Current Issue : October - December Volume : 2014 Issue Number : 4 Articles : 4 Articles
JPEG XR is the most recent still image coding standard, and custom security features for this format are required for\nfast adoption of the standard. Format-compliant encryption schemes are important for many application scenarios\nbut need to be highly customised to a specific recent format like JPEG XR. This paper proposes, discusses, and\nevaluates a set of format-compliant encryption methods for the JPEG XR standard: coefficient scan order permutation,\nsign bit encryption, transform-based encryption, random level shift encryption, index-based VLC encryption, and encrypting\nentire frequency bands are considered. All algorithms are thoroughly evaluated by discussing possible compression\nimpact, by assessing visual security and cryptographic security, and by discussing applicability in real-world scenarios.\nMost techniques are found to be insecure and, in a cryptographic sense, have a limited range of applicability and\ncannot be applied to JPEG XR bitstreams in an efficient manner. Encrypting enti...
Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a\nhigher percentage of spam than others despite its prohibition? Why do some countries have a higher percentage of\nsystems acting as spambots compared to other countries? We begin to answer there questions by conducting a\ncross-country empirical analysis of economic factors that correlate with the prevalence of spam and associated\nbotnets. The economic factors under consideration are grounded in traditional theories of crime offline, as well as\nprior research in security economics. We found that more than 50% of spam can be attributed to having originated\nfrom merely seven countries, indicating that deterrence through policy is both feasible and economically rational. As\nexpected, higher Internet adoption is correlated with higher percentage of spam from a country. Counterintuitively,\nInternet adoption is also positively correlated with the percentage of infected machines....
The long-term evolution (LTE) is the newly adopted technology to offer enhanced capacity and coverage for current\nmobility networks, which experience a constant traffic increase and skyrocketing bandwidth demands. This new\ncellular communication system, built upon a redesigned physical layer and based on an orthogonal frequency\ndivision multiple access (OFDMA) modulation, features robust performance in challenging multipath environments\nand substantially improves the performance of the wireless channel in terms of bits per second per Hertz (bps/Hz).\nNevertheless, as all wireless systems, LTE is vulnerable to radio jamming attacks. Such threats have security\nimplications especially in the case of next-generation emergency response communication systems based on LTE\ntechnologies. This proof of concept paper overviews a series of new effective attacks (smart jamming) that extend the\nrange and effectiveness of basic radio jamming. Based on these new threats, a series of new potential security\nresearch directions are introduced, aiming to enhance the resiliency of LTE networks against such attacks. A\nspread-spectrum modulation of the main downlink broadcast channels is combined with a scrambling of the radio\nresource allocation of the uplink control channels and an advanced system information message encryption scheme.\nDespite the challenging implementation on commercial networks, which would require inclusion of these solutions\nin future releases of the LTE standard, the security solutions could strongly enhance the security of LTE-based national\nemergency response communication systems....
419 scam (also referred to as Nigerian scam) is a popular form of fraud in which the fraudster tricks the victim into\npaying a certain amount of money under the promise of a future, larger payoff.\nUsing a public dataset, in this paper, we study how these forms of scam campaigns are organized and evolve over time.\nIn particular, we discuss the role of phone numbers as important identifiers to group messages together and depict\nthe way scammers operate their campaigns. In fact, since the victim has to be able to contact the criminal, both email\naddresses and phone numbers need to be authentic and they are often unchanged and re-used for a long period of\ntime. We also present in detail several examples of 419 scam campaigns, some of which last for several years -\nrepresenting them in a graphical way and discussing their characteristics....
Loading....