{"title":"A Generic Model for Privacy-Preserving Authentication on Smartphones","authors":"Sepehr Keykhaie, Samuel Pierre","doi":"10.1109/SysCon48628.2021.9447102","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447102","url":null,"abstract":"With the increasing use of biometrics for user authentication especially on mobile devices, its privacy and resource requirements are becoming big challenges to consider. In this paper, we propose a generic model for privacy-preserving yet accurate authentication on smartphones using the mobile matching on card (MMOC) technique and transfer learning. MMOC technique takes advantage of SIM cards as a secure element (SE) on smartphones to increase the security and privacy of user verification with low performance overhead. In order to improve the performance accuracy of the system, we use transfer learning and fine-tune a network suitable for implementation on off-the-shelf SIM cards available on smartphones. The classification sub-network is migrated to the SIM card for a lightweight and secure user verification. However, the implementation of classification sub-network on constrained resource smart cards with high accuracy and efficiency is a challenging task. We propose log quantization scheme and an on-card optimization architecture to speed-up the forward pass of the sub-network and retain the system’s accuracy close to the original model with low memory footprint and real-time verification response. Using a public mobile face dataset, we evaluate our privacy-preserving verification system. Our results show that the proposed system achieves Equal Error Rate (EER) of 0.4%-2% in real-time, with response time of 1.5 seconds.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126944163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying the Thematic Trends of Model Based Systems Engineering in Manufacturing and Production Engineering Domains","authors":"Aditya Akundi, Viviana Lopez, T. Tseng","doi":"10.1109/SysCon48628.2021.9447071","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447071","url":null,"abstract":"Manufacturing and production systems have become increasingly complex in the past decade to meet the competitive demand in a growing industry. As these systems grow in complexity and flexibility, there is a need for efficient management and analysis of these systems. Model-based systems engineering (MBSE) addresses the complexity inherent with systems development with a model-centric approach that supported tailored modeling languages, methods and tools. This paper identifies the thematic evolution and trends and relationships found in the use and application of MBSE specifically in the manufacturing and production engineering domain. A collection of 471 published article from Institute of Electrical and Electronics Engineers (IEEE) and Science Direct over the past decade were used for the analysis using text mining techniques. Due to the limitation on the access to full text information of all the articles identified, only abstracts were considered for analysis. This effort helps the researchers across the domain to explore the reason behind and understand the change of the thematic perspectives of MBSE application over the last decade. In addition, the finding of the growing interest in addressing the aspects of complexity and systems requirements, and on the aspects of the use of MBSE for identifying and addressing the challenges related to Cyber Physical Systems help in paving a path for future research.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. C. Will, Tiago Heinrich, Amanda B. Viescinski, C. Maziero
{"title":"Trusted Inter-Process Communication Using Hardware Enclaves","authors":"N. C. Will, Tiago Heinrich, Amanda B. Viescinski, C. Maziero","doi":"10.1109/SysCon48628.2021.9447066","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447066","url":null,"abstract":"Inter-Process Communication (IPC) enables applications to share information in a local or distributed environment, allowing them to communicate with each other in a coordinated manner. In modern systems this mechanism is extremely important, as even local applications can run parallel tasks in multiple processes in the machine, needing to exchange information to coordinate their execution, and optimizing the exchange of data in a more efficient way. The security in IPC relies on the integrity and confidentiality of the messages exchanged in such an environment, as messages exchanged between different processes can be targeted by attacks that seek to obtain sensitive data or to manipulate the application behavior. A Trusted Execution Environment (TEE) can be used to enable an isolated execution of the IPC mechanism to mitigate such attacks. In this paper we propose the adoption of the Intel Software Guard Extensions (SGX) architecture to provide data confidentiality and integrity in message exchange between processes, by using hardware instructions and primitives to encrypt and authenticate the messages. Our approach highlights a threat model and compares the solution proposed with two other scenarios, showing a feasible solution for security and an approach that can be applied to standard IPC mechanisms with small processing overhead.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127524443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware System Calls Detection Using Hybrid System","authors":"Y. Guan, Naser Ezzati-Jivan","doi":"10.1109/SysCon48628.2021.9447094","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447094","url":null,"abstract":"Due to the rapid and continuous increase of network intrusion, the need to protect computer systems and underlying infrastructure becomes inevitable. Beside this, the systems have additionally gotten extremely intricate as they fill in both scale and usefulness;hence,intrusion/anomaly detection becomes essential. The intrusion or anomaly detection poses several challenges including data collections due to the inherent datasets imbalance, caused by systems’ reliability requirements causing the event of an anomaly a irregularity phenomenon. Therefore, only a small percentage of available datasets captures the anomaly, which brings in the second challenge, i.e, model selection, and a specific approach for detecting an anomaly. While much research has been concentrated on the data collection part and statistical techniques, the focus of this work is devoted to a multi-module system call anomalies detection technique. We propose a novel approach based on Long Short Term Memory(LSTM) and attention using transformers that can learn a sequence of a system call efficiently. Experimental results showed that the proposed deep learning model is 92.6% precise with a recall of 93.8% to classify the malicious process in the system.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time Optimal Concurrent Data collection Trees for IoT Applications","authors":"Arvind Kumar, Rakesh Matam, M. Mukherjee","doi":"10.1109/SysCon48628.2021.9447119","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447119","url":null,"abstract":"An Internet of things (IoT) application is typically comprised of a set of smart devices that generate and exchange vast amounts of data. Multiple applications can cooperate and share the same device infrastructure to meet their respective sensing needs. Also, multiple subscribers to the same data benefit from such a shared network set-up. The data generated by these devices is analyzed to increase productivity. Also, it is also used to improve the safety and security. A typical IoT network consists of a few hundreds of interconnected devices, and multiple application processes depend on the data generated by these devices. To prevent over provisioning, these applications cooperate and share the same device infrastructure to meet their respective sensing needs. This, however, presents the challenge of concurrent data collection. In concurrent data collection processes, multiple parallel data streams can be used to collect data efficiently at numerous base stations. Existing designs of concurrent data collection trees introduce many new challenges for IoT applications. One such challenge is the delay optimization of the concurrent data collection processes. In this paper, a time-optimal concurrent data collection trees is proposed. Through simulations, we show that the data collection is faster using the proposed structure in comparison to the existing design.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132392408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Farooq, M. Rashid, F. Azam, Yawar Rasheed, Muhammad Waseem Anwar, Zohaib Shahid
{"title":"A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN)","authors":"M. Farooq, M. Rashid, F. Azam, Yawar Rasheed, Muhammad Waseem Anwar, Zohaib Shahid","doi":"10.1109/SysCon48628.2021.9447131","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447131","url":null,"abstract":"Security is a key component of the network. Software Defined Networking (SDN) is a refined form of traditional network management system. It is a new encouraging approach to design-build and manage networks. SDN decouples control plane (software-based router) and data plane (software-based switch), hence it is programmable. Consequently, it facilitates implementation of security based applications for the prevention of DOS attacks. Various solutions have been proposed by researches for handling of DOS attacks in SDN. However, these solutions are very limited in scope, complex, time consuming and change resistant. In this article, we have proposed a novel model driven framework i.e. MDAP (Model Based DOS Attacks Prevention) Framework. Particularly, a meta model is proposed. As tool support, a tree editor and a Sirius based graphical modeling tool with drag drop palette have been developed in Oboe designer community edition. The tool support allows modeling and visualization of simple and complex network topology scenarios. A Model to Text transformation engine has also been made part of framework that generates java code for the Floodlight SDN controller from the modeled scenario. The validity of proposed framework has been demonstrated via case study. The results prove that the proposed framework can effectively handle DOS attacks in SDN with simplicity as per the true essence of MDSE and can be reliably used for the automation of security based applications in order to deny DOS attacks in SDN","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Themed Entertainment in the Age of Coronavirus","authors":"D. Dunbar, M. Mansouri","doi":"10.1109/SysCon48628.2021.9447070","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447070","url":null,"abstract":"This paper looks at the effects the current coronavirus pandemic has had on the themed entertainment industry-specifically on Disney Parks and Resorts. It utilizes tools from the Systems Thinking field, including stakeholder analysis, shaping force analysis, a conceptagon triple, causal loop diagrams, and systemigrams to provide insights into the problem space facing Disney theme parks. This analysis reveals aspects of the problem that need to be considered when evaluating potential solutions to interim and long-term challenges presented. It points out the natural boost that the pandemic gave to Disney’s streaming service, Disney+, and it explores ways to mimic that phenomenon to provide increased opportunities for the company. It highlights the importance of group experience to theme parks and the prominent role that destination plays in the current makeup of themed entertainment experience. It concludes that design efforts are best aimed at exploring solution spaces that place emphasis on multi-generational experiences that allow connection to the Disney brand without requiring significant extra-party interaction. Augmented Reality is one technology that shows promise for addressing social distancing concerns while fostering group experiences. Design work can and should be both interested in destination experiences and experiences that can be implemented in non-traditional locations.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alfredo Menezes Vieira, Rubens Souza Munhos Junior, A. Ribeiro
{"title":"Systematic Mapping on Prevention of DDoS Attacks on Software Defined Networks","authors":"Alfredo Menezes Vieira, Rubens Souza Munhos Junior, A. Ribeiro","doi":"10.1109/SysCon48628.2021.9447143","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447143","url":null,"abstract":"Cyber attacks are a major concern for network administrators as the occurrences of such events are continuously increasing on the Internet. Software-defined networks (SDN) enable many management applications, but they may also become targets for attackers. Due to the separation of the data plane and the control plane, the controller appears as a new element in SDN networks, allowing centralized control of the network, becoming a strategic target in carrying out an attack. According to reports generated by security labs, the frequency of the distributed denial of service (DDoS) attacks has seen an increase in recent years, characterizing a major threat to the SDN. However, few research papers address the prevention of DDoS attacks on SDN. Therefore, this work presents a Systematic Mapping of Literature, aiming at identifying, classifying, and thus disseminating current research studies that propose techniques and methods for preventing DDoS attacks in SDN. When answering these questions, it was determined that the SDN controller was vulnerable to possible DDoS attacks. No prevention methods were found in the literature for the first phase of the attack (when attackers try to deceive users and infect the host). Therefore, the security of software-defined networks still needs improvement over DDoS attacks, despite the evident risk of an attack targeting the SDN controller.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117094753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulating Federated Databases for early Validation of Federated Searches using the Broker-based SysML Toolbox","authors":"S. Melzer, Stefan Thiemann, R. Möller","doi":"10.1109/SysCon48628.2021.9447055","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447055","url":null,"abstract":"In research and cultural institutions as well as in companies, many data are collected and increasingly stored in databases. For example, during the project EDAK (Epigraphische Datenbank zum antiken Kleinasien) the Department for Ancient History at the Universität Hamburg created an epigraphic database of ancient Asia Minor. This database contains a collection of Greek and Latin inscriptions from modern-day Turkey. For analyzing data, a user usually sends a query to one database and receives an answer. However, it is not always sufficient to use one database only. For example, the fragment AO 29196 is located at the Louvre. The counterpart of this fragment is the fragment KUG 15 which is located in Germany. Indeed, both fragments were found without database federation, but in the future, for analyzing data from different databases it would be desirable to find related data in a FDBS. This example highlights the need to sometimes combine, analyze, and query data from different databases. Database federation offers a logical centralization of data without the need to change physical implementation of the databases. Thus, the complexity of query execution increases. Users send queries to the FDBS, and then the FDBS forwards queries to each (relevant) database node. The answer to queries vary. The response may be correct, incorrect, or incomplete. To overcome this problem, theoretical foundations have been developed. Although theories exist for implementing FDBSs, in practice, the implementation of a FDBS is a complex task. When using the currently-existing FDBS such as Denodo, a programmer or engineer still has to develop a congruent overview for querying internal as well as external databases. An FDBS is often expensive to develop. We predict that early validation of federated searches may identify problems which need to be solved before implementation. Therefore, we recommend carrying out a feasibility study before a FDBS is set up. In this paper we present how to model and simulate federated databases before implementation. The development of database federation for early validation of federated searches is challenging due to the distribution, heterogeneity, and autonomy. In order to support the development, established methods, tools, and languages for modeling, simulating, and validating systems are useful. Developers are supported in model-based development using the SysML, the modeling and simulation tool Cameo Systems Modeler and the broker-based SysML Toolbox. For modeling and simulation, we use the tool Cameo Systems Modeler and the broker-based SysML Toolbox. In addition, we evaluate our model-based approach by feasibility study by means of a prototypical implementation of federated databases. This paper is structured as follows. First, the databases are briefly described which are used for the feasibility study. Second, the broker-based SysML Toolbox, as an extension of the tool Cameo Systems Modeler, is introduced which contributes in c","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Araujo, Carlos Melo, Felipe Oliveira, Paulo Pereira, Rúbens de Souza Matos Júnior
{"title":"A Software Maintenance Methodology: An Approach Applied to Software Aging","authors":"J. Araujo, Carlos Melo, Felipe Oliveira, Paulo Pereira, Rúbens de Souza Matos Júnior","doi":"10.1109/SysCon48628.2021.9447082","DOIUrl":"https://doi.org/10.1109/SysCon48628.2021.9447082","url":null,"abstract":"The increasing use of computational systems has highlighted concerns about attributes that may influence the quality of service, such as performance, availability, reliability, and maintenance capacity. Failures in the software development process may impact these attributes. Flawed code and overall software misdesign may cause internal errors, leading to system malfunction. Some errors might be identified and fixed during the software testing process. However, other errors may manifest only during the production stage. This is the case of the software aging phenomenon, which is related to the progressive degradation that a software performance or reliability suffers during its operational life. This paper proposes a methodology for software maintenance that is tailored to identify, correct, and mitigate the software aging effects. If the source code can be modified and a new version deployed with minimal impact, thus data from aging detection is used for corrective maintenance, i.e., for fixing the bug that causes the aging effects. If the software cannot be fixed nor its version updated without long system interruption or other bad consequences, then our approach can mitigate the aging effects, in a preventive maintenance to avoid service outages. The proposed methodology is validated through both Stochastic Petri Net (SPN) models and experiments in a controlled environment. The model evaluation considering a hybrid maintenance routine (preventive and corrective) yielded an availability of 99.82%, representing an annual downtime of 15.9 hours. By contrast, the baseline scenario containing only reactive maintenance (i.e., repairing only after failure) had more than 1342 hours of annual downtime- 80 times higher than the proposed approach.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115218579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}