2020 IEEE Security and Privacy Workshops (SPW)最新文献

筛选
英文 中文
Automated Decision Systems for Cybersecurity and Infrastructure Security 网络安全和基础设施安全的自动决策系统
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00048
L. Chamberlain, Lauren Davis, M. Stanley, Brian Gattoni
{"title":"Automated Decision Systems for Cybersecurity and Infrastructure Security","authors":"L. Chamberlain, Lauren Davis, M. Stanley, Brian Gattoni","doi":"10.1109/SPW50608.2020.00048","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00048","url":null,"abstract":"This paper describes and discusses the impact of using automated decision systems (ADS), or decision automation, on the spectrum from decision support systems (DSS), where a human makes decisions based on analytics generated by the system, to intelligent decision systems based on analytics performed by Artificial Intelligence (AI) and Machine Learning (ML), and further, to fully autonomous intelligent decision systems, where a machine independently makes decisions based on its AI and ML capabilities. Specifically, we examine the use of decision automation in cybersecurity and infrastructure security and present a methodology for determining which decisions should be automated and at which level of autonomy.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks Against LipNet: End-to-End Sentence Level Lipreading 对LipNet的对抗性攻击:端到端句子级唇读
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00020
Mahir Jethanandani, Derek Tang
{"title":"Adversarial Attacks Against LipNet: End-to-End Sentence Level Lipreading","authors":"Mahir Jethanandani, Derek Tang","doi":"10.1109/SPW50608.2020.00020","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00020","url":null,"abstract":"Visual adversarial attacks inspired by Carlini-Wagner targeted audiovisual attacks can fool the state-of-the-art Google DeepMind LipNet model to subtitle anything with over 99% similarity. We explore several methods of visual adversarial attacks, including the vanilla fast gradient sign method (FGSM), the $L_{infty}$ iterative fast gradient sign method, and the $L_{2}$ modified Carlini-Wagner attacks. The feasibility of these attacks raise privacy and false information threats, as video transcriptions are used to recommend and inform people worldwide and on social media.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115145842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Title Page 标题页
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/spw50608.2020.00001
{"title":"Title Page","authors":"","doi":"10.1109/spw50608.2020.00001","DOIUrl":"https://doi.org/10.1109/spw50608.2020.00001","url":null,"abstract":"","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"78 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133323117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Sixth IEEE Workshop on Language-Theoretic Security (LangSec 2020) 第六届IEEE语言理论安全研讨会(LangSec 2020)
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/spw50608.2020.00016
{"title":"The Sixth IEEE Workshop on Language-Theoretic Security (LangSec 2020)","authors":"","doi":"10.1109/spw50608.2020.00016","DOIUrl":"https://doi.org/10.1109/spw50608.2020.00016","url":null,"abstract":"","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge 自主物联网系统安全能力:将物联网保障推向边缘
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00058
Jeffrey S. Chavis, A. Buczak, Aaron Kunz, A. Rubin, Lanier A Watkins
{"title":"A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge","authors":"Jeffrey S. Chavis, A. Buczak, Aaron Kunz, A. Rubin, Lanier A Watkins","doi":"10.1109/SPW50608.2020.00058","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00058","url":null,"abstract":"Complex systems of IoT devices (SIoTD) are systems that have a single purpose but are made up of multiple IoT devices. These systems are becoming ubiquitous, have complex security requirements, and face a diverse and ever-changing array of cyber threats. Issues of privacy and bandwidth will preclude sending all the data from these systems to a central place, and so these systems cannot totally rely on a centralized cloud-based service for their security. The security of these systems must be provided locally and in an autonomous fashion. In this paper, we describe a capability to address this problem, explain specifications for the system, present our work on SIoTD assurance, and show initial results of a novel edge-based application of machine learning to build this capability.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workshop on the Internet of Safe Things (SafeThings 2020) 安全物联网研讨会(SafeThings 2020)
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/spw50608.2020.00010
{"title":"Workshop on the Internet of Safe Things (SafeThings 2020)","authors":"","doi":"10.1109/spw50608.2020.00010","DOIUrl":"https://doi.org/10.1109/spw50608.2020.00010","url":null,"abstract":"","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning 识别无处不在的第三方库编译可执行文件使用注释和翻译反汇编代码与监督机器学习
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00042
Jedediah Haile, S. Havens
{"title":"Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning","authors":"Jedediah Haile, S. Havens","doi":"10.1109/SPW50608.2020.00042","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00042","url":null,"abstract":"The size and complexity of the software ecosystem is a major challenge for vendors, asset owners and cybersecurity professionals who need to understand the security posture of these systems. Annotated and Translated Disassembled Code is a graph based datastore designed to organize firmware and software analysis data across builds, packages and systems, providing a highly scalable platform enabling automated binary software analysis tasks including corpora construction and storage for machine learning. This paper describes an approach for the identification of ubiquitous third-party libraries in firmware and software using Annotated and Translated Disassembled Code and supervised machine learning. Annotated and Translated Disassembled Code provide matched libraries, function names and addresses of previously unidentified code in software as it is being automatically analyzed. This data can be ingested by other software analysis tools to improve accuracy and save time. Defenders can add the identified libraries to their vulnerability searches and add effective detection and mitigation into their operating environment.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and Wax 研究报告:ICARUS:通过羽毛和蜡的方式理解事实格式
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00067
Sam Cowger, Yerim Lee, Nichole Schimanski, Mark Tullsen, Walter Woods, Richard Jones, E. W. Davis, William Harris, Trent Brunson, Carson Harmon, Bradford Larsen, E. Sultanik
{"title":"Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and Wax","authors":"Sam Cowger, Yerim Lee, Nichole Schimanski, Mark Tullsen, Walter Woods, Richard Jones, E. W. Davis, William Harris, Trent Brunson, Carson Harmon, Bradford Larsen, E. Sultanik","doi":"10.1109/SPW50608.2020.00067","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00067","url":null,"abstract":"When $a$ data format achieves a significant level of adoption, the presence of multiple format implementations expands the original specification in often-unforeseen ways. This results in an implicitly defined, de facto format, which can create vulnerabilities in programs handling the associated data files. In this paper we present our initial work on ICARUS: a toolchain for dealing with the problem of understanding and hardening de facto file formats. We show the results of our work in progress in the following areas: labeling and categorizing a corpora of data format samples to understand accepted variations of a format; the detection of sublanguages within the de facto format using both entropy- and taint-tracking-based methods, as a means of breaking down the larger problem of learning how the grammar has evolved; grammar inference via reinforcement learning, as a means of tying together the learned sublanguages; and the defining of both safe subsets of the de facto grammar, as well as translations from unsafe regions of the de facto grammar into safe regions. Real-world data formats evolve as they find use in real-world applications, and a comprehensive ICARUS toolchain for understanding and hardening the resulting de facto formats can identify and address security risks arising from this evolution.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems 基于非合作博弈的自治系统网络安全模型
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00049
Farhat Jahan, Weiqing Sun, Quamar Niyaz
{"title":"A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems","authors":"Farhat Jahan, Weiqing Sun, Quamar Niyaz","doi":"10.1109/SPW50608.2020.00049","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00049","url":null,"abstract":"Autonomous systems (AS) would soon revolutionize the way we live and work. The days are not so far when these systems, from delivery drones to driverless cars, would be seen around us. These systems are connected and rely heavily on the communication network for the information exchange, hence prone to several attacks. Human lives will be at risk if these systems are compromised. Cybersecurity modeling and attack analysis of AS needs the utmost attention of the research community. Primarily, a typical AS has three modules - perception, cognition, and control - and each one of them comes with their own vulnerabilities. In this work, we propose a new AS architecture that may prove useful in AS cybersecurity modeling. We also model the attacks on them, and defense mechanisms applied to these modules using a non-cooperative non-zero sum game. Finally, we solve this game to obtain optimal strategies to maintain a secure system state.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks RTA3:递归神经网络的实时对抗性攻击
2020 IEEE Security and Privacy Workshops (SPW) Pub Date : 2020-05-01 DOI: 10.1109/SPW50608.2020.00022
Chris R. Serrano, Pape Sylla, Sicun Gao, Michael A. Warren
{"title":"RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks","authors":"Chris R. Serrano, Pape Sylla, Sicun Gao, Michael A. Warren","doi":"10.1109/SPW50608.2020.00022","DOIUrl":"https://doi.org/10.1109/SPW50608.2020.00022","url":null,"abstract":"Recurrent neural networks are widely used in machine learning systems that process time series data including health monitoring, object tracking in video, and automatic speech recognition (ASR). While much work has been done demonstrating the vulnerability of deep neural networks to socalled adversarial perturbations, the majority of this work has focused on convolutional neural networks that process non-sequential data for tasks like image recognition. We propose that the unique memory and parameter sharing properties of recurrent neural networks make them susceptible to periodic adversarial perturbations that can exploit these unique features. In this paper, we demonstrate a general application of deep reinforcement learning to the generation of periodic adversarial perturbations in a black-box approach to attack recurrent neural networks processing sequential data. We successfully learn an attack policy to generate adversarial perturbations against the DeepSpeech ASR system and further demonstrate that this attack policy generalizes to a set of unseen examples in real time.","PeriodicalId":413600,"journal":{"name":"2020 IEEE Security and Privacy Workshops (SPW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信