The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of today's machine learning (ML) systems are composed by an array of primitive learning modules (PLMs). The heavy use of PLMs significantly simplifies and expedites the system development cycles. However, as most PLMs are contributed and maintained by third parties, their lack of standardization or regulation entails profound security implications. In this paper, for the first time, we demonstrate...
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
Web applications commonly provide a high attack surface. In today's world of high impact attacks, protecting them against both known and unknown attacks becomes more important than ever. We present an approach of machine learning based anomaly detection to flexibly detect anomalous requests. Our approach leverages long short-term memory (LSTM) neural networks to learn a detailed model of normal requests...
In a complicated cloud storage environment in which users upload a large number of files everyday, in order to better solve the challenge of inefficient malicious detection and weak adaptability of multi-platform detection in the traditional way, we propose a malicious file detection method which is based on image texture analysis and BP neural network algorithm. By combining the technology of image...
The app repackaging has became one of the most serious problems on Android platform nowadays. In the past, most of studies focus on the code detection, which deals with the billion opcodes, thus time consumption is expensive. Besides, it lacks the resistance to code obfuscation and hardening technology thus accuracy will easily be affected. Recently, UI-based detection was proposed. Some dynamic UI-based...
App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although most research involves pairwise similarity comparison to distinguish repackaged apps from their "original" counterparts, no work has considered the threat to validity of not being able...
There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate with each other (i. e., Vehicle to Vehicle, V2V) or with the infrastructure (i. e., Vehicle to Infrastructure, V2I) on a wireless basis. This paper presents an improved traffic monitoring system for VANET applications via a proposed security scheme. Specifically, the proposed model analyzes the monitored...
Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi-step attack contains one or more zero-day exploits. Detecting zero-day attack paths in time could enable early disclosure of zero-day threats. In this paper, we propose a probabilistic approach to identify zero-day attack paths and implement a prototype system named ZePro....
The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter PUF is reported to be attacked by forcing them to...
There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection...
One of the most accurate biometric authentication methods is iris pattern. It has the advantages of being stable, contactless and no user's previous knowledge is required. This paper presents an iris recognition system for user authentication. To design the proposed iris authentication system we reviewed and evaluated four iris pattern recognition features including Histogram of Oriented Gradients...
This paper presents a liveness detection method based on tracking the gaze of the user of a face recognition system using a single camera. The user is required to follow a visual animation of a moving object on a display screen while his/her gaze is measured. The visual stimulus is designed to direct the gaze of the user to sets of collinear points on the screen. Features based on the measured collinearity...
In this paper we present a fast, interactive method for collecting structural primitives from objects of interest contained within manually selected image regions. The input image is projected onto a Max-Tree and Min-Tree structure from which a pixel-to-node mapper marks the nodes of each tree that correspond to peak components explicitly contained within the selected window. In a pass through the...
This paper proposes a robust and adaptive method of normalcy decision in video surveillance security system. It is a challenging problem since no technology can provide satisfactory performance up to now in the state of art of video security surveillance system, especially in automatic normalcy decision. The implementation of the intelligent security using the framework of video surveillance needs...
For distinguish the LSB (Least significant bit) replacement stego image from MLSB (Multiple least significant bits) stego image, which are two typical kinds of steganographical methods of image spatial domain and have been applied widely, a classification algorithm based on the shift of pixel value and irrelevance of pixel pairs is proposed. In this algorithm, a shift operator is adopted for each...
Lately, dorsal hand vein pattern is gaining popularity in biometric security system due to its uniqueness and stability. Though dorsal vein patterns are not complex, this does not reflect in its extraction and representation. Various existing methods consider vein pattern as straight lines or use some of its features like ending points and bifurcation points for its representation. However, this type...
The spectral minutiae representation introduced in this paper is a novel method to represent a minutiae set as a fixed-length feature vector, which is invariant to translation, and in which rotation becomes translation that can be easily compensated for. These characteristics enable the combination of fingerprint recognition systems with a template protection scheme that requires a fixed-length feature...
Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each...
Biometrics play an important role in modern access control systems to overcome the problems of forgotten, stolen or easily-guessed passwords. With the recent developments in cryptography, hashing and random number generation, biometrics and cryptography are combined in new generation cryptosystems. In this paper, it is aimed to produce a unique binary biometric identity code (bit string) by using...
A simple yet effective tactic for secure steganography is proposed in this paper that can resist the blind steganalysis. In this method author derives a matrix based on the image content and thus providing the security. This matrix is used by quantization index modulation (QIM) based encoder and decoder. The embedding location of data is also randomized so as to immobilize the self calibration process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.