With the increase in number of IoT devices day by day, a large amount of unstructured, structured and semi-structured data is being generated, collectively termed as big data. The amount of data stored and processed i...
详细信息
The proceedings contain 40 papers. The topics discussed include: black start scheme of wind-storage combined system based on virtual synchronous generator control;a left ventricle segmentation based on boundary weight...
ISBN:
(纸本)9798350310818
The proceedings contain 40 papers. The topics discussed include: black start scheme of wind-storage combined system based on virtual synchronous generator control;a left ventricle segmentation based on boundary weighted loss and residual feature aggregation;a natural language understanding model based on encoding fusion for power marketing indicator answering;a ship network security assessment model;adaptive large-scale multi-objective evolutionary optimization based on reference solution guidance;analysis of key influencing factors and optimization strategy for safety boundary of converter station;assessment of a multi-step lstm-based ensemble strategy for short-term grid modal parameters forecast;authenticity and uncertainty analysis of enterprise carbon verification data;black start scheme of wind-storage combined system based on virtual synchronous generator control;communication encryption scheme of 5G power trading private network based on dynamic key;and conducted electromagnetic disturbance prediction of electric power robot motor drive system.
In the age of digital transformation, cybersecurity becomes a crucial concern, forcing organisations to implement strong security measures to protect sensitive data and ensure operational integrity. This study examine...
详细信息
computer vision models based on deep neural networks are proven to be vulnerable to adversarial attacks. Robustness distillation, as a countermeasure, takes both robustness challenges and efficiency challenges of edge...
详细信息
With the introduction of post-quantum cryptography (PQC) algorithms, there are ongoing efforts to not only standardize the proposed solutions but also consider integrating them into existing network applications and e...
详细信息
Protection is critical for information, property, and even living beings. The usage of IoT and biometrics for security is becoming increasingly common as technology progresses. Facial recognition is widely accepted as...
详细信息
Single Sign-On (SSO)-based authentication protocols, like OpenID Connect (OIDC), play a crucial role in enhancing security and privacy in today's interconnected digital world, gaining widespread adoption among the...
详细信息
ISBN:
(纸本)9798400706363
Single Sign-On (SSO)-based authentication protocols, like OpenID Connect (OIDC), play a crucial role in enhancing security and privacy in today's interconnected digital world, gaining widespread adoption among the majority of prominent authentication service providers. These protocols establish a structured framework for verifying and authenticating the identities of individuals, organizations, and devices, while avoiding the necessity of sharing sensitive credentials (e.g., passwords) with external entities. However, the security guarantees of these protocols rely on their proper implementation, and real-world implementations can, and indeed often do, contain logical programming errors leading to severe attacks, including authentication bypass and user account takeover. In response to this challenge, we present AuthSaber, an automated verifier designed to assess the real-world OIDC protocol implementations against their standard safety specifications in a scalable manner. AuthSaber addresses the challenges of expressiveness for OIDC properties, modeling multi-party interactions, and automation by first designing a novel specification language based on linear temporal logic, leveraging an automaton-based approach to constrain the space of possible interactions between OIDC entities, and incorporating several domain-specific transformations to obtain programs and properties that can be directly reasoned about by software model checkers. We evaluate AuthSaber on the 15 most popular and widely used OIDC libraries and discover 16 previously unknown vulnerabilities, all of which are responsively disclosed to the developers. Five categories of these vulnerabilities also led to new CVEs.
Private payments in blockchain-based cryptocurrencies have been a topic of research, both academic and industrial, ever since the advent of Bitcoin. Stealth address payments were proposed as a solution to improve paym...
详细信息
ISBN:
(纸本)9798400700507
Private payments in blockchain-based cryptocurrencies have been a topic of research, both academic and industrial, ever since the advent of Bitcoin. Stealth address payments were proposed as a solution to improve payment privacy for users and are, in fact, deployed in several major cryptocurrencies today. The mechanism lets users receive payments so that none of these payments are linkable to each other or the recipient. Currently known stealth address mechanisms either (1) are insecure in certain reasonable adversarial models, (2) are inefficient in practice or (3) are incompatible with many existing currencies. In this work, we formalize the underlying cryptographic abstraction of this mechanism, namely, stealth signatures with formal game-based definitions. We show a surprising application of our notions to passwordless authentication defined in the Fast IDentity Online (FIDO) standard. We then present Spirit, the first efficient post-quantum secure stealth signature construction based on the NIST standardized signature and key-encapsulation schemes, Dilithium and Kyber. The basic form of Spirit is only secure in a weak security model, but we provide an efficiency-preserving and generic transform, which boosts the security of Spirit to guarantee the strongest security notion defined in this work. Compared to state-of-the-art, there is an approximately 800x improvement on the signature size while keeping signing and verification as efficient as 0.2 ms. We extend Spirit with a fuzzy tracking functionality where recipients can outsource the tracking of incoming transactions to a tracking server, satisfying an anonymity notion similar to that of fuzzy message detection (FMD) recently introduced in [CCS 2021]. We also extend Spirit with a new fuzzy tracking framework called scalable fuzzy tracking that we introduce in this work. This new framework can be considered as a dual of FMD, in that it reduces the tracking server's computational workload to sublinear in the nu
Today, Wireless medium-based communication carries lots of benefits to human life with various aspects like telecommunication, medical facilities, military, and many more. If communication is secure, then the impact o...
详细信息
IPSec protocol has been used to protect user plane transmission in the network layer of 5G mobile communication network. Compared to protocols in the transport layer or higher, IPSec must deal with issues of reliabili...
详细信息
暂无评论