International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3 <p><a href="https://proceedings.cybercon.ro/index.php/ic3/about-ic3"><strong>The</strong> <strong>International Conference on Cybersecurity and Cybercrime (IC3)</strong></a> is an annual scientific conference organized by the <strong><a href="https://www.raisa.org" target="_blank" rel="noopener">Romanian Association for Information Security Assurance</a></strong> that aims to encourage the exchange of ideas about the evolution of cyberspace, information security challenges, and new facets of cybercrime.</p> <p><strong>The conference began in 2014</strong> as an initiative to provide a suitable platform for students to present their research in this field and has gained substantial support in recent years. Since 2022, the <strong>U.S. Embassy in Romania</strong> has partnered with the <strong>Romanian Association for Information Security Assurance</strong> to support the conference as part of the "<em>Strengthen Cybersecurity Education and Research for Preventing Cybercrime"</em> project, a partnership that obtained the <strong><em>Cyber Outstanding Security Performance Award</em> (<em>Cyber OSPA</em>)</strong> 2022 in the <a href="https://www.thecyberospas.com/2022/12/15/2022-cyber-ospas-winners-announced/" target="_blank" rel="noopener"><em>Outstanding Cyber Security Partnership</em></a> category.</p> <p><a href="https://proceedings.cybercon.ro/index.php/ic3/issue/archive"><strong>The</strong> <strong>Proceedings of the International Conference on Cybersecurity and Cybercrime</strong></a> became <strong>Open Access</strong> in 2022 and indexed in <strong>international databases</strong> like <em>EBSCOhost, Central and Eastern European Online Library (CEEOL)</em>, and <em>Google Scholar</em>. In addition, permanent links to the published papers will be maintained using the <em>Digital Object Identifier (DOI)</em> system by <em>CrossRef</em>.</p> <p><strong>The accepted papers</strong> from this scientific conference <strong>can be presented</strong> at <a href="https://www.cybercon.ro" target="_blank" rel="noopener"><strong>CyberCon Romania</strong></a>, an international conference that brings experts from public institutions, private companies, universities, and NGOs, to raise awareness, embody the cybersecurity culture, and share best practices in fighting cybercrime.</p> en-US contact@raisa.org ( International Conference on Cybersecurity and Cybercrime) contact@raisa.org (Romanian Association for Information Security Assurance) Tue, 30 May 2023 00:00:00 +0300 OJS 3.3.0.14 http://blogs.law.harvard.edu/tech/rss 60 Exploring a Diplomatic System of Cooperation in the Cyber Space through a Proposed Cyber Diplomacy Cooperation Framework https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-01 <p>Cyberattacks are on the rise, and cyber weapons are the main tools used in modern warfare. All these occurrences are changing the nature of traditional diplomacy, contributing to developing new avenues for Cyber Diplomacy. The world's leading nations have realized the importance of establishing a diplomatic system of collaboration in the cyber sphere to facilitate bilateral relationships between nations and cooperation in cyberspace in already-established alliances such as NATO, the United Nations, and regional trade associations. Multiple studies have discussed and detailed the concept of "cyber diplomacy" and the diplomatic behavior associated with it; however, few of these analyses have sought to distinguish the "cyber diplomacy" concept from the more traditional and well-known concept of "diplomacy." The scope of this proposal is to create a Cyber Diplomacy Cooperation Framework which will bring together conventional elements of diplomacy and cutting-edge cybersecurity mechanisms. As cyber warfare concerns are growing, nations need a normative cyber diplomacy framework that can be adapted by countries to prevent cyber-crises and engage more nations in the discussion.</p> Natalia BELL, Alex MBAZIIRA Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-01 Tue, 30 May 2023 00:00:00 +0300 Artificial Intelligence to Counter Cyber-Terrorism https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-02 <p>This paper discusses the role of disruptive and innovative technologies for countering the spread of terrorist online content (TCO). In particular, it focuses on the use of Artificial Intelligence (AI) in support to Host Service Providers (HSPs) and Law and Enforcement Agencies (LEAs). The violent and terrorist content is more and more disseminated online taking advantages of the opportunities offered by Internet. The diffusion of terrorist propaganda has a negative impact on the civil society and poses several risks. For this reason, the European institutions published in 2021 the Regulation (EU) 2021/784 to address the misuse of hosting services for the dissemination to the public of TOC. It regulates the measures to be applied by HSPs and Member States’ authorities in order to identify and ensure the quick TOC removal and to facilitate cooperation with each other and Europol. In order to be compliant with these dispositions, AI-based disruptive technologies can provide LEAs and HSPs, especially the small and micro-ones, a concreate support. The implementation of the Regulation and the use of AI technologies have legal and ethical implications that have to be considered. The paper is based on the work and preliminary research conducted in the framework of the European funded project ALLIES, “AI based framework for supporting micro and small Hosting Service Providers (HSPs) on the report and removal of online terrorist content”, Grant Number 101080090.</p> Serena BIANCHI, Marina MANCUSO, Caterina PATERNOSTER, George KALPAKIS , Theodora TSIKRIKA , Stefanos VROCHIDIS , Denitsa KOZHUHAROVA , Bernhard JAEGER Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-02 Tue, 30 May 2023 00:00:00 +0300 Innovation in the Financial Sector (FinTech): Paradigms, Causes, Effects and Perspectives https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-03 <p>The changes and evolution of the international and domestic financial-banking system, in the context of globalization, after the financial crisis of 2008, determined the emergence of global, virtual banks, megabanks, financial groups that use disruptive technologies and technological innovations. The first FinTech Action Plan (technology-based innovation in the field of financial services or financial technological innovations) of the European Union mark, as well, the first step circumscribed to the EU Digital Finance Strategy, in order to allow the expansion of innovative business models, but without forgetting to strengthen cyber security and to increase the degree of integrity of the financial system. In this context, however, it is important to take into account the variety of the institutions and the technologies in the countries participating in the Single Supervisory Mechanism (SSM), because the FinTech banks capture the different activities of the credit institutions in different jurisdictions to be closer to the customers and the investors and, in the same time, to expand the area of supervision of the problems related to the emergence of FinTech, because they exceed a sector of the economy or a geographical area and involves multiple financial-banking supervisory and regulatory institutions, belonging to various sectors.</p> Ruxandra RÎMNICEANU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-03 Tue, 30 May 2023 00:00:00 +0300 An Overview of RPL Networks from the Viewpoint of Cybersecurity https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-04 <p>In the past decade, the Internet of Things (IoT) has had a significant impact on a global scale. The Internet of Things (IoT) has facilitated the interconnection of a vast number of devices in contemporary times. The proliferation of Internet of Things (IoT) devices underscores the importance of ensuring robust security measures to safeguard against potential threats. The RPL protocol has been specifically designed for routing purposes within the context of IoT devices, operating at the network layer. The exploitation of the RPL protocol poses a threat to IoT networks and has the potential to substantially affect network performance. This article introduces the STACK project, which aims to improve IoT transmission capabilities, identify and mitigate attacks using performance and interference monitoring, and use methods tightly integrated with an intelligent edge.</p> Cosmina STALIDI, Eduard-Cristian POPOVICI, George SUCIU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-04 Tue, 30 May 2023 00:00:00 +0300 Vulnerability Scanner: Web-based Security Testing https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-05 <p>As the use of internet-based software increased, cybersecurity has emerged as a major issue in the current world. The fast-paced technology innovations allowed most companies to scale their business, consumers to access easier their favorite products, thus increasing the reliance on web-based software. The importance of web security cannot be emphasized given the increase in cybercrime and the damage it poses to businesses, people, and governments. This paper proposes an automated solution capable of detecting and exploiting common vulnerabilities found on web-based software, this being done without performing any malicious intended operations. By using software capable of automatically detecting the means a client could communicate with a server, users can ensure that a thorough verification is done on their web-applications, revealing the blind spots that developers may have overlook.</p> Andrei-Daniel ANDRONESCU, Ioana-Ilona BRĂSLAȘU, Dumitru-Iulian NĂSTAC Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-05 Tue, 30 May 2023 00:00:00 +0300 Ensuring the Security of a Communication Network through Resilience. Mathematical Modeling https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-06 <p>Many of the network computing systems used in various organizations are not resilient enough to withstand attacks and failures. The performance of these networks is degraded by failures. Thus, it is important to develop techniques for designing and implementing resilient service-oriented networks that can survive attacks and failures, as well as continue to provide a reasonable level of service. This paper considers the mathematical modeling using graph theory of resilience in service-oriented communication networks. The objective of this paper is to develop the concept of service-oriented resilient system as well as to identify the metrics used to quantify resilience to node and edge failures. Using these metrics, we will choose an appropriate network topology and/or an optimal distribution of services in the network.</p> Constantin-Alin COPACI, Dorina-Luminiţa COPACI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-06 Tue, 30 May 2023 00:00:00 +0300 Enhancing EU Cyber Defense Through Hardware Trojans Detection Capabilities https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-07 <p>Software Trojans and cybersecurity are a concern worldwide. Hardware Trojans are likely to be an issue faced by the Defence Industry of all countries. Information on how defense industry stakeholders deal with HT in Defense Products is by nature scarce or even inaccessible. It is however fair to assume that they adapt and use IC RE methodologies, notably some developed for IP infringement, to search for HTs. With these RE methodologies, checking a chip after its fabrication implies to deconstruct and analyze the whole surface and all the layers of a chip. It is thus hard to know for sure which states has acquired Hardware Trojan detection capabilities. There are however indications that some States could be in the process of acquiring such capabilities.</p> Vasile-Florin POPESCU, Victor GÂNSAC, Olivia COMȘA, Cristian ICHIMESCU, Dănuț TURCU, George BUCĂȚA Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-07 Tue, 30 May 2023 00:00:00 +0300 Carnival of Cybercrimes - Taking off the Mask of Synthetic Identity Theft https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-08 <p>This article portrays a comparative and doctrinal analysis that aims to combine theoretical and applicable knowledge over a deeply rooted, yet still unfamiliar cybercrime: synthetic identity theft. The jurisdictional dimensions explore the European Union (EU), United Kingdom (UK) and United States (US) in terms of expertise, legal initiatives, regulations and practical cases. As a prerequisite, the study has addressed the connection with identity theft and identity fraud as the Criminal Law “labels” it generally belongs to. Moreover, the most thought-provoking part represents analysing the nexus between synthetic identity theft and personal data protection, focused on security incidents. On this latter point, personal data breaches are proven as frequently being both a cause and an effect for synthetic identity theft. Subsequently, this turns out to have significant impact on individuals and organisations alike, predominantly in the financial sector, although harm may take several shapes.</p> Larisa-Mădălina MUNTEANU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-08 Tue, 30 May 2023 00:00:00 +0300 Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-09 <p>Digital civilization has changed war circumstances. Emerging dangers have asymmetry, variety, and continual change; quick transmission through the network; near-immediacy; possibility for unrestricted access; and swift power to affect people’s behavior. Cognitive Warfare, an international relations issue, uses information, cyber, and psychological warfare tactics. Daesh sends threatening messages to Western countries and spreads internet propaganda to recruit new members and induce terror. The study attempts to propose a novel knowledge-based approach for detecting terrorists by examining data obtained from Twitter and leading Daesh publications, through Data Mining techniques.</p> Gianluigi ME, Maria Felicita MUCCI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-09 Tue, 30 May 2023 00:00:00 +0300 ChatGPT - Information Security Overview https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-10 <p>About one hundred years ago humanity experienced a substantial change when we embraced the use of electricity in our homes and daily lives. Now, humanity is changing once again by adopting the use of artificial intelligence on a larger scale. Expressing concerns about the next industrial revolution that will fundamentally alter the way we live, work, and relate to one another. ChatGPT has become so popular in the last months that a lot of technical or not so technical people have used it and integrated in their daily work to complete tasks faster and more efficient, but this article will highlight the abuse of chatGPT by the people that do not have always good intentions - threat actors. This article is approaching the Information Security risks that have appeared with the use of chatGPT by the employees that are not aware about the threats or even the use of chatGPT by the threat actors that are aware and ready to abuse its computational power.</p> Gabriela TOD-RĂILEANU, Sabina-Daniela AXINTE Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-10 Tue, 30 May 2023 00:00:00 +0300 Cyber Diplomacy and Artificial Intelligence: Opportunities and Challenges https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-11 <p>The application of AI in cyber diplomacy offers promising prospects for enhancing international cybersecurity efforts. AI can analyze extensive data sets and uncover patterns that may indicate cyber threats. This can equip governments and organizations with a deeper understanding of the nature and scope of cyber threats, thereby facilitating more effective responses. Additionally, AI can enable the creation of automated threat detection and response systems, thereby reducing response times and improving the overall efficacy of cybersecurity measures. Furthermore, AI can facilitate the development of predictive models that can anticipate potential cyber threats before they materialize, further enhancing the ability to address cybersecurity challenges.\</p> Alexandra-Cristina DINU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-11 Tue, 30 May 2023 00:00:00 +0300 Artificial News Popularity Detection Based on Telegram Channels in Azerbaijan https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-12 <p class="Abstract">With the exponential growth of digital media, readers face a daunting task of sifting through vast amounts of information to identify important news. This problem is especially critical for media professionals, journalists, and news agencies who need to quickly filter news articles to identify relevant and significant stories. Machine learning models offer a promising solution by automatically classifying news articles based on their significance. In this paper, we propose novel machine learning models for news significance detection, leveraging state-of-the-art deep learning architectures and a dataset of news articles. We evaluate our models using a variety of performance metrics and demonstrate their effectiveness compared to existing methods. Our proposed approach has the potential to significantly improve the efficiency and accuracy of news selection, benefiting both media professionals and readers alike. Furthermore, it can be beneficial to forecast the popularity of fake news and prevent its dissemination in society. Approximately, 2800 Azerbaijani news articles have been collected from telegram and labeled as popular or unpopular according to statistical calculation results. For news popularity detection, application of SVM, Random Forest and Neural network models and their results have been discussed in this paper.</p> Davud RUSTAMOV, Jalal RASULZADE, Shamsaddin HUSEYNOV Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-12 Tue, 30 May 2023 00:00:00 +0300 Smart Email Security Assistant https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-13 <p class="Abstract">With security incidents and breaches growing each year, email is still used as the major entry point to server malicious content that results in credential theft or malware infections enabling malicious threat actors to mount complex attacks. This paper is intended to document a new approach for detecting suspicious and malicious emails leveraging techniques such as security analytics, natural language processing to discover the intent of the email, as well as artificial neural networks to support more complex rules for classification. This solution can be used in a basic mode to flag which emails are safe and which are not, at the same time it can also be used by security analysts to gain a better understanding of the attack vectors and speed up the investigation process.</p> Cristian PASCARIU, Ioan BACIVAROV Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-13 Tue, 30 May 2023 00:00:00 +0300 A Computer Abusive Access Case Study Solved with Windows Registry Analysis https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-14 <p>This article has the aim to describe a real forensics investigation case. An employee is accused of revealing confidential company information related to a project he was working on using a company computer registered to the company domain. The accused defends himself, insinuating the doubt that it could have been anyone because his office is always open. After the seizure and acquisition of a company hard drive, the investigators want to find some evidences related the Windows system registry. In particular, the analysis will be aimed at identifying what were the energy and standby settings at the time of the seizure and if upon reactivation of the screen, the password was requested and needed to access the system.</p> Pierluigi PERRONE, Antonio SILVESTRE, Giuseppe TARASCHI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-14 Tue, 30 May 2023 00:00:00 +0300 Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-15 <p class="Abstract" style="text-indent: 0cm;">A brute force attack is a common method used by cybercriminals to gain unauthorized access to user accounts. It is essential for individuals and organizations to take proactive measures to protect themselves from such attacks. One way to do this is by improving their knowledge of cybersecurity and implementing measures to safeguard their online presence. Using programming languages like Python and web-frameworks like Django, websites can be developed to help individuals generate secure and memorable passwords that align with the latest password security standards. This can help anyone who wants to improve their password security, irrespective of whether they have been a victim of a cyber-attack or not<span style="color: #374151; background: #F7F7F8;">.</span></p> Ioana-Ilona BRĂSLAȘU, Andrei-Daniel ANDRONESCU, Dumitru-Iulian NĂSTAC Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-15 Tue, 30 May 2023 00:00:00 +0300 Artificial Intelligence and its Impact on Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-16 <p class="Abstract">It is well known that technology is becoming increasingly prevalent among us, and that it is evolving at a quick pace. We're hearing more and more about artificial intelligence and how it affects our lives. Opinions on AI split the globe into two camps. Therefore, we choose to discuss what Artificial Intelligence is and how it marks our lives. Is it good to employ artificial intelligence? If so, how far should this be taken? Can it be used in a bad way? Sure, but this may also play a significant role in preventing and combatting cybercrime. All of these topics will be addressed in the next article.</p> Carla LOZONSCHI, Irina BAKHAYA Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-16 Tue, 30 May 2023 00:00:00 +0300 Protecting Your E-Commerce Business. Analysis on Cyber Security Threats https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-17 <p class="Abstract">This paper aims to gather complete information needed for a retailer running an e-commerce website, with the intention of presenting some of the most common cyber security threats, such as malware, ransomware, SQL injection, and phishing, as well as ways to prevent them from happening and ways to manage the aftermath of a full-scale attack being carried out. Some best practices will be noted as a process that should always be considered when setting up an e-commerce business, and a risk management strategy will be outlined. An analysis will be performed on a data breach with one of the biggest number of victims in the last decade, which affected the Microsoft Exchange Servers.</p> Georgiana ANDREIANU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-17 Tue, 30 May 2023 00:00:00 +0300 Types of Attacks and Security Methods. Virtual Machines https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-18 <p class="Abstract">Virtualization is a type of process used to create a virtual environment. Many organizations think about the security implications after implementing a new technology. Virtualization can be used in many ways and requires appropriate security controls in each situation. This paper presents the idea of using a virtual machine to share services and information over the Internet. In case of an attack, the resources of the virtual machine will be affected, while the resources of the real machine are safe. In this paper, we present the perspective of an attack by running malicious software on a virtual machine. We will show that although unauthorized control of the virtual machine is obtained, the real machine is not affected.</p> Dorina-Luminița COPACI, Constantin-Alexandru COPACI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-18 Tue, 30 May 2023 00:00:00 +0300 A Signal Theory Model for Security Monitoring using CheckMK https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-19 <p>Continuous monitoring of intelligent systems is used to analyze data and text from various sources. They usually monitor things such as risk, controls, opportunities, competition, and other concerns. While there exists literature that provides information on the capabilities of this kind of system, there has been a limited theoretical development in this field. The information sources monitored by these systems provide signals related to events, activities, or issues. However, selecting the appropriate information sources is not a simple task, because it is influenced by factors such as time, cost, redundancy, reliability, or weak signals. Furthermore, for the monitored signals, it is recommended to generate some analytics to study the flow and have a traceability of the issue we are dealing with. In this paper, a signal theory model is introduced and applied to address some of these issues regarding the SSH brute-force attacks. I will use a tool called CheckMK and its capabilities to implement a signal theory model used for monitoring security of a system.</p> Iliuță-Alexandru IONEL Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-19 Tue, 30 May 2023 00:00:00 +0300 Digitalization of Finance: Effect or Cause of Programmed Chaos? https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-20 <p>The actual "permacrisis" marks the five transitions that are unfolding simultaneously: a transition in the planet's climate regime, an energy transition, a geopolitical transition, a technological transition and a demographic transition. In this context, all the risks that are around show us that we are dealing with a programmed chaos that might affect the financial ecosystem, also. In this respect, such to avoid a collapse and to strengthen the banking and financial sector, the European entities appreciate that there it is necessary to strengthen the leadership of the EU in the digital domain by promoting inclusive and sustainable digital policies, serving citizens and businesses. Taking into account that the risks of increased exposure to potential cybercrime, operational resilience failures and data protection and privacy issues could have an important impact, the digital transformation must be in line with EU values - the 2030 policy program entitled "The Path to the Digital Decade" and "The Declaration on Digital Rights and Principles in the E.U.".</p> Ruxandra RÎMNICEANU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-20 Tue, 30 May 2023 00:00:00 +0300 A FMEA Analysis on Web Applications https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-21 <p class="Abstract">Based on the Failure Mode and Effects Analysis (FMEA) method, this paper identifies the potential causes that lead to the failure of a Web application built on the WordPress platform. Both software vulnerabilities identified in the U.S. National Vulnerability Database (NVD) and other platform administration and configuration processes that can be exploited in cyber-attacks against the Web application are considered. Finally, measures to eliminate potential security breaches are proposed in the form of a best practice guide for managing sensitive data and increasing the level of security for this type of application.</p> Gabriel PETRICĂ, Costel CIUCHI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-21 Tue, 30 May 2023 00:00:00 +0300 The Implications and Effects of Data Leaks https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-22 <p class="Abstract">In the following article we will present how data theft can have serious effects on the personal life of citizens and users of certain applications, and in general on public institutions and countries. In the following we will find out how these data can end up in the hands of hackers, for what purpose they are used and what are the legal implications. In the end we will analyze how the authorities try to limit this phenomenon and how each of us can take protective measures for this purpose.</p> Paul-Andrei PREDESCU, Dragoș BĂLAN Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-22 Tue, 30 May 2023 00:00:00 +0300 Security by Design https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-23 <p class="Abstract">The security should be an area that can cover multiple technical disciplines that needs to be focused on customers and to try protecting against different threats. There can be multiple disciplines that can be part of the security and those can be: assurance, anti-tamper and information assurance and cybersecurity. Security must be taken into consideration throughout the entire product lifecycle in order to maximize the protection of a system. The purpose of this article is to highlight design security flaws which should always be considered as part of the design flow for an application or a product. The recommendations can be applied in combination with different methodologies, depending on what the company chooses to use, wheatear it is Agile or Waterfall. Principle of security by design will be tackled within the article.</p> Elena-Denisa STROE Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-23 Tue, 30 May 2023 00:00:00 +0300 Enhancing the Security of Cryptographic Systems by Pseudo-Random Number Generation Algorithms https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-24 <p class="Abstract">Pseudo-random numbers play an indispensable role in the design of encryption systems, such as public and private key flow. The efficiency of crypto systems is directly proportional to the quality of the secret key generated using a random number generation algorithm. In this paper, the efficiency and applicability of a modified Linear Congruential Generator (LCG) type algorithm will be presented to increase the rate of occurrence of numbers and tend as much as possible to a truly random number. Moreover, it will be integrated into a graphical interface, which can later be integrated into the security of a larger application or even a website.</p> Evelyn ENESCU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-24 Tue, 30 May 2023 00:00:00 +0300 Open-Source Intelligence - Useful Tools in Data Analysis https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-25 <p class="Abstract">The paper aims to address how open sources, available in the public space, can provide relevant, high-quality information on which organizations (whether public or private) can strengthen their decision-making process. For example: the development of public policies, the development of security policies, law enforcement norms, the adaptation of tax systems to the digital age, the implementation of targeted marketing campaigns, the widespread access to continuing education, with the aim of creating an adapted workforce in the digital age, the business environment can support technology change through a more intense collaboration with authorities, local communities and society as a whole, etc.</p> Adelaida STĂNCIULESCU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-25 Tue, 30 May 2023 00:00:00 +0300 Unit Testing and Automate Security Testing https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-26 <p>In the current context, technology plays a crucial role in our lives, from the moment we wake up until the end of the day we interact directly or indirectly with this new world. Since it appeared, its purpose has been to come to the aid of humanity, to evolve in an efficient and effective way and with all that, it also represented an open door for people who used technology in an obscure way. The number of cases of cyber-attacks has increased exponentially, from data theft to the integrity of critical sectors (health, transport, energy, financial), every possibility was tried to be exploited, leading to serious consequences. Awareness is the first step towards safety, and further it is important how to use technology in order not to be the target of attacks, but also to stay informed and to become better persons in daily activities. This paper presents an analysis of automated testing for software applications, what it is, how automated testing is divided, the benefits brought by it, as well as unit testing details and some examples. Finally, automatic security testing is discussed, the most emerging web application security risks, suggestions about Android security testing tools and some automation frameworks. The focus is on creating an overview, differentiating between the terms used and exemplifying them.</p> Roxana PRUTEANU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-26 Tue, 30 May 2023 00:00:00 +0300 An Efficient Security System That Uses Artificial Intelligence to Detect and Identify Objects https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-27 <p>Object identification is a significant task in computer vision due to the complexity and diversity of the things that must be detected. Rapid response time and precision are critical, particularly in security applications. We investigate YOLOv5, one of the most efficient object identification algorithms on the market, in this study. Our goal is to show how successful this algorithm is in a security system when compared to other existing alternatives. We also created a web interface that allows visitors to view the live camera feed and track the object detection process in real time. We provide our action plan, as well as the technology and knowledge required to complete this project. The suggested security system consists of a high-resolution surveillance camera and the YOLOv5 object detection algorithm. We created and implemented this system using computer programming and image processing technologies. Our findings reveal that the YOLOv5 algorithm outperforms alternative solutions in terms of speed and accuracy.</p> Grigor PARANGONI, Dumitru-Iulian NĂSTAC Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-27 Tue, 30 May 2023 00:00:00 +0300 Cybercrimes in the Metaverse: Challenges and Solutions https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-28 <p>The emergence of the metaverse has brought about novel opportunities for user interaction and commerce. However, with these new technologies also comes the rise of cybercrime as well as new types of cybercrime. The current article aims to delve into the manifold forms of cybercrime that loom large in the metaverse - from virtual theft and identity theft, to cyberbullying. At the same time, the paper explores the multiple challenges that come with preventing and addressing such crimes, such as the arduous task of identifying perpetrators and the inefficacy of law enforcement as well as the necessity for new laws created for the metaverse. In conclusion, the study will explore viable solutions for preventing and mitigating cybercrimes in the metaverse. The article aims to do exploratory research of cybercrimes and technological solutions such as blockchain and AI, as well as policy and legal changes, so that the metaverse can be a safe and secure haven for all users.</p> Alexandru-Valentin TEODOROV Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-28 Tue, 30 May 2023 00:00:00 +0300 Financing Terrorism: Economy's Dark Side https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-29 <p class="Abstract">In the hidden depths of covert operations and clandestine dealings, the sinew of currency entwines in a sinister ballet, fueling the malevolent fires of terrorism, bestowing upon it the means to unleash havoc and anguish upon unsuspecting souls. Within the intricate web of the global economy, the haunting specter of terrorist financing looms large, its tendrils entangling a labyrinthine network of cartels funding jihadist endeavors, all entwined within the ideological struggle between material wealth and religious fervor. The aim of this study is to delve into the intricate layers of terrorist financing. The first layer involves conducting a literature review focusing on the 2000s, providing insights into the subject. Moving on to the second layer, a behavioral analysis of terrorist financiers is presented, highlighting the formation of alliances between terrorists and financiers. The third layer examines the utilization of advanced technology and intelligent materials in combating the issue of terrorist financing. Finally, the research concludes with an overview of the challenges posed by the influence of the black economy in a globalized world.</p> Andreea-Mădălina VÂRTEI Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-29 Tue, 30 May 2023 00:00:00 +0300 Security Testing for E-Commerce Applications https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-30 <p class="Abstract">Over the past decade, as the e-Commerce market has evolved into a shopping ecosystem involving multiple devices and store concepts, retailers have been continuously innovating the online shopping experience introducing convenient features like multi-device optimizations, product customization, quick and secure checkout processes, or recurrent payments to attract more customers and influence purchase decisions. The main guidelines that are followed in this paper are revolving around security testing and how it can be performed in the form of manual and automated testing, with aid from automated security tools. This paper looks at the threats e-Commerce Applications are facing in regards with cybersecurity and intends to assist preventing vulnerabilities being exploited by malicious intended users by showing the importance of performing security testing to identify weaknesses, mitigate risks and to raise awareness of the importance of strong security measures and procedures.</p> Alexandru-Petrișor LAZĂRA Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-30 Tue, 30 May 2023 00:00:00 +0300 Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-31 <p class="Abstract">This scientific study aims to explore the potential for launching a cyber-attack through SEAP platform, particularly in light of the increasing use of ransomware as a tool to cause widespread damage to critical infrastructure. The study focuses on the methodology of a ransomware attack on a critical infrastructure, with a specific emphasis on the analysis of the infection process, persistence mechanism, encryption process, recovery prevention, and propagation mechanisms, as well as the communication with command and control servers.</p> Eduard-Ștefan SANDU Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-31 Tue, 30 May 2023 00:00:00 +0300 A Method of Warning About Unauthorized Access to a Room https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-32 <p>This paper is based on the study of cybercrime in the context of a world based on technology. Whether it is financial losses, data leaks or mental trauma resulting from harassment in the online environment, cybercrime is part of the reality of the modern world, where the multiple advantages of using the most advanced technologies bring with them disadvantages that cannot be ignored. We will treat the types of cyberattacks, but also the methods by which we can protect ourselves as much as possible. An example of increasing the degree of security in terms of physical access to a room containing sensitive information, achieved at low cost, is also provided. A "smart" entrance mat is used to provide access, a coconut fiber mat into which Linqstat (Velostat) tactile force sensors and the data processing electronics provided by them have been inserted.</p> Cristian-Ovidiu OPRIȘ Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-32 Tue, 30 May 2023 00:00:00 +0300 Guarding the Nation: A Comprehensive Look at State Cybersecurity Measure https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-33 <p>In a continuously evolving world, technology has not been left out of the process which consists of studies and research done by specialists in the field of cyber technology. Although the latter has brought along benignant effects in society, it can be considered a controversial domain due to those effects that can be used against the public safety and national security. Cyber-attacks &amp; Cyber terrorism are just two of them, usually countered by Cyber intelligence, OSINT security, Cyber risk management. These actions are coordinated by different intelligence services such as: Federal Bureau of Investigation – FBI, Romanian Intelligence Service – SRI, Federal Security Service – FSB, while they have to cooperate with civilians, due to a shortage of employees. The lack of qualified staff on the following domain: awareness of the different types of cyber-attack, such as malware, web-based attacks, phishing, web application attacks, spam, distributed denial of service (DDoS), identity theft, data breach, insider threat, botnets, physical manipulation, damage, theft and loss, information leakage, ransomware, cyber-espionage, industrial espionage and crypto jacking, reaches an amount of 7.659 officials that are needed in this area.</p> Marian-Emilian SPĂTARU, Alexandru BARCAN Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-33 Tue, 30 May 2023 00:00:00 +0300 Methods for Detecting Malware Using Static, Dynamic and Hybrid Analysis https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-34 <p>Malware analysis is the process of locating and examining malicious software or code with the aim of comprehending its operation and developing countermeasures. Malware can take many forms, such as viruses, worms, Trojans, and ransomware, and can cause significant harm to individuals, organizations, and even entire countries. To determine a piece of malware's purpose, potential effects, and capabilities, malware analysis entails examining the behavior, structure, and functionalities of the malware. Malware analysts are essential to the cybersecurity sector because they strive to spot dangers, eliminate them, and defend against online attacks. By using the knowledge gleaned from malware analysis, security solutions can be created that will better protect businesses from dangerous software. Malware analysis is a crucial part of any successful cybersecurity strategy in the continually changing threat landscape of today. In this article, we will explore the key concepts of malware analysis, including its purpose, techniques, and tools and we will contrast methods for detecting malware using static, dynamic, and hybrid analysis.</p> Alexandru-Radu BELEA Copyright (c) 2023 International Conference on Cybersecurity and Cybercrime https://proceedings.cybercon.ro/index.php/ic3/article/view/2023-34 Tue, 30 May 2023 00:00:00 +0300