Abstract
There is a large number of high-profile cyberattacks identified in the year of 2017, i.e., Ransomware attacks are one of the areas of cybercrime growing the fastest. These increasingly sophisticated cyberattacks are forcing various organisations to face security challenges and invest money building security and trust models. There will also be an increase in the use of recent development of security solutions that can help improve the detection performance and react to malicious events. In this position paper, we mainly introduce recent development trends in cybersecurity, including legal issues (e.g., GDPR), Artificial intelligence (AI), Mobile security and Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
More formally, ISO27001 is the most famous standard in the ISO/IEC 27000 family whiich provides the requirements for an Information security management systems.
References
Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain - or - rewriting history in bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, pp. 111–126 (2017)
Diro, A.A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in Fog-to-Things computing. IEEE Commun. Mag. 56(2), 169–175 (2018)
Chen, L., Hou, S., Ye, Y.: SecureDroid: enhancing security of machine learning-based detection against adversarial android malware attacks. In: Proceedings of ACSAC, pp. 362–372 (2017)
Cui, A., Costello, M., Stolfo, S.: When firmware modifications attack: a case study of embedded exploitation. In: Proceedings of NDSS (2013)
Chen, W., Luo, X., Yin, C., Xiao, B., Au, M.H., Tang, Y.: Cloudbot: advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41, 270–285 (2017)
Chen, S., et al.: Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach. Comput. Secur. 73, 326–344 (2018)
Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of OSDI (2010)
Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tut. 17(2), 998–1022 (2015)
Jones, M.L., Kaufman, E., Edenberg, E.: AI and the ethics of automating consent. IEEE Secur. Priv. 16(3), 64–72 (2018)
Karbab, E.B., Debbabi, M., Derhab, A., Mouheb, D.: MalDozer: automatic framework for android malware detection using deep learning. Digit. Invest. 24, S48–S59 (2018)
Kong, D., Cen, L., Jin, H.: AUTOREB: automatically understanding the review-to-behavior fidelity in android applications. In: Proceedings of CCS (2015)
Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491–3508 (2018)
Macenaite, M.: From universal towards child-specific protection of the right to privacy online: dilemmas in the EU general data protection regulation. New Media Soc. 19(5), 765–779 (2017)
Maskiewicz, J., Ellis, B., Mouradian, J., Shacham, H.: Mouse trap: exploiting firmware updates in USB peripherals. In: Proceedings of WOOT (2014)
Nguyen, M.H., Nguyen, D.L., Nguyen, X.M., Quan, T.T.: Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. Comput. Secur. 76, 128–155 (2018)
Qian, C., Luo, X., Shao, Y., Chan, A.T.: On tracking information flows through JNI in android applications. In: Proceedings of DSN (2014)
Ronen, E., OFlynn, C., Shamir, A.: IoT goes nuclear: creating a ZigBee chain reaction. In: Proceedings of the IEEE Symposium on Security and Privacy (2017)
Rieck, J.: Attacks on fitness trackers revisited: a case-study of unfit firmware security. https://arxiv.org/abs/1604.03313. Accessed July 2018
Shao, Y., Luo, X., Qian, C.: Rootguard: protecting rooted android phones. IEEE Comput. 47(6), 32–40 (2014)
Shoshitaishvili, Y., Wang, R., Hauser, C., Kruegel, C., Vigna, G.: Firmalice - automatic detection of authentication bypass vulnerabilities in binary firmware. In: Proceedings of NDSS (2015)
Sufatrio, Tan, D.J.J., Chua, T.W., Thing, V.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. 47(4), 58 (2015)
Yan, L., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: Proceedings of USENIX Security (2012)
Yu, L., Luo, X., Qian, C., Wang, S., Leung, H.: Enhancing the description-to-behavior fidelity in android apps with privacy policy. IEEE Trans. Softw. Eng. 44, 834–854 (2018)
Yu, L., Zhang, T., Luo, X., Xue, L., Chang, H.: Towards automatically generating privacy policy for android apps. IEEE Trans. Inform. Forensics Secur. 12(4), 865–880 (2017)
Yu, L., Luo, X., Liu, X., Zhang, T.: Can we trust the privacy policies of android apps? In: Proceedings of IEEE/IFIP DSN (2016)
Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for art. In: Proceedings of USENIX SEC (2017)
Xue, L., Qian, C., Luo, X.: AndroidPerf: a cross-layer profiling system for android applications. In: Proceedings of IWQoS (2015)
Zhang, Y., Luo, X., Yin, H.: DexHunter: toward extracting hidden code from packed android applications. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 293–311. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24177-7_15
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Fang, J., Huang, Y.J., Li, F., Li, J., Wang, X., Xiang, Y. (2018). Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-02744-5_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02743-8
Online ISBN: 978-3-030-02744-5
eBook Packages: Computer ScienceComputer Science (R0)