{"title":"Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots","authors":"Bryson Lingenfelter, Iman Vakilinia, S. Sengupta","doi":"10.1109/CCWC47524.2020.9031234","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031234","url":null,"abstract":"Through analysis of sessions in which files were created and downloaded on three Cowrie SSH/Telnet honeypots, we find that IoT botnets are by far the most common source of malware on connected systems with weak credentials. We detail our honeypot configuration and describe a simple method for listing near-identical malicious login sessions using edit distance. A large number of IoT botnets attack our honeypots, but the malicious sessions which download botnet software to the honeypot are almost all nearly identical to one of two common attack patterns. It is apparent that the Mirai worm is still the dominant botnet software, but has been expanded and modified by other hackers. We also find that the same loader devices deploy several different botnet malware strains to the honeypot over the course of a 40 day period, suggesting multiple botnet deployments from the same source. We conclude that Mirai continues to be adapted but can be effectively tracked using medium interaction honeypots such as Cowrie.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128585673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex A. J. Hoffman, Eric Becerril-Blas, K. Moreno, Yoohwan Kim
{"title":"Decentralized Security Bounty Management on Blockchain and IPFS","authors":"Alex A. J. Hoffman, Eric Becerril-Blas, K. Moreno, Yoohwan Kim","doi":"10.1109/CCWC47524.2020.9031109","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031109","url":null,"abstract":"The rise of decentralized applications (DApps) have received great attention over the recent years due to the surge of attention towards blockchain technologies. Motivated by these recent disruptions, this paper introduces a blockchain based bug bounty program named Bountychain. This DApp utilizes an Ethereum based smart contract system and an interplanetary file system (IPFS) storage paradigm intended to be used by companies, industries, and testers. The smart contract model provides a safe, secure, and transparent platform for a bug bounty program. Testers will submit bugs via the blockchain, and companies will accept or reject the defect via the blockchain. Thus, testers will automatically get paid via the in-built smart contract system on a web interface, which will allow the tester to gain recognition and status no matter which company's bugs they find. The transactions on the chain will serve as a persistent and transparent record of software bugs, and IPFS will serve as a long-term storage system for bug details.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Trojan Detection Method Based on Time Feature of Chip Temperature","authors":"Lian Yang, Xiong Li, Huan Li","doi":"10.1109/CCWC47524.2020.9031281","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031281","url":null,"abstract":"Hardware security has become a security issue that cannot be ignored in the world. Academia's research on hardware Trojan detection at IC (Integrated Circuit) has been ongoing and has achieved many achievements. At present, some scholars are exploring hardware Trojan detection based on chip power and temperature. In this paper, we also use the temperature information of the chip to carry out hardware Trojan detection, but the difference is that the existing methods directly used the difference of steady-state temperature after the chip reaches steady state as the detection basis, and our method is to use the arrival time difference in the temperature rising phase of the chips before reaching the steady state as the detection basis, then extract the feature to obtain the characteristic value of each chip, and finally use them to perform classification and identification of infected chips. Our basis could show larger difference for the infected chips under the same conditions, which makes the detection data have better accommodation for measurement noise and process variation (PV) and improves the detection accuracy. Through the relevant experimental verification, the proposed method is completely feasible, and still has high detection accuracy with measurement noise and PV. The proposed method can be used in the case of Trojan detection for a certain number of chips without golden chip.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tiffany Zhan, Felix Zhan, Vince Choi, J. Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, D. Garcia, Sam Vinh, Jeremy Eddy
{"title":"Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases","authors":"Tiffany Zhan, Felix Zhan, Vince Choi, J. Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, D. Garcia, Sam Vinh, Jeremy Eddy","doi":"10.1109/CCWC47524.2020.9031208","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031208","url":null,"abstract":"Currently, it takes approximately 6 to 8 weeks from the initial doctor's examination to diagnose lung disease. This could potentially lead to the patient's condition worsening, the disease becoming unmanageable, or may lead to the patient's death. In order to aid doctors in the accurate and more timely diagnosis of their patients, we propose the use of convolutional neural networks for computer-aided diagnosis. Our application uses image recognition to identify the traits of various diseases in radiographs to successfully diagnose a patient. This is done through training a CNN with a dataset of 112,120 images of lung diseases. The model was tested with a resulting validation accuracy of 93 percent. The application will benefit patients suffering from these illnesses as it is time-efficient, cost-effective, and more accurate than manual diagnosis.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121461618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robotics Technology Kernel for Radiation Sensing and Site Exploitation","authors":"W. Brooks, Dominic M. Larkin, C. Korpela","doi":"10.1109/CCWC47524.2020.9031259","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031259","url":null,"abstract":"This paper details the design and operational prototype of a small unmanned ground vehicle capable of site exploitation and radiation sensing in an indoor, GPS-denied environment. By leveraging the Robotics Technology Kernel and Android Tactical Assault Kit, users and researchers can reduce non-recurring engineering costs associated with autonomous sensing and navigation algorithm development, testing, integration, and reuse. This paper presents recent test results of the system and its sensors using the proposed hardware and software infrastructure connecting back to an end user device.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft
{"title":"Design of A 2-3 GHz Down-Conversion Active Mixer With Improved Linearity","authors":"S. Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft","doi":"10.1109/CCWC47524.2020.9031174","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031174","url":null,"abstract":"A down-conversion active mixer with high linearity and low noise behavior for 2-3 GHz wireless local area networks (WLAN) applications is presented. This mixer is designed based on the RF-TSMC $0.18 mumathrm{m}$ CMOS technology. In order to suppress third order nonlinearity, a new fully differential Darlington cell with a cross-connected topology is reported. As a result, the linearity of mixer is increased effectively. In addition, the proposed circuit employs an active load and current bleeding technique to increase the conversion gain (CG) and reduce the noise of the circuit in the frequency of interest. The simulated third-order input intercept point (IIP3) is 12.5 dB while conversion gain is 14.5 dB. The proposed circuit provides a low noise figure of 4.55 dB at 2.4 GHz. Its power consumption is 17.4 mW with power supply of 1.8V.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131026894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Valentini, Piergiuseppe Di Marco, R. Alesii, F. Santucci
{"title":"Exploiting Capture Diversity in Distributed Passive RFID Systems","authors":"R. Valentini, Piergiuseppe Di Marco, R. Alesii, F. Santucci","doi":"10.1109/CCWC47524.2020.9031268","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031268","url":null,"abstract":"Within our investigations on cross-layer interactions in distributed passive Radio Frequency Identification (RFID) systems, in this paper we present a novel contribution on the study of the performance of such systems. Specifically, we analyze the impact of the underlying propagation environment and discuss a diversity technique based on the different probability of capture at different spatial locations for detection. Preliminary results highlight the possibility of exploiting this capture diversity to boost up the system identification performance.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nallappan, Yang Cao, Guofu Xu, H. Guerboukha, C. Nerguizian, M. Skorobogatiy
{"title":"Increasing Reliability of Terahertz Communication Links Using Onboard Fiber Connectivity","authors":"K. Nallappan, Yang Cao, Guofu Xu, H. Guerboukha, C. Nerguizian, M. Skorobogatiy","doi":"10.1109/CCWC47524.2020.9031199","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031199","url":null,"abstract":"Terahertz (THz) band is the next frontier for the ultra-high-speed communication systems. Currently, most of communications research in this spectral range is focused on wireless systems, while waveguide/fiber-based links have been less explored. Although free space communications have several advantages, the fiber-based communications provide superior performance in certain short-range communication applications. In this work, we study the use of subwavelength dielectric THz fibers for information transmission. Particularly, we use polypropylene-based rod-in-air subwavelength dielectric THz fibers of various diameters (0.57-1.75 mm) to study link performance as a function of the link length of up to ∼10 m, and data bitrates of up to 6 Gbps at the carrier frequency of 128 GHz. Furthermore, we compared the power budget of the rod-in-air subwavelength THz fiber-based links to that of free space communication links and we demonstrate that fiber links offer an excellent solution for various short-range applications.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and Recognition","authors":"Elena I. Riekhakaynen","doi":"10.1109/CCWC47524.2020.9031251","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031251","url":null,"abstract":"The paper presents two corpora of spontaneous Russian. The aim of the study is to describe the speech signal in a way close to the one a listener has to cope with while processing natural speech and to use the corpora for further computer simulation of spoken word recognition. The corpus of adult speech includes around two hours of recordings provided with the orthographic and acoustic-phonetic transcription performed manually by trained phoneticians. The word list imitating the mental lexicon of a listener where each phonetic realization corresponds to all possible variants of its interpretation found in the corpus was created based on the corpus. The analysis of the adult speech shows how often reduced word forms occur in spontaneous speech and allows to develop and check an algorithm of the restoration of grammatical information in noun phrases. The corpus of children's speech includes both longitudinal and experimental data (around 18 hours all together) and is the first example of the corpus of Russian children's speech provided with phonetic annotation. The preliminary analysis of the children's speech shows that at least some reduced variants can be stored in the mental lexicon of a native speaker.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kayla Chisholm, C. Yakopcic, Md. Shahanur Alam, T. Taha
{"title":"Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power Hardware","authors":"Kayla Chisholm, C. Yakopcic, Md. Shahanur Alam, T. Taha","doi":"10.1109/CCWC47524.2020.9031180","DOIUrl":"https://doi.org/10.1109/CCWC47524.2020.9031180","url":null,"abstract":"Existing technology trends have led to an abundance of household items containing microprocessors all connected within a private network. Thus, network intrusion detection is essential for keeping these networks secure. However, network intrusion detection can be extremely taxing on battery operated devices. Thus, this work presents a cyberattack detection system based on a multilayer perceptron neural network algorithm. To show this system is capable of operating at low power, the algorithm was executed on two commercially available minicomputer systems including the Raspberry PI 3 and the Asus Tinkerboard. An accuracy, power, energy, and timing analysis was performed to study the tradeoffs necessary when executing these algorithms at low power. Our results show that these low power implementations are feasible, and a scan rate of more than 226,000 packets per second can be achieved from a system that requires approximately 5W to operate with greater than 99% accuracy.","PeriodicalId":161209,"journal":{"name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115130234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}