{"title":"Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost","authors":"Gaurav Pareek, B. Purushothama","doi":"10.1145/3264437.3264480","DOIUrl":"https://doi.org/10.1145/3264437.3264480","url":null,"abstract":"Hierarchical access control is for scenarios where some users have access to more organization data than others. In this paper, we propose an efficient key assignment scheme for dynamic hierarchies that features constant decryption cost and does not require any expensive operations like bilinear pairing. The proposed hierarchical key assignment scheme is secure against strong key distinguishability attacks. It also supports dynamic updates like addition and deletion of classes in the hierarchy with efficient procedures for preserving forward and backward secrecy. Another important highlight of the proposed scheme is that secret keys of none of the users have to be updated to preserve forward and backward secrecy in case of dynamic updates. Proposed is the first dynamic hierarchical key assignment scheme whose key derivation procedure has constant computation cost and is pairing-free with strong key indistinguishability.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131001516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems","authors":"Igor Kotenko, S. Ageev, I. Saenko","doi":"10.1145/3264437.3264487","DOIUrl":"https://doi.org/10.1145/3264437.3264487","url":null,"abstract":"The paper offers an approach for implementation of intelligent agents intended for network traffic and security risk analysis in cyber-physical systems. The agents are based on the algorithm of pseudo-gradient adaptive anomaly detection and fuzzy logical inference. The suggested algorithm operates in real time. The fuzzy logical inference is used for regulation of algorithm parameters. The variants of the implementation are proposed. The experimental assessment of the approach confirms its high speed and adequate accuracy for network traffic analysis.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126653302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 11th International Conference on Security of Information and Networks","authors":"","doi":"10.1145/3264437","DOIUrl":"https://doi.org/10.1145/3264437","url":null,"abstract":"submission:23 May, 2019 International Advisory Committee: • Xiantu He (Chair), IAPCM & Zhejiang University, China • Yuanping Feng, National University of Singapore, Singapore • Chi-Wang Shu, Brown University, USA • Choy Heng Lai, National University of Singapore, Singapore • Da Hsuan Feng, China Silk Road iValley Research Institute • Guoyong Fu, Zhejiang University • Hui PAN, University of Macau • Jisoon Ihm, POSTECH,Korea • Lev Shchur, Laudau Institute for Theoretical Physics, Russia • Remi Abgrall, University of Zurich, Switzerland • Shi Jin, University of Wisconsin, USA • Shi-Yi Chen, Southern University of Science and Technology of China • Steven G. Louie, University of California at Berkeley, USA • Tao Tang, Southern University of Science and Technology of China • Vijay Kumar, Foundation, India • Weiyan Zhang, China Academy of Engineering Physics, China Local Organizing Committee: • Zheng-Mao Sheng (Chair) Kai Wang (Co-Chair) • Bo Zheng Zhiwei Ma • Huichun Wu Qinghu Chen • Jingyuan Li Jianlan Wu • Jianbo Zhang J. Q. You","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of packaged and encrypted PE files with the use of machine-learning algorithm","authors":"R. Gevorgyan, E. Abramov","doi":"10.1145/3264437.3264481","DOIUrl":"https://doi.org/10.1145/3264437.3264481","url":null,"abstract":"There were distinguished static and dynamic features of packaged and encrypted program files; a training sample is created on the basis of their co-delivery. Machine learning methods were used to build a classifier for detection of packaged or encrypted files.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems","authors":"A. Branitskiy, Igor Kotenko","doi":"10.1145/3264437.3264488","DOIUrl":"https://doi.org/10.1145/3264437.3264488","url":null,"abstract":"The paper is devoted to a model, technique and software tool for testing network attack detection systems (ADSs) from the point of view of the correct functioning of their internal packet analyzer. A client-server architecture of the software tool for generating the low-level network attacks is described. The paper outlines the experimental results of testing several ADSs by using the implemented software tool. The results of experiments, aimed at testing the ADSs on the ability to detect evasion and insertion attacks, are presented. We analyze the reaction of ADSs in response to various network packets subjected to various transformations at the levels both of IP and TCP protocols. Recommendations aimed at detecting and preventing such situations in computer networks are proposed.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Levonevskiy, L. Fedorchenko, I. Afanasieva, F. Novikov
{"title":"Architecture of the Software System for Adaptive Protection of Network Infrastructure","authors":"D. Levonevskiy, L. Fedorchenko, I. Afanasieva, F. Novikov","doi":"10.1145/3264437.3264467","DOIUrl":"https://doi.org/10.1145/3264437.3264467","url":null,"abstract":"The article considers an example of an adaptive protection system focused on protection from heterogeneous misinforming impacts to computer networks. The system adaptation to the current conditions is being performed by means of its reconfiguring. Reconfiguring implies adjusting particular blocks of the system to the current situation, as well as selecting appropriate methods of revealing false information in heterogeneous data. Reconfiguring is based on the automata objects model. As an example, data exchange TLS protocol is considered.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint","authors":"E. Maro, M. Kovalchuk","doi":"10.1145/3264437.3264439","DOIUrl":"https://doi.org/10.1145/3264437.3264439","url":null,"abstract":"The article describes a direct attack to bypass devices lock system by using fingerprint verification. We use method of creating a gelatin artificial fingerprints to bypass the locking system of smartphones, laptop and tablet. The experiment confirmed the possibility of bypassing fingerprint protection without the need for expensive tools or high-quality fingerprint samples. The artificial fingerprints were tested to unlock iPhone 6, iPhone 8, Samsung Galaxy S8 and Meizu m5s smartphones, COBO C2 USB Fingerprint Module, iPad Air 2, Schenker XMG A507 laptop. We obtained experimental data on the percentage of the probability to bypass fingerprint lock system for tested devices.","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things","authors":"Felisberto Semedo, N. Moradpoor, Majid Rafiq","doi":"10.1145/3264437.3264438","DOIUrl":"https://doi.org/10.1145/3264437.3264438","url":null,"abstract":"The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by far one of the biggest challenges in IoT networks. This includes secure routing which involves the secure creation of traffic routes and secure transmission of routed packets from a source to a destination. The Routing Protocol for Low-power and Lossy network (RPL) is one of the popular IoT's routing protocol that supports IPv6 communication. However, it suffers from having a basic system for supporting secure routing procedure which makes the RPL vulnerable to many attacks. This includes rank attack manipulation. Objective Function (OF) is one of the extreme importance features of RPL which influences an IoT network in terms of routing strategies as well as network topology. However, current literature lacks study of vulnerability analysis of OFs. Therefore, this paper aims to investigate the vulnerability assessment of OF of RPL protocol. For this, we focus on the rank attack manipulation and two popular OFs: Objective Function Zero (OF0) and the Minimum Rank with Hysteresis Objective Function (MRHOF).","PeriodicalId":130946,"journal":{"name":"Proceedings of the 11th International Conference on Security of Information and Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}