2019
Authors
Resende, JS; Sousa, PR; Martins, R; Antunes, L;
Publication
INTERNATIONAL JOURNAL OF INFORMATION SECURITY
Abstract
There are many cryptographic protocols in the literature that are scientifically and mathematically sound. By extension, cryptography today seeks to respond to numerous properties of the communication process beyond confidentiality (secrecy), such as integrity, authenticity, and anonymity. In addition to the theoretical evidence, implementations must be equally secure. Due to the ever-increasing intrusion from governments and other groups, citizens are now seeking alternatives ways of communication that do not leak information. In this paper, we analyze multiparty computation (MPC), which is a sub-field of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. This is a very useful method that can be used, for example, to carry out computations on anonymous data without having to leak that data. Thus, due to the importance of confidentiality in this type of technique, we analyze active and passive attacks using complexity measures (compression and entropy). We start by obtaining network traces and syscalls, then we analyze them using compression and entropy techniques. Finally, we cluster the traces and syscalls using standard clustering techniques. This approach does not need any deep specific knowledge of the implementations being analyzed. This paper presents a security analysis for four MPC frameworks, where three were identified as insecure. These insecure libraries leak information about the inputs provided by each party of the communication. Additionally, we have detected, through a careful analysis of its source code, that SPDZ-2's secret sharing schema always produces the same results.
2019
Authors
Abdulrahman, SM; Brazdil, P; Zainon, WMNW; Adamu, A;
Publication
2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019)
Abstract
The average ranking method (AR) is one of the simplest and effective algorithms selection methods. This method uses metadata in the form of test results of a given set of algorithms on a given set of datasets and calculates an average rank for each algorithm. The ranks are used to construct the average ranking. In this paper we investigate the problem of how the rankings can be reduced by removing non-competitive and redundant algorithms, thereby reducing the number of tests a user needs to conduct on a new dataset to identify the most suitable algorithm. The method proposed involves two phases. In the first one, the aim is to identify the most competitive algorithms for each dataset used in the past. This is done with the recourse to a statistical test. The second phase involves a covering method whose aim is to reduce the algorithms by eliminating redundant variants. The proposed method differs from one earlier proposal in various aspects. One important one is that it takes both accuracy and time into consideration. The proposed method was compared to the baseline strategy which consists of executing all algorithms from the ranking. It is shown that the proposed method leads to much better performance than the baseline.
2019
Authors
Dryer, Z; Nickerl, A; Gomes, MAC; Vilela, JP; Harrison, WK;
Publication
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
Abstract
This paper presents a practical physical-layer security scheme based on coding methodologies combined with self-jamming to combat advantaged eavesdroppers, i.e., eavesdroppers that may possess an equal or even better channel than the legitimate receiver. We introduce a strengthened security gap notion, where reliability is assured by typical bit-error rate (BER) measurements, but secrecy is guaranteed by considering the entire distribution of messages upon reception, instead of average measures. Relying on this new security gap notion, we then propose a scheme that combines concatenated coding with self-jamming by the legitimate receiver for effective security and reliability even when eavesdroppers possess a channel with equal or better conditions than the legitimate receiver.
2019
Authors
Santos, MS; Pereira, RC; Costa, AF; Soares, JP; Santos, JAM; Abreu, PH;
Publication
IEEE Access
Abstract
2019
Authors
Razavi, SE; Rahimi, E; Javadi, MS; Nezhad, AE; Lotfi, M; Shafie khah, M; Catalao, JPS;
Publication
RENEWABLE & SUSTAINABLE ENERGY REVIEWS
Abstract
During recent decades with the power system restructuring process, centralized energy sources are being replaced with decentralized ones. This phenomenon has resulted in a novel concept in electric power systems, particularly in distribution systems, known as Distributed Generation (DG). On one hand, utilizing DG is important for secure power generation and reducing power losses. On the other hand, widespread use of such technologies introduces new challenges to power systems such as their optimal location, protection devices' settings, voltage regulation, and Power Quality (PQ) issues. Another key point which needs to be considered relates to specific DG technologies based on Renewable Energy Sources (RESs), such as wind and solar, due to their uncertain power generation. In this regard, this paper provides a comprehensive review of different types of DG and investigates the newly emerging challenges arising in the presence of DG in electrical grids.
2019
Authors
Oliveira, L; Cardoso, JS; Lourenço, A; Ahlström, C;
Publication
Proceedings - European Workshop on Visual Information Processing, EUVIP
Abstract
Driver drowsiness is a major cause of road accidents, many of which result in fatalities. A solution to this problem is the inclusion of a drowsiness detector in vehicles to alert the driver if sleepiness is detected. To detect drowsiness, physiologic, behavioral (visual) and vehicle-based methods can be used, however, only measures that can be acquired non-intrusively are viable in a real life application. This work uses data from a real-road experiment with sleep deprived drivers to compare the performance of driver drowsiness detection using intrusive acquisition methods, namely electrooculogram (EOG), with camera-based, non-intrusive, methods. A hybrid strategy, combining the described methods with electrocardiogram (ECG) measures, is also evaluated. Overall, the obtained results show that drowsiness detection performance is similar using non-intrusive camera-based measures or intrusive EOG measures. The detection performance increases when combining two methods (ECG + visual) or (ECG + EOG). © 2018 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.