No abstract available.
Front Matter
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch
During a computer security investigation, a security analyst has to explore the logs available to understand what happened in the compromised system. For such tasks, visual analysis tools have been developed to help with log exploration. They ...
ADAM: Automatic Detection of Android Malware
The popularity of the Android operating system has been rising ever since its initial release in 2008. This is due to two major reasons. The first is that Android is open-source, due to which a lot of mobile manufacturing companies use some form ...
Identification of Data Breaches from Public Forums
- Md. Akhtaruzzaman Adnan,
- Atika Younus,
- Md. Harun Al Kawser,
- Natasha Adhikary,
- Ahsan Habib,
- Rakib Ul Haque
Adversaries initiate their cyberattacks towards different entities such as healthcare or business institutes, and a successful attack causes data breaches. They publish their success stories in public forums for ranking purposes. The victim ...
A Forensic Framework for Webmail Threat Detection Using Log Analysis
Today, webmail is being used in a number of organizations for all kinds of important communications as they move to cloud-based services. Several cyber threats involving phishing, malicious insider, unauthorized access to data and ransomware ...
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations
Permutation-based symmetric cryptography has become increasingly popular over the past ten years, especially in the lightweight domain. More than half of the 32 second-round candidates of NIST’s lightweight cryptography standardization project are ...
Optimized Implementation of SHA-512 for 16-Bit MSP430 Microcontrollers
The enormous growth of the Internet of Things (IoT) in the recent past has fueled a strong demand for lightweight implementations of cryptosystems, i.e. implementations that are efficient enough to run on resource-limited devices like sensor ...
Limitations of the Use of Neural Networks in Black Box Cryptanalysis
In this work, we first abstract a block cipher to a set of parallel Boolean functions. Then, we establish the conditions that allow a multilayer perceptron (MLP) neural network to correctly emulate a Boolean function. We extend these conditions to ...
An Optimization of Bleichenbacher’s Oracle Padding Attack
In the present paper we propose an improvement of Bleichenbacher’s Oracle Padding Attack that makes breaking more restrictive implementations of the PKCS#1 v1.5 standard feasible both theoretically and in practice. It is proven that the current ...
Perfect Anonymous Authentication and Secure Communication in Internet-of-Things
The ever-expanding Internet-of-Things (IoT) does not only call for data security but also privacy. On the other hand, conventional secure communication protocols only consider confidentiality and integrity of data, where the anonymity of ...
Flexible Group Non-interactive Key Exchange in the Standard Model
In this paper, we constructed a non-interactive group key exchange protocol (GNIKE) with flexibility, i.e., the number of participants in the GNIKE is not predefined. Moreover, our GNIKE construction is only based on multilinear map and ...
A Multifunctional Modular Implementation of Grover’s Algorithm
Information security plays a major role in the dynamics of today’s interconnected world. Despite the successful implementation and effectiveness of modern cryptographic techniques, their inherent limitations can be exploited by quantum computers. ...
Lightweight Swarm Authentication
In this paper we describe a provably secure authentication protocol for resource limited devices. The proposed algorithm performs whole-network authentication using very few rounds and in a time logarithmic in the number of nodes. Compared to one-...
New Configurations of Grain Ciphers: Security Against Slide Attacks
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including Grain v0 and its revised version Grain v1. The latter was selected as a finalist of the competition’s hardware-based portfolio. The Grain family ...
Long-Term Secure Asymmetric Group Key Agreement
A group key agreement protocol allows a set of users to share a common secret in presence of adversaries. In symmetric group key agreement protocol, the set of users will have a secret key at the end of protocol while in an asymmetric group key ...
Building Deobfuscated Applications from Polymorphic Binaries
Along with the rise of the cyber threats industry, attackers have become more fluent in developing and integrating various obfuscation layers. This is mainly focused on impeding or at least slowing the analysis and the reverse engineering process, ...
Viruses, Exploits, Malware and Security Issues on IoT Devices
The necessity of using secure Internet-of-Things (IoT) devices in various use cases has increased over years. According with various analysis in the first half of the year 2021, there were 1.5 billion attacks on smart devices for stealing data, ...