{"title":"Real-Time supports on Tablet PC Platforms","authors":"Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee","doi":"10.23919/ICITST51030.2020.9351322","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351322","url":null,"abstract":"In the case of laptops and tablet PCs that replace desktop, it uses the Windows operating system to provide various functions depending on operating system dependency, the Windows operating system does not support real-time processing because it uses multilevel feedback queue scheduling that extends round-robin scheduling. Also, since the initial value of Local APIC Counter cannot be obtained from the Windows 8, the realtime processing function provided through the existing RTiK does not work. Therefore, in this paper, we calculate Local APIC Counter value by using MSR_FSB_FREQ register to support real-time processing function on tablet PC's. We designed and implemented RTiK+, which provides real-time processing function to guarantee the periodicity by calculating the operation time of accurate timer. In order to verify and evaluate the performance of the implemented the RTiK+, the period was measured by using the Read Time-Stamp Counter (RDTSC) instruction and it was confirmed that it operates normally at 1ms and 0.1ms period.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be","authors":"Satoshi Kosakatani, T. Uehara, Songpon Teerakanok","doi":"10.23919/ICITST51030.2020.9351320","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351320","url":null,"abstract":"Japan‘s Act on Wireapping for Criminal Investigation has been amended in 2016. The amendment was made by adding a wiretapping method using specifically designed device, and came into effect in 2019. Previously, the witness system was used to avoid unauthorized communication eavesdropping by investigative agencies. The amendment allows for the wiretapping without the need for witnesses. For this purpose, special interception system using cryptographic technology has been introduced. However, there has not been sufficient discussion of the issue of the interception system that satisfies the requirements of the law from a technical point of view. This paper discusses an interception system for adequate wiretapping to satisfy the act.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy","authors":"Zongchao Qiao, I. Taralova, S. E. Assad","doi":"10.23919/ICITST51030.2020.9351314","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351314","url":null,"abstract":"Pseudo-chaotic number generators (PCNGs), designed based on multiple chaotic maps, have a significant influence on the security of chaos-based cryptosystems. Since the majority of the chaotic maps are based on real numbers, most of the proposed PCNGs use floating-point notations. However, this data type, especially the double precision notation, has disadvantages of high computation cost and inefficient resource utilization. Also, due to the high sensitivity of the chaotic systems and the finite precision nature of software and hardware platforms, the truncation or round-off errors may cause a big difference in the generated pseudo-chaotic numbers, which may undermine the PCNG's security reliability. To overcome these drawbacks, a new secure PCNG scheme based on the reformulated skew tent maps over a 32-bit integer field is proposed in this paper. It not only reduces the resource utilization from the hardware perspective, but also ensures the PCNG's performance over various operation platforms. Furthermore, the proposed PCNG uses a parameter changeable strategy, which expands the key space of the cryptosystem that adopts the PCNG, and thus increases the immunity against the brute-force attack. The security and statistical test results have demonstrated that the proposed PCNG has reliable security properties with good randomness and it is suitable for cryptographic applications.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Consumption of a LoRaWAN Network using Jarvis Algorithm","authors":"Esau Bermudez, D. Sadok","doi":"10.23919/ICITST51030.2020.9351345","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351345","url":null,"abstract":"Energy consumption in LPWANs, such as LoRaWAN, plays an important role in determining the lifetime of wireless sensor networks motes. In this paper, the use of different battery technologies and the impact of the media access control layer (MAC) and physical layer (PHY) are studied. Among the metrics monitored in this scenario, it is energy efficiency and its impact on battery life for better performance. The Jarvis algorithm its run on the sensor network to examine the impact on the MAC and physical layer of LoRa. Its parameters such as spreading factor, channel activity detection, code rate and channel frequencies on the consumption of Energy; Executing the Jarvis algorithm showed that both technologies discharge in a similar way, but lithium batteries increase their resistance to discharge for a longer time and are more profitable when executing the Jarvis algorithm.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of RPL and DODAG Formations for IoTs Applications","authors":"Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim","doi":"10.23919/ICITST51030.2020.9351340","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351340","url":null,"abstract":"Nowadays the rapid growth in the Internet of Things (IoTs) has change our life to be more intelligent and smart, the development in the Wireless Sensors Networks (WSNs), besides the wide use of the embedded devices in different area like industry, home automation, transport, agriculture and health care, which was led the Routing Over Low-power and Lossy- network (ROLL) working group to introduce the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), therein the RPL nodes have organized topology as a Directed Acyclic Graph (DAG) and terminated at one root to form the Destination Oriented DAGs (DODAGs). In this paper by using InstantContiki3.0 and CoojaGUI we analyze the DODAG formations and evaluate the performance of the RPL based on the Expected Transmission Count (ETX) Objective Function (OF) that enable RPL to select and optimize routes within RPL instance, as well as we evaluate the following metrics: The ETX Reliability Object (ETX), Radio Duty Cycle (RDC), energy consumption, the received packets by the motes and neighbor count. The simulation results show that the DODAG root able to connect to all of the neighbor motes as well as the ETX can essentially take control over DODAG formations and it has an effects in the RDC ratio, furthermore most of the motes show reasonable low power consumption, also the motes show acceptable number of the received packets.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session 5: Cyber Security","authors":"","doi":"10.23919/icitst51030.2020.9351329","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351329","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121434300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session 3: Neural Network and Network Security","authors":"","doi":"10.23919/icitst51030.2020.9351311","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351311","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed
{"title":"YARAMON: A Memory-based Detection Framework for Ransomware Families","authors":"May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed","doi":"10.23919/ICITST51030.2020.9351319","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351319","url":null,"abstract":"Ransomware attacks have evolved to become more sophisticated, persistent and irreversible. In 2019, many high profile ransomware developers extorted high-value entities for money by encrypting their data and deleting any backup files. Once a system is infected with a crypto-ransomware attack, it will be tough to recover the victim's data unless a backup is available or the malware author shares the decryption key with the victim. Moreover, ransomware developers nowadays adopt new tactics and techniques to spread and evade detection. One of those techniques is packing in order to enhance their defensive mechanisms to avoid detection. This paper suggests a hybrid approach to detect packed ransomware samples based on scanning process memory dumps and dropped executable files using enhanced YARA rules framework. Through describing common ransomware artifacts using Y ARA rules, upon testing, the detection rate reached 97.9% of dumped files.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pedagogic Analysis of Information Systems Security Measures in Online Services","authors":"E. Okike, Gofaone Mogapi","doi":"10.23919/ICITST51030.2020.9351325","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351325","url":null,"abstract":"Information systems provide effective and efficient computer-based support for businesses. The increasing use of information systems has also brought about increase in security threats, especially in online transactions. This paper previews the basic concept of information systems, their components, and general schema. Furthermore, using a literature search approach, a survey of the various threats to online services and a critical analysis of the effectiveness of various security measures in online services is presented. Finally, some recommendation for online users and online information service providers are made to effectively fight any form of threats experienced in online transactions. Online service users need to adopt a security conscious culture in online transactions, constant adherence to password standards, and practice safe online habits. Online service providers must adopt ethically acceptable standards and use modern technologies to secure the services they provide for users.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates","authors":"K. Kioskli, Nineta Polemi","doi":"10.23919/ICITST51030.2020.9351343","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351343","url":null,"abstract":"Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers' types, profiles, and competencies. In this paper, we present a holistic, multidimensional approach to examine the likelihood for an attackers' behaviour to occur by considering all influential factors (e.g., technical, social, behavioural, psychological). Furthermore, the quantification of the attackers' behaviours may lead to better estimate attacks' potential.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"284-286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}