2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

筛选
英文 中文
Real-Time supports on Tablet PC Platforms 实时支持平板电脑平台
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351322
Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee
{"title":"Real-Time supports on Tablet PC Platforms","authors":"Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee","doi":"10.23919/ICITST51030.2020.9351322","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351322","url":null,"abstract":"In the case of laptops and tablet PCs that replace desktop, it uses the Windows operating system to provide various functions depending on operating system dependency, the Windows operating system does not support real-time processing because it uses multilevel feedback queue scheduling that extends round-robin scheduling. Also, since the initial value of Local APIC Counter cannot be obtained from the Windows 8, the realtime processing function provided through the existing RTiK does not work. Therefore, in this paper, we calculate Local APIC Counter value by using MSR_FSB_FREQ register to support real-time processing function on tablet PC's. We designed and implemented RTiK+, which provides real-time processing function to guarantee the periodicity by calculating the operation time of accurate timer. In order to verify and evaluate the performance of the implemented the RTiK+, the period was measured by using the Read Time-Stamp Counter (RDTSC) instruction and it was confirmed that it operates normally at 1ms and 0.1ms period.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be 日本《刑事侦查窃听法》:制度如何实施及应如何实施
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351320
Satoshi Kosakatani, T. Uehara, Songpon Teerakanok
{"title":"Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be","authors":"Satoshi Kosakatani, T. Uehara, Songpon Teerakanok","doi":"10.23919/ICITST51030.2020.9351320","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351320","url":null,"abstract":"Japan‘s Act on Wireapping for Criminal Investigation has been amended in 2016. The amendment was made by adding a wiretapping method using specifically designed device, and came into effect in 2019. Previously, the witness system was used to avoid unauthorized communication eavesdropping by investigative agencies. The amendment allows for the wiretapping without the need for witnesses. For this purpose, special interception system using cryptographic technology has been introduced. However, there has not been sufficient discussion of the issue of the interception system that satisfies the requirements of the law from a technical point of view. This paper discusses an interception system for adequate wiretapping to satisfy the act.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy 基于密钥空间可扩展策略的可靠加密伪混沌数生成器
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351314
Zongchao Qiao, I. Taralova, S. E. Assad
{"title":"A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy","authors":"Zongchao Qiao, I. Taralova, S. E. Assad","doi":"10.23919/ICITST51030.2020.9351314","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351314","url":null,"abstract":"Pseudo-chaotic number generators (PCNGs), designed based on multiple chaotic maps, have a significant influence on the security of chaos-based cryptosystems. Since the majority of the chaotic maps are based on real numbers, most of the proposed PCNGs use floating-point notations. However, this data type, especially the double precision notation, has disadvantages of high computation cost and inefficient resource utilization. Also, due to the high sensitivity of the chaotic systems and the finite precision nature of software and hardware platforms, the truncation or round-off errors may cause a big difference in the generated pseudo-chaotic numbers, which may undermine the PCNG's security reliability. To overcome these drawbacks, a new secure PCNG scheme based on the reformulated skew tent maps over a 32-bit integer field is proposed in this paper. It not only reduces the resource utilization from the hardware perspective, but also ensures the PCNG's performance over various operation platforms. Furthermore, the proposed PCNG uses a parameter changeable strategy, which expands the key space of the cryptosystem that adopts the PCNG, and thus increases the immunity against the brute-force attack. The security and statistical test results have demonstrated that the proposed PCNG has reliable security properties with good randomness and it is suitable for cryptographic applications.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm 基于Jarvis算法的LoRaWAN网络能耗分析
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351345
Esau Bermudez, D. Sadok
{"title":"Energy Consumption of a LoRaWAN Network using Jarvis Algorithm","authors":"Esau Bermudez, D. Sadok","doi":"10.23919/ICITST51030.2020.9351345","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351345","url":null,"abstract":"Energy consumption in LPWANs, such as LoRaWAN, plays an important role in determining the lifetime of wireless sensor networks motes. In this paper, the use of different battery technologies and the impact of the media access control layer (MAC) and physical layer (PHY) are studied. Among the metrics monitored in this scenario, it is energy efficiency and its impact on battery life for better performance. The Jarvis algorithm its run on the sensor network to examine the impact on the MAC and physical layer of LoRa. Its parameters such as spreading factor, channel activity detection, code rate and channel frequencies on the consumption of Energy; Executing the Jarvis algorithm showed that both technologies discharge in a similar way, but lithium batteries increase their resistance to discharge for a longer time and are more profitable when executing the Jarvis algorithm.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of RPL and DODAG Formations for IoTs Applications 物联网应用中RPL和DODAG编队的性能评估
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351340
Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim
{"title":"Performance Evaluation of RPL and DODAG Formations for IoTs Applications","authors":"Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim","doi":"10.23919/ICITST51030.2020.9351340","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351340","url":null,"abstract":"Nowadays the rapid growth in the Internet of Things (IoTs) has change our life to be more intelligent and smart, the development in the Wireless Sensors Networks (WSNs), besides the wide use of the embedded devices in different area like industry, home automation, transport, agriculture and health care, which was led the Routing Over Low-power and Lossy- network (ROLL) working group to introduce the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), therein the RPL nodes have organized topology as a Directed Acyclic Graph (DAG) and terminated at one root to form the Destination Oriented DAGs (DODAGs). In this paper by using InstantContiki3.0 and CoojaGUI we analyze the DODAG formations and evaluate the performance of the RPL based on the Expected Transmission Count (ETX) Objective Function (OF) that enable RPL to select and optimize routes within RPL instance, as well as we evaluate the following metrics: The ETX Reliability Object (ETX), Radio Duty Cycle (RDC), energy consumption, the received packets by the motes and neighbor count. The simulation results show that the DODAG root able to connect to all of the neighbor motes as well as the ETX can essentially take control over DODAG formations and it has an effects in the RDC ratio, furthermore most of the motes show reasonable low power consumption, also the motes show acceptable number of the received packets.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session 5: Cyber Security 第五部分:网络安全
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351329
{"title":"Session 5: Cyber Security","authors":"","doi":"10.23919/icitst51030.2020.9351329","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351329","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121434300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session 3: Neural Network and Network Security 第三部分:神经网络与网络安全
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/icitst51030.2020.9351311
{"title":"Session 3: Neural Network and Network Security","authors":"","doi":"10.23919/icitst51030.2020.9351311","DOIUrl":"https://doi.org/10.23919/icitst51030.2020.9351311","url":null,"abstract":"","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"508 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YARAMON: A Memory-based Detection Framework for Ransomware Families 基于内存的勒索软件家族检测框架
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351319
May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed
{"title":"YARAMON: A Memory-based Detection Framework for Ransomware Families","authors":"May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed","doi":"10.23919/ICITST51030.2020.9351319","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351319","url":null,"abstract":"Ransomware attacks have evolved to become more sophisticated, persistent and irreversible. In 2019, many high profile ransomware developers extorted high-value entities for money by encrypting their data and deleting any backup files. Once a system is infected with a crypto-ransomware attack, it will be tough to recover the victim's data unless a backup is available or the malware author shares the decryption key with the victim. Moreover, ransomware developers nowadays adopt new tactics and techniques to spread and evade detection. One of those techniques is packing in order to enhance their defensive mechanisms to avoid detection. This paper suggests a hybrid approach to detect packed ransomware samples based on scanning process memory dumps and dropped executable files using enhanced YARA rules framework. Through describing common ransomware artifacts using Y ARA rules, upon testing, the detection rate reached 97.9% of dumped files.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pedagogic Analysis of Information Systems Security Measures in Online Services 在线服务中信息系统安全措施的教学分析
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351325
E. Okike, Gofaone Mogapi
{"title":"A Pedagogic Analysis of Information Systems Security Measures in Online Services","authors":"E. Okike, Gofaone Mogapi","doi":"10.23919/ICITST51030.2020.9351325","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351325","url":null,"abstract":"Information systems provide effective and efficient computer-based support for businesses. The increasing use of information systems has also brought about increase in security threats, especially in online transactions. This paper previews the basic concept of information systems, their components, and general schema. Furthermore, using a literature search approach, a survey of the various threats to online services and a critical analysis of the effectiveness of various security measures in online services is presented. Finally, some recommendation for online users and online information service providers are made to effectively fight any form of threats experienced in online transactions. Online service users need to adopt a security conscious culture in online transactions, constant adherence to password standards, and practice safe online habits. Online service providers must adopt ethically acceptable standards and use modern technologies to secure the services they provide for users.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates 测量社会心理和行为因素可改善对攻击可能性的估计
2020 15th International Conference for Internet Technology and Secured Transactions (ICITST) Pub Date : 2020-12-08 DOI: 10.23919/ICITST51030.2020.9351343
K. Kioskli, Nineta Polemi
{"title":"Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates","authors":"K. Kioskli, Nineta Polemi","doi":"10.23919/ICITST51030.2020.9351343","DOIUrl":"https://doi.org/10.23919/ICITST51030.2020.9351343","url":null,"abstract":"Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers' types, profiles, and competencies. In this paper, we present a holistic, multidimensional approach to examine the likelihood for an attackers' behaviour to occur by considering all influential factors (e.g., technical, social, behavioural, psychological). Furthermore, the quantification of the attackers' behaviours may lead to better estimate attacks' potential.","PeriodicalId":346678,"journal":{"name":"2020 15th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"284-286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信