SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:0167 4048 OR L773:1872 6208 "

Sökning: L773:0167 4048 OR L773:1872 6208

  • Resultat 1-10 av 59
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abril, Daniel, et al. (författare)
  • Spherical Microaggregation : Anonymizing Sparse Vector Spaces
  • 2015
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 49, s. 28-44
  • Tidskriftsartikel (refereegranskat)abstract
    • Unstructured texts are a very popular data type and still widely unexplored in the privacy preserving data mining field. We consider the problem of providing public information about a set of confidential documents. To that end we have developed a method to protect a Vector Space Model (VSM), to make it public even if the documents it represents are private. This method is inspired by microaggregation, a popular protection method from statistical disclosure control, and adapted to work with sparse and high dimensional data sets.
  •  
2.
  • Alani, Mohammed M., et al. (författare)
  • AdStop: Efficient Flow-based Mobile Adware Detection using Machine Learning
  • 2022
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 117
  • Tidskriftsartikel (refereegranskat)abstract
    • In recent years, mobile devices have become commonly used not only for voice communications but also to play a major role in our daily activities. Accordingly, the number of mobile users and the number of mobile applications (apps) have increased exponentially. With a wide user base exceeding 2 billion users, Android is the most popular operating system worldwide, which makes it a frequent target for malicious actors. Adware is a form of malware that downloads and displays unwanted advertisements, which are often offensive and always unsolicited. This paper presents a machine learning-based system (AdStop) that detects Android adware by examining the features in the flow of network traffic. The design goals of AdStop are high accuracy, high speed, and good generalizability beyond the training dataset. A feature reduction stage was implemented to increase the accuracy of Adware detection and reduce the time overhead. The number of relevant features used in training was reduced from 79 to 13 to improve the efficiency and simplify the deployment of AdStop. In experiments, the tool had an accuracy of 98.02% with a false positive rate of 2% and a false negative rate of 1.9%. The time overhead was 5.54 s for training and 9.36 µs for a single instance in the testing phase. In tests, AdStop outperformed other methods described in the literature. It is an accurate and lightweight tool for detecting mobile adware.
  •  
3.
  • Alexiou, Nikolaos, et al. (författare)
  • Formal security analysis of near field communication using model checking
  • 2016
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 60, s. 1-14
  • Tidskriftsartikel (refereegranskat)abstract
    • Near field communication (NFC) is a short-range wireless communication technology envisioned to support a large gamut of smart-device applications, such as payment and ticketing. Although two NFC devices need to be in close proximity to communicate (up to 10 cm), adversaries can use a fast and transparent communication channel to relay data and, thus, force an NFC link between two distant victims. Since relay attacks can bypass the NFC requirement for short-range communication cheaply and easily, it is important to evaluate the security of NFC applications. In this work, we present a general framework that exploits formal analysis and especially model checking as a means of verifying the resiliency of NFC protocol against relay attacks. Toward this goal, we built a continuous-time Markov chain (CTMC) model using the PRISM model checker. Firstly, we took into account NFC protocol parameters and, then, we enhanced our model with networking parameters, which include both mobile environment and security-aware characteristics. Combining NFC specifications with an adversary's characteristics, we produced the relay attack model, which is used for extracting our security analysis results. Through these results, we can explain how a relay attack could be prevented and discuss potential countermeasures.
  •  
4.
  • Andersson, Annika, 1968-, et al. (författare)
  • Consensus versus warfare – unveiling discourses in de jure information security standard development
  • 2020
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 99
  • Tidskriftsartikel (refereegranskat)abstract
    • Information security standards are influential tools in society today. The validity claim of standards is based on what is considered “best practice.” We unveil the negotiations that take place when “best practice” is constructed during standard development. By using dis- course analysis, we investigate how power operates in national and international contexts of de jure information security standard development work. As members of a standard- ization committee, we analyzed the language used by this committee. The results showed two discourses at play: the consensus discourse and the warfare discourse. We conclude by proposing six theoretical propositions on how power operates in the above-mentioned contexts of de jure standard development.
  •  
5.
  • Aslam, Mudassar, et al. (författare)
  • FoNAC - An automated Fog Node Audit and Certification scheme
  • 2020
  • Ingår i: Computers & security (Print). - : Elsevier Ltd. - 0167-4048 .- 1872-6208. ; 93
  • Tidskriftsartikel (refereegranskat)abstract
    • Meeting the security and privacy needs for IoT data becomes equally important in the newly introduced intermediary Fog Computing layer, as it was in its former technological layer - Cloud; but the accomplishment of such security is critical and challenging. While security assurance of the fog layer devices is imperative due to their exposure to the public Internet, it becomes even more complex, than the cloud layer, as it involves a large number of heterogeneous devices deployed hierarchically. Manual audit and certification schemes are unsuitable for large number of fog nodes thereby inhibiting the involved stakeholders to use manual security assurance schemes altogether. However, scalable and feasible security assurance can be provided by introducing automated and continuous monitoring and auditing of fog nodes to ensure a trusted, updated and vulnerability free fog layer. This paper presents such an solution in the form of an automated Fog Node Audit and Certification scheme (FoNAC) which guarantees a secure fog layer through the proposed fog layer assurance mechanism. FoNAC leverages Trusted Platform Module (TPM 2.0) capabilities to evaluate/audit the platform integrity of the operating fog nodes and grants certificate to the individual node after a successful security audit. FoNAC security is also validated through its formal security analysis performed using AVISPA under Dolev-Yao intruder model. The security analysis of FoNAC shows its resistance against cyber-attacks like impersonation, replay attack, forgery, Denial of Service(DoS) and MITM attack.
  •  
6.
  • Bakari, Jabiri Kuwe, et al. (författare)
  • Bridging the gap between general management and technicians - A case study on ICT security in a developing country
  • 2007
  • Ingår i: Computers & security (Print). - : Elsevier BV. - 0167-4048 .- 1872-6208. ; 26:1, s. 44-55
  • Tidskriftsartikel (refereegranskat)abstract
    • The lack of planning, business re-engineering, and coordination in the whole process of computerisation is the most pronounced problem facing organisations. These problems often lead to a discontinuous link between technology and the business processes. As a result, the introduced technology poses some critical risks for the organisations due, in part, to different perceptions of the management and technical staffs in viewing the ICT security problem. This paper discusses a practical experience on bridging the gap between the general management and ICT technicians.
  •  
7.
  • Barreto, Carlos, et al. (författare)
  • Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime
  • 2023
  • Ingår i: Computers & security (Print). - : Elsevier Ltd. - 0167-4048 .- 1872-6208. ; 131
  • Tidskriftsartikel (refereegranskat)abstract
    • We study the impact of data sharing policies on cyber insurance markets. These policies have been proposed to address the scarcity of data about cyber threats, which is essential to manage cyber risks. We propose a Cournot duopoly competition model in which two insurers choose the number of policies they offer (i.e., their production level) and also the resources they invest to ensure the quality of data regarding the cost of claims (i.e., the data quality of their production cost). We find that enacting mandatory data sharing sometimes creates situations in which at most one of the two insurers invests in data quality, whereas both insurers would invest when information sharing is not mandatory. This raises concerns about the merits of making data sharing mandatory. 
  •  
8.
  • Bella, Giampaolo, et al. (författare)
  • Trustworthy exams without trusted parties
  • 2017
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 67, s. 291-307
  • Tidskriftsartikel (refereegranskat)abstract
    • Historically, exam security has mainly focused on threats ascribed to candidate cheating. Such threats have been normally mitigated by invigilation and anti-plagiarism methods. However, as recent exam scandals confirm, also invigilators and authorities may pose security threats. The introduction of computers into the different phases of an exam, such as candidate registration, brings new security issues that should be addressed with the care normally devoted to security protocols. This paper proposes a protocol that meets a wide set of security requirements and resists threats that may originate from candidates as well as from exam administrators. By relying on a combination of oblivious transfer and visual cryptography schemes, the protocol does not need to rely on any trusted third party. We analyse the protocol formally in ProVerif and prove that it verifies all the stated security requirements.
  •  
9.
  • Bhamare, Deval, et al. (författare)
  • Cybersecurity for industrial control systems : A survey
  • 2020
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 89
  • Tidskriftsartikel (refereegranskat)abstract
    • Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment facilities, power generation, heavy industries, and distribution systems. Though ICSs were kept isolated from the Internet for so long, significant achievable business benefits are driving a convergence between ICSs and the Internet as well as information technology (IT) environments, such as cloud computing. As a result, ICSs have been exposed to the attack vectors used in the majority of cyber-attacks. However, ICS devices are inherently much less secure against such advanced attack scenarios. A compromise to ICS can lead to enormous physical damage and danger to human lives. In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments. Then we discuss the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security. The work may help to address the challenges of securing industrial processes, particularly while migrating them to the cloud environments.
  •  
10.
  • Cabrera-Arteaga, Javier, 1992-, et al. (författare)
  • Wasm-Mutate : Fast and effective binary diversification for WebAssembly
  • 2024
  • Ingår i: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 139, s. 103731-103731
  • Tidskriftsartikel (refereegranskat)abstract
    • WebAssembly is the fourth officially endorsed Web language. It is recognized because of its efficiency and design, focused on security. Yet, its swiftly expanding ecosystem lacks robust software diversification systems. We introduce Wasm-Mutate, a diversification engine specifically designed for WebAssembly. Our engine meets several essential criteria: 1) To quickly generate functionally identical, yet behaviorally diverse, WebAssembly variants, 2) To be universally applicable to any WebAssembly program, irrespective of the source programming language, and 3) Generated variants should counter side-channels. By leveraging an e-graph data structure, Wasm-Mutate is implemented to meet both speed and efficacy. We evaluate Wasm-Mutate by conducting experiments on 404 programs, which include real-world applications. Our results highlight that Wasm-Mutate can produce tens of thousands of unique and efficient WebAssembly variants within minutes. Significantly, Wasm-Mutate can safeguard WebAssembly binaries against timing side-channel attacks, especially those of the Spectre type.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 59
Typ av publikation
tidskriftsartikel (56)
forskningsöversikt (3)
Typ av innehåll
refereegranskat (58)
övrigt vetenskapligt/konstnärligt (1)
Författare/redaktör
Ekstedt, Mathias (4)
Mitrokotsa, Aikateri ... (3)
Torra, Vicenç (3)
Awad, Ali Ismail (2)
Wang, Qinghua (2)
Johnson, Pontus (2)
visa fler...
Fischer-Hübner, Simo ... (2)
Baudry, Benoit (2)
Holm, Hannes (2)
Almgren, Magnus, 197 ... (2)
Ekstedt, Mathias, 19 ... (2)
Hedström, Karin, 196 ... (2)
Hacks, Simon, 1988- (1)
Wästlund, Erik, 1969 ... (1)
Magnusson, Christer (1)
Yngström, Louise (1)
Khalaf, Ashraf A.M. (1)
Hamed, Hesham F.A. (1)
Khan, K (1)
Gehrmann, Christian (1)
Kounelis, Ioannis (1)
Eklund, David (1)
Rachid, MH (1)
Malluhi, Q (1)
Erbad, A. (1)
Bhamare, Deval (1)
Abril, Daniel (1)
Navarro-Arribas, Gui ... (1)
Felderer, Michael, 1 ... (1)
Sabelfeld, Andrei, 1 ... (1)
Andersson, Annika, 1 ... (1)
Basagiannis, S. (1)
Kitkowska, Agnieszka (1)
Durst, Susanne, Dr. ... (1)
Franke, Ulrik (1)
Martucci, Leonardo, ... (1)
Islami, Lejla (1)
Islam, M. Sirajul, 1 ... (1)
Kowalski, Stewart (1)
Höglund, Joel (1)
Alani, Mohammed M. (1)
Rambusch, Jana (1)
Alexiou, Nikolaos (1)
Petridou, S. (1)
Papadimitratos, Pana ... (1)
Russo, Alejandro, 19 ... (1)
Papatriantafilou, Ma ... (1)
Tudor, Valentin, 198 ... (1)
Kävrestad, Joakim, 1 ... (1)
Jain, R (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (20)
RISE (9)
Örebro universitet (6)
Chalmers tekniska högskola (6)
Karlstads universitet (6)
Uppsala universitet (4)
visa fler...
Högskolan i Skövde (4)
Stockholms universitet (3)
Högskolan Kristianstad (2)
Umeå universitet (2)
Luleå tekniska universitet (2)
Mälardalens universitet (2)
Linköpings universitet (2)
Jönköping University (2)
Lunds universitet (2)
Linnéuniversitetet (1)
Karolinska Institutet (1)
Blekinge Tekniska Högskola (1)
visa färre...
Språk
Engelska (59)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (40)
Teknik (21)
Samhällsvetenskap (5)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy