{"title":"About ICSSA 2018","authors":"","doi":"10.1109/icssa45270.2018.00005","DOIUrl":"https://doi.org/10.1109/icssa45270.2018.00005","url":null,"abstract":"","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hey Siri – Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress)","authors":"Taekkyung Oh, William Aiken, Hyoungshick Kim","doi":"10.1109/ICSSA45270.2018.00026","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00026","url":null,"abstract":"Micro Electro-Mechanical Systems (MEMS) microphones have become popularly used in portable devices thanks to their numerous advantages over other types of microphones. However, MEMS microphones introduce their own vulnerabilities, and in this paper we discuss the possibility of new attacks that impact devices equipped with a MEMS microphone. We found that these devices can be vulnerable to a new jamming attack based on the resonance effect inherent in the vibrating nature of MEMS devices. For example, a user’s voice commands can be canceled by a jamming attack by broadcasting carefully crafted audio signals. When these signals are generated with a frequency that matches the inherent frequency of the target MEMS microphone, the microphone’s membrane will resonant at a significantly large amplitude which prevents the device from receiving the victim’s command.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress)","authors":"J. Ryoo, S. Tjoa, Ho-Sang Ryoo","doi":"10.1109/ICSSA45270.2018.00021","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00021","url":null,"abstract":"There is no doubt that IoT use in private homes (e.g., to control heating, entertainment systems, or security cameras) is rapidly increasing. While IoT has the potential to solve many problems and bring convenience to consumers, dependence on it introduces certain risks such as ransomware targeting smart homes and privacy violations by IoT vendors through extensive data mining. In this paper, we present an approach to model the risks of home IoT devices and introduce our vision for a user-friendly risk management tool.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131604976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Lee, Hyun Min Park, Kyu Don Hwang, Gyeong-Hun Min, Young Sun Park
{"title":"Building a DNS Security Range in a Closed Network (Lightning Talk)","authors":"H. Lee, Hyun Min Park, Kyu Don Hwang, Gyeong-Hun Min, Young Sun Park","doi":"10.1109/ICSSA45270.2018.00031","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00031","url":null,"abstract":"In this paper, we present how we built a DNS security range in a closed network. To enable trainees to practice DNS attack labs, such as DNS amplification and DNS cache poisoning, within a closed network, we implemented a pseudo DNS server emulating upstream servers. A modified version of BIND8, in which DNS transaction IDs increase sequentially as in BIND4, and a custom module for Metasploit were implemented to facilitate DNS cache poisoning attacks.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrimination of Facial Image Generated via GAN (Work-in-Progress)","authors":"Hyo-Kyung Choi, Eun-Jung Choi","doi":"10.1109/ICSSA45270.2018.00027","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00027","url":null,"abstract":"Generated fake facial images remain a serious problem for corporations, governments, developers and individuals, as the voice of anxiety about the side effects of artificial intelligence grows. However, today the AI is still done mainly as a way to keep up with a real facial image rather than researching how to discriminate the generated image. As the world that is no longer able to distinguish between real and fake facial images is coming, the need for radical AI technology to detect generated images arises. In this paper, we introduce an approach that addresses these issues, describing in feasible detail the discriminative models based on various machine learning algorithms. Specifically, we show that the model with the highest accuracy in supervised learning achieved a 92.5% detection rate at 7.5% false positive rate (FPR), out of 400 images. And we have also achieved positive results in unsupervised learning. Our results demonstrate that the fake facial images generated by the GAN can be discriminated by the machine learning algorithms. Since GAN models tend to improve rapidly, we foresee new neural network discrimination models gaining in importance as part of a generated image detection strategy in coming years.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"125 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk)","authors":"Won-Seok Choi, Hyoungshick Kim","doi":"10.1109/ICSSA45270.2018.00032","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00032","url":null,"abstract":"Since Bitcoin appeared in 2009, various other cryptocurrencies have also begun to attract attention and supporters. At the same time, because many cryptocurrency investors want to make a profit using cryptocurrencies, cryptocurrency exchanges list them without any special or technical verification. Cryptocurrency developers often write white papers to describe their cryptocurrency's special techniques and expected future worth. However, based solely on the contents of the white paper and/or a surface inspection of the source code, we cannot know if the developer has simply leveraged existing code bases without incorporating novel functionality. In order to address this problem, we present a framework to measure the similarity between the source codes of cryptocurrencies for detecting plagiarism.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk)","authors":"Hyung-Jong Kim, Hae Young Lee","doi":"10.1109/ICSSA45270.2018.00022","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00022","url":null,"abstract":"In this work, we propose the privacy protection layer for IoT services in Android platform. The layer will be a foundation for protection of confidentiality and integrity of the data which is used in the IoT services over the Android platform.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122908571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)","authors":"Hyung-Jong Kim, Soyeon Park","doi":"10.1109/ICSSA45270.2018.00016","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00016","url":null,"abstract":"The password setting of the MS-Office document file is a representative security countermeasure which is commonly used. Especially in the SOHO (Small Office Home Office) company case, the password for the MS-Office document file could be the affordable and solitary solution for the document security. By setting the password of the document, the owner of the file can ensure the confidentiality and integrity of the content of the document file. However, there are issues in this simple security mechanism such as the dependency of the strength of passwords and the difficulty of the password management. In this work, we propose two mechanisms for overcoming these two issues by adding simple but effective mechanisms named the SPT (Secure Password Translation) and the chain of trust. The SPT generates passwords for the MS-Office document files and the generated password has enough strength that the government regulation requires. For the preserving the integrity of the passwords and software components, we propose the chain of trust. By using these mechanisms, SOHO companies can preserve the confidentiality and integrity of the document files. In addition, the implementation of the trust-chain based SPT is easy and affordable to deploy. The contribution of this work is in proposing the design of software for managing passwords of the MS-Office document using SPT and the chain of trust.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Research Trends in Computer Security over the Last Decade","authors":"D. Lee, Hyoungshick Kim","doi":"10.1109/ICSSA45270.2018.00030","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00030","url":null,"abstract":"Recently, text mining has popularly been used not only to identify important topics but also predict future tends in a research field. In this paper, we apply text mining to analyze the research trends in the field of computer security over the last decade. We collected 2,256 papers published in the four major security conferences (CCS, NDSS, USENIX Security and S&P) between 2008 and 2017. We extracted keywords from the title and abstract in each paper and used them to identify important topics based on word frequency counts for each keyword. We analyzed the rankings and the changes in the most frequent keywords every year. Our observations from the analysis would be useful for understanding the popularity of computer security research, and predict potentially important research topics (e.g., SGX, Fuzzing, Blockchain, IoT and SDN) in the near future.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress)","authors":"Colin DeLeon, Young B. Choi, J. Ryoo","doi":"10.1109/ICSSA45270.2018.00017","DOIUrl":"https://doi.org/10.1109/ICSSA45270.2018.00017","url":null,"abstract":"The effect of Blockchain on the protection of patient information can serve as a way for hospitals and other medical facilities to secure patient records. With more threats targeting hospitals and other medical facilities, it is becoming more important for these organizations to improve the information systems that are charged with protecting their patient records. HIPPA regulations are in place to try and protect patient records and information but the hospitals do not allocate enough funds to information systems so they are put at risk of attack. Blockchain can offer the type of protection that these medical facilities need without them having to worry about upgrading the technology every year. The blockchain is not without its faults, and that can be seen in the attacks that take place against Bitcoin. Even with these attacks, the use of Blockchain would be beneficial to the hospitals and medical facilities.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}