[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2897795acmotherconferencesBook PagePublication PagescisrcConference Proceedingsconference-collections
CISRC '16: Proceedings of the 11th Annual Cyber and Information Security Research Conference
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CISRC '16: 11th Annual Cyber and Information Security Research Oak Ridge TN USA April 5 - 7, 2016
ISBN:
978-1-4503-3752-6
Published:
05 April 2016
In-Cooperation:
Oak Ridge National Laboratory

Reflects downloads up to 18 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

This volume contains the papers presented at CISRC: Cyber and Information Security Research Conference held on April 5-7, 2016 at Oak Ridge National Laboratory in Oak Ridge, Tennessee.

Skip Table Of Content Section
research-article
PUF designed with Resistive RAM and Ternary States
Article No.: 1, Pages 1–8https://doi.org/10.1145/2897795.2897808

The designs of Physically Unclonable Functions (PUFs) described in this paper are based on Resistive RAMs incorporating ternary states with the objective to reduce false negative authentications (FNA) with low Challenge-Response-Pair (CRP) error rates. ...

research-article
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure
Article No.: 2, Pages 1–7https://doi.org/10.1145/2897795.2897810

The threshold scheme, the monotone circuit construction, and the vector space construction are some of the well-known secret sharing schemes in cryptography. The threshold and monotone circuit secret sharing schemes are fairly easy to construct for any ...

research-article
Trusted Information Exchange Using Trusted Network Processors
Article No.: 3, Pages 1–8https://doi.org/10.1145/2897795.2897809

Today's systems are increasingly complex consisting of many components designed by multiple competing vendors. Trust management relies heavily on situational awareness of the operating environment, and comprehensive knowledge of components and their ...

research-article
An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans
Article No.: 4, Pages 1–8https://doi.org/10.1145/2897795.2897811

This work presents a new class of Covert Hardware Trojan Horses (Covert HTHs), which can be algorithmically implanted with no change to their host circuit's functional behavior and without the need for additional unrelated logic. As a result, Covert ...

research-article
Experimentation Support for Cyber Security Evaluations
Article No.: 5, Pages 1–7https://doi.org/10.1145/2897795.2897812

To improve the information assurance of mission execution over modern IT infrastructure, new cyber defenses need to not only provide security benefits, but also perform within a given cost regime. Current approaches for validating and integrating cyber ...

research-article
A SCADA Intrusion Detection Framework that Incorporates Process Semantics
Article No.: 6, Pages 1–5https://doi.org/10.1145/2897795.2897814

SCADA security is an increasingly important research area as these systems, used for process control and automation, are being exposed to the Internet due to their use of TCP/IP protocols as a transport mechanism for control messages. Most of the ...

research-article
Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense
Article No.: 7, Pages 1–8https://doi.org/10.1145/2897795.2897815

Anti-censorship techniques are important as the ability to freely access information is key to a democratic society. This issue has become even more critical in the information age. In this paper, we present an anti-censorship scheme based on the use of ...

research-article
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
Article No.: 8, Pages 1–8https://doi.org/10.1145/2897795.2897801

Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming ...

research-article
Public Access
Dynamic Canary Randomization for Improved Software Security
Article No.: 9, Pages 1–7https://doi.org/10.1145/2897795.2897803

Stack canaries are a well-known and effective technique for detecting and defeating stack overflow attacks. However, they are not perfect. For programs compiled using gcc, the reference canary value is randomly generated at program invocation and fixed ...

research-article
Bringing Federated Identity to Grid Computing
Article No.: 10, Pages 1–8https://doi.org/10.1145/2897795.2897807

The Fermi National Accelerator Laboratory (FNAL) is facing the challenge of providing scientific data access and grid submission to scientific collaborations that span the globe but are hosted at FNAL. Researchers in these collaborations are currently ...

research-article
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness
Article No.: 11, Pages 1–8https://doi.org/10.1145/2897795.2897816

As the frequency, severity, and sophistication of cyber attacks increase, along with our dependence on reliable computing infrastructure, the role of Intrusion Detection Systems (IDS) gaining importance. One of the challenges in deploying an IDS stems ...

short-paper
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation
Article No.: 12, Pages 1–4https://doi.org/10.1145/2897795.2897819

This paper outlines a set of 10 cyber security concerns associated with Industrial Control Systems (ICS). The concerns address software and hardware development, implementation, and maintenance practices, supply chain assurance, the need for cyber ...

short-paper
Forecasting Zero-Day Vulnerabilities
Article No.: 13, Pages 1–4https://doi.org/10.1145/2897795.2897813

It seems that computer network defenders are always two steps behind attackers. This is due in part to the need for defenders to protect against the exploitation of zero-day vulnerabilities which they may not yet know exist. If network defenders were ...

short-paper
Practical implications and requirements of diversifying interpreted languages
Article No.: 14, Pages 1–4https://doi.org/10.1145/2897795.2897796

Instruction set randomization (ISR) provides a strong defense against all types of injection attacks, especially in interpreted environments. However, fully enabling a system to benefit from language interpreters that support programs diversified with ...

short-paper
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection
Article No.: 15, Pages 1–4https://doi.org/10.1145/2897795.2897806

This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets---...

short-paper
Detection of Tunnels in PCAP Data by Random Forests
Article No.: 16, Pages 1–4https://doi.org/10.1145/2897795.2897804

This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate ...

short-paper
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery
Article No.: 17, Pages 1–4https://doi.org/10.1145/2897795.2897805

Cyber security research has produced numerous artificial diversity techniques such as address space layout randomization, heap randomization, instruction-set randomization, and instruction location randomization. To be most effective, these techniques ...

short-paper
Xen Network Flow Analysis for Intrusion Detection
Article No.: 18, Pages 1–4https://doi.org/10.1145/2897795.2897802

Virtualization technology has become ubiquitous in the computing world. With it, a number of security concerns have been amplified as users run adjacently on a single host. In order to prevent attacks from both internal and external sources, the ...

short-paper
Linear Cryptanalysis of Quasigroup Block Cipher
Article No.: 19, Pages 1–4https://doi.org/10.1145/2897795.2897818

This paper presents the results of a linear cryptanalysis of quasigroup block cipher. The quasigroup block cipher is being developed for resource constrained environments, especially SCADA systems. Here we determine if any key material can be found by ...

short-paper
Public Access
The Application of Moving Target Defense to Field Programmable Gate Arrays
Article No.: 20, Pages 1–4https://doi.org/10.1145/2897795.2897820

Field Programmable Gate Arrays (FPGAs) are powerful and flexible pieces of hardware used in a variety of applications. These chips are used in monitoring network traffic, guidance systems, cryptographic calculations, medical devices, embedded systems, ...

short-paper
Scalable Attack Graph Generation
Article No.: 21, Pages 1–4https://doi.org/10.1145/2897795.2897821

Attack graphs are a powerful modeling technique with which to explore the attack surface of a system. However, they can be difficult to generate due to the exponential growth of the state space, often times making exhaustive search impractical. This ...

short-paper
Public Access
Network Modeling for Security Analytics
Article No.: 22, Pages 1–4https://doi.org/10.1145/2897795.2897817

Comprehensive network modeling remains a challenge for the security analyst. Complete coverage and depth of detail in network models is difficult to achieve for large and complex networks, especially when significant effort in manual elaboration is ...

short-paper
Towards Selecting and Recommending Online Software Services by Evaluating External Attributes
Article No.: 23, Pages 1–4https://doi.org/10.1145/2897795.2897797

Selecting an online software service for a given set of requirements can be based on the quality of results (i.e., relative ranking of the services) and associated recommendations (i.e., applicability of the suggested services). Prevalent approaches for ...

short-paper
QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function
Article No.: 24, Pages 1–4https://doi.org/10.1145/2897795.2897798

In the recent years, silicon based Physical Unclonable Function (PUF) has evolved as one of the popular hardware security primitives. PUFs are a class of circuits that use the inherent variations in the Integrated Circuit (IC) manufacturing process to ...

short-paper
Classification of Insider Threat Detection Techniques
Article No.: 25, Pages 1–4https://doi.org/10.1145/2897795.2897799

Most insider attacks done by people who have the knowledge and technical know-how of launching such attacks. This topic has long been studied and many detection techniques were proposed to deal with insider threats. This short paper summarized and ...

short-paper
Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks
Article No.: 26, Pages 1–4https://doi.org/10.1145/2897795.2897800

We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass-the-Ticket, two prominent post-exploitation, credential theft attacks. An operating system's security resilience consists of its ...

Contributors
  • Oak Ridge National Laboratory
  • Oak Ridge National Laboratory
  • Oak Ridge National Laboratory
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

CISRC '16 Paper Acceptance Rate 11 of 28 submissions, 39%;
Overall Acceptance Rate 69 of 136 submissions, 51%
YearSubmittedAcceptedRate
CISRC '1722836%
CISRC '16281139%
CISR '15361850%
CISR '14503264%
Overall1366951%