Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu
{"title":"Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs","authors":"Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu","doi":"10.1109/3PGCIC.2015.102","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.102","url":null,"abstract":"Memory corruption bugs are one of the most critical vulnerabilities in software security, which can be exploited to overwrite virtual tables (vtables) or virtual table pointers (vfptrs) and finally gain control over the programs at virtual function call sites (vtable hijacking). In this paper, we propose a novel approach to detect vtable hijacking attacks against C++ binary executables. We first analyze the programs to get vtable information of each class, and backup the original vtables and vfptrs at runtime, then instrument security checks dynamically before virtual function dispatches to validate vtables' integrity. We implement the proposed approach as a tool and use it to successfully detect vtable hijacking attacks on the version 11 of Microsoft's Internet Explorer.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130005444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcel Dix, Lennart Merkert, Z. Ouertani, M. Aleksy, Reinhard Bauer
{"title":"Simulation and Re-engineering of Industrial Services: A Case Study from an Industrial Equipment Manufacturer","authors":"Marcel Dix, Lennart Merkert, Z. Ouertani, M. Aleksy, Reinhard Bauer","doi":"10.1109/3PGCIC.2015.76","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.76","url":null,"abstract":"Today's industrial companies have to provide a broad range of services for the technologies and products they sell, such as engineering and maintenance services. While service management literature focuses mainly on business-to-consumer (B2C) sector describing for example hotel booking services there is great need also in industrial organizations for models and guidelines to support managers on how services should be organized. In this paper we will present the SErvice Engineering Methodology (SEEM) Framework, and how it was applied in ABB to analyze industrial services. To illustrate our approach using SEEM, we will use a case study that we have carried out for an ABB service organization in Germany. We have been able to validate this approach through additional similar case studies carried out at other ABB locations in Europe and Asia. A particular emphasis in this paper is put on discrete event based simulation tools, and how they are used in our framework in order to identify shortcomings in the services analyzed that may be subject to service re-engineering. This paper primarily seeks to contribute to the debate about models and best practices how to design, analyze, and re-engineer industrial services.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132081644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ionut-Gabriel Raducu, Valentina-Camelia Bojan, Florin Pop, M. Mocanu, V. Cristea
{"title":"Real-Time Alert Service for Cyber-Infrastructure Environments","authors":"Ionut-Gabriel Raducu, Valentina-Camelia Bojan, Florin Pop, M. Mocanu, V. Cristea","doi":"10.1109/3PGCIC.2015.122","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.122","url":null,"abstract":"Smart environments represent a topic that gets more and more attention nowadays, especially due to the progress made in supporting fields such as Cloud computing, sensor networks, mobile computing and robotics. Also, the recent development of Internet of Things has an important contribution in increasing the desire to offer new solutions for smart environments. The alerting service is an essential component of any smart environment, that offers the user the possibility of being informed of the latest events occurred in the monitored environment. It is interconnected with other components of the smart environment, making the automatic execution of actions based on alerts possible. This paper presents a multi-layered architecture for the real time alert service, the proposed solution being integrated within a specific smart environment, namely \"Smart farms\". Besides describing each component of the proposed system, the paper also shows how these components interact with each other and how the system communicates with other external components. The performance tests demonstrate that the service is able to analyze large amounts of data coming from the large number of various sensors used to monitor the farms.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk","authors":"Pankaj Pandey, S. D. Haes","doi":"10.1109/3PGCIC.2015.109","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.109","url":null,"abstract":"A large variety of financial instruments has emerged to allow hedging of risks associated with the underlying assets, whether it is a commodity, weather or economic indicators. However, in the information security domain, cyber-insurance products are the only financial instrument available to hedge the information security risk. Furthermore, cyber-insurance markets are unable or unwilling to accept the high probability and/or high-intensity risks. Thus, there is a need for new financial instruments and a market mechanism to facilitate risk hedging in the information security domain. This article explains the limitations of cyber-insurance market and presents a novel financial instrument and a corresponding trading mechanism to address the problems in the cyber-insurance market. The proposed instrument and trading mechanism can be implemented in an information security prediction market to facilitate the hedging of the risk associated with the underlying information security event or condition. Furthermore, the article demonstrates the application of the proposed financial instrument in an imaginary scenario. Lastly, the article presents an evaluation of the proposed financial instrument and corresponding trading mechanism in hedging the underlying risk. In our analysis, we found that the proposed financial instrument can be a solution, at least to some extent, to the problems in the existing risk hedging mechanisms available in the information security domain.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":" 43","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency","authors":"Xu An Wang, Jianfeng Ma, F. Xhafa","doi":"10.1109/3PGCIC.2015.99","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.99","url":null,"abstract":"In this paper, we propose a new efficient scheme to outsource the the decryption of attribute based encryption with energy efficiency. We observe all the previous work on out-sourcing the decryption of ABE cares little about the ciphertext length. Almost all of them have linear length ciphertext with the attributes or the policy. But we know that transferring so long ciphertexts via wireless network for mobile phone can easily run out the energy of the battery, which hesitates the adaption of these solutions in actual scenarios. In this paper, we propose a new scheme to outsource the decryption of ABE but with constant size ciphertexts, which can achieve high energy efficiency. Compared with the pervious work on outsourcing the decryption of ABE, our work can achieve high energy efficiency and low bandwidth for the mobile phone users.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"40 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132192359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled O. Darwish, Islam El Madahh, H. K. Mohamed, H. E. Hennawy
{"title":"Towards Reliable Mobile Cloud Computing","authors":"Khaled O. Darwish, Islam El Madahh, H. K. Mohamed, H. E. Hennawy","doi":"10.1109/3PGCIC.2015.82","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.82","url":null,"abstract":"Cloud computing has been one of the fastest growing components of the IT industry. It altered the future of the web by having computing, communication, and storage provides as services to internet users. Mobile Cloud Computing (MCC) is currently gaining steam as an extension to cloud computing as it delivers a large variety of cloud application to billions of smartphones and wearable devices. This paper studies reliability for MCC by determining the ability of a system component to function correctly under different scenarios for a specified period of time. Our aim is to be able to estimate and manage uncertainty and risks of failure. The assessment procedures consist of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we present here several factors with significant impact on the overall cloud system reliability that should be taken into account in order to deliver highly available cloud computing services for mobile consumers.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nils Potthoff, Carsten Gremzow, Christoph Brandau, D. Tutsch
{"title":"Performance Increase by Software Decomposition with Characteristics of Combinational Logic","authors":"Nils Potthoff, Carsten Gremzow, Christoph Brandau, D. Tutsch","doi":"10.1109/3PGCIC.2015.92","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.92","url":null,"abstract":"Software development for multicore or multiprocessor systems is complex and error prone. The development of sequential source code is familiar and a proven procedure. The model presented in this paper can help to make use of current hardware architectures with existing software. This model makes a change in execution possible and could lead to hardware software co-design. This paper presents a way to decompose sequential software. The characteristics are used for new arrangements of the fragments and in software visualization. The visualization supports the developers in understanding internal dependencies. Some improvements in visual presentation by reducing complexity are discussed.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Omosebi, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati, Richard Hill
{"title":"Designing a Subscription Service for Earthquake Big Data Analysis from Multiple Sources","authors":"O. Omosebi, Stelios Sotiriadis, E. Asimakopoulou, N. Bessis, M. Trovati, Richard Hill","doi":"10.1109/3PGCIC.2015.58","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.58","url":null,"abstract":"The unpredictable nature of earthquakes has been a challenge for many researchers for a long time. Earthquakes take place suddenly and quickly, leaving scientists little time to prepare for it. This is due to the inescapable realization of the fact that much information can be deciphered from the huge volume of data being generated from numerous heterogeneous sources by the second. This paper investigates the acquisition of earthquake data, processing of such data and making it available to subscribers who need information generated from a Big Data analysis process. It uses FIWARE Big Data Generic Enabler and relies on the Message Broker GE to notify subscribers. Finally, we present a prototype for a worldwide Earthquake seismic activity monitoring.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Kwoczek, S. Martino, T. Rustemeyer, W. Nejdl
{"title":"An Architecture to Process Massive Vehicular Traffic Data","authors":"Simon Kwoczek, S. Martino, T. Rustemeyer, W. Nejdl","doi":"10.1109/3PGCIC.2015.124","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.124","url":null,"abstract":"Fostered by the \"big data\" hype in mobility, many research efforts have been aimed at improving techniques to model vehicular traffic patterns for mobility prediction. Nevertheless, from a practical stance, the industry still faces many technological challenges in bringing solutions on the market. Especially the scalability and performance of such systems raise major concerns, given the amount of spatio-temporal data to be processed. The common approach in dealing with these issues is to introduce constraints and/or simplifications on both the spatial component of the data and on the employed algorithms, leading to results that are somehow limited. To overcome these issues, in this paper we report on our experiences and our approaches in providing a solution that meets industrial needs with the aim to leverage the computational and storage capabilities of the Cloud to handle massive dataset for providing vehicular traffic predictions. In particular, we present an approach to deal with real-world datasets to facilitate the knowledge discovery process from this data while matching the business constraints given by the industrial use case.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Memory Consumption and Execution Performance of the cuFFT Library","authors":"J. L. Jodrá, Ibai Gurrutxaga, J. Muguerza","doi":"10.1109/3PGCIC.2015.66","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.66","url":null,"abstract":"The Fast Fourier Transform (FFT) is an essential primitive that has been applied in various fields of science and engineering. In this paper, we present a study of the Nvidia's cuFFT library - a proprietary FFT implementation for Nvidia's Graphics Processing Units - to identify the impact that two configuration parameters have in its execution. One useful feature of the cuFFT library is that it can be used to efficiently calculate several FFTs at once. In this work we analyse the effect this feature has on memory consumption and execution time in order to find a useful trade-off. Another important feature of the library is that it supports sophisticated input and output data layouts. This feature allows, for instance, to perform multidimensional FFT decomposition with no need of data transpositions. We have identified some patterns which may help to decide the parameters and values that are the key for achieving increased performance in a FFT calculation. We believe that this study will help researchers who wish to use the cuFFT library to decide what parameters values are best suited to achieve higher performance in their execution, both in time and memory consumption.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}