2020 10th Annual Computing and Communication Workshop and Conference (CCWC)最新文献

筛选
英文 中文
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots 利用介质交互蜜罐分析物联网僵尸网络之间的变异
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031234
Bryson Lingenfelter, Iman Vakilinia, S. Sengupta
{"title":"Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots","authors":"Bryson Lingenfelter, Iman Vakilinia, S. Sengupta","doi":"10.1109/CCWC47524.2020.9031234","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031234","url":null,"abstract":"Through analysis of sessions in which files were created and downloaded on three Cowrie SSH/Telnet honeypots, we find that IoT botnets are by far the most common source of malware on connected systems with weak credentials. We detail our honeypot configuration and describe a simple method for listing near-identical malicious login sessions using edit distance. A large number of IoT botnets attack our honeypots, but the malicious sessions which download botnet software to the honeypot are almost all nearly identical to one of two common attack patterns. It is apparent that the Mirai worm is still the dominant botnet software, but has been expanded and modified by other hackers. We also find that the same loader devices deploy several different botnet malware strains to the honeypot over the course of a 40 day period, suggesting multiple botnet deployments from the same source. We conclude that Mirai continues to be adapted but can be effectively tracked using medium interaction honeypots such as Cowrie.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128585673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Decentralized Security Bounty Management on Blockchain and IPFS 区块链和IPFS上分散的安全赏金管理
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031109
Alex A. J. Hoffman, Eric Becerril-Blas, K. Moreno, Yoohwan Kim
{"title":"Decentralized Security Bounty Management on Blockchain and IPFS","authors":"Alex A. J. Hoffman, Eric Becerril-Blas, K. Moreno, Yoohwan Kim","doi":"10.1109/CCWC47524.2020.9031109","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031109","url":null,"abstract":"The rise of decentralized applications (DApps) have received great attention over the recent years due to the surge of attention towards blockchain technologies. Motivated by these recent disruptions, this paper introduces a blockchain based bug bounty program named Bountychain. This DApp utilizes an Ethereum based smart contract system and an interplanetary file system (IPFS) storage paradigm intended to be used by companies, industries, and testers. The smart contract model provides a safe, secure, and transparent platform for a bug bounty program. Testers will submit bugs via the blockchain, and companies will accept or reject the defect via the blockchain. Thus, testers will automatically get paid via the in-built smart contract system on a web interface, which will allow the tester to gain recognition and status no matter which company's bugs they find. The transactions on the chain will serve as a persistent and transparent record of software bugs, and IPFS will serve as a long-term storage system for bug details.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hardware Trojan Detection Method Based on Time Feature of Chip Temperature 基于芯片温度时间特征的硬件木马检测方法
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031281
Lian Yang, Xiong Li, Huan Li
{"title":"Hardware Trojan Detection Method Based on Time Feature of Chip Temperature","authors":"Lian Yang, Xiong Li, Huan Li","doi":"10.1109/CCWC47524.2020.9031281","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031281","url":null,"abstract":"Hardware security has become a security issue that cannot be ignored in the world. Academia's research on hardware Trojan detection at IC (Integrated Circuit) has been ongoing and has achieved many achievements. At present, some scholars are exploring hardware Trojan detection based on chip power and temperature. In this paper, we also use the temperature information of the chip to carry out hardware Trojan detection, but the difference is that the existing methods directly used the difference of steady-state temperature after the chip reaches steady state as the detection basis, and our method is to use the arrival time difference in the temperature rising phase of the chips before reaching the steady state as the detection basis, then extract the feature to obtain the characteristic value of each chip, and finally use them to perform classification and identification of infected chips. Our basis could show larger difference for the infected chips under the same conditions, which makes the detection data have better accommodation for measurement noise and process variation (PV) and improves the detection accuracy. Through the relevant experimental verification, the proposed method is completely feasible, and still has high detection accuracy with measurement noise and PV. The proposed method can be used in the case of Trojan detection for a certain number of chips without golden chip.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases 基于卷积神经网络的胸部疾病多标签x线片分析
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031208
Tiffany Zhan, Felix Zhan, Vince Choi, J. Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, D. Garcia, Sam Vinh, Jeremy Eddy
{"title":"Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases","authors":"Tiffany Zhan, Felix Zhan, Vince Choi, J. Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, D. Garcia, Sam Vinh, Jeremy Eddy","doi":"10.1109/CCWC47524.2020.9031208","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031208","url":null,"abstract":"Currently, it takes approximately 6 to 8 weeks from the initial doctor's examination to diagnose lung disease. This could potentially lead to the patient's condition worsening, the disease becoming unmanageable, or may lead to the patient's death. In order to aid doctors in the accurate and more timely diagnosis of their patients, we propose the use of convolutional neural networks for computer-aided diagnosis. Our application uses image recognition to identify the traits of various diseases in radiographs to successfully diagnose a patient. This is done through training a CNN with a dataset of 112,120 images of lung diseases. The model was tested with a resulting validation accuracy of 93 percent. The application will benefit patients suffering from these illnesses as it is time-efficient, cost-effective, and more accurate than manual diagnosis.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121461618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robotics Technology Kernel for Radiation Sensing and Site Exploitation 辐射传感与现场开发的机器人技术核心
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031259
W. Brooks, Dominic M. Larkin, C. Korpela
{"title":"Robotics Technology Kernel for Radiation Sensing and Site Exploitation","authors":"W. Brooks, Dominic M. Larkin, C. Korpela","doi":"10.1109/CCWC47524.2020.9031259","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031259","url":null,"abstract":"This paper details the design and operational prototype of a small unmanned ground vehicle capable of site exploitation and radiation sensing in an indoor, GPS-denied environment. By leveraging the Robotics Technology Kernel and Android Tactical Assault Kit, users and researchers can reduce non-recurring engineering costs associated with autonomous sensing and navigation algorithm development, testing, integration, and reuse. This paper presents recent test results of the system and its sensors using the proposed hardware and software infrastructure connecting back to an end user device.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of A 2-3 GHz Down-Conversion Active Mixer With Improved Linearity 改进线性度的2-3 GHz下变频有源混频器设计
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031174
S. Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft
{"title":"Design of A 2-3 GHz Down-Conversion Active Mixer With Improved Linearity","authors":"S. Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft","doi":"10.1109/CCWC47524.2020.9031174","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031174","url":null,"abstract":"A down-conversion active mixer with high linearity and low noise behavior for 2-3 GHz wireless local area networks (WLAN) applications is presented. This mixer is designed based on the RF-TSMC $0.18 mumathrm{m}$ CMOS technology. In order to suppress third order nonlinearity, a new fully differential Darlington cell with a cross-connected topology is reported. As a result, the linearity of mixer is increased effectively. In addition, the proposed circuit employs an active load and current bleeding technique to increase the conversion gain (CG) and reduce the noise of the circuit in the frequency of interest. The simulated third-order input intercept point (IIP3) is 12.5 dB while conversion gain is 14.5 dB. The proposed circuit provides a low noise figure of 4.55 dB at 2.4 GHz. Its power consumption is 17.4 mW with power supply of 1.8V.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131026894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Capture Diversity in Distributed Passive RFID Systems 利用分布式无源RFID系统中的捕获多样性
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031268
R. Valentini, Piergiuseppe Di Marco, R. Alesii, F. Santucci
{"title":"Exploiting Capture Diversity in Distributed Passive RFID Systems","authors":"R. Valentini, Piergiuseppe Di Marco, R. Alesii, F. Santucci","doi":"10.1109/CCWC47524.2020.9031268","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031268","url":null,"abstract":"Within our investigations on cross-layer interactions in distributed passive Radio Frequency Identification (RFID) systems, in this paper we present a novel contribution on the study of the performance of such systems. Specifically, we analyze the impact of the underlying propagation environment and discuss a diversity technique based on the different probability of capture at different spatial locations for detection. Preliminary results highlight the possibility of exploiting this capture diversity to boost up the system identification performance.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Increasing Reliability of Terahertz Communication Links Using Onboard Fiber Connectivity 利用板载光纤连接提高太赫兹通信链路的可靠性
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031199
K. Nallappan, Yang Cao, Guofu Xu, H. Guerboukha, C. Nerguizian, M. Skorobogatiy
{"title":"Increasing Reliability of Terahertz Communication Links Using Onboard Fiber Connectivity","authors":"K. Nallappan, Yang Cao, Guofu Xu, H. Guerboukha, C. Nerguizian, M. Skorobogatiy","doi":"10.1109/CCWC47524.2020.9031199","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031199","url":null,"abstract":"Terahertz (THz) band is the next frontier for the ultra-high-speed communication systems. Currently, most of communications research in this spectral range is focused on wireless systems, while waveguide/fiber-based links have been less explored. Although free space communications have several advantages, the fiber-based communications provide superior performance in certain short-range communication applications. In this work, we study the use of subwavelength dielectric THz fibers for information transmission. Particularly, we use polypropylene-based rod-in-air subwavelength dielectric THz fibers of various diameters (0.57-1.75 mm) to study link performance as a function of the link length of up to ∼10 m, and data bitrates of up to 6 Gbps at the carrier frequency of 128 GHz. Furthermore, we compared the power budget of the rod-in-air subwavelength THz fiber-based links to that of free space communication links and we demonstrate that fiber links offer an excellent solution for various short-range applications.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and Recognition 俄语自然语音语料库作为模拟自然语音产生和识别的工具
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031251
Elena I. Riekhakaynen
{"title":"Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and Recognition","authors":"Elena I. Riekhakaynen","doi":"10.1109/CCWC47524.2020.9031251","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031251","url":null,"abstract":"The paper presents two corpora of spontaneous Russian. The aim of the study is to describe the speech signal in a way close to the one a listener has to cope with while processing natural speech and to use the corpora for further computer simulation of spoken word recognition. The corpus of adult speech includes around two hours of recordings provided with the orthographic and acoustic-phonetic transcription performed manually by trained phoneticians. The word list imitating the mental lexicon of a listener where each phonetic realization corresponds to all possible variants of its interpretation found in the corpus was created based on the corpus. The analysis of the adult speech shows how often reduced word forms occur in spontaneous speech and allows to develop and check an algorithm of the restoration of grammatical information in noun phrases. The corpus of children's speech includes both longitudinal and experimental data (around 18 hours all together) and is the first example of the corpus of Russian children's speech provided with phonetic annotation. The preliminary analysis of the children's speech shows that at least some reduced variants can be stored in the mental lexicon of a native speaker.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power Hardware 便携式低功耗硬件上网络入侵检测的多层感知机算法
2020 10th Annual Computing and Communication Workshop and Conference (CCWC) Pub Date : 2020-01-01 DOI: 10.1109/CCWC47524.2020.9031180
Kayla Chisholm, C. Yakopcic, Md. Shahanur Alam, T. Taha
{"title":"Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power Hardware","authors":"Kayla Chisholm, C. Yakopcic, Md. Shahanur Alam, T. Taha","doi":"10.1109/CCWC47524.2020.9031180","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031180","url":null,"abstract":"Existing technology trends have led to an abundance of household items containing microprocessors all connected within a private network. Thus, network intrusion detection is essential for keeping these networks secure. However, network intrusion detection can be extremely taxing on battery operated devices. Thus, this work presents a cyberattack detection system based on a multilayer perceptron neural network algorithm. To show this system is capable of operating at low power, the algorithm was executed on two commercially available minicomputer systems including the Raspberry PI 3 and the Asus Tinkerboard. An accuracy, power, energy, and timing analysis was performed to study the tradeoffs necessary when executing these algorithms at low power. Our results show that these low power implementations are feasible, and a scan rate of more than 226,000 packets per second can be achieved from a system that requires approximately 5W to operate with greater than 99% accuracy.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115130234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信