{"title":"Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm","authors":"Fanyu Kong, Guoqiang Yang, Huiyi Liu, Y. Jiang, Chengyu Hu, Dashui Zhou","doi":"10.1145/3371676.3371699","DOIUrl":"https://doi.org/10.1145/3371676.3371699","url":null,"abstract":"RSA cryptosystem is a widely-used public-key cryptographic algorithm in TLS/SSL and IPSec protocols. Fault-injection attack has a powerful threat on the CRT-based implementation of RSA cryptosystem. In 2016, Y. Choi et al. proposed a new right-to-left square-always exponentiation algorithm and a test-based CRT-RSA exponentiation algorithm to defeat the fault-injection attack. In this paper, we propose a fault-injection attack on Y. Choi et al.'s test-based CRT-RSA exponentiation algorithm. By inducing a permanent fault in the computation process of CRT-RSA cryptosystem, the attacker can obtain a faulty RSA signature and then recover the RSA private key. Furthermore, we give an improved CRT-RSA exponentiation algorithm to fix the security flaw. The security analysis shows that the improved algorithm can resist the fault-injection attack.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131609542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Malware Detection Combined with Static and Dynamic Analysis","authors":"Jianing Zhang, Xingtao Zhuang, Yunfang Chen","doi":"10.1145/3371676.3371685","DOIUrl":"https://doi.org/10.1145/3371676.3371685","url":null,"abstract":"Android System has attracted not only constantly increasing number of smart device users, but also the serious attacks from explosive malicious apps. Consequently, the need to effectively detect Android malware is becoming more and more urgent. In the paper, combing the advantages of static analysis and dynamic analysis, we propose an Android malware detection method based on machine classification. Our experimental results show that the accuracy of the approach meets the requirements of Android malware detection. Subsequently, we apply this approach to perform an interesting detection on the popular apps of different user crowds, and provide some corresponding security advices.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Intent Analysis Method Based on Attack Path Graph","authors":"Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao","doi":"10.1145/3371676.3371680","DOIUrl":"https://doi.org/10.1145/3371676.3371680","url":null,"abstract":"With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack behaviors and timely identification and pre-judgment of attack intentions are important components of security risks. However, the attack behavior in the network presents complexity, multi-step and uncertainty, which brings new technical challenges to attack intent analysis. Aiming at the problem that the attack intention of multi-step complex attack is difficult to identify, this paper proposes an attack intention analysis method based on attack path graph. Firstly, aiming at the multi-step complex attack behavior analysis problem, the key asset assessment technology is used to find out the key assets in the network system, and the hypothetical attack intention is generated according to the security protection requirements of the network system. Then, it is difficult to manually construct the attack path map in the large-scale network, and the automatic generation of the attack path map is realized. Finally, a method of network attack intent identification is proposed and a calculation method of attack intent probability is designed, which improves the efficiency and accuracy of attack intent recognition.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SSL Malicious Traffic Detection Based On Multi-view Features","authors":"Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen","doi":"10.1145/3371676.3371697","DOIUrl":"https://doi.org/10.1145/3371676.3371697","url":null,"abstract":"In recent years, as more and more softwares use SSL encryption protocol to improve the security and integrity of communications, the encrypted traffic is growing, which brings new challenges to cyber attack detection. Since most of the SSL traffic is unreadable ciphertext, traditional pattern recognition and deep packet inspection are not applicable. In addition, the current machine learning methods are not fully applicable to encrypted traffic detection. The detection of encrypted malicious traffic is still an open problem. In this paper, we propose an SSL malicious traffic detection method based on multi-view features. Our method comprehensively extracts features from multiple views, including flow statistics, SSL handshake field, and certificate to retain key original information. We test four machine learning models, i.e., SVM, Decision Tree, Random Forest, and XGBoost on the CTU Malware dataset. The results show that XGBoost performs best reaching an accuracy of 97.71%, which is better than other studies on the CTU dataset.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"34 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic-based Malware Behavior Description: Past and Future","authors":"Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang","doi":"10.1145/3371676.3371700","DOIUrl":"https://doi.org/10.1145/3371676.3371700","url":null,"abstract":"Traditional malware detection is faced with problems of low efficiency and high cost. In recent years, in order to improve the efficiency and accuracy of malware detection, a method based on semantic malware behavior description has been widely studied. In this paper, we firstly classified the current methods of semantic-based malware behavior description by their evolution and characteristics. Secondly, we performed a statistical analysis for the typical description in different aspects. Finally, through statistical analysis, we revealed the challenges faced by semantic-based malware behavior description and its future development prospects.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks","authors":"Xin Song, Xuefeng Huang, Haijun Qian","doi":"10.1145/3371676.3371687","DOIUrl":"https://doi.org/10.1145/3371676.3371687","url":null,"abstract":"In practical situations, the performance of some power allocation schemes degrades sufficiently with imperfect channel state information (CSI). To account for the problem, we propose a novel power allocation scheme in Non-orthogonal multiple access (NOMA) heterogeneous networks based on imperfect CSI, which achieve optimal sum data rate while optimizing power allocation. It is proved that the optimization problem is non-convex with the constraint of outage probability limit. We first transform the probabilistic mixed problem into a non-probabilistic problem, which is solved based on geometric programming (GP), and then the power allocation for each small cell user is achieved via Lagrange dual method. The simulation results show that the proposed algorithm can significantly improve the output performance compared with equal-power allocation (EPA) algorithm.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"28 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network","authors":"Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng","doi":"10.1145/3371676.3371686","DOIUrl":"https://doi.org/10.1145/3371676.3371686","url":null,"abstract":"With the development of digital wireless communication technol-ogy, the wireless signal identification has been suffering from increasingly complex electromagnetic environment and higher spectrum utilization. In this paper, we propose a wireless signal identification method based on interference cleaning and convolutional neural network (CNN) in 230MHz Band. The method firstly analyzes the received signal in time domain, building feature data sets combined with amplitudes, phases, in-phase components and orthogonal components. The method then generalizes singular value decomposition(SVD) and subspace division to preserve signal subspace, eliminate noise subspace and interference compress subspace. Finally, it utilizes the data set to train the CNN and make the wireless signals' identification through the well-trained the CNN. The experimental results with different kinds of modulation show that this method can achieve high recognition accuracy and strong anti-noise ability.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN","authors":"Phan The Duy, Hoai An Le Thi, V. Pham","doi":"10.1145/3371676.3371706","DOIUrl":"https://doi.org/10.1145/3371676.3371706","url":null,"abstract":"Controller is a key component in the three layers of Software - Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming packet. However, the capacity of flow table is limited and can be the target of malicious attacks by taking advantage of installing rules from controller. Specifically, malicious rules can be pushed from controller to occupy the available space for new benign traffic due to controlling and directing the packets in SDN relied on flow rules installation. These tables can be full of a massive number of flow entries populated from controller, leading to be out of space for new benign flows. This paper gives a method to mitigate flow table overloading attack after a DDoS attack notification. It can help the data plane to be more secured by improving the availability of flow table with a strategy of real-time packet monitoring and flow management in controller.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Polynomial Time Algorithm for Scheduling on Processing Time Constraints","authors":"Xuerong Yue, Jiji Gao, Zhibin Chen","doi":"10.1145/3371676.3371690","DOIUrl":"https://doi.org/10.1145/3371676.3371690","url":null,"abstract":"Given m parallel machines and n jobs with each job having a processing time, the classical scheduling, a famous NP-hard problem, wants to find a way to schedule all jobs on m machines such that the makespan is minimized. In this paper, we consider polynomial time solvability of this problem in some cases when certain conditions on processing times are being imposed. We focus on the case in which the processing times are powers of 2. We design a polynomial-time algorithm that solves this special case. Our result can be generalized to the case when processing times satisfy divisible property.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automatic Testing Platform for Object-oriented Software based on Code Coverage","authors":"Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao","doi":"10.1145/3371676.3371702","DOIUrl":"https://doi.org/10.1145/3371676.3371702","url":null,"abstract":"The development of automatic object-oriented software testing tools is a challenging and realistic subject in the field of software engineering. A testing prototype system named ARTCovPS (Adaptive Random Testing Coverage-based testing Prototype System) is designed and implemented for the widely used object-oriented method software. ARTCovPS mainly performs automated testing from two aspects, dynamic test case generation of object-oriented software based on coverage and adaptive random testing method based on coverage. To a certain extent, ARTCovPS testing prototype system realizes the software test automation, and the system has a high running efficiency and can automatically run different comparison methods. The experimental results are satisfactory, and the feasibility of the system is also verified.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121999899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}