2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)最新文献

筛选
英文 中文
Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems 应用设计思维设计隐私保护信息系统
M. Bargh, Sunil Choenni
{"title":"Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems","authors":"M. Bargh, Sunil Choenni","doi":"10.1109/TPS-ISA48467.2019.00032","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00032","url":null,"abstract":"Designing privacy-protecting Information Systems (ISs), i.e., realizing the Privacy by Design (PbD) principle, is a challenging task. This challenge stems from having many stakeholders and design trade-offs involved, which cause uncertainty in defining the problem, eliciting soft requirements, and making design trade-offs among many contending objectives. As creating a formal model of such settings is often infeasible, applying a conventional engineering design method alone may not result in elucidating users' needs and/or devising a viable design that is acceptable for all parties (e.g., end-users and data subjects). This contribution aims at enriching engineering approaches for privacy-protecting ISs with the so-called design-thinking approach. Design-thinking, initially used for product and service design, has been applied to the areas where there are interactions among people, organizations and technologies, in order to elucidate user needs and concerns that are insufficiently formulated and/or hidden in tacit knowledge. In this contribution, we elaborate on three main PbD components, namely problem space, solution space and mapping space. We, further, analyze the shortcomings of traditional engineering approaches for privacy protection as well as the potentials and shortcomings of design-thinking in general. Finally, we present our practical experience with applying the design-thinking approach to the problem of PbD for ISs. We foresee the applicability of design-thinking for elucidating the problem space as well as for making design trade-off among contending values in order to come up with a viable design option.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and Ethics 下一代智能建筑环境:移情、隐私和道德的融合
D. Gračanin, Ramoni O. Lasisi, M. Azab, M. Eltoweissy
{"title":"Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and Ethics","authors":"D. Gračanin, Ramoni O. Lasisi, M. Azab, M. Eltoweissy","doi":"10.1109/TPS-ISA48467.2019.00041","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00041","url":null,"abstract":"Smart Built Environments (SBEs) and similar cyber-physical environments utilizing the Internet of Things (IoT) have been a growing research area in recent years. Contemporary research primarily addresses technology aspects, while human aspects, such as empathy, privacy and ethics (EPE for short), in relation to SBEs have not yet received adequate attention. In addition to challenges with respect to technology, there are apparent tensions and conflicting requirements involving EPE. On the other hand, opportunities exist for these aspects to support one another. For example, data collected and analyzed for empathic response may be used to alert the privacy-preserving subsystem. An ethical response may turn out to be the most empathic. The main objective of this paper is to present our vision for next generation SBEs and to explore pertinent EPE factors. We propose a unified framework that incorporates a game theoretic model to address EPE interplay in SBEs. Integral to our framework, we also introduce the use of a blockchain infrastructure for the critical need to support data integrity in such data-intensive environments. We illustrate our work in progress using an example. We then present major research challenges for the realization of next generation SBEs with fused EPE.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Factoring RSA Keys in the IoT Era 物联网时代的RSA密钥分解
Jonathan Kilgallin, Ross Vasko
{"title":"Factoring RSA Keys in the IoT Era","authors":"Jonathan Kilgallin, Ross Vasko","doi":"10.1109/TPS-ISA48467.2019.00030","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00030","url":null,"abstract":"RSA keys are at risk of compromise when using improper random number generation. Many weak keys can efficiently be discovered and subsequently compromised by finding reused prime factors in a large data set. We collect and analyze 75 million RSA certificates from the Internet, and find that 1 in 172 keys share a factor with another. In contrast, only 5 of 100 million certificates found in a sample from Certificate Transparency logs are compromised by the same technique. The discrepancy in rates of compromise is overwhelmingly due to IoT devices exposed to the Internet, which may be subject to design constraints and limited entropy. The widespread susceptibility of these IoT devices poses a potential risk to the public due to their presence in sensitive settings. We conclude that device manufacturers must ensure their devices have access to sufficient entropy and adhere to best practices in cryptography to protect consumers.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Performance Evaluation of CAN Encryption CAN加密的一种性能评价
Hanlin Chen, B. Yang
{"title":"A Performance Evaluation of CAN Encryption","authors":"Hanlin Chen, B. Yang","doi":"10.1109/TPS-ISA48467.2019.00025","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00025","url":null,"abstract":"Recent research on vehicular cybersecurity has highlighted the known vulnerabilities and exploits that plague in-vehicular networks; in particular, the communication protocol governing the in-vehicular network, the Control Area Network (CAN), has been a frequent and often fruitful target of related attacks. Accordingly, the focus of this project is to investigate the application of encryption algorithms to the in-vehicular network and evaluate the performance characteristics of said algorithms when used in this context. This current paper includes examination of a) the maximum acceptable latency based on the vehicular requirements as well as b) the latency in communication when employing various encryption algorithms. In Hardware-In-the-Loop (HIL) simulations, our work suggests that in-vehicular networks can absorb the latencies introduced by select encryption approaches and still satisfy the real-time requirements needed by the intra-vehicular communication system to avoid collisions and the like.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust (Deep) Learning Framework Against Dirty Labels and Beyond 抗脏标签的鲁棒(深度)学习框架
Amirmasoud Ghiassi, Taraneh Younesian, Zilong Zhao, R. Birke, V. Schiavoni, L. Chen
{"title":"Robust (Deep) Learning Framework Against Dirty Labels and Beyond","authors":"Amirmasoud Ghiassi, Taraneh Younesian, Zilong Zhao, R. Birke, V. Schiavoni, L. Chen","doi":"10.1109/TPS-ISA48467.2019.00038","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00038","url":null,"abstract":"Data is generated with unprecedented speed, due to the flourishing of social media and open platforms. However, due to the lack of scrutinizing, both clean and dirty data are widely spreaded. For instance, there is a significant portion of images tagged with corrupted dirty class labels. Such dirty data sets are not only detrimental to the learning outcomes, e.g., misclassified images into the wrong classes, but also costly. It is pointed out that bad data can cost the U.S. up to a daunting 3 trillion dollars per year. In this paper, we address the following question: how prevailing (deep) machine learning models can be robustly trained given a non-negligible presence of corrupted labeled data. Dirty labels significantly increase the complexity of existing learning problems, as the ground truth of label’s quality are not easily assessed. Here, we advocate to rigorously incorporate human experts into one learning framework where both artificial and human intelligence collaborate. To such an end, we combine three strategies to enhance the robustness for deep and regular machine learning algorithms, namely, (i) data filtering through additional quality model, (ii) data selection via actively learning from expert, and (iii) imitating expert’s correction process. We demonstrate three strategies sequentially with examples and apply them on widely used benchmarks, such as CIFAR10 and CIFAR100. Our initial results show the effectiveness of the proposed strategies in combating dirty labels, e.g., the resulting classification can be up to 50% higher than the state-of-the-art AI-only solutions. Finally, we extend the discussion of robust learning from the trusted data to the trusted execution environment.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency 通过提高资源利用一致性的诱饵进程对抗恶意软件
Sara Sutton, Benjamin Bond, Sementa Tahiri, J. Rrushi
{"title":"Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency","authors":"Sara Sutton, Benjamin Bond, Sementa Tahiri, J. Rrushi","doi":"10.1109/TPS-ISA48467.2019.00022","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00022","url":null,"abstract":"The concept of a decoy process is a new development of defensive deception beyond traditional honeypots. Decoy processes can be exceptionally effective in detecting malware, directly upon contact or by redirecting malware to decoy I/O. A key requirement is that they resemble their real counterparts very closely to withstand adversarial probes by threat actors. To be usable, decoy processes need to consume only a small fraction of the resources consumed by their real counterparts. Our contribution in this paper is twofold. We attack the resource utilization consistency of decoy processes provided by a neural network with a heatmap training mechanism, which we find to be insufficiently trained. We then devise machine learning over control flow graphs that improves the heatmap training mechanism. A neural network retrained by our work shows higher accuracy and defeats our attacks without a significant increase in its own resource utilization.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Contextualizing Consensus Protocols in Blockchain: A Short Survey 区块链中的共识协议语境化:一个简短的调查
G. Bashar, G. Hill, Subroto Singha, Praneeth Babu Marella, Gaby G. Dagher, Jidong Xiao
{"title":"Contextualizing Consensus Protocols in Blockchain: A Short Survey","authors":"G. Bashar, G. Hill, Subroto Singha, Praneeth Babu Marella, Gaby G. Dagher, Jidong Xiao","doi":"10.1109/TPS-ISA48467.2019.00031","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00031","url":null,"abstract":"Consensus protocols are mechanisms that enable a group of entities to reach an agreement on a specific subject. In blockchain systems, consensus protocols are the cornerstone of achieving security and scalability. They not only enable nodes in the network to agree on the valid information that can be added to the ledger while keeping all nodes synchronized, they also establish the sequence of order in which blocks (and consequently transactions) are affixed. In this paper, we provide a comprehensive review of the working principles of the most commonly used consensus protocols in blockchain-based cryptocurrencies. We categorize them based on their permission requirements and perform a thorough comparative evaluation. More specifically, we identify computational difficulty, barrier for entry, platform utilization, and weaknesses in terms of scalability and fairness.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources 中央属性授权(CAA):组织资源无缝共享的愿景
Saptarshi Das, S. Sural, Jaideep Vaidya, V. Atluri
{"title":"Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources","authors":"Saptarshi Das, S. Sural, Jaideep Vaidya, V. Atluri","doi":"10.1109/TPS-ISA48467.2019.00034","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00034","url":null,"abstract":"Organizations deploy various types of access control systems for protecting their resources from unauthorized access. Choice of the underlying access control model is guided by the types of security policies required to be specified in individual organizations. Two of the most popular existing and upcoming ac- cess control models, namely, Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), in their basic forms can effectively enforce secure access to the resources of standalone organizations. However, recent growth in distributed operations of most organizations calls for an urgent need to collaborate for achieving collective goals through resource sharing. With dis- parate access control models deployed in different organizations or even in the subsidiaries of the same organization, such sharing presents an exigent situation. In this paper, we introduce the vision of a framework called Central Attribute Authority (CAA) that facilitates seamless sharing of organizational resources over heterogeneous access control models.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security 面向物联网安全的椭圆曲线加密的RNS实现
J. Pandey, Chhavi Mitharwal, A. Karmakar
{"title":"An RNS Implementation of the Elliptic Curve Cryptography for IoT Security","authors":"J. Pandey, Chhavi Mitharwal, A. Karmakar","doi":"10.1109/TPS-ISA48467.2019.00017","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00017","url":null,"abstract":"Public key cryptography plays a vital role in many information and communication systems for secure data transaction, authentication, identification, digital signature, and key management purpose. Elliptic curve cryptography (ECC) is a widely used public key cryptographic algorithm. In this paper, we propose a hardware-software codesign implementation of the ECC cipher. The algorithm is modelled in C language. Compute-intensive components are identified for their efficient hardware implementations. In the implementation, residue number system (RNS) with projective coordinates are utilized for performing the required arithmetic operations. To manage the hardware-software codeign in an integrated fashion Xilinx platform studio tool and Virtex-5 xc5vfx70t device based platform is utilized. An application of the implementation is demonstrated for encryption of text and its respective decryption over prime fields. The design is useful for providing an adequate level of security for IoTs.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography 开放tee不再是虚拟的:使用白盒加密迈向仅软件可信的执行环境
K. Bicakci, Ihsan Kagan Ak, Betul Askin Ozdemir, M. Gozutok
{"title":"Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography","authors":"K. Bicakci, Ihsan Kagan Ak, Betul Askin Ozdemir, M. Gozutok","doi":"10.1109/TPS-ISA48467.2019.00029","DOIUrl":"https://doi.org/10.1109/TPS-ISA48467.2019.00029","url":null,"abstract":"Trusted Execution Environments (TEEs) provide hardware support to isolate the execution of sensitive operations on mobile phones for improved security. However, they are not always available to use for application developers. To provide a consistent user experience to those who have and do not have a TEE-enabled device, we could get help from Open-TEE, an open-source GlobalPlatform (GP)-compliant software TEE emulator. However, Open-TEE does not offer any of the security properties hardware TEEs have. In this paper, we propose WhiteBox-TEE which integrates white-box cryptography with Open-TEE to provide better security while still remaining complaint with GP TEE specifications. We discuss the architecture, provisioning mechanism, implementation highlights, security properties and performance issues of WhiteBox-TEE and propose possible revisions to TEE specifications to have better use of white-box cryptography in software-only TEEs.","PeriodicalId":129820,"journal":{"name":"2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信