Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just
{"title":"Tracking Mixed Bitcoins","authors":"Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just","doi":"10.2139/ssrn.3701657","DOIUrl":"https://doi.org/10.2139/ssrn.3701657","url":null,"abstract":"Mixer services purportedly remove all connections between the input (deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seemingly rendering taint analysis tracking ineffectual. In this paper, we introduce and explore a novel tracking strategy, called emph{Address Taint Analysis}, that adapts from existing transaction-based taint analysis techniques for tracking Bitcoins that have passed through a mixer service. We also investigate the potential of combining address taint analysis with address clustering and backward tainting. We further introduce a set of filtering criteria that reduce the number of false-positive results based on the characteristics of withdrawn transactions and evaluate our solution with verifiable mixing transactions of nine mixer services from previous reverse-engineering studies. Our finding shows that it is possible to track the mixed Bitcoins from the deposited Bitcoins using address taint analysis and the number of potential transaction outputs can be significantly reduced with the filtering criteria.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115722839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko
{"title":"Development of Methodological Foundations for Designing a Classifier of Threats to Cyber-physical Systems","authors":"O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko","doi":"10.15587/1729-4061.2020.205702","DOIUrl":"https://doi.org/10.15587/1729-4061.2020.205702","url":null,"abstract":"The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proof Of The ABC Conjecture.","authors":"Michael C. I. Nwogugu","doi":"10.2139/ssrn.3601689","DOIUrl":"https://doi.org/10.2139/ssrn.3601689","url":null,"abstract":"In this article, its shown that the ABC Conjecture is correct for integers a+b=c, and any real number r>1. This article proposes that the ABC Conjecture is true iff: c>0.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Khaki, Somar Al-Mohamad, Walid Bakry, Samet Gunay
{"title":"Can Cryptocurrencies Be a Future Safe Haven for Investors? A Case Study of Bitcoin","authors":"A. Khaki, Somar Al-Mohamad, Walid Bakry, Samet Gunay","doi":"10.2139/ssrn.3593508","DOIUrl":"https://doi.org/10.2139/ssrn.3593508","url":null,"abstract":"Purpose: This study attempts to determine whether or not Bitcoin prices are affected by real economic activity, financial markets, and foreign exchange markets; and whether Bitcoin has the potential to be a safe haven for investors. \u0000 \u0000Background: Cryptocurrencies in general, and Bitcoin in particular, have generated a huge interest from both practitioners and academicians as an alternative mechanism for electronic payment systems. While some argue that “Bitcoin works in practice, but not in theory”, others argue that Bitcoin’s stability depends on unknown variables in unknown combination, and thus it is difficult if not impossible to model precisely, thereby raising doubts about the soundness of the system. The research community should assume the task of precisely identifying the factors driving Bitcoin prices, and develop some theoretical foundation to help understand how Bitcoin will be affected when the legal environment and practices change. \u0000 \u0000Significance of the Study: The extensive discussion of Bitcoin on blogs and in the mainstream financial media has primarily focused on the cryptocurrency’s technical, legal and safety issues. Even the limited academic research on the subject has focused on the technical and safety issues, leaving the question of financial and economic aspects largely untouched. The present study thus seeks to determine the extent to which Bitcoin is affected, if at all, by changes in economic growth, financial markets, and forex markets. The paper also seeks to determine whether Bitcoin behaves differently from forex markets and financial markets and if it has a hedging or diversification potential? \u0000 \u0000Design/methodology/approach: A Markov regime-switching regression model is employed in this study to determine the relationship between real economic activity (proxied by the Baltic Dry Index), financial markets (proxied by the Dow Jones Industrial Average Index), and foreign exchange markets (proxied by the USD-Euro & USD-Yen exchange rates). \u0000 \u0000Findings: The results indicate that, unlike USD-Euro and USD-Yen exchange rates, Bitcoin exhibits significantly different behavior in terms of its association with other financial and economic variables. While equity markets or forex markets are significantly related to each other in varying levels in both the bullish and the bearish regimes, real economic activity appears to be unrelated to either of them. Bitcoin meanwhile, is affected neither by real economic activity, nor equity markets, nor forex markets in either bullish and the bearish regimes. Indeed, it differs significantly in its behavior from forex markets. Furthermore, the results indicate that Bitcoin tends largely to exhibit a bullish trend and the probability of transition to a bearish trend is very small. Thus, it can be concluded that Bitcoin may offer potential for both hedging and diversification to varying degrees. \u0000 \u0000Originality/value: Although the technical, legal and safety issues in cryptocurrencies ha","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Piracy Lead to Product Abandonment or Stimulate New Product Development?: Evidence from Mobile Platform-Based Developer Firms","authors":"M. Miric, L. Jeppesen","doi":"10.1002/smj.3208","DOIUrl":"https://doi.org/10.1002/smj.3208","url":null,"abstract":"With the growth of digital platforms, understanding the role of property rights on those platforms has become increasingly important. Digital piracy, the unauthorized copying and distribution of digital products, is therefore an important strategic issue, both because of lost revenues and because it is thought to decrease innovation. Yet, while the latter effect is often argued, empirical evidence is limited. We study whether piracy affects innovation and whether it leads firms to shift to different types of innovations. By studying a large piracy event in a mobile app marketplace, we find that piracy leads to a decrease in the release of incremental innovations, such as bug fixes, but does not decrease more substantial revisions. Additionally, it is associated with subsequent new product development.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forming a Method for Determining the Coordinates of Sound Anomalies Based on Data From a Computerized Microphone System","authors":"Alexander Trunov, Zhan Byelozyorov","doi":"10.15587/1729-4061.2020.201103","DOIUrl":"https://doi.org/10.15587/1729-4061.2020.201103","url":null,"abstract":"Special features in the process of determining the coordinates of sound anomalies according to the sound series were considered. Sound anomalies have been shown to be a source of information about events, phenomena that are already occurring, or are their harbingers. It has been stated that audio interception systems complement thermal imagers and provide savings in financial and human resources when used in combination with the benefits of unmanned aerial vehicles. The methods facilitating solution of the problem of surveillance and prediction by finding coordinates of sound anomalies were presented. Indirect methods for solving problems of searching for sound anomaly coordinates with three microphones in accordance with a linear scheme of approximants and linear and quadratic approximation were proposed. Solutions were reduced to analytical complete expressions that make it possible to calculate coordinates according to the input conditions for three or four microphones. Also, a problem of finding coordinates of a sound anomaly for three and four microphones was set and solved by direct methods. Solutions were presented as expressions that make it possible to calculate coordinates of sound anomalies. Numerical experiments were performed during which coordinates of sound anomalies, the absolute error of their determination at each iteration, and total time spent for calculation were found. Systems with coordinates of microphones and sound sources almost identical or coinciding have been shown to have the greatest error. Under these conditions, for direct methods, values of the equation coefficients decreased to almost zero or turned to zero and the difference of values of the sought coordinates between iterations increased sharply which slowed down the process of solution convergence. It was shown that the application of approximate methods to the search for coordinates by solving the minimization problems with the involvement of the recurrent approximation method makes it possible to construct simple algorithms. Their implementation to solve the problems of numerical experiments has given quick and practically accurate coordinate values. It was found, that the application of algorithms to the methods of logical analysis and rules of logical inference reduces the number of iterations and the total calculation time","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Device Security Issues in Digital Literacy for Higher Learning Institution","authors":"Shekh Abdullah-Al-Musa Ahmed","doi":"10.47252/teniat.v8i1.291","DOIUrl":"https://doi.org/10.47252/teniat.v8i1.291","url":null,"abstract":"Keselamatan mudah alih, atau lebih khusus keselamatan peranti mudah alih, menjadi semakin penting dalam pengkomputeran mudah alih untuk literasi digital. Literasi digital adalah kumpulan kecekapan yang diperlukan untuk penyertaan penuh dalam pengetahuan masyarakat. Ini merangkumi pengetahuan, kemahiran, dan tingkah laku yang melibatkan penggunaan alat digital yang berkesan seperti telefon pintar, tablet, komputer riba untuk tujuan komunikasi, ekspresi, kolaborasi dan sokongan. Yang menjadi perhatian utama ialah keselamatan institusi pengajian tinggi kini disimpan di telefon pintar. Seiring dengan perkembangan ini muncul sejumlah masalah keselamatan yang mempengaruhi peranti mudah alih. Peluang untuk memiliki peranti kecil dan kuat yang dihubungkan dengan internet membolehkan komunikasi berlaku dari mana sahaja di institusi pengajian tinggi. Di institusi pengajian tinggi, yang telah melekatkan telefon pintar peribadi mereka ke rangkaian institusi telah mengetahui cara mudah untuk melakukannya. Secara khusus, ada beberapa kes di mana pelajar telah membenarkan capaian peranti mudah alih peribadinya ke rangkaian institusi pengajian tinggi. Walau bagaimanapun, pentadbir sistem menghantar arahan jarak jauh ke peranti dan memerintahkannya untuk menyimpan semua data agar tidak jatuh ke tangan yang salah. Oleh itu kini wujud istilah rooting pada peranti Android. Hal merujuk kepada proses mendapatkan akses root ke peranti. Biasanya, ini melibatkan aplikasi atau skrip yang memberikan akses root kepada pengguna. Setelah akses diberikan, pengguna di institusi pengajian tinggi, dapat melakukan apa sahaja yang diinginkan tanpa sekatan. Namun, salah satu kelemahan proses ini adalah peranti ini terdedah kepada bahaya yang lebih besar dari ancaman luaran. Justeru artikel ini memberi tumpuan kepada masalah keselamatan peranti mudah alih dalam dunia digital di institusi pengajian tinggi. Hal ini bertujuan supaya pelajar institusi memiliki kebolehan kritis dan kreatif ketika melayari media massa, budaya popular dan media digital. Oleh kerana media digital menggunakan telefon pintar untuk maklumat dan artikel ini juga merujuk cara menjaga keselamatan data telefon pintar ini memandangkan kadar capaian maklumat yang semakin kerap dan cepat. \u0000 \u0000Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the h","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bitcoins as Property: Welcome Clarity?","authors":"K. F. Low","doi":"10.2139/ssrn.3538956","DOIUrl":"https://doi.org/10.2139/ssrn.3538956","url":null,"abstract":"In AA v Persons Unknown & Ors, Re Bitcoin [2019] EWHC 3556 (Comm), Bryan J offered the first reasoned judgment for deciding that bitcoins were property under English law for the purposes of an interim proprietary injunction, following similar, less fully reasoned, decisions in Vorotyntseva v Money-4 Ltd, t/a Nebeus.com [2018] EWHC 2598 (Ch) by Birss J and Liam David Robertson v Persons Unknown (unreported 15 July 2019) by Moulder J, and also relying upon the controversial decision of the Singapore International Commercial Court in B2C2 Ltd v Quoine Pte Ltd [2019] SGHC(I) 3; [2019] 4 SLR 17. This paper critiques the court's conclusion that bitcoins are an intangible property but not a chose in action.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Enforcement of a Data Protection: A Model for Risk-Based Supervision Using Responsive Regulatory Tools","authors":"M. Raghavan, Beni Chugh, Nishanth Kumar","doi":"10.2139/ssrn.3552665","DOIUrl":"https://doi.org/10.2139/ssrn.3552665","url":null,"abstract":"This paper presents ideas for a new approach to enforcement of a data protection regime, based on risk-based supervision and the use of a range of responsive enforcement tools that could be deployed in advance of a breach to prevent it, or after a breach to mitigate the effects. Building on the risk-based approach to supervision, the model proposes a methodology to identify those entities that potentially pose more risk (to individuals and the system) when the personal data they hold is compromised.<br><br>Part 2 of this paper proposes a risk-based framework to identify and classify entities based on the risk they pose when the personal data they hold is compromised, using both qualitative and quantitative components. Part 3 sets out an enforcement toolkit for data protection, guided by the paradigm of responsive regulation (that also employs ex ante tools) to prevent and mitigate the effects of a compromise of personal data. This approach is a departure from the post-data breach sanctions that currently dominate data protection regimes worldwide. Part 4 sets out the features of institutional design and inter-sectoral coordination required for effective implementation of such a model approach for risk-based supervision and enforcement of data protection rights.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Assurance with Special Reference to the Security Content Automation Protocol (SCAP) — An Overview","authors":"P. Paul, P. Aithal","doi":"10.2139/ssrn.3497723","DOIUrl":"https://doi.org/10.2139/ssrn.3497723","url":null,"abstract":"Information Assurance, in short, is called as IA. This is responsible for securing information systems and computing. The term holds the highest degree of security related affairs. In generally Computer Security considered as a branch and area of security but now apart from this, Information Security, IT Security, and Information Assurance considered as important. And among these, security related domain Information Assurance treated as broader and interdisciplinary. Moreover, this Information Assurance holds all the areas and dealing of IT Security and Information Security but additionally, it is responsible for the designing, development of policies, regulation and guidelines of security related projects /proposal, etc. And among the administrative and protocol related affairs Security Content Automation Protocol treated as important. In short, it is called as SCAP. It is a kind of method for using specific standards for the purpose of enabling vulnerability management systems in an automated way for the measurement as well as policy compliance assessment regarding the systems inbuilt in a company or institutions; that may include IT company or may not be. This is a conceptual paper, initially, it has discussed with the areas of Information Assurance but gradually it has described about the Security Content Automation Protocol; including its aim and objectives, versions, etc. paper mentioned all the areas in short and simple sense.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130865016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}