2020 15th Asia Joint Conference on Information Security (AsiaJCIS)最新文献

筛选
英文 中文
Supporters: AsiaJCIS 2020
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/asiajcis50894.2020.00012
{"title":"Supporters: AsiaJCIS 2020","authors":"","doi":"10.1109/asiajcis50894.2020.00012","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00012","url":null,"abstract":"","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Data Integration Protocol 隐私保护数据集成协议
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00025
A. Miyaji, Yoshitaka Nagao
{"title":"Privacy Preserving Data Integration Protocol","authors":"A. Miyaji, Yoshitaka Nagao","doi":"10.1109/AsiaJCIS50894.2020.00025","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00025","url":null,"abstract":"Recently, large amount of data is collected by various organizations. Generally, data consists of various attributes such as name, address, medical term, etc. Related to the same person, different organizations often possess data with different attributes. If we can integrate data kept in different organization related to the same person without violating privacy, detailed analyzes such as cause investigation or relations among attributes could be realized. In such a scenario, we do not need personal information while it should be protected securely. Importantly, the data exactly integrates data associated with the same person. In this paper, we classify attributes in data into three of matching attributes, analyzing attributes, and others. Then, we propose a privacy preserving data integration protocol while handling data privacy appropriately according to classification of matching, analyzing attributes, and others.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AsiaJCIS 2020 Opinion
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/asiajcis50894.2020.00006
AsiaJCIS, H. Youm
{"title":"AsiaJCIS 2020 Opinion","authors":"AsiaJCIS, H. Youm","doi":"10.1109/asiajcis50894.2020.00006","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00006","url":null,"abstract":"Considering the recent situation in each country by COVID-19, our Asia-JCIS2020 should be differently organized from the previous conferences. After discussing how to organize the AsiaJCIS 2020 among cochairs and members of SC, it was concluded that AsiaJCIS 2020 should be held in 20-21 August 2020 as scheduled and will be operated in combination of physical participations and virtual participations. That is, for speakers and participants who can physically participate in AsiaJCIS, it is recommended to come to the venue in Taipei and participate as a regular meeting. For speakers and participants who have difficulty in physically participating due to country’s immigration restrictions, it is recommended to virtually participate in the AsiaJCIS 2020 from the remote.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines 多服务器环境下四种具有隐私保护的生物特征认证方案的密码分析及设计指南
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00022
Yun-Hsin Chuang, C. Lei, Hung-Jr Shiu
{"title":"Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines","authors":"Yun-Hsin Chuang, C. Lei, Hung-Jr Shiu","doi":"10.1109/AsiaJCIS50894.2020.00022","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00022","url":null,"abstract":"With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA schemes with user privacy preserving for multi-server environment, and we find that four of them have security defects. We will demonstrate that Ali-Pal scheme is vulnerable to malignant server attack and user untraceability attack, Chandrakar and Om’s schemes are vulnerable to insider attacks, and Choi et al.’s scheme does not achieve user anonymity. We then analyze the relevant schemes to propose the guidelines for designing a secure AKA scheme with user privacy preserving for multi-server environment. This paper is helpful for designing a better AKA scheme.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data 大规模数据多模态行为认证的有效分类
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00027
Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Tran Thao Phuong, Mhd Irvan, R. Yamaguchi
{"title":"Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data","authors":"Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Tran Thao Phuong, Mhd Irvan, R. Yamaguchi","doi":"10.1109/AsiaJCIS50894.2020.00027","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00027","url":null,"abstract":"We propose an effective classification algorithm for machine learning to achieve higher performance for multi-modal behavioral authentication systems. Our algorithm uses a multiclass classification scheme that has a smaller number of classes than the number of users stored in the dataset. We also propose metrics, the self-mix-classified rate, other-single-classified rate, and equal-classified rate, for use with the proposed algorithm to determine an optimal number of classes for behavioral authentication. We conducted experiments using a large-scale dataset of activity histories that are stored when 10,000 users use commercial smartphone-applications to analyze performance measures such as false rejection rate, false acceptance rate, and equal error rate obtained with our proposed algorithm. The results indicate our algorithm achieved higher performance than that for previous ones.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units 具有特定规则和图形处理单元的接入点密码分析的实证研究
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00029
Chia-Mei Chen, Tien-Ho Chang, G. Lai
{"title":"The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units","authors":"Chia-Mei Chen, Tien-Ho Chang, G. Lai","doi":"10.1109/AsiaJCIS50894.2020.00029","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00029","url":null,"abstract":"Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This empirical research proposes three major parts to examine the security of the access point and shows that the access point located in the public is vulnerable. The proposed methods are the method of catching the encrypted password packets, the GPUs for the passwords analysis, the specific rules of passwords analysis, and indicates the insecurity of the AP network. The wireless work is insecure in the real scene from the empirical data we collected. Part of the AP passwords can be cracked effectively from our cloud server which is equipped with GPUs and the rules set for certain areas, and do the password patterns analysis anywhere once the encrypted password packets are caught randomly. Thus, the vulnerability and weakness of wireless networks are seen. It shows that the insecurity gap caused by the socio-human elements which are the so-called lazy passwords. It reveals the true evidence of the insecurity of wireless networks and gives suggestions on wireless network protection.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125088473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Blockchain-based Firmware Update Framework for IoT Environment 物联网环境下基于区块链的高效固件更新框架
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00030
Meng-Hsuan Tsai, Yu-Cheng Hsu, N. Lo
{"title":"An Efficient Blockchain-based Firmware Update Framework for IoT Environment","authors":"Meng-Hsuan Tsai, Yu-Cheng Hsu, N. Lo","doi":"10.1109/AsiaJCIS50894.2020.00030","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00030","url":null,"abstract":"Recently, massive deployment of Internet of Things (IoT) devices has accelerated digital transformation of modern society in various aspects. Naturally, how to ensure security of deployed IoT devices has become an important and practical issue. Several successful large-scale DDoS attacks were utilized vulnerabilities of firmware on IoT devices in the past couple of years. Therefore, effective and efficient firmware update solution on IoT devices is in demand. In this study, an automatic real-time firmware update framework based on blockchain technology and MQTT protocol is proposed. To support automatic real-time firmware update operation on deployed IoT devices, multiple MQTT servers are installed in corresponding blockchain nodes to execute firmware patch delivery operation by the design of our framework. Blockchain technology is used to record the original manufacturer of a published firmware patch for a dedicated IoT device and smart contract is adopted to discover MQTT service nodes in a blockchain network. Data integrity of a newly generated firmware patch is preserved by distributing the patch with its hashed value. A framework prototype is constructed and experiments are conducted. Based on the experimental results, the proposed framework can efficiently and securely deliver firmware patches to targeted gateways in real-time scale.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT-Malware Detection Based on Byte Sequences of Executable Files 基于可执行文件字节序列的物联网恶意软件检测
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00033
Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue
{"title":"IoT-Malware Detection Based on Byte Sequences of Executable Files","authors":"Tzu-Ling Wan, Tao Ban, Yen-Ting Lee, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue","doi":"10.1109/AsiaJCIS50894.2020.00033","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00033","url":null,"abstract":"Attacks towards the Internet of Things (IoT) devices are on the rise. To enable precaution and countermeasure against IoT malware, we present a cross-platform analysis of IoT malware programs based on static discriminating information extracted directly from ELF binaries. With experiments on a dataset composed of more than 222K samples cross 7 different CPU architectures, we demonstrate that efficient malware detection can be realized with near optimal accuracy.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
AsiaJCIS 2020 TOC
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/asiajcis50894.2020.00004
{"title":"AsiaJCIS 2020 TOC","authors":"","doi":"10.1109/asiajcis50894.2020.00004","DOIUrl":"https://doi.org/10.1109/asiajcis50894.2020.00004","url":null,"abstract":"","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125072020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Lossy Identification Scheme derives Tightly-Secure Multisignature 线性有损识别方案导出了严格安全的多重签名
2020 15th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2020-08-01 DOI: 10.1109/AsiaJCIS50894.2020.00016
Masayuki Fukumitsu, Shingo Hasegawa
{"title":"Linear Lossy Identification Scheme derives Tightly-Secure Multisignature","authors":"Masayuki Fukumitsu, Shingo Hasegawa","doi":"10.1109/AsiaJCIS50894.2020.00016","DOIUrl":"https://doi.org/10.1109/AsiaJCIS50894.2020.00016","url":null,"abstract":"For the multisignature schemes, the tight security in the plain public key model is considered as one of the desirable features. In this paper, we first give a generic construction of multisignature schemes which is tightly secure in the plain public key model. Our construction is based on the ID schemes which have two properties called the lossiness and the linearity. Moreover, we then find that the lossiness of most of the schemes is proven from the linearity. In this sense, we propose a new property of ID schemes and show that the combination of the linearity of ID schemes and the new property implies the lossiness. This result implies the relationship between these properties to shrink the conditions required for our generic construction.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126900981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信