19,734 research outputs found
Practical quantum key distribution over a 48-km optical fiber network
The secure distribution of the secret random bit sequences known as "key"
material, is an essential precursor to their use for the encryption and
decryption of confidential communications. Quantum cryptography is a new
technique for secure key distribution with single-photon transmissions:
Heisenberg's uncertainty principle ensures that an adversary can neither
successfully tap the key transmissions, nor evade detection (eavesdropping
raises the key error rate above a threshold value). We have developed
experimental quantum cryptography systems based on the transmission of
non-orthogonal photon states to generate shared key material over
multi-kilometer optical fiber paths and over line-of-sight links. In both
cases, key material is built up using the transmission of a single-photon per
bit of an initial secret random sequence. A quantum-mechanically random subset
of this sequence is identified, becoming the key material after a data
reconciliation stage with the sender. Here we report the most recent results of
our optical fiber experiment in which we have performed quantum key
distribution over a 48-km optical fiber network at Los Alamos using photon
interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern
Optic
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Despite the fact that cyberattacks are constantly growing in complexity, the
research community still lacks effective tools to easily monitor and understand
them. In particular, there is a need for techniques that are able to not only
track how prominently certain malicious actions, such as the exploitation of
specific vulnerabilities, are exploited in the wild, but also (and more
importantly) how these malicious actions factor in as attack steps in more
complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses
temporal word embeddings to model how attack steps are exploited in the wild,
and track how they evolve. We test ATTACK2VEC on a dataset of billions of
security events collected from the customers of a commercial Intrusion
Prevention System over a period of two years, and show that our approach is
effective in monitoring the emergence of new attack strategies in the wild and
in flagging which attack steps are often used together by attackers (e.g.,
vulnerabilities that are frequently exploited together). ATTACK2VEC provides a
useful tool for researchers and practitioners to better understand cyberattacks
and their evolution, and use this knowledge to improve situational awareness
and develop proactive defenses
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack
In this paper, we show synchronization for a group of output passive agents
that communicate with each other according to an underlying communication graph
to achieve a common goal. We propose a distributed event-triggered control
framework that will guarantee synchronization and considerably decrease the
required communication load on the band-limited network. We define a general
Byzantine attack on the event-triggered multi-agent network system and
characterize its negative effects on synchronization. The Byzantine agents are
capable of intelligently falsifying their data and manipulating the underlying
communication graph by altering their respective control feedback weights. We
introduce a decentralized detection framework and analyze its steady-state and
transient performances. We propose a way of identifying individual Byzantine
neighbors and a learning-based method of estimating the attack parameters.
Lastly, we propose learning-based control approaches to mitigate the negative
effects of the adversarial attack
Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption
In the last decade, efforts have been made to reconcile theoretical security
with realistic imperfect implementations of quantum key distribution (QKD).
Implementable countermeasures are proposed to patch the discovered loopholes.
However, certain countermeasures are not as robust as would be expected. In
this paper, we present a concrete example of ID Quantique's
random-detector-efficiency countermeasure against detector blinding attacks. As
a third-party tester, we have found that the first industrial implementation of
this countermeasure is effective against the original blinding attack, but not
immune to a modified blinding attack. Then, we implement and test a later full
version of this countermeasure containing a security proof [C. C. W. Lim et
al., IEEE Journal of Selected Topics in Quantum Electronics, 21, 6601305
(2015)]. We find that it is still vulnerable against the modified blinding
attack, because an assumption about hardware characteristics on which the proof
relies fails in practice.Comment: 12 pages, 12 figure
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
Machine learning based solutions have been successfully employed for
automatic detection of malware in Android applications. However, machine
learning models are known to lack robustness against inputs crafted by an
adversary. So far, the adversarial examples can only deceive Android malware
detectors that rely on syntactic features, and the perturbations can only be
implemented by simply modifying Android manifest. While recent Android malware
detectors rely more on semantic features from Dalvik bytecode rather than
manifest, existing attacking/defending methods are no longer effective. In this
paper, we introduce a new highly-effective attack that generates adversarial
examples of Android malware and evades being detected by the current models. To
this end, we propose a method of applying optimal perturbations onto Android
APK using a substitute model. Based on the transferability concept, the
perturbations that successfully deceive the substitute model are likely to
deceive the original models as well. We develop an automated tool to generate
the adversarial examples without human intervention to apply the attacks. In
contrast to existing works, the adversarial examples crafted by our method can
also deceive recent machine learning based detectors that rely on semantic
features such as control-flow-graph. The perturbations can also be implemented
directly onto APK's Dalvik bytecode rather than Android manifest to evade from
recent detectors. We evaluated the proposed manipulation methods for
adversarial examples by using the same datasets that Drebin and MaMadroid (5879
malware samples) used. Our results show that, the malware detection rates
decreased from 96% to 1% in MaMaDroid, and from 97% to 1% in Drebin, with just
a small distortion generated by our adversarial examples manipulation method.Comment: 15 pages, 11 figure
- …