2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)最新文献

筛选
英文 中文
SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data SenSig:使用校准数据的实用物联网传感器指纹识别
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00014
Devante Gray, M. Mehrnezhad, R. Shafik
{"title":"SenSig: Practical IoT Sensor Fingerprinting Using Calibration Data","authors":"Devante Gray, M. Mehrnezhad, R. Shafik","doi":"10.1109/eurospw55150.2022.00014","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00014","url":null,"abstract":"Sensing technologies are becoming ever more ubiquitous in society and increasingly finding their way into important and intimate aspects of our lives such as Industrial Internet of Things (IIOT) and Smart Homes. Accordingly, it's vital to fingerprint these sensors and devices enabling the detection of any malicious or malfunctioning sensors that may be present. The aim of this paper is to provide a simple and lightweight means of fingerprinting motion sensors, and by extension the devices these sensors reside in. To generate our fingerprints, we use the data produced by motion sensors (more specifically, the gyroscope) during the calibration process on start-up. Subsequently, we employ the use of a novel form of quantisation, and various signal processing techniques on this sensor data to generate our sensor fingerprints. Our results show that such calibration data is fingerprintable, and we demonstrate the effectiveness of a potential use case of our fingerprints: identification, where we are able to uniquely identify a sensor with a 0 % EER and 38-bits of entropy.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders 基于扩展卷积和变分自编码器的多变量时间序列的细粒度异常检测
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00035
Gastón García González, S. Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, P. Casas
{"title":"DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders","authors":"Gastón García González, S. Tagliafico, Alicia Fernández, Gabriel Gómez, José Acuña, P. Casas","doi":"10.1109/eurospw55150.2022.00035","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00035","url":null,"abstract":"Due to its unsupervised nature, anomaly detection plays a central role in cybersecurity, in particular on the detection of unknown attacks. A major source of cybersecurity data comes in the form of multivariate time-series (MTS), representing the temporal evolution of multiple, usually correlated measurements. Despite the many approaches available in the literature for time-series anomaly detection, the automatic detection of abnormal events in MTS remains a complex problem. In this paper we introduce DC-VAE, a novel approach to anomaly detection in MTS, leveraging convolutional neural networks (CNNs) and variational auto encoders (VAEs). DC-VAE detects anomalies in time-series data, exploiting temporal information without sacrificing computational and memory resources. In particular, instead of using recursive neural networks, large causal filters, or many layers, DC-VAE relies on dilated convolutions (dc) to capture long and short term phenomena in the data, avoiding complex and less-efficient deep architectures, simplifying learning. We evaluate dc-vae on the detection of anoma-lies on a large-scale, multi-dimensional network monitoring dataset collected at an operational mobile internet service provider (isp), where anomalous events were manually labeled during a time span of 7-months, at a five-minutes granularity. Results show the main properties and advantages introduced by VAEs for time-series anomaly detection, as well as the out-performance of dilated convolutions as compared to standard VAEs for time-series modeling.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Introduction to Information Security: From Formal Curriculum to Organisational Awareness 信息安全导论:从正规课程到组织意识
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00055
P. Delport, J. V. Niekerk, Rayne Reid
{"title":"Introduction to Information Security: From Formal Curriculum to Organisational Awareness","authors":"P. Delport, J. V. Niekerk, Rayne Reid","doi":"10.1109/eurospw55150.2022.00055","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00055","url":null,"abstract":"Many organisations responded to the recent global pandemic by moving operations online. This has led to increased exposure to information security-related risks. There is thus an increased need to ensure organisational information security awareness programs are up to date and relevant to the needs of the intended target audience. The advent of online educational providers has similarly placed increased pressure on the formal educational sector to ensure course content is updated to remain relevant. Such processes of academic reflection and review should consider formal curriculum standards and guidelines in order to ensure wide relevance. This paper presents a case study of the review of an Introduction to Information Security course. This review is informed by the Information Security and Assurance knowledge area of the ACM/IEEE Computer Science 2013 curriculum standard. The paper presents lessons learned during this review process to serve as a guide for future reviews of this nature. The authors assert that these lessons learned can also be of value during the review of organisational information security awareness programs.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128558598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AWS EC2 Public Cloud Cyber Range Deployment AWS EC2公共云网络范围部署
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/EuroSPW55150.2022.00051
R. Beuran, Zhe Zhang, Yasuo Tan
{"title":"AWS EC2 Public Cloud Cyber Range Deployment","authors":"R. Beuran, Zhe Zhang, Yasuo Tan","doi":"10.1109/EuroSPW55150.2022.00051","DOIUrl":"https://doi.org/10.1109/EuroSPW55150.2022.00051","url":null,"abstract":"Cybersecurity training activities require specialized environments, typically called cyber ranges, to make it possible for trainees to acquire not only security knowledge, but also practical security skills. However, the setup of these training environments is a tedious task, which hinders the wider use of cyber ranges for security training. In its turn, this has a negative impact on the development of the cybersecurity workforce that is exceedingly necessary in our network-centric society. In this paper we introduce our approach of using the Amazon Web Services (AWS) Elastic Compute Cloud (EC2) public cloud for cyber range deployment, thus making it possible to conduct cybersecurity training activities at scale and at a relatively low cost. Our system was implemented by extending the functionality of the cyber range instantiation system CyRIS that is available as open source on GitHub. We evaluated our implementation from several perspectives, demonstrating that public cloud deployment can provide similar functionality and performance compared to local server or private cloud deployment, while avoiding the high purchase and management costs associated to those.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges of protecting confidentiality in social media data and their ethical import 保护社交媒体数据机密性的挑战及其道德意义
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00066
Arianna Rossi, M. Arenas, Emre Kocyigit, Moad Hani
{"title":"Challenges of protecting confidentiality in social media data and their ethical import","authors":"Arianna Rossi, M. Arenas, Emre Kocyigit, Moad Hani","doi":"10.1109/eurospw55150.2022.00066","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00066","url":null,"abstract":"This article discusses the challenges of pseudonymizing unstructured, noisy social media data for cybersecurity research purposes and presents an open-source package developed to pseudonymize personal and confidential information (i.e., personal names, companies, and locations) contained in such data. Its goal is to facilitate compliance with EU data protection obligations and the upholding of research ethics principles like the respect for the autonomy, privacy and dignity of research participants, the social responsibility of researchers, and scientific integrity. We discuss the limitations of the pseudonymizer package, their ethical import, and the additional security measures that should be adopted to protect the confidentiality of the data.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Importance of the Job Role in Social Media Cybersecurity Training 社交媒体网络安全培训中工作角色的重要性
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00054
Fai Ben Salamah, Marco A. Palomino, M. Papadaki, S. Furnell
{"title":"The Importance of the Job Role in Social Media Cybersecurity Training","authors":"Fai Ben Salamah, Marco A. Palomino, M. Papadaki, S. Furnell","doi":"10.1109/eurospw55150.2022.00054","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00054","url":null,"abstract":"Social media has become embedded in our everyday lives, personal activities and the workplace. Thus, educating users on emerging cybersecurity challenges for social media has become imperative. As such, we have investigated the feasibility of an awareness-raising and adaptive cybersecurity training system. Our investigation is aided by a questionnaire, which was administered online using Google Forms. We collected answers from 641 employees from a variety of sectors: education, healthcare, leadership and management, arts, entertainment, police and the military. We found that a one-size-fits-all training approach is highly ineffective, as people's understanding and knowledge can vary greatly. Thus, we have proceeded to identify the factors that influence the success of any given approach. Information such as gender, age, education level, job roles, and training preferences seem essential considerations for developing a robust training strategy. Our investigation concludes that “job role” is the most significant factor associated with people's preferences and perceptions in cybersecurity training. Also, people appear to be in favour of adaptive training. Moreover, a mixed delivery approach is likely to be welcomed.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood 评估网络犯罪受害和网络风险可能性
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00021
Daniel W. Woods, Lukas Walter
{"title":"Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood","authors":"Daniel W. Woods, Lukas Walter","doi":"10.1109/eurospw55150.2022.00021","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00021","url":null,"abstract":"Across both the public and private sector, cyberse-curity decisions could be informed by estimates of the likelihood of different types of exploitation and the corresponding harms. Law enforcement should focus on investigating and disrupting those cybercrimes that are relatively more frequent, all else being equal. Similarly, firms should account for the likelihood of different forms of cyber incident when tailoring risk management policies. This paper reviews the quantitative evidence available for both cybercrime victimi-sation and cyber risk likelihood, providing a bridge between the academic fields of criminology and cybersecurity. We extract estimates from 48 studies conducted by a mix of academics, statistical institutes, and cybersecurity vendors using a range of data sources including victim surveys, case-control studies, and the insurance market. The victimisation estimates are categorised into: cyber attack; malware; ran-somware; fraudulent email; online banking fraud; online sales fraud; unauthorised access; Denial of Service; and identity theft. For each category, we display all estimates in the years 2017–2021. Our review shows: (i) firms face higher victimisation rates than individuals, which increases in the number of employees; (ii) global surveys reveal a consistent relative ranking of countries in ransomware victimisation; (iii) although trends could be identified within studies that collect longitudinal data, these trends tended to contradict each other when compared across studies; and (iv) broad categories with unclear consequences (e.g. malware and fraudulent emails) displayed higher variance and average values than categories associated with specific outcomes (e.g. identity theft or online banking fraud). We discuss the outlook for cybercrime and cyber risk research.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful SP 800-22和GM/T 0005-2012测试:明显过时,可能有害
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/EuroSPW55150.2022.00011
Markku-Juhani O. Saarinen
{"title":"SP 800–22 and GM/T 0005–2012 Tests: Clearly Obsolete, Possibly Harmful","authors":"Markku-Juhani O. Saarinen","doi":"10.1109/EuroSPW55150.2022.00011","DOIUrl":"https://doi.org/10.1109/EuroSPW55150.2022.00011","url":null,"abstract":"When it comes to cryptographic random number generation, poor understanding of the security requirements and “mythical aura” of black-box statistical testing frequently leads it to be used as a substitute for cryptanalysis. To make things worse, a seemingly standard document, NIST SP 800–22, describes 15 statistical tests and suggests that they can be used to evaluate random and pseudorandom number generators in cryptographic applications. The Chi-nese standard GM/T 0005–2012 describes similar tests. These documents have not aged well. The weakest pseudorandom number generators will easily pass these tests, promoting false confidence in insecure systems. We strongly suggest that SP 800–22 be withdrawn by NIST; we consider it to be not just irrelevant but actively harmful. We illustrate this by discussing the “reference generators” contained in the SP 800–22 document itself. None of these generators are suitable for modern cryptography, yet they pass the tests. For future development, we suggest focusing on stochastic modeling of entropy sources instead of model-free statistical tests. Random bit generators should also be reviewed for potential asymmetric backdoors via trapdoor one-way functions, and for security against quantum computing attacks.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121977750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Programmatic Description Language for Cyber Range Topology Creation 网络范围拓扑创建的程序化描述语言
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00048
Andrea Dalla Costa, Jarkko Kuusijärvi
{"title":"Programmatic Description Language for Cyber Range Topology Creation","authors":"Andrea Dalla Costa, Jarkko Kuusijärvi","doi":"10.1109/eurospw55150.2022.00048","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00048","url":null,"abstract":"Cyber Ranges are becoming a fundamental part of cybersecurity training and preparations, since they allow testing different scenarios in a safe, isolated and repro-ducible environment. We can expect to see cyber ranges used even more in cybersecurity trainings and testing of various system deployments, which also means increasing amount of scenarios to be developed. It is beneficial to make the scenario development/generation easier and faster for the human operators and automated generation alike to support the different use cases requirements. This paper analyses the currently available open-source and/or research community solutions for defining topologies for cyber ranges and presents the enhanced description language developed. The description language aims to sim-plify the scenario creation process for large networks with features that support quick and easy specification of the initial topology. This paper describes the enhanced features that enable the language to describe topologies in a compact form and presents initial test topology creation in lab settings deployed in OpenStack environment.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges 基于硬件的捕获旗挑战的远程化和虚拟化芯片和电路
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) Pub Date : 2022-06-01 DOI: 10.1109/eurospw55150.2022.00057
Gianluca Roascio, Samuele Yves Cerini, P. Prinetto
{"title":"Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges","authors":"Gianluca Roascio, Samuele Yves Cerini, P. Prinetto","doi":"10.1109/eurospw55150.2022.00057","DOIUrl":"https://doi.org/10.1109/eurospw55150.2022.00057","url":null,"abstract":"In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts becomes critical in every organization and at multiple levels. However, classical and theory-oriented training seems to lack effectiveness and power of attraction, while professional selection and training processes based on cybersecurity gamification are being successfully experimented, among which Capture-the-Flag (CTF) competitions certainly stand out. Nevertheless, careful analysis reveals that such initiatives have a major shortcoming in addressing security issues when training people to tackle hardware-related security issues. Several motivations can be identified, including the inadequate technical knowledge of the White Teams charged of the challenges preparations, and the evident logistic problems posed by the availability of real hardware devices when the numbers of trainees significantly scales up. This paper presents a platform able to provide as a service hardware-based CTF challenges and exercises, involving circuits and chips that can be physically connected to a server or simulated, to deal with topics such as hardware bugs, flaws and backdoors, vulnerabilities in test infrastructures, and side-channel attacks. The platform is presented from a technical perspective, and data for deducting related efficiency, stability and scalability are offered.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信