2014 Fifth International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
Influence of Holding Smart Phone for Acceleration-Based Gait Authentication 手持智能手机对基于加速的步态认证的影响
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.24
Yuji Watanabe
{"title":"Influence of Holding Smart Phone for Acceleration-Based Gait Authentication","authors":"Yuji Watanabe","doi":"10.1109/EST.2014.24","DOIUrl":"https://doi.org/10.1109/EST.2014.24","url":null,"abstract":"In most previous researches on acceleration-based gait authentication, dedicated accelerometers are mounted on hip or ankle, or smart phones are in the pocket in fixed manners. However, when a user walks, smart phone is not only put in the pocket but also used calling or touching on the screen. In these situations, the direction of the phone should be taken into account. In this study, we first improve the application developed in our previous study to record more information such as the rotation of the phone around the 3 axes. And then we perform preliminary experiments using the improved application for 4 subjects to collect the user-generated acceleration data on walk when the phone is held calling and touching as well as in the pocket. The authentication results show that although 1.30% false acceptance rate (FAR) at 2.34% false rejection rate (FRR) is obtained when the phone is in the pocket, the FRR is extremely bad as touching on the screen.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Side-Channel Attack against the Capy HIP 对Capy HIP的侧信道攻击
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.30
Carlos Javier Hernández-Castro, M. Rodríguez-Moreno, David F. Barrero
{"title":"Side-Channel Attack against the Capy HIP","authors":"Carlos Javier Hernández-Castro, M. Rodríguez-Moreno, David F. Barrero","doi":"10.1109/EST.2014.30","DOIUrl":"https://doi.org/10.1109/EST.2014.30","url":null,"abstract":"One of the first approaches to proposed to prevent automated attacks on Internet were the Human Interactive Proofs(HIPs). Since their invention, a variety of designs have been proposed, yet most of them have been successfully attacked. In this paper we focus on a new HIP, based on a puzzle solving scheme, created to increase both security and usability: the Capy CAPTCHA. We have analyzed its design, finding some important flaws. Based on them, we propose a low-cost, side-channel attack. Initial results show that the attack is able to break Capy with a 61% success ratio.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting Objects for Indoor Monitoring and Surveillance for Mobile Robots 室内目标检测与移动机器人监控
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.35
Carlos Astua, J. Crespo, R. Barber
{"title":"Detecting Objects for Indoor Monitoring and Surveillance for Mobile Robots","authors":"Carlos Astua, J. Crespo, R. Barber","doi":"10.1109/EST.2014.35","DOIUrl":"https://doi.org/10.1109/EST.2014.35","url":null,"abstract":"The future of robotics strives to embed robots more and more to human environments every day. One of the tasks in which the robots show a potential application is in the monitoring and surveillance of houses. To achieve this goal, they need to gather information from the environment in a similar way humans do, since the idea is that humans could interact with them the same way a person interacts with another. This paper presents an object detection algorithm focused on semantic information, strives to use current trends in robotics and provides flexibility, so it can be exported to other environments. Semantic navigation enables modeling the environment to an abstraction level close to the one used by humans, facilitating the interaction between the robot and the user, allowing better tasks communication and receiving more complete information from the environment, in addition to increasing the autonomy of the robot. The methods proposed try to recognize objects based on contours and descriptors, and both of them are combined to overcome their deficiencies. Finally, to prove it is accurate and efficient, the code is tested on a real robot.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ideograms Representation for Cognitive Systems in Robotics 机器人认知系统的表意符号表示
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.21
M. Rodríguez-Moreno, A. Stoica
{"title":"Ideograms Representation for Cognitive Systems in Robotics","authors":"M. Rodríguez-Moreno, A. Stoica","doi":"10.1109/EST.2014.21","DOIUrl":"https://doi.org/10.1109/EST.2014.21","url":null,"abstract":"The cognitive psychology has focused on understanding how humans think and solve problems. As analogy, the robotics systems have used this research to try to make robots more \"intelligent\" imitating cognitive models. How things are perceived and transformed in mental structures, and how they are retained, is still an open question, although a lot of progress has been done. For example, some studies have demonstrated that the use of diagrams retains concepts in memory better than other approaches based on text or words, and making the reasoning about them easier. In this direction, we want to propose an ideogram representation for robotic systems in cooperation with humans that can help to provide a natural link between the determination of perceptive symbols and their manipulation in reasoning.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Assessment of Recent Attacks on Specific Embedded Systems 最近针对特定嵌入式系统的攻击评估
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.11
Shoaib Ehsan, K. Mcdonald-Maier
{"title":"An Assessment of Recent Attacks on Specific Embedded Systems","authors":"Shoaib Ehsan, K. Mcdonald-Maier","doi":"10.1109/EST.2014.11","DOIUrl":"https://doi.org/10.1109/EST.2014.11","url":null,"abstract":"In this paper, we present an assessment of recent attacks on embedded systems, in particular mobile phones, wireless sensor networks, unmanned aerial vehicles and unmanned ground vehicles. As these systems become increasingly connected and networked, the number of attacks on them increases exposing them to real threats and risks, particularly when used in mission critical applications. It is necessary to investigate all aspects of the security systems associated with embedded systems in order to help protect these systems from attackers. In this we present a survey on a number of embedded systems to show system vulnerabilities, recent attacks and the security measurements undertaken to protect the embedded systems.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling Risks in Biometric-Based Authentication Control Systems 基于生物特征的认证控制系统建模风险
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.12
Shawn C. Eastwood, S. Yanushkevich
{"title":"Modeling Risks in Biometric-Based Authentication Control Systems","authors":"Shawn C. Eastwood, S. Yanushkevich","doi":"10.1109/EST.2014.12","DOIUrl":"https://doi.org/10.1109/EST.2014.12","url":null,"abstract":"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132505183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of Ear Recognition Robustness of Single-View-Based Images Rotated in Depth 深度旋转单视角图像的耳朵识别鲁棒性比较
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.16
D. Watabe, T. Minamidani, Hideyashu Sai, Jianting Cao
{"title":"Comparison of Ear Recognition Robustness of Single-View-Based Images Rotated in Depth","authors":"D. Watabe, T. Minamidani, Hideyashu Sai, Jianting Cao","doi":"10.1109/EST.2014.16","DOIUrl":"https://doi.org/10.1109/EST.2014.16","url":null,"abstract":"To improve the robustness against variation in shooting angles, we previously proposed using an asymptotic expansion of the Gabor transform of ear images to compute the Gabor features of other poses and using these estimates in multiple linear discriminant analysis to enhance feature discriminability. Extending this study, the accuracies are compared with other standard methods that can be used to compute feature vectors for other poses, as in principal component analysis and multiple regression analysis.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126922062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting and Identifiying Smartphone Apps Using Icmetrics 使用Icmetrics保护和识别智能手机应用程序
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.28
Mustafa Haciosman, Bin Ye, G. Howells
{"title":"Protecting and Identifiying Smartphone Apps Using Icmetrics","authors":"Mustafa Haciosman, Bin Ye, G. Howells","doi":"10.1109/EST.2014.28","DOIUrl":"https://doi.org/10.1109/EST.2014.28","url":null,"abstract":"As web-server spoofing is increasing, we investigate a novel technology termed ICmetrics, used to identify fraud for given software/hardware programs based on measurable quantities/features. ICmetrics technology is based on extracting features from digital systems' operation that may be integrated together to generate unique identifiers for each of the systems or create unique profiles that describe the systems' actual behavior. This paper looks at the properties of the several behaviors as a potential ICmetrics features to identify android apps, it presents several quality features which meet the ICmetrics requirements and can be used for encryption key generation. Finally, the paper identifies four android apps and verifies the use of ICmetrics by identifying a spoofed app as a different app altogether.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Secure Group Admission Control Using ICMetrics 基于ICMetrics的安全组准入控制
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.27
Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier
{"title":"On Secure Group Admission Control Using ICMetrics","authors":"Hasan Tahir, G. Howells, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier","doi":"10.1109/EST.2014.27","DOIUrl":"https://doi.org/10.1109/EST.2014.27","url":null,"abstract":"The security of a system cannot be certified unless there are formal methods of admission control. Many techniques and protocol have been proposed that try to provide security yet do not focus on the most important question about who has access to the system. When considering group communications it is more important to understand this problem as the security of the system is dependent upon having authorized entities in the group communicating securely. Admission control has previously been studied in distributed systems but repeatedly overlooked in security. In this paper we provide a polling centred admission control system based on ICMetrics. We choose the polling based system as it considers the opinion of current group members when giving access to members wishing to join the group. Our proposed protocol is based on the use of the secure ring signature along with the latest ICMetrics technology.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multispectral Hand Biometrics 多光谱手部生物识别
2014 Fifth International Conference on Emerging Security Technologies Pub Date : 2014-09-10 DOI: 10.1109/EST.2014.10
S. Samoil, K. Lai, S. Yanushkevich
{"title":"Multispectral Hand Biometrics","authors":"S. Samoil, K. Lai, S. Yanushkevich","doi":"10.1109/EST.2014.10","DOIUrl":"https://doi.org/10.1109/EST.2014.10","url":null,"abstract":"This paper reports on a feasibility study of contactless hand biometrics using an RGB-Depth (RGB-D) camera such as the Kinect v2 prototype. The RGB, depth, and near-infrared (near-IR) spectra provide access to information such as palm print, hand shape, finger joint location, and vein patterns. Extraction of the hand is first done using depth data. The frames with the best palm position are selected, and then correlated into the synchronized RGB and near-IR frames for further processing of the related information in each spectra. Using the hand location information the palm can be extracted in the RGB data for use in palm recognition. Recognition of the palm is performed using Principle Component Analysis and K-Nearest-Neighbors for the classification. This multi-spectral analysis is a pre-requisite for hand shape, palm, and vein recognition to be integrated into a mass access control system or a personal computer secure access system.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"489 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信