DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...最新文献

筛选
英文 中文
Secure location tracking of femtocells in heterogeneous cellular networks 异构蜂窝网络中飞蜂窝的安全位置跟踪
Shin-Ming Cheng, Yu-Jyun Wang, Ying Chen
{"title":"Secure location tracking of femtocells in heterogeneous cellular networks","authors":"Shin-Ming Cheng, Yu-Jyun Wang, Ying Chen","doi":"10.1109/DESEC.2017.8073815","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073815","url":null,"abstract":"To improve indoor coverage and network capacity, deploying low-power and small-coverage femtocells in the coverage of a macrocell as a two-tier heterogeneous network is regarded as the most promising approach. Since femtocells share the same licensed spectrum with a macrocell, severe cross-tier and intra-tier interference from concurrent transmissions is introduced, which causes performance degradation. Under the dense and massive deployment of femtocells, mitigating interference in dynamic and realtime fashions is challenging, particularly when macro-femto backhaul coordination is infeasible. One possible solution is that before the deployment, operator determines the static channels a femtocell at a particular location can exploit, which is regarded as network planning on femtocells. However, the owner of the femtocell might install or move it anywhere without the operator's awareness and permission for high-quality indoor transmission. Such misuse behaviors destruct the extensive planning and explicitly suggest the existence of femtocell positioning mechanism. This paper explores the recent innovations in user positioning, Observed Time Difference of Arrival and verifiable multilateration, to design a secure femtocell location tracking scheme with the aid of macrocells. Performance evaluations show that considerable performance improvement can be achieved, and thus demonstrate the necessity of applying location tracking on planned femtocells for interference control.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"11 1","pages":"267-272"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82840261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining low-cost Inertial Measurement Unit (IMU) and deep learning algorithm for predicting vehicle attitude 结合低成本惯性测量单元(IMU)和深度学习算法预测车辆姿态
Jun-Ying Huang, Zhengyu Huang, KuanHung Chen
{"title":"Combining low-cost Inertial Measurement Unit (IMU) and deep learning algorithm for predicting vehicle attitude","authors":"Jun-Ying Huang, Zhengyu Huang, KuanHung Chen","doi":"10.1109/DESEC.2017.8073847","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073847","url":null,"abstract":"In the paper, we propose an acceleration-based and angular-velocity-based vehicle attitude recognition method by using a popular deep learning algorithm, i.e., Convolution Neural Network (CNN). We use an Inertial Measurement Unit (IMU) to collect six-axial signal of a vehicle. In particular, we construct a CNN model to learn the characteristics of six-axial IMU signal and the model can be used to predict vehicle attitudes. We constructed training data consists of 800 package from six attitudes. In addition, we preprocess the 800 package that each package will be broken down. Finally, our training data is 59200 sample-train. The experiment results show that the CNN works well, which can reach an average accuracy of 98% by the time of 1/5 of the overall action without any feature extraction methods. Because we use CNN model that it's the number of convolution kernel is less, we can reach real-time. Each estimated time is less than 0.5 sec based on the raspberry pi3.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"25 1","pages":"237-239"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89091936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellation 在任意逻辑电路中,通过噪声的插入和消除对模糊数据进行计算
Yu-Wei Lee, N. Touba
{"title":"Computing with obfuscated data in arbitrary logic circuits via noise insertion and cancellation","authors":"Yu-Wei Lee, N. Touba","doi":"10.1109/DESEC.2017.8073840","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073840","url":null,"abstract":"In secure computing, sensitive data must be kept private by protecting it from being obtained by an attacker. Existing techniques for computing with encrypted data are either prohibitively expensive (e.g., fully homomorphic encryption) or only work for special cases. (e.g., only for linear circuits). This paper presents a lightweight methodology for computing with noise-obfuscated data by carefully selecting internal locations for noise cancellation in arbitrary logic circuits. Noise is inserted in the data before computation and then partially cancelled during the computation and fully cancelled at the outputs. While the proposed methodology does not provide the level of strong encryption that fully homomorphic encryption would provide, it has the advantage of being lightweight, easy to implement, and can be deployed with relatively minimal performance impact. A key idea in the proposed approach is to reduce the complexity of the noise cancellation logic by carefully selecting internal locations to do local noise canceling. This is done in a way that prevents more than one input per gate from propagating noise thereby avoiding the complexity that arises from reconvergent noise propagation paths. One important application of the proposed scheme is for protecting data inside a computing unit obtained from a third party IP provider where a hidden backdoor access mechanism or hardware Trojan could be maliciously inserted. Experimental results show that noise can be propagated to outputs with overheads ranging from (13%–56%).","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"18 1","pages":"146-152"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82060854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deterministic microcode machine generation 确定性微码机生成
A. M'zah, B. Monsuez, H. Aboutaleb
{"title":"Deterministic microcode machine generation","authors":"A. M'zah, B. Monsuez, H. Aboutaleb","doi":"10.1109/DESEC.2017.8073858","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073858","url":null,"abstract":"Microcode is a technique that is used to implement internal state machine sequencing in different type of controllers addressing a large range of different applications. It can be used to reduce the functional as well as the internal complexity of a design. A challenge in using microcode based IP-design in IPs that are designed to be used in critical applications is to ensure that the microprogram (i.e. a sequence of microcode instructions) will execute correctly in a possible harsh environment. A lot of work has been published on automatic generation of microcode as well as on proving that microcode generation is correct. However, very little work has been done on ensuring that microcode executes correctly in a harsh environment. In this paper, we propose a new deterministic solution that generates for a given set of valid internal state machine sequences the microcode as well as the embedded verification mechanism that verifies on the fly that the execution of the microcode sequence is correct and that the sequence is a valid sequence.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"1 1","pages":"370-376"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76526349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K-binID: Kernel binary code identification for Virtual Machine Introspection K-binID:内核二进制代码识别的虚拟机自省
Yacine Hebbal, S. Laniepce, Jean-Marc Menaud
{"title":"K-binID: Kernel binary code identification for Virtual Machine Introspection","authors":"Yacine Hebbal, S. Laniepce, Jean-Marc Menaud","doi":"10.1109/DESEC.2017.8073801","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073801","url":null,"abstract":"Virtual Machine Introspection (VMI) techniques generally employ kernel symbols to obtain addresses of kernel data and functions of interest to monitor guest OS states and activities. However, employing kernel symbols in an Infrastructure as a Service (IaaS) cloud presumes perfect knowledge of what kernel version and customization is running in an introspected VM. Moreover, existing kernel fingerprinting techniques are limited in precision and usability due to insufficient coverage of kernel code. So they are not suitable for IaaS cloud. In this paper, we present K-binID, a set of new automatic and OS-independent techniques based on static binary code analysis that enables the hypervisor to precisely identify version and customization of VM main kernel binary code (among a set of known kernels). K-binID achieves this in black-box regardless of challenges presented by compiler optimizations and kernel base address randomization. We designed and implemented our prototype of K-binID on KVM hypervisor. K-binID evaluation on a variety of Linux kernel binary code versions shows that, in 1 to 5 seconds, K-binID identifies precisely both the kernel version and customization of all tested kernels.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"321 1","pages":"107-114"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80232542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
R2D2: Right place, right path data delivery R2D2:正确的位置,正确的路径数据传递
Ehab Ashary, C. E. Chow, Ashish Korpe, D. Thorpe
{"title":"R2D2: Right place, right path data delivery","authors":"Ehab Ashary, C. E. Chow, Ashish Korpe, D. Thorpe","doi":"10.1109/DESEC.2017.8073816","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073816","url":null,"abstract":"Data security can be enhanced by not only strong encryption techniques but also by restricting who can receive the data, as well as where and how they are received. In this paper, we focus on how to specify and verify where and how the data are received. The challenging issue here is how to utilize trustworthy 3rd party verification mechanisms to check whether a requester is in the designated area specified by the creator and whether the delivery follows a desired path. We call this new service Right Place, Right Path Data Delivery (R2D2). The current network and geolocation techniques are investigated for their capabilities in verifying and ensuring such R2D2 services. We created software tools to specify and verify such R2D2 services. We show that the verification of R2D2 services is quite challenging.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"46 1","pages":"273-279"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85467777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Source code transformation for software-based on-line error detection 基于软件的在线错误检测的源代码转换
Tsung-Yen Tsai, Jiun-Lang Huang
{"title":"Source code transformation for software-based on-line error detection","authors":"Tsung-Yen Tsai, Jiun-Lang Huang","doi":"10.1109/DESEC.2017.8073852","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073852","url":null,"abstract":"With the widespread deployment of ICs into safety-critical systems, ensuring in-field reliability for the expected IC life span becomes a serious challenge. One solution to improving reliability is software-based on-line error detection; the idea is to empower the application program to detect run-time errors which may be permanent, intermittent, or transient. In this paper, we propose a set of high-level source code transformation rules to facilitate software-based on-line error detection. Compared to previous works, the proposed source code transformation rules improve the coverage on flow control constructs and can handle structures as well as structure pointers. Experiments on singlebit error injection show that in average only 1.08% of faults that modify the program behavior are undetected.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"61 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91085933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel designated ownership transfer with grouping proof 具有组证明的新型指定所有权转移
W. Liew, Kuo-Yu Tsai, Jia-Ning Luo, Ming-Hour Yang
{"title":"Novel designated ownership transfer with grouping proof","authors":"W. Liew, Kuo-Yu Tsai, Jia-Ning Luo, Ming-Hour Yang","doi":"10.1109/DESEC.2017.8073863","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073863","url":null,"abstract":"It is critical to minimize the cargo theft during transport while ensuring the integrity of the entire cargo loads or to transfer the ownership of a tagged item to another owner in the supply chain management. However, no such protocol or mechanism is proposed to achieve both of the above requirements. In this paper, we propose novel designated ownership transfer with grouping proof, which simultaneously generates grouping proofs and authenticates the consistency between the receipt proof and pick proof while ensuring the ownership of the cargo is being transferred to the new designated owner in one attempt. In addition, our proposed scheme can have not only robustness against attacks (such as replay attacks, denial of service attacks, denial of proof etc.), but also security features (such as forward/backward secrecy and message integrity).","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"3 1","pages":"433-440"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83439505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enabling practical experimentation in cyber-security training 开展网络安全培训实践
Jian Mao, Zheng Leong Chua, Zhenkai Liang
{"title":"Enabling practical experimentation in cyber-security training","authors":"Jian Mao, Zheng Leong Chua, Zhenkai Liang","doi":"10.1109/DESEC.2017.8073870","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073870","url":null,"abstract":"Practical skills are critical requirements of cyber security professionals. Adding practical skill training in university curriculums not only better prepares students for their future career, it also deepen their understanding to knowledge. To support such trainings, we designed infrastructures and curriculums to support practical experimentation in cyber security training. In this paper, we share our experiences over the past five years in two universities.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"12 1","pages":"516-517"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88625936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Droidrevealer: Automatically detecting Mysterious Codes in Android applications Droidrevealer:自动检测Android应用程序中的神秘代码
Xinyin Zhang, Yuanye Cao, Mutian Yang, Jingzheng Wu, Tianyue Luo, Yueqin Liu
{"title":"Droidrevealer: Automatically detecting Mysterious Codes in Android applications","authors":"Xinyin Zhang, Yuanye Cao, Mutian Yang, Jingzheng Wu, Tianyue Luo, Yueqin Liu","doi":"10.1109/DESEC.2017.8073885","DOIUrl":"https://doi.org/10.1109/DESEC.2017.8073885","url":null,"abstract":"The state-of-the-art Android malware often encrypts or encodes malicious code snippets to evade malware detection. In this paper, such undetectable codes are called Mysterious Codes. To make such codes detectable, we design a system called Droidrevealer to automatically identify Mysterious Codes and then decode or decrypt them. The prototype of Droidrevealer is implemented and evaluated with 5,600 malwares. The results show that 257 samples contain the Mysterious Codes and 11,367 items are exposed. Furthermore, several sensitive behaviors hidden in the Mysterious Codes are disclosed by Droidrevealer.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"69 1","pages":"535-536"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89355805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信