Security and Privacy in Communication Networks最新文献

筛选
英文 中文
MetaPriv: Acting in Favor of Privacy on Social Media Platforms MetaPriv:支持社交媒体平台上的隐私
Security and Privacy in Communication Networks Pub Date : 2022-09-08 DOI: 10.48550/arXiv.2209.03679
Robert Cantaragiu, A. Michalas, E. Frimpong, Alexandros Bakas
{"title":"MetaPriv: Acting in Favor of Privacy on Social Media Platforms","authors":"Robert Cantaragiu, A. Michalas, E. Frimpong, Alexandros Bakas","doi":"10.48550/arXiv.2209.03679","DOIUrl":"https://doi.org/10.48550/arXiv.2209.03679","url":null,"abstract":"Social networks such as Facebook (FB) and Instagram are known for tracking user online behaviour for commercial gain. To this day, there is practically no other way of achieving privacy in said platforms other than renouncing their use. However, many users are reluctant in doing so because of convenience or social and professional reasons. In this work, we propose a means of balancing convenience and privacy on FB through obfuscation. We have created MetaPriv, a tool based on simulating user interaction with FB. MetaPriv allows users to add noise interactions to their account so as to lead FB's profiling algorithms astray, and make them draw inaccurate profiles in relation to their interests and habits. To prove our tool's effectiveness, we ran extensive experiments on a dummy account and two existing user accounts. Our results showed that, by using our tool, users can achieve a higher degree of privacy in just a couple of weeks. We believe that MetaPriv can be further developed to accommodate other social media platforms and help users regain their privacy, while maintaining a reasonable level of convenience. To support open science and reproducible research, our source code is publicly available online.","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison 跨架构二值相似度比较的多关系指令关联图
Security and Privacy in Communication Networks Pub Date : 2022-06-24 DOI: 10.48550/arXiv.2206.12236
Qi Song, Yongzheng Zhang, Shuhao Li
{"title":"Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison","authors":"Qi Song, Yongzheng Zhang, Shuhao Li","doi":"10.48550/arXiv.2206.12236","DOIUrl":"https://doi.org/10.48550/arXiv.2206.12236","url":null,"abstract":"Cross-architecture binary similarity comparison is essential in many security applications. Recently, researchers have proposed learning-based approaches to improve comparison performance. They adopted a paradigm of instruction pre-training, individual binary encoding, and distance-based similarity comparison. However, instruction embeddings pre-trained on external code corpus are not universal in diverse real-world applications. And separately encoding cross-architecture binaries will accumulate the semantic gap of instruction sets, limiting the comparison accuracy. This paper proposes a novel cross-architecture binary similarity comparison approach with multi-relational instruction association graph. We associate mono-architecture instruction tokens with context relevance and cross-architecture tokens with potential semantic correlations from different perspectives. Then we exploit the relational graph convolutional network (R-GCN) to perform type-specific graph information propagation. Our approach can bridge the gap in the cross-architecture instruction representation spaces while avoiding the external pre-training workload. We conduct extensive experiments on basic block-level and function-level datasets to prove the superiority of our approach. Furthermore, evaluations on a large-scale real-world IoT malware reuse function collection show that our approach is valuable for identifying malware propagated on IoT devices of various architectures.","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116850935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureBERT: A Domain-Specific Language Model for Cybersecurity SecureBERT:网络安全领域特定语言模型
Security and Privacy in Communication Networks Pub Date : 2022-04-06 DOI: 10.1007/978-3-031-25538-0_3
Ehsan Aghaei, Xi Niu, W. Shadid, E. Al-Shaer
{"title":"SecureBERT: A Domain-Specific Language Model for Cybersecurity","authors":"Ehsan Aghaei, Xi Niu, W. Shadid, E. Al-Shaer","doi":"10.1007/978-3-031-25538-0_3","DOIUrl":"https://doi.org/10.1007/978-3-031-25538-0_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
System-Wide Security for Offline Payment Terminals 离线支付终端的全系统安全性
Security and Privacy in Communication Networks Pub Date : 2021-07-18 DOI: 10.1007/978-3-030-90022-9_6
Nikolay Ivanov, Qiben Yan
{"title":"System-Wide Security for Offline Payment Terminals","authors":"Nikolay Ivanov, Qiben Yan","doi":"10.1007/978-3-030-90022-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-90022-9_6","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels 比特币猎人:通过加密通道检测比特币流量
Security and Privacy in Communication Networks Pub Date : 2020-10-21 DOI: 10.1007/978-3-030-63086-7_10
F. Rezaei, Shahrzad Naseri, Ittay Eyal, A. Houmansadr
{"title":"The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels","authors":"F. Rezaei, Shahrzad Naseri, Ittay Eyal, A. Houmansadr","doi":"10.1007/978-3-030-63086-7_10","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_10","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Jamming Game in Wireless Networks Under Uncertainty 不确定条件下无线网络的协同干扰对策
Security and Privacy in Communication Networks Pub Date : 2020-10-21 DOI: 10.1007/978-3-030-63086-7_14
Zhifan Xu, M. Baykal-Gursoy
{"title":"A Cooperative Jamming Game in Wireless Networks Under Uncertainty","authors":"Zhifan Xu, M. Baykal-Gursoy","doi":"10.1007/978-3-030-63086-7_14","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_14","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ThreatZoom: CVE2CWE using Hierarchical Neural Network ThreatZoom: CVE2CWE使用分层神经网络
Security and Privacy in Communication Networks Pub Date : 2020-09-24 DOI: 10.1007/978-3-030-63086-7_2
Ehsan Aghaei, W. Shadid, E. Al-Shaer
{"title":"ThreatZoom: CVE2CWE using Hierarchical Neural Network","authors":"Ehsan Aghaei, W. Shadid, E. Al-Shaer","doi":"10.1007/978-3-030-63086-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Best-Effort Adversarial Approximation of Black-Box Malware Classifiers 黑盒恶意软件分类器的最佳努力对抗逼近
Security and Privacy in Communication Networks Pub Date : 2020-06-28 DOI: 10.1007/978-3-030-63086-7_18
A. Ali, Birhanu Eshete
{"title":"Best-Effort Adversarial Approximation of Black-Box Malware Classifiers","authors":"A. Ali, Birhanu Eshete","doi":"10.1007/978-3-030-63086-7_18","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"15 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies 基于属性的访问控制策略最优挖掘的自然启发框架
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_29
M. Narouei, Hassan Takabi
{"title":"A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies","authors":"M. Narouei, Hassan Takabi","doi":"10.1007/978-3-030-37231-6_29","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_29","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain 基于区块链的增强可验证域间路由协议
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_4
Yaping Liu, Shuo Zhang, Haojin Zhu, P. Wan, Lixin Gao, Yaoxue Zhang
{"title":"An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain","authors":"Yaping Liu, Shuo Zhang, Haojin Zhu, P. Wan, Lixin Gao, Yaoxue Zhang","doi":"10.1007/978-3-030-37228-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信