Proceedings of the 18th International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
Cheaper than you thought? A dive into the darkweb market of cyber-crime products 比你想象的便宜?潜入网络犯罪产品的暗网市场
Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis
{"title":"Cheaper than you thought? A dive into the darkweb market of cyber-crime products","authors":"Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis","doi":"10.1145/3600160.3605012","DOIUrl":"https://doi.org/10.1145/3600160.3605012","url":null,"abstract":"The darkweb is nowadays considered a very popular place to sell and buy illegal cyber-crime related content. From botnet services and malware, to user data such as credit card information and passwords, darkweb marketplaces offer ease of use, product variety, and most importantly effective anonymity to both buyers and vendors. In this paper, we crawl 8 popular darkweb marketplaces and perform a comprehensive quantitative analysis with a focus on cyber-crime related products. Moreover, we report some preliminary findings when examining the same marketplaces through their I2P mirrors. Our results suggest that overall there is a multitude of products that fall into the cyber-crime category, with products under the Fraud category dominating the market, and that the average cyber-crime products’ price is relatively low. Furthermore, we explore how the vendors of this specific product group are distributed across platforms, utilizing harvested information such as usernames and PGP keys, and investigate how their reputation scores affect their operation.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning 基于动态分析和可解释深度学习的模糊移动恶意软件检测
F. Mercaldo, Giovanni Ciaramella, A. Santone, Fabio Martinelli
{"title":"Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning","authors":"F. Mercaldo, Giovanni Ciaramella, A. Santone, Fabio Martinelli","doi":"10.1145/3600160.3605037","DOIUrl":"https://doi.org/10.1145/3600160.3605037","url":null,"abstract":"With the growth of the mobile market, malicious applications represent a risk to the security of the users. To mitigate this aspect, researchers proposed different techniques to spot and identify unsafe software placed on the market. On the other hand, malicious writers started to develop ever more sophisticated strategies to hide malicious payloads, in particular through the adoption of obfuscation techniques. The latter consists of hiding the behavior and purpose of malware from antimalware. In this paper, we propose and design a method aimed to detect obfuscated malware. The proposed method builds images directly from system call traces obtained from legitimate, malicious, and obfuscated Android applications. In addition, to show that dynamic analysis and deep learning can build resilient models we propose two experiments using a convolutional neural network. In the first experiment, we train and test the model using a dataset composed of malware, while in the second we train the model using the malware dataset but the model is evaluated using a dataset composed of obfuscated malware. Finally, we analyze the malware and obfuscated detection models from the point of view of explainability using two different class activation mapping algorithms, to understand whether the model predictions can be considered resilient.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigate Data Poisoning Attack by Partially Federated Learning 利用部分联邦学习缓解数据中毒攻击
Khanh-Huu-The Dam, Axel Legay
{"title":"Mitigate Data Poisoning Attack by Partially Federated Learning","authors":"Khanh-Huu-The Dam, Axel Legay","doi":"10.1145/3600160.3605032","DOIUrl":"https://doi.org/10.1145/3600160.3605032","url":null,"abstract":"An efficient machine learning model for malware detection requires a large dataset to train. Yet it is not easy to collect such a large dataset without violating or leaving vulnerable to potential violation various aspects of data privacy. Our work proposes a federated learning framework that permits multiple parties to collaborate on learning behavioral graphs for malware detection. Our proposed graph classification framework allows the participating parties to freely decide their preferred classifier model without acknowledging their preferences to the others involved. This mitigates the chance of any data poisoning attacks. In our experiments, our classification model using the partially federated learning achieved the F1-score of 0.97, close to the performance of the centralized data training models. Moreover, the impact of the label flipping attack against our model is less than 0.02.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating undesired interactions between liveness detection components in biometric authentication 减轻生物识别认证中活性检测组件之间不希望的交互
Emma Lavens, D. Preuveneers, W. Joosen
{"title":"Mitigating undesired interactions between liveness detection components in biometric authentication","authors":"Emma Lavens, D. Preuveneers, W. Joosen","doi":"10.1145/3600160.3604992","DOIUrl":"https://doi.org/10.1145/3600160.3604992","url":null,"abstract":"Biometric authentication has made great strides throughout the years thanks to better hardware and software support. However, attackers are unrelenting in finding new ways to spoof a subject, hereby breaking existing presentation attack detection schemes. Similar to combining multiple authentication factors, a combination of liveness detection defenses is expected to strengthen security against spoofing attacks. The problem that we address is that many defenses have only been evaluated in isolation or in ideal circumstances. In this work, we demonstrate how different liveness components for face authentication can interfere with one another, thereby jeopardizing security. Furthermore, contextual and environmental influences can endanger their robustness. In this work, we propose a security framework for biometric authentication that supports adaptive liveness detection by reasoning upon undesired interactions between defenses, the impact of new attacks, and the context in which they emerge. We validate the flexibility of our framework to account for both historic and novel interplays between attacks and defenses. Our experiments show that our framework effectively accounts for undesired interactions while only incurring a limited and acceptable performance overhead.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic Review 认知战的定义与对策:系统述评
Frida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi
{"title":"Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic Review","authors":"Frida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi","doi":"10.1145/3600160.3605080","DOIUrl":"https://doi.org/10.1145/3600160.3605080","url":null,"abstract":"Psychological warfare and hybrid threats are currently one of the greatest risks to the stability of democratic systems, as well as are used to exploit the psychological vulnerability of individuals. Together with the use of disinformation and technologies, cognitive biases of individuals in a population are susceptible to being exploited and manipulated by an external actor in order to alter their behaviour, beliefs and decision-making to achieve their strategic goals. As pointed by NATO, the human mind becomes the battlefield in cognitive warfare, targeting not only individuals but also group behaviours in favor of an adversary’s objectives. The aim of this research is therefore the revision of cognitive warfare and hybrid threats definitions to draw a set of countermeasures intended to mitigate their effects. Even when cognitive warfare has been widely covered by the different miliary doctrines since early times, its implications in modern warfare scenarios are constantly evolving so that requiring a context-aware analysis as the main driver to underpin possible countermeasures from the governmental and political perspectives, as presented in this work. The analysis explores the cognitive impact and scope of psychological warfare on a national scale, as well as at the individual level within a context of proliferating disinformation, technologies, and manipulation.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages 基于NESCOR标准的虚拟电厂风险评估,实际应用,优缺点
Georgios Gkoktsis, Hagen Lauer, Lukas Jaeger
{"title":"Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages","authors":"Georgios Gkoktsis, Hagen Lauer, Lukas Jaeger","doi":"10.1145/3600160.3605179","DOIUrl":"https://doi.org/10.1145/3600160.3605179","url":null,"abstract":"Cyber security in the energy sector is paramount to the safe and reliable generation, transmission, and delivery of electrical energy. In the paradigm of the Virtual Power Plant, a structure which aggregates the output of multiple Distributed Energy Resources and connects to the grid as one entity, it is particularly challenging to prioritize those security controls and countermeasures that measurably improve its security posture. Assessing and framing cyber risk is critically important to enable such endeavors. The National Electric Sector Cybersecurity Organization Resource (NESCOR) has published an assessment framework for the energy sector as part of a study on failure scenarios. This paper presents the results of a practical application of this methodology with an adaptation to VPP specifics and illuminates some of the advantages and challenges present in the process.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116301948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation 反向更容易:通过反向域名表记简化网络钓鱼URL的URL阅读
Vincent Drury, Jakob Drees, Ulrike Meyer
{"title":"Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation","authors":"Vincent Drury, Jakob Drees, Ulrike Meyer","doi":"10.1145/3600160.3604989","DOIUrl":"https://doi.org/10.1145/3600160.3604989","url":null,"abstract":"Phishing attacks are a persistent problem to users and organizations world-wide, resulting in monetary loss and providing a first step in more complex attacks. To improve the anti-phishing defensive efforts, this paper offers two main contributions: First, we present a novel categorization of phishing URLs with the goal of capturing the URL reading capabilities of untrained users and evaluate it in a user study. We find, that phishing URLs which are similar to the target URL when read from the left were the most complicated to classify in our study. Second, based on these results, we evaluate Reverse Domain Name (RDN) notation as an alternative URL notation where attacker-controlled information no longer makes up the left-most part of the URL. We evaluate the effect of using RDN notation in a second user study, and show that accuracies indeed improved for the relevant URL categories, and that users were significantly faster in their decisions compared to normal URL notation. Our results extend previous work aiming to understand users’ URL reading, provide recommendations when designing user studies including URL classification tests, and motivate further research into the potential advantages of RDN notation in practice.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-world actor-based image steganalysis via classifier inconsistency detection 现实世界中基于角色的图像隐写分析,通过分类器不一致检测
Daniel Lerch-Hostalot, D. Megías
{"title":"Real-world actor-based image steganalysis via classifier inconsistency detection","authors":"Daniel Lerch-Hostalot, D. Megías","doi":"10.1145/3600160.3605042","DOIUrl":"https://doi.org/10.1145/3600160.3605042","url":null,"abstract":"In this paper, we propose a robust method for detecting guilty actors in image steganography while effectively addressing the Cover Source Mismatch (CSM) problem, which arises when classifying images from one source using a classifier trained on images from another source. Designed for an actor-based scenario, our method combines the use of Detection of Classifier Inconsistencies (DCI) prediction with EfficientNet neural networks for feature extraction, and a Gradient Boosting Machine for the final classification. The proposed approach successfully determines whether an actor is innocent or guilty, or if they should be discarded due to excessive CSM. We show that the method remains reliable even in scenarios with high CSM, consistently achieving accuracy above 80% and outperforming the baseline method. This novel approach contributes to the field of steganalysis by offering a practical and efficient solution for handling CSM and detecting guilty actors in real-world applications.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Federated Learning for Speech-based Parkinson’s Disease Detection 探索基于语音的帕金森病检测的联邦学习
Athanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, M. Kourtis, P. Trakadas
{"title":"Exploring Federated Learning for Speech-based Parkinson’s Disease Detection","authors":"Athanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, M. Kourtis, P. Trakadas","doi":"10.1145/3600160.3605088","DOIUrl":"https://doi.org/10.1145/3600160.3605088","url":null,"abstract":"Parkinson’s Disease is the second most prevalent neurodegenerative disorder, currently affecting as high as 3% of the global population. Research suggests that up to 80% of patients manifest phonatory symptoms as early signs of the disease. In this respect, various systems have been developed that identify high risk patients by analyzing their speech using recordings obtained from natural dialogues and reading tasks conducted in clinical settings. However, most of them are centralized models, where training and inference take place on a single machine, raising concerns about data privacy and scalability. To address these issues, the current study migrates an existing, state-of-the-art centralized approach to the concept of federated learning, where the model is trained in multiple independent sessions on different machines, each with its own dataset. Therefore, the main objective is to establish a proof of concept for federated learning in this domain, demonstrating its effectiveness and viability. Moreover, the study aims to overcome challenges associated with centralized machine learning models while promoting collaborative and privacy-preserving model training.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes 信任方案互操作性:连接异构信任方案
Stefan More
{"title":"Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes","authors":"Stefan More","doi":"10.1145/3600160.3605046","DOIUrl":"https://doi.org/10.1145/3600160.3605046","url":null,"abstract":"The growing interconnectedness of computer systems has led to the need for a flexible approach to trust management. Many countries operate trust schemes to enable the automated assessment of the trustworthiness of information. But this assessment remains a challenge if the information was issued in a foreign trust scheme. An issue is the lack of a root of trust shared between the trust schemes. Other challenges are the heterogeneity of trust models used by entities operating in different legal and cultural environments. In this paper, we present a novel approach to facilitate the interoperability between different trust schemes. In our approach, trust scheme operators take legal agreements that exist between two countries and publish them as a machine-readable trust recognition. Additionally, a scheme operator codifies the rules for trust recognition of the other scheme in the form of a trust translation. Using this information, a trust verifier maps trust data from the other scheme into its own scheme. This allows a verifier to automatically process transactions from other trust schemes in a trustworthy way.","PeriodicalId":107145,"journal":{"name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信