Skip to main content

Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT

  • Conference paper
  • First Online:
Network and System Security (NSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11058))

Included in the following conference series:

Abstract

There is a large number of high-profile cyberattacks identified in the year of 2017, i.e., Ransomware attacks are one of the areas of cybercrime growing the fastest. These increasingly sophisticated cyberattacks are forcing various organisations to face security challenges and invest money building security and trust models. There will also be an increase in the use of recent development of security solutions that can help improve the detection performance and react to malicious events. In this position paper, we mainly introduce recent development trends in cybersecurity, including legal issues (e.g., GDPR), Artificial intelligence (AI), Mobile security and Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    More formally, ISO27001 is the most famous standard in the ISO/IEC 27000 family whiich provides the requirements for an Information security management systems.

References

  1. Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain - or - rewriting history in bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, pp. 111–126 (2017)

    Google Scholar 

  2. Diro, A.A., Chilamkurti, N.: Deep learning: the frontier for distributed attack detection in Fog-to-Things computing. IEEE Commun. Mag. 56(2), 169–175 (2018)

    Article  Google Scholar 

  3. Chen, L., Hou, S., Ye, Y.: SecureDroid: enhancing security of machine learning-based detection against adversarial android malware attacks. In: Proceedings of ACSAC, pp. 362–372 (2017)

    Google Scholar 

  4. Cui, A., Costello, M., Stolfo, S.: When firmware modifications attack: a case study of embedded exploitation. In: Proceedings of NDSS (2013)

    Google Scholar 

  5. Chen, W., Luo, X., Yin, C., Xiao, B., Au, M.H., Tang, Y.: Cloudbot: advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41, 270–285 (2017)

    Article  Google Scholar 

  6. Chen, S., et al.: Automated poisoning attacks and defenses in malware detection systems: an adversarial machine learning approach. Comput. Secur. 73, 326–344 (2018)

    Article  Google Scholar 

  7. Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of OSDI (2010)

    Google Scholar 

  8. Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tut. 17(2), 998–1022 (2015)

    Article  Google Scholar 

  9. Jones, M.L., Kaufman, E., Edenberg, E.: AI and the ethics of automating consent. IEEE Secur. Priv. 16(3), 64–72 (2018)

    Article  Google Scholar 

  10. Karbab, E.B., Debbabi, M., Derhab, A., Mouheb, D.: MalDozer: automatic framework for android malware detection using deep learning. Digit. Invest. 24, S48–S59 (2018)

    Article  Google Scholar 

  11. Kong, D., Cen, L., Jin, H.: AUTOREB: automatically understanding the review-to-behavior fidelity in android applications. In: Proceedings of CCS (2015)

    Google Scholar 

  12. Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491–3508 (2018)

    Article  Google Scholar 

  13. Macenaite, M.: From universal towards child-specific protection of the right to privacy online: dilemmas in the EU general data protection regulation. New Media Soc. 19(5), 765–779 (2017)

    Article  Google Scholar 

  14. Maskiewicz, J., Ellis, B., Mouradian, J., Shacham, H.: Mouse trap: exploiting firmware updates in USB peripherals. In: Proceedings of WOOT (2014)

    Google Scholar 

  15. Nguyen, M.H., Nguyen, D.L., Nguyen, X.M., Quan, T.T.: Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. Comput. Secur. 76, 128–155 (2018)

    Article  Google Scholar 

  16. Qian, C., Luo, X., Shao, Y., Chan, A.T.: On tracking information flows through JNI in android applications. In: Proceedings of DSN (2014)

    Google Scholar 

  17. Ronen, E., OFlynn, C., Shamir, A.: IoT goes nuclear: creating a ZigBee chain reaction. In: Proceedings of the IEEE Symposium on Security and Privacy (2017)

    Google Scholar 

  18. Rieck, J.: Attacks on fitness trackers revisited: a case-study of unfit firmware security. https://arxiv.org/abs/1604.03313. Accessed July 2018

  19. Shao, Y., Luo, X., Qian, C.: Rootguard: protecting rooted android phones. IEEE Comput. 47(6), 32–40 (2014)

    Article  Google Scholar 

  20. Shoshitaishvili, Y., Wang, R., Hauser, C., Kruegel, C., Vigna, G.: Firmalice - automatic detection of authentication bypass vulnerabilities in binary firmware. In: Proceedings of NDSS (2015)

    Google Scholar 

  21. Sufatrio, Tan, D.J.J., Chua, T.W., Thing, V.L.: Securing android: a survey, taxonomy, and challenges. ACM Comput. Surv. 47(4), 58 (2015)

    Article  Google Scholar 

  22. Yan, L., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: Proceedings of USENIX Security (2012)

    Google Scholar 

  23. Yu, L., Luo, X., Qian, C., Wang, S., Leung, H.: Enhancing the description-to-behavior fidelity in android apps with privacy policy. IEEE Trans. Softw. Eng. 44, 834–854 (2018)

    Article  Google Scholar 

  24. Yu, L., Zhang, T., Luo, X., Xue, L., Chang, H.: Towards automatically generating privacy policy for android apps. IEEE Trans. Inform. Forensics Secur. 12(4), 865–880 (2017)

    Article  Google Scholar 

  25. Yu, L., Luo, X., Liu, X., Zhang, T.: Can we trust the privacy policies of android apps? In: Proceedings of IEEE/IFIP DSN (2016)

    Google Scholar 

  26. Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for art. In: Proceedings of USENIX SEC (2017)

    Google Scholar 

  27. Xue, L., Qian, C., Luo, X.: AndroidPerf: a cross-layer profiling system for android applications. In: Proceedings of IWQoS (2015)

    Google Scholar 

  28. Zhang, Y., Luo, X., Yin, H.: DexHunter: toward extracting hidden code from packed android applications. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 293–311. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24177-7_15

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, J., Huang, Y.J., Li, F., Li, J., Wang, X., Xiang, Y. (2018). Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02744-5_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02743-8

  • Online ISBN: 978-3-030-02744-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics