2016 11th International Conference on Availability, Reliability and Security (ARES)最新文献

筛选
英文 中文
The Application of Social Media Image Analysis to an Emergency Management System 社交媒体图像分析在应急管理系统中的应用
M. Jing, B. Scotney, S. Coleman, T. McGinnity
{"title":"The Application of Social Media Image Analysis to an Emergency Management System","authors":"M. Jing, B. Scotney, S. Coleman, T. McGinnity","doi":"10.1109/ARES.2016.24","DOIUrl":"https://doi.org/10.1109/ARES.2016.24","url":null,"abstract":"The emergence of social media has provided vast amounts of information that is potentially valuable for emergency management. In the EU-FP7 Project Security Systems for Language and Image Analysis (Slandail), an image analysis system has been developed to recognize the flood water images from the social media resources by incorporating with text analysis. A novel image feature descriptor has been developed to facilitate fast image processing based on incorporation of the \"Squiral\" (Square-Spiral) Image Processing (SIP) framework with the \"Speeded-up Robust Features\" (SURF). A new approach is proposed to generate an index from image recognition outcomes based on a moving window average, which presents a temporal change based on the occurrence of flooding water identified by image analysis. The evaluation for computation time and recognition were based on a batch of images obtained from the US Federal Emergency Management Agency (FEMA) media library and Facebook corpus from Germany, and the outcomes show the advantages of the proposed image features. The simulation results demonstrate the concept of the index based on a moving window average, highlighting the potential for application in emergency management.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121360144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware 你的主要威胁是什么?论针对性恶意软件与商品恶意软件网络行为的区别
Enrico Mariconti, J. Onaolapo, Gordon J. Ross, G. Stringhini
{"title":"What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware","authors":"Enrico Mariconti, J. Onaolapo, Gordon J. Ross, G. Stringhini","doi":"10.1109/ARES.2016.36","DOIUrl":"https://doi.org/10.1109/ARES.2016.36","url":null,"abstract":"This work uses statistical classification techniques to learn about the different network behavior patterns demonstrated by targeted malware and generic malware. Targeted malware is a recent type of threat, involving bespoke software that has been created to target a specific victim. It is considered a more dangerous threat than generic malware, because a targeted attack can cause more serious damage to the victim. Our work aims to automatically distinguish between the network activity generated by the two types of malware, which then allows samples of malware to be classified as being either targeted or generic. For a network administrator, such knowledge can be important because it assists to understand which threats require particular attention. Because a network administrator usually manages more than an alarm simultaneously, the aim of the work is particularly relevant. We set up a sandbox and infected virtual machines with malware, recording all resulting malware activity on the network. Using the network packets produced by the malware samples, we extract features to classify their behavior. Before performing classification, we carefully analyze the features and the dataset to study all their details and gain a deeper understanding of the malware under study. Our use of statistical classifiers is shown to give excellent results in some cases, where we achieved an accuracy of almost 96% in distinguishing between the two types of malware. We can conclude that the network behaviors of the two types of malicious code are very different.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134150444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events 洪水事件中关键智能电网用户电力供应鲁棒性评估的基于hazbased方法
A. Vasenev, Lorena Montoya, A. Ceccarelli
{"title":"A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events","authors":"A. Vasenev, Lorena Montoya, A. Ceccarelli","doi":"10.1109/ARES.2016.12","DOIUrl":"https://doi.org/10.1109/ARES.2016.12","url":null,"abstract":"Ensuring an external electricity supply to critical city components during flood events requires adequate urban grid planning. The proliferation of smart grid technologies means that such planning needs to assess how smart grids might function during floods. This paper proposes a method to qualitatively investigate robustness of electricity supply to smart grid consumers during flood events. This method builds on the Hazus methodology and aims to provide inputs for the risk analysis of urban grids.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Usable Privacy-Aware Logging for Unstructured Log Entries 可用于非结构化日志条目的隐私感知日志
Christof Rath
{"title":"Usable Privacy-Aware Logging for Unstructured Log Entries","authors":"Christof Rath","doi":"10.1109/ARES.2016.1","DOIUrl":"https://doi.org/10.1109/ARES.2016.1","url":null,"abstract":"Log files are a basic building block of computer systems. They typically contain sensitive data, for example, information about the internal structure of a service and its users. Additionally, log records are usually unstructured in the sense that sensitive data will not occur in every entry and not always occur at defined positions within a record. To mitigate the threat of illicit access to log files, we propose a flexible framework for the creation of privacy-preserving log records. A crucial step is the annotation of sensitive data, by using arbitrary labels, during the development of a system. These labels are mapped to redaction filters to form a redaction policy. Thus, we can create two parallel log streams. One log stream contains fully redacted log entries. It, hence, does not contain any sensitive information and is intended for everyday use. The second stream contains the original entires. Here, confidentiality must be ensured. Our framework fosters privacy by default principles and can support selective disclosure of relevant data. We developed an implementation of our solution for logback, one of the major logging frameworks in Java, and successfully evaluated its applicability.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks 基于cd的工业无线传感器网络入侵检测部署方案研究
Lyes Bayou, N. Cuppens-Boulahia, D. Espès, F. Cuppens
{"title":"Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks","authors":"Lyes Bayou, N. Cuppens-Boulahia, D. Espès, F. Cuppens","doi":"10.1109/ARES.2016.48","DOIUrl":"https://doi.org/10.1109/ARES.2016.48","url":null,"abstract":"The use of wireless communication is a major trend in the so called Supervisory Control and Data Acquisition systems (SCADA). Consequently, Wireless Industrial Sensor Networks (WISN) were developed to meet real time and security requirements needed by SCADA systems. In term of security, WISN suffer from the same threats that those targeting classical WSN. Indeed, attackers mainly use wireless communication as a medium to launch these attacks. But as these networks are used to manage critical systems, consequences of such attacks can be more harmful. Therefore, additionally to the use of cryptographic and authentication mechanisms, Intrusion Detection Systems (IDS) are also used as a second line of defense. In this paper we propose an efficient IDS deployment scheme specially tailored to fit WISN characteristics. It builds a virtual wireless backbone that adds security purposes to the WISN. We also show that the proposed deployment scheme provides a good traffic monitoring capability with an acceptable number of monitoring nodes. It particularly allows detecting that a packet has been forged, deleted, modified or delayed during its transmission.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads 在线用户的价值:个性化广告价格的实证评价
Miriam Marciel, J. Cabañas, Y. Kassa, Roberto Gonzalez, Mohamed Ahmed
{"title":"The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads","authors":"Miriam Marciel, J. Cabañas, Y. Kassa, Roberto Gonzalez, Mohamed Ahmed","doi":"10.1109/ARES.2016.89","DOIUrl":"https://doi.org/10.1109/ARES.2016.89","url":null,"abstract":"Ad networks use the behaviors of online users to associate them with preferences (features), and market these features to enable advertisers to target online users. Typical features associated with users include location, interests, gender, age, and etc. Furthemore, ad networks provide their clients with campaing creation tools to help to them to configure and run campains. In this paper, we study the pricing of ads using the ad campaing planning tools of ad networks. We develop tools to collect the suggested bid prices from two platforms: YouTube and Facebook. Analyzing these prices we find that United States is the most expensive country in both platforms. We also find that the most expensive preferences are different in YouTube and Facebook. In YouTube, the top preferences are related to Oil & Gas, while in Facebook are devices, ethnics or politics depending on the type of bidding. Finally, we do not find any price difference genders in Facebook.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective 观察者眼中的你的数据:从市场角度估算个人信息价值的统一数据估值门户设计
Y. Kassa, J. Cabañas, Ángel Cuevas, R. C. Rumín, Miriam Marciel, Roberto Gonzalez
{"title":"Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective","authors":"Y. Kassa, J. Cabañas, Ángel Cuevas, R. C. Rumín, Miriam Marciel, Roberto Gonzalez","doi":"10.1109/ARES.2016.55","DOIUrl":"https://doi.org/10.1109/ARES.2016.55","url":null,"abstract":"Nowadays Internet companies that offer valuable services \"for free\" are becoming ubiquitous. Users benefiting from these services have to expose their personal information through these services as they utilize them. On the other hand, personal information is becoming a merchandisable commodity, venues that sell personal information by auction are emerging. One of these markets is in the form of advertising systems. Despite being a lucrative business, the hoarding of user personal information by commercial companies is a growing issue primarily because of its non-transparent nature. In this paper we present a data valuation portal that shades light on what kinds of personal information is on market and the financial value of it.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Synchronous One Time Biometrics with Pattern Based Authentication 基于模式认证的同步一次性生物识别
Patrick Lacharme, C. Rosenberger
{"title":"Synchronous One Time Biometrics with Pattern Based Authentication","authors":"Patrick Lacharme, C. Rosenberger","doi":"10.1109/ARES.2016.61","DOIUrl":"https://doi.org/10.1109/ARES.2016.61","url":null,"abstract":"One time passwords are commonly used for authentication purposes in electronic transactions. Nevertheless, providing such a one time password is not really a strong authentication proof %as it can be given by an impostor. because the token generating the passwords can be given by an impostor. In order to cope with this problem, biometric recognition is more and more employed. Even if biometric data are strongly linked with the user, their revocability nor diversity is possible, without an adapted post-processing. Biometric template protection schemes, including the BioHashing algorithm, are used to manage the underlying privacy and security issues. These schemes are used for the protection of several biometric modalities, but are not necessary adapted for all of them. In this paper, we propose a new protocol combining protected biometric data and a classical synchronous one time password to enhance the security of user authentication while preserving usability and privacy. Behavioral biometrics is used to provide a fast and a usable solution for users. We show through experimental results the efficiency of the proposed method.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127846191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities 使用可信执行和移动应用程序许可功能确保捕获照片的真实性和保真度
Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos
{"title":"Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities","authors":"Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos","doi":"10.1109/ARES.2016.83","DOIUrl":"https://doi.org/10.1109/ARES.2016.83","url":null,"abstract":"Mobile devices, which users habitually carry along, have become the main data gateway for the majority of the online services. Any device is able to collect at any time various types of data through its sensors. At the same time, modern identification techniques ask users to send photos of their ID documentation in order to be verified by an online service. Those photos are captured by the device's camera and are considered extremely sensitive. They must be secured and establish that they will not be modified. This paper describes a security framework that preserves the authenticity of a captured photo and ensures that it remains intact while transferred to a remote server. The key inside is to use a background service that is tied to the photo-capturing application and uses secure key storing and cryptographic computation capabilities offered by the Trusted Execution Environment (TEE) of commodity Android devices. At the same time, we leverage Playstore's Licencing Verification Library (LVL) to remotely attest the authenticity of the photo-capturing application at registration time. We have implemented our framework as an Android application on a Nexus 5X, which is powered by a Qualcomm processor with ARM TrustZone Technology. The evaluation of our prototype implementation demonstrates the efficacy of the proposed framework in terms of performance overhead and usability.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115329943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Peek under the Hood of iOS Malware iOS恶意软件揭秘
Laura García, R. Rodríguez
{"title":"A Peek under the Hood of iOS Malware","authors":"Laura García, R. Rodríguez","doi":"10.1109/ARES.2016.15","DOIUrl":"https://doi.org/10.1109/ARES.2016.15","url":null,"abstract":"Malicious software specially crafted to proliferate in mobile platforms are becoming a serious threat, as reported by numerous software security vendors during last years. Android and iOS are nowadays the leaders of mobile OS market share. While malware targeting Android are largely studied, few attention is paid to iOS malware. In this paper, we fill this gap by studying and characterizing malware targeting iOS devices. To this regard, we study the features of iOS malware and classify samples of 36 iOS malware families discovered between 2009 and 2015. We also show the methodology for iOS malware analysis and provide a detailed analysis of a malware sample. Our findings evidence that most of them are distributed out of official markets, target jailbroken iOS devices, and very few exploit any vulnerability.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信