2021 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal Factors 无意电磁辐射危害IT设备安全的可能性:从业者对因果因素的看法
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717369
M. Martín, F. Sunmola, D. Lauder
{"title":"Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal Factors","authors":"M. Martín, F. Sunmola, D. Lauder","doi":"10.1109/ICCST49569.2021.9717369","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717369","url":null,"abstract":"The study explores the influencing factors that Radio Frequency (RF) Engineers take into consideration when assessing the likelihood of unintentional electromagnetic radiation compromising the security of Information Technology Equipment. A focus group research methodology is adopted, and the results analyzed using a cause-and-effect technique. Two focus groups of RF Engineers identified twenty-six influencing factors they considered when assessing likelihood. Through the cause-and-effect technique it was possible to categorize the factors in terms of threat, vulnerability, and impact (the three constituents of a qualitative risk calculation). This information can be used by cyber security practitioners with little or no RF experience to provide a better understanding of the significance RF Engineers place on specific factors particularly when assessing vulnerability likelihood.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate 创建有效的指纹伪迹:一种高成功率绕过电容式和光学传感器的合作和非合作方法
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717377
Ryan Carvalho, Norbert Tihanyi
{"title":"Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate","authors":"Ryan Carvalho, Norbert Tihanyi","doi":"10.1109/ICCST49569.2021.9717377","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717377","url":null,"abstract":"Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马火车站安全性和风险认知的情感分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717387
F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717387","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717387","url":null,"abstract":"The evaluation of perceived safeness and risk by persons is particularly valuable for safety and security handling. Each individual is influenced by others' opinions on safety and security and the Internet embodies the place where these opinions are mostly pursued, acquired, and estimated. From this point of view, social networks play a considerable influential role. For this reason, Opinion Mining and Sentiment Analysis have found noteworthy uses in a variety of situations and one of the most interesting is embodied by public safety and security. The goal of this work is to examine the perception of safety and risk within the railway stations of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the railway stations of London Victoria and Waterloo and the railway stations of Rome Termini and Tiburtina were considered, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target Categories 多准则决策:作为软目标类别之一的文化事件风险分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717382
Dora Kotkova, L. Kralik, Lukas Kotek
{"title":"Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target Categories","authors":"Dora Kotkova, L. Kralik, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717382","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717382","url":null,"abstract":"This article is focused on risk analysis with the help of multi-criteria decision making. We create many risk analyses for Soft targets, and we continually try to find new methods for objective evaluation of the risks. Many risk analyses are subjective, which is a problem for planning security measures and comparing the results (other events, object, place etc.). In this article, we pre-sent our case study, which deals with the utilization of fuzzy TOPSIS. We have chosen one cate-gory of the Soft targets - the cultural events. Our goal was to find the most endangered localization for the violent attacks in the cultural event selected - musical concert. Then we started to cooperate with three experts. They filled in data in our risk analysis, and then we compared the results with practice. We have chosen fuzzy TOPSIS because we assumed this method would be more objective. In the end, this hypothesis has confirmed. The results were objectively and in line with practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Cryptographic and Biometric Signatures 密码与生物特征签名的比较研究
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717373
V. Smejkal, J. Kodl
{"title":"Comparative Study of Cryptographic and Biometric Signatures","authors":"V. Smejkal, J. Kodl","doi":"10.1109/ICCST49569.2021.9717373","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717373","url":null,"abstract":"The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders 基于医疗和可穿戴记录仪短登记时间的心电图生物特征验证模型评估
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717372
H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest
{"title":"Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders","authors":"H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest","doi":"10.1109/ICCST49569.2021.9717372","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717372","url":null,"abstract":"Biometric authentication is nowadays widely used in a multitude of scenarios. Several studies have been conducted on electrocardiogram (ECG) for subject identification or verification among the various modalities. However, none have considered a typical implementation with a mobile device and the necessity for a fast-training model with limited recording time for the signal. This study tackles this issue by exploring various classification models on short recordings and evaluating the performance varying the sample length and the training set size. We run our tests on two public datasets collected from wearable and medical devices and propose a pipeline for ECG authentication with limited data required for competitive usage across applications.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robot 工业机械臂类人运动学研究:以UR3机器人为例
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717393
A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester
{"title":"Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robot","authors":"A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester","doi":"10.1109/ICCST49569.2021.9717393","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717393","url":null,"abstract":"Safety in industrial robotic environments is a hot research topic in the area of human-robot interaction (HRI). Up to now, a robotic arm on an assembly line interacts with other machines away from human workers. Nowadays, robotic arm manufactures are aimed to their robots could increasingly perform tasks collaborating with humans. One of the ways to improve this collaboration is by making the movement of robots more humanlike. This way, it would be easier for a human to foresee the movement of the robot and approach it without fear of contact. The main difference between the movement of a human and of a robotic arm is that the former has a bell-shaped speed profile while the latter has a uniform speed one. To generate this speed profile, the kinematic theory of rapid human movements and its Sigma-Lognormal model has been used. This model is widely used to explain most of the basic phenomena related to the control of human movements. Both human-like and robotic-like movements are transferred to the UR3 robot. In this paper we detail the how the UR3 robot was programmed to produce both kinds of movement. The dissimilarities result between the input motion and output motion to the robot confirm the possibility to develop human-like velocities in the UR3 robot.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Masks Usage Monitoring for Public Health Security using Computer Vision on Hardware 基于硬件计算机视觉的公共卫生安全口罩使用监测
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717402
Dimitrios Kolosov, I. Mporas
{"title":"Face Masks Usage Monitoring for Public Health Security using Computer Vision on Hardware","authors":"Dimitrios Kolosov, I. Mporas","doi":"10.1109/ICCST49569.2021.9717402","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717402","url":null,"abstract":"Wearing face masks is one of the direct measures that can help tackling the spread of the new coronavirus. In this paper we presented an architecture for face mask wearing detection using pre-trained deep learning models for computer vision and implementation of them on embedded hardware platforms. Three object detection models were fine-tuned and optimized to run on 4 different hardware platforms. The fine tuning and optimization of the models resulted in significant reduction of the inference time, thus making the use of this technology in IoT based security systems for real-time automatic monitoring of face masks wearing realisable.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马交通工具和汽车和摩托车旅行的安全性和风险认知的情感分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717374
F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717374","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717374","url":null,"abstract":"The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Variable Reflective Properties of UK Number Plates and Impact on ANPR 英国车牌的可变反射特性及其对ANPR的影响
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717378
Mike Rhead, Robert Gurney, W. E. Martin
{"title":"The Variable Reflective Properties of UK Number Plates and Impact on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717378","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717378","url":null,"abstract":"This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信