IoT cloud platforms integrate streaming data generated by heterogeneous devices and also profoundly affected in many application domains. However, public clouds still be concerned about the datasecurity of their data...
详细信息
the proceedings contain 32 papers. the special focus in this conference is on security of Industrial Control Systems and of Cyber-Physical Systems. the topics include: privacy and Informational Self-determination thro...
ISBN:
(纸本)9783030954833
the proceedings contain 32 papers. the special focus in this conference is on security of Industrial Control Systems and of Cyber-Physical Systems. the topics include: privacy and Informational Self-determination through Informed Consent: the Way Forward;building a privacy Testbed: Use Cases and Design Considerations;assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems;TAESim: A Testbed for IoT security Analysis of Trigger-Action Environment;adversarial Command Detection Using Parallel Speech Recognition Systems;security Measuring System for IoT Devices;Battery Depletion Attacks on NB-IoT Devices Using Interference;security- and privacy-Aware IoT application Placement and User Assignment;room Identification with Personal Voice Assistants (Extended Abstract);a Cybersecurity Ontology to Support Risk Information Gathering in Cyber-Physical Systems;Why IT security Needs therapy;transferring Update Behavior from Smartphones to Smart Consumer Devices;organisational Contexts of Energy Cybersecurity;SMILE - Smart eMaIl Link Domain Extractor;a Semantic Model for Embracing privacy as Contextual Integrity in the Internet of things (Short Paper);data Protection Impact Assessments in Practice: Experiences from Case Studies;resilience Quantification for Critical Infrastructure: Exemplified for Airport Operations;severity Level Assessment from Semantically Fused Video Content Analysis for Physical threat Detection in Ground Segments of Space Systems;Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability;the Rise of ICS Malware: A Comparative Analysis;GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS;framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making;measuring the Impact of Tactical Denial of Sustainability;A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey data;integrated Design Framework for Facilitating Systems-theoretic Process Analysis;attack Path Analysis an
the proceedings contain 42 papers. the topics discussed include: a cyber security monitoring approach for low-voltage distributed generation control system using both network traffic data and side-channel information;...
ISBN:
(纸本)9798350320428
the proceedings contain 42 papers. the topics discussed include: a cyber security monitoring approach for low-voltage distributed generation control system using both network traffic data and side-channel information;TomoSAR imaging method for forested areas based on blind compressed sensing;development and application of non-contact voltage detector with metal cover for UHV DC;a flexible solar-blind ultraviolet photodetector based on carbon dots;performance study of flexible solar-blind ultraviolet photodetector;ship target detection framework based on non-image domain;bubble sheet multiple choice mobile checker with test grader using optical mark recognition (OMR) algorithm;and research on wireless charging system based on bilateral LCC.
In order to further improve the level of analysis and application of power marketing data, in this research, based on the emerging data mining technology, starting withthe overall architecture, several important comp...
详细信息
this study explores the application of a blockch-ain-based digital forensics architecture using the DIKW (data, Information, Knowledge, Wisdom) graph in police investigations. Current digital intelligence systems usua...
详细信息
Nowadays, Bitcoin is the most popular cryptocurrency. Withthe proliferation of smartphones and the high-speed mobile Internet, more and more users have started accessing their Bitcoin wallets on their smartphones. Us...
详细信息
ISBN:
(纸本)9781450381437
Nowadays, Bitcoin is the most popular cryptocurrency. Withthe proliferation of smartphones and the high-speed mobile Internet, more and more users have started accessing their Bitcoin wallets on their smartphones. Users can download and install a variety of Bitcoin wallet applications (e.g., Coinbase, Luno, Bitcoin Wallet) on their smartphones and access their Bitcoin wallets anytime and anywhere. However, it is still unknown whether these Bitcoin wallet smartphone applications are secure or if they are new attack surfaces for adversaries to attack these application users. In this work, we explored the insecurity of the 10 most popular Bitcoin wallet smartphone applications and discovered three security vulnerabilities. By exploiting them, adversaries can launch various attacks including Bitcoin deanonymization, reflection and amplification spamming, and wallet fraud attacks. To address the identified security vulnerabilities, we developed a phone-side Bitcoin security Rectifier to secure Bitcoin wallet smartphone application users. the developed rectifier does not require any modifications to current wallet applications and is compliant with Bitcoin standards.
Nowadays, software development must face the challenge of integrating security and privacy elements from the earliest stages of any software development process. A correct and complete implementation starting from the...
详细信息
ISBN:
(纸本)9781450389778
Nowadays, software development must face the challenge of integrating security and privacy elements from the earliest stages of any software development process. A correct and complete implementation starting from the requirements definition allows to significantly increase the security level of each single phase/iteration and consequently of the final system. therefore, it is necessary to support the team throughout the software lifecycle trying to provide operational guidelines of security by design and privacy by design. Taking these aspects into account, the paper presents a Human Centered Design (HCD) approach of security and privacy-oriented software development, integrated within the Scrum agile methodology, defined as HCD-security Scrum. the goal is to support developer decisions at all stages of software development in integrating security and privacy requirements through the formalization of key elements defined in a knowledge base, i.e., the privacy Knowledge Base.
作者:
Shashank SaroopCSE_ ASET
Amity University Gurugram India and CSE_ASET Amity University Gurugram India
In recent years, the increasing prevalence of digital transactions and data sharing has underscored the critical importance of privacy and security in the digital realm. Blockchain technology, initially designed to su...
详细信息
ISBN:
(纸本)9798400709418
In recent years, the increasing prevalence of digital transactions and data sharing has underscored the critical importance of privacy and security in the digital realm. Blockchain technology, initially designed to support cryptocurrencies like Bitcoin, has evolved into a versatile platform withthe potential to provide trust, transparency, and data immutability in a wide range of applications. Concurrently, zero-knowledge proofs have emerged as a pioneering approach to safeguarding dataprivacy, allowing parties to validate information without disclosing the underlying data. this review paper thoroughly investigates the convergence of blockchain technology and zero-knowledge proofs, aiming to understand how their synergy can foster privacy-preserving transactions. We examine the foundational principles of zero-knowledge proofs, their theoretical underpinnings, and practical implementation within blockchain networks. through a comprehensive analysis, we assess the effectiveness of this amalgamation in protecting sensitive data and consider its applicability to diverse use cases. this review provides a detailed exploration of the synergistic potential of blockchain and zero-knowledge proofs in reshaping the landscape of dataprivacy in an increasingly interconnected world.
Advanced metering infrastructure, along with home automation processes, is enabling more efficient and effective demand-side management opportunities for both consumers and utility companies. However, tight cyber-phys...
详细信息
ISBN:
(纸本)9781450381437
Advanced metering infrastructure, along with home automation processes, is enabling more efficient and effective demand-side management opportunities for both consumers and utility companies. However, tight cyber-physical integration also enables novel attack vectors for false data injection attacks (FDIA) as home automation/home energy management systems reside outside the utilities' control perimeter. Authentic users themselves can manipulate these systems without causing significant security breaches compared to traditional FDIAs. this work depicts a novel FDIA that exploits one of the commonly utilised distributed device scheduling architectures. We evaluate the attack impact using a realistic dataset to demonstrate that adversaries gain significant benefits, independently from the actual algorithm used for optimisation, as long as they have control over a sufficient amount of demand. Compared to traditional FDIAs, reliable security mechanisms such as proper authentication, security protocols, security controls or, sealed/controlled devices cannot prevent this new type of FDIA. thus, we propose a set of possible impact alleviation solutions to thwart this type of attack.
暂无评论