2019 4th International Conference on Computing, Communications and Security (ICCCS)最新文献

筛选
英文 中文
Using the I2C bus to set up Long Range Wired Sensor and Actuator Networks in Smart Buildings 使用I2C总线在智能建筑中建立远程有线传感器和执行器网络
T. Addabbo, A. Fort, M. Mugnaini, Stefano Parrino, A. Pozzebon, V. Vignoli
{"title":"Using the I2C bus to set up Long Range Wired Sensor and Actuator Networks in Smart Buildings","authors":"T. Addabbo, A. Fort, M. Mugnaini, Stefano Parrino, A. Pozzebon, V. Vignoli","doi":"10.1109/CCCS.2019.8888085","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888085","url":null,"abstract":"The Inter Integrated Circuit (I2C) is one of the most common standards for serial data transmission between microcontrollers, microprocessors and peripheral devices. Nowadays, many off-the-shelf devices are provided with an I2C interface, that can be then the easiest way to connect them to other devices through a wired connection, regardless from their features. While the setup of intelligent distributed architectures for Smart Buildings based on wireless communication channels may be straightforward, the chance to set up local area wired networks based on the I2C bus may be of great interest for example in case of noisy environments. Nevertheless, I2C is characterized by a very short range, with transmission distances generally lower than 10 m. The aim of this paper is then to suggest the use of the I2C bus for the realization of wired local area sensor and actuator networks, setting up a multi-Master and multi-Slave network architecture with transmission ranges up to 100 m. For this reason, the paper focuses on the problem of parasitic capacitances, proposing a possible hardware solution to deploy such a kind of architecture based on the use of ad-hoc components. At the same time, in order to propose a flexible architecture, the paper describes a novel solution to allow the transparent connection to the network of additional devices, avoiding the risk for address conflict.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis and Categorization of Drive-by Download Malware 驱动下载恶意软件的分析与分类
Mohit Singhal, David Levine
{"title":"Analysis and Categorization of Drive-by Download Malware","authors":"Mohit Singhal, David Levine","doi":"10.1109/CCCS.2019.8888147","DOIUrl":"https://doi.org/10.1109/CCCS.2019.8888147","url":null,"abstract":"With the increase in the usage of websites as the main source of information gathering, malicious activity especially drive-by download has exponentially increased. A drive-by download refers to unintentional download of malicious code to a user computer that leaves the user open to a cyberattack. It has become the preferred distribution vector for many malware families. The purpose of this research is to analyze the malware that were obtained from visiting approximately 100,000 malicious URLs and running these binaries in sandboxes and then analyzing their runtime behavior with a software tool (YARA) to categorize them and classify the malware family to which they belong. Out of the 1414 executables (binaries), 1000 binaries were executed and 99 were identified as false-positive. Out of the 901 binaries, 867 of them were identified as Trojan Horse and we were able to identify 53 type of malware families, with one particular family, Kyrptik, being the largest. It is concluded that about 12% of the binaries were having office macros that were establishing C2 servers once they were executed in Microsoft Word/Excel. Also, a total of 105 binaries which had the same name and were extracted from the same website but had different hashes and the mean difference between the first store and the last store was 17 days and about 5% of these binaries were showing different results from the first store of the binary to the last store of the binary were also identified.","PeriodicalId":152148,"journal":{"name":"2019 4th International Conference on Computing, Communications and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信