Figure 1. Piosk's overall architecture.
Figure 2. Piosk use case
Figure 3. Piosk prototype implementation and its detailed specification.
Figure 4. Four exemplary GUI screenshots for Piosk and its administrative system.
Table 1 Comparison of Piosk with other security kiosks
References
- Korea Electric Power Corporation (KEPCO). http://home.kepco.co.kr
- Talukder, K. Asoke, and M. Chaitanya. Architecting secure software systems. Auerbach publications, 2008.
- Security Paper Limited. http://www.security-papers.com/
- Ransomware. https://en.wikipedia.org/wiki/Ransomware
- Advanced persistent threat https://en.wikipedia.org/wiki/Advanced_persistent_threat
- Trojan horse. https://en.wikipedia.org/wiki/Trojan_Horse
- Free antivirus protection that never quits. https://www.avast.com
- V3 Internet Security, Greater Business comes with Greater Security. http://global.ahnlab.com
- A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62-67, 2004. DOI: https://doi.org/10.1109/MC.2004.2
- Y. Qi, B. Yang, B. Xu, and J. Li, "Towards system-level optimization for high performance unified threat management", IEEE 3rd International Conference on Networking and Services 2007. DOI: https://doi.org/10.1109/ICNS.2007.126
- Virus Total. https://www.virustotal.com/
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds", ACM conference on Computer and communications security 2009. DOI: https://doi.org/10.1145/1653662.1653687
- J. McLean, "Security models and information flow", IEEE Symposium on Security and Privacy, 1990. DOI: https://doi.org/10.1109/RISP.1990.63849
- B. Kopf and D. Basin, "An information-theoretic model for adaptive side-channel attacks", 14th ACM Conference on Computer and Communications Security. DOI: https://doi.org/10.1145/1315245.1315282
- S. Mario, C. Kostas, P. Catuscia, and S. Geoffrey, "Measuring Information Leakage Using Generalized Gain Functions", IEEE 25th Computer Security Foundations Symposium 2012. DOI: https://doi.org/10.1109/CSF.2012.26
- J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, "Side-channel vulnerability factor: A metric for measuring information leakage", ACM SIGARCH Computer Architecture News 2012, 40(3), 106-117. DOI: https://doi.org/10.1109/ISCA.2012.6237010
- H. Takabi, J. B. Joshi, and G. J. Ahn, "Security and privacy challenges in cloud computing environments" IEEE Symposium on Security and Privacy 2010. DOI: https://doi.org/10.1109/MSP.2010.186
- A. Sharma and K. S. Sanjay, "Evolution and detection of polymorphic and metamorphic malwares: A survey." arXiv preprint arXiv: 1406.7061 (2014). https://doi.org/10.5120/15544-4098
- C. Willems, H. Thorsten, and F. Felix, "Toward automated dynamic malware analysis using cwsandbox", IEEE Symposium on Security and Privacy 2007. DOI: https://doi.org/10.1109/MSP.2007.45
- S. Lee, S. Kim, S. Lee, H. Yoon, D. Lee, J. Choi, and J. Lee, "LARGen: automatic signature generation for Mal wares using latent Dirichlet allocation", IEEE Transactions on Dependable and Secure Computing Vol.15 No.5 2018. DOI: https://doi.org/10.1109/TDSC.2016.2609907
- A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: malware analysis via hardware virtualization extensions", 15th ACM conference on Computer and communications security 2008. DOI: https://doi.org/10.1145/1455770.1455779
- R. E. Knoedler, T. B. Freese, R. M. Parker, and J. E. Janicke, "Security gate with walk through feature", U.S. Patent No. 5,272,840 (1993). Washington, DC: U.S. Patent and Trademark Office.
- MetaDefender, Opswat, https://www.opswat.com/products/metadefender
- California Cyber Security Kiosk, https://www.olea.com/product/california-cyber-security-kiosk/
- ODIX kiosk, File sanitization system, https://odix.com/odix-kiosk/
- D. Maiorca, G. Giacinto, and C. Igino, "Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection", ACM SIGSAC symposium on Information, computer and communications security 2013. DOI: https://doi.org/10.1145/2484313.2484327
- Z. Wang, Z. Tang, K. Zhou, R. Zhang, Z. Qi, and H. Guan, "DsVD: an effective low-overhead dynamic soft- ware vulnerability discoverer", IEEE International Symposium on Autonomous Decentralized Systems 2011. DOI: https://doi.org/10.1109/ISADS.2011.56
- T. Schreck, B. Stefan, and G. Jan, "BISSAM: Automatic vulnerability identification of office documents", Springer International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment 2012. DOI: https://doi.org/10.1007/978-3-642-37300-8_12
- L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, "Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2", USENIX Symposium on Internet Technologies and Systems 1997.
- Sigcheck v2.60. Microsoft, https://docs.microsoft.com/ko-kr/sysinternals/downloads/sigcheck
- Scan Virus Total offline to preserve privacy, GitHub. https://github.com/teeknofil/Virus-Total-Never-Analyzed
- VirusTotal offline analysis, GitHub, https://github.com/cuckoosandbox/cuckoo/issues/2052
- CVE Details, The ultimate security vulnerability datasource. https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-32238/Microsoft-Windows-10.html
- Gooroom OS. https://www.gooroom.kr/
- S. F. Fruhauf and T. Jerome, "Secure universal serial bus (USB) storage device and method." U.S. Patent No. 8,528,096. 3 Sep. 2013.