首页 > 最新文献

Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)最新文献

英文 中文
Access control for the SPIN extensible operating system 用于SPIN可扩展操作系统的访问控制
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601336
Robert Grimm, B. Bershad
Summary form only given. In the SPIN operating system (B.N. Bershad et al., 1995; Przemyslaw Pardyak and B.N. Bershad, 1996) built at the University of Washington, we are experimenting with a version of domain and type enforcement (DTE) (L. Badger et al., 1995) that has been extended to address the security concerns of extensible systems. The SPIN operating system defines an extension infrastructure, together with a core set of extensible services, that allows for the fine grained and safe composition of extensions within the operating system kernel. Extensions are written in Modula-3, a type-safe programming language, and execute within the same address space. They interact by calling other parts of the system and by extending existing interfaces to provide new services. A central event dispatcher supports both mechanisms: to call on a service, an extension raises an event, and, to extend an existing interface, an extension registers a handler for that event. The invocation mechanism for events is simply a procedure call, and no context switches are required for the interaction between subsystems (since all extensions are co-located in the same address space).
只提供摘要形式。在SPIN操作系统中(B.N. Bershad et al., 1995;Przemyslaw Pardyak和B.N. Bershad, 1996)在华盛顿大学建立,我们正在试验一个版本的域和类型强制(DTE) (L. Badger等人,1995),它已经扩展到解决可扩展系统的安全问题。SPIN操作系统定义了一个扩展基础设施,以及一组核心的可扩展服务,它允许在操作系统内核中对扩展进行细粒度和安全的组合。扩展是用类型安全的编程语言Modula-3编写的,并在相同的地址空间内执行。它们通过调用系统的其他部分和扩展现有接口来提供新服务来进行交互。中央事件调度程序支持这两种机制:调用服务时,扩展引发事件;扩展扩展现有接口时,扩展为该事件注册处理程序。事件的调用机制只是一个过程调用,子系统之间的交互不需要上下文切换(因为所有扩展都位于同一地址空间中)。
{"title":"Access control for the SPIN extensible operating system","authors":"Robert Grimm, B. Bershad","doi":"10.1109/SECPRI.1997.601336","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601336","url":null,"abstract":"Summary form only given. In the SPIN operating system (B.N. Bershad et al., 1995; Przemyslaw Pardyak and B.N. Bershad, 1996) built at the University of Washington, we are experimenting with a version of domain and type enforcement (DTE) (L. Badger et al., 1995) that has been extended to address the security concerns of extensible systems. The SPIN operating system defines an extension infrastructure, together with a core set of extensible services, that allows for the fine grained and safe composition of extensions within the operating system kernel. Extensions are written in Modula-3, a type-safe programming language, and execute within the same address space. They interact by calling other parts of the system and by extending existing interfaces to provide new services. A central event dispatcher supports both mechanisms: to call on a service, an extension raises an event, and, to extend an existing interface, an extension registers a handler for that event. The invocation mechanism for events is simply a procedure call, and no context switches are required for the interaction between subsystems (since all extensions are co-located in the same address space).","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123059918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in innovative new operating systems 创新的新操作系统中的安全性
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601334
C. Irvine
A principal criterion by which new operating systems are judged is the level of performance that they provide for applications. To this end, new operating systems have sought novel approaches to performance enhancement. A theme common to many of these initiatives is that of specialization. Instead of an operating system designed to serve all applications (either equally well or equally badly), the operating system is adapted to serve the needs of the application. The intent is not to provide a different static operating system for each application but to allow the operating system to be dynamically modified or specialized to best serve each application. The five operating system efforts presented are: the Exokernel Project, the Fluke Project, the Fox Project, the Scout Project, and the SPIN Project. The authors hope to give an overview of the innovative techniques being used to enhance performance in these systems and to discuss the effect of those enhancements on one's ability to reason about the security properties of systems.
判断新操作系统的一个主要标准是它们为应用程序提供的性能水平。为此,新的操作系统寻求新的方法来增强性能。许多这类活动的一个共同主题是专业化。操作系统不是设计为服务于所有应用程序(无论好坏),而是适应于服务于应用程序的需要。其目的不是为每个应用程序提供不同的静态操作系统,而是允许对操作系统进行动态修改或专门化,以最好地为每个应用程序服务。提出的五个操作系统工作是:exokkernel项目、Fluke项目、Fox项目、Scout项目和SPIN项目。作者希望概述用于增强这些系统性能的创新技术,并讨论这些增强对人们推断系统安全属性的能力的影响。
{"title":"Security in innovative new operating systems","authors":"C. Irvine","doi":"10.1109/SECPRI.1997.601334","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601334","url":null,"abstract":"A principal criterion by which new operating systems are judged is the level of performance that they provide for applications. To this end, new operating systems have sought novel approaches to performance enhancement. A theme common to many of these initiatives is that of specialization. Instead of an operating system designed to serve all applications (either equally well or equally badly), the operating system is adapted to serve the needs of the application. The intent is not to provide a different static operating system for each application but to allow the operating system to be dynamically modified or specialized to best serve each application. The five operating system efforts presented are: the Exokernel Project, the Fluke Project, the Fox Project, the Scout Project, and the SPIN Project. The authors hope to give an overview of the innovative techniques being used to enhance performance in these systems and to discuss the effect of those enhancements on one's ability to reason about the security properties of systems.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Execution monitoring of security-critical programs in distributed systems: a specification-based approach 分布式系统中安全关键程序的执行监视:基于规范的方法
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601332
C. Ko, M. Ruschitzka, K. Levitt
We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for operations that are in violation of the specifications. We developed a formal framework for specifying the security-relevant behavior of programs, on which we based the design and implementation of a real-time intrusion detection system for a distributed system. Also, we wrote security specifications for 15 Unix setuid root programs. Our system detects attacks caused by monitored programs, including security violations caused by improper synchronization in distributed programs. Our approach encompasses attacks that exploit previously unknown vulnerabilities in security-critical programs.
我们描述了一种基于规范的方法来检测安全关键程序中的漏洞利用。该方法利用描述程序预期行为的安全规范,并扫描违反规范的操作的审计跟踪。我们开发了一个正式的框架来指定程序的安全相关行为,在此基础上,我们设计和实现了一个分布式系统的实时入侵检测系统。此外,我们还为15个Unix setuid根程序编写了安全规范。我们的系统检测由监控程序引起的攻击,包括分布式程序中不正确同步引起的安全违规。我们的方法包括利用安全关键程序中以前未知的漏洞进行攻击。
{"title":"Execution monitoring of security-critical programs in distributed systems: a specification-based approach","authors":"C. Ko, M. Ruschitzka, K. Levitt","doi":"10.1109/SECPRI.1997.601332","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601332","url":null,"abstract":"We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for operations that are in violation of the specifications. We developed a formal framework for specifying the security-relevant behavior of programs, on which we based the design and implementation of a real-time intrusion detection system for a distributed system. Also, we wrote security specifications for 15 Unix setuid root programs. Our system detects attacks caused by monitored programs, including security violations caused by improper synchronization in distributed programs. Our approach encompasses attacks that exploit previously unknown vulnerabilities in security-critical programs.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 423
Automated analysis of cryptographic protocols using Mur/spl phi/ 使用Mur/spl / phi/自动分析加密协议
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601329
John C. Mitchell, Mark Mitchell, U. Stern
A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) protocol, finding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The efficiency of Mur/spl phi/ also allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties.
提出了一种使用通用状态枚举工具Mur/spl / phi/来分析加密和安全相关协议的方法。我们通过分析Needham-Schroeder(1978)协议来说明该方法的可行性,在几秒钟的计算时间内找到一个已知的错误,并分析Kerberos的变体和另一项比较研究中使用的有缺陷的TMN协议。Mur/spl / phi/的效率还允许我们检查相对较短的协议的多个术语,使我们能够检测重放攻击,或者由独立各方独立执行协议之间的混淆导致的错误。
{"title":"Automated analysis of cryptographic protocols using Mur/spl phi/","authors":"John C. Mitchell, Mark Mitchell, U. Stern","doi":"10.1109/SECPRI.1997.601329","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601329","url":null,"abstract":"A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) protocol, finding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The efficiency of Mur/spl phi/ also allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 483
Anonymous connections and onion routing 匿名连接和洋葱路由
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601314
Michael G. Reed, P. Syverson, D. Goldschlag
Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream. Onion routing has been implemented on Sun Solaris 2.X with proxies for Web browsing, remote logins and e-mail. This paper's contribution is a detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results.
洋葱路由提供匿名连接,对窃听和流量分析都有很强的抵抗力。未经修改的Internet应用程序可以通过代理使用这些匿名连接。代理还可以通过从数据流中删除标识信息来使通信匿名。洋葱路由已经在Sun Solaris 2上实现了。X带有Web浏览、远程登录和电子邮件代理。本文的贡献是实现洋葱路由系统的详细规范,基于该规范的漏洞分析和性能结果。
{"title":"Anonymous connections and onion routing","authors":"Michael G. Reed, P. Syverson, D. Goldschlag","doi":"10.1109/SECPRI.1997.601314","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601314","url":null,"abstract":"Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream. Onion routing has been implemented on Sun Solaris 2.X with proxies for Web browsing, remote logins and e-mail. This paper's contribution is a detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127380031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1744
Providing flexibility in information flow control for object oriented systems 为面向对象系统提供信息流控制的灵活性
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601328
E. Ferrari, P. Samarati, E. Bertino, S. Jajodia
This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by allowing exceptions to the restrictions stated by the authorizations. Exceptions are specified by means of waivers associated with methods. Two kinds of waivers are supported: invoke-waivers, specifying exceptions applicable during a method's execution, and reply-waivers, specifying exceptions applicable to the information returned by a method. Information flowing from one object into another object is subject to the different waivers of the methods enforcing the transmission. We formally characterize information transmission and flow in a transaction taking into consideration different interaction modes among objects. We then define security specifications, meaning authorizations and waivers, and characterize safe information flows. We formally define conditions whose satisfaction ensures absence of unsafe flows and present an algorithm enforcing these conditions.
本文提出了一种在面向对象系统中控制信息流的方法,该方法除了考虑对对象的授权之外,还考虑了信息是如何获得和/或传输的。这些方面是通过允许授权规定的限制的例外来考虑的。例外是通过与方法相关联的豁免来指定的。支持两种类型的豁免:调用豁免(指定在方法执行期间适用的异常)和应答豁免(指定适用于方法返回的信息的异常)。从一个对象流向另一个对象的信息受到强制传输方法的不同豁免的约束。考虑到对象之间不同的交互模式,我们正式描述了事务中的信息传输和流动。然后我们定义安全规范,即授权和豁免,并描述安全信息流的特征。我们正式定义了确保不存在不安全流的条件,并给出了执行这些条件的算法。
{"title":"Providing flexibility in information flow control for object oriented systems","authors":"E. Ferrari, P. Samarati, E. Bertino, S. Jajodia","doi":"10.1109/SECPRI.1997.601328","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601328","url":null,"abstract":"This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by allowing exceptions to the restrictions stated by the authorizations. Exceptions are specified by means of waivers associated with methods. Two kinds of waivers are supported: invoke-waivers, specifying exceptions applicable during a method's execution, and reply-waivers, specifying exceptions applicable to the information returned by a method. Information flowing from one object into another object is subject to the different waivers of the methods enforcing the transmission. We formally characterize information transmission and flow in a transaction taking into consideration different interaction modes among objects. We then define security specifications, meaning authorizations and waivers, and characterize safe information flows. We formally define conditions whose satisfaction ensures absence of unsafe flows and present an algorithm enforcing these conditions.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Analyzing consistency of security policies 安全策略一致性分析
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601324
L. Cholvy, F. Cuppens
We discuss the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifies what actions some agents are permitted, obliged or forbidden to perform and we formalize a policy by a set of deontic formulae. We first address the problem of checking policy consistency and describe a method for solving it. The second point we are interested in is how to query a policy to know the actual norms which apply to a given situation. In order to provide the user with consistent answers, the normative conflicts which may appear in the policy must be solved. For doing so, we suggest using the notion of roles and define priorities between roles.
我们讨论了安全策略属性推理方法的开发。我们将安全策略视为一种特殊的规则,它规定了某些代理人被允许、有义务或被禁止的行为,我们用一组道义公式形式化了一项策略。我们首先讨论了检查策略一致性的问题,并描述了解决该问题的方法。我们感兴趣的第二点是如何查询策略以了解适用于给定情况的实际规范。为了给用户提供一致的答案,必须解决策略中可能出现的规范性冲突。为此,我们建议使用角色的概念并定义角色之间的优先级。
{"title":"Analyzing consistency of security policies","authors":"L. Cholvy, F. Cuppens","doi":"10.1109/SECPRI.1997.601324","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601324","url":null,"abstract":"We discuss the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifies what actions some agents are permitted, obliged or forbidden to perform and we formalize a policy by a set of deontic formulae. We first address the problem of checking policy consistency and describe a method for solving it. The second point we are interested in is how to query a policy to know the actual norms which apply to a given situation. In order to provide the user with consistent answers, the normative conflicts which may appear in the policy must be solved. For doing so, we suggest using the notion of roles and define priorities between roles.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126952756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Ensuring assurance in mobile computing 移动计算保障
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601326
M. Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox
This paper introduces a panel discussion on establishing assurance evidence that mobile code applications perform as expected by the user, without the side effects that have been demonstrated as possible in constructed examples of malicious or "rogue" applets. The paper's principal authors, Schaefer and Pinsky, have been engaged in cooperative research with the JavaSoft community to gain understanding of the complexities of assurance for mobile code applications. The paper discusses part of this on-going research. The panel adds the voices and experience of a continuing researcher, Dean, and of active practitioners from the principal vendors of mobile-code-enabled (and enabling) products. The panel actively debates the issues of providing compelling assurance evidence relating to the control of such code.
本文介绍了一个小组讨论,关于建立保证证据,证明移动代码应用程序按照用户的预期运行,而没有副作用,这些副作用已经在恶意或“流氓”小程序的构造示例中得到了证明。这篇论文的主要作者,Schaefer和Pinsky,一直致力于与JavaSoft社区的合作研究,以获得对移动代码应用程序保证复杂性的理解。本文讨论了这一正在进行的研究的一部分。该小组增加了一位持续的研究员Dean的声音和经验,以及来自支持移动代码(和支持)产品的主要供应商的活跃实践者。该小组积极讨论提供与此类代码控制有关的令人信服的保证证据的问题。
{"title":"Ensuring assurance in mobile computing","authors":"M. Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox","doi":"10.1109/SECPRI.1997.601326","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601326","url":null,"abstract":"This paper introduces a panel discussion on establishing assurance evidence that mobile code applications perform as expected by the user, without the side effects that have been demonstrated as possible in constructed examples of malicious or \"rogue\" applets. The paper's principal authors, Schaefer and Pinsky, have been engaged in cooperative research with the JavaSoft community to gain understanding of the complexities of assurance for mobile code applications. The paper discusses part of this on-going research. The panel adds the voices and experience of a continuing researcher, Dean, and of active practitioners from the principal vendors of mobile-code-enabled (and enabling) products. The panel actively debates the issues of providing compelling assurance evidence relating to the control of such code.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Number theoretic attacks on secure password schemes 安全密码方案的数论攻击
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601340
Sarvar Patel
Encrypted Key Exchange (EKE) (S. Bellovin and M. Merritt, 1992; 1993) allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE promises security against active attacks and dictionary attacks. Other secure protocols have been proposed based on the use of randomized confounders (L. Gong et al., 1993). We use some basic results from number theory to present password guessing attacks on all versions of EKE discussed in the paper (S. Bellovin and M. Merritt, 1992) and we also offer countermeasures to the attacks. However for the RSA version of EKE, we show that simple modifications are not enough to rescue the protocol. Attacks are also presented on half encrypted versions of EKE. We also show how randomized confounders cannot protect Direct Authentication Protocol and Secret Public Key Protocol versions of a secure password scheme from attacks. We discuss why these attacks are possible against seemingly secure protocols and what is necessary to make secure protocols.
加密密钥交换(EKE) (S. Bellovin and M. Merritt, 1992;1993)允许共享密码的双方通过使用公钥和密钥加密的组合在不安全的网络上交换已认证的信息。EKE保证了针对主动攻击和字典攻击的安全性。其他基于随机混杂因素的安全协议也被提出(L. Gong et al., 1993)。我们利用数论的一些基本结果,对文中讨论的所有版本的EKE (S. Bellovin and M. Merritt, 1992)提出了密码猜测攻击,并提供了攻击的对策。然而,对于RSA版本的EKE,我们表明,简单的修改不足以挽救协议。对EKE的半加密版本也提出了攻击。我们还展示了随机混淆器如何无法保护安全密码方案的直接身份验证协议和秘密公钥协议版本免受攻击。我们讨论了为什么这些攻击可能针对看似安全的协议,以及制定安全协议需要什么。
{"title":"Number theoretic attacks on secure password schemes","authors":"Sarvar Patel","doi":"10.1109/SECPRI.1997.601340","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601340","url":null,"abstract":"Encrypted Key Exchange (EKE) (S. Bellovin and M. Merritt, 1992; 1993) allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE promises security against active attacks and dictionary attacks. Other secure protocols have been proposed based on the use of randomized confounders (L. Gong et al., 1993). We use some basic results from number theory to present password guessing attacks on all versions of EKE discussed in the paper (S. Bellovin and M. Merritt, 1992) and we also offer countermeasures to the attacks. However for the RSA version of EKE, we show that simple modifications are not enough to rescue the protocol. Attacks are also presented on half encrypted versions of EKE. We also show how randomized confounders cannot protect Direct Authentication Protocol and Secret Public Key Protocol versions of a secure password scheme from attacks. We discuss why these attacks are possible against seemingly secure protocols and what is necessary to make secure protocols.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121550377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 134
Surviving information warfare attacks on databases 在信息战对数据库的攻击中幸存下来
Pub Date : 1997-05-04 DOI: 10.1109/SECPRI.1997.601331
P. Ammann, S. Jajodia, Catherine D. McCollum, B. Blaustein
We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be violated, but data is nonetheless available to support mission objectives. We define a notion of consistency suitable for databases in which some information is known to be damaged, and other information is known to be only partially repaired. We present a protocol for normal transactions with respect to the damage markings and show that consistency preserving normal transactions maintain database consistency in the presence of damage. We present an algorithm for taking consistent snapshots of databases under attack. The snapshot algorithm has the virtue of not interfering with countermeasure transactions.
我们考虑信息战攻击数据库的生存问题。我们对攻击的不同阶段采用容错方法。为了保持有关攻击的准确信息,我们标记数据以反映检测到的损坏的严重程度以及损坏数据的修复程度。在数据部分修复的情况下,可能会违反完整性约束,但数据仍然可用于支持任务目标。我们定义了一个一致性概念,适用于某些信息已知已损坏,而其他信息已知仅部分修复的数据库。我们提出了一个关于损坏标记的正常事务的协议,并表明保持一致性的正常事务在存在损坏时保持数据库一致性。我们提出了一种对受到攻击的数据库进行一致性快照的算法。快照算法具有不干扰对抗事务的优点。
{"title":"Surviving information warfare attacks on databases","authors":"P. Ammann, S. Jajodia, Catherine D. McCollum, B. Blaustein","doi":"10.1109/SECPRI.1997.601331","DOIUrl":"https://doi.org/10.1109/SECPRI.1997.601331","url":null,"abstract":"We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be violated, but data is nonetheless available to support mission objectives. We define a notion of consistency suitable for databases in which some information is known to be damaged, and other information is known to be only partially repaired. We present a protocol for normal transactions with respect to the damage markings and show that consistency preserving normal transactions maintain database consistency in the presence of damage. We present an algorithm for taking consistent snapshots of databases under attack. The snapshot algorithm has the virtue of not interfering with countermeasure transactions.","PeriodicalId":114355,"journal":{"name":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
期刊
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1