{"title":"Enhancing Privacy in a Blockchain-based Public Key Infrastructure","authors":"Amalan Joseph Antony A, K. Singh","doi":"10.1109/ISEA-ISAP49340.2020.235005","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235005","url":null,"abstract":"With the increasing need for, and the popularity of asymmetric cryptosystems, the need for a secure and efficient means of disseminating authentic public keys in a closed network is also on the increase[1]. Blockchain technology has been proposed as a solution to the security problems in the conventional models of a Public Key Infrastructure, as it offers transparency in the issuance of certificates and eliminates single points of failure. Blockchain excludes manipulation by making it computationally infeasible to edit a public key once it is published, thereby facilitating frequent key-updates. But this raises a concern about two issues - privacy and the proof of ownership, and ensuring one excludes the other. To reconcile these two seemingly irreconcilable problems, we propose a new key generation and update procedure, which will enable an identity to update its key with privacy and also to flawlessly prove the ownership of its past keys. Elliptic Curve Cryptographic methods are incorporated to make the cryptosystem secure. Further, the existence check of identities is optimised using multiple instances of bloom filter probabilistic data structures.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121107001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Notions for the VeraGreg Framework and Their Reductions","authors":"Jakub Klemsa, Ivana Trummová","doi":"10.1109/ISEA-ISAP49340.2020.234994","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234994","url":null,"abstract":"Homomorphic encryption enables computations with encrypted data, however, in its plain form, it does not guarantee that the computation has been performed honestly. For the Fully Homomorphic Encryption (FHE), a verifiable variant emerged soon after the introduction of FHE itself, for a single-operation homomorphic encryption (HE), particular verifiable variant has been introduced recently, called the VeraGreg Framework. In this paper, we identify a weakness of List Non-Malleability as defined for the VeraGreg framework—an analogy to the classical Non-Malleability—and define a stronger variant, which addresses the weakness and which we show not to be strengthenable any more. Next, we suggest a decomposition of the abstract VeraGreg framework, introduce novel notions of security for the resulting components and show some reductions between them and/or their combinations. We conjecture that VeraGreg achieves the strongest (and desirable) security guarantee if and only if its building blocks achieve certain, much more tangible properties. Finally, we suggest a simplification to the original VeraGreg instantiation, which now relies on hardness of particular kind of the famous Shortest Vector Problem for lattices.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A LDPC codes based Authentication Scheme","authors":"Apurva S. Kittur, Swapnil Kauthale, A. R. Pais","doi":"10.1109/ISEA-ISAP49340.2020.235002","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235002","url":null,"abstract":"Verifying multiple digital signatures in a batch to reduce verification time and computation has caught the interest of many researchers since many years. There are various batch verification schemes proposed for various popular digital signature algorithms such as DSS, RSA, ECDSA and other signature schemes. If there are any bad signatures in the given batch of signatures, then the batch verification test fails but the test does not indicate the location of the bad signature. In literature, there are very few efficient schemes, which locate the index of the bad signature/s in the given batch. These existing schemes perform poorly when the bad signature/s count is unknown or when the entire batch of signatures is faulty. To overcome these disadvantages, we propose a new Low-Density Parity-Check (LDPC) based verification scheme to locate the index of the bad signature/s. Our proposed scheme outperforms the other bad signature identification schemes. The comparative analysis of our scheme with the other schemes is provided. The primary advantage of the scheme is, it removes all the transmission errors in the received batch of signatures.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"82 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Anonymity: Customized for Roaming and Non-Roaming IoT-Devices in 5G Mobile Network","authors":"Hiten Choudhury","doi":"10.1109/ISEA-ISAP49340.2020.235001","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235001","url":null,"abstract":"3GPP-5G, a 5th generation mobile network standardized by the Third Generation Partnership Project (3GPP), is expected to play a pivotal role as a backbone network in the IoT. Recent collaboration among 3GPP and oneM2M - a global initiative for IoT, is a testimony to this fact. Therefore, security issues like anonymity in IoT over 3GPP-5G is gaining significance. Anonymity of a user having an IoT-device is as important as the anonymity of a user having a mobile handset. However, the scope of anonymity of an IoT-device and that of a mobile handset may be different. Unlike a mobile handset, in many use cases of IoT like smart home, the IoT devices have limited mobility and are not carried around from one serving area to another. On the contrary, in use cases like vehicle to vehicle communication, the IoT-devices have the same level of mobility as a mobile handset. Taking this into cognizance; in this paper, customized security schemes for enhanced anonymity in 3GPP-5G is proposed for the resource crunched IoT-devices.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure transmission of Hyperspectral Images","authors":"Oruganti Sai Srujana, Nikhil C. Mhala, A. R. Pais","doi":"10.1109/ISEA-ISAP49340.2020.235006","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235006","url":null,"abstract":"Hyperspectral Images (HSIs) are images that are captured across the electromagnetic spectrum. Hyperspectral images are represented using a three-dimensional (x,y,λ) data cube where dimension x and y represent the spatial dimension of a scene, and λ represents the spectral dimension of a scene. These images contain abundant information that has to be transmitted securely among the users for further processing. Visual Secret Sharing (VSS) is a modern cryptographic method used to send the visual data securely among n users. VSS scheme generates multiple shares of the secret image, and to recover secret image, these all shares need to be stacked together.In this paper, we propose a scheme for the secure transmission of hyperspectral images using VSS. We also introduce a band selection technique as a pre-processing step to reduce the redundancy and size of the image cube. The proposed scheme uses the super-resolution concept to increase the contrast of the resultant image, obtained from the VSS. We have performed the visual quality assessment of the reconstructed image using quantitative measurement parameters and we have compared the results with the existing VSS based Randomised VSS (RVSS) scheme. The experimental results showed that our proposed scheme achieves better reconstruction quality than the RVSS scheme and reconstructs HSI with a similarity of almost 76-95%.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123073658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Singleton Flow Traceback (SFT) Mechanism","authors":"R. C. Baishya, D. Bhattacharyya","doi":"10.1109/ISEA-ISAP49340.2020.235012","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235012","url":null,"abstract":"In this paper we propose and analyze a loggingbased IP traceback mechanism, referred to as Singleton Flow Traceback(SFT), that can traceback to the source of a flow containing one or more packets. We consider the tuple < S, D > as a flow, where S is the Source IP and D is the destination IP of the flow and all packets with the same < S, D > pair belongs to the same flow. For logging, SFT requires significantly less storage (less than 8% of packet rate) than most of the existing single packet traceback mechanism in the literature. SFT guarantees zero false negative rate, i.e., if there exists a path P = R1, R2….Rk of routers through which the packets of a flow < S, D > has traversed, SFT can always reach R1, i.e., the first router to which the source of the flow < S, D > is connected with. Also, the expected value of false positive rate for a traceback query is very low (< 0.11).","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Identify Vulnerable Features of Instant Messenger","authors":"Vineeta Jain, Divya Rishi Sahu, Deepak Singh Tomar","doi":"10.1109/ISEA-ISAP49340.2020.235003","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235003","url":null,"abstract":"Swift proliferation in Instant Messaging (IM) applications, installed on Smartphone, has made it a target of the attacker to conduct crimes such as cyber stalking, threatening etc. It is possible to exploit Instant Messaging applications, owing to the presence of vulnerabilities such as sensitive data capture, weak cryptography etc. It has fuelled the need of conducting forensic analysis of IM applications through classifying these vulnerabilities. This paper focuses on performing forensic analysisx of IM Application on Android platform by identifying and classifying vulnerabilities such as sensitive data capture, weak cryptography etc. An approach is proposed using Machine Learning Methodology combined with the Genetic Algorithm to conduct forensic analysis. Further the developed approach has been applied on Line messenger to test its' accuracy. It is examined that 12% features in Line Messenger are vulnerable.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XSSD: A Cross-site Scripting Attack Dataset and its Evaluation","authors":"Upasana Sarmah, D. Bhattacharyya, J. Kalita","doi":"10.1109/ISEA-ISAP49340.2020.234995","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.234995","url":null,"abstract":"Cross-site Scripting (abbreviated as XSS) attacks are application level code injection attacks where a malicious user injects malicious scripts into the legitimate code of a Web application used by the victim. To defend against such attacks, a number of defense mechanisms have been proposed over the years. The evaluation of the efficiency and the accuracy of a defense mechanism requires the use of a suitable relevant dataset. The unavailability of such an XSS feature dataset is a bottleneck in conducting research. To overcome this problem, we propose a data preparation framework, the result of which is an XSS feature dataset, referred to as XSSD (XSS Dataset). The dataset preparation framework consists of three stages and four modules, all of which are essential to support extraction of several URL-based and script-based features. We evaluate the dataset we generate with the help of five benchmark classifiers, and validate classification results in terms of ROC.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Testbed for Next Generation Mobile Networks","authors":"Ashok Kumar Murthy, R. Parthasarathi, V. V","doi":"10.1109/ISEA-ISAP49340.2020.235010","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP49340.2020.235010","url":null,"abstract":"Next-generation of mobile networks, 5G, is expected to support diverse requirements in three broad categories: enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable and low latency communication (uRLLC). 5G will act as an enabler for a large variety of applications such as autonomous vehicles, telesurgery, industrial communications, AR/VR, smart cities, etc. SDN, NFV and network slicing are some of the key enabling technologies in realizing a flexible 5G network architecture. Using these novel technologies to support a wide array of use cases, brings in a new set of challenges in providing security and privacy. It is therefore imperative to conduct rigorous cybersecurity analysis on different aspects of the network. In this paper, we propose a security testbed for next-generation mobile networks, which will allow us to conduct various security analyses that are transparent and easy to replicate. It will also allow us to execute a simulated cyber-attack and measure or compare how well a defense mechanism is performing. Our testbed leverages various opensource projects such as Open Source MANO (OSM), ONOS, and OpenStack.","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISEA-ISAP 2020 Contents","authors":"","doi":"10.1109/isea-isap49340.2020.9079310","DOIUrl":"https://doi.org/10.1109/isea-isap49340.2020.9079310","url":null,"abstract":"","PeriodicalId":235855,"journal":{"name":"2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}