Dear all,
We submitted the paper "Incremental Common Criteria Certification
Processes using DevSecOps Practices" to EuroSPW 2021. We request to
acknowledge SPARTA if the paper is accepted.
Abstract:
The growing digitalisation of our economies and societies is driving the
need for increased connectivity of critical applications and
infrastructures to the point where failures can lead to important
disruptions and consequences to our lives. One growing source of
failures for critical applications and infrastructures originates from
cybersecurity threats and vulnerabilities that can be exploited in
attacks. One approach to mitigating these risks is verifying that
critical applications and infrastructures are sufficiently protected by
certification of products and services. However, reaching sufficient
assurance levels for product certification may require detailed
evaluation of product properties. An important challenge for product
certification is dealing with product evolution: now that critical
applications and infrastructures are connected they are being updated on
a more frequent basis. To ensure continuity of certification, updates
must be analysed to verify the impact on certified cybersecurity
properties. Impacted properties need to be re-certified. This paper
proposes a lightweight and flexible incremental certification process
that can be integrated with DevSecOps practices to automate as much as
possible evidence gathering and certification activities. The approach
is illustrated on the Common Criteria product certification scheme and a
firewall update on an automotive case study. Only the impact analysis
phase of the incremental certification process is illustrated.
Best Regards,
--
Sebastien Dupont
Expert Research Engineer
Model-Based Engineering and Distributed Systems
CETIC
Avenue Jean Mermoz 28
B-6041 Charleroi
Tel: +32 488 237 483
Dear all,
I would like to inform you that our paper is accepted in "ISC 2021" and
it should appear online in December. We acknowledged SPARTA.
Title: Hybroid: Toward Android Malware Detection and Categorization with
Program Code and Network Traffic
Authors: Mohammad Reza Norouzian, Peng Xu, Claudia Eckert,
Apostolis Zarras
Abstract: Android malicious applications have become so sophisticated
that they can bypass endpoint protection measures. Therefore, it is safe
to admit that traditional anti-malware techniques have become
cumbersome, thereby raising the need to develop efficient ways to detect
Android malware. In this paper, we present Hybroid, a hybrid Android
malware detection and categorization solution that utilizes program code
structures as static behavioral features and network traffic as dynamic
behavioral features for detection (binary classification) and
categorization (multi-label classification). For static analysis, we
introduce a natural language processing-inspired technique based on
function call graph embeddings and design a graph neural network-based
approach to convert the whole graph structure of an Android app to a
vector. In dynamic analysis, we extract network flow features from the
raw network traffic by capturing each application's network flow.
Finally, Hybroid utilizes the network flow features combined with the
graphs' vectors to detect and categorize the malware. Our solution gets
99.6% accuracy on average for malware detection and 97.6% accuracy for
malware categorization.
Best regards,
Mohammad Norouzian
--
Mohammad Reza Norouzian
Lehrstuhl für Sicherheit in der Informatik I20
Institut für Informatik TU München
Boltzmannstr. 3
85748 Garching
Tel. +49 89 289 18584
Fax +49 89 289 18579
e-mail: norouzian(a)sec.in.tum.de
http://www.sec.in.tum.de