2014 10th International Conference on Information Assurance and Security最新文献

筛选
英文 中文
TWalker: An efficient taint analysis tool 一个有效的污染分析工具
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064628
Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang
{"title":"TWalker: An efficient taint analysis tool","authors":"Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang","doi":"10.1109/ISIAS.2014.7064628","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064628","url":null,"abstract":"The taint analysis method is usually effective for vulnerabilities detection. Existing works mostly care about the accuracy of taint propagation, not considering the time cost. We proposed a novel method to improve the efficiency of taint propagation with indices. Based our method, we have implemented TWalker, an effective vulnerabilities detection tool that enables easy data flow analysis of the real world programs, providing faster taint analysis than other existing works. TWalker has four properties: first, it works directly on the programs without source code; second, it monitors the program's execution and records its necessary context; third, it delivers fine-grained taint analysis, providing fast taint propagation with indices; fourth, it could detect vulnerabilities effectively based on two security property rules. We have evaluated TWalker with several real world programs and compared it with a typical taint analysis tool. The experimental results show that our tool could perform taint propagation much faster than other tool, having better ability for vulnerabilities detection.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification 通过延迟完整性验证实现AMI中安全的端到端数据聚合
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064626
S. Keoh, Zhaohui Tang
{"title":"Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification","authors":"S. Keoh, Zhaohui Tang","doi":"10.1109/ISIAS.2014.7064626","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064626","url":null,"abstract":"The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing. Any malicious tampering to the data must be detected immediately. This paper introduces secure end-to-end data aggregation for AMI, a security protocol that allows the concentrators to securely aggregate the data collected from the smart meters, while enabling the utility back-end that receives the aggregated data to verify the integrity and data originality. Compromise of concentrators can be detected. The aggregated data is protected using Chameleon Signatures and then forwarded to the utility back-end for verification, accounting, and analysis. Using the Trapdoor Chameleon Hash Function, the smart meters can periodically send an evidence to the utility back-end, by computing an alternative message and a random value (m', r) such that m' consists of all previous energy usage measurements of the smart meter in a specified period of time. By verifying that the Chameleon Hash Value of (m', r) and that the energy usage matches those aggregated by the concentrators, the utility back-end is convinced of the integrity and authenticity of the data from the smart meters. Any data anomaly between smart meters and concentrators can be detected, thus indicating potential compromise of concentrators.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of excerpt query process for Packet Attribution System 包归属系统摘录查询过程的优化
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064618
Shesha Shila Bharadwaj Renukuntla, Shatrunjay Rawat
{"title":"Optimization of excerpt query process for Packet Attribution System","authors":"Shesha Shila Bharadwaj Renukuntla, Shatrunjay Rawat","doi":"10.1109/ISIAS.2014.7064618","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064618","url":null,"abstract":"Internet and its applications have increased to an enormous extent in the past decade. As the usage increased, it has also exposed its users to various security threats. Network forensic techniques can be used to traceback the source and the path of an attack that can be used as a legal evidence in a court of law. Packet attribution techniques like Source Path Isolation (SPIE), Block Bloom Filter (BBF), Hierarchical Bloom Filter (HBF) are proposed to store the packet data into the bloom filters at each router present in the network. All the routers in the Autonomous System (AS) are queried for presence of excerpt in their bloom filters to traceback source and path of attack. Upon receiving the excerpt query, each router search their bloom filters for presence of excerpt and send the result to NMS. NMS receives the response from routers and determines the traceback path from victim to source of attack. In this process, all the routers are engaged in searching the bloom filters, causing possible delay in performing actual routing tasks. This degrades network performance and may adversely affect QoS of network. To address potential performance issues, in this paper, we propose query optimization techniques, reducing the number of routers to be searched to a great extent, without adversely affecting storage and processing requirements as compared to existing attribution methods.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context-aware intrusion alerts verification approach 上下文感知的入侵警报验证方法
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064620
Sherif Saad, I. Traoré, Marcelo Luiz Brocardo
{"title":"Context-aware intrusion alerts verification approach","authors":"Sherif Saad, I. Traoré, Marcelo Luiz Brocardo","doi":"10.1109/ISIAS.2014.7064620","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064620","url":null,"abstract":"Intrusion detection systems (IDSs) produce a massive number of intrusion alerts. A huge number of these alerts are false positives. Investigating false positive alerts is an expensive and time consuming process, and as such represents a significant problem for intrusion analysts. This shows the needs for automated approaches to eliminate false positive alerts. In this paper, we propose a novel alert verification and false positives reduction approach. The proposed approach uses context-aware and semantic similarity to filter IDS alerts and eliminate false positives. Evaluation of the approach with an IDS dataset that contains massive number of IDS alerts yields strong performance in detecting false positive alerts.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cluster Head election in Wireless Sensor Networks 无线传感器网络中的簇头选举
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064625
Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki
{"title":"Cluster Head election in Wireless Sensor Networks","authors":"Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki","doi":"10.1109/ISIAS.2014.7064625","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064625","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of a collection of cheap, easy to deploy Sensor nodes arranged together to fulfill a specific purpose (monitoring, tracking ...etc.). A WSN network is composed of a Base Station (BS) and collection of sensors. There are a lot of approaches for the network construction. Amongst them is the hierarchical structure, where the network is divided into clusters and the node inside this cluster communicates with BS through a chosen leader called Cluster Head (CH). In this paper, we present cluster-Head election algorithms for WSNs. We will discuss the operations of these algorithms, and compare their performance.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132248708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A novel psychovisual model on an independent video frame for an almost lossless compression 一种基于独立视频帧的几乎无损压缩的心理视觉模型
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064621
N. A. Abu, M. Ariffin
{"title":"A novel psychovisual model on an independent video frame for an almost lossless compression","authors":"N. A. Abu, M. Ariffin","doi":"10.1109/ISIAS.2014.7064621","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064621","url":null,"abstract":"A psychoacoustic model is well established in an audio coding. From the beginning of computer audio era since the previous century, an audio coding has already operated on a large one-dimensional fast Fourier transform(FFT) as a basic industrial coding. This paper investigates a quantitative experimental impact on almost lossless image compression based on the concept of psychovisual threshold. This paper proposes a practical image coding on large two-dimensional discrete cosine transform(DCT). A psychovisual model is presented following the psychoacoustic quite threshold as a just noticeable difference instead of a quantization table. An experimental result on large rectangular images shall be presented. This framework can easily produce higher quality images at a competitive compression rate in addition to an extended adaptive JPEG compression standard.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Web Application Firewalls to detect advanced SQL injection attacks 改进Web应用防火墙以检测高级SQL注入攻击
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064617
Abdelhamid Makiou, Y. Begriche, A. Serhrouchni
{"title":"Improving Web Application Firewalls to detect advanced SQL injection attacks","authors":"Abdelhamid Makiou, Y. Begriche, A. Serhrouchni","doi":"10.1109/ISIAS.2014.7064617","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064617","url":null,"abstract":"Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our model is a hybrid Injection Prevention System (HIPS) which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114357736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Secure firmware architecture using virtual hard disks 使用虚拟硬盘的安全固件架构
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064622
J. Sim, Jungchan Na
{"title":"Secure firmware architecture using virtual hard disks","authors":"J. Sim, Jungchan Na","doi":"10.1109/ISIAS.2014.7064622","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064622","url":null,"abstract":"Recently, smart devices have rapidly become ubiquitous; however, vulnerability attacks that target the devices' firmware have increased apace. Despite efforts to defend against such attacks, embedded devices have not been applied because the devices have restricted resources. In this paper, we describe an architecture that can rapidly verify integrity and enables delta updates that only include the data modifications of the original data using virtual hard disks.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic generation of correlation rules to detect complex attack scenarios 自动生成关联规则,检测复杂攻击场景
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064615
E. Godefroy, Eric Totel, M. Hurfin, Frédéric Majorczyk
{"title":"Automatic generation of correlation rules to detect complex attack scenarios","authors":"E. Godefroy, Eric Totel, M. Hurfin, Frédéric Majorczyk","doi":"10.1109/ISIAS.2014.7064615","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064615","url":null,"abstract":"In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the monitored information system. The proposed transformation process has been implemented in a prototype that generates correlation rules expressed in an attack description language.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices 手掌感兴趣区域的提取方法:在非接触和可触摸设备上的应用
2014 10th International Conference on Information Assurance and Security Pub Date : 2014-11-01 DOI: 10.1109/ISIAS.2014.7064624
Saliha Artabaz, K. Benatchba, M. Koudil, D. Nabil, A. Bouridane
{"title":"Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices","authors":"Saliha Artabaz, K. Benatchba, M. Koudil, D. Nabil, A. Bouridane","doi":"10.1109/ISIAS.2014.7064624","DOIUrl":"https://doi.org/10.1109/ISIAS.2014.7064624","url":null,"abstract":"Palmprint is one of the modalities that offer high recognition accuracy. The recognition process depends on an optimized ROI (Region of Interest) extraction. This extraction is affected by several factors including the device used and the acquisition conditions. The acquisition mode can alter some image properties like rotation, translation and scale. Some devices are designed to maintain hand in a fixed position and delimit a subspace of the hand. On the other hand, contactless devices offer more convenience and flexibility but lead to altered images. ROI extraction methods must consider the acquisition device (with contact or contactless). In this paper, we propose a ROI extraction method that addresses this issue. We test our method on two databases PolyU and CASIA which illustrate the impact of using contactless device unlike the PolyU device. Then, we test performances of the palmprint biometric system. We use a Fisher Linear Discriminant projection (FLD) to extract features from ROI transformed into the frequency domain. Our proposed method can significantly cover a great portion of the palm in the two databases. Performances obtained with the proposed palmprint system are promising.","PeriodicalId":146781,"journal":{"name":"2014 10th International Conference on Information Assurance and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信