T. Addabbo, A. Fort, M. Mugnaini, Stefano Parrino, A. Pozzebon, V. Vignoli
{"title":"Using the I2C bus to set up Long Range Wired Sensor and Actuator Networks in Smart Buildings","authors":"T. Addabbo, A. Fort, M. Mugnaini, Stefano Parrino, A. Pozzebon, V. Vignoli","doi":"10.1109/CCCS.2019.8888085","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888085","url":null,"abstract":"The Inter Integrated Circuit (I2C) is one of the most common standards for serial data transmission between microcontrollers, microprocessors and peripheral devices. Nowadays, many off-the-shelf devices are provided with an I2C interface, that can be then the easiest way to connect them to other devices through a wired connection, regardless from their features. While the setup of intelligent distributed architectures for Smart Buildings based on wireless communication channels may be straightforward, the chance to set up local area wired networks based on the I2C bus may be of great interest for example in case of noisy environments. Nevertheless, I2C is characterized by a very short range, with transmission distances generally lower than 10 m. The aim of this paper is then to suggest the use of the I2C bus for the realization of wired local area sensor and actuator networks, setting up a multi-Master and multi-Slave network architecture with transmission ranges up to 100 m. For this reason, the paper focuses on the problem of parasitic capacitances, proposing a possible hardware solution to deploy such a kind of architecture based on the use of ad-hoc components. At the same time, in order to propose a flexible architecture, the paper describes a novel solution to allow the transparent connection to the network of additional devices, avoiding the risk for address conflict.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Categorization of Drive-by Download Malware","authors":"Mohit Singhal, David Levine","doi":"10.1109/CCCS.2019.8888147","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888147","url":null,"abstract":"With the increase in the usage of websites as the main source of information gathering, malicious activity especially drive-by download has exponentially increased. A drive-by download refers to unintentional download of malicious code to a user computer that leaves the user open to a cyberattack. It has become the preferred distribution vector for many malware families. The purpose of this research is to analyze the malware that were obtained from visiting approximately 100,000 malicious URLs and running these binaries in sandboxes and then analyzing their runtime behavior with a software tool (YARA) to categorize them and classify the malware family to which they belong. Out of the 1414 executables (binaries), 1000 binaries were executed and 99 were identified as false-positive. Out of the 901 binaries, 867 of them were identified as Trojan Horse and we were able to identify 53 type of malware families, with one particular family, Kyrptik, being the largest. It is concluded that about 12% of the binaries were having office macros that were establishing C2 servers once they were executed in Microsoft Word/Excel. Also, a total of 105 binaries which had the same name and were extracted from the same website but had different hashes and the mean difference between the first store and the last store was 17 days and about 5% of these binaries were showing different results from the first store of the binary to the last store of the binary were also identified.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}