Walter Fuertes, Karina Quimbiulco, Fernando Galarraga, J. García-Dorado
{"title":"On the Development of Advanced Parental Control Tools","authors":"Walter Fuertes, Karina Quimbiulco, Fernando Galarraga, J. García-Dorado","doi":"10.1109/ICSSA.2015.011","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.011","url":null,"abstract":"Given the lack of completeness of the current implementations of parental control software along with the novel characteristics parents demand on these pieces of software, this paper presents the design decisions and implementation of parental control mechanisms that both register and avoid inappropriate content accesses by children and teenagers through the Internet. We first evaluated the state-of-the-art tools assessing their functionality, efficiency, usability, security, and accuracy. Then, we conducted an exploratory study spanning surveys of a representative sample of children, parents and network administrators to determine the baseline and the main requirements this sort of software must fulfil. With such foundations, we have implemented an application and front-end interface following criteria as relevance and internal consistency. As development method, we have applied Object Oriented Hypermedia Design combined with Natural Language Processing that uses the Boolean Retrieval Model by means of string searching algorithms as Boyer-Moore and fuzzy string search. The results show that not only inappropriate content accesses through the Internet have been blocked, but also that the proposal provides parents with mechanisms to control and measure their children’s Internet use as a fundamental mean in the process of prevention and awareness among the young population.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"1 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing Security Challenges in Cloud Computing — A Pattern-Based Approach","authors":"Priya Anand, J. Ryoo, Hyoungshick Kim","doi":"10.1109/ICSSA.2015.013","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.013","url":null,"abstract":"Cloud computing has emerged as a fast-growing paradigm for storing/sharing data and delivering services over the Internet. It provides its users with a way to deal with information or data without investing in any new technology or resources of their own. Although cloud computing environment is viewed as a promising Internet-based computing platform, the security challenges it poses are also equally striking. Despite the rapid advancement of cloud computing technologies, security issues in cloud environments have to be addressed to a greater extent. Cloud security is one of the major issues that hinder the adoption of cloud computing and slow down its acceptance in many sectors. In this paper, we provide an overview of cloud computing, in-depth literature review on cloud security and privacy issues, and its research challenges. We also propose security patterns as a viable solution to cloud security and explain them with a simple template. The research goal of this paper is to provide a better understanding of cloud security and highlight the security concerns that should be addressed to realize the maximum benefits of cloud computing. Security patterns allow cloud developers to use security measures without being security experts. Also, a cloud environment can be reengineered by using security patterns to add missing security features. In this paper, we provide a pattern-based cloud security framework as a good practical approach to ensure security features in cloud environments.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133201627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Touch to Authenticate — Continuous Biometric Authentication on Mobile Devices","authors":"Marlies Temper, S. Tjoa, Manfred Kaiser","doi":"10.1109/ICSSA.2015.016","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.016","url":null,"abstract":"Like no other device, smart phones influence our way of communication. The benefits of combining a variety of functionality (e.g. taking photos, navigating, surfing the web and exchanging information) into a single device led to a rich repository of private and commercial information. Although the information on smart phones in many cases is highly sensitive for either privacy or business reasons most users use simple and ineffective passcodes or patterns as authentication method. The security situation becomes even more complicated if companies encourage their employees by Bring-Your-Own-Device policies to shift workload to smart phones without a holistic security concept. As strong authentication methods will only be successful if they comply with the usability requirements of today’s users, biometric approaches pose an opportunity to close the gap between security and usability.In this paper we contribute to this research field by introduc- ing an approach for continuous biometric authentication using touchscreen gestures and related posture information as unique features. In first experiments, this new authentication layer for Android-based phones, which is using a fuzzy classifier in combination with a scoring model, demonstrated its feasibility by achieving an Equal Error Rate (EER) of 11,5%.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider","authors":"John Mitchell, S. Rizvi, J. Ryoo","doi":"10.1109/ICSSA.2015.014","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.014","url":null,"abstract":"Cloud computing represents the next evolutionary step in the realm of IT and offers a multitude of advantages over traditional computing models. However, there is a large trust deficit between cloud service users (CSUs) and cloud service providers (CSPs) that prevents the widespread adoption of the cloud among business professionals. Businesses are reluctant to migrate to the cloud due to the numerous security issues which affect data confidentiality and integrity. Therefore, a trust model is required to establish the positive reputation of the CSP. In this paper, we propose a fuzzy-logic based approach that allows the CSUs to determine the most trustworthy CSPs. Specifically, we develop the inference rules that will be applied in the fuzzy inference system (FIS) to provide the quantitative security index to the CSUs. One of the main advantages of the FIS is that it considers the uncertainties and ambiguities associated with measuring trust. Moreover, our proposed fuzzy based trust model is not limited to the CSU since it can be used by the CSPs in a self-evaluation process to promote improvement. To demonstrate the effectiveness of our proposed fuzzy based trust model, we present a case study where several popular CSPs are evaluated and ranked based on the security index.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers","authors":"Hyunsoo Kim, Hyoungshick Kim, J. Yoon","doi":"10.1109/ICSSA.2015.012","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.012","url":null,"abstract":"In some environments (e.g., for government agencies or international corporations), it is challenging to protect and secure confidential information on a computer screen against shoulder surfers who want to access the confidential information by observing the victims computer screen. In this paper, we propose a simple and practical system named STM to mitigate shoulder surfers from reading computer screens by visually shuffling contents on an end users screen. To find an optimal setting for STM, we tested several configurations at character and word levels and showed that STM with a properly chosen configuration is effectively secure against using direct observation techniques.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable!","authors":"Daehyun Kim, Hyoungshick Kim","doi":"10.1109/ICSSA.2015.015","DOIUrl":"https://doi.org/10.1109/ICSSA.2015.015","url":null,"abstract":"Clickjacking is an attack that tricks victims into clicking on invisible elements of a web page to perform unin- tended actions that might be advantageous for the attacker. To defend against clickjacking, many techniques have been proposed, but it is still questionable whether they are effectively deployed in practice. We investigated how vulnerable Korean websites are to clickjacking attacks by performing real attacks on the top 500 most popular Korean websites as well as all of the financial websites. Our results are quite significant: almost all Korean websites (99.6%) that we looked at were vulnerable to clickjacking attacks. Extending our observation to top 500 global websites, we found that 390 of them (78%) were also vulnerable to clickjacking attacks and identified which type of website is particularly insecure against clickjacking.","PeriodicalId":322682,"journal":{"name":"2015 1st International Conference on Software Security and Assurance (ICSSA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}