Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings 3030656098, 9783030656096

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020,

464 40 29MB

English Pages 272 [297] Year 2021

Report DMCA / Copyright

DOWNLOAD FILE

Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings
 3030656098, 9783030656096

Table of contents :
Preface
Organization
Abstracts of Keynote Talks
On Adversarial Testing of Cellular Network Protocols
Formalizing Data Deletion in the Context of the Right to be Forgotten
Insecurity Analysis of the IoT Platforms and Systems
A Defense Against Trojan Attacks on Deep Neural Networks
Access Control Convergence: Challenges and Opportunities
Contents
Access Control
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
1 Introduction
2 Calibration Traceability and Access Control: A Case for Unification
2.1 Information Flow Constraints
2.2 Existing Access Control Models and Calibration Traceability
3 A Unified Access Control Model for Calibration Traceability
4 Evaluation
4.1 Case Example: Calibration Traceability for a Sensor Device
4.2 Performance Evaluation
5 Discussion and Limitations
6 Related Work
7 Conclusion
References
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
1 Introduction
2 Learning Three-Valued Logic Formulas
2.1 Problem Definition
2.2 Learning a Multi-way Decision Tree
2.3 Algorithm for Learning a Three-Valued Logic Formula
3 Policy Language with Unknown Attribute Values
4 The Problem: ReBAC Policy Mining with Unknowns
5 ReBAC Policy Mining Algorithm
5.1 Phase 1: Learn Decision Tree and Extract Rules
5.2 Phase 2: Improve the Rules
6 Evaluation Methodology
6.1 Datasets
6.2 Policy Similarity Metrics
7 Evaluation Results
7.1 Comparison with DTRM and DTRM-
7.2 Experiments with Unknown Attribute Values
8 Related Work
References
Reliability and Security for Safety-Critical Service Compositions
1 Introduction
2 Background
2.1 Secure Multiparty Computation
2.2 Secret Sharing
2.3 Threshold Signatures
3 System Model
3.1 Security Objectives
3.2 Actors and Data Flow
3.3 Creation of a Validator Subnet
4 Reliable Service Composition Protocol
5 Evaluation
5.1 Case Study
5.2 Implementation
5.3 Performance
5.4 Discussion and Future Work
6 Related Work
7 Conclusion
References
AI/ML in Security
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks
1 Introduction
2 Backdoor Attacks
3 A Plug-In Backdoor Defense: STRIP
3.1 Overview
3.2 Results
3.3 Experimental Setup
3.4 MNIST
3.5 CIFAR10
3.6 Discussion
4 Conclusion
References
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning
1 Introduction
2 Overview of Cyber Threat Intelligence
3 GAP Identified
4 Role of AI and ML in CTI Platform
5 Proposed Model for Using AI and ML with Cyber Threat Intelligence Domain
5.1 Outline of the Proposed Model
5.2 Data Accumulation
5.3 Feature Extraction and Language Processing
5.4 Machine Learning Classifier
5.5 Performance of the Proposed Model
6 Future Scope of the Proposed Model
7 Conclusion
References
Machine Learning Based Android Vulnerability Detection: A Roadmap
1 Introduction
2 Related Work
3 Data Extraction Methodology
4 Android Vulnerability Trend
5 Discussions and Future Directions
6 Conclusion
References
Privacy and Web Security
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach
1 Introduction
2 Automatic Captcha Solver
2.1 Captcha Characteristics
2.2 Captcha Training
2.3 Captcha Solving
3 Experiments
3.1 CNN Based Approach
3.2 Results
3.3 Design Recommendations
4 Related Work
5 Conclusion
References
Privacy-Preserving Friend Recommendation in an Integrated Social Environment
1 Introduction
1.1 Problem Definition
1.2 Problem Relevance
1.3 Adversary Model and Protocol Overview
2 Preliminaries
2.1 Friend Recommendation Based on Mutual Friends
2.2 Differential Privacy (DP)
3 The Proposed Protocol
3.1 Protocol Initialization
3.2 The Main Protocol
3.3 Security Analysis
3.4 Complexity Analysis
4 Experimental Results
4.1 Experimental Setup
4.2 Empirical Analysis
5 Related Work
6 Conclusion
References
A Toolkit for Security Awareness Training Against Targeted Phishing
1 Introduction
2 Background and Related Work
2.1 Security Awareness Training
2.2 Targeted Phishing
2.3 Existing Tooling for (targeted) Phishing Simulations
2.4 Discussion
3 Proposed Framework and Implementation
3.1 Email Customization
3.2 Domain Selection
4 A Case Study Application to Oliveira et al.
4.1 Scenario Limitation of Previous Studies and Research Gap
4.2 Improved Experiment Design
4.3 Discussion
5 Conclusion
A Phishing Email Templates
A.1 Liking and Security Template
A.2 Reciprocation and Social Template
References
Forensic Source Identification of OSN Compressed Images
1 Introduction
2 Proposed Deep Learning Model for Source Camera Identification of OSN Compressed Images
2.1 Network Architecture
2.2 Network Parameters
3 Experiments, Results and Discussion
3.1 Experimental Setup
3.2 Performance Evaluation
3.3 Comparison
4 Conclusion and Future Work
References
Cryptography
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
1 Introduction
1.1 Our Contribution
2 Preliminaries
2.1 Ramp Secret Sharing
2.2 Cheating Model
3 Ramp Secret Sharing with Cheating Detection
3.1 Construction - I
3.2 Construction - II
3.3 Few Words on Share Size
4 Conclusion
References
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX
1 Introduction
2 Lightweight Cryptography
2.1 General Characteristics
2.2 Existing Designs
3 ARX
3.1 Current Scenario
4 Cipher Design Strategies
4.1 Wide Trail Strategy (WTS)
4.2 Long Trail Strategy (LTS)
5 The LiARX Cipher
5.1 MARX-2
5.2 Linear Layer
5.3 Key Schedule
6 Experiments
6.1 Performance Metrics
6.2 Scenarios
6.3 Results
7 Conclusion
References
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
1 Introduction
1.1 Related Works
1.2 Our Contribution
2 Prerequisites
2.1 The Color Model
2.2 Color Visual Cryptographic Scheme
2.3 Some Mathematical Results
3 Main Results
3.1 Constructing Color VCS from Smaller Schemes
3.2 Construction of (n,n)c-CVCS
3.3 Construction of (2,n)c-CVCS
3.4 Construction of (k,n)c-CVCS
3.5 Modification of the Technique
4 Discussions and Experimental Results
4.1 Comparison
5 Conclusion
References
Systems Security
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information
1 Introduction
1.1 Background
1.2 Communication Types and Security
1.3 Our Purpose
2 Preliminaries
2.1 W-OTS+
2.2 HMAC
3 Proposed Method
3.1 Preparation Phase
3.2 Commitment Phase
3.3 Verification Phase
4 Effectiveness in Practical Operations
4.1 Accuracy and Computational Cost
4.2 Influence of Size of Entropy
4.3 How to Determine the Value of wi
5 Example Calculation
5.1 Procedure
5.2 Evaluation of Efficiency
6 Security Evaluations
6.1 Threat Scenario
6.2 Inverse Calculation of Position Information of Player
6.3 Forgery Attack of Commitment
6.4 Impersonation Attack of Player/Verifier
6.5 Importance of Random Element r
7 Conclusions
References
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security
1 Introduction
2 Literature Survey
3 Android and Camera Subsystem Security
3.1 Android's Camera Architecture
3.2 Android Camera's Security Mechanisms
4 Circumventing Android's Camera Security
4.1 Granting Critical Permissions Without Prompting User
4.2 Capture Picture from Background
4.3 Disabling Logs
5 Conclusions
References
Detection of Malign and Benign PE Files Using Texture Analysis
1 Introduction
2 Related Work
3 PE File Format
4 Method Proposed
5 Experiment and Results
6 Conclusion
References
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
1 Introduction
2 Costs of Cybersecurity
3 Related Work
4 Method Description
5 Case Study
5.1 Input Data
5.2 Results
6 Comparative Analysis with SQUARE
6.1 Input Data
6.2 Results Obtained with CAsPeA
6.3 Results Obtained with SQUARE
6.4 Results Analysis
7 Conclusions
References
Author Index

Polecaj historie