Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)最新文献

筛选
英文 中文
Design e implementação de uma arquitetura conceitual para a criação de social botnet em redes sociais 在社交网络中创建社交僵尸网络的概念架构的设计与实现
V. Leite, R. Salles
{"title":"Design e implementação de uma arquitetura conceitual para a criação de social botnet em redes sociais","authors":"V. Leite, R. Salles","doi":"10.5753/sbseg.2019.13982","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13982","url":null,"abstract":"As implicações de segurança diante dos socialbots são evidentes por causa da grande quantidade de usuários que as redes sociais apresentam e da alta capacidade de compartilhamento de dados, que traz como consequência a elevada propagação de informação. Com base nisto, o objetivo desta pesquisa é apresentar uma proposta de arquitetura conceitual para a criação de social botnet capaz de ser usada junto às ferramentas de detecção para a simulação de socialbots. Ao implementá-la no Facebook, uma análise da segurança dessa rede social é realizada para apresentar os aspectos observados que precisam ser aprimorados por ela e pela área de detecção de social botnet.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129010363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternative N-bit Key Data Encryption for Block Ciphers 分组密码的备选n位密钥数据加密
K. M. C. Damasceno, C. Cruz, Anderson de Oliveira, Luís De Castro
{"title":"Alternative N-bit Key Data Encryption for Block Ciphers","authors":"K. M. C. Damasceno, C. Cruz, Anderson de Oliveira, Luís De Castro","doi":"10.5753/sbseg.2019.13990","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13990","url":null,"abstract":"Post-encryption patterns are cribs that can be used by adversaries to unlock the encryption key both in symmetric or asymmetric cryptography, compromising security. Different methods to mitigate the problem, with their advantages and disadvantages, can be found in the literature, including one-time pad encryption, code-based cryptography and cipher block chaining. This work presents an alternative technique to generate an n-bit, n-block and key cipher that can be derived from reasonable short length key. The proposed technique is able to mitigate post-encryption patterns. Experimental results asserting the capabilities of the proposed cipher techniques are presented and discussed in the text.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uma análise preliminar do controle de forks no mecanismo de consenso Proof-of-Stake com Tempo Discreto 离散时间权益证明共识机制分叉控制的初步分析
Diego Martins, M. Henriques
{"title":"Uma análise preliminar do controle de forks no mecanismo de consenso Proof-of-Stake com Tempo Discreto","authors":"Diego Martins, M. Henriques","doi":"10.5753/sbseg.2019.13994","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13994","url":null,"abstract":"Este artigo apresenta uma análise preliminar do mecanismo de consenso para blockchains baseado em Proof-of-Stake com Tempo Discreto (PoSTD). O texto explica os mecanismos que controlam a criação de novos blocos e a eliminação de forks na cadeia. Em seguida, o mecanismo de consenso é analisado de forma genérica, através de diferentes cenários na visão de um determinado nó. É mostrado como o algoritmo atinge o consenso mesmo com atrasos na rede, desde que o tempo de duração de uma rodada de trabalho seja superior ao maior dos atrasos de comunicação entre dois nós quaisquer conectados no sistema.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduzindo a Superfície de Ataque dos Frameworks de Instrumentação Binária Dinâmica 减少动态二进制仪表框架的攻击面
A. G. D. S. Filho
{"title":"Reduzindo a Superfície de Ataque dos Frameworks de Instrumentação Binária Dinâmica","authors":"A. G. D. S. Filho","doi":"10.5753/sbseg.2019.13976","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13976","url":null,"abstract":"Este artigo propõe contramedidas para mitigar técnicas de antiinstrumentação, em especial as que exploram o aumento da superfície de ataque produzido por ferramentas de instrumentação binária dinâmica, permitindo ataques como a execução de código arbitrário. Provas de conceito foram desenvolvidas e testadas em ambiente controlado com um conjunto de técnicas anti-instrumentação. Como resultado, é apresentado que é possível reduzir a superfície de ataque explorável das ferramentas DBI através da mitigação das técnicas anti-instrumentação.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the effects of removing common blocks on Approximate Matching scores under different scenarios for digital forensic investigations 了解在数字取证调查的不同场景下,去除常见块对近似匹配分数的影响
V. Moia, Frank Breitinger, M. A. Henriques
{"title":"Understanding the effects of removing common blocks on Approximate Matching scores under different scenarios for digital forensic investigations","authors":"V. Moia, Frank Breitinger, M. A. Henriques","doi":"10.5753/sbseg.2019.13966","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13966","url":null,"abstract":"Finding similarity in digital forensics investigations can be assisted with the use of Approximate Matching (AM) functions. These algorithms create small and compact representations of objects (similar to hashes) which can be compared to identify similarity. However, often results are biased due to common blocks (data structures found in many different files regardless of content). In this paper, we evaluate the precision and recall metrics for AM functions when removing common blocks. In detail, we analyze how the similarity score changes and impacts different investigation scenarios. Results show that many irrelevant matches can be filtered out and that a new interpretation of the score allows a better similarity detection.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123895070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Approach for Adaptive Security of Cloud Applications within the ATMOSPHERE Platform ATMOSPHERE平台内云应用的自适应安全方法
Jorge Da Silva, A. Braga, C. M. F. Rubira, R. Dahab
{"title":"An Approach for Adaptive Security of Cloud Applications within the ATMOSPHERE Platform","authors":"Jorge Da Silva, A. Braga, C. M. F. Rubira, R. Dahab","doi":"10.5753/sbseg.2019.13988","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13988","url":null,"abstract":"Self-protecting systems can reduce response time to known attacks by automating decision-making processes in security operations. This paper briefly describes the ATMOSPHERE platform for monitoring and enforcement of trustworthiness in cloud systems, as well as proposes a way to enhance its Trustworthiness Monitoring & Assessment framework (responsible for analyzing and planning adaptation actions) in order to instantiate the concept of adaptive security for self-protecting cloud infrastructures and applications. The paper approaches adaptive security based upon adaptive Web Application Firewalls, and enhances a software-based, feedback control loop (named MAPE-K) for monitoring and analysis of security events, as well as the planning and execution of adaptation actions for securing cloud applications. This is a work in progress, currently under development, to be integrated to ATMOSPHERE's framework.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115915920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Anonymity technique for privacy protection: a proof of concept study 隐私保护的k -匿名技术:概念验证研究
Ítalo Santos, E. Coutinho, Leonardo Moreira
{"title":"K-Anonymity technique for privacy protection: a proof of concept study","authors":"Ítalo Santos, E. Coutinho, Leonardo Moreira","doi":"10.5753/sbseg.2019.13987","DOIUrl":"https://doi.org/10.5753/sbseg.2019.13987","url":null,"abstract":"Privacy is a concept directly related to people's interest in maintaining personal space without the interference of others. In this paper, we focus on study the k-anonymity technique since many generalization algorithms are based on this privacy model. Due to this, we develop a proof of concept that uses the k-anonymity technique for data anonymization to anonymize data raw and generate a new file with anonymized data. We present the system architecture and detailed an experiment using the adult data set which has sensitive information, where each record corresponds to the personal information for a person. Finally, we summarize our work and discuss future works.","PeriodicalId":221963,"journal":{"name":"Anais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信