首页 > 最新文献

Computers & Security最新文献

英文 中文
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach 实际实施由 LLM 支持的协作式漏洞修复流程:基于团队的方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.cose.2024.104113
Xiaoqing Wang , Yuanjing Tian , Keman Huang , Bin Liang

Incorporating LLM into cybersecurity operations, a typical real-world high-stakes task, is critical but non-trivial in practice. Using cybersecurity as the study context, we conduct a three-step mix-method study to incorporate LLM into the vulnerability remediation process effectively. Specifically, we deconstruct the deficiencies in user satisfaction within the existing process (Study 1). This inspires us to design, implement, and empirically validate an LLM-supported collaborative vulnerability remediation process through a field study (Study 2). Given LLM’s diverse contributions, we further investigate LLM’s double-edge roles through the analysis of remediation reports and follow-up interviews (Study 3). In essence, our contribution lies in promoting an efficient LLM-supported collaborative vulnerability remediation process. These first-hand, real-world pieces of evidence suggest that when incorporating LLMs into practical processes, facilitating the collaborations among all associated stakeholders, reshaping LLMs’ roles according to task complexity, as well as approaching the short-term side effects of improved user engagement facilitated by LLMs with a rational mindset.

将 LLM 纳入网络安全操作这一典型的现实世界高风险任务至关重要,但在实践中却并非易事。我们以网络安全为研究背景,开展了一项分三步的混合方法研究,以有效地将 LLM 纳入漏洞修复流程。具体来说,我们对现有流程中用户满意度的不足之处进行了解构(研究 1)。这启发我们通过实地研究,设计、实施并实证验证一个由 LLM 支持的协作式漏洞修复流程(研究 2)。鉴于 LLM 的各种贡献,我们通过分析补救报告和后续访谈,进一步调查 LLM 的双重作用(研究 3)。从本质上讲,我们的贡献在于促进由 LLM 支持的高效协作式漏洞修复过程。这些第一手的现实证据表明,在将 LLM 纳入实际流程时,应促进所有相关利益攸关方之间的合作,根据任务的复杂性重塑 LLM 的角色,并以理性的心态对待 LLM 提高用户参与度所带来的短期副作用。
{"title":"Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach","authors":"Xiaoqing Wang ,&nbsp;Yuanjing Tian ,&nbsp;Keman Huang ,&nbsp;Bin Liang","doi":"10.1016/j.cose.2024.104113","DOIUrl":"10.1016/j.cose.2024.104113","url":null,"abstract":"<div><p>Incorporating LLM into cybersecurity operations, a typical real-world high-stakes task, is critical but non-trivial in practice. Using cybersecurity as the study context, we conduct a three-step mix-method study to incorporate LLM into the vulnerability remediation process effectively. Specifically, we deconstruct the deficiencies in user satisfaction within the existing process (Study 1). This inspires us to design, implement, and empirically validate an LLM-supported collaborative vulnerability remediation process through a field study (Study 2). Given LLM’s diverse contributions, we further investigate LLM’s double-edge roles through the analysis of remediation reports and follow-up interviews (Study 3). In essence, our contribution lies in promoting an efficient LLM-supported collaborative vulnerability remediation process. These first-hand, real-world pieces of evidence suggest that when incorporating LLMs into practical processes, facilitating the collaborations among all associated stakeholders, reshaping LLMs’ roles according to task complexity, as well as approaching the short-term side effects of improved user engagement facilitated by LLMs with a rational mindset.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104113"},"PeriodicalIF":4.8,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things 针对软件定义物联网的增强型深度学习威胁猎捕框架
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1016/j.cose.2024.104109
Prabhat Kumar , Alireza Jolfaei , A.K.M Najmul Islam

The Software-Defined Networking (SDN) powered Internet of Things (IoT) offers a global perspective of the network and facilitates control and access of IoT devices using a centralized high-level network approach called Software Defined-IoT (SD-IoT). However, this integration and high flow of data generated by IoT devices raises serious security issues in the centralized control intelligence of SD-IoT. Motivated by the aforementioned challenges, we present a new Deep-Learning empowered Threat Hunting Framework named DLTHF to protect SD-IoT data and detect (binary and multi-vector) attack vectors. First, an automated unsupervised feature extraction module is designed that combines data perturbation-driven encoding and normalization-driven scaling with the proposed Long Short-Term Memory Contractive Sparse AutoEncoder (LSTMCSAE) method to filter and transform dataset values into the protected format. Second, using the encoded data, a novel Threat Detection System (TDS) using Multi-head Self-attention-based Bidirectional Recurrent Neural Networks (MhSaBiGRNN) is designed to detect cyber threats and their types. In particular, a unique TDS strategy is developed in which each time instances is analyzed and allocated a self-learned weight based on the degree of relevance. Further, we also design a deployment architecture for DLTHF in the SD-IoT network. The framework is rigorously evaluated on two new SD-IoT data sources to show its effectiveness.

由软件定义网络(SDN)驱动的物联网(IoT)提供了网络的全局视角,并通过一种称为软件定义物联网(SD-IoT)的集中式高级网络方法促进了对物联网设备的控制和访问。然而,物联网设备产生的这种集成和大量数据流在 SD-IoT 的集中控制智能中引发了严重的安全问题。基于上述挑战,我们提出了一种名为 DLTHF 的新型深度学习威胁狩猎框架,以保护 SD-IoT 数据并检测(二进制和多载体)攻击载体。首先,设计了一个自动无监督特征提取模块,该模块将数据扰动驱动编码和归一化驱动缩放与所提出的长短期记忆收缩稀疏自动编码器(LSTMCSAE)方法相结合,将数据集值过滤并转换为受保护的格式。其次,利用编码后的数据,使用多头自注意双向循环神经网络(MhSaBiGRNN)设计了一种新型威胁检测系统(TDS),以检测网络威胁及其类型。特别是,我们开发了一种独特的 TDS 策略,对每个时间实例进行分析,并根据相关程度分配自学习权重。此外,我们还设计了在 SD-IoT 网络中部署 DLTHF 的架构。我们在两个新的 SD-IoT 数据源上对该框架进行了严格评估,以显示其有效性。
{"title":"An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things","authors":"Prabhat Kumar ,&nbsp;Alireza Jolfaei ,&nbsp;A.K.M Najmul Islam","doi":"10.1016/j.cose.2024.104109","DOIUrl":"10.1016/j.cose.2024.104109","url":null,"abstract":"<div><p>The Software-Defined Networking (SDN) powered Internet of Things (IoT) offers a global perspective of the network and facilitates control and access of IoT devices using a centralized high-level network approach called Software Defined-IoT (SD-IoT). However, this integration and high flow of data generated by IoT devices raises serious security issues in the centralized control intelligence of SD-IoT. Motivated by the aforementioned challenges, we present a new Deep-Learning empowered Threat Hunting Framework named DLTHF to protect SD-IoT data and detect (binary and multi-vector) attack vectors. First, an automated unsupervised feature extraction module is designed that combines data perturbation-driven encoding and normalization-driven scaling with the proposed Long Short-Term Memory Contractive Sparse AutoEncoder (LSTMCSAE) method to filter and transform dataset values into the protected format. Second, using the encoded data, a novel Threat Detection System (TDS) using Multi-head Self-attention-based Bidirectional Recurrent Neural Networks (MhSaBiGRNN) is designed to detect cyber threats and their types. In particular, a unique TDS strategy is developed in which each time instances is analyzed and allocated a self-learned weight based on the degree of relevance. Further, we also design a deployment architecture for DLTHF in the SD-IoT network. The framework is rigorously evaluated on two new SD-IoT data sources to show its effectiveness.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104109"},"PeriodicalIF":4.8,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824004140/pdfft?md5=de59ccc5221434c221b31d43e2a10a0f&pid=1-s2.0-S0167404824004140-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks 对抗性攻击下无人机视觉传感器安全的自适应多粒度信任管理方案
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.cose.2024.104108
Heqing Li , Xinde Li , Fir Dunkin , Zhentong Zhang , Xiaoyan Lu

The big data provided by unmanned aerial vehicle (UAV) visual sensors offers essential information resources for activities across various industries. However, various adversarial threats are inevitable throughout the lifecycle of data generation, transmission, and utilization, leading to serious security risks. Trust assessment of visual sensors is a prerequisite for securing UAVs, but the multidimensionality of the trust elements and the uncertainty of the evidence limit its practical application. To advance this research, we innovatively propose a trust management scheme based on multi-granularity evidence fusion within the framework of belief functions (BFs) theory to adaptively respond to both known and unknown threats. We first propose a direct trust assessment model for known threats, which constructs multidimensional coarse-grained trust elements (MCTEs) and integrates multiple lightweight sub-models for basic belief assignment (BBA) to meet the need for fast response. Then, to address the unknown threats, we introduce pre-trained models to build multidimensional fine-grained trust elements (MFTEs) to construct trust recommendation models for indirect trust assessment for visual sensors. In addition, to accurately characterize the trustworthiness of visual sensors, we also introduce a BBA-weighted fusion method to achieve more reasonable trust aggregation by weakening highly conflicting evidence sources. Finally, to validate the effectiveness of the proposed method, we conducted a comprehensive trust assessment and security experiment on UAV aerial images. The results indicate that the proposed method demonstrates excellent performance and is beneficial for enhancing UAV security in adversarial attack scenarios.

无人机视觉传感器提供的大数据为各行各业的活动提供了重要的信息资源。然而,在数据生成、传输和使用的整个生命周期中,各种对抗性威胁不可避免,从而导致严重的安全风险。视觉传感器的信任评估是确保无人机安全的前提,但信任要素的多维性和证据的不确定性限制了其实际应用。为了推进这项研究,我们在信念函数(BFs)理论框架内创新性地提出了一种基于多粒度证据融合的信任管理方案,以适应性地应对已知和未知威胁。我们首先针对已知威胁提出了直接信任评估模型,该模型构建了多维粗粒度信任元素(MCTE),并整合了多个轻量级子模型进行基本信念分配(BBA),以满足快速响应的需要。然后,针对未知威胁,我们引入预先训练的模型来构建多维细粒度信任元素(MFTE),从而为视觉传感器的间接信任评估构建信任推荐模型。此外,为了准确表征视觉传感器的可信度,我们还引入了 BBA 加权融合方法,通过弱化高度冲突的证据源来实现更合理的信任聚合。最后,为了验证所提方法的有效性,我们对无人机航拍图像进行了全面的信任评估和安全实验。结果表明,所提出的方法性能优异,有利于增强无人机在对抗性攻击场景下的安全性。
{"title":"Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks","authors":"Heqing Li ,&nbsp;Xinde Li ,&nbsp;Fir Dunkin ,&nbsp;Zhentong Zhang ,&nbsp;Xiaoyan Lu","doi":"10.1016/j.cose.2024.104108","DOIUrl":"10.1016/j.cose.2024.104108","url":null,"abstract":"<div><p>The big data provided by unmanned aerial vehicle (UAV) visual sensors offers essential information resources for activities across various industries. However, various adversarial threats are inevitable throughout the lifecycle of data generation, transmission, and utilization, leading to serious security risks. Trust assessment of visual sensors is a prerequisite for securing UAVs, but the multidimensionality of the trust elements and the uncertainty of the evidence limit its practical application. To advance this research, we innovatively propose a trust management scheme based on multi-granularity evidence fusion within the framework of belief functions (BFs) theory to adaptively respond to both known and unknown threats. We first propose a direct trust assessment model for known threats, which constructs multidimensional coarse-grained trust elements (MCTEs) and integrates multiple lightweight sub-models for basic belief assignment (BBA) to meet the need for fast response. Then, to address the unknown threats, we introduce pre-trained models to build multidimensional fine-grained trust elements (MFTEs) to construct trust recommendation models for indirect trust assessment for visual sensors. In addition, to accurately characterize the trustworthiness of visual sensors, we also introduce a BBA-weighted fusion method to achieve more reasonable trust aggregation by weakening highly conflicting evidence sources. Finally, to validate the effectiveness of the proposed method, we conducted a comprehensive trust assessment and security experiment on UAV aerial images. The results indicate that the proposed method demonstrates excellent performance and is beneficial for enhancing UAV security in adversarial attack scenarios.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104108"},"PeriodicalIF":4.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ReckDroid: Detecting red packet fraud in Android apps ReckDroid:检测安卓应用程序中的红包欺诈行为
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1016/j.cose.2024.104117
Yu Cheng , Xiaofang Qi , Yanhui Li , Yumeng Wang

Recently, red packets have appeared widely in various mobile apps. Related security issues like fraud are gradually coming into the public eye. As a new means of fraud, red packet fraud has not yet been explored or addressed. In this paper, based on our empirical study on red packets, we propose a novel approach ReckDroid for red packet fraud detection. Our approach adopts a heuristic algorithm to identify red packets and then detects red packet fraud by analyzing the network traffic dynamically generated during the automated exploration of mobile apps. Our experiments are performed on hundreds of labeled real-world apps. Experimental results show that ReckDroid identifies red packets with a precision of 98.0% and a recall of 93.3%, and detects red packet fraud with a precision of 88.6% and a recall of 92.5%. By applying ReckDroid to over 1000 Android apps in the wild, we find that apps with red packets account for 17.6% of apps from seven app markets (including Google Play) while red packet fraud mainly occurs in Chinese app markets.

最近,红包广泛出现在各种移动应用程序中。欺诈等相关安全问题也逐渐进入公众视野。作为一种新的欺诈手段,红包欺诈尚未被探索和解决。本文基于对红包的实证研究,提出了一种新颖的红包欺诈检测方法 ReckDroid。我们的方法采用启发式算法来识别红包,然后通过分析自动探索移动应用程序过程中动态生成的网络流量来检测红包欺诈。我们在数百个贴有标签的真实应用程序上进行了实验。实验结果表明,ReckDroid 识别红包的精确度为 98.0%,召回率为 93.3%;检测红包欺诈的精确度为 88.6%,召回率为 92.5%。通过将 ReckDroid 应用于 1000 多款野生安卓应用,我们发现在七个应用市场(包括 Google Play)中,有红包的应用占 17.6%,而红包欺诈主要发生在中国应用市场。
{"title":"ReckDroid: Detecting red packet fraud in Android apps","authors":"Yu Cheng ,&nbsp;Xiaofang Qi ,&nbsp;Yanhui Li ,&nbsp;Yumeng Wang","doi":"10.1016/j.cose.2024.104117","DOIUrl":"10.1016/j.cose.2024.104117","url":null,"abstract":"<div><p>Recently, red packets have appeared widely in various mobile apps. Related security issues like fraud are gradually coming into the public eye. As a new means of fraud, red packet fraud has not yet been explored or addressed. In this paper, based on our empirical study on red packets, we propose a novel approach ReckDroid for red packet fraud detection. Our approach adopts a heuristic algorithm to identify red packets and then detects red packet fraud by analyzing the network traffic dynamically generated during the automated exploration of mobile apps. Our experiments are performed on hundreds of labeled real-world apps. Experimental results show that ReckDroid identifies red packets with a precision of 98.0% and a recall of 93.3%, and detects red packet fraud with a precision of 88.6% and a recall of 92.5%. By applying ReckDroid to over 1000 Android apps in the wild, we find that apps with red packets account for 17.6% of apps from seven app markets (including Google Play) while red packet fraud mainly occurs in Chinese app markets.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104117"},"PeriodicalIF":4.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision strike: Precise backdoor attack with dynamic trigger 精确打击精确后门攻击,动态触发
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.cose.2024.104101
Qingyun Li, Wei Chen, Xiaotang Xu, Yiting Zhang, Lifa Wu

Deep neural networks have advanced significantly in the last several years and are now widely employed in numerous significant real-world applications. However, recent research has shown that deep neural networks are vulnerable to backdoor attacks. Under such attacks, attackers release backdoor models that achieve satisfactory performance on benign samples while behaving abnormally on inputs with predefined triggers. Successful backdoor attacks can have serious consequences, such as attackers using backdoor generation methods to bypass critical face recognition authentication systems. In this paper, we propose PBADT, a precise backdoor attack with dynamic trigger. Unlike existing work that uses static or random trigger masks, we design an interpretable trigger mask generation framework that places triggers at positions that have the most significant impact on the prediction results. Meanwhile, backdoor attacks are made more efficient by using forgettable events to improve the efficiency of backdoor attacks. The proposed backdoor method is extensively evaluated on three face recognition datasets, LFW, CelebA, and VGGFace, while further evaluated on two general image datasets, CIFAR-10 and GTSRB. Our approach achieves almost perfect attack performance on backdoor data.

深度神经网络在过去几年中取得了长足的进步,目前已被广泛应用于现实世界的众多重要应用中。然而,最近的研究表明,深度神经网络很容易受到后门攻击。在这种攻击下,攻击者会释放后门模型,这些模型在良性样本上能达到令人满意的性能,但在带有预定义触发器的输入上却表现异常。成功的后门攻击会造成严重后果,例如攻击者利用生成后门的方法绕过关键的人脸识别身份验证系统。在本文中,我们提出了 PBADT,一种具有动态触发功能的精确后门攻击。与使用静态或随机触发掩码的现有研究不同,我们设计了一个可解释的触发掩码生成框架,将触发器放置在对预测结果影响最大的位置。同时,通过使用可遗忘事件来提高后门攻击的效率。我们在 LFW、CelebA 和 VGGFace 三个人脸识别数据集上对所提出的后门方法进行了广泛评估,并在 CIFAR-10 和 GTSRB 两个普通图像数据集上进行了进一步评估。我们的方法在后门数据上实现了几乎完美的攻击性能。
{"title":"Precision strike: Precise backdoor attack with dynamic trigger","authors":"Qingyun Li,&nbsp;Wei Chen,&nbsp;Xiaotang Xu,&nbsp;Yiting Zhang,&nbsp;Lifa Wu","doi":"10.1016/j.cose.2024.104101","DOIUrl":"10.1016/j.cose.2024.104101","url":null,"abstract":"<div><p>Deep neural networks have advanced significantly in the last several years and are now widely employed in numerous significant real-world applications. However, recent research has shown that deep neural networks are vulnerable to backdoor attacks. Under such attacks, attackers release backdoor models that achieve satisfactory performance on benign samples while behaving abnormally on inputs with predefined triggers. Successful backdoor attacks can have serious consequences, such as attackers using backdoor generation methods to bypass critical face recognition authentication systems. In this paper, we propose PBADT, a precise backdoor attack with dynamic trigger. Unlike existing work that uses static or random trigger masks, we design an interpretable trigger mask generation framework that places triggers at positions that have the most significant impact on the prediction results. Meanwhile, backdoor attacks are made more efficient by using forgettable events to improve the efficiency of backdoor attacks. The proposed backdoor method is extensively evaluated on three face recognition datasets, LFW, CelebA, and VGGFace, while further evaluated on two general image datasets, CIFAR-10 and GTSRB. Our approach achieves almost perfect attack performance on backdoor data.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104101"},"PeriodicalIF":4.8,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a cybersecurity culture-behaviour framework: A rapid evidence review 建立网络安全文化行为框架:快速证据审查
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.cose.2024.104110
Anna Sutton, Lisa Tompson

A strong organisational cybersecurity culture (CSC) is critical to the success of any cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed. To facilitate the framing and measurement of CSC we conducted a rapid evidence assessment (REA) to synthesise relevant studies on CSC. The systematic search identified 1,768 records. 59 studies were eligible for the final synthesis.

Thematic analysis of the CSC definitions in the included studies highlighted that CSC should not be viewed solely as a technical problem but as a management issue too; CSC requires top management involvement and role modelling, with full organisational support for the desired employee behaviours. We identify both theoretically and empirically derived models of CSC in the REA, along with a range of methods to develop and test these models. Integrative analysis of these models provides detailed information about CSC dimensions, including employee attitudes towards CS; compliance with policies; the role of security education, training and awareness; monitoring of behaviour and top management commitment. The evidence indicates that CSC should be understood both in the context of the wider organisational culture as well as in the shared employee understanding of CS that leads to behaviour.

Based on the findings of this review, we propose a novel integrated framework of CSC consisting of cultural values, the culture-to-behaviour link, and behaviour itself. We also make measurement recommendations based on this CSC framework, ranging from simple, broad-brush tools through to suggestions for multi-dimensional measures, which can be applied in a variety of sectors and organisations.

强大的组织网络安全文化(CSC)对任何网络安全工作的成功都至关重要,要想取得成功,了解和衡量 CSC 至关重要。为促进对 CSC 的界定和衡量,我们进行了快速证据评估 (REA),以综合有关 CSC 的相关研究。通过系统检索,我们发现了 1,768 条记录。对所纳入研究中的 CSC 定义进行的专题分析强调,CSC 不应仅被视为一个技术问题,也应被视为一个管理问题;CSC 需要最高管理层的参与和角色示范,并需要组织对员工期望行为的全面支持。我们在 REA 中确定了从理论和经验中得出的 CSC 模型,以及开发和测试这些模型的一系列方法。对这些模型的综合分析提供了有关 CSC 各方面的详细信息,包括员工对 CS 的态度;对政策的遵守;安全教育、培训和意识的作用;对行为的监控以及高层管理者的承诺。有证据表明,CSC 应从更广泛的组织文化以及员工对 CS 的共同理解中加以理解,而员工对 CS 的共同理解会导致行为。我们还根据这一 CSC 框架提出了衡量建议,其中既有简单、粗略的工具,也有多维度的衡量建议,可适用于不同行业和组织。
{"title":"Towards a cybersecurity culture-behaviour framework: A rapid evidence review","authors":"Anna Sutton,&nbsp;Lisa Tompson","doi":"10.1016/j.cose.2024.104110","DOIUrl":"10.1016/j.cose.2024.104110","url":null,"abstract":"<div><p>A strong organisational cybersecurity culture (CSC) is critical to the success of any cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed. To facilitate the framing and measurement of CSC we conducted a rapid evidence assessment (REA) to synthesise relevant studies on CSC. The systematic search identified 1,768 records. 59 studies were eligible for the final synthesis.</p><p>Thematic analysis of the CSC definitions in the included studies highlighted that CSC should not be viewed solely as a technical problem but as a management issue too; CSC requires top management involvement and role modelling, with full organisational support for the desired employee behaviours. We identify both theoretically and empirically derived models of CSC in the REA, along with a range of methods to develop and test these models. Integrative analysis of these models provides detailed information about CSC dimensions, including employee attitudes towards CS; compliance with policies; the role of security education, training and awareness; monitoring of behaviour and top management commitment. The evidence indicates that CSC should be understood both in the context of the wider organisational culture as well as in the shared employee understanding of CS that leads to behaviour.</p><p>Based on the findings of this review, we propose a novel integrated framework of CSC consisting of cultural values, the culture-to-behaviour link, and behaviour itself. We also make measurement recommendations based on this CSC framework, ranging from simple, broad-brush tools through to suggestions for multi-dimensional measures, which can be applied in a variety of sectors and organisations.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104110"},"PeriodicalIF":4.8,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824004152/pdfft?md5=e920da67cc55971b81e8e1ee8a0dd0d0&pid=1-s2.0-S0167404824004152-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software AugPersist:自动增强持久性软件基于覆盖范围的灰盒模糊测试的持久性
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1016/j.cose.2024.104099
Chiheng Wang, Jianshan Peng, Junhu Zhu, Qingxian Wang

Fuzzing is one of the most successful approaches for verifying software functionalities and discovering security vulnerabilities. However, the software with persistent runtime characteristics (e.g., web service programs) cannot be effectively tested by current coverage-based greybox (CG) fuzzers, which strictly rely on the termination state of the target software to feed test cases synchronously and obtain code coverage. The present approach requires delicate analysis and modification of the target to eliminate its persistence, but leads to excessive non-essential restarts during testing, resulting in low throughput.

To improve the convenience and efficiency of CG fuzzing for persistent software, we propose augmenting persistence (AugPersist) as a complementary method. AugPersist introduces the concept of persistent basic block (PBB) to leverage the inherent code features of persistent software. PBB can be found automatically and quickly before fuzzing based on the execution flow graph (EFG). On this basis, we develop a low- delay synchronous communication so that after regular test cases are fed into the target, the fuzzer can derive code coverage without rebooting the target, thus significantly minimizing extraneous restarts. Additionally, by utilizing the self-adaptive forkserver, we can dynamically adjust the re-execution point of the target to the PBB position, which further minimizes losses when test cases trigger exceptions and cause necessary restarts.

To show the potential of augmenting persistence, we create two implementations, AFL-AugPersist and AFLNet-AugPersist, using AFL and AFLNet as baselines. We evaluate both with their respective baselines on different benchmarks. AFL-AugPersist makes stateless persistent software easier to be fuzzed than AFL and provides 4.9 × to 71.1 × throughput improvement compared to AFL. The throughput of AFLNet-AugPersist improves by a maximum of 210.0 × and a minimum of 3.3 × compared to AFLNet. These results show that AugPersist significantly contributes to the convenience and efficiency of CG fuzzing on persistent software.

模糊测试是验证软件功能和发现安全漏洞的最成功方法之一。然而,目前基于覆盖率的灰盒(CG)模糊器无法对具有持久运行特性的软件(如网络服务程序)进行有效测试,这种模糊器严格依赖目标软件的终止状态来同步输入测试用例并获得代码覆盖率。目前的方法需要对目标软件进行细致的分析和修改,以消除其持久性,但会导致测试过程中过多的非必要重启,从而降低测试效率。为了提高持久性软件的 CG 模糊测试的便利性和效率,我们提出了增强持久性(AugPersist)作为补充方法。AugPersist 引入了持久性基本块(PBB)的概念,以利用持久性软件固有的代码特性。在基于执行流图(EFG)进行模糊测试之前,可以自动快速地找到 PBB。在此基础上,我们开发了一种低延迟同步通信,这样在将常规测试用例输入目标机后,模糊器无需重启目标机即可获得代码覆盖率,从而大大减少了无关的重启。此外,通过利用自适应分叉服务器,我们可以将目标的重新执行点动态调整到 PBB 位置,从而进一步减少测试用例触发异常并导致必要重启时的损失。我们在不同的基准测试中对这两种实现与各自的基准进行了评估。与 AFL 相比,AFL-AugPersist 使无状态持久性软件更容易被模糊,吞吐量提高了 4.9 倍到 71.1 倍。与 AFLNet 相比,AFLNet-AugPersist 的吞吐量最大提高 210.0 倍,最小提高 3.3 倍。这些结果表明,AugPersist 大大提高了对持久性软件进行 CG 模糊测试的便利性和效率。
{"title":"AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software","authors":"Chiheng Wang,&nbsp;Jianshan Peng,&nbsp;Junhu Zhu,&nbsp;Qingxian Wang","doi":"10.1016/j.cose.2024.104099","DOIUrl":"10.1016/j.cose.2024.104099","url":null,"abstract":"<div><p>Fuzzing is one of the most successful approaches for verifying software functionalities and discovering security vulnerabilities. However, the software with persistent runtime characteristics (e.g., web service programs) cannot be effectively tested by current coverage-based greybox (CG) fuzzers, which strictly rely on the termination state of the target software to feed test cases synchronously and obtain code coverage. The present approach requires delicate analysis and modification of the target to eliminate its persistence, but leads to excessive non-essential restarts during testing, resulting in low throughput.</p><p>To improve the convenience and efficiency of CG fuzzing for persistent software, we propose augmenting persistence (AugPersist) as a complementary method. AugPersist introduces the concept of persistent basic block (PBB) to leverage the inherent code features of persistent software. PBB can be found automatically and quickly before fuzzing based on the execution flow graph (EFG). On this basis, we develop a low- delay synchronous communication so that after regular test cases are fed into the target, the fuzzer can derive code coverage without rebooting the target, thus significantly minimizing extraneous restarts. Additionally, by utilizing the self-adaptive forkserver, we can dynamically adjust the re-execution point of the target to the PBB position, which further minimizes losses when test cases trigger exceptions and cause necessary restarts.</p><p>To show the potential of augmenting persistence, we create two implementations, AFL-AugPersist and AFLNet-AugPersist, using AFL and AFLNet as baselines. We evaluate both with their respective baselines on different benchmarks. AFL-AugPersist makes stateless persistent software easier to be fuzzed than AFL and provides 4.9 × to 71.1 × throughput improvement compared to AFL. The throughput of AFLNet-AugPersist improves by a maximum of 210.0 × and a minimum of 3.3 × compared to AFLNet. These results show that AugPersist significantly contributes to the convenience and efficiency of CG fuzzing on persistent software.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104099"},"PeriodicalIF":4.8,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware classification through Abstract Syntax Trees and L-moments 通过抽象语法树和 L-moments 进行恶意软件分类
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1016/j.cose.2024.104082
Anthony J. Rose, Christine M. Schubert Kabban, Scott R. Graham, Wayne C. Henry, Christopher M. Rondeau

The ongoing evolution of malware presents a formidable challenge to cybersecurity: identifying unknown threats. Traditional detection methods, such as signatures and various forms of static analysis, inherently lag behind these evolving threats. This research introduces a novel approach to malware detection by leveraging the robust statistical capabilities of L-moments and the structural insights provided by Abstract Syntax Trees (ASTs) and applying them to PowerShell. L-moments, recognized for their resilience to outliers and adaptability to diverse distributional shapes, are extracted from network analysis measures like degree centrality, betweenness centrality, and closeness centrality of ASTs. These measures provide a detailed structural representation of code, enabling a deeper understanding of its inherent behaviors and patterns. This approach aims to detect not only known malware but also uncover new, previously unidentified threats. A comprehensive comparison with traditional static analysis methods shows that this approach excels in key performance metrics such as accuracy, precision, recall, and F1 score. These results demonstrate the significant potential of combining L-moments derived from network analysis with ASTs in enhancing malware detection. While static analysis remains an essential tool in cybersecurity, the integration of L-moments and advanced network analysis offers a more effective and efficient response to the dynamic landscape of cyber threats. This study paves the way for future research, particularly in extending the use of L-moments and network analysis into additional areas.

恶意软件的不断演变给网络安全带来了严峻的挑战:识别未知威胁。传统的检测方法,如签名和各种形式的静态分析,本质上落后于这些不断演变的威胁。本研究利用 L-moments 的强大统计功能和抽象语法树 (AST) 提供的结构洞察力,并将其应用于 PowerShell,从而为恶意软件检测引入了一种新方法。L-moments 因其对异常值的复原力和对不同分布形状的适应性而得到认可,它是从 AST 的度中心性、间中心性和接近中心性等网络分析指标中提取出来的。这些指标提供了代码的详细结构表示,有助于深入理解代码的内在行为和模式。这种方法不仅能检测已知的恶意软件,还能发现以前未发现的新威胁。与传统静态分析方法的综合比较表明,这种方法在准确率、精确度、召回率和 F1 分数等关键性能指标方面表现出色。这些结果表明,将网络分析得出的 L-moments 与 AST 相结合,在增强恶意软件检测方面具有巨大潜力。虽然静态分析仍然是网络安全的重要工具,但 L-moments 与高级网络分析的整合能更有效、更高效地应对网络威胁的动态变化。这项研究为今后的研究铺平了道路,特别是在将 L-moments 和网络分析的应用扩展到更多领域方面。
{"title":"Malware classification through Abstract Syntax Trees and L-moments","authors":"Anthony J. Rose,&nbsp;Christine M. Schubert Kabban,&nbsp;Scott R. Graham,&nbsp;Wayne C. Henry,&nbsp;Christopher M. Rondeau","doi":"10.1016/j.cose.2024.104082","DOIUrl":"10.1016/j.cose.2024.104082","url":null,"abstract":"<div><p>The ongoing evolution of malware presents a formidable challenge to cybersecurity: identifying unknown threats. Traditional detection methods, such as signatures and various forms of static analysis, inherently lag behind these evolving threats. This research introduces a novel approach to malware detection by leveraging the robust statistical capabilities of L-moments and the structural insights provided by Abstract Syntax Trees (ASTs) and applying them to PowerShell. L-moments, recognized for their resilience to outliers and adaptability to diverse distributional shapes, are extracted from network analysis measures like degree centrality, betweenness centrality, and closeness centrality of ASTs. These measures provide a detailed structural representation of code, enabling a deeper understanding of its inherent behaviors and patterns. This approach aims to detect not only known malware but also uncover new, previously unidentified threats. A comprehensive comparison with traditional static analysis methods shows that this approach excels in key performance metrics such as accuracy, precision, recall, and <span><math><msub><mrow><mi>F</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> score. These results demonstrate the significant potential of combining L-moments derived from network analysis with ASTs in enhancing malware detection. While static analysis remains an essential tool in cybersecurity, the integration of L-moments and advanced network analysis offers a more effective and efficient response to the dynamic landscape of cyber threats. This study paves the way for future research, particularly in extending the use of L-moments and network analysis into additional areas.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104082"},"PeriodicalIF":4.8,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003870/pdfft?md5=255011e2faf3909f24dc4575c4f50f4f&pid=1-s2.0-S0167404824003870-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G 面向可重构智能表面赋能 6G 的物理层安全系统调查
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1016/j.cose.2024.104100
Shunliang Zhang, Weiqing Huang, Yinlong Liu

The 6G system is envisioned to support various new applications with diverse requirements in terms of quality and security. To fulfill diverse and stringent requirements, reconfigurable intelligent surfaces (RIS) have been extensively studied as a 6G enabling technology. RIS can be used to secure communications and boost the system performance, but it leads to new security threats as well. Due to the open nature of the wireless channel, smart radio environment, dynamic network topology, and adversarial machine learning (ML), 6G will face various unprecedented security threats. Given stringent requirements on quality of service (QoS), security, and massive low-cost Internet of Thing (IoT) devices, physical layer security (PLS) by exploiting the random nature of the wireless channel and/or intrinsic hardware imperfection emerges as a complementary approach to secure wireless communications. Meanwhile, the rapid development of artificial intelligence (AI) promotes the development of intelligent PLS solutions and smart attacks. In this paper, we make a comprehensive overview of PLS for RIS-based 6G systems from both defensive and offensive perspectives. We first introduce the vision of the RIS-enabled 6G smart radio environment. Then, typical security risks and requirements on RIS-based 6G are analyzed. After that, the state-of-the-art techniques on PLS are presented. Subsequently, major academic works on the physical layer security solution oriented to RIS are systematically reviewed. Moreover, the latest studies on attacks based on adversarial RIS are discussed in depth. Finally, we identify multiple open issues and research opportunities to inspire further studies for more intelligent PLS to secure the RIS-enabled 6G system.

根据设想,6G 系统将支持对质量和安全性有不同要求的各种新应用。为了满足多样化的严格要求,人们对可重构智能表面(RIS)作为 6G 使能技术进行了广泛研究。RIS 可用于确保通信安全和提高系统性能,但也会带来新的安全威胁。由于无线信道的开放性、智能无线电环境、动态网络拓扑和对抗性机器学习(ML),6G 将面临各种前所未有的安全威胁。鉴于对服务质量(QoS)、安全性和大规模低成本物联网(IoT)设备的严格要求,利用无线信道的随机性和/或硬件固有缺陷的物理层安全(PLS)成为确保无线通信安全的一种补充方法。同时,人工智能(AI)的快速发展促进了智能 PLS 解决方案和智能攻击的发展。本文从防御和进攻两个角度对基于 RIS 的 6G 系统的 PLS 进行了全面概述。我们首先介绍了支持 RIS 的 6G 智能无线电环境的愿景。然后,分析了基于 RIS 的 6G 的典型安全风险和要求。之后,介绍了 PLS 的最新技术。随后,系统回顾了面向 RIS 的物理层安全解决方案的主要学术著作。此外,还深入讨论了基于对抗性 RIS 攻击的最新研究。最后,我们确定了多个开放性问题和研究机会,以激励进一步研究更智能的 PLS,确保支持 RIS 的 6G 系统的安全。
{"title":"A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G","authors":"Shunliang Zhang,&nbsp;Weiqing Huang,&nbsp;Yinlong Liu","doi":"10.1016/j.cose.2024.104100","DOIUrl":"10.1016/j.cose.2024.104100","url":null,"abstract":"<div><p>The 6G system is envisioned to support various new applications with diverse requirements in terms of quality and security. To fulfill diverse and stringent requirements, reconfigurable intelligent surfaces (RIS) have been extensively studied as a 6G enabling technology. RIS can be used to secure communications and boost the system performance, but it leads to new security threats as well. Due to the open nature of the wireless channel, smart radio environment, dynamic network topology, and adversarial machine learning (ML), 6G will face various unprecedented security threats. Given stringent requirements on quality of service (QoS), security, and massive low-cost Internet of Thing (IoT) devices, physical layer security (PLS) by exploiting the random nature of the wireless channel and/or intrinsic hardware imperfection emerges as a complementary approach to secure wireless communications. Meanwhile, the rapid development of artificial intelligence (AI) promotes the development of intelligent PLS solutions and smart attacks. In this paper, we make a comprehensive overview of PLS for RIS-based 6G systems from both defensive and offensive perspectives. We first introduce the vision of the RIS-enabled 6G smart radio environment. Then, typical security risks and requirements on RIS-based 6G are analyzed. After that, the state-of-the-art techniques on PLS are presented. Subsequently, major academic works on the physical layer security solution oriented to RIS are systematically reviewed. Moreover, the latest studies on attacks based on adversarial RIS are discussed in depth. Finally, we identify multiple open issues and research opportunities to inspire further studies for more intelligent PLS to secure the RIS-enabled 6G system.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104100"},"PeriodicalIF":4.8,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificate-based multi-copy cloud storage auditing supporting data dynamics 支持数据动态的基于证书的多副本云存储审计
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1016/j.cose.2024.104096
Hao Zhou , Wenting Shen , Jinlu Liu
With the advent of cloud computing, users are increasingly choosing to store their data on cloud. As a result, data integrity and availability have emerged as key concerns for data owners. Users expect to store multiple copies of their data to cloud and ensure the integrity of these data copies. Currently, numerous multi-copy cloud storage auditing schemes have been proposed. However, most of them depend on public key infrastructure, identity-based cryptography, or certificateless cryptography. These schemes encounter challenges such as complicated certificate management, key escrow, or the necessity for a secure channel for distributing keys, respectively. Furthermore, most of them are not resilient to copy-summation attack. To address the above problems, we propose a certificate-based multi-copy cloud storage auditing scheme supporting data dynamics. We design a novel dynamic structure named Leaves Merkle hash tree (LMHT) to achieve multi-copy dynamic updates. Different from traditional Merkle hash trees, LMHT has significant advantages in data deletion. In addition, the proposed scheme can resist copy-summation attack, in which cloud cannot pass the verification if it only stores summation of all copies without storing data blocks’ all copies. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and efficient.
随着云计算的出现,越来越多的用户选择在云上存储数据。因此,数据完整性和可用性成为数据所有者关注的重点。用户希望将数据的多个副本存储到云上,并确保这些数据副本的完整性。目前,已经提出了许多多副本云存储审计方案。不过,它们大多依赖于公钥基础设施、基于身份的加密技术或无证书加密技术。这些方案分别遇到了复杂的证书管理、密钥托管或分发密钥的安全通道的必要性等挑战。此外,它们大多无法抵御复制求和攻击。针对上述问题,我们提出了一种支持数据动态的基于证书的多副本云存储审计方案。我们设计了一种名为 "Leaves Merkle hash tree(LMHT)"的新型动态结构来实现多副本动态更新。与传统的 Merkle 哈希树不同,LMHT 在数据删除方面具有显著优势。此外,提出的方案还能抵御副本求和攻击,在这种攻击中,如果云只存储所有副本的求和,而不存储数据块的所有副本,就无法通过验证。安全分析和性能评估表明,所提出的方案既安全又高效。
{"title":"Certificate-based multi-copy cloud storage auditing supporting data dynamics","authors":"Hao Zhou ,&nbsp;Wenting Shen ,&nbsp;Jinlu Liu","doi":"10.1016/j.cose.2024.104096","DOIUrl":"10.1016/j.cose.2024.104096","url":null,"abstract":"<div><div>With the advent of cloud computing, users are increasingly choosing to store their data on cloud. As a result, data integrity and availability have emerged as key concerns for data owners. Users expect to store multiple copies of their data to cloud and ensure the integrity of these data copies. Currently, numerous multi-copy cloud storage auditing schemes have been proposed. However, most of them depend on public key infrastructure, identity-based cryptography, or certificateless cryptography. These schemes encounter challenges such as complicated certificate management, key escrow, or the necessity for a secure channel for distributing keys, respectively. Furthermore, most of them are not resilient to copy-summation attack. To address the above problems, we propose a certificate-based multi-copy cloud storage auditing scheme supporting data dynamics. We design a novel dynamic structure named Leaves Merkle hash tree (LMHT) to achieve multi-copy dynamic updates. Different from traditional Merkle hash trees, LMHT has significant advantages in data deletion. In addition, the proposed scheme can resist copy-summation attack, in which cloud cannot pass the verification if it only stores summation of all copies without storing data blocks’ all copies. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and efficient.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"148 ","pages":"Article 104096"},"PeriodicalIF":4.8,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142311602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1