{"title":"Software Piracy Prevention: Splitting on Client","authors":"Yawei Zhang, Lei Jin, Xiaojun Ye, Dongqing Chen","doi":"10.1109/SECTECH.2008.10","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.10","url":null,"abstract":"After identifying the fundamental weakness of existing privacy prevention, this paper proposes a software-splitting technique in which we put the split contents on the client instead of the remote trust server. Unlike traditional static client identification techniques, this new technique would encrypt the extracted contents from the software by a key relating to the hardware characteristics, and then decrypt them dynamically during the main program running. This method not only makes it harder to create an additional available copy based on diversity, but also prevents illegal uses on the copy.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129639399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust and Reputation Aware Security for Resource Selection in Grid Computing","authors":"V. Vijayakumar, R. WahidhaBanu","doi":"10.1109/SECTECH.2008.46","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.46","url":null,"abstract":"In providing the infrastructure for the accomplishment of general purpose computational grids the main concern is security. Still, by properly authenticating users and hosts and in the interactions between them, most grid implementations focus their safety concerns. The effective and competent exploitation of grid computing services needs sophisticated and secured resource management systems. The wide range of selection and the high degree of strangeness leads to the problem in secured selection of grid. Without the assurance of a higher degree of confidence relationship, efficient resource allocation and utilization can not be attained. In recent times, with larger applications in e-commerce reputation mechanisms have become one of the most important techniques underpinning the distributed application and system safety. We have proposed a new approach in this paper, which intends to offer trust and reputation aware security for resource selection in grid computing. Based on the calculated trust factor (TF) value of each entity the incoming jobs have securely allocated to the entity.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127239798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae-Seo Lee, Hyuncheol Jeong, Jun-Hyung Park, Minsoo Kim, Bongnam Noh
{"title":"The Activity Analysis of Malicious HTTP-Based Botnets Using Degree of Periodic Repeatability","authors":"Jae-Seo Lee, Hyuncheol Jeong, Jun-Hyung Park, Minsoo Kim, Bongnam Noh","doi":"10.1109/SECTECH.2008.52","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.52","url":null,"abstract":"The malicious botnets are evaluated as the serious threat of the Internet society in future. As the botnets are more clever and artful, the detection of botnets is not easy. Recently malicious botnets evolve into HTTP botnets out of typical IRC botnets and it is difficult to response effectively with existing methods which are using DNS traffic. In this paper, we show the relations of HTTP clients to HTTP servers, and propose the method to search malicious HTTP botnets by using degree of periodic repeatability.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Based Multicast Routing Algorithm with Multiple Constraints for Mobile Adhoc Networks","authors":"A. Sabari, K. Duraiswamy","doi":"10.1109/SECTECH.2008.36","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.36","url":null,"abstract":"One particular challenging environment for multicast is a mobile ad-hoc network (MANET). Existing studies show that tree-based and mesh based on-demand protocols are not necessarily the best choice, since associated overhead will be more. Several algorithms based on the ant colony optimization (ACO) approach minimizes the cost of the tree under multiple constraints. These algorithms treat the traffic engineering multicast problem as a single-purpose problem with several constraints. The main disadvantage of this approach is the necessity of a predefined upper bound that can exclude good trees from the final solution. This paper presents a design on ant-colony based multicast routing (AMR) algorithm for MANETs, to solve the traffic Engineering multicast problem that optimizes several objectives simultaneously. The algorithm calculates one more additional constraint in the cost metric, which is the product of average-delay and the maximum depth of the multicast tree and try to minimize this combined cost metric. Simulation results show that the proposed algorithm outperforms all previous algorithms by forming the multicast tree with varying sizes.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121203702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Schemes for Digital Signing Key Sharing","authors":"Chao-Wen Chan, Chinchen Chang","doi":"10.1109/SECTECH.2008.16","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.16","url":null,"abstract":"In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of the proposed schemes. We find that the signer authentication can be altered into the signing key granting authentication and the signer nonrepudiation can be altered into the group nonrepudiation.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"4 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survivable Scheme for Critical Information System","authors":"Zhu Jianming, Wang Chao","doi":"10.1109/SECTECH.2008.56","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.56","url":null,"abstract":"In survivable information systems, any intrusion or failure into a part of the system will not endanger essential functions of the systems. This paper proposes survivable scheme for critical information systems based on intrusion-tolerant policy and multi-version subsystems. Using the techniques of both redundancy and diversity, the survivability of critical information systems is achieved in the presence of intrusions or failures. Compared with other survivable schemes, our approach has implemented the security and robustness for the key functions of a critical information system by using the integration security strategy and multiple security strategies.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Stream Processing Based on ALE-Compliant RFID Middleware","authors":"Y. Byun, Moon-seok Yang, Sang-Young Byun","doi":"10.1109/SECTECH.2008.58","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.58","url":null,"abstract":"USN and RFID, as new technologies for the realization of ubiquitous computing, are technically closely related with each other. In this paper, we propose an efficient processing method of various kinds of sensor data used in USN environment to provide efficiency from the view point of not only the convergence of USN and RFID technologies but also on cost and extensibility. Specifically, we propose a method of converting various sensor data into EPC data format which can be handled in ALE-compliant RFID middleware. By using the proposed method, existing ALE-compliant middleware based on international standard specification can easily handle not only RFID tag data but also general sensor data simultaneously without any changes in the middleware. And in addition, various types of ubiquitous application services can be implemented at a low cost and in a shorter time.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun-Hyung Park, Jung-Sun Kim, Jae-Hyun Seo, Minsoo Kim
{"title":"A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment","authors":"Jun-Hyung Park, Jung-Sun Kim, Jae-Hyun Seo, Minsoo Kim","doi":"10.1109/SECTECH.2008.43","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.43","url":null,"abstract":"Flexible access control model has been studied and implemented on operating system for a long time. SELinux of NSA have fine-grained policy. But, the strict policy make user feel inconvenience. Though SELinux can present MAC or RBAC as well as DAC, it doesnpsilat show all of the notions. We propose the flexible access control model that it can present diverse access control policies and the policies can transform each other. As our model is based on E-R model, it is easy to understand and to use by simple syntax. We implement and test this model on Linux. And we show that the performance degree isnpsilat decreased highly.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122917492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Resource-Draining DoS Attacks on Broadcast Source Authentication on Wireless Sensors Networks","authors":"C. Bekara, M. Laurent-Maknavicius, K. Bekara","doi":"10.1109/SECTECH.2008.20","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.20","url":null,"abstract":"During the few last years, several broadcast source authentication protocols (BSAPs) were proposed for wireless sensors network (WSN), to secure broadcast communications. Amongst the proposed protocols, we find time-asymmetry based BSAPs, that achieve delayed authentication of broadcasted data, and are known for their low computation and transmission overheads. However, time-asymmetry based BSAPs suffer from a kind of DoS attacks, called resource-draining DoS attack, in which an attacker floods the network with fake messages, that all sensors of the network buffer and forward, then later verify, thus causing buffer overflow and batteries depletion. In this paper we investigate resource-draining DoS attack in time-asymmetry based BSAPs, and propose a new time asymmetry based BSAP protocol, to overcome this kind of DoS attacks, by achieving a hop-by-hop authentication of broadcasted messages, thus limiting the damage of an attacker to its one-hop neighbors only, instead of the entire network.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of the BioAPI Test Assertion to Apply a Telebiometric System Model to the National Infrastructure Establishment","authors":"YongNyuo Shin, Dong-Young Yoo, YongJun Lee, Woochang Shin","doi":"10.1109/SECTECH.2008.30","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.30","url":null,"abstract":"Many issues need to be resolved before applying biometrics technology to the national network. Most importantly, it should be implemented with a standard interface so that interoperability can be guaranteed. Based on this requirement, infrastructure with a well-established model should be developed. The model is proposed by arranging models suitable for use in the national infrastructure establishment. A test assertion is implemented based on international standard BioAPI (biometric application interface), so that the national infrastructure can be built using this model.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"30 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}