
显示样式: 排序: IF: - GO 导出
-
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-02-09 Meisam Mohammady; Momen Oqaily; Lingyu Wang; Yuan Hong; Habib Louafi; Makan Pourzandi; Mourad Debbabi
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share
-
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-02-09 Amit Seal Ami; Kaushal Kafle; Kevin Moran; Adwait Nadkarni; Denys Poshyvanyk
Mobile application security has been a major area of focus for security research over the course of the last decade. Numerous application analysis tools have been proposed in response to malicious, curious, or vulnerable apps. However, existing tools, and specifically, static analysis tools, trade soundness of the analysis for precision and performance and are hence soundy. Unfortunately, the specific
-
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-21 Shameek Bhattacharjee; Venkata Praveen Kumar Madhavarapu; Simone Silvestri; Sajal K. Das
Spurious power consumption data reported from compromised meters controlled by organized adversaries in the Advanced Metering Infrastructure (AMI) may have drastic consequences on a smart grid’s operations. While existing research on data falsification in smart grids mostly defends against isolated electricity theft, we introduce a taxonomy of various data falsification attack types, when smart meters
-
Analyzing Dynamic Code: A Sound Abstract Interpreter forEvilEval ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-21 Vincenzo Arceri; Isabella Mastroeni
Dynamic languages, such as JavaScript, employ string-to-code primitives to turn dynamically generated text into executable code at run-time. These features make standard static analysis extremely hard if not impossible, because its essential data structures, i.e., the control-flow graph and the system of recursive equations associated with the program to analyze, are themselves dynamically mutating
-
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-21 Marcus Botacin; Hojjat Aghakhani; Stefano Ortolani; Christopher Kruegel; Giovanni Vigna; Daniela Oliveira; Paulo Lício De Geus; André Grégio
Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. Although a substantial amount of previous work provided a comprehensive analysis of the international malware ecosystem, research on regionalized, country-
-
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-21 Isabel Wagner; Iryna Yevseyeva
The ability to measure privacy accurately and consistently is key in the development of new privacy protections. However, recent studies have uncovered weaknesses in existing privacy metrics, as well as weaknesses caused by the use of only a single privacy metric. Metrics suites, or combinations of privacy metrics, are a promising mechanism to alleviate these weaknesses, if we can solve two open problems:
-
An Extensive Formal Analysis of Multi-factor Authentication Protocols ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-21 Charlie Jacomme; Steve Kremer
Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional authentication mechanisms in so-called multi-factor authentication protocols. In this article, we define a detailed threat model for this kind of protocol: While in classical protocol analysis attackers control the communication
-
Exploiting Mixed Binaries ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-02 Michalis Papaevripides; Elias Athanasopoulos
Unsafe programming systems are still very popular, despite the shortcomings due to several published memory-corruption vulnerabilities. Toward defending memory corruption, compilers have started to employ advanced software hardening such as Control-flow Integrity (CFI) and SafeStack. However, there is a broad interest for realizing compilers that impose memory safety with no heavy runtime support (e
-
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2021-01-02 Carlos Garcia Cordero; Emmanouil Vasilomanolakis; Aidmar Wainakh; Max Mühlhäuser; Simin Nadjm-Tehrani
Most research in the field of network intrusion detection heavily relies on datasets. Datasets in this field, however, are scarce and difficult to reproduce. To compare, evaluate, and test related work, researchers usually need the same datasets or at least datasets with similar characteristics as the ones used in related work. In this work, we present concepts and the Intrusion Detection Dataset Toolkit
-
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-11-08 Benjamin Shreeve; Joseph Hallett; Matthew Edwards; Pauline Anthonysamy; Sylvain Frey; Awais Rashid
Cyber security decision making is inherently complicated, with nearly every decision having knock-on consequences for an organisation’s vulnerability and exposure. This is further compounded by the fact that decision-making actors are rarely security experts and may have an incomplete understanding of the security that the organisation currently has in place. They must contend with a multitude of possible
-
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-11-08 Zhisheng Hu; Minghui Zhu; Peng Liu
Growing multi-stage attacks in computer networks impose significant security risks and necessitate the development of effective defense schemes that are able to autonomously respond to intrusions during vulnerability windows. However, the defender faces several real-world challenges, e.g., unknown likelihoods and unknown impacts of successful exploits. In this article, we leverage reinforcement learning
-
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-09-28 Benjamin Zi Hao Zhao; Hassan Jameel Asghar; Mohamed Ali Kaafar; Francesca Trevisan; Haiyue Yuan
Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge–response identification schemes where a user mentally computes the response via a cognitive function to authenticate herself such that eavesdroppers cannot readily extract the secret. Security evaluation of ORAS generally involves quantifying information leaked via observed challenge–response pairs. However,
-
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-09-28 Chuadhry Mujeeb Ahmed; Aditya P. Mathur; Martín Ochoa
Fingerprinting of various physical and logical devices has been proposed for uniquely identifying users or devices of mainstream IT systems such as PCs, laptops, and smart phones. However, the application of such techniques in Industrial Control Systems (ICS) is less explored for reasons such as a lack of direct access to such systems and the cost of faithfully reproducing realistic threat scenarios
-
The Tip of the Iceberg: On the Merits of Finding Security Bugs ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-09-28 Nikolaos Alexopoulos; Sheikh Mahbub Habib; Steffen Schulz; Max Mühlhüuser
In this article, we investigate a fundamental question regarding software security: Is the security of SW releases increasing over time? We approach this question with a detailed analysis of the large body of open-source software packaged in the popular Debian GNU/Linux distribution. Contrary to common intuition, we find no clear evidence that the vulnerability rate of widely used software decreases
-
A Study on the Use of Checksums for Integrity Verification of Web Downloads ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-09-28 Alexandre Meylan; Mauro Cherubini; Bertil Chapuis; Mathias Humbert; Igor Bilogrevic; Kévin Huguenin
App stores provide access to millions of different programs that users can download on their computers. Developers can also make their programs available for download on their websites and host the program files either directly on their website or on third-party platforms, such as mirrors. In the latter case, as users download the software without any vetting from the developers, they should take the
-
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06 Mohamed Nabeel; Issa M. Khalil; Bei Guan; Ting Yu
Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data
-
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06 Syed Zain Raza Rizvi; Philip W. L. Fong
Neo4j is a popular graph database that offers two versions: an enterprise edition and a community edition. The enterprise edition offers customizable Role-based Access Control features through custom developed procedures, while the community edition does not offer any access control support. Being a graph database, Neo4j appears to be a natural application for Relationship-Based Access Control (ReBAC)
-
The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-07-06 Michalis Diamantaris; Francesco Marcantoni; Sotiris Ioannidis; Jason Polakis
Modern smartphone sensors can be leveraged for providing novel functionality and greatly improving the user experience. However, sensor data can be misused by privacy-invasive or malicious entities. Additionally, a wide range of other attacks that use mobile sensor data have been demonstrated; while those attacks have typically relied on users installing malicious apps, browsers have eliminated that
-
Code Renewability for Native Software Protection ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-08-25 Bert Abrath; Bart Coppens; Jens Van Den Broeck; Brecht Wyseur; Alessandro Cabutto; Paolo Falcarin; Bjorn De Sutter
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This article presents an architecture and supporting tool flow to renew parts of native applications dynamically. Renewed and diversified code and data belonging to either the original application or to linked-in protections are delivered from a secure server to
-
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF) ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-08-25 Sagar Samtani; Hongyi Zhu; Hsinchun Chen
Cybersecurity experts have appraised the total global cost of malicious hacking activities to be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach to combat this societal issue. However, existing processes are criticized as inherently reactive to known threats. To combat these concerns, CTI experts have suggested proactively examining emerging threats in the vast
-
On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better? ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-08-25 Geumhwan Cho; Jun Ho Huh; Soolin Kim; Junsung Cho; Heesung Park; Yenah Lee; Konstantin Beznosov; Hyoungshick Kim
The latest smartphones have started providing multiple authentication options including PINs, patterns, and passwords (knowledge based), as well as face, fingerprint, iris, and voice identification (biometric-based). In this article, we conducted two user studies to investigate how the convenience and security of unlocking phones are influenced by the provision of multiple authentication options. In
-
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-17 Daniele Antonioli; Nils Ole Tippenhauer; Kasper Rasmussen
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant
-
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-12 Hocheol Shin; Juhwan Noh; Dohyun Kim; Yongdae Kim
Fire alarm and signaling systems are a networked system of fire detectors, fire control units, automated fire extinguishers, and fire notification appliances. Malfunction of these safety-critical cyber-physical systems may lead to chaotic evacuations, property damage, and even loss of human life. Therefore, reliability is one of the most crucial factors for fire detectors. Indeed, even a single report
-
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-06-12 Darren Hurley-Smith; Julio Hernandez-Castro
Random numbers are essential for cryptography and scientific simulation. Generating truly random numbers for cryptography can be a slow and expensive process. Quantum physics offers a variety of promising solutions to this challenge, proposing sources of entropy that may be genuinely unpredictable, based on the inherent randomness of certain physical phenomena. These properties have been employed to
-
Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-31 Sanaz Taheri Boshrooyeh; Alptekin Küpçü; Öznur Özkasap
Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collected by the OSN provider comes with privacy problems when being monetized for advertising purposes. To protect user privacy, existing studies propose utilizing data encryption that immediately prevents OSNs
-
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-31 Giada Sciarretta; Roberto Carbone; Silvio Ranise; Luca Viganò
Over the last few years, there has been an almost exponential increase in the number of mobile applications that deal with sensitive data, such as applications for e-commerce or health. When dealing with sensitive data, classical authentication solutions based on username-password pairs are not enough, and multi-factor authentication solutions that combine two or more authentication factors of different
-
The Security of Lazy Users in Out-of-Band Authentication ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-22 Moni Naor; Lior Rotem; Gil Segev
Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on “out-of-band” authentication, assuming that users have access to an external channel for authenticating one short value. For example, assuming that users recognizing each other’s voice can authenticate a short value, Telegram and WhatApp ask their users to compare 288-bit and 200-bit values, respectively. The existing
-
Build It, Break It, Fix It ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-22 James Parker; Michael Hicks; Andrew Ruef; Michelle L. Mazurek; Dave Levin; Daniel Votipka; Piotr Mardziel; Kelsey R. Fulton
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build specified software with the goal of maximizing correctness, performance, and security. The latter is tested when teams attempt to break other teams’ submissions
-
Using Generative Adversarial Networks to Break and Protect Text Captchas ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-22 Guixin Ye; Zhanyong Tang; Dingyi Fang; Zhanxing Zhu; Yansong Feng; Pengfei Xu; Xiaojiang Chen; Jungong Han; Zheng Wang
Text-based CAPTCHAs remains a popular scheme for distinguishing between a legitimate human user and an automated program. This article presents a novel genetic text captcha solver based on the generative adversarial network. As a departure from prior text captcha solvers that require a labor-intensive and time-consuming process to construct, our scheme needs significantly fewer real captchas but yields
-
Measuring and Analysing the Chain of Implicit Trust ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-22 Muhammad Ikram; Rahat Masood; Gareth Tyson; Mohamed Ali Kaafar; Noha Loizon; Roya Ensafi
The web is a tangled mass of interconnected services, whereby websites import a range of external resources from various third-party domains. The latter can also load further resources hosted on other domains. For each website, this creates a dependency chain underpinned by a form of implicit trust between the first-party and transitively connected third parties. The chain can only be loosely controlled
-
A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-05-22 Fatima M. Anwar; Mani Srivastava
We propose a new clock synchronization architecture for systems under time transfer attacks. Facilitated by a feedforward control with feedback trim--based clock adjustment, coupled with packet filtering and frequency shaping techniques, our proposed architecture bounds the clock errors in the presence of a powerful network attacker capable of attacking packets between a master and a client. A key
-
The Dilemma of User Engagement in Privacy Notices ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Farzaneh Karegar; John Sören Pettersson; Simone Fischer-Hübner
Privacy notices and consent forms are the means of conveying privacy policy information to users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite previous research, it is not yet clear whether user engagement with consent forms via different types of interactions for confirming consent may play a significant role in effectively drawing user attention to the content
-
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Amith K. Belman; Vir V. Phoha
Research in Keystroke-Dynamics (KD) has customarily focused on temporal features without considering context to generate user templates that are used in authentication. Additionally, work on KD in hand-held devices such as smart-phones and tablets have shown that these features alone do not perform satisfactorily for authentication. In this work, we analyze the discriminatory power of the most-used
-
A Formal Approach to Physics-based Attacks in Cyber-physical Systems ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Ruggero Lanotte; Massimo Merro; Andrei Munteanu; Luca Viganò
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical Systems (CPSs) and physics-based attacks, i.e., attacks targeting physical devices. We focus on a formal treatment of both integrity and denial of service attacks to sensors and actuators of CPSs, and on the timing aspects of these attacks. Our contributions are fourfold. (1) We define a hybrid process
-
Mimicry Attacks on Smartphone Keystroke Authentication ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Hassan Khan; Urs Hengartner; Daniel Vogel
Keystroke behaviour-based authentication employs the unique typing behaviour of users to authenticate them. Recent such proposals for virtual keyboards on smartphones employ diverse temporal, contact, and spatial features to achieve over 95% accuracy. Consequently, they have been suggested as a second line of defense with text-based password authentication. We show that a state-of-the-art keystroke
-
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Thang Hoang; Attila A. Yavuz; Jorge Guajardo
Oblivious Random Access Machine (ORAM) allows a client to hide the access pattern when accessing sensitive data on a remote server. It is known that there exists a logarithmic communication lower bound on any passive ORAM construction, where the server only acts as the storage service. This overhead, however, was shown costly for some applications. Several active ORAM schemes with server computation
-
CrowdPrivacy ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2020-02-12 Fang-Jing Wu; Tie Luo
Location-based services (LBSs) typically crowdsource geo-tagged data from mobile users. Collecting more data will generally improve the utility for LBS providers; however, it also leads to more privacy exposure of users’ mobility patterns. Although the tension between data utility and user privacy has been recognized, there lacks a solution that determines how much data to collect—in both spatial and
-
Resilient Privacy Protection for Location-Based Services through Decentralization ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-12-17 Hongyu Jin; Panos Papadimitratos
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS providers can be honest-but-curious, collecting queries and tracking users’ whereabouts and infer sensitive user data. This motivated both centralized and
-
Will They Use It or Not? Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-12-17 Awanthika Senarath; Marthie Grobler; Nalin Asanka Gamagedara Arachchilage
With the increasing concerns over privacy in software systems, there is a growing enthusiasm to develop methods to support the development of privacy aware software systems. Inadequate privacy in software system designs could result in users losing their sensitive data, such as health information and financial information, which may cause financial and reputation loss. Privacy Engineering Methodologies
-
Malicious Overtones ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-12-17 Brian A. Powell
A method for detecting electronic data theft from computer networks is described, capable of recognizing patterns of remote exfiltration occurring over days to weeks. Normal traffic flow data, in the form of a host’s ingress and egress bytes over time, is used to train an ensemble of one-class learners. The detection ensemble is modular, with individual classifiers trained on different traffic features
-
Skype 8 Type ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-12-17 Stefano Cecconello; Alberto Compagno; Mauro Conti; Daniele Lain; Gene Tsudik
Voice-over-IP (VoIP) software are among the most widely spread and pervasive software, counting millions of monthly users. However, we argue that people ignore the drawbacks of transmitting information along with their voice, such as keystroke sounds—as such sound can reveal what someone is typing on a keyboard. In this article, we present and assess a new keyboard acoustic eavesdropping attack that
-
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-12-17 Gokcan Cantali; Orhan Ermis; Mehmet Ufuk Çağlayan; Cem Ersoy
Dynamic group key agreement protocols are cryptographic primitives to provide secure group communications in decentralized and dynamic networks. Such protocols provide additional operations to update the group key while adding new participants into the group and removing existing participants from the group without re-executing the protocol from the beginning. However, the lack of scalability emerges
-
Database Audit Workload Prioritization via Game Theory ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-07-19 Chao Yan; Bo Li; Yevgeniy Vorobeychik; Aron Laszka; Daniel Fabbri; Bradley Malin
The quantity of personal data that is collected, stored, and subsequently processed continues to grow rapidly. Given its sensitivity, ensuring privacy protections has become a necessary component of database management. To enhance protection, a number of mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities. However, this approach
-
A General Framework for Adversarial Examples with Objectives ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-07-19 Mahmood Sharif; Sruti Bhagavatula; Lujo Bauer; Michael K. Reiter
Images perturbed subtly to be misclassified by neural networks, called adversarial examples, have emerged as a technically deep challenge and an important concern for several application domains. Most research on adversarial examples takes as its only constraint that the perturbed images are similar to the originals. However, real-world application of these ideas often requires the examples to satisfy
-
GPLADD ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-07-19 Alexander V. Outkin; Brandon K. Eames; Meghan A. Galiardi; Sarah Walsh; Eric D. Vugrin; Byron Heersink; Jacob Hobbs; Gregory D. Wyss
Trust in a microelectronics-based system can be characterized as the level of confidence that a system is free of subversive alterations made during system development, or that the development process of a system has not been manipulated by a malicious adversary. Trust in systems has become an increasing concern over the past decade. This article presents a novel game-theoretic framework, called GPLADD
-
DADS ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-07-19 Samuel Wedaj; Kolin Paul; Vinay J. Ribeiro
We present a novel scheme called Decentralized Attestation for Device Swarms (DADS), which is, to the best of our knowledge, the first to accomplish decentralized attestation in device swarms. Device swarms are smart, mobile, and interconnected devices that operate in large numbers and are likely to be part of emerging applications in Cyber-Physical Systems (CPS) and Industrial Internet of Things (IIoTs)
-
Hybrid Private Record Linkage ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-07-19 Fang-Yu Rao; Jianneng Cao; Elisa Bertino; Murat Kantarcioglu
Private record linkage protocols allow multiple parties to exchange matching records, which refer to the same entities or have similar values, while keeping the non-matching ones secret. Conventional protocols are based on computationally expensive cryptographic primitives and therefore do not scale. To address these scalability issues, hybrid protocols have been proposed that combine differential
-
Tractor Beam ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Juhwan Noh; Yujin Kwon; Yunmok Son; Hocheol Shin; Dohyun Kim; Jaeyeong Choi; Yongdae Kim
The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of their autopilot technology. Unfortunately, terrorists have also begun to use consumer drones for kamikaze bombing and reconnaissance. To protect against such threats, several companies have started “anti-drone” services that primarily focus on disrupting
-
Introducing the Temporal Dimension to Memory Forensics ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Fabio Pagani; Oleksii Fedorov; Davide Balzarotti
Kickstarted by the Digital Forensic Research Workshop (DFRWS) conference in 2005, modern memory analysis is now one of most active areas of computer forensics and it mostly focuses on techniques to locate key operating system data structures and extract high-level information. These techniques work on the assumption that the information inside a memory dump is consistent and the copy of the physical
-
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Donghyun Kwon; Hayoon Yi; Yeongpil Cho; Yunheung Paek
Security monitoring has long been considered as a fundamental mechanism to mitigate the damage of a security attack. Recently, intra-level security systems have been proposed that can efficiently and securely monitor system software without any involvement of more privileged entity. Unfortunately, there exists no full intra-level security system that can universally operate at any privilege level on
-
ANCHOR ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Diego Kreutz; Jiangshan Yu; Fernando M. V. Ramos; Paulo Esteves-Verissimo
While the logical centralization of functional properties of the network in Software-Defined Networking (SDN) brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties
-
A Usability Study of Four Secure Email Tools Using Paired Participants ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Scott Ruoti; Jeff Andersen; Luke Dickinson; Scott Heidbrink; Tyler Monson; Mark O'neill; Ken Reese; Brad Spendlove; Elham Vaziripour; Justin Wu; Daniel Zappala; Kent Seamons
Secure email is increasingly being touted as usable by novice users, with a push for adoption based on recent concerns about government surveillance. To determine whether secure email is ready for grassroots adoption, we employ a laboratory user study that recruits pairs of novice users to install and use several of the latest systems to exchange secure messages. We present both quantitative and qualitative
-
Using Episodic Memory for User Authentication ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Simon S. Woo; Ron Artstein; Elsi Kaiser; Xiao Le; Jelena Mirkovic
Passwords are widely used for user authentication, but they are often difficult for a user to recall, easily cracked by automated programs, and heavily reused. Security questions are also used for secondary authentication. They are more memorable than passwords, because the question serves as a hint to the user, but they are very easily guessed. We propose a new authentication mechanism, called “life-experience
-
MaMaDroid ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-04-10 Lucky Onwuzurike; Enrico Mariconti; Panagiotis Andriotis; Emiliano De Cristofaro; Gordon Ross; Gianluca Stringhini
The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MaMaDroid, an Android
-
Alpha-Beta Privacy ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Sebastian Mödersheim; Luca Viganò
The formal specification of privacy goals in symbolic protocol models has proved to be not quite trivial so far. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. But then a subtle question emerges: How can we be sure that we have specified all
-
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Ivo Sluganovic; Marc Roeschlin; Kasper B. Rasmussen; Ivan Martinovic
Eye tracking devices have recently become increasingly popular as an interface between people and cons-umer-grade electronic devices. Due to the fact that human eyes are fast, responsive, and carry information unique to an individual, analyzing person’s gaze is particularly attractive for rapid biometric authentication. Unfortunately, previous proposals for gaze-based authentication systems either
-
Kernel Protection Against Just-In-Time Code Reuse ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Marios Pomonis; Theofilos Petsios; Angelos D. Keromytis; Michalis Polychronakis; Vasileios P. Kemerlis
The abundance of memory corruption and disclosure vulnerabilities in kernel code necessitates the deployment of hardening techniques to prevent privilege escalation attacks. As stricter memory isolation mechanisms between the kernel and user space become commonplace, attackers increasingly rely on code reuse techniques to exploit kernel vulnerabilities. Contrary to similar attacks in more restrictive
-
ISOTOP ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Taous Madi; Yosr Jarraya; Amir Alimohammadifar; Suryadipta Majumdar; Yushun Wang; Makan Pourzandi; Lingyu Wang; Mourad Debbabi
Multi-tenancy in the cloud is a double-edged sword. While it enables cost-effective resource sharing, it increases security risks for the hosted applications. Indeed, multiplexing virtual resources belonging to different tenants on the same physical substrate may lead to critical security concerns such as cross-tenants data leakage and denial of service. Particularly, virtual networks isolation failures
-
A Close Look at a Daily Dataset of Malware Samples ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Xabier Ugarte-Pedrero; Mariano Graziano; Davide Balzarotti
The number of unique malware samples is growing out of control. Over the years, security companies have designed and deployed complex infrastructures to collect and analyze this overwhelming number of samples. As a result, a security company can collect more than 1M unique files per day only from its different feeds. These are automatically stored and processed to extract actionable information derived
-
KIST ACM Trans. Priv. Secur. (IF 1.974) Pub Date : 2019-01-23 Rob Jansen; Matthew Traudt; John Geddes; Chris Wacek; Micah Sherr; Paul Syverson
Tor’s growing popularity and user diversity has resulted in network performance problems that are not well understood, though performance is understood to be a significant factor in Tor’s security. A large body of work has attempted to solve performance problems without a complete understanding of where congestion occurs in Tor. In this article, we first study congestion in Tor at individual relays