Proceedings of the Third Central European Cybersecurity Conference最新文献

筛选
英文 中文
Cybercrime victimization and seeking help: A survey of students in Slovenia 网络犯罪受害和寻求帮助:斯洛文尼亚学生的调查
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360731
Kaja Prislan, Igor Bernik, Gorazd Meško, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec
{"title":"Cybercrime victimization and seeking help: A survey of students in Slovenia","authors":"Kaja Prislan, Igor Bernik, Gorazd Meško, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec","doi":"10.1145/3360664.3360731","DOIUrl":"https://doi.org/10.1145/3360664.3360731","url":null,"abstract":"Most cyberspace users fell victim to some cybercrime. This poster reports on a survey of students conducted to provide an overview of cybercrime victimization and related help-seeking behaviors. The results suggest that unwelcome private messages with sexual content or requests, infections with a virus, unauthorized access to online accounts, and offensive and hostile messages were most common cybercrimes. Respondents would most often turn to their friends, the police, and family members for help.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does 比特币的采用:诈骗和匿名可能并不重要,但对比特币安全性的信任至关重要
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360679
Aleksander Murko, Simon L. R. Vrhovec
{"title":"Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does","authors":"Aleksander Murko, Simon L. R. Vrhovec","doi":"10.1145/3360664.3360679","DOIUrl":"https://doi.org/10.1145/3360664.3360679","url":null,"abstract":"Bitcoin is the most successful cryptocurrency with more than half of the market capitalization of all more than 2,000 currently existing cryptocurrencies. In recent years, there have been several high-profile hacks and scams that resulted in billions of stolen funds. In this paper, we focus on the impact of Bitcoin cybersecurity and privacy characteristics on its adoption. A survey (N = 152) has been conducted among users and non-users of Bitcoin in Slovenia to test the proposed research model. The results suggest that in addition to known factors (i.e., usefulness, ease of use and subjective norm) trust into Bitcoin security also influences Bitcoin adoption. The results however show no support for the influence of perceived threat of Bitcoin scams or Bitcoin anonymity on Bitcoin adoption.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing 将威胁建模和自动化测试用例生成集成到工业化软件安全测试中
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3362698
Stefan Marksteiner, R. Ramler, Hannes Sochor
{"title":"Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing","authors":"Stefan Marksteiner, R. Ramler, Hannes Sochor","doi":"10.1145/3360664.3362698","DOIUrl":"https://doi.org/10.1145/3360664.3362698","url":null,"abstract":"Industrial Internet of Things (IIoT) application provide a whole new set of possibilities to drive efficiency of industrial production forward. However, with the higher degree of integration among systems, comes a plethora of new threats to the latter, as they are not yet designed to be broadly reachable and interoperable. To mitigate these vast amount of new threats, systematic and automated test methods are necessary. This comprehensiveness can be achieved by thorough threat modeling. In order to automate security test, we present an approach to automate the testing process from threat modeling onward, closing the gap between threat modeling and automated test case generation.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? 数字取证与正当程序:相互冲突的标准还是互补的方法?
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3362697
U. Ewald
{"title":"Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches?","authors":"U. Ewald","doi":"10.1145/3360664.3362697","DOIUrl":"https://doi.org/10.1145/3360664.3362697","url":null,"abstract":"Cybersecurity and digital forensics are closely related to current and even more to future criminal proceedings due to the fact that digital evidence is more and more dominating the body of evidence in criminal trials. It is also fair to say that digital forensics to a large extent performs in cybersecurity as a production of digital evidence. Not only in cybercrime but also in ordinary crimes like car theft, drug related crimes and forms of traditional organized crimes judicial decision-making and reasoning at trials and finally in judgments are more and more based on references to digital traces and data which are provided by forensic IT experts as exhibits. At the first glance providing digital data as evidence to criminal courts appears to be a straightforward more technical process. This paper claims that turning digital traces into digital evidence is anything but a simple and linear technical process just having to respect state-of-the-art technical standards and following rules for the chain of custody. Instead it will demonstrate that digital forensics is one part in a more complex social construction process where standards and methods of IT forensics of the 21st century meet evidentiary procedural rules in criminal justice of the 19th century, hence applied by a judiciary of the 20th century. This state of asynchrony leads to basic conflicts between digital forensics on the one side, rule of law, to process and fair trial on the other. The paper will reflect upon the central question if and how this conflict between digital forensics and traditional due process in the transition from analog to digital evidence in criminal justice proceedings can be turned into an integrated and complementary approach for the final sake of justice and security in the society. While the current situation is leading to a gap between data and judicial decision (digital divide), new standards for producing procedural truth in a comprehensible data-to-decision-cycle covering both the forensic acquisition, preparation and analysis at the pretrial stage, as well as presenting, testing (verifying/falsifying) and interpreting digital evidence at trial by judges, prosecutors and defense attorneys. Only if both sides, the forensic and judicial, are in balance the digital divide in today's criminal justice practice will fade away. Firstly, the paper will outline a conceptual view on the challenges electronic evidence based on digital code and machine language poses to a traditional judicial method of communicating evidentiary information relying on natural language and unstructured narratives in direct personal communication during trial which inevitably will lead to a paradigm shift in the judicial hermeneutic method. Criminal proceedings and judgments as their outcome are traditionally based on enlightenment principles of oral and direct communication in public hearings, hence human language and narrative is the crucial medium of communication and understanding d","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Consistency of Software Updates against Strong Attackers 实现针对强大攻击者的软件更新一致性
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360670
Lamya Abdullah, S. Hahn, F. Freiling
{"title":"Achieving Consistency of Software Updates against Strong Attackers","authors":"Lamya Abdullah, S. Hahn, F. Freiling","doi":"10.1145/3360664.3360670","DOIUrl":"https://doi.org/10.1145/3360664.3360670","url":null,"abstract":"Update systems regularly distribute updates for installed software to end users. Problems arise when the update system is misused and malicious updates are sent to a small set of users only. Such situations can occur if the software supplier has been successfully attacked or is coerced by government agencies to distribute handcrafted updates containing promiscuous functionality like backdoors. In this paper, we define a set of general security requirements for update systems that encompass protection against malicious updates. We then introduce the design of an update system that satisfies the requirements and present an implementation as an extension to the advanced package tool (APT) for the Debian OS. We evaluate the strengths and weaknesses of the system and discuss its large-scale applicability with respect to security and performance overhead.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks OPC UA网络中不可信客户端攻击的模拟与检测
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360675
C. V. Neu, Ina Schiering, A. Zorzo
{"title":"Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks","authors":"C. V. Neu, Ina Schiering, A. Zorzo","doi":"10.1145/3360664.3360675","DOIUrl":"https://doi.org/10.1145/3360664.3360675","url":null,"abstract":"The usage of machine to machine communication and Industrial Internet of Things is increasing nowadays, in particular in industry environments. Devices with low hardware capabilities may e.g. be used for sensing data, for example, on an industrial network. Specific protocols and frameworks were being developed for these use cases. One such framework is OPC UA, which allows signed and encrypted communication and therefore addresses already important security requirements. However, an attacker may also be able to encrypt malicious packets so that it may bypass security systems and/or empower the attack, as encrypted packets typically need more hardware consumption to be handled. In this paper the focus is on Denial of Service attacks in OPC UA networks. An analysis of possible Denial of Service attacks is presented and an approach to detect such attacks is implemented in the context of a simulation scenario. Our evaluations show how such attacks may affect server CPU consumption and could be very powerful when a large number of devices is compromised.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology 从假新闻到虚拟现实:现代科技时代的假新闻和数字操纵
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3361145
Tal Pavel
{"title":"From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology","authors":"Tal Pavel","doi":"10.1145/3360664.3361145","DOIUrl":"https://doi.org/10.1145/3360664.3361145","url":null,"abstract":"The cyberspace, the new and only man-made domain, presents a wide range of new advantages and challenges -- as well as risks to the end user, organizations, states and even humanity. Modern mankind is dependent completely on ICT, the internet and the cyberspace for daily operation and existence. The cyberspace has several unique features including the attribution problem, no meaning for boundaries, time, or threshold as an entry level for different malicious players to create potential diversity of damages. Disruption, or even shutdown of this dimension may be fatal and constitutes new means and weapons in the hands of various players, among them, non-state actors, such as terrorist organizations, cybercriminals and state actors, in a matter that cyber capabilities are seen as even a doomsday weapon. But the cyberspace can be the trigger to physical wars, criminal activities, social unrest, political changes. All created by not only by fake news but by creating new, alternative and manipulated reality. Fake news is \"a type of yellow journalism or propaganda that consists of deliberate disinformation or hoaxes spread via traditional print and broadcast news media or online social media\". Therefore, in the hands of a given nation, armed with motivation and online abilities, rumors and disinformation can be spread, in order to create distrust, nationalistic feelings among minorities, denying the government legitimacy, panic, havoc and mayhem. Those can create riots, uprising and revolt from the inside boundaries on one hand, as well as war with neighbouring states from the outside boundaries on the other hand. All those without the need of the perpetrator firing a single shot.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain 基于区块链的工业控制系统安全日志的可行性研究
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360668
Stefan Schorradt, Edita Bajramovic, F. Freiling
{"title":"On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain","authors":"Stefan Schorradt, Edita Bajramovic, F. Freiling","doi":"10.1145/3360664.3360668","DOIUrl":"https://doi.org/10.1145/3360664.3360668","url":null,"abstract":"With industrial control systems (ICSs) being increasingly networked, the need for sound forensic capabilities for such systems increases. One vital source of information in forensic investigation are log files. Techniques for secure logging aim to protect log files from manipulation. We investigate how a blockchain can enable secure logging for ICSs. We argue that a blockchain fits well both into general models of secure logging and into the Purdue model for ICSs. We report on experiences from connecting the syslog functionality of a Siemens SIMATIC S7-1500 programmable logic controller to the public Ethereum blockchain network. While the level of manipulation protection is comparably high, the transaction time for the public Ethereum blockchain severely limits the usefulness of this type of secure logging for ICSs.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets 符合GDPR移动接入网络数据集的嫌疑人回顾性跟踪
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360680
Louis Tajan, D. Westhoff
{"title":"Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets","authors":"Louis Tajan, D. Westhoff","doi":"10.1145/3360664.3360680","DOIUrl":"https://doi.org/10.1145/3360664.3360680","url":null,"abstract":"This work discusses several use cases of post-mortem mobile device tracking in which privacy is required e.g. due to client-confidentiality agreements and sensibility of data from government agencies as well as mobile telecommunication providers. We argue that our proposed Bloom filter based privacy approach is a valuable technical building block for the arising General Data Protection Regulation (GDPR) requirements in this area. In short, we apply a solution based on the Bloom filters data structure that allows a 3rd party to perform some privacy saving set relations on a mobile telco's access logfile or other mobile access logfile from harvesting parties without revealing any other mobile users in the proximity of a mobile base station but still allowing to track perpetrators.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic Investigations in Vehicle Data Stores 车辆数据仓库的法医调查
Proceedings of the Third Central European Cybersecurity Conference Pub Date : 2019-11-14 DOI: 10.1145/3360664.3360665
Nico Vinzenz, Tobias Eggendorfer
{"title":"Forensic Investigations in Vehicle Data Stores","authors":"Nico Vinzenz, Tobias Eggendorfer","doi":"10.1145/3360664.3360665","DOIUrl":"https://doi.org/10.1145/3360664.3360665","url":null,"abstract":"This research locates vehicle data stores and analyzes their forensic information value based on digital forensic principles. Four distinct data store types were located in this process -- airbag Event Data Recorder (EDR), Electronic Control Unit (ECU), Telematic Platform and Infotainment System. Based on the analysis of approximately 11,000 samples from vehicle crashes the airbag EDR is found useful for getting a high resolution short-term snapshot of a vehicle crash. The investigated telematic platform did not store any forensically valuable data by default. Nevertheless, with an architectural optimization, it could store data valuable for both post-crime and post-crash investigations.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133330167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信