Loading...

Table of Content

    10 September 2022, Volume 22 Issue 9 Previous Issue    Next Issue

    For Selected: Toggle Thumbnails
    Traceability of Private Industrial Control Protocol Based on Subgraph Isomorphic Matching of Protocol State Machine
    SONG Yubo, CHEN Ye, CAI Yihan, ZHANG Bo
    2022, 22 (9):  1-10.  doi: 10.3969/j.issn.1671-1122.2022.09.001
    Abstract ( 124 )   HTML ( 5 )   PDF (20663KB) ( 30 )  

    In the security analysis of private industrial control protocol of industrial equipment, it becomes very difficult to trace the industrial control network protocol standard. This paper proposes a traceability method of private industrial control protocol based on subgraph isomorphic matching of state machine, which can quickly match the industrial control network protocol standard adopted by private industrial control protocol. In this method, the traffic data of private industrial control protocol is reverse-parsed, the message format and key fields are extracted by clustering algorithm, and the protocol state machine graph is deduced by constructing an augmented prefix tree acceptor based on the key fields. In order to solve the problem of incomplete state machine graph generated by limited traffic data, the state machine graph is matched with the standard state machine graph of industrial control protocol by using the subgraph isomorphism matching algorithm. Experiments show that the traceability accuracy of the proposed method is more than 95%, which can quickly locate the industrial control network protocol standard adopted by private protocol, thus providing help for further security analysis.

    Figures and Tables | References | Related Articles | Metrics
    A Robust Watermarking Technology Based on k-Anonymity Dataset
    YU Jing, YUAN Shuguang, YUAN Yulin, CHEN Chi
    2022, 22 (9):  11-20.  doi: 10.3969/j.issn.1671-1122.2022.09.002
    Abstract ( 127 )   HTML ( 5 )   PDF (11695KB) ( 37 )  

    In the era of big data, secure and controlled data publishing becomes increasingly vital. When data holders publish dataset to data demanders, data holders often anonymize user’s data by k-anonymity for privacy purpose and embed watermarking in published dataset for protecting data copyright. Hence, there is a realistic demand for watermarking k-anonymity dataset. The main purpose of this paper is to embed watermark in k-anonymity dataset. However, there are two important problems for k-anonymity dataset to be addressed: the lack of primary key and the limited watermark space. In this paper, we try to address above problems by proposing a robust watermarking scheme based on k-anonymity dataset. This scheme used quasi-identifier attribute as the seed of watermark location function instead of primary key, embedded watermark information on non-sensitive attributes, and corrected error by twice majority voting in watermark detection phase. This scheme did not affect the effect of k-anonymity and realize the dual protection of privacy and copyright. Experiments showed that the watermarking scheme proposed in this paper has good robustness and efficiency.

    Figures and Tables | References | Related Articles | Metrics
    Research on Authentication Key Agreement Protocol Based on Multi-Factor in Internet of Drones
    ZHANG Min, XU Chunxiang, ZHANG Jianhua
    2022, 22 (9):  21-30.  doi: 10.3969/j.issn.1671-1122.2022.09.003
    Abstract ( 153 )   HTML ( 6 )   PDF (10035KB) ( 68 )  

    With the development of drone technology, Internet of drones(IoD) is becoming more and more popular, and the security of IoD has also become a hot topic in academic circles. To solve the security problems faced by IoD, it is very important to study and design a secure, efficient and lightweight authentication key agreement protocol. In 2021, HUSSAIN et al. proposed a key agreement protocol for IoD authentication key agreement based on elliptic curve encryption algorithm. This paper found that this protocol can be suffered from serious security attacks such as drone impersonation attack, session key leakage attack and so on. Aiming at the security problems faced by Hussain et al., this paper proposed a new authenticated key agreement scheme based on multi-factors. The scheme is based on secure sketch algorithm and elliptic curve encryption algorithm, which can effectively solve the security threats faced by HUSSAIN et al.’s scheme. What’s more, the proposed scheme can realize access control also. From security analysis, security proof and simulation experiments, the result shows that the proposed scheme has higher security, although the computational and communication overhead has increased slightly.

    Figures and Tables | References | Related Articles | Metrics
    Image Encryption Algorithm Based on Henon Mapping and Improved Lifting Wavelet Transform
    TONG Xiaojun, MAO Ning, ZHANG Miao, WANG Zhu
    2022, 22 (9):  31-39.  doi: 10.3969/j.issn.1671-1122.2022.09.004
    Abstract ( 134 )   HTML ( 2 )   PDF (10660KB) ( 50 )  

    Data transmission in an open network environment is easily stolen or destroyed, therefore, chaotic systems are often used to encrypt multimedia data in combination with various algorithms. Aiming at the problems of traditional scrambling diffusion structure’s low security and depending on a large number of pseudo-random numbers, an image encryption algorithm based on Henon map and improved lifting wavelet transform was proposed. Firstly, the algorithm generated the key by cyclic shift and S-box processing of the pseudo-random sequence generated by chaotic system. At the same time, the plain image was processed to obtain one-dimensional parity sequences. Secondly, the transformed sequence was predicted and updated to get the low-frequency approximate component and the high-frequency detail component of the image. In this way, the primary encryption was completed. Finally, the two scrambled components were flipped separately and the same operation was performed again to achieve encryption. Computer simulation experiment and performance analysis on gray image show that the image encrypted by this algorithm loses obvious statistical characteristics and can resist statistical attacks, thus effectively improve the security of image encryption.

    Figures and Tables | References | Related Articles | Metrics
    A Null Pointer Reference Mining System Based on Data Flow Tracing
    WEN Weiping, LIU Chengjie, SHI Lin
    2022, 22 (9):  40-45.  doi: 10.3969/j.issn.1671-1122.2022.09.005
    Abstract ( 129 )   HTML ( 6 )   PDF (6940KB) ( 38 )  

    Null pointer dereference is a common defect in programming, which often causes the program crash or abnormal exit. At the same time, attackers can also use null pointer dereference to complete arbitrary read and write operations, leading to information disclosure. Java is a widely used language, and also suffers from null pointer dereference due to insufficient checks on dereference. In order to avoid the potential risk, this paper proposed a null pointer dereference detection system based on data flow analysis and designed a static analysis tool jvd. This tool implemented analysis on Jimple and covered multiple container propagation cases, especially in containers by special treatment, which effectively reduced the false negative rate in complex scenarios. This paper completed the experiment and compared jvd with several popular tools like SpotBugs and Infer on CWE476 test dataset in Juliet Test Suite, which shows that jvd could be used in multiple null pointer transmission and achieved excellent performance in high accuracy situation.

    Figures and Tables | References | Related Articles | Metrics
    Smart Contract Vulnerability Detection Scheme Based on BiLSTM and Attention Mechanism
    ZHANG Guanghua, LIU Yongsheng, WANG He, YU Naiwen
    2022, 22 (9):  46-54.  doi: 10.3969/j.issn.1671-1122.2022.09.006
    Abstract ( 233 )   HTML ( 12 )   PDF (11069KB) ( 68 )  

    Aiming at the low detection accuracy of the traditional smart contract vulnerability detection scheme and the single type of vulnerability detected by the deep learning scheme, this paper proposed a smart contract vulnerability detection scheme based on bi-directional long short-term memory (BiLSTM) network and attention mechanism. Firstly, the word2vec word embedding technology was used to train the data to obtain the word vector representation of the opcode. Secondly, the word vector was passed into BiLSTM to extract sequence features, and an attention mechanism was introduced to give different weights to different features to highlight key features. Finally, the activation function was normalized to realize the detection and identification of smart contract vulnerabilities. This paper collected 3,000 smart contracts in Ethereum and used them to evaluate the model. The experimental results show that compared with the deep learning model and traditional tools, the scheme in this paper has improved the precision rate, recall rate and F1 score, and can accurately identify four kinds of type of smart contract vulnerabilities, the accuracy rate reached 86.34%.

    Figures and Tables | References | Related Articles | Metrics
    Identity Traceable Anonymous Authentication Scheme for Nodes in the Perception Layer of IoT
    ZHANG Xuewang, LIU Yufan
    2022, 22 (9):  55-62.  doi: 10.3969/j.issn.1671-1122.2022.09.007
    Abstract ( 121 )   HTML ( 6 )   PDF (8177KB) ( 72 )  

    The limited node resources, fragile devices, and complex data of the perception layer of the Internet of things make the security problems of the perception layer emerge in endlessly. Ensuring the credibility and security of the data in the perception layer is the basis to ensure the safe operation of the entire Internet of things system. Combining trusted computing and ring signcryption technology, this paper proposed an anonymous authentication scheme for traceable membership of nodes in the perception layer of the Internet of things. This scheme can hide the privacy information of nodes while providing external proof and can track the identity through a trusted third party when the data is in doubt. In addition, the correctness and effectiveness of this scheme are verified by simulation experiments, and the theoretical analysis shows that this scheme is efficient.

    Figures and Tables | References | Related Articles | Metrics
    Differential-Linear Cryptanalysis of the SIMON Algorithm
    HU Yujia, DAI Zhengyi, SUN Bing
    2022, 22 (9):  63-75.  doi: 10.3969/j.issn.1671-1122.2022.09.008
    Abstract ( 638 )   HTML ( 13 )   PDF (13167KB) ( 206 )  

    Differential cryptanalysis and linear cryptanalysis are currently the two most common methods to evaluate the security of block ciphers. Differential-linear cryptanalysis is an analysis method based on these two methods, which has been widely studied by the cryptography community in recent years. SIMON algorithm is an important lightweight block cipher, this paper mainly performed differential-linear attacks on SIMON 32/64 and SIMON 48, constructed 13 rounds differential-linear distinguishers respectively, made 16 rounds of key recovery attacks, whose data complexities are 226 and 242, and time complexities are 240.59 and 261.59 respectively, thereby increased the security evaluation dimension of the SIMON algorithm and enriched the actual cases of differential-linear cryptanalysis.

    Figures and Tables | References | Related Articles | Metrics
    Channel Interference Measurement and Optimization Based on Link Conflict Graph Embedding
    LIANG Yan, LI Dong, ZHAO Yizhu, YU Junqing
    2022, 22 (9):  76-85.  doi: 10.3969/j.issn.1671-1122.2022.09.009
    Abstract ( 106 )   HTML ( 4 )   PDF (10295KB) ( 59 )  

    In order to solve the problem that the existing channel measurement and optimization methods ignore the link state, which leads to the failure to prioritize the reduction of the actual link interference, a dynamic channel based on link conflict graph embedding was proposed for large-scale wireless network environments such as campus networks. Interference measurement and optimization methods. In the measurement phase, link status and adjustment coefficients were introduced to classify the interference between different links, and a link conflict graph based on the channel interference classification was constructed. At the same time, the graph embeding algorithm was used to embed the link conflict graph, and the overall interference situation of the wireless network was described by the embedded vector, which improved the accuracy of the modeling. The partial sampling method based on sliding window was adopted to accurately reflect the interference of the link at a low sampling rate. In the network optimization stage, the optimization algorithm based on the maximum cut problem was used to calculate the optimal wireless network channel configuration strategy, which effectively reduced the interference on the actual link.

    Figures and Tables | References | Related Articles | Metrics
    A Job Performance Evaluation Method under Spark Platform
    ZHANG Zhenghui, CHEN Xingshu, LUO Yonggang, WU Tianxiong
    2022, 22 (9):  86-95.  doi: 10.3969/j.issn.1671-1122.2022.09.010
    Abstract ( 174 )   HTML ( 4 )   PDF (12516KB) ( 42 )  

    In order to solve the problem of performance evaluation and performance optimization during the operation of Spark jobs, this paper proposed a performance evaluation and analysis method of Spark jobs based on hierarchical analysis. Firstly, to address the problem of low accuracy of traditional job type classification affected by feature selection, more realistic CPU and I/O features were selected and combined with K-Means clustering algorithm to build a job classifier to improve the classification accuracy. Secondly, the job workflow was optimized by eliminating operations such as data sorting, disk overflow writing, and file merging during job operation, and the optimized job performance index was used as the evaluation benchmark, making the job operation performance evaluation more objective and general. Afterwards, the performance metrics were quantified and stratified, hierarchical analysis was introduced to calculate their weights, and the performance evaluation model was constructed by combining job classifiers and evaluation benchmarks. Finally, experimental validation was conducted in three aspects: job type classification, workflow optimization method and performance evaluation. The experimental results show the effectiveness of the proposed job type classification and workflow optimization method, as well as the accuracy of the evaluation model.

    Figures and Tables | References | Related Articles | Metrics