Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems最新文献

筛选
英文 中文
A group key agreement based encrypted traffic detection scheme for Internet of Things 基于组密钥协议的物联网加密流量检测方案
Zhongqi Fan, Yong Zeng, Xiao-yan Zhu, Jianfeng Ma
{"title":"A group key agreement based encrypted traffic detection scheme for Internet of Things","authors":"Zhongqi Fan, Yong Zeng, Xiao-yan Zhu, Jianfeng Ma","doi":"10.1145/3417312.3432093","DOIUrl":"https://doi.org/10.1145/3417312.3432093","url":null,"abstract":"In CCS 2019, the privacy-preserving deep package inspection (PrivDPI) was proposed to detect anomalies and suspicious activities in encrypted network traffic, which is a provably secure and highly efficient approach for the end-to-end communication model. However, PrivDPI cannot be applied directly on the scenarios of the Internet of Things (IoT) due to its one/many-to-many communication model in which key agreement will bring giant power consumption. In this paper, we propose a group key agreement based encrypted traffic detection scheme for the Internet of Things (GKA_DPI) to solve it. In GKA_DPI, we still use BlindBox for traffic detection, which was used in PrivDPI and Sherry's scheme. The difference is that we use a dynamic group key agreement to replace the original key agreement protocol to reduce power consumption. Then we can perform deep traffic detection over encrypted packages on the widely used protocol Message Queuing Telemetry Transport (MQTT) of IoT. GKA_DPI can detect encrypted traffic without decrypting transmitted messages and find out malicious traffic to ensure the security of sensor network communication. Finally, we prove the forward and backward secrecy of proposed GKA_DPI.","PeriodicalId":361484,"journal":{"name":"Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GPS Spoofing Detection via SNR 基于信噪比的GPS欺骗检测
Donghui Diao, Xin Wang, Chao Yang, Yue Wang, Jianfeng Ma
{"title":"GPS Spoofing Detection via SNR","authors":"Donghui Diao, Xin Wang, Chao Yang, Yue Wang, Jianfeng Ma","doi":"10.1145/3417312.3431826","DOIUrl":"https://doi.org/10.1145/3417312.3431826","url":null,"abstract":"Nowadays, the use of GPS has penetrated everyone's daily life, so the safety of GPS signals has threatened all of us. Since the portable GPS spoof was proposed at the Black Hat Conference, the cost and threshold of GPS spoofing have also been getting lower and lower. However, many strategies for anti-GPS spoofing may need to add new hardware equipment or require powerful computing power. We aim to use the smallest possible cost to complete the purpose of GPS spoofing detection. In this article, we have designed There are many different detection schemes, and their detection delay and accuracy are different. To prove their feasibility, we did a real experiment. We evaluated the performance of the system based on the experiment, and the results show that the system accuracy is as high as 98%.","PeriodicalId":361484,"journal":{"name":"Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115640931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hard-Label Black-Box Adversarial Attack on Deep Electrocardiogram Classifier 深度心电图分类器的硬标签黑盒对抗攻击
Jonathan Lam, Pengrui Quan, Jiaming Xu, J. Jeyakumar, M. Srivastava
{"title":"Hard-Label Black-Box Adversarial Attack on Deep Electrocardiogram Classifier","authors":"Jonathan Lam, Pengrui Quan, Jiaming Xu, J. Jeyakumar, M. Srivastava","doi":"10.1145/3417312.3431827","DOIUrl":"https://doi.org/10.1145/3417312.3431827","url":null,"abstract":"Through aiding the process of diagnosing cardiovascular diseases (CVD) such as arrhythmia, electrocardiograms (ECGs) have progressively improved prospects for an automated diagnosis system in modern healthcare. Recent years have seen the promising applications of deep neural networks (DNNs) in analyzing ECG data, even outperforming cardiovascular experts in identifying certain rhythm irregularities. However, DNNs have shown to be susceptible to adversarial attacks, which intentionally compromise the models by adding perturbations to the inputs. This concept is also applicable to DNN-based ECG classifiers and the prior works generate these adversarial attacks in a white-box setting where the model details are exposed to the attackers. However, the black-box condition, where the classification model's architecture and parameters are unknown to the attackers, remains mostly unexplored. Thus, we aim to fool ECG classifiers in the black-box and hard-label setting where given an input, only the final predicted category is visible to the attacker. Our attack on the DNN classification model for the PhysioNet Computing in Cardiology Challenge 2017 [12] database produced ECG data sets mostly indistinguishable from the white-box version of an adversarial attack on this same database. Our results demonstrate that we can effectively generate the adversarial ECG inputs in this black-box setting, which raises significant concerns regarding the potential applications of DNN-based ECG classifiers in security-critical systems.","PeriodicalId":361484,"journal":{"name":"Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems 第一届ACM智能网络物理系统安全与安全国际研讨会论文集
{"title":"Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems","authors":"","doi":"10.1145/3417312","DOIUrl":"https://doi.org/10.1145/3417312","url":null,"abstract":"","PeriodicalId":361484,"journal":{"name":"Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical Systems","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131645385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信