Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy最新文献

筛选
英文 中文
Security and Privacy for Emerging IoT and CPS Domains 新兴物联网和CPS领域的安全和隐私
E. Bertino, R. Sandhu, B. Thuraisingham, I. Ray, Wei Li, Maanak Gupta, Sudip Mittal
{"title":"Security and Privacy for Emerging IoT and CPS Domains","authors":"E. Bertino, R. Sandhu, B. Thuraisingham, I. Ray, Wei Li, Maanak Gupta, Sudip Mittal","doi":"10.1145/3508398.3519314","DOIUrl":"https://doi.org/10.1145/3508398.3519314","url":null,"abstract":"The proliferation of IoT and CPS technologies demand novel conceptual, foundational and applied cybersecurity solutions. The dynamic behaviour of these distributed systems augmented with physical and computational constraints of smart devices, require cybersecurity approaches for timely prevention and detection of attacks. This panel aims to discuss open challenges and highlight future research directions for cybersecurity in IoT and CPS.","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126035782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Bound for Privacy Loss from Bayesian Posterior Sampling 贝叶斯后验抽样隐私损失的新界
Xingyuan Zhao, F. Liu
{"title":"A New Bound for Privacy Loss from Bayesian Posterior Sampling","authors":"Xingyuan Zhao, F. Liu","doi":"10.1145/3508398.3519355","DOIUrl":"https://doi.org/10.1145/3508398.3519355","url":null,"abstract":"Differential privacy (DP) is a state-of-the-art concept that formalizes privacy guarantees. We derive a new bound for the privacy loss from releasing Bayesian posterior samples in the setting of DP. The new bound is tighter than the existing bounds for common Bayesian models and is also consistent with the likelihood principle. We apply the privacy loss quantified by the new bound to release differentially private synthetic data from Bayesian models in several experiments and show the improved utility of the synthetic data compared to those generated from explicitly designed randomization mechanisms that privatize posterior distributions.","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms 面向云辅助轻量级平台的多关键字排名可搜索公钥加密
I. Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan
{"title":"MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms","authors":"I. Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan","doi":"10.1145/3508398.3519362","DOIUrl":"https://doi.org/10.1145/3508398.3519362","url":null,"abstract":"Since more and more data from lightweight platforms like IoT devices or mobile apps are being outsourced to the cloud, the need to ensure privacy while retaining data usability is essential. This paper designs a framework where lightweight platforms like IoT devices can encrypt documents and generate document indexes using the public key before uploading the document to the cloud. An admin can search and retrieve the top-k most relevant documents that match a multi-keyword query using the private key. Most existing searchable encryption that supports IoT returns all the documents matching queried keywords. However, IoT devices can produce massive data, which is not practical for such schemes. We formally name our framework Multi-keyword Ranked Searchable Public-Key Encryption (MK-RS-PKE).","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: Machine Learning and Security 会议详情:会议1:机器学习和安全
R. Krishnan
{"title":"Session details: Session 1: Machine Learning and Security","authors":"R. Krishnan","doi":"10.1145/3532562","DOIUrl":"https://doi.org/10.1145/3532562","url":null,"abstract":"","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic 使用未加密的网络流量解密来自物联网(间谍)摄像机的视频流量
P. Chaudhary, Avinash Narasimhan, R. Maiti
{"title":"Demystifying Video Traffic from IoT (Spy) Camera using Undecrypted Network Traffic","authors":"P. Chaudhary, Avinash Narasimhan, R. Maiti","doi":"10.1145/3508398.3519356","DOIUrl":"https://doi.org/10.1145/3508398.3519356","url":null,"abstract":"Video traffic can create significant privacy and security threats to an organization or a smart home. Integration of IoT cameras has increased this problem manifold especially when there is no clear distinction among the protocols that can be used in IoT cameras and traditional video streaming or sharing applications. In this paper, we initiate a study on distinguishing video traffic in IoT cameras from that in video conferencing or sharing applications. We have used three IoT cameras, four video conferencing applications and two video sharing platforms to collect network traffic at network and above layers. We found a number of protocols like Real-time Transport Protocol, QUIC protocol, UDT protocol and TLS protocols that are used for transferring video traffic in these applications. We found that the protocols that carry IoT camera traffic have significantly different characteristics compared to that in video conferencing and sharing applications, e.g., in terms of video codec.","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Does Deception Leave a Content Independent Stylistic Trace? 欺骗是否会留下内容独立的风格痕迹?
Victor Zeng, Xuting Liu, Rakesh M. Verma
{"title":"Does Deception Leave a Content Independent Stylistic Trace?","authors":"Victor Zeng, Xuting Liu, Rakesh M. Verma","doi":"10.1145/3508398.3519358","DOIUrl":"https://doi.org/10.1145/3508398.3519358","url":null,"abstract":"A recent survey claims that there are em no general linguistic cues for deception. Since Internet societies are plagued with deceptive attacks such as phishing and fake news, this claim means that we must build individual datasets and detectors for each kind of attack. It also implies that when a new scam (e.g., Covid) arrives, we must start the whole process of data collection, annotation, and model building from scratch. In this paper, we put this claim to the test by building a quality domain-independent deception dataset and investigating whether a model can perform well on more than one form of deception.","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: Session 3: Software Security 会议详情:会议3:软件安全
I. Ray
{"title":"Session details: Session 3: Software Security","authors":"I. Ray","doi":"10.1145/3532564","DOIUrl":"https://doi.org/10.1145/3532564","url":null,"abstract":"","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124549066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results 预测网络隐蔽信道的渐近行为:实验结果
C. Meadows
{"title":"Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results","authors":"C. Meadows","doi":"10.1145/3508398.3516669","DOIUrl":"https://doi.org/10.1145/3508398.3516669","url":null,"abstract":"The problem of covert communication via computer systems is almost as old as the problem of computer security itself. In the earliest years, covert communication was seen as mainly as a theoretical problem. But as computer systems have become more complex and ubiquitous, covert communication has begun to see practical use, particularly in the last two decades (see, e.g. Mazurcyk et al. in [MW19].) In this talk I will be reporting on the work we have been doing at NRL on evaluating the impact that existing research on the asymptotic behavior on covert channels has on embeddings in real-world channels.","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Poster Session II 会议详情:海报会议II
Hong-yu Hu
{"title":"Session details: Poster Session II","authors":"Hong-yu Hu","doi":"10.1145/3532572","DOIUrl":"https://doi.org/10.1145/3532572","url":null,"abstract":"","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127622923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4: Access Control and Privacy 会话详细信息:会话4:访问控制和隐私
S. Sural
{"title":"Session details: Session 4: Access Control and Privacy","authors":"S. Sural","doi":"10.1145/3532565","DOIUrl":"https://doi.org/10.1145/3532565","url":null,"abstract":"","PeriodicalId":102306,"journal":{"name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信