Outsourced Database Security - The outsourced data inside the data dispersion middle server are calm and unsecure when compared with the current methods and security measures. Lost in Client get to benefits control tends to unsecure data sharing inside the stockroom. Existing Login affirmation is executed by utilizing extraordinary username and mystery word as substance organize. But this system faces colossal challenges from software engineers; organize interlopers or irregular works out where people can get the user’s mystery word easily by a number of hacking techniques. In this way, this paper proposes the system for multilevel secured login confirmation system utilizing OTP, picture hotspot security and capture methodologies. The building for picture hot spot is utilized to avoid the unauthorized client looking over the system and it as well avoid from hacking the watchword and unusual works out inside the stockroom So that we propose a Methodology based on guidelines such as Multilevel secured confirmation system to secure from harmful clients Secured Client control benefits for data scrutinized and sort in and Taking after the client conduct plan based on development log and Within the occasion that any unordinary activity is done by the individuals who are getting to data stockroom, the admin will be educated and this irregular development will be captured by keeping up a log record of all the clients. Cutting edge shows up has been proposed utilizing four level security techniques by checking the Picture Hotspot Security. AES Calculation is utilized to scramble and translate the login inconspicuous components in database for more information security to administer information proprietorship and security. For blended information capacity in information stockroom framework utilizing progressed record security and Information advantage Official.
Authored by Gunasekar M, Vishva C
Outsourced Database Security - Inference attacks on statistical databases represent a complex issue in institutions and corporates since it is hard to detect and prevent, especially when it is committed by an internal adversary. The issue has been manifested further with the widespread of data analytics techniques in industry and academia, besides outsourced services. Even when the released statistical data has been anonymized and the identifying attributes are removed, targeted individuals can be spotted in such data. Therefore, preventing sensitive statistical data leakage is crucial for protecting the privacy of individuals or events, but such measures should not form utilization obstacles or degrade the data utility. This paper proposes an antiinference technique for preserving the privacy of sensitive data in statistical databases. Unlike existing solutions, which either require considerable computing resources or trade-off between statistical data accuracy and its privacy, our solution is designed to maintain the accuracy while privacy is ensured.
Authored by Amer Aljaedi
Outsourced Database Security - Cyber attacks are causing tremendous damage around the world. To protect against attacks, many organizations have established or outsourced Security Operation Centers (SOCs) to check a large number of logs daily. Since there is no perfect countermeasure against cyber attacks, it is necessary to detect signs of intrusion quickly to mitigate damage caused by them. However, it is challenging to analyze a lot of logs obtained from PCs and servers inside an organization. Therefore, there is a need for a method of efficiently analyzing logs. In this paper, we propose a recommendation system using the ATT\&CK technique, which predicts and visualizes attackers’ behaviors using collaborative filtering so that security analysts can analyze logs efficiently.
Authored by Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga
Outsourced Database Security - The outsourcing of databases is very popular among IT companies and industries. It acts as a solution for businesses to ensure availability of the data for their users. The solution of outsourcing the database is to encrypt the data in a form where the database service provider can perform relational operations over the encrypted database. At the same time, the associated security risk of data leakage prevents many potential industries from deploying it. In this paper, we present a secure outsourcing database search scheme (BASDB) with the use of a smart contract for search operation over index of encrypted database and storing encrypted relational database in the cloud. Our proposed scheme BASDB is a simple and practical solution for effective search on encrypted relations and is well resistant to information leakage against attacks like search and access pattern leakage.
Authored by Partha Chakraborty, Puspesh Kumar, Mangesh Chandrawanshi, Somanath Tripathy
Oscillating Behaviors - A single-axis Microelectromechanical system gravimeter has recently been developed at the University of Glasgow. The sensitivity and stability of this device was demonstrated by measuring the Earth tides. The success of this device was enabled in part by its extremely low resonant frequency. This low frequency was achieved with a geometric anti-spring design, fabricated using well-established photolithography and dry etch techniques. Analytical models can be used to calculate the results of these non-linear oscillating systems, but the power of finite element analysis has not been fully utilised to explore the parameter space before now. In this article finite element models are used to investigate the behaviour of geometric anti-springs. These computer models provide the ability to investigate the effect of the fabrication material of the device: anisotropic \textless100\textgreater crystalline silicon. This is a parameter that is difficult to investigate analytically, but finite element modelling is used to take anisotropy into account. The finite element models are then used to demonstrate the design of a three-axis gravimeter enabling the gravity tensor to be measured - a significantly more powerful tool than the original single-axis device.
Authored by Richard Middlemiss, Paul Campsie, William Cunningham, Rebecca Douglas, Victoria McIvor, Vinod Belwanshi, James Hough, Sheila Rowan, Douglas Paul, Abhinav Prasad, Giles Hammond
Oscillating Behaviors - In this paper, we examine the asymptotic behavior of an equation that describes two rotors installed on a common oscillating platform. Namely, we establish analytic criteria for self-synchronization of the rotors by means of the Popov method of “a priori integral indices”.
Authored by Vera Smirnova, Anton Proskurnikov, Natalia Utina
Oscillating Behaviors - There is a constant push for ever increasing performance in traditional computing systems, leading to high power consumption and, in the end, to the incapacity of conventional electronics to handle heavy computing tasks, which usually require learning features. Thus, the development of novel nanoelectronic devices with inherent neuromorphic characteristics and a low energy footprint has become a viable alternative. In order to simulate neuromorphic features utilizing memristive devices, the threshold switching effect is critical, which can be seen in the rich dynamics of metallic conductive filament (CF). In this paper, a realistic model of the unipolar nature of CBRAM devices is exploited to create a memristor-based oscillator that can integrate neuromorphic features. Bipolar memristive devices have been used to match the weight of the neurons in a crossbar configuration. The used physical model for these memristors was fitted to fabricated devices in order to achieve the expected accuracy in the circuit simulation. The oscillator’s output signal and behavior matched the theoretical background of biological neurons. Thus, this approach can be considered as the first step towards the development of low-power oscillation-based neuromorphic hardware with biological-like behavior.
Authored by Theodoros Chatzinikolaou, Iosif-Angelos Fyrigos, Charalampos Tsioustas, Panagiotis Bousoulas, Michail-Antisthenis Tsompanas, Dimitris Tsoukalas, Georgios Sirakoulis
Oscillating Behaviors - The majority of space science missions aim to measure weak slow varying electromagnetic fields and in order to do so, need to meet strict cleanliness requirements. The accurate characterization of equipment in the extremely lowfrequency domain (below several hundred kHz) should include the direct emitted electric field as well as the induced behavior of the device due to the unit-to-unit interaction. Following a detailed characterization at the unit level, the unit-to-unit interaction is attributed to the near field scattering effect, usually considering the scatterer as a small sphere. This way the induced behavior of the unit can be described by an oscillating dipole coherent to the incident field. This work highlights the importance of induced behavior of the units at the system level for accurate system predictions in the case that the scatterer can’t be considered as a small sphere due to dielectric materials or complex unit geometry. The authors aim to characterize the induced behavior by solving the inverse electromagnetic scattering problem through a customized measurement procedure.
Authored by Anargyros Baklezos, Christos Nikolopoulos, Panagiotis Papastamatis, Theodoros Kapetanakis, Ioannis Vardiambasis, Christos Capsalis
Oscillating Behaviors - Wave energy converters (WECs) are still at an earlier stage of development when compared to variable renewable energy systems based on wind or solar power. Indeed, only a few WECs have exported power to electric grids until recently. Thus, the development of mathematical models able to represent essential aspects of the system and its connection to the grid becomes fundamental to assess the impact of integrating wave power to grids. This work develops a fully integrated waveto-wire model, where the electrical model has re-configurable dynamic models of rotary and linear generators (with controllers) to accommodate different types of oscillating-body systems. Such an electrical model is interfaced with the WEC hydrodynamic and mechanical models. A complete wave-to-grid model is presented by integrating the generator system model, an electrical grid interface unit and a network equivalent for the receiving grid in a unified simulation environment with the WEC-Sim, an open-source tool for simulating the dynamic behaviour of WECs. Numerical simulation studies are presented considering different operating conditions for the grid integration of a floating body that is connected to either an hydraulic power take-off system or a direct-drive system.
Authored by Paula Garcia-Rosa, Raymundo Torres-Olguin, Joao Cruz, Salvatore DArco
Oscillating Behaviors - Animals successfully perform many behavioral tasks within the framework of a closed-loop sensorimotor control system during their daily lives. To achieve this, animals receive sensory signals from their environment through various sensory receptors and process these signals in their central nervous systems (CNS). Then, using this sensory feedback, animals produce necessary motor signals and transmit them to their muscles to perform the desired behavior. During this process, animals integrate sensory information perceived by different sensory receptors and they simultaneously stimulate multiple muscle combinations. The goal of this study is to identify the closed-loop sensorimotor control processes of animals during their unconstrained behaviors. To achieve this, we built a novel experimental setup that allows data-driven system identification of the target tracking behavior of zebrafish during rheotaxis. In that, a stimulus target oscillating in the frequency range of 0-2 Hz was presented to the zebrafish. Then, frequency response of the target tracking performance for N=5 fish were estimated.
Authored by Orhun Koc, Alp Demirel, Emin Aydin, Fatmagul Ibisoglu, Sevval Solmaz, Kaan Ari, Ayse Idman, Ismail Uyanik
Oscillating Behaviors - This work presents a self-oscillating mixer (SOM) based on a slow-wave structure for phase-noise reduction. Emphasis is placed on the analysis/optimization methods, which include aspects such as conversion gain, nonlinear distortion, and operation boundaries. In a first stage, the parameters of the slowwave structure are optimized to obtain a low phase-noise spectral density. As an example, a structure based on a unit cell containing a Schiffman section is considered. Then, the SOM behavior is addressed through an analytical model that should enable an understanding of its main operation characteristics. A practical FET-based circuit at 2.3 GHz is simulated with some novel harmonic-balance techniques and experimentally characterized.
Authored by Mabel Ponton, Franco Ramirez, Sergio Sancho, Almudena Suarez
Operating Systems Security - Aiming at the problem of Disturbance Error of dynamic random access memory (DRAM) on domestic NeoKylin operating system, this article analyzes the reasons for rowhammer attacks, proposes a rowhammer attack scheme based on domestic NeoKylin operating system, and designs a tool to implement the attack. The results of the attack on domestic NeoKylin operating system demonstrate that this attack scheme can achieve bit flips by rapid and repeated access (hammer) to the neighboring rows of the target cell.
Authored by Jianxin Wang, Hongke Xu, Chaoen Xiao, Lei Zhang, Yuzheng Zheng
Operating Systems Security - Now personal computers are used in which the user has free access to all the resources of the machine. This opened the door to the danger known as computer virus. The purpose of the work is to introduce the user to the basics of computer virology, to identify viruses and to teach them how to combat them. The method of the work is the analysis of printed publications on this topic. Several attempts to provide a "modern" definition of the virus have been unsuccessful. To realize the complexity of the problem, for example, try to define the concept of "editor". In this paper, the modern Antivirus security classification model to enhance the protection for commercial computer networks. The either come up with the most common one or start listing all the known types of editors. Neither can be considered acceptable. Therefore, we will limit ourselves to considering some characteristics of computer viruses that allow us to speak of certain types of programs.
Authored by Krishna Kalsi, Vishal Sharma
Design of High-Confidence Embedded Operating System based on Artificial Intelligence and Smart Chips
Operating Systems Security - Design of the high-confidence embedded operating system based on artificial intelligence and smart chips is studied in this paper. The cooperative physical layer security system is regarded as a state machine. Relay nodes with untrusted behavior will affect the physical layer security of the system, and the system tries to prevent the untrusted behavior of relay nodes. While implementing public verification, it realizes the protection of data privacy. The third party can directly verify the data holding of the data stored in the cloud without verification by the user, and in the process of system expansion and growth, software can ensure vigorous vitality. For the verification, the smart chips are combined for the systematic implementations. The experimental results have shown the satisfactory results.
Authored by Qinmin Ma
Operating Systems Security - The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-critical or safetycritical applications domains, like automotive or aeronautical, make devices attractive targets for attackers. Nowadays, several of these are mixed-criticality systems, i.e., they run both highcriticality tasks (e.g., a car control system) and low-criticality ones (e.g., infotainment). High-criticality routines often employ Real-Time Operating Systems (RTOS) to enforce hard real-time requirements, while the tasks with lower constraints can be delegated to more generic-purpose operating systems (GPOS).
Authored by Vahid Moghadam, Paolo Prinetto, Gianluca Roascio
Operating Systems Security - Drive Backup is an application for backing up data, including creating copies of partitions for quick recovery in case of an accident, virus attack or, if necessary, replacing all data, including the operating system and installed ones. Software, plus a new hard drive. Reinstalling the operating system and applications after a hardware failure or virus attack does not take you much time and effort. The best way to protect your computer is to create a backup of the system partition with the operating system installed on it and all the necessary applications. In this paper, The commercial hard disk backup system for quick recovery operating system in cloud storage system. Copies can be made to hard drives and removable media as well as network-connected drives. If you need a disk management program, check out the corporate version of this package. A multicast function for transferring copies of an image to multiple computers at the same time, well suited to the needs of corporate offices (for example, to create or restore multiple workstations). But for home backup, you may need to think about other programs - simpler and faster.
Authored by Rupinder Wadhwa, Khushboo Sharma
Security of operating system using the Metasploit framework by creating a backdoor from remote setup
Operating Systems Security - The era of technology has seen many rising inventions and with that rise, comes the need to secure our systems. In this paper we have discussed how the old generation of people are falling behind at being updated in tandem with technology, and losing track of the knowledge required to process the same. In addition this factor leads to leakage of critical personal information. This paper throws light upon the steps taken in order to exploit the pre-existing operating system, Windows 7, Ultimate, using a ubiquitous framework used by everyone, i.e. Metasploit. It involves installation of a backdoor on the victim machine, from a remote setup, mostly Kali Linux operating machine. This backdoor allows the attackers to create executable files and deploy them in the windows system to gain access on the machine, remotely. After gaining access, manipulation of sensitive data becomes easy. Access to the admin rights of any system is a red alert because it means that some outsider has intense access to personal information of a human being and since data about someone explains a lot of things about them. It basically is exposing and human hate that. It depraves one of their personal identity. Therefore security is not something that should be taken lightly. It is supposed to be dealt with utmost care.
Authored by Ria Thapa, Bhavya Sehl, Suryaansh Gupta, Ankur Goyal
Operating Systems Security - IoT technology is finding new applications every day and everywhere in our daily lives. With that, come new use cases with new challenges in terms of device and data security. One of such challenges arises from the fact that many IoT devices/nodes are no longer being deployed on owners’ premises, but rather on public or private property other than the owner’s. With potential physical access to the IoT node, adversaries can launch many attacks that circumvent conventional protection methods. In this paper, we propose Secure SoC (SecSoC), a secure system-on-chip architecture that mitigates such attacks. This include logical memory dump attacks, bus snooping attacks, and compromised operating systems. SecSoC relies on two main mechanisms, (1) providing security extensions to the compute engine that runs the user application without changing its instruction set, (2) adding a security management unit (SMU) that provide HW security primitives for encryption, hashing, random number generators, and secrets store (keys, certificates, etc.). SecSoC ensures that no secret or sensitive data can leave the SoC IC in plaintext. SecSoC is being implemented in Bluespec SystemVerilog. The experimental results will reveal the area, power, and cycle time overhead of these security extensions. Overall performance (total execution time) will also be evaluated using IoT benchmarks.
Authored by Ayman Hroub, Muhammad Elrabaa
Operating Systems Security - In this paper, the reader s attention is directed to the problem of inefficiency of the add-on information security tools, that are installed in operating systems, including virtualization systems. The paper shows the disadvantages, that significantly affect the maintenance of an adequate level of security in the operating system. The results allowing to control all areas hierarchical of protection of the specialized operating system are presented.
Authored by Anastasiya Veremey, Vladimir Kustov, Renjith Ravi V
Operating Systems Security - The operating system is the core of the smart power terminal. It is designed to strengthen security from five aspects: terminal container security, system security, security audit, communication protocol security, and hardware access control. By formulating a verification strategy, a comparative security test was carried out for the security hardening and non-security hardening operating systems of smart power terminals, and a detailed comparison test table was formed, demonstrating the importance of security hardening and security hardening for the operating systems of smart power terminals The advantages. The security-hardened operating system can effectively ensure the security of the operating environment of the terminal body and prevent illegal access by malicious programs.
Authored by Bin Xu, Feng Zhai, Baofeng Li, Yongfeng Cao, Chao Zhang, Qi Zhou
Object Oriented Security - Several software vulnerabilities emerge during the design phase of a software development process, which can be addressed using secure design patterns. However, using these patterns over web application vulnerabilities is comparatively more tricky for developers than using traditional design patterns. Although several practices exist for addressing software security vulnerabilities, they are sometimes difficult to reuse due to their implementation-specific nature. In this study, we discuss the secure design patterns that are intended to prevent vulnerabilities from being accidentally introduced into code or reduce the effects of flaws. The patterns are created by combining current best security design practices and adding security-specific functionality to the existing design patterns. Hence, this work outlines a convenient mechanism for deciding which secure design patterns to use for addressing online application vulnerabilities. We have demonstrated the applicability of our concept over a prevalent database security threat, namely SQL injection.
Authored by Anivesh Panjiyar, Debanjan Sadhya
Object Oriented Security - Aerial surveillance plays an important role for security applications. It can be further used to monitor borders, restricted zones and critical infrastructure. With the help of drones one can perform surveillance and get the exact location of various objects. Aerial object detection comes with many challenges like the object size which can be as low as 20×20 pixels. Images taken from satellites are hundreds of megapixels. Traditional methods like Histogram of oriented gradients (HOG) and Scale invariant feature transformation (SIFT) were used to extract features from the objects. Then these features were given to machine learning classifier like logistic regression, Support vector machine (SVM) and Random forest (RF) for detection and classification. However, the issue with these methods is that they are highly inaccurate and generated many false detections and misclassifications too. With the evolution of Graphics processing units (GPU) and the introduction of convolutional neural networks (CNN) as well as Deep Learning algorithms situation got changed. Now, it is possible to extract more information and provide better accuracy. In this paper for object detection You only look once version 4 (YOLOv4) is used which is one of the state-of-the-art algorithms. It uses Darknet 53 which is a type of CNN as a backbone for feature extraction. In this work the YOLOv4 based proposed system detect and localize vehicles present in the restricted zone and then geotag them.
Authored by Rohit Jadhav, Rajesh Patil, Akshay Diwan, S. Rathod, Ajay Sharma
Object Oriented Security - Service-oriented architecture (SOA) is a widely adopted architecture that uses web services, which have become increasingly important in the development and integration of applications. Its purpose is to allow information system technologies to interact by exchanging messages between sender and recipient using the simple object access protocol (SOAP), an XML document, or the HTTP protocol.
Authored by Grela Ajvazi, Festim Halili
Object Oriented Security - Smart distribution grids have new protection concepts known as fault self-healing whereby Intelligent Electronic Devices (IEDs) can automatically reconfigure the power circuits to isolate faults and restore power to the relevant sections. This is typically implemented with IEDs exchanging IEC 61850 Generic Object Oriented Substation Event (GOOSE) messages in a peer-to-peer communication network. However, a selfhealing application may be faced by challenges of emerging cyber-physical security threats. These can result in disruption to the applications’ operations thereby affecting the power system reliability. Blockchain is one technology that has been deployed in several applications to offer security and bookkeeping. In this paper, we propose a novel concept using blockchain as a second-tier security mechanism to support time-critical selfhealing operations in smart distribution grids. We show through a simulation study the impact of our proposed architecture when compared with a normal self healing architecture. The results show that our proposed architecture can achieve significant savings in time spent in no-power state by portions of the grid during cyber-physical attacks.
Authored by Befekadu Gebraselase, Charles Adrah, Tesfaye Amare, Bjarne Helvik, Poul Heegaard
Object Oriented Security - In object-oriented software development, UML has become a de facto modeling standard. However, although UML is easy to understand and apply, it has inaccurate semantics, and UML is a semi-formal modeling language, which cannot be formally verified. Event-B is a formal method based on a large number of mathematical predicate logic, which is precise but difficult to understand and apply. Therefore, how to combine the advantages of UML diagram and Event-B method is the focus of the research. The previous transformation methods are based on the transformation from UML scatter diagram to Event-B, which is prone to conflict and inconsistency. Therefore, we propose a systematic transformation method that can realize the corresponding unification of elements in UML and those in Event-B. The general software system is a medium-sized system. We believe that the medium-sized system can be clearly expressed by using use case diagram, class diagram, state diagram and sequence diagram. In this paper, the transformation methods from these four diagrams to EventB are given respectively. The transformation method of the system is applied to the elevator control system which requires high safety and reliability. The system transformation method from UML to Event-B not only improves the accuracy of UML and is easy for software practitioners to use, but also enhances the comprehensibility of formal methods and is conducive to the promotion and application of formal methods.
Authored by Xue Geng, Sheng-rong Zou, Ju-yi Yao