Foundations and Practice of Security最新文献

筛选
英文 中文
Deep-Learning-based Vulnerability Detection in Binary Executables 基于深度学习的二进制可执行文件漏洞检测
Foundations and Practice of Security Pub Date : 2022-11-25 DOI: 10.48550/arXiv.2212.01254
A. Schaad, Dominik Binder
{"title":"Deep-Learning-based Vulnerability Detection in Binary Executables","authors":"A. Schaad, Dominik Binder","doi":"10.48550/arXiv.2212.01254","DOIUrl":"https://doi.org/10.48550/arXiv.2212.01254","url":null,"abstract":"The identification of vulnerabilities is an important element in the software development life cycle to ensure the security of software. While vulnerability identification based on the source code is a well studied field, the identification of vulnerabilities on basis of a binary executable without the corresponding source code is more challenging. Recent research [1] has shown, how such detection can be achieved by deep learning methods. However, that particular approach is limited to the identification of only 4 types of vulnerabilities. Subsequently, we analyze to what extent we could cover the identification of a larger variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. The underlying basis is a dataset with 50,651 samples of vulnerable code in the form of a standardized LLVM Intermediate Representation. The vectorised features of a Word2Vec model are used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). A binary classification was established for detecting the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, the methodology presented allows an accurate detection of 23 (compared to 4 [1]) vulnerabilities.","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts 基于IOTA智能合约的多机器人系统中基于分散视觉的拜占庭代理检测
Foundations and Practice of Security Pub Date : 2022-10-07 DOI: 10.48550/arXiv.2210.03441
Sahar Salimpour, Farhad Keramat, J. P. Queralta, Tomi Westerlund
{"title":"Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts","authors":"Sahar Salimpour, Farhad Keramat, J. P. Queralta, Tomi Westerlund","doi":"10.48550/arXiv.2210.03441","DOIUrl":"https://doi.org/10.48550/arXiv.2210.03441","url":null,"abstract":"Multiple opportunities lie at the intersection of multi-robot systems and distributed ledger technologies (DLTs). In this work, we investigate the potential of new DLT solutions such as IOTA, for detecting anomalies and byzantine agents in multi-robot systems in a decentralized manner. Traditional blockchain approaches are not applicable to real-world networked and decentralized robotic systems where connectivity conditions are not ideal. To address this, we leverage recent advances in partition-tolerant and byzantine-tolerant collaborative decision-making processes with IOTA smart contracts. We show how our work in vision-based anomaly and change detection can be applied to detecting byzantine agents within multiple robots operating in the same environment. We show that IOTA smart contracts add a low computational overhead while allowing to build trust within the multi-robot system. The proposed approach effectively enables byzantine robot detection based on the comparison of images submitted by the different robots and detection of anomalies and changes between them.","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Characterizing IoT Software Update Practices 描述物联网软件更新实践
Foundations and Practice of Security Pub Date : 2022-09-20 DOI: 10.1007/978-3-031-30122-3_25
Conner Bradley, David Barrera
{"title":"Towards Characterizing IoT Software Update Practices","authors":"Conner Bradley, David Barrera","doi":"10.1007/978-3-031-30122-3_25","DOIUrl":"https://doi.org/10.1007/978-3-031-30122-3_25","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a maturity model for crypto-agility assessment 迈向加密敏捷性评估的成熟度模型
Foundations and Practice of Security Pub Date : 2022-02-15 DOI: 10.1007/978-3-031-30122-3_7
Julian Hohm, A. Heinemann, A. Wiesmaier
{"title":"Towards a maturity model for crypto-agility assessment","authors":"Julian Hohm, A. Heinemann, A. Wiesmaier","doi":"10.1007/978-3-031-30122-3_7","DOIUrl":"https://doi.org/10.1007/978-3-031-30122-3_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts 结合自主身份和智能合约的物联网自动化身份和访问管理系统
Foundations and Practice of Security Pub Date : 2022-01-01 DOI: 10.1007/978-3-031-08147-7_14
Montassar Naghmouchi, Hella Kaffel, M. Laurent-Maknavicius
{"title":"An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts","authors":"Montassar Naghmouchi, Hella Kaffel, M. Laurent-Maknavicius","doi":"10.1007/978-3-031-08147-7_14","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"54 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection 物联网入侵检测中机器学习技术的比较分析
Foundations and Practice of Security Pub Date : 2021-11-25 DOI: 10.1007/978-3-031-08147-7_13
João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia
{"title":"A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection","authors":"João Vitorino, Rui Andrade, Isabel Praça, Orlando Sousa, Eva Maia","doi":"10.1007/978-3-031-08147-7_13","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_13","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"176 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Creation and Detection of German Voice Deepfakes 德语语音深度假音的产生与检测
Foundations and Practice of Security Pub Date : 2021-08-02 DOI: 10.1007/978-3-031-08147-7_24
Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, A. Schaad, Felix Schmieder
{"title":"Creation and Detection of German Voice Deepfakes","authors":"Vanessa Barnekow, Dominik Binder, Niclas Kromrey, Pascal Munaretto, A. Schaad, Felix Schmieder","doi":"10.1007/978-3-031-08147-7_24","DOIUrl":"https://doi.org/10.1007/978-3-031-08147-7_24","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware Network Traffic Analysis for Pre-encryption Alert 基于预加密警报的勒索软件网络流量分析
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_2
Routa Moussaileb, N. Cuppens-Boulahia, Jean-Louis Lanet, Hélène Le Bouder
{"title":"Ransomware Network Traffic Analysis for Pre-encryption Alert","authors":"Routa Moussaileb, N. Cuppens-Boulahia, Jean-Louis Lanet, Hélène Le Bouder","doi":"10.1007/978-3-030-45371-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_2","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125038866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme U-EPS:一种超小型、高效的后量子签名方案
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_16
G. Gong, Morgan He, R. Rohit, Yunjie Yi
{"title":"U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme","authors":"G. Gong, Morgan He, R. Rohit, Yunjie Yi","doi":"10.1007/978-3-030-45371-8_16","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_16","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115470566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Labelled Network Capture Generation for Anomaly Detection 异常检测的标记网络捕获生成
Foundations and Practice of Security Pub Date : 2019-11-05 DOI: 10.1007/978-3-030-45371-8_7
Maël Nogues, David Brosset, Hanan Hindy, X. Bellekens, Y. Kermarrec
{"title":"Labelled Network Capture Generation for Anomaly Detection","authors":"Maël Nogues, David Brosset, Hanan Hindy, X. Bellekens, Y. Kermarrec","doi":"10.1007/978-3-030-45371-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-45371-8_7","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130549714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信