2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)最新文献

筛选
英文 中文
Enhancing Privacy in a Blockchain-based Public Key Infrastructure 在基于区块链的公钥基础设施中增强隐私
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235005
Amalan Joseph Antony A, K. Singh
{"title":"Enhancing Privacy in a Blockchain-based Public Key Infrastructure","authors":"Amalan Joseph Antony A, K. Singh","doi":"10.1109/ISEA-ISAP49340.2020.235005","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235005","url":null,"abstract":"With the increasing need for, and the popularity of asymmetric cryptosystems, the need for a secure and efficient means of disseminating authentic public keys in a closed network is also on the increase[1]. Blockchain technology has been proposed as a solution to the security problems in the conventional models of a Public Key Infrastructure, as it offers transparency in the issuance of certificates and eliminates single points of failure. Blockchain excludes manipulation by making it computationally infeasible to edit a public key once it is published, thereby facilitating frequent key-updates. But this raises a concern about two issues - privacy and the proof of ownership, and ensuring one excludes the other. To reconcile these two seemingly irreconcilable problems, we propose a new key generation and update procedure, which will enable an identity to update its key with privacy and also to flawlessly prove the ownership of its past keys. Elliptic Curve Cryptographic methods are incorporated to make the cryptosystem secure. Further, the existence check of identities is optimised using multiple instances of bloom filter probabilistic data structures.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Notions for the VeraGreg Framework and Their Reductions 协议框架的安全概念及其削减
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.234994
Jakub Klemsa, Ivana Trummová
{"title":"Security Notions for the VeraGreg Framework and Their Reductions","authors":"Jakub Klemsa, Ivana Trummová","doi":"10.1109/ISEA-ISAP49340.2020.234994","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234994","url":null,"abstract":"Homomorphic encryption enables computations with encrypted data, however, in its plain form, it does not guarantee that the computation has been performed honestly. For the Fully Homomorphic Encryption (FHE), a verifiable variant emerged soon after the introduction of FHE itself, for a single-operation homomorphic encryption (HE), particular verifiable variant has been introduced recently, called the VeraGreg Framework. In this paper, we identify a weakness of List Non-Malleability as defined for the VeraGreg framework—an analogy to the classical Non-Malleability—and define a stronger variant, which addresses the weakness and which we show not to be strengthenable any more. Next, we suggest a decomposition of the abstract VeraGreg framework, introduce novel notions of security for the resulting components and show some reductions between them and/or their combinations. We conjecture that VeraGreg achieves the strongest (and desirable) security guarantee if and only if its building blocks achieve certain, much more tangible properties. Finally, we suggest a simplification to the original VeraGreg instantiation, which now relies on hardness of particular kind of the famous Shortest Vector Problem for lattices.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A LDPC codes based Authentication Scheme 一种基于LDPC码的认证方案
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235002
Apurva S. Kittur, Swapnil Kauthale, A. R. Pais
{"title":"A LDPC codes based Authentication Scheme","authors":"Apurva S. Kittur, Swapnil Kauthale, A. R. Pais","doi":"10.1109/ISEA-ISAP49340.2020.235002","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235002","url":null,"abstract":"Verifying multiple digital signatures in a batch to reduce verification time and computation has caught the interest of many researchers since many years. There are various batch verification schemes proposed for various popular digital signature algorithms such as DSS, RSA, ECDSA and other signature schemes. If there are any bad signatures in the given batch of signatures, then the batch verification test fails but the test does not indicate the location of the bad signature. In literature, there are very few efficient schemes, which locate the index of the bad signature/s in the given batch. These existing schemes perform poorly when the bad signature/s count is unknown or when the entire batch of signatures is faulty. To overcome these disadvantages, we propose a new Low-Density Parity-Check (LDPC) based verification scheme to locate the index of the bad signature/s. Our proposed scheme outperforms the other bad signature identification schemes. The comparative analysis of our scheme with the other schemes is provided. The primary advantage of the scheme is, it removes all the transmission errors in the received batch of signatures.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"82 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Anonymity: Customized for Roaming and Non-Roaming IoT-Devices in 5G Mobile Network 增强匿名性:针对5G移动网络中漫游和非漫游物联网设备定制
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235001
Hiten Choudhury
{"title":"Enhanced Anonymity: Customized for Roaming and Non-Roaming IoT-Devices in 5G Mobile Network","authors":"Hiten Choudhury","doi":"10.1109/ISEA-ISAP49340.2020.235001","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235001","url":null,"abstract":"3GPP-5G, a 5th generation mobile network standardized by the Third Generation Partnership Project (3GPP), is expected to play a pivotal role as a backbone network in the IoT. Recent collaboration among 3GPP and oneM2M - a global initiative for IoT, is a testimony to this fact. Therefore, security issues like anonymity in IoT over 3GPP-5G is gaining significance. Anonymity of a user having an IoT-device is as important as the anonymity of a user having a mobile handset. However, the scope of anonymity of an IoT-device and that of a mobile handset may be different. Unlike a mobile handset, in many use cases of IoT like smart home, the IoT devices have limited mobility and are not carried around from one serving area to another. On the contrary, in use cases like vehicle to vehicle communication, the IoT-devices have the same level of mobility as a mobile handset. Taking this into cognizance; in this paper, customized security schemes for enhanced anonymity in 3GPP-5G is proposed for the resource crunched IoT-devices.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure transmission of Hyperspectral Images 高光谱图像的安全传输
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235006
Oruganti Sai Srujana, Nikhil C. Mhala, A. R. Pais
{"title":"Secure transmission of Hyperspectral Images","authors":"Oruganti Sai Srujana, Nikhil C. Mhala, A. R. Pais","doi":"10.1109/ISEA-ISAP49340.2020.235006","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235006","url":null,"abstract":"Hyperspectral Images (HSIs) are images that are captured across the electromagnetic spectrum. Hyperspectral images are represented using a three-dimensional (x,y,λ) data cube where dimension x and y represent the spatial dimension of a scene, and λ represents the spectral dimension of a scene. These images contain abundant information that has to be transmitted securely among the users for further processing. Visual Secret Sharing (VSS) is a modern cryptographic method used to send the visual data securely among n users. VSS scheme generates multiple shares of the secret image, and to recover secret image, these all shares need to be stacked together.In this paper, we propose a scheme for the secure transmission of hyperspectral images using VSS. We also introduce a band selection technique as a pre-processing step to reduce the redundancy and size of the image cube. The proposed scheme uses the super-resolution concept to increase the contrast of the resultant image, obtained from the VSS. We have performed the visual quality assessment of the reconstructed image using quantitative measurement parameters and we have compared the results with the existing VSS based Randomised VSS (RVSS) scheme. The experimental results showed that our proposed scheme achieves better reconstruction quality than the RVSS scheme and reconstructs HSI with a similarity of almost 76-95%.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Singleton Flow Traceback (SFT) Mechanism 单例流回溯机制
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235012
R. C. Baishya, D. Bhattacharyya
{"title":"Singleton Flow Traceback (SFT) Mechanism","authors":"R. C. Baishya, D. Bhattacharyya","doi":"10.1109/ISEA-ISAP49340.2020.235012","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235012","url":null,"abstract":"In this paper we propose and analyze a loggingbased IP traceback mechanism, referred to as Singleton Flow Traceback(SFT), that can traceback to the source of a flow containing one or more packets. We consider the tuple < S, D > as a flow, where S is the Source IP and D is the destination IP of the flow and all packets with the same < S, D > pair belongs to the same flow. For logging, SFT requires significantly less storage (less than 8% of packet rate) than most of the existing single packet traceback mechanism in the literature. SFT guarantees zero false negative rate, i.e., if there exists a path P = R1, R2….Rk of routers through which the packets of a flow < S, D > has traversed, SFT can always reach R1, i.e., the first router to which the source of the flow < S, D > is connected with. Also, the expected value of false positive rate for a traceback query is very low (< 0.11).","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Identify Vulnerable Features of Instant Messenger 一种识别即时通讯漏洞特征的方法
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235003
Vineeta Jain, Divya Rishi Sahu, Deepak Singh Tomar
{"title":"An Approach to Identify Vulnerable Features of Instant Messenger","authors":"Vineeta Jain, Divya Rishi Sahu, Deepak Singh Tomar","doi":"10.1109/ISEA-ISAP49340.2020.235003","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235003","url":null,"abstract":"Swift proliferation in Instant Messaging (IM) applications, installed on Smartphone, has made it a target of the attacker to conduct crimes such as cyber stalking, threatening etc. It is possible to exploit Instant Messaging applications, owing to the presence of vulnerabilities such as sensitive data capture, weak cryptography etc. It has fuelled the need of conducting forensic analysis of IM applications through classifying these vulnerabilities. This paper focuses on performing forensic analysisx of IM Application on Android platform by identifying and classifying vulnerabilities such as sensitive data capture, weak cryptography etc. An approach is proposed using Machine Learning Methodology combined with the Genetic Algorithm to conduct forensic analysis. Further the developed approach has been applied on Line messenger to test its' accuracy. It is examined that 12% features in Line Messenger are vulnerable.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XSSD: A Cross-site Scripting Attack Dataset and its Evaluation XSSD:跨站点脚本攻击数据集及其评估
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.234995
Upasana Sarmah, D. Bhattacharyya, J. Kalita
{"title":"XSSD: A Cross-site Scripting Attack Dataset and its Evaluation","authors":"Upasana Sarmah, D. Bhattacharyya, J. Kalita","doi":"10.1109/ISEA-ISAP49340.2020.234995","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234995","url":null,"abstract":"Cross-site Scripting (abbreviated as XSS) attacks are application level code injection attacks where a malicious user injects malicious scripts into the legitimate code of a Web application used by the victim. To defend against such attacks, a number of defense mechanisms have been proposed over the years. The evaluation of the efficiency and the accuracy of a defense mechanism requires the use of a suitable relevant dataset. The unavailability of such an XSS feature dataset is a bottleneck in conducting research. To overcome this problem, we propose a data preparation framework, the result of which is an XSS feature dataset, referred to as XSSD (XSS Dataset). The dataset preparation framework consists of three stages and four modules, all of which are essential to support extraction of several URL-based and script-based features. We evaluate the dataset we generate with the help of five benchmark classifiers, and validate classification results in terms of ROC.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Testbed for Next Generation Mobile Networks 下一代移动网络安全试验台
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/ISEA-ISAP49340.2020.235010
Ashok Kumar Murthy, R. Parthasarathi, V. V
{"title":"Security Testbed for Next Generation Mobile Networks","authors":"Ashok Kumar Murthy, R. Parthasarathi, V. V","doi":"10.1109/ISEA-ISAP49340.2020.235010","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235010","url":null,"abstract":"Next-generation of mobile networks, 5G, is expected to support diverse requirements in three broad categories: enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable and low latency communication (uRLLC). 5G will act as an enabler for a large variety of applications such as autonomous vehicles, telesurgery, industrial communications, AR/VR, smart cities, etc. SDN, NFV and network slicing are some of the key enabling technologies in realizing a flexible 5G network architecture. Using these novel technologies to support a wide array of use cases, brings in a new set of challenges in providing security and privacy. It is therefore imperative to conduct rigorous cybersecurity analysis on different aspects of the network. In this paper, we propose a security testbed for next-generation mobile networks, which will allow us to conduct various security analyses that are transparent and easy to replicate. It will also allow us to execute a simulated cyber-attack and measure or compare how well a defense mechanism is performing. Our testbed leverages various opensource projects such as Open Source MANO (OSM), ONOS, and OpenStack.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ISEA-ISAP 2020 Contents ISEA-ISAP 2020目录
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) Pub Date : 2020-02-01 DOI: 10.1109/isea-isap49340.2020.9079310
{"title":"ISEA-ISAP 2020 Contents","authors":"","doi":"10.1109/isea-isap49340.2020.9079310","DOIUrl":"https://doi.org/10.1109/isea-isap49340.2020.9079310","url":null,"abstract":"","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信