Vai al contenuto principale della pagina

Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Edizione: 1st ed. 2017.
Descrizione fisica: 1 online resource (XVIII, 313 p. 77 illus.)
Disciplina: 005.8
Soggetto topico: Computer security
Data encryption (Computer science)
Application software
Data mining
Computers and civilization
Computer organization
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Systems Organization and Communication Networks
Persona (resp. second.): LipmaaHelger
MitrokotsaAikaterini
MatulevičiusRaimundas
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement.
3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection.
4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index.
Sommario/riassunto: This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
Titolo autorizzato: Secure IT Systems  Visualizza cluster
ISBN: 3-319-70290-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910483725903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 10674