{"title":"Reminder as ‘Watch-Out’: The Role of Privacy Salience at the Point of Interaction with Biometric Systems","authors":"Junhyoung Oh, Ukjin Lee, K. Lee","doi":"10.1109/PLATCON.2018.8472767","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472767","url":null,"abstract":"Biometrics users are concerned about privacy issues, while personal recognition methods are automated and easy to use. For users who want to protect their biometric information, practitioners need to take action in the public interest to better prevent users from leaking their biometric information in situations where the user interacts with the biometric system. This study explores how the user can perceive the consequences of registering biometric information through the Theory of Planned Behavior and attitude aspects. Sensitivity to potential consequences of the biological system was confirmed by the behavior and response observed by the subjects after using the biometric system. The sensitivity of the experimental group was found to be higher than that of the control group. Therefore, this study suggests that simple information presentation in system interaction can lead to more protective against privacy issue.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management to Cryptocurrency Exchange and Investors Guidelines to Prevent Potential Threats","authors":"Chang Yeon Kim, K. Lee","doi":"10.1109/PLATCON.2018.8472760","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472760","url":null,"abstract":"Investment and interest in cryptocurrency is rapidly growing. The price of each bitcoin, in particular, has exceeded 10,000 dollars as of November 2017, so we do not know how long the uptrend will continue. Although blockchain technology is more open and security oriented than conventional currency issuing methods, it is relatively ineffective in terms of distribution and management of cryptocurrency. The most common way to get cryptocurrency is trading through exchange and mining, which novices sometimes invest in without sufficient knowledge. Therefore, this paper analyzes vulnerabilities of potential cryptocurrency exchanges and individual user wallets. Moreover, this paper will suggest policy risk management methods using international standards such as from NIST and ISO. Blockchain, weaknesses of countermeasures management system, countermeasures to deal with them, management vulnerability of investors and management plan. Server management plan and personal action tips will be provided.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Landmark Extraction Scheme Based on Semantic Segmentation","authors":"H. Kim, Jisoo Park, Hyeonwoo Kim, Eenjun Hwang","doi":"10.1109/PLATCON.2018.8472730","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472730","url":null,"abstract":"Facial landmark is a set of features that can be distinguished in the human face with the naked eye. Typical facial landmark includes eyes, eyebrows, nose and mouth. It plays an important role in the human-related image analysis. For example, it can be used to determine whether human beings exist in the image, identify who the person is or recognize the orientation of a face when photographing. Methods for detecting facial landmark can be classified into two groups: One group is based on traditional image processing techniques such as Haar-cascade and edge detection. The other group is based on machine learning technique where landmark is detected through training facial features. However, such techniques have shown low accuracy, especially in the exceptional conditions such as low luminance or overlapped face. To overcome this problem, we propose a new facial landmark extraction scheme using deep learning and semantic segmentation and demonstrate that with even small dataset, our scheme can achieve excellent facial landmark extraction performance.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong-rae Lee, Hwee Kim, Yo-Sub Han, Yong-seok Seo, Dong-Hyuck Im
{"title":"An Efficient Video Series Decision Algorithm Based on Actor-Face Recognition","authors":"Hong-rae Lee, Hwee Kim, Yo-Sub Han, Yong-seok Seo, Dong-Hyuck Im","doi":"10.1109/PLATCON.2018.8472744","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472744","url":null,"abstract":"It is an important task to check whether or not an uploaded video on the Internet violates the copyright. One of the most common approaches for checking such videos is to compare an uploaded video with respect to the sample data provided the original owner. A disadvantage of this approach is that a large amount of sample data must be stored in the database before, and also the task becomes very challenging when an uploaded video is distorted. We propose a method of generating a signature set that characterizes a series of video sets based on face recognition data, and suggest an efficient method on how to identify which series is included in the corresponding series set. We demonstrate that the proposed method can effectively determine whether or not a video is in a series set even if the video data is relatively small as an input for the previous method.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133733837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Cyber Security Controls from An ICS Perspective","authors":"Youngin You, Juhyeon Lee, Junhyoung Oh, K. Lee","doi":"10.1109/PLATCON.2018.8472757","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472757","url":null,"abstract":"As cyber attacks on national critical infrastructure have increased, researches are actively conducted to protect industrial control systems(ICS). Compared with existing IT systems, research on special attributes of ICS has been performed mainly, and based on this, many security requirements for ICSs have been derived. However, there is insufficient research on security control to understand and improve the security status of target ICS. To the best of our knowledge, only a comprehensive guide to applying existing security controls to ICSs is being presented. Therefore, this study suggests implications for the current security control items from the ICS point of view. For this purpose, each viewpoint for categorizing and analyzing information security control items was established and based on this, an integrated matrix of ICS security control was derived. Through the ICS security control matrix, the information security control items currently being guided are analyzed from the viewpoint of the ICS, and the present status and implications are derived. The findings can be used as an indicator to effectively apply appropriate controls to appropriate locations where security is required. It is also expected to be a useful reference for improving and supplementing security control items currently being used and used.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115086931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal Payment Transaction Detection Scheme Based on Scalable Architecture and Redis Cluster","authors":"Taeyoung Leea, Yongsung Kim, Eenjun Hwang","doi":"10.1109/PLATCON.2018.8472732","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472732","url":null,"abstract":"Log file based data analysis methods in the closed fault tolerant OS have shown several problems. First, it is not easy to add or change the data analysis direction while the service is running after the analysis process has been set and compiled. Second, in an independent closed system, due to the limited resource policy, it is difficult to perform real-time data analysis. Finally, it is not easy to utilize new technologies and open sources such as in-memory database and python. Due to these problems, existing methods have difficulty in detecting abnormal payment transactions in real time. In this paper, we propose an abnormal payment transaction detection scheme based on scalable network architecture and Redis cluster, which can collect transaction data quickly and perform their analysis in real-time. We show its performance by implementing a prototype system and performing several experiments on it. Furthermore, we show that our proposed scheme can be used for data analysis through the reproduction of data using in-memory storage, which can solve the aforementioned problem of unidirectional analysis by doing parallel processing on the distributed Redis repository.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Analysis of Wi-Fi Connected Dashboard Camera","authors":"Won Park, Dahee Choi, K. Lee","doi":"10.1109/PLATCON.2018.8472768","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472768","url":null,"abstract":"Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam’ s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-based Nominal Group Technique Decision Making Tool Using Blockchain","authors":"Sunghyun Na, Y. B. Park","doi":"10.1109/PLATCON.2018.8472769","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472769","url":null,"abstract":"The overall interest of modern managers is to find effective group decision-making methods when members with diverse backgrounds and perspectives have to solve problems together. Nominal Group Technique is used as one of the methods for group decision making. However, the Nominal Group Technique is not easy to ensure anonymity in a face-to-face environment, and there is no clear evidence to support the judgment of results after voting. In addition, it is difficult to trust the data because the integrity of the data generated by the voting result is not ensured. In this paper, propose a web-based Nominal Group Technique using blockchain. Web-based Nominal Group Technique can construct an agent - based model and request the blockchain network when data management is needed to guarantee the integrity of the data. In addition, the anonymity of all members is ensured through the web chat function, and the voting results can be visualized using the Priority Graph Tool, which is implemented on the web during the group decision making.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electricity Price Forecasting for Nord Pool Data","authors":"Rita Beigaitė, T. Krilavičius, K. Man","doi":"10.1109/PLATCON.2018.8472762","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472762","url":null,"abstract":"In many countries deregulation of power markets was undertaken to create a more efficient market. As a result, electricity now can be purchased and sold across areas and countries more easily. For participants of electricity market it is beneficial to forecast future prices in order to optimize risks and profits as well as make future plans. A number of various methods is applied for solving this problem. However, the accuracy of forecasts is not sufficient as market spot price of electricity has features such as seasonality, spikes or high volatility. Furthermore, diverse approaches work differently with distinct countries (markets). In this paper we discuss our experiments with electricity spot price data of Lithuania's price zone in Nord Pool power market. Day-ahead forecasts are made using Seasonal Naïve, Exponential smoothing, Artificial Neural Networks.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akinbobola Oluwaseun Adetunji, S. Butakov, P. Zavarsky
{"title":"Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2","authors":"Akinbobola Oluwaseun Adetunji, S. Butakov, P. Zavarsky","doi":"10.1109/PLATCON.2018.8472773","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472773","url":null,"abstract":"The security content automation includes configurations of large number of systems, installation of patches securely, verification of security-related configuration settings, compliance with security policies and regulatory requirements, and ability to respond quickly when new threats are discovered [1]. Although humans are important in information security management, humans sometimes introduce errors and inconsistencies in an organization due to manual nature of their tasks [2]. Security Content Automation Protocol was developed by the U.S. NIST to automate information security management tasks such as vulnerability and patch management, and to achieve continuous monitoring of security configurations in an organization. In this paper, SCAP is employed to develop an automated security configuration checklist for use in verifying Apple iOS device configuration against the defined security baseline to enforce policy compliance in an enterprise.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}