{"title":"A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction","authors":"Baojiang Cui, M. Cao, Shilei Chen, Weikong Qi","doi":"10.1109/BWCCA.2015.64","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.64","url":null,"abstract":"With the development of Internet technology, more and more unknown programs appears in the network environment, the detection and classification technology is increasingly becoming an important technology in the field of information security. This paper presents a new method of program classification using binary instrumentation, dynamic instruction flow feature extraction, auto feature selection and Naive Bayes classifier technology. Finally we use two-class classification, five categories, and twenty-class classification experiments to prove the correctness of the method and present the future direction for improvement of the method.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Vault Schemes in Multi-secret Digital Steganography","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/BWCCA.2015.87","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.87","url":null,"abstract":"This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naoki Takei, Takamichi Saito, Ko Takasu, Tomotaka Yamada
{"title":"Web Browser Fingerprinting Using Only Cascading Style Sheets","authors":"Naoki Takei, Takamichi Saito, Ko Takasu, Tomotaka Yamada","doi":"10.1109/BWCCA.2015.105","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.105","url":null,"abstract":"Many commercial Websites employ Web browser fingerprinting to track visitors using Hypertext Transfer Protocol (HTTP) headers, JavaScript, and other methods. Although a user can disable JavaScript or utilize a prevention tool to avoid being tracked, countermeasures against Web browser fingerprinting using Cascading Style Sheets (CSS) have not been established. Therefore, in this paper, we propose a method of fingerprinting that employs only CSS and discuss the effectiveness of our method.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomotaka Yamada, Takamichi Saito, Ko Takasu, Naoki Takei
{"title":"Robust Identification of Browser Fingerprint Comparison Using Edit Distance","authors":"Tomotaka Yamada, Takamichi Saito, Ko Takasu, Naoki Takei","doi":"10.1109/BWCCA.2015.106","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.106","url":null,"abstract":"Web browser fingerprinting is a method currently used to identify a user's device based on the features of the device and a browser. Although this method has been used for Web tracking, its utilization for risk-based authentication or forensics is expected. However, our studies reveal that some features used in fingerprinting undergo short-term changes, which makes continuous device identification difficult. In this paper, we propose a method for identifying features before the change and after the change based on degrees of similarity. Thus, we demonstrate that continuous identification is possible even if the features change. In the datasets that we collected, when using only the information of a plugin list installed in a device, our method identifies whether the same or a different device is used with 97.94% or 97.95% accuracy, respectively.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa
{"title":"Power Consumption and Computation Models of a Storage Server","authors":"A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/BWCCA.2015.79","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.79","url":null,"abstract":"It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems including a huge number of servers like cluster computing systems. Types of application processes like computation, storage, and communication processes are performed on servers in clusters. In clusters, most applications use not only CPU resources but also storage drives like database and web applications. In this paper, we consider storage processes which read and write files in storage devices. The SPCS model (simple power consumption model for a storage server) shows how much electric power a server consumes to perform storage and computation processes. In our macro-level approach, we first measure the electric power consumed by a whole server to perform storage and computation processes and the computation time of each process. Then, we define the SPCS model of a server to perform storage and computation processes by abstracting parameters like number of processes which dominate the electric power consumption. We also define a simple computation model for a storage server (SPCS model) to perform storage and computation processes.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Mirosław Kutyłowski
{"title":"A New Secure Data Deduplication Approach Supporting User Traceability","authors":"Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Mirosław Kutyłowski","doi":"10.1109/BWCCA.2015.49","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.49","url":null,"abstract":"The notion of data deduplication enables a user to eliminate duplicate copies of data so that it can save the amount of storage space and network bandwidth. Convergent encryption, as the state-of-art approach, has been widely adopted to perform secure deduplication in the cross-user scenario. However, all the existing solutions cannot support user traceability. That is, there is no way to trace the identities of malicious users for instance in case a user performed a duplicate faking attack. To cope with this issue, in this paper, we propose a novel secure deduplication scheme supporting user traceability by incorporating traceable signatures with the state of the art deduplication technique, such as interactive randomized convergent encryption and proof of ownership.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117169974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ventricular Fabrication Prediction Approach Based on Cloud-Mobile Healthcare Platform","authors":"Zhen-Xing Zhang, J. Lim","doi":"10.1109/BWCCA.2015.143","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.143","url":null,"abstract":"Sudden Cardiac Death (SCD) is an important risk factor for primary Ventricular Fibrillation (VF). This paper presents a prediction algorithm of VF based on Cloud-Mobile Healthcare platform. This algorithm applies heart rate variability (HRV) features and neural fuzzy network. The neural fuzzy network's input features are obtained by linear and nonlinear features of HRV. The experimental results show that the combination of features can predict VF by the accuracy of 65% for the five minutes intervals, before VF occurrence. It has been implemented in Cloud-Mobile Healthcare Platform. This Cloud-Mobile Healthcare Platform meets heart patient's requirements of early detection of outside the hospital.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa
{"title":"Effects of Security on Reliability of JXTA-Overlay P2P Platform a Comparison Study for Two Fuzzy-Based Systems","authors":"Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa","doi":"10.1109/BWCCA.2015.50","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.50","url":null,"abstract":"In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based systems (called FPRS1 and FPRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between the fuzzy-based reliability systems. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, it considers also the security which makes the platform more reliable. The proposed system can choose reliable peers to connect in JXTA-Overlay platform.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127422343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Admir Barolli, Tetsuya Oda, Keita Matsuo, Makoto Ikeda, L. Barolli, M. Takizawa
{"title":"Experimental Results of a Raspberry Pi Based WMN Testbed for Different OSs in Indoor Environment Considering LoS Scenario","authors":"Admir Barolli, Tetsuya Oda, Keita Matsuo, Makoto Ikeda, L. Barolli, M. Takizawa","doi":"10.1109/BWCCA.2015.58","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.58","url":null,"abstract":"Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. In this paper, we present the implementation of a testbed for WMNs using Raspbian and OpenWRT OSs. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. For evaluation we considered throughput, Packet Delivery Ratio (PDR), delay, jitter and hop count metrics. The experimental results show that the testbed mounted in OpenWRT has better results than Raspbian.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124072140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shigenari Nakamura, Dilawaer Duolikun, T. Enokido, M. Takizawa
{"title":"Role Safety in a Flexible Read-Write Abortion Protocol","authors":"Shigenari Nakamura, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/BWCCA.2015.90","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.90","url":null,"abstract":"In information systems, illegal information flow among objects has to be prevented. A transaction illegally reads an object if the object includes data in other objects which are not allowed to be read. In our previous studies, the flexible read-write-abortion with role sensitivity (FRWA-R) and object sensitivity (FRWA-O) protocols are discussed to prevent illegal information flow. Here, a transaction is aborted with some probability once illegally reading an object. The abortion probability depends on the sensitivity of roles which the transaction holds and objects which the transaction illegally reads. The role sensitivity and object sensitivity show how many transactions which hold the role and illegally read the object are aborted after illegally reading the object, respectively. Here, the sensitivity just monotonically increases each time a transaction is aborted. In this paper, we newly propose a safety concept of a role and an FRWA with role safety (FRWA-RS) protocol where the safety of a role increases and decreases if a transaction holding the role and illegally reading objects commits and aborts, respectively. A transaction with safer roles is aborted with smaller probability. In the evaluation, we show a fewer number of transactions are aborted in the FRWA-RS protocol than the RWA protocol while more than the WA protocol and transactions are more efficiently performed than the WA protocol.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}