DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...最新文献
{"title":"High-performance reverse converter design for the new four-moduli Set {22n, 2n+1, 2n/2+1, 2n/2-1}","authors":"S. Siao, M. Sheu, Shao-Yu Wang","doi":"10.1109/DESEC.2017.8073888","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073888","url":null,"abstract":"This paper presents a new four-moduli set {2<sup>2n</sup>, 2<sup>n</sup> +1, 2<sup>n/2</sup>+1, 2<sup>n/2</sup>-1} (where n is an even number) for meeting scale criteria. According to the new Chinese reminder theorem 1, the proposed moduli set can derive an efficient reverse conversion algorithm, and the converter architecture can then be designed. The proposed converter with a 32-bit width was implemented using the TSMC 90-nm complementary metal-oxide semiconductor process. The chip area is 980 × 920 μm<sup>2</sup> and the working frequency is 133 MHz. Savings of delay and power performance of more than 26.9% and 18.4%, respectively, are achieved using the proposed design.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"150 2","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91453530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure minimum weighted bipartite matching","authors":"B. Anandan, Chris Clifton","doi":"10.1109/DESEC.2017.8073798","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073798","url":null,"abstract":"Simple application of secure multi-party computation techniques on an algorithm is not sufficient to guarantee privacy, if the underlying algorithm is data dependent or if the output can leak information. The first issue can be addressed through data oblivious computation, the second through differential privacy. However, both can be difficult to achieve with graph algorithms. This paper addresses both problems, giving a differentially private data-oblivious protocol for minimum weighted bipartite matching and minimum vertex cover.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"133 3","pages":"60-67"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91467395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber attack and defense on industry control systems","authors":"Chih-Ta Lin, Sung-Lin Wu, Mei-Lin Lee","doi":"10.1109/DESEC.2017.8073874","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073874","url":null,"abstract":"Industry control systems (ICSs) are widely used in various critical infrastructure production facilities of the oil, water, and electricity industries. In the past, most of these ICSs lacked both authentication and encryption mechanisms, leaving them vulnerable to attack by hackers. By establishing an industry control system test bed, this paper examines two operational cases, viz. water level control and air pollution control, and develops for them a Modbus/TCP network attack program, and an associated intrusion detection system (IDS). Through in-depth analysis of the Modbus ICS protocol, an automatic-learning based method of malicious intrusion detection is proposed, with which a variety of tests are conducted on the developed testbed. The results show that this method can effectively detect various kinds of network attacks.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"530 1","pages":"524-526"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79642313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juinn-Horng Deng, Pin-Nien Chen, Chia-Fang Lee, Yuan-Feng Chan, Yen Lin
{"title":"SDR measurement platform design for FMCW RADAR performance verification","authors":"Juinn-Horng Deng, Pin-Nien Chen, Chia-Fang Lee, Yuan-Feng Chan, Yen Lin","doi":"10.1109/DESEC.2017.8073869","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073869","url":null,"abstract":"The frequency modulation continuous wave (FMCW) radar algorithms are proposed for the software-defined-radio (SDR) platform to verify the range and speed estimation of the target. The measurement platform can provide the RF imperfection and the multipath channel effects to test the FMCW algorithms. Based on the measurement results via SDR instruments and RF components, it is confirmed that the FMCW algorithm can provide the reliable performance over the RF and channel effect environments.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"255 1","pages":"477-478"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89599595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive image encryption for high capacity reversible data hiding","authors":"Ka-Cheng Choi, Chi-Man Pun","doi":"10.1109/DESEC.2017.8073862","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073862","url":null,"abstract":"In this paper, an adaptive image encryption method which achieves high capacity reversible data hiding is proposed. In the proposed encryption method, Burrow's-wheeler transform was applied before encrypting the given image. The resultant encrypted images are comparatively smoother and have higher spatial correlation, which allow high embedding rates. To preserve good visual quality for the approximate image obtained from direct decryption without watermark extraction, data hiding process are carried out block by block within the encrypted image and sorted-variance block embedding is adopted in watermark embedding procedure. In the experimental results, the reversibility of the proposed method is verified, and in comparison with state-of-the-art methods, a higher maximum embedding rate is obtained in the proposed method.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"197 1","pages":"429-432"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76955802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Al-Rubaie, Pei-Yuan Wu, J. M. Chang, S. Kung
{"title":"Privacy-preserving PCA on horizontally-partitioned data","authors":"Mohammad Al-Rubaie, Pei-Yuan Wu, J. M. Chang, S. Kung","doi":"10.1109/DESEC.2017.8073817","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073817","url":null,"abstract":"Private data is used on daily basis by a variety of applications where machine learning algorithms predict our shopping patterns and movie preferences among other things. Principal component analysis (PCA) is a widely used method to reduce the dimensionality of data. Reducing the data dimension is essential for data visualization, preventing overfitting and resisting reconstruction attacks. In this paper, we propose methods that would enable the PCA computation to be performed on horizontally-partitioned data among multiple data owners without requiring them to stay online for the execution of the protocol. To address this problem, we propose a new protocol for computing the total scatter matrix using additive homomorphic encryption, and performing the Eigen decomposition using Garbled circuits. Our hybrid protocol does not reveal any of the data owner's input; thus protecting their privacy. We implemented our protocols using Java and Obliv-C, and conducted experiments using public datasets. We show that our protocols are efficient, and preserve the privacy while maintaining the accuracy.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"88 1","pages":"280-287"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79695643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A configurable H.265-compatible motion estimation accelerator architecture for realtime 4K video encoding in 65 nm CMOS","authors":"Michael Braly, Aaron Stillmaker, B. Baas","doi":"10.1109/DESEC.2017.8073837","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073837","url":null,"abstract":"The design for a configurable motion estimation accelerator is presented and demonstrated as suitable for realtime digital 4K as well as H.265/HEVC. The design has two 4-KB frame memories necessary to hold the active and reference frames, designed using a standard cell memory technique, with line-based pixel write, and block-based pixel accesses. It computes a 16 pixel sum of absolute differences (SAD)s per cycle, in a 4 × 4 block, and is pipelined to take advantage of the high throughput block pixel memories. The architecture supports configurable search patterns and threshold-based early termination which allow for run-time tradeoffs to be made between pixel throughput and final quality of result. CMEACC is independently clocked and can operate up to 812 MHz at 1.3 V in 65 nm CMOS, achieving a throughput of 105 MPixel/sec for a single instance while consuming 0.933 pJ × sec/Pixel, and occupying approximately 1.04 mm2 post place-and-route in 65 nm CMOS. While operating at 0.9 V, the presented design consumes 0.393 nJ/Pixel, which scales to 8.06 mW at 22.26 FPS in 720p.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"50 1","pages":"79-85"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85488837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN data path confidence analysis","authors":"J. A. Alcorn, S. Melton, C. E. Chow","doi":"10.1109/DESEC.2017.8073809","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073809","url":null,"abstract":"The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in remediation costs and losses every year. The 2013 data breach at Target, Inc. that impacted 70 million customers is estimated to cost upwards of 1 billion dollars. Stolen information is also being used to damage political figures and adversely influence foreign and domestic policy. In this paper, we offer some techniques for better understanding the health and security of our networks. This understanding will help professionals to identify network behavior, anomalies and other latent, systematic issues in their networks. Software-Defined Networks (SDN) enable the collection of network operation and configuration metrics that are not readily available, if available at all, in traditional networks. SDN also enables the development of software protocols and tools that increases visibility into the network. By accumulating and analyzing a time series data repository (TSDR) of SDN and traditional metrics along with data gathered from our tools we can establish behavior and security patterns for SDN and SDN hybrid networks. Our research helps provide a framework for a range of techniques for administrators and automated system protection services that give insight into the health and security of the network. To narrow the scope of our research, this paper focuses on a subset of those techniques as they apply to the confidence analysis of a specific network path at the time of use or inspection. This confidence analysis allows users, administrators and autonomous systems to decide whether a network path is secure enough for sending their sensitive information. Our testing shows that malicious activity can be identified quickly as a single metric indicator and consistently within a multi-factor indicator analysis. Our research includes the implementation of these techniques in a network path confidence analysis service, called Confidence Assessment as a Service. Using our behavior and security patterns, this service evaluates a specific network path and provides a confidence score for that path before, during and after the transmission of sensitive data. Our research and tools give administrators and autonomous systems a much better understanding of the internal operation and configuration of their networks. Our framework will also provide other services that will focus on detecting latent, systemic network problems. By providing a better understanding of network configuration and operation our research enables a more secure and dependable network and helps prevent the theft of information by malicious actors.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"8 1","pages":"209-216"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82456056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated identity hybrid cloud security considerations supporting first responders","authors":"Randy Garcia","doi":"10.1109/DESEC.2017.8073819","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073819","url":null,"abstract":"Propose an architecture and policy approach to implement federated identity hybrid cloud enabling first responders. These continue to suffer lack of trusted and secure information sharing. The focus is on the architecture and methodology for federating identity to enable rapid response. The outcome drives successful outcomes in disaster response.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"140 1","pages":"326-333"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87739702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN On-The-Go (OTG) physical testbed","authors":"J. A. Alcorn, S. Melton, C. E. Chow","doi":"10.1109/DESEC.2017.8073808","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073808","url":null,"abstract":"An emerging field of research, Software Defined Networks (SDN) promises to change the landscape of traditional network topology and management. Researchers and early adopters alike need adequate SDN testing facilities for their experiments but their options are limited. Industry is responding slowly with embedded support for SDN in their enterprise grade network hardware but it is cost prohibitive for many test environments with a single SDN switch costing thousands of dollars. There are a few emerging community SDN test networks that are fantastic for testing large topologies with production grade traffic but there is a cost associated with membership and some controlled experiments are difficult. A free and indispensible alternative to a dedicated hardware SDN is to use network emulation tools. These software tools are widely used and invaluable to SDN research. They provide an amazingly precise representation of physical network nodes and behavior but are inherently limited by their aggregation with other virtual devices on the same compute node. Some of our research requires a higher precision than software emulation can provide. Our solution is to build a low cost, portable, standalone SDN testbed. Called SDN On-The-Go (OTG), it is a complete, self-contained testbed that consists of four dedicated ZodiacFX SDN switches, four RaspberryPi3 hosts, a dedicated Kangaroo+ controller with 4GB RAM and a couple of routers to form the network isolation. The testbed supports many configurations for pseudo real-world SDN experiments that produce reliable and repeatable results. It can be used as a standalone research tool or as part of a larger network with production quality traffic. SDN OTG is designed to be used as a portable teaching device, moved from classroom to classroom or taken home for private research. We achieved our repeatability factor of an order of magnitude greater than emulation based testing. Our SDN OTG physical testbed weighs only twenty pounds, costs about a thousand US dollars, provides repeatable, precise time sensitive data and can be setup as a fully functional SDN testbed in a matter of minutes.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"18 1","pages":"202-208"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87484061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}