The extensive deployment of wireless networks in industrial settings has led to a surge in wireless-connected devices, presenting formidable security challenges. Traditional encryption approaches, relying on cryptogra...
The extensive deployment of wireless networks in industrial settings has led to a surge in wireless-connected devices, presenting formidable security challenges. Traditional encryption approaches, relying on cryptographic keys without binding to physical hardware details, are highly susceptible to cloning attacks when the keys are compromised. This paper presents a novel solution: a Channel State information-based Physical Unclonable Function (CSI-PUF) for wireless devices. By leveraging CSI, it generates a unique device identity. A meticulously designed fuzzy extractor algorithm is incorporated. In the enrollment phase, random numbers are generated and encoded with BCH error correction codes. During the reconstruction phase, errors in the CSI-PUF output bit sequence are transferred to the BCH-encoded random numbers. This allows for error elimination through decoding, safeguarding the confidentiality of CSI. A prototype WiFi terminal authentication system based on this CSI-PUF framework is developed and implemented. Experimental evaluations in an interference-free industrial control environment reveal that the system attains an average authentication success rate exceeding 95%. This significantly bolsters the security of WiFi-enabled devices, indicating that the CSI-PUF can effectively enhance the authentication security of wireless devices in industrial scenarios.
With the rapid development of android smart terminals, android applications are exhibiting explosive growth. However, there remains a challenging issue facing android system, a malicious application may broadcast user...
详细信息
We study the problem of quantum multi-unicast communication over the butterfly network in a quantum-walk architecture, where multiple arbitrary single-qubit states are transmitted simultaneously between multiple sourc...
详细信息
We study the problem of quantum multi-unicast communication over the butterfly network in a quantum-walk architecture, where multiple arbitrary single-qubit states are transmitted simultaneously between multiple source-sink pairs. Here, by introducing quantum walks, we demonstrate a quantum multiunicast communication scheme over the butterfly network and the inverted crown network, respectively,where the arbitrary single-qubit states can be efficiently transferred with both the probability and the state fidelity one. The presented result concerns only the butterfly network and the inverted crown network, but our techniques can be applied to a more general graph. It paves a way to combine quantum computation and quantum network communication.
σ 54 promoters are responsible for transcriptional carbon and nitrogen in prokaryotes. However, it is costly and difficult by experimental identification of them, especially in the postgenomic era with avalanche of ...
详细信息
σ 54 promoters are responsible for transcriptional carbon and nitrogen in prokaryotes. However, it is costly and difficult by experimental identification of them, especially in the postgenomic era with avalanche of sequencing data. Thus, it is imperative to develop efficiently and rapidly computational algorithms to identify the σ 54 promoters. In this study, a novel predictor named SVM-Adaboost was developed to predict σ 54 promoters from sequences alone, it used the Adaboost algorithm as the core, and support vector machine (SVM) as weak base predictors. SVM-Adaboost integrated SVM predictors to construct a more powerful and robust ensemble predictor. In SVM-Adaboost, we used pseudo k-tuple nucleotide composition method to encode DNA sequences, and then a feature selection method was used to further select the discriminate features for subsequent classification. We strictly evaluate the SVM-Adaboost on a constructed gold-standard σ 54 promoter dataset using ten-fold cross validation 100 times, and achieved an average accuracy of 96.06%.
In order to solve the problem of user privacy leakage in iOS applications, and make up for the limitations that existing techniques can not detect the leakage of internal privacy, this paper proposes a technology of i...
详细信息
In order to solve the problem of user privacy leakage in iOS applications, and make up for the limitations that existing techniques can not detect the leakage of internal privacy, this paper proposes a technology of internal privacy leakage detection based on dynamic detection and forensics. Firstly, identifying the user privacy data using the dynamic detection technology. Then, monitoring the application of run-time data combined with the forensics technology. Finally, locating the leaked user privacy in the network communication, local storage and log information. Experiments selected and tested 40 popular applications from different categories in the App Store. The experiments found that more than half of the applications have serious privacy leakage problems, and the main leak points are network traffic and local files.
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t...
详细信息
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise the integrity, confidentiality and availability of Android devices. However, so far there is not a sound approach at the source code level for app developers aiming to detect input validation vulnerabilities in Android apps. In this paper, we propose a novel approach for detecting input validation flaws in Android apps and we implement a prototype named Easy IVD, which provides practical static analysis of Java source *** IVD leverages backward program slicing to extract transaction and constraint slices from Java source *** Easy IVD validates these slices with predefined security rules to detect vulnerabilities in a known *** detect vulnerabilities in an unknown pattern, Easy IVD extracts implicit security specifications as frequent patterns from the duplicated slices and verifies them. Then Easy IVD semi-automatically confirms the suspicious rule violations and reports the confirmed ones as vulnerabilities. We evaluate Easy IVD on four versions of original Android apps spanning from version 2.2 to 5.0. It detects 58 vulnerabilities including confused deputy attacks and denial of service attacks. Our results prove that Easy IVD can provide a practical defensive solution for app developers.
In order to dynamically evaluate the security of network equipment operation, a security evaluation method of network equipment based on alarm data is proposed. The method makes full use of the alarm log containing ne...
详细信息
In order to dynamically evaluate the security of network equipment operation, a security evaluation method of network equipment based on alarm data is proposed. The method makes full use of the alarm log containing network equipment running rules and status information, deeply analyzes the distribution of alarm type and puts forward a new algorithm AoR to evaluate Alarm event for network equipment damage value, then get the safety index of network equipment and quantitative description of the networksecurity equipment running status. Finally, the experiment shows that the network equipment security assessment model proposed in this paper can find the high-risk network equipment and provide effective decision support for networksecurity operation and maintenance personnel.
A 780MHz wireless sensor network applied for Electric Vehicle Management System is designed and implemented in this paper, which meets the requirements of RFID 800 MHz / 900 MHz band. This project has less interferenc...
详细信息
A 780MHz wireless sensor network applied for Electric Vehicle Management System is designed and implemented in this paper, which meets the requirements of RFID 800 MHz / 900 MHz band. This project has less interference, good anti-multipath attenuation effect, longer transmission distance and stronger diffraction ability. Compared with 2.4 GHz sensor network on the market, it consumes less energy, and it is more environmentally friendly and energy saving at the same transmission distance. In addition, the system reduces the probability of interference and destruction in the same frequency band, reduces the risk of theft of electric vehicles, and will become the mainstream scheme of the future Electric Vehicle Management System. The transmission distance of the 780MHz wireless sensor network designed in this paper is more than 1km in the urban area. After applied to the Electric Vehicle Management System in the residential area, it shows the characteristics of long transmission distance and strong anti-interference.
At present, mobile terminals are widely used in power system and easy to be the target or springboard to attack the power system. It is necessary to have security assessment of power mobile terminal system to enable e...
详细信息
At present, mobile terminals are widely used in power system and easy to be the target or springboard to attack the power system. It is necessary to have security assessment of power mobile terminal system to enable early warning of potential risks. In the context, this paper builds the security assessment system against to power mobile terminals, with features from security assessment system of general mobile terminals and power application scenarios. Compared with the existing methods, this paper introduces machine learning to the Rank Correlation Analysis method, which relies on expert experience, and uses objective experimental data to optimize the weight parameters of the indicators. From experiments, this paper proves that weights self-learning method can be used to evaluate the security of power mobile terminal system and improve credibility of the result.
Elliptic Curve Cryptography (ECC) is a widely used cryptographic algorithm in our life. Although its theory has become one of the focuses, it is difficult to ensure its security during the process of implementation. O...
详细信息
Elliptic Curve Cryptography (ECC) is a widely used cryptographic algorithm in our life. Although its theory has become one of the focuses, it is difficult to ensure its security during the process of implementation. One can break it easily by using side-channel attack such as power attack. In this paper, a key recovery platform is built with computer, filter, signal acquisition module, oscilloscope, and so on. Then, we implement the simple power attack on ECC, and employ self-correlation analysis to make it easy to recover the secret key automatically. Finally, some relevant and effective countermeasures are suggested against power attacks.
暂无评论