{"title":"Supporters: AsiaJCIS 2020","authors":"","doi":"10.1109/asiajcis50894.2020.00012","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00012","url":null,"abstract":"","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Data Integration Protocol","authors":"A. Miyaji, Yoshitaka Nagao","doi":"10.1109/AsiaJCIS50894.2020.00025","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00025","url":null,"abstract":"Recently, large amount of data is collected by various organizations. Generally, data consists of various attributes such as name, address, medical term, etc. Related to the same person, different organizations often possess data with different attributes. If we can integrate data kept in different organization related to the same person without violating privacy, detailed analyzes such as cause investigation or relations among attributes could be realized. In such a scenario, we do not need personal information while it should be protected securely. Importantly, the data exactly integrates data associated with the same person. In this paper, we classify attributes in data into three of matching attributes, analyzing attributes, and others. Then, we propose a privacy preserving data integration protocol while handling data privacy appropriately according to classification of matching, analyzing attributes, and others.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AsiaJCIS 2020 Opinion","authors":"AsiaJCIS, H. Youm","doi":"10.1109/asiajcis50894.2020.00006","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00006","url":null,"abstract":"Considering the recent situation in each country by COVID-19, our Asia-JCIS2020 should be differently organized from the previous conferences. After discussing how to organize the AsiaJCIS 2020 among cochairs and members of SC, it was concluded that AsiaJCIS 2020 should be held in 20-21 August 2020 as scheduled and will be operated in combination of physical participations and virtual participations. That is, for speakers and participants who can physically participate in AsiaJCIS, it is recommended to come to the venue in Taipei and participate as a regular meeting. For speakers and participants who have difficulty in physically participating due to country’s immigration restrictions, it is recommended to virtually participate in the AsiaJCIS 2020 from the remote.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines","authors":"Yun-Hsin Chuang, C. Lei, Hung-Jr Shiu","doi":"10.1109/AsiaJCIS50894.2020.00022","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00022","url":null,"abstract":"With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA schemes with user privacy preserving for multi-server environment, and we find that four of them have security defects. We will demonstrate that Ali-Pal scheme is vulnerable to malignant server attack and user untraceability attack, Chandrakar and Om’s schemes are vulnerable to insider attacks, and Choi et al.’s scheme does not achieve user anonymity. We then analyze the relevant schemes to propose the guidelines for designing a secure AKA scheme with user privacy preserving for multi-server environment. This paper is helpful for designing a better AKA scheme.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data","authors":"Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Tran Thao Phuong, Mhd Irvan, R. Yamaguchi","doi":"10.1109/AsiaJCIS50894.2020.00027","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00027","url":null,"abstract":"We propose an effective classification algorithm for machine learning to achieve higher performance for multi-modal behavioral authentication systems. Our algorithm uses a multiclass classification scheme that has a smaller number of classes than the number of users stored in the dataset. We also propose metrics, the self-mix-classified rate, other-single-classified rate, and equal-classified rate, for use with the proposed algorithm to determine an optimal number of classes for behavioral authentication. We conducted experiments using a large-scale dataset of activity histories that are stored when 10,000 users use commercial smartphone-applications to analyze performance measures such as false rejection rate, false acceptance rate, and equal error rate obtained with our proposed algorithm. The results indicate our algorithm achieved higher performance than that for previous ones.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units","authors":"Chia-Mei Chen, Tien-Ho Chang, G. Lai","doi":"10.1109/AsiaJCIS50894.2020.00029","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00029","url":null,"abstract":"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125088473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Blockchain-based Firmware Update Framework for IoT Environment","authors":"Meng-Hsuan Tsai, Yu-Cheng Hsu, N. Lo","doi":"10.1109/AsiaJCIS50894.2020.00030","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00030","url":null,"abstract":"Recently, massive deployment of Internet of Things (IoT) devices has accelerated digital transformation of modern society in various aspects. Naturally, how to ensure security of deployed IoT devices has become an important and practical issue. Several successful large-scale DDoS attacks were utilized vulnerabilities of firmware on IoT devices in the past couple of years. Therefore, effective and efficient firmware update solution on IoT devices is in demand. In this study, an automatic real-time firmware update framework based on blockchain technology and MQTT protocol is proposed. To support automatic real-time firmware update operation on deployed IoT devices, multiple MQTT servers are installed in corresponding blockchain nodes to execute firmware patch delivery operation by the design of our framework. Blockchain technology is used to record the original manufacturer of a published firmware patch for a dedicated IoT device and smart contract is adopted to discover MQTT service nodes in a blockchain network. Data integrity of a newly generated firmware patch is preserved by distributing the patch with its hashed value. A framework prototype is constructed and experiments are conducted. Based on the experimental results, the proposed framework can efficiently and securely deliver firmware patches to targeted gateways in real-time scale.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue
{"title":"IoT-Malware Detection Based on Byte Sequences of Executable Files","authors":"Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue","doi":"10.1109/AsiaJCIS50894.2020.00033","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00033","url":null,"abstract":"Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware programs based on static discriminating information extracted directly from ELF binaries. With experiments on a dataset composed of more than 222K samples cross 7 different CPU architectures, we demonstrate that efficient malware detection can be realized with near optimal accuracy.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AsiaJCIS 2020 TOC","authors":"","doi":"10.1109/asiajcis50894.2020.00004","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00004","url":null,"abstract":"","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125072020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Lossy Identification Scheme derives Tightly-Secure Multisignature","authors":"Masayuki Fukumitsu, Shingo Hasegawa","doi":"10.1109/AsiaJCIS50894.2020.00016","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00016","url":null,"abstract":"For the multisignature schemes, the tight security in the plain public key model is considered as one of the desirable features. In this paper, we first give a generic construction of multisignature schemes which is tightly secure in the plain public key model. Our construction is based on the ID schemes which have two properties called the lossiness and the linearity. Moreover, we then find that the lossiness of most of the schemes is proven from the linearity. In this sense, we propose a new property of ID schemes and show that the combination of the linearity of ID schemes and the new property implies the lossiness. This result implies the relationship between these properties to shrink the conditions required for our generic construction.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}