-
1361
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
1362
Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme
Published 2024-01-01“…With this enhancement, the robustness of color image watermarking algorithms against geometric attacks has taken a significant leap forward, the normalized correlation coefficient of quantization watermarking algorithm, which could not resist rotation attack, is now stable above 0.9. …”
Get full text
Article -
1363
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems
Published 2023-03-01“…At any moment, there is a possibility that a third party with an identity attack can be placed between AWS and CPS and listen to or manipulate the data sent. …”
Get full text
Article -
1364
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01“…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
Get full text
Article -
1365
Smart Approach for Botnet Detection Based on Network Traffic Analysis
Published 2022-01-01“…Today, botnets are the most common threat on the Internet and are used as the main attack vector against individuals and businesses. …”
Get full text
Article -
1366
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01“…The theoretical analysis and experiment results show that the proposed protocol is safe and efficient, which can effectively prevent data tampering, identity forging, replay attacks and man-in-the-middle attacks. Else the proposed protocol provides a practical solution on identity authentication and key agreement in hybrid clouds with less computation and communication overheads.…”
Get full text
Article -
1367
Public key searchable encryption scheme based on blockchain
Published 2020-04-01“…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
Get full text
Article -
1368
Cloud data anonymous assured deletion approach based on blockchain
Published 2021-03-01“…The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity, exposing user behavior to the cloud service provider or attackers.Aiming at the above problems, an assured deletion approach based on blockchain was proposed.The improved linkable ring signature scheme was adopted to make user achieve anonymous assured deletion by setting specific link symbol in the signature.Moreover, the blockchain technology was leveraged to guarantee the nonrepudiation of assured deletion.Theoretical analysis and experimental results show that the proposed approach can meet the assured deletion requirements of user data in cloud storage, and its anonymity can effectively prevent attackers from tracking and analyzing user behavior.…”
Get full text
Article -
1369
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01“…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
Get full text
Article -
1370
Mimic storage scheme based on regenerated code
Published 2018-04-01“…Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.…”
Get full text
Article -
1371
An ownership transfer protocol for wearable devices
Published 2015-12-01“…Recently,wearable devices acted as a kind of smart devices are changing people’s life style.When these devices are used in multi-user setting,ownership transfer should usually be considered.To resolve the security and privacy problems introduced in the ownership transfer process of wearable devices,a secure ownership transfer pro-tocol including initialization,mutual authentication and key change for wearable devices was introduced.The secu-rity analysis indicates that the proposed protocol can resist either normal channel attacks or special attacks appeared in the ownership transfer scenarios.The experiment results indicate that the proposed scheme is fairy efficient and is quite suitable for wearable devices.…”
Get full text
Article -
1372
Urban Terrorism: St. Peter’s Square, Vatican City
Published 2017-02-01“…In the wake of the 2015 Paris attacks that claimed 130 lives, and in response to FBI warnings about threats by the Islamic State terrorist group, stringent security measures were pre-emptively imposed on St. …”
Get full text
Article -
1373
Method for router online security risk assessment quantification
Published 2013-11-01“…The concept of router safety performance was proposed based on the nature of router security issues and router attacks were classified. Then a method for router online security risk assessment quantification was also presented.The security risk factor of service decline was calculated by router bandwidth consumption and average CPU usage and the security risk factor of privilege escalation was calcu ated by the possibility of threat occurrence and severity based on the router attack classification. …”
Get full text
Article -
1374
Structural properties and static robustness of Linux software network
Published 2019-11-01“…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
Get full text
Article -
1375
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01“…To overcome the shortcoming of current alert correlation methods which didn’t consider the confidence of IDS,an alert correlation method based on alerts confidence using the evidence theory was presented.Each alert was regarded as a piece of evidence of a network attack.Then multiple pieces of evidence were combined by the Dempster’s combina-tion rule,and used to infer whether the attack corresponding to the alerts took place.As a result,the ambiguity and con-fliction in alerts were eliminated,achieving the goal of improving alerts quality.Experimental results on the DARPA 2000 IDS test dataset show that the proposed method can efficiently decrease the false alert rate and reduce more than 60% of the alerts.…”
Get full text
Article -
1376
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01“…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
Get full text
Article -
1377
An intrusion detection model based on convolution neural network for Internet of vehicles
Published 2024-12-01“…In order to improve the accuracy of detecting the cyber-attacks in Internet of vehicles, hyper-parameter optimization convolution neural network-based ensemble Intrusion detection system (CNES) was proposed. …”
Get full text
Article -
1378
Automated intrusion response system model based on danger theory
Published 2012-01-01“…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
Get full text
Article -
1379
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Published 2012-01-01“…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
Get full text
Article -
1380
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…The rule set is capable of detecting known attacks, while the recurrent neural network has the advantage of detecting new attacks. …”
Get full text
Article