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142044864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cue-based two factor authentication 基于提示的双因素身份验证
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1016/j.cose.2024.104068

With the increasing usage of cameras, the threat from video attacks has greatly increased in recent years in addition to shoulder surfing. Many organizations have implemented two-factor authentication to enhance security. However, attackers can still steal users' usernames and passwords from two-factor authentication through video attack or shoulder surfing and applied the credential stuffing attack, as most people use the same passwords on different applications. Cue-based authentication provides high protection against shoulder surfing attacks, but it remains vulnerable to video attacks. To mitigate the threats of video attacks, we propose cue-based two-factor authentication (i.e., Cue-2FA), which is distinct from other methods by separating cue display from response input (refer to Chapter 1). We conducted two user studies to compare the usability and security between Cue-2FA and a standard Time-based-One-Time-Password two-factor authentication (i.e., TOTP-2FA). The evaluate results revealed Cue-2FA provides both higher usability and stronger resistance to the shoulder surfing attack. However, when both the cue and response are recorded, Cue-2FA is not more resistant to the video attack than TOTP-2FA. To address this issue, we introduced misleading operations to Cue-2FA when inputting a response, which significantly improves the resistance to the video attack.

近年来,随着摄像头使用量的不断增加,除肩上冲浪外,来自视频攻击的威胁也大大增加。许多企业已采用双因素身份验证来加强安全性。然而,由于大多数人在不同的应用程序中使用相同的密码,攻击者仍然可以通过视频攻击或肩上冲浪从双因素身份验证中窃取用户名和密码,并应用凭证填充攻击。基于插入点的身份验证可以很好地抵御 "肩上冲浪 "攻击,但仍然容易受到视频攻击。为了减轻视频攻击的威胁,我们提出了基于提示的双因素身份验证(即 Cue-2FA),它有别于其他方法,将提示显示与响应输入分离开来(参见第 1 章)。我们进行了两项用户研究,比较了 Cue-2FA 和标准的基于时间-一次性密码的双因素身份验证(即 TOTP-2FA)的可用性和安全性。评估结果表明,Cue-2FA 具有更高的可用性和更强的抗肩扛攻击能力。然而,当提示和响应都被记录下来时,Cue-2FA 对视频攻击的抵抗力并不比 TOTP-2FA 强。为了解决这个问题,我们在 Cue-2FA 中引入了输入回应时的误导操作,从而大大提高了其抵御视频攻击的能力。
{"title":"Cue-based two factor authentication","authors":"","doi":"10.1016/j.cose.2024.104068","DOIUrl":"10.1016/j.cose.2024.104068","url":null,"abstract":"<div><p>With the increasing usage of cameras, the threat from video attacks has greatly increased in recent years in addition to shoulder surfing. Many organizations have implemented two-factor authentication to enhance security. However, attackers can still steal users' usernames and passwords from two-factor authentication through video attack or shoulder surfing and applied the credential stuffing attack, as most people use the same passwords on different applications. Cue-based authentication provides high protection against shoulder surfing attacks, but it remains vulnerable to video attacks. To mitigate the threats of video attacks, we propose cue-based two-factor authentication (i.e., Cue-2FA), which is distinct from other methods by separating cue display from response input (refer to Chapter 1). We conducted two user studies to compare the usability and security between Cue-2FA and a standard Time-based-One-Time-Password two-factor authentication (i.e., TOTP-2FA). The evaluate results revealed Cue-2FA provides both higher usability and stronger resistance to the shoulder surfing attack. However, when both the cue and response are recorded, Cue-2FA is not more resistant to the video attack than TOTP-2FA. To address this issue, we introduced misleading operations to Cue-2FA when inputting a response, which significantly improves the resistance to the video attack.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy policy analysis: A scoping review and research agenda 隐私政策分析:范围审查和研究议程
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1016/j.cose.2024.104065

Online users often neglect the importance of privacy policies - a critical aspect of digital privacy and data protection. This scoping review addresses this oversight by delving into privacy policy analysis, aiming to establish a comprehensive research agenda. The study's objective was to explore the analytic techniques employed in privacy policy analysis and to identify the associated challenges. Following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses for Scoping Reviews (PRISMA-ScR) checklist, the review selected n = 97 relevant studies. The findings reveal a diverse array of techniques used, encompassing automated machine learning and natural language processing, and manual content analysis. Notably, researchers grapple with challenges like linguistic nuances, ambiguity, and complex data harvesting methods. Additionally, the lack of privacy-centric theoretical frameworks and a dearth of user evaluations in many studies limit their real-world applicability. The review concludes by proposing a set of research recommendations to shape the future research agenda in privacy policy analysis.

在线用户往往忽视隐私政策的重要性--这是数字隐私和数据保护的一个重要方面。本范围审查通过深入研究隐私政策分析来解决这一疏忽问题,旨在建立一个全面的研究议程。本研究的目标是探索隐私政策分析中使用的分析技术,并确定相关的挑战。按照《系统综述和范围综述元分析首选报告项目》(PRISMA-ScR)清单,综述选取了 n = 97 项相关研究。研究结果表明,所使用的技术多种多样,包括自动机器学习和自然语言处理以及人工内容分析。值得注意的是,研究人员正在努力应对语言上的细微差别、模糊性和复杂的数据采集方法等挑战。此外,许多研究缺乏以隐私为中心的理论框架,也缺乏用户评估,这些都限制了研究在现实世界中的适用性。综述最后提出了一系列研究建议,以塑造隐私政策分析的未来研究议程。
{"title":"Privacy policy analysis: A scoping review and research agenda","authors":"","doi":"10.1016/j.cose.2024.104065","DOIUrl":"10.1016/j.cose.2024.104065","url":null,"abstract":"<div><p>Online users often neglect the importance of privacy policies - a critical aspect of digital privacy and data protection. This scoping review addresses this oversight by delving into privacy policy analysis, aiming to establish a comprehensive research agenda. The study's objective was to explore the analytic techniques employed in privacy policy analysis and to identify the associated challenges. Following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses for Scoping Reviews (PRISMA-ScR) checklist, the review selected <em>n</em> = 97 relevant studies. The findings reveal a diverse array of techniques used, encompassing automated machine learning and natural language processing, and manual content analysis. Notably, researchers grapple with challenges like linguistic nuances, ambiguity, and complex data harvesting methods. Additionally, the lack of privacy-centric theoretical frameworks and a dearth of user evaluations in many studies limit their real-world applicability. The review concludes by proposing a set of research recommendations to shape the future research agenda in privacy policy analysis.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003705/pdfft?md5=a290078faebc4e7b637ed8bb81618455&pid=1-s2.0-S0167404824003705-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention 利用三重深度关注对文本验证码进行基于变换器的端到端攻击
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-17 DOI: 10.1016/j.cose.2024.104058

Websites frequently use text-based captcha images to distinguish whether the user is a person or not. Previous research mainly focuses on different training strategies and neglects the characteristics of the text-based captcha images themselves, resulting in low accuracy. For text-based captcha images characterized by rotation, distortion, and non-character elements, we propose an end-to-end attack using a Transformer-based method with triplet deep attention. Firstly, the features of text-based captchas are extracted using ResNet45 with triplet deep attention module and Transformer encoder. The TDA module is capable of learning rotational and distortion features of characters. Subsequently, based on self-attention mechanism, design query, key, and value, and adopt the query enhancement module to enhance the query. The query enhancement module can strengthen character localization and reduce attention drift towards non-character elements. Finally, the feature maps are transformed into probabilities of character for the final text recognition. Experiments are conducted on captcha datasets based on Roman characters from 9 popular websites, achieving average word accuracy of 91.14%. To evaluate the performance of our method on data with small samples, experiments are conducted different scales of training data. Additionally, we use the method on Chinese text-based captcha tasks and achieve average word accuracy of 99.60%. The effectiveness of the method is also explored under conditions of lack of illumination and scene text recognition, where background interference is present.

网站经常使用基于文本的验证码图像来区分用户是否是人。以往的研究主要集中在不同的训练策略上,忽略了基于文本的验证码图像本身的特点,导致准确率较低。针对基于文本的验证码图像存在旋转、失真和非字符元素等特点,我们提出了一种基于变换器的端到端攻击方法,并结合三重深度关注。首先,使用带有三重深度注意模块和变换器编码器的 ResNet45 提取基于文本的验证码特征。TDA 模块能够学习字符的旋转和变形特征。然后,基于自注意机制,设计查询、键和值,并采用查询增强模块来增强查询。查询增强模块可以加强字符定位,减少对非字符元素的注意力偏移。最后,将特征图转化为字符概率,进行最终的文本识别。我们在来自 9 个流行网站的基于罗马字符的验证码数据集上进行了实验,平均单词准确率达到 91.14%。为了评估我们的方法在小样本数据上的性能,我们进行了不同规模的训练数据实验。此外,我们还在基于中文文本的验证码任务中使用了该方法,并取得了 99.60% 的平均单词准确率。我们还探讨了该方法在光照不足和存在背景干扰的场景文本识别条件下的有效性。
{"title":"Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention","authors":"","doi":"10.1016/j.cose.2024.104058","DOIUrl":"10.1016/j.cose.2024.104058","url":null,"abstract":"<div><p>Websites frequently use text-based captcha images to distinguish whether the user is a person or not. Previous research mainly focuses on different training strategies and neglects the characteristics of the text-based captcha images themselves, resulting in low accuracy. For text-based captcha images characterized by rotation, distortion, and non-character elements, we propose an end-to-end attack using a Transformer-based method with triplet deep attention. Firstly, the features of text-based captchas are extracted using ResNet45 with triplet deep attention module and Transformer encoder. The TDA module is capable of learning rotational and distortion features of characters. Subsequently, based on self-attention mechanism, design query, key, and value, and adopt the query enhancement module to enhance the query. The query enhancement module can strengthen character localization and reduce attention drift towards non-character elements. Finally, the feature maps are transformed into probabilities of character for the final text recognition. Experiments are conducted on captcha datasets based on Roman characters from 9 popular websites, achieving average word accuracy of 91.14%. To evaluate the performance of our method on data with small samples, experiments are conducted different scales of training data. Additionally, we use the method on Chinese text-based captcha tasks and achieve average word accuracy of 99.60%. The effectiveness of the method is also explored under conditions of lack of illumination and scene text recognition, where background interference is present.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142020819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions 网络安全行为改变:行为干预道德原则的概念化
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.cose.2024.104025

The importance of changing behaviors is gradually being acknowledged in cybersecurity, and the reason is the realization that a notable portion of security incidents have a human-related component. Thus, enhancing behaviors at individual level, can bring a significant reduction in security breaches overall. Behavior change refers to any modification of human behavior through some type of intervention. Interventions from behavioral economics and psychology are being increasingly introduced in the field, however, the ethics surrounding such interventions are largely neglected. In this paper, we raise the ethical issues associated with behavioral intervention approaches. We draw on the traditionally more mature field of biomedical ethics and propose six clusters of ethical principles suitable for cybersecurity behavior change. We conducted a survey (N = 141) to identify individuals’ perceptions on the proposed ethical principles and validate their perceived usefulness. We analyze an existing intervention in the light of our six-principle conceptualization to showcase how it can be used as a practical apparatus. Our set of ethical principles are aimed for cybersecurity professionals, policy makers, and behavioral intervention designers, and can serve as a starting point for best-practice development in cybersecurity behavior change ethics.

在网络安全领域,人们逐渐认识到改变行为方式的重要性,原因是人们意识到,相当一部分安全事件都与人为因素有关。因此,加强个人层面的行为可以显著减少整体安全漏洞。行为改变是指通过某种类型的干预来改变人类行为。行为经济学和心理学的干预措施正越来越多地被引入这一领域,然而,围绕这些干预措施的伦理问题却在很大程度上被忽视了。在本文中,我们提出了与行为干预方法相关的伦理问题。我们借鉴了传统上更为成熟的生物医学伦理学领域,并提出了适合网络安全行为改变的六组伦理原则。我们进行了一项调查(N = 141),以确定个人对所提出的伦理原则的看法,并验证其有用性。我们根据六项原则的概念对现有干预措施进行了分析,以展示如何将其用作实用工具。我们的这套伦理原则面向网络安全专业人士、政策制定者和行为干预设计者,可作为网络安全行为改变伦理最佳实践发展的起点。
{"title":"Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions","authors":"","doi":"10.1016/j.cose.2024.104025","DOIUrl":"10.1016/j.cose.2024.104025","url":null,"abstract":"<div><p>The importance of changing behaviors is gradually being acknowledged in cybersecurity, and the reason is the realization that a notable portion of security incidents have a human-related component. Thus, enhancing behaviors at individual level, can bring a significant reduction in security breaches overall. Behavior change refers to any modification of human behavior through some type of intervention. Interventions from behavioral economics and psychology are being increasingly introduced in the field, however, the ethics surrounding such interventions are largely neglected. In this paper, we raise the ethical issues associated with behavioral intervention approaches. We draw on the traditionally more mature field of biomedical ethics and propose six clusters of ethical principles suitable for cybersecurity behavior change. We conducted a survey (<em>N</em> = 141) to identify individuals’ perceptions on the proposed ethical principles and validate their perceived usefulness. We analyze an existing intervention in the light of our six-principle conceptualization to showcase how it can be used as a practical apparatus. Our set of ethical principles are aimed for cybersecurity professionals, policy makers, and behavioral intervention designers, and can serve as a starting point for best-practice development in cybersecurity behavior change ethics.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003304/pdfft?md5=c69e69a350e44cf2f865a47e52e9afdc&pid=1-s2.0-S0167404824003304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and validation of coreLang: A threat modeling language for the ICT domain 开发和验证 coreLang:信息和通信技术领域的威胁建模语言
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.cose.2024.104057

ICT infrastructures are getting increasingly complex, and defending them against cyber attacks is cumbersome. As cyber threats continue to increase and expert resources are limited, organizations must find more efficient ways to evaluate their resilience and take proactive measures. Threat modeling is an excellent method of assessing the resilience of ICT systems, for example, by building Attack Graphs that illustrate an adversary’s attack vectors. Previously, the Meta Attack Language (MAL) was proposed, which serves as a framework to develop Domain Specific Languages (DSLs) and generate Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes Attack Graphs to enable attack simulations and security assessments. In this work, we present the first release version of coreLang in which MITRE ATT&CK tactics and techniques are mapped onto to serve as a validation and identify strengths and weaknesses to benefit the development cycle. Our validation showed that coreLang does cover 46% of all the techniques included in the matrix, while if we additionally exclude the tactics that are intrinsically not covered by coreLang and MAL, the coverage percentage increases to 64%.

信息和通信技术基础设施日益复杂,抵御网络攻击十分繁琐。由于网络威胁不断增加,而专家资源有限,组织必须找到更有效的方法来评估其恢复能力,并采取积极措施。威胁建模是评估信息和通信技术系统复原力的绝佳方法,例如,通过构建攻击图来说明对手的攻击向量。在此之前,人们提出了元攻击语言(MAL),它是开发特定领域语言(DSL)和为建模基础设施生成攻击图的框架。 coreLang 是一种基于 MAL 的威胁建模语言,它利用攻击图进行攻击模拟和安全评估。在这项工作中,我们介绍了 coreLang 的第一个发布版本,其中映射了 MITRE ATT&CK 战术和技术,以作为验证,并确定优缺点,从而有利于开发周期。我们的验证结果表明,coreLang 确实涵盖了矩阵中所有技术的 46%,而如果我们额外排除 coreLang 和 MAL 本身不涵盖的战术,则覆盖率将增加到 64%。
{"title":"Development and validation of coreLang: A threat modeling language for the ICT domain","authors":"","doi":"10.1016/j.cose.2024.104057","DOIUrl":"10.1016/j.cose.2024.104057","url":null,"abstract":"<div><p>ICT infrastructures are getting increasingly complex, and defending them against cyber attacks is cumbersome. As cyber threats continue to increase and expert resources are limited, organizations must find more efficient ways to evaluate their resilience and take proactive measures. Threat modeling is an excellent method of assessing the resilience of ICT systems, for example, by building Attack Graphs that illustrate an adversary’s attack vectors. Previously, the Meta Attack Language (MAL) was proposed, which serves as a framework to develop Domain Specific Languages (DSLs) and generate Attack Graphs for modeled infrastructures. coreLang is a MAL-based threat modeling language that utilizes Attack Graphs to enable attack simulations and security assessments. In this work, we present the first release version of coreLang in which MITRE ATT&amp;CK tactics and techniques are mapped onto to serve as a validation and identify strengths and weaknesses to benefit the development cycle. Our validation showed that coreLang does cover 46% of all the techniques included in the matrix, while if we additionally exclude the tactics that are intrinsically not covered by coreLang and MAL, the coverage percentage increases to 64%.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003626/pdfft?md5=2cb7b663e3f0fa79a50b1ed4553dd31a&pid=1-s2.0-S0167404824003626-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141997781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1