Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

Session: Information Security

71 articles
Proceedings Article

A QoS-based service composition optimization method

Wang Xiaolong, Zou Peng, He Jun, Wang Peng, Chen Liang
With the development of web services technology, service composition gradually call people's attention, and how to improve the efficiency of Web service composition is the focus of research. In this paper, in order to improve the QoS (i.e., Quality of Service) of composition service, first of all using...
Proceedings Article

A method based on compressive sensing to detect community structure using deep belief network

Zhang Liangliang, Wu Haijia, Feng Jing, Zhang Xiongwei
A deep learning scheme based on compressive sensing to detect community structure of large-scale social network is presented. Our contributions in this work are as follows: First, we reduced the high-dimensional feature of social media data via compressive sensing by using random measurement matrix;...
Proceedings Article

Identity-based Remote Authentication and Key Agreement Protocol with Anonymity

Jianjun Zhang, Qiwu WU
Most of the existing identity-based remote authentications with key agreement schemes are not designed for protecting user’s privacy. If the users’ identity is sent with plaintext in the authentication with key agreement scheme, the attackers can track the users’ action trajectory. This paper presents...
Proceedings Article

Deployment and Performance Evaluation of Virtual Network based on OpenStack

Zhao Shaoka, Li Liyao, Yang Jiahai, Xu Cong, Ling Xiao, Huang Shuxiao
In the context of the ever-developing virtual network, OpenStack officially launches its new network component-Quantum, but the comparative performance between single-host and multi-host deployment is yet unknown. The paper introduces detailed deployment strategies of single-host and multi-host after...
Proceedings Article

Architectural Support for Lease-Regulated Secret Data

Ren Lanfang, Bai Hongtao, Liu Fei
Contemporary cloud software stack is large and complex, where security vulnerabilities are routinely discovered. Hence, it is hard or even impossible to place trust on such a fragile platform to process some security-critical data. In this paper, we propose an architectural solution that extends processors...
Proceedings Article

Dependability Modelling and Evaluation of Cyber-Physical Systems: A Model-Driven Perspective

Xiaojing Hu, Shixi Liu, Guilin Chen, Cuiqing Jiang
The strong coupling of software and physical processes in the emerging field motivates the development of new methods to respond to dependability in both the cyber and physical domains. Two kinds of definitions of Cyber-Physical System (CPS) from the view of resource, service and process is presented....
Proceedings Article

Robust cepstrum device fingerprint of proximity coupling RFID tags

Yuan Honglin, Zhang Guoan
A novel device fingerprint (DF) based on the hardware property of RFID tags is proposed to enhance the privacy protection and information security of RFID system. The received signal of proximate tag is processed with quadrature down-conversion, cepstrum analysis, etc., the result is called cepstrum...
Proceedings Article

A Detecting and Defending Method of Wormhole Attack Based on Time Ruler

Lv Guoyuan, Wang Yiming, Zhu Canyan, Chen Rong, Wang Lujie
Wormhole attack is a severe attack in mobile ad hoc networks, which is particularly challenging to defend against. In this paper, a new method defined as time ruler using distance measurement for detecting wormhole attack is proposed including its hypothetical model, the concept of time ruler and the...
Proceedings Article

Distributed Hybrid Cloud Architecture Based on China Education Research Network for Common Computer Test

Shi Gang, Wang Chongguo
This paper provides a hybrid cloud architecture for Computer Grade Test for Universities in Xinjiang based on China Research Education Network (CERNET), gives the resolving scheme for security, load balancing and disaster backup and develops the prototype system. The hybrid cloud architecture for Xinjiang...
Proceedings Article

The Architectural Based Interception and Identification of System Call Instruction within VMM

Xiong Haiquan, Liu Zhiyong
To solve the problem that VMM cannot monitor and control Guest OS system call instructions due to their non-trapping property, this paper propose an idea that make these instructions trap into VMM through breaking their normal execution conditions so as to cause exception. As to the three different system...
Proceedings Article

Research on the Secrecy Achievable Rate Region for the Broadcast channel with eavesdropper

Zhu Yan, Chen Xiao, Zhou Yongkai, Li Fangbiao, Pang Liang, Yin Xinxing, Xue Zhi
This paper considers the problems of the achievable rate regions on broadcast channel with the eavesdropper. Many articles have given the meaningful results, like the inner bound of this model. However, the specific analysis processes for this model have not been given by previous work. So we focus on...
Proceedings Article

A3: Automatic Analysis of Android Malware

Zhang Luoshi, Niu Yan, Wu Xiao, Wang Zhaoguo, Xue Yibo
Recently, Android malware is spreading rapidly. Although static or dynamic analysis techniques for detecting Android malware can provide a comprehensive view, it is still subjected to time consuming and high cost in deployment and manual efforts. In this paper, we propose A3, an Automatic Analysis of...
Proceedings Article

Review of Aircraft Aerodynamic Force Parameters Identification based on the Intelligent Algorithm

Wang Yufei, Xu Jiacun, Ge Shen, Lu Chen
Aerodynamic force parameter identification is the main measure of aerodynamic numerical simulation and wind tunnel test results verification. The wide use of intelligent control in the control field provides a new way to resolve the problem for system identification.Due to the global search optimization...
Proceedings Article

A new SS-closedness in L-topological spaces

Bai Shi-Zhong, Zhang Fang-Juan
By means of strongly semi-open L-sets and their inequality, a new form of SS-closedness is introduced in L- topological spaces, where L is a complete De Morgan algebra. This new form does not depend on the structure of basis lattice L and L does not require any distributivity. When L is a completely...
Proceedings Article

Multi-Sub-Swarm PSO Classifier Design and Rule Extraction

Chang Yanwei, Yu Guofang
In this paper, a new classifier, based on multi-sub-swarm PSO algorithm, is proposed. Natural number coding is used in the classifier to avoid the updating inconvenience of binary encoding that has different properties dimensions. Classification is done by parallel search of multi-sub-swarm PSO algorithm....
Proceedings Article

PeANFIS-FARM Framework in Defending against Web Service Attacks

Chan Gaik-Yee, Lee Chien-Sing, Heng Swee-Huay
Internet-enabled Web Service (WS) applications, such as e-commerce, are facing eXtensible Markup Language (XML)-related security threats. However, network and host-based intrusion (ID) and prevention (IP) systems and Web Service Security (WSS) standards are inadequate in countering against these threats....
Proceedings Article

Design Task Modeling and Task Allocation Method Research Based Multi-granularity Space in Distributed Network Environment

Cao XiaoBo, Xu ChengDong, Hu ChunSheng
To realize reasonable design task modeling and high efficiency task collaboration and allocation in complicated design process, a design task model based granular space is proposed, and cross-stage collaboration mode and task allocation method are discussed. Firstly, combining study results of Collaboration...
Proceedings Article

Rounding error type random number generator designed by subspace projection

Tsai Jer-Ming, Chen I-Te, Tzeng Jengnan
Since the limitation of real number representation of digital number, rounding error has existed almost everywhere in numerical computation. Some mathematical algorithm that should be finite steps will become infinity iterations due to the existence of rounding error. Using this property, we designed...
Proceedings Article

A Secure Mobile Payment Model

Chang Tao-Ku
Mobile devices are most ubiquitous, consumers can now use their mobile devices to pay for a wide range of services and digital or physical goods. However, consumers’ security concerns are a major barrier to broad adoption and use of mobile payments. In this paper, we design a secure payment model in...
Proceedings Article

A Probabilistic Encryption Way in Knapsack PKC

Wang Zuxi, Yu Baimu
with the proposed of quantum computers, the knapsack public-key cryptosystem (PKC) becomes very popular. At present the most significant challenge towards knapsack PKC is lattice attack, and density is one of the most important factors to measure the security of it. In this paper, we introduce a probabilistic...
Proceedings Article

The Secrets of Skype Login

Qi Po, Du Cuilan, Ren Yan, Xue Yibo
Skype is beyond any doubt the most popular VoIP application on the Internet. Its amazing success has drawn the great attention of telecom operators and the research communities, both are interested in knowing its internal mechanism, characterizing its traffic, and understanding its users’ behavior. However,...
Proceedings Article

Integral Attacks on Feistel-SP Structure Block Cipher

Li Yanjun, Wu Wenling, Zhang Lei, Zhang Liting
In this paper, a method is presented to extend the length of integral distinguisher of Feistel-SP structure, based on which a new 8-round distinguisher for the block cipher Camellia is proposed. Moreover, integral attacks on round-reduced Camellia without FL/FL-1 are improved. We attack 11-round Camellia-128...
Proceedings Article

Intuitionistic Fuzzy Multiple Model Tracking Algorithm for Manoeuvring Target

Zhao Renhou, Zhou Xiaoguang, Zhang Lili
A tracking algorithm for maneuvering target based on intuitionistic logic inference is developed in this paper. Firstly, in order to simply the calculation, the filtering measurement innovations tacked with the innovation covariance are used as the inputs for the intuitionistic fuzzy inference system...
Proceedings Article

Defending Against SYN Flood Attack under Asymmetric Routing Environment

Tao Jianxi, Zhou Li, Zhou Zhou, Yang Rong, Yang Wei, Liu Qingyun
SYN Flood attack is still one of the major distributed denial of service attacks. Any network device or computer system with connection state table may have the possibility of suffering from this attack. Moreover, under asymmetric routing environment, unidirectional traffic problem makes it more difficult...
Proceedings Article

Bivariate Classification of Malware in JavaScript using Dynamic Analysis

Gupta Yash, Bansal Divya, Sofat Sanjeev
JavaScript is used as an attack vector to infect webpages to gain access to user’s information. We present a tool that will dynamically analyze and perform bivariate classification of webpages as malicious or benign. We categorized the general behavior of JavaScript using datasets of known benign and...
Proceedings Article

Design of a Wireless Networks Detection and Management System Based on a Mobile Terminal

Zhang Zhen-jiang, Zhang Mei-kui, Xia Lei, Shi Hua-yu
In this paper, we present a wireless networks management system based on a mobile terminal detector. The system is designed on C/S architecture, consisting of client and server software, a centralized database and a data sharing in-sync mechanism. It helps to detect wireless access point devices automatically....
Proceedings Article

Performance Modeling for Helper Thread on Shared Cache CMPs

Cai Min, Gu Zhimin, Fu Yinxia
In data intensive applications of Cloud Computing such as XML parsing, large graph traversing and so on, there are a lot of operations to access irregular data. These data need be timely prefetched into the shared cache in CMPs by helper thread. However, a bad prefetching strategy of helper thread will...
Proceedings Article

Multi-Attribute Decision-Making Based Trusted Multipath Routing in Mobile Ad Hoc Networks

Xue Qi, Dong Qingkuan, Li Qing
Mobile Ad Hoc networks (MANETs) are a kind of acentric and self-organizing multi-hop wireless network. Topology changes frequently in mobile Ad Hoc networks. Node’s energy, bandwidth and computation capability are limited. In addition, the open links are vulnerable to network attacks. Therefore the problems...
Proceedings Article

Access Control Framework for Android System

Guo Tao, Zhang Puhan, Liang Hongliang
Protection for confidentiality and integrity of information is a very critical requirement for many mobile device users. Currently, malicious software on the Android platform often achieve the purpose of privacy theft and malicious chargeback by sending short messages, making phone calls or network communication...
Proceedings Article

On the period factor of quasigroups

Tan Yonghua, Xu Yunqing
Quasigroups are algebraic structures closely related to Latin squares which have many different applications. Nonlinear pseudo random sequences based on quasigroups have important applications in cryptography. The quasigroups which generate nonlinear pseudo random sequences with large periods are only...
Proceedings Article

An Improved Multimedia Conference System with Load Balance

Yundu Zhang, Yanlei Shang
With the development of economics and the globalization of trade, the Multimedia Conference System is now widely used and the number of its users increases exponentially. But a single server can’t handle the high concurrent user requests effectively. In this paper, we improved the Multimedia Conference...
Proceedings Article

Research on the access and security Technology of Radio-on-Fiber in Power Communication

Xu Sheng, Wu Yijie, Tao Jia
With the optical fiber communication and wireless communication technology advantage, Radio-on-Fiber (RoF) technology is a good way to solve the problems of bandwidth flexibility security and the electromagnetic interference, and its related technologies have attracted wide attention. With the construction...
Proceedings Article

A method for designing Hash function based on chaotic neural network

He Bo, Lei Peng, Pu Qin, Liu Zhaolong
The neural network model has complex nonlinear behavior, which is very useful to design encryption algorithm and Hash function. In this paper, an algorithm for constructing one-way hash function based on chaotic neural network is proposed. The neural network model is initialized by two chaotic maps....
Proceedings Article

Research on Authentication Method for Virtual Desktop System based on CPK

Lei Ju, QiaoYu Liu, YaPing Chi
Virtual desktop technology separates the users and the resources, contributing to terminal security solutions and improvement of resource utilization. It also provides the convenience for the centralized management of resources. But the introduction of virtualization technology also makes unique safety...
Proceedings Article

De-identification of free-text medical records in health information exchange

Tian-shu Zhou, Peng-fei Li, Jing-song Li
Since the health information exchange (HIE) becomes more and more important and numerous systems have been implemented among medical institutions and regions, there also grows the concern of data security and privacy protection. In the prior work, we have designed and developed an international clinical...
Proceedings Article

The Study of Improved FP-Growth Algorithm in MapReduce

Sun Hong, Zhang Huaxuan, Chen Shiping, Hu Chunyan
As FP-Growth algorithm generates a great deal of conditional pattern bases and conditional pattern trees, leading to low efficiency, propose an improved FP-Growth(IFP) algorithm which firstly combine the same patterns based on the situation whether the support of the transaction is greater than the minimum...
Proceedings Article

VMPmonitor: An Efficient Modularity Approach for Hidden Process Detection

Cui Chaoyuan, Wu Yun, Li Ping, Wang Rujing
With the development of the Cloud computing, more and more people are accustomed to resource sharing or online shopping. And malware has become a major threat to the Cloud safety. Process hiding is a powerful technique commonly used by stealthy malware to evade detection by anti-malware. In this paper,...
Proceedings Article

Design and Implementation of the Monitoring System for Critical Documents

Gaofeng Huang, Xueguang Zhou
How to secure the storage and transmission of computer’s information has always been a hot topic. This paper presents a document monitoring and protecting system on Windows platform. The system realizes the real-time monitoring and protection of user's critical documents, as well as giving early warning...
Proceedings Article

Adaptive Watermarking Algorithm for Digital Image Based on Discrete Cosine Transform

Zou Xinguo, Li Na
In this paper, an adaptive watermarking algorithm is proposed for digital image based on Discrete Cosine Transform. The algorithm uses the common resampling method (bilinear interpolation) to adaptively adjust the size of the binary watermark, and scrambles it via the encryption key, finally embeds it...
Proceedings Article

The Mechanism of Tencent QQ Video Communication

Chen Xiaoxian, Yuan Zhenlong, Xue Yibo
The supernormal growth of QQ has outdistanced all the expectations and the number of users has reached up to 780 million till the end of 2012. At the same time, QQ causes several intractable issues, such as generating huge traffic, especially for the great video traffic. However, owing to proprietary...
Proceedings Article

Design and Implementation of Data Encryption in Cloud based on HDFS

Cheng Zhonghan, Zhang Diming, Huang Hao, Qian Zhenjiang
As an open-source distributed programmingframework, Hadoop hasgradually becomepopular in industry recently. Its distributed file system (HDFS) enables storing large data with advantages of high fault tolerance and throughput. However, the fact that the current HDFS does not support intra-cloud data encryption...
Proceedings Article

Cryptographic classification of quasigroups of order 4

Liu Guohao, Xu Yunqing
Edon80 is a stream cipher design that had adva-nced to the third and last phase of the eSTREAM project. The core of the cipher consists quasigroup string e-transformations and it employs four quasigroups of order 4. The employed qua-sigroups have influence on the period of the key-stream. There are 576...
Proceedings Article

Reliability Modeling of Working-Table Production Oriented MANET

Zhifeng Zhao, Cheng Zhong, Xibin Zhao, Lixin Tian
With the serious environment of most of shops in manufacturing, MANET( Mobile ad hoc network) is introduced into our scheme that the communication network is basic of Manufacturing Execution System (MES). MANET is a kind of dynamic wireless communication network that does not rely on a fixed infrastructure...
Proceedings Article

Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security

Huang Shuanglin, Tan Jianjun
Abstract—In this paper, the case of one source-destination pair with the help of multiple cooperating nodes in the presence of one eavesdropper was considered to improve the performance of secure wireless communications. A novel cooperative scheme decode-and-forward plus cooperative jamming(DFCJ) was...
Proceedings Article

MIC Acceleration of Saliency Detection Algorithm

Zhou Changfei, Lu Kai, Chi Wanqing, Wang Xiaoping, Xiong Zhenhai
Image processing has important influence during the development of visualization. With the scale and the complexity of image data expanding, it is becoming more and more difficult for image processing and target analysis. Saliency area detection of image processing, especially, visual attention is playing...
Proceedings Article

Intuitionistic Fuzzy Neural Networks based on Extended Kalman Filter Training algorithm

Zhou Xiaoguang, Zhao Renhou, Shang Xiumin, Zhang Lili
In this paper, an intuitionistic fuzzy neural network model is proposed The network structure has five layers, and adopts Mandani’s fuzzy reasoning. A new fuzzy inference system is applied in the model, which contains hesitation margin as a part. A training algorithm based on Extended Klaman Filter(EKF)...
Proceedings Article

IPv6 marked packets preprocessing scheme research based on Hash table

Li Ming-zhen, Luo Fu-gui, Wei Jing
Packet marking technology is one of IP traceback technology, which contains two parts of packet marking and path reconstruction. The efficiency of entire algorithm depends on both packet marking and path reconstruction. At present, the research on packet marking technology is mainly about packet marking...
Proceedings Article

Active Defense strategies selection for network mixed malicious action

Yong-qiang Chen, Xiao-ping WU, Yu Fu
In order to deal with the problems that defense measures are not been take into accounted and the return of the unit cost in network security analysis, a active defense strategies selection method for network mixed malicious actions was proposed. Firstly, a network security mixed game model was presented...
Proceedings Article

A Real-Time Authentication Method Based on Cursor-hidden Scene

Zicheng Wei, Xiaojun Chen, Yiguo Pu, Rui Xu
Identity theft, as a common insider attack method, is difficult to detect because it is hard to distinguish the legal user from the masquerader with a stolen legal identity. Compared with traditional identity authentication method such as password or fingerprint, behavior biometrics based on HCI (Human-Computer...
Proceedings Article

Optimal Analysis of Joint Masked-Beamforming in Secure Wireless Communication

Zhou Yongkai, Chen Xiao, Yin Xinxing, Zhu Yan, Li Fangbiao, Pang Liang, Xue Zhi
In this paper, we considered the joint maskedbeamforming in secure wireless transmission in which artificial noise is sent by the transmitter (Alice) and the receiver (Bob) jointly. A new and efficient optimization scheme is proposed to separately allocate the power ratio for Alice and assign the transmit...
Proceedings Article

Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE

Jian Bai, Yatao Yang, Zichen Li
Accompany with the developing of the cloud computing, a public-key cryptosystem which is efficiency and homomorphic will have a wide application. Through analyzing the public-key cryptosystem, which is designed by Oded Regev and based on LWE (Learning with errors), in details, our main results are optimizing...
Proceedings Article

A Network Registration Model with Hidden Real Name

Chen Kan, Xiong Yueshan, Zhu Peidong
The openness and anonymity of Internet allow people joining in without identity validation, resulting in a trustless environment and bringing about many security problems, such as privacy exposure, rumor spreading, deception and social panic making. The root of these problems is that users use pseudonyms...
Proceedings Article

A RESTful Web Service for Information Platform of Intelligent Transportation

Wu Ming, Liu Min, Lu Jianfeng
With the development of intelligent transportation, a large amount of heterogeneous data has emerged from various sensors and terminal applications. An efficient approach to process data is needed in information platform of intelligent transportation system (ITS). This paper presents a lightweight Representational...
Proceedings Article

Application of An Improved DBSCAN Algorithm in Web Text Mining

Ping Xie, Lin Zhang, Ying Wang, Qinqian Li
This paper studies the characteristics and key technology of Web text mining, and puts forward an improved DBSCAN density clustering algorithm.The algorithm combines the characteristics of hierarchical clustering effectively, it can confirmed class center well,and make the neighborhood parameter r self-adapt...
Proceedings Article

Detecting Spam on Sina Weibo

Ma Yingcai, Niu Yan, Ren Yan, Xue Yibo
Online social network becomes greatly prevalent and evolves a communication channel for billions of users. Unfortunately, due to the ease of reaching these users, it has been penetrated by spammers who post inappropriate content. After revealing the transmission mechanism of the spam, an automatic detecting...
Proceedings Article

Detecting Machine Generated Domain Names Based on Morpheme Features

Wei-wei Zhang, Jian Gong, Qian Liu
To detect machine generated domain names, we proposed a method to exclude human generated domain names by analyzing the basic morphemes in the character strings of domain names (The basic morphemes in English are word roots and affixes while in Chinese are initials and finals). Experimental results show...
Proceedings Article

Research on Longest Backward Segmentation for Context

Huang Weichun, Jiang Jianjian
Segmentation is the basis of Chinese information processing. This paper presents us the algorithm about longest backward context for Chinese word segmentation, this method does not require labeling or semantic information, also not mechanically segment words, but automatically find word errors by real-time...
Proceedings Article

A Parallel Clustering Method Study Based on MapReduce

Zhanquan Sun
Clustering is considered as one of the most important tasks in data mining. The goal of clustering is to determine the intrinsic grouping in a set of unlabeled data. It has been widely applied to many kinds of areas. Many clustering methods have been studied, such as k-means, Fisher clustering method,...
Proceedings Article

Online Community Perceiving Method on Social Network

Jiang Jingchi, Yi Chengqi, Bao Yuanyuan, Xue Yibo
How to perceivecommunity with the same interests and hobbies on social network is a critical problem for advertisement, promotion and network security. In this paper, we propose a novel method for online communityperceiving, which contains three user-level filtering layers: user profile, user behavior...
Proceedings Article

Space Target Identification based on RBF Neural Network Ensembles

Zhao Jubo
Space target identification is very important to space security. In practice, identification of satellites from space images is very useful and difficult. After preprocessing of space images, the object in the space images need to be classified as satellites or not using classification algorithms. In...
Proceedings Article

Optimizing Live Migration of Virtual Machines with Context Based Prediction Algorithm

Cui Yong, Lin Yusong, Guo Yi, Li Runzhi, Wang Zongmin
With the increasing use of Virtual Machine (VM) in data center, live migration of virtual machine has become a powerful and essential instrument for resource management. Although the prevailing Pre-copy algorithm might perform well on the stage of lightweight, it cannot guarantee a desirable performance...
Proceedings Article

A Design and Application of Tilt Angle Algorithm Based on the 3-axis Acceleration Sensor

Wu Xianzhen, Wu Zejun, Zhao Boya, Wang Mingjiang
This article proposes an algorithm for detecting the direction and the magnitude of the tilt angle based on BMA 150—a 3-axis acceleration sensor, and a page-turning function in Android daily application software is implemented based on this algorithm. This paper firstly introduces the architecture of...
Proceedings Article

TCPI: A Novel Method of Encrypted Page Identification

Xia Wei, Yuan Zhenlong, Xue Yibo
Encrypted Page Identification (EPI) has been increasingly attracted much attention in recent years. Traditional methods now face challenges due to the emergence and development of HTTPS and Cloud Computing. To address this issue, we analyze HTTPS communication mechanism and present algorithm of Calculation...
Proceedings Article

The Design and Realization of the Test Scheme OpenVPN, Based on Message Simulation

Zhan-sheng Hou, Min Xu, Li-peng Zhu, Lin Peng, Bin Hu
This paper studied the SSL protocol and the principle of OpenVPN, proposed a hardware-based encryption access system OpenVPN, which drawn the block diagram of design structure, In view of the problem of OpenVPN concurrent test, general concurrent test based on the recording and playback mechanism, constitute...
Proceedings Article

Digital image watermarking in power system security

Ping Xie, Xi Wang, Ying Wang, Jiehui Liu
In this paper, the digital image watermarking algorithm based on lifting scheme wavelet transform and singular value decomposition (SDV) is proposed and performed on the transmission of the electricity price.It scrambles electricity price to get a set of random watermark signal sequence, uses the ideas...
Proceedings Article

Research on the Performance of Encryption Techniques for High-Bandwidth Multicast Video Streaming

Li Shanxi, Chen Wenbo, Shang Zhihao
Recently, high-bandwidth streaming media security is becoming more important to the continuous increase of the wide application of multimedia and the improvement of image processing on the internet. However the tradition data encryption solutions are not appropriate for such a high-bandwidth streaming...
Proceedings Article

Research on the Vulnerability of MIMO Secrecy using AN Matrix Blind Space Elimination

Chen Xiao, Zhu Yan, Yin Xinxing, Li Fangbiao, Xue Zhi, Zhou Yongkai, Pang Liang
The security problem of Gaussian MIMO (multiple-inputs multiple-outputs) channel is considered where a transmitter is communicating to a receiver in the presence of an eavesdropper. All the nodes are equipped with multiple antennas. Through utilizing some of the available power to produce ‘artificial...
Proceedings Article

Initially Cognitive Computation with Self-Organization Strategy for Securely Humanized Human-Machine Interactions

Z.-Z. Liu Charles
This brief paper addresses the issue of human machine interaction with consideration of security and humanization both. Initially Cognitive Computation (ICC) has been proposed and described with an illustration combining with a surveillance ICC framework with its application scene and process. Considering...
Proceedings Article

Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm

Fu Jun, Yang Huan, Liang Yiwen, Tan Chengyu
Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of the evasion mechanisms used by common software keyloggers, we established a framework for their detection. Mimicking user keystrokes, the framework we built could induce keyloggers...
Proceedings Article

Vulnerability Mining Techniques in Android Platform

Zhang Wei, Cao Chengzhi, Liu Wenqing, Jin Yiran
Android is a mainstream smart phone platform. Vulnerability mining work in android platform has become one of the most careful subjects in information security field. This paper combined the vulnerability mining research results of traditional PC platform with the features of android platform to analyze...
Proceedings Article

A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks

Chen Liquan, Hu Aiqun, Huang Jie, Virkki Johanna
As an important application mode of Internet of Things, Machine-to-Machine (M2M) networks have gained more and more concerns. However, the security problems such as privacy protection and platform authentication in M2M networks are not fulfilled the requirements yet. Since the M2M devices are always...