Loading...

Table of Content

    29 July 2025, Volume 11 Issue 7
    Model of Insider Threat Behavior Detection Based on Graph Neural Network
    2025, 11(7):  586. 
    Asbtract ( )   PDF (1890KB) ( )  
    References | Related Articles | Metrics
    This paper designs a new detection model based on graph neural networks to address the shortcomings of existing models for insider threat behavior detection based on user behavior sequences, which cannot handle long sequences well. The model converts user behavior sequences into a graph structure and transforms the processing of long sequences into the processing of subgraph structures. The experiment designs a graph structure to describe user behavior, which is used to store user behavior in the form of graph data. The baseline GNN model is optimized for this graph structure, which is heterogeneous and has data stored on its edges. The experimental results show that, for the binary classification task of distinguishing normal and threatening behavior, the ROC AUC value of the proposed model is improved by 7% and the MacroF1 value is improved by 7% compared to the baseline model. In the sixclass classification task of distinguishing specific threat types, the MacroF1 value of the proposed model improves by 10% compared to the baseline model.
    Dualbranch Malicious Code Homology Analysis Model Based on Feature Fusion
    2025, 11(7):  594. 
    Asbtract ( )   PDF (2563KB) ( )  
    References | Related Articles | Metrics
    In the homology analysis of malicious code, a large number of malicious code variants are generated due to techniques such as encryption, obfuscation, and packing, which leads to the problem that the deep learning model has insufficient ability to extract the features of malicious code. To solve this problem, a multibranch convolution and transformernet (MCATNet) homology analysis model based on feature fusion was proposed. Firstly, an MCATNet dualbranch network was constructed, one branch was a multibranch convolutional MBC (Multibranch convolution) module, and the MBC module was used to construct the CNN branch, and the CBAM hybrid attention mechanism was introduced to make the network pay more attention to the core features while taking into account the local features. Another branch is the Transformer module with ViT as the backbone, which extracts global feature information of malicious code images and proposes a downsampling module to finely preserve global features while aligning the feature maps of Transformer and CNN at the spatial scale. Secondly, the cascading strategy is used to fuse the local features of the CNN branch and the global features of the Transformer branch to solve the problem that the network only focuses on a single feature. Finally, the Softmax classifier was used to analyze the homology of the malicious code family. Experimental results show that the classification accuracy of the twobranch model based on feature fusion reaches 99.24%, which is 0.11% and 0.65% higher than that of the singlebranch CNN and singlebranch Transformer models, respectively.
    Research on Address Recognition of Bitcoin Mixed Coin Transactions  Based on ResGCN
    2025, 11(7):  603. 
    Asbtract ( )   PDF (2739KB) ( )  
    References | Related Articles | Metrics
    Bitcoin has received attention for its decentralized peertopeer anonymity nature, but its pseudoanonymity makes the transaction still traceable. In order to meet the higher requirements of users for privacy, mixedcoin transactions came into being. However, mixedcoin transactions make it more difficult to trace the funds of bitcoin, and at the same time, it also becomes an accomplice in assisting criminals to illegally launder money. In order to prevent and combat money laundering and other financial crimes, this paper proposes a graph neural networkbased address recognition method for bitcoin mixedcoin transactions. Firstly, a rich and representative labeled address dataset is constructed; secondly, a residual graph convolution network ResGCN is constructed by adding residual connections for graph feature learning and embedding, which overcomes the gradient decay problem of the traditional graph convolution network GCN with the increase of the number of graph convolution layers; and then the selfattention mechanism is combined with the multilayer perceptron MLP for graph classification; and finally output the binary classification results. The experimental results show that the method in this paper can accurately recognize the mixedcoin transaction addresses.
    A Buildin Fuzzing Framework for Opensource BMC Firmware
    2025, 11(7):  611. 
    Asbtract ( )   PDF (1321KB) ( )  
    References | Related Articles | Metrics
    The baseboard management controller (BMC) is a remote management component of servers with high system privileges, and its firmware security is crucial. Currently, opensource BMC firmware, such as OpenBMC, is favored due to its good compatibility, high openness, and shorter development cycles. Facing challenges such as limited computational resources and complex execution environments in firmware dynamic analysis, fuzzing technology combined with firmware emulation can effectively perform vulnerability analysis. However, existing tools mainly target simple closedsource embedded firmware and are not wellsuited for the complex structure of BMC firmware. This paper presents a buildin fuzzing framework, BMCfuzz, tailored for opensource BMC firmware, which supports generalpurpose program analysis tools. The framework relies on full system emulation, allowing generalpurpose fuzzing tools to be directly deployed in the emulated firmware, bypassing the complex emulation environment and directly working on firmware programs. Additionally, the framework leverages opensource features to enhance fuzzing efficiency through source code instrumentation. For complex network service programs that are difficult to emulate, this paper proposes a simple method for generating fuzzed network packet injections to handle fuzzed data input, enabling better emulation and analysis. Experimental results show that the framework’s execution efficiency is improved by 12.1 times, and code coverage is increased by 6.17 times compared to binary instrumentation methods, demonstrating better testing performance.
    FastHotStuff Blockchain Consensus Algorithm with Adaptive View  Dynamic Timeouts
    2025, 11(7):  619. 
    Asbtract ( )   PDF (1301KB) ( )  
    References | Related Articles | Metrics
    The FastHotStuff algorithm achieves a twostage pipelined Byzantine fault tolerant consensus through aggregated signatures. When the leader node of FastHotStuff fails, the deadlock problem in the view change phase brings communication complexity of O(n2). However, current studies have only focused on the deadlock problem and have not considered the issue of continuous view timeouts caused by Byzantine nodes and volatile networks. To address this problem, we propose a FastHotStuff blockchain consensus algorithm with adaptive view dynamic timeouts, called AVDHotStuff. First, the view dynamic timeout strategy algorithm adaptively controls the duration of the next view timeout to avoid continuous view timeouts caused by volatile networks. Second, the leader waiting strategy algorithm reduces the communication complexity of view change from O(n2) to O(n), and ensures the efficiency of view change by adaptively controlling the leader waiting time. Finally, the reputationbased leader selection strategy algorithm introduces reliable nodes into the consensus process, avoiding continuous view timeouts by removing Byzantine nodes during the view change phase. We have conducted experiments to compare our algorithm with FastHotStuff. When Byzantine nodes are present, the average throughput of AVDHotStuff increases by approximately 51.4%, and its average latency decreases by about 59.9%.
    A PUFbased Identity Authentication and Key Negotiation Protocol for Telemedicine
    2025, 11(7):  626. 
    Asbtract ( )   PDF (2116KB) ( )  
    References | Related Articles | Metrics
    Telemedicine is rapidly developing due to its high service efficiency and good medical experience, but the secure transmission of medical data is a critical challenge that needs urgent resolution. Although a large number of authentication and key negotiation protocols suitable for telemedicine environments exist, some of the protocols suffer from security risks and inefficiencies. To address the existing problems, we propose a PUFbased authentication and key negotiation protocol. The protocol employs a trusted gateway to implement a manytomany authentication and key negotiation mechanism, uses the PUF function to generate a “device fingerprint” for unique identification, and leverages the ECC algorithm to ensure the confidentiality of the data. The semantic security of the session key is proved under the random oracle model, the confidentiality and authenticity of the protocol are verified by the ProVerif simulation tool, and the nonformal analysis proves that the protocol is resistant to common attacks such as offline password guessing and session key compromise. Comparison results with related protocols in terms of computation overhead, storage overhead, communication overhead and security show that this protocol exhibits notable feasibility and advantages.
    Multireceiver Multimessage Adaptive Broadcast Signcryption Mechanism
    2025, 11(7):  636. 
    Asbtract ( )   PDF (1048KB) ( )  
    References | Related Articles | Metrics
    To address the issues of user privacy protection and adaptive message quantity in multireceiver broadcast signcryption, a certificateless multireceiver multimessage adaptive broadcast signcryption mechanism was proposed. The receiver identity ID is input into the Lagrange interpolation polynomial to calculate the ciphertext index, and the receiver uniquely locates the signcryption ciphertext, which solves the problem of selfadaptation of the number of messages in the broadcast signcryption. Based on the elliptic curve cryptography, the user decryption key is associated with a random element on the group to solve the privacy protection problem of multireceiver users. Under the random Oracle model, based on the discrete logarithmic assumption and the computational DiffieHellman assumption on the elliptic curve additive cyclic group, it is proved that the scheme satisfies confidentiality and unforgeability. The functional efficiency analysis shows that the scheme is superior to the traditional multireceiver signcryption scheme.
    Confidential Computation of Association Values of Set Intersection Elements
    2025, 11(7):  645. 
    Asbtract ( )   PDF (846KB) ( )  
    References | Related Articles | Metrics
    The computation of association values for intersection elements is an extension of the privacypreserving set intersection problem, representing a novel challenge in the domain of secure multiparty computation. This paper proposes a scheme for computing the association values of intersection elements securely. Initially, leveraging secret sharing combined with dual cloud servers, we implement a distributed oblivious pseudorandom function (OtdPRF). On this basis, we integrate the concept of oblivious polynomial interpolation with the ElGamal encryption algorithm to achieve a secure computation scheme for the sum of association values of intersection elements between two parties. In the above scheme,homomorphic computation overhead is outsourced to the cloud, thereby reducing computational complexity for participants. Furthermore, we expand the application scenarios based on the scheme for sum of association values of intersection elements, designing and implementing secure determination of threshold relationships and computation of average values of intersection elements. Finally, employing a simulation paradigm, we demonstrate the security of the proposed scheme under a semihonest model and analyze its performance in terms of computation and communication complexity.
    Security Resource Scheduling Methods in Virtualization Environment
    2025, 11(7):  652. 
    Asbtract ( )   PDF (1729KB) ( )  
    References | Related Articles | Metrics
    In the era of cloud computing, The integration of security technology and cloud computing has given rise to an innovative security defense approachvirtualization of security resources. This novel architecture serves as a basis for a comprehensive security protection system that consolidates multiple security functionsincluding firewalls, intrusion detection and prevention systems, and antivirus solutionsinto a flexible resource set through virtualization and softwaredefined technologies. This article delves into the relevant concepts, advantages, typical scheduling algorithms, and future development directions of secure resource virtualization. This article provides a detailed analysis of the composition devices and functional characteristics of virtualized security resources, and points out their advantages in resource virtualization and sharing, flexible expansion, unified management, and deep integration with cloud environments. In terms of scheduling algorithms, this article studies various typical virtualization security resource and task scheduling strategies, such as coral reef task scheduling algorithm, immune genetic algorithm, improved pollen transmission algorithm, and improved algorithm based on Pareto optimal theory, and explores their advantages and applicable scenarios. The article looks forward to the future development direction of security resource virtualization, The aim is to provide reference for further optimization configuration and cost control of security resource virtualization, and promote more efficient and stable development in the field of cloud computing under the premise of ensuring security.
    Authenticated Key Agreement Protocol for Postquantum  Anonymous Communication
    2025, 11(7):  661. 
    Asbtract ( )   PDF (1449KB) ( )  
    References | Related Articles | Metrics
    As the scale of data in the network becomes more and more enormous. These data are highly associated with the users, once the data is leaked, the identity information and personal privacy of the users will be seriously threatened. The encryption system based on traditional number theory becomes no longer secure with the rapid development of quantum technology, in response to this problem, this paper proposes a key negotiation protocol that gives anonymous authentication on the lattice, based on lattice cryptography security challenges can resist quantum attacks, its security has been analyzed by the security model and theoretical and compared with similar schemes to obtain a significant improvement. This novel protocol is based on the authentication cryptography of lattice ciphers, which is capable of accomplishing mutual authentication and establishing secure communication, and is able to optimize the deployment of certificate system components of public key infrastructure.
    Personalized Differential Privacy Trajectory Publishing Scheme  Fusing Semantic
    2025, 11(7):  670. 
    Asbtract ( )   PDF (3808KB) ( )  
    References | Related Articles | Metrics
    Trajectory databases contain massive information, and direct release may lead to the disclosure of personal sensitive information. The location semantic information of users encompasses abundant details about daily activities and access preferences. The existing personalized differential privacy trajectory publishing scheme does not consider the semantic information between location points in determining the privacy level, and there is still an imbalance between privacy and data availability. To solve the above problems, a semantically integrated personalized differential privacy trajectory publishing scheme (PRTDP) is proposed, which determines the dynamic privacy level according to the mobile characteristics of the user’s own trajectory. Firstly, an algorithm for determining sensitive location points is proposed. The DBSCAN clustering algorithm is used to obtain the user’s sensitive location points. Then, a personalized privacy level partitioning algorithm is proposed. By leveraging the semantic information between the location points, we construct a digraph model of the sensitive location point relationships and design an enhanced PageRank algorithm to determine the privacy level of the location points. Laplace noise corresponding to the privacy level is added to the trajectory data before publication. PRTDP scheme can effectively protect the sensitive information of users while enhancing trajectory data usability of trajectory data. Experiments show that the scheme outperforms the existing schemes NFRP algorithm and FPT algorithm in three dimensions: privacy protection degree, availability and time efficiency.