Match!
IEEE Transactions on Information Forensics and Security
IF
6.21
Papers
2741
Papers 2741
1 page of 275 pages (2,741 results)
Newest
#1Jinguang Han ('QUB': Queen's University Belfast)H-Index: 15
#1Jinguang Han ('QUB': Queen's University Belfast)
view all 6 authors...
An anonymous single sign-on (ASSO) scheme allows users to access multiple services anonymously using one credential. We propose a new ASSO scheme, where users can access services anonymously through the use of anonymous credentials and unlinkably through the provision of designated verifiers. Notably, verifiers cannot link a user’s service requests even if they collude. The novelty is that when a designated verifier is unavailable, a central authority can authorize new verifiers to authenticate ...
Source
#1Deqiang Li (Nanjing University of Science and Technology)
#2Qianmu Li (Nanjing University of Science and Technology)
Malware remains a big threat to cyber security, calling for machine learning based malware detection. While promising, such detectors are known to be vulnerable to evasion attacks. Ensemble learning typically facilitates countermeasures, while attackers can leverage this technique to improve attack effectiveness as well. This motivates us to investigate which kind of robustness the ensemble defense or effectiveness the ensemble attack can achieve, particularly when they combat with each other. W...
Source
#1Govind Mittal (NYU: New York University)
#2Pawel Korus (AGH University of Science and Technology)H-Index: 9
Last. Nasir D. Memon (NYU: New York University)H-Index: 57
view all 3 authors...
We present FiFTy, a modern file-type identification tool for memory forensics and data carving. In contrast to previous approaches based on hand-crafted features, we design a compact neural network architecture, which uses a trainable embedding space. Our approach dispenses with the explicit feature extraction which has been a bottleneck in legacy systems. We evaluate the proposed method on a novel dataset with 75 filetypes – the most diverse and balanced dataset reported to date. FiFTy consiste...
Source
#1Shuangrui Zhao (Xidian University)H-Index: 1
#2Jia Liu (NII: National Institute of Informatics)H-Index: 3
Last. Norio Shiratori (Chu-Dai: Chuo University)H-Index: 22
view all 5 authors...
This paper focuses on a full-duplex multiple-input multiple-output two-way untrusted relay system, and investigates the optimal beamforming design of such system to maximize its secrecy sum rate (SSR) based on the physical layer security technology. We first provide the modeling of SSR under a general beamforming setting as well as the theoretical formulation of the optimal beamforming design problem. Based on the ideal assumption that the full channel state information is available, we then dev...
Source
#1Anxiao He (ZJU: Zhejiang University)
#2Kai Bu (ZJU: Zhejiang University)H-Index: 16
Last. Kui Ren
view all 6 authors...
Path validation has been explored as an indispensable security feature for the future Internet. Motivated by the Path-Aware Networking Research Group (PANRG) under the Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF), it gives end-hosts more control over packet forwarding and ensures that the forwarding history is verifiable. The main idea is to require that routers add proofs in packet headers for other routers to verify. We identify linear-scale proofs as the esse...
Source
#1Mohamed Ibrahim (Duke University)H-Index: 14
#2Tung-Che Liang (Duke University)H-Index: 3
Last. Ramesh Karri (NYU: New York University)H-Index: 45
view all 5 authors...
DNA fingerprinting can offer remarkable benefits, especially for point-of-care diagnostics, information forensics, and analysis. However, the pressure to drive down costs is likely to lead to cheap untrusted solutions and a multitude of unprecedented risks. These risks will especially emerge at the frontier between the cyberspace and DNA biology. To address these risks, we perform a forensic-security assessment of a typical DNA-fingerprinting flow. We demonstrate, for the first time, benchtop an...
Source
#1Hussain M. J. Almohri (Kuniv: Kuwait University)H-Index: 6
#2Layne T. Watson (VT: Virginia Tech)H-Index: 50
Last. David Evans (UVA: University of Virginia)H-Index: 41
view all 3 authors...
With current IoT architectures, once a single device in a network is compromised, it can be used to disrupt the behavior of other devices on the same network. Even though system administrators can secure critical devices in the network using best practices and state-of-the-art technology, a single vulnerable device can undermine the security of the entire network. The goal of this work is to limit the ability of an attacker to exploit a vulnerable device on an IoT network and fabricate deceitful...
Source
#1Darren Hurley-Smith (RHUL: Royal Holloway, University of London)H-Index: 2
#1Darren Hurley-Smith (RHUL: Royal Holloway, University of London)
Last. Julio C. Hernandez-CastroH-Index: 21
view all 3 authors...
Random number generation is critical to many applications. Gaming, gambling, and particularly cryptography all require random numbers that are uniform and unpredictable. For testing whether supposedly random sources feature particular characteristics commonly found in random sequences, batteries of statistical tests are used. These are fundamental tools in the evaluation of random number generators and form part of the pathway to certification of secure systems implementing them. Although there ...
Source
One of the biggest challenges in IoT-forensics is the analysis and correlation of heterogeneous digital evidence, to enable an effective understanding of complex scenarios. This paper defines a methodology for extracting unique objects (e.g., representing users or devices) from the files of a case, defining the context of the digital investigation and increasing the knowledge progressively, using additional files from the case (e.g. network captures). The solution includes external searches usin...
Source
Source
12345678910
Top fields of study
Pattern recognition
Computer network
Computer vision
Computer security
Computer science
Feature extraction