the proceedings contain 155 papers. the topics discussed include: an android application patching pipeline based on generic changesets;Nakula: coercion resistant data storage against time-limited adversary;automated s...
ISBN:
(纸本)9798400707728
the proceedings contain 155 papers. the topics discussed include: an android application patching pipeline based on generic changesets;Nakula: coercion resistant data storage against time-limited adversary;automated side-channel attacks using black-box neural architecture search;canary in twitter mine: collecting phishing reports from experts and non-experts;actions speak louder than passwords: dynamic identity for machine-to-machine communication;mitigating intersection attacks in anonymous microblogging;a hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes;adoption of information security practices in large-scale agile software development: a case study in the finance industry;universal remote attestation for cloud and edge platforms;rogue key and impersonation attacks on FIDO2: from theory to practice;real-time defensive strategy selection via deep reinforcement learning;and characterizing the MasterPrint threat on android devices with capacitive sensors.
In today's industrial operations, the widespread application of digital technology has made industrial datasecurity an increasingly important focus. Industrial data encompasses vital information in key areas such...
详细信息
Aids remote monitoring system is an important way to aids maintenance, which plays an important role of improving the maintenance quality of the aids. the communication effect would affect the management level of aids...
详细信息
Dedicated computational devices such as HSMs and FPGAs are frequently used to provide datasecurity and privacy. However, these options have several drawbacks, particularly when considering IoT environments. HSMs offe...
详细信息
ISBN:
(纸本)9781450393386
Dedicated computational devices such as HSMs and FPGAs are frequently used to provide datasecurity and privacy. However, these options have several drawbacks, particularly when considering IoT environments. HSMs offer high-grade services but are costly and lack application flexibility, while FPGAs, in general, are cheaper and adaptable, but lack security services and protection. Herein, the SmartFusion2 SoC FPGA, a security-oriented system, is evaluated as a possible low-cost and flexible platform for security modules for the IoT. this work analyzes the several security services of the SmartFusion2 SoC, their advantages, and possible trade-offs. To demonstrate the SoC viability as a security module and/or a more adaptable HSM alternative, several case study applications are considered and analyzed to elaborate on the potential, limitations, and mitigations of the latter.
Cybersecurity situational awareness technology holds paramount significance within the network environment of power monitoring systems. It serves to promptly detect and address various network threats, thereby safegua...
详细信息
the fifth-generation(5G) cellular network is entering an era of rapid development. Not only is 5G supposed to be fast, it also offers enhanced security based on 5G security specifications developed by the 3rd Generati...
详细信息
ISBN:
(纸本)9781450392167
the fifth-generation(5G) cellular network is entering an era of rapid development. Not only is 5G supposed to be fast, it also offers enhanced security based on 5G security specifications developed by the 3rd Generation Partnership Project (3GPP). However, little is known about 5G security in real world deployment. this paper analyzes 5G security features and measures their implementation in commercial 5G networks. By collecting and analyzing signaling messages between a cell phone and several commercial 5G networks, we measured multiple aspects of 5G security in real world deployment including, crypto algorithms used in the control plane, user plane (UP) security activation, subscriber identifier protection, and initial None-Access Stratum(NAS) message protection. We evaluated the compliance of commercial 5G networks with5G security specifications. the results show that major discrepancy exists between 5G security standards and real world deployment, especially in the areas of UP protection and subscriber identifier protection. therefore, well-known security risks, such as user data leakage, location exposure and Denial-of-Service(DoS) attacks, still apply to 5G commercial networks.
the proceedings contain 9 papers. the special focus in this conference is on Emerging Technologies for Authorization and Authentication. the topics include: User Authentication on Headset-Like Devices by Bio...
ISBN:
(纸本)9783031254666
the proceedings contain 9 papers. the special focus in this conference is on Emerging Technologies for Authorization and Authentication. the topics include: User Authentication on Headset-Like Devices by Bioacoustic Signals;the Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames;Protecting FIDO Extensions Against Man-in-the-Middle Attacks;authentication, Authorization, and Selective Disclosure for IoT data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs;privacy-Preserving Speaker Verification and Speech Recognition;an E-Voting System Based on Tornado Cash;linking Contexts from Distinct data Sources in Zero Trust Federation.
In recent years, there has been a growing interest in the field of Big datathanks to its benefits, such as cost optimization, improved efficiency, and potential risks identification. Big data has become a widely expl...
详细信息
this paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input user data and models in machine learning inference applications. Withthe proposed secure computat...
详细信息
ISBN:
(纸本)9798350393545
this paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input user data and models in machine learning inference applications. Withthe proposed secure computation protocol, algorithm evaluation can be performed distributively on honest-but-curious user computers while keeping the algorithm secure. To achieve this, we combine conventional logic locking for untrusted foundries with TFHE to enable secure computation. By encrypting the logic locking key using TFHE, the key is secured withthe degree of TFHE. We implemented the proposed secure protocols for combinational logic neural networks and decision trees using LUT-based obfuscation. Regarding the security analysis, we subjected them to the SAT attack and evaluated their resistance based on the execution time. We successfully configured the proposed secure protocol to be resistant to the SAT attack in all machine learning benchmarks. Also, the experimental result shows that the proposed secure computation involved almost no TFHE runtime overhead in a test case withthousands of gates.
Withthe rapid development of artificial intelligence technology, intelligent question answering systems have shown great potential in various fields. the public security question and answer system is an important app...
详细信息
暂无评论