首页 > 最新文献

Proceedings of the third ACM conference on Data and application security and privacy最新文献

英文 中文
Emulating internet topology snapshots in deterlab 在detlab中模拟internet拓扑快照
Graciela Perera, Nathan Miller, J. Mela, M. Mcgarry, Jaime C. Acosta
Investigating the Internet's topology is one component towards developing mechanisms that can protect the communication infrastructure underlying our critical systems and applications. We study the feasibility of capturing and fitting Internet's topology snapshots to an emulated environment called Deterlab. Physical limitations on Deterlab include the number of nodes available (i.e., about 400) and the number of interfaces (i.e., 4) to interconnect them. For example, one Internet's topology snapshot at the Autonomous Systems (AS) level has about 100 nodes with 5 nodes requiring more than 4 interfaces. In this paper, we present a short summary of the Internet's topology snapshots collected and propose a solution on how we can represent the snapshots in Deterlab and overcome the limitation of nodes requiring more than four interfaces. Preliminary results show that all paths from snapshots are maintained if a node requiring more than four interfaces had no more than four other nodes requiring four interfaces. Also, we constructed a proof of concept that captures the main idea of using then snapshots in a security experiment in Deterlab. The topology shows a Multiple Origin Autonomous System (MOAS) conflict for 10 nodes. It is scalable to larger topologies in Deterlab because we have automated the topology creation and protocol configuration.
研究Internet的拓扑结构是开发能够保护关键系统和应用程序底层通信基础设施的机制的一个组成部分。我们研究了捕获和拟合互联网拓扑快照到一个称为detlab的仿真环境的可行性。对Deterlab的物理限制包括可用节点的数量(例如,大约400个)和连接它们的接口数量(例如,4个)。例如,自治系统(AS)级别的一个Internet拓扑快照大约有100个节点,其中5个节点需要4个以上的接口。在本文中,我们简要总结了收集到的Internet拓扑快照,并就如何在Deterlab中表示快照和克服节点需要四个以上接口的限制提出了一个解决方案。初步结果表明,如果需要4个以上接口的节点有不超过4个其他需要4个接口的节点,则维护快照中的所有路径。此外,我们还构建了一个概念证明,该概念证明了在detlab的安全实验中使用快照的主要思想。拓扑显示了10个节点的MOAS (Multiple Origin Autonomous System)冲突。在detlab中,它可以扩展到更大的拓扑,因为我们已经自动化了拓扑创建和协议配置。
{"title":"Emulating internet topology snapshots in deterlab","authors":"Graciela Perera, Nathan Miller, J. Mela, M. Mcgarry, Jaime C. Acosta","doi":"10.1145/2435349.2435371","DOIUrl":"https://doi.org/10.1145/2435349.2435371","url":null,"abstract":"Investigating the Internet's topology is one component towards developing mechanisms that can protect the communication infrastructure underlying our critical systems and applications. We study the feasibility of capturing and fitting Internet's topology snapshots to an emulated environment called Deterlab. Physical limitations on Deterlab include the number of nodes available (i.e., about 400) and the number of interfaces (i.e., 4) to interconnect them. For example, one Internet's topology snapshot at the Autonomous Systems (AS) level has about 100 nodes with 5 nodes requiring more than 4 interfaces. In this paper, we present a short summary of the Internet's topology snapshots collected and propose a solution on how we can represent the snapshots in Deterlab and overcome the limitation of nodes requiring more than four interfaces. Preliminary results show that all paths from snapshots are maintained if a node requiring more than four interfaces had no more than four other nodes requiring four interfaces. Also, we constructed a proof of concept that captures the main idea of using then snapshots in a security experiment in Deterlab. The topology shows a Multiple Origin Autonomous System (MOAS) conflict for 10 nodes. It is scalable to larger topologies in Deterlab because we have automated the topology creation and protocol configuration.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121873579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-user dynamic proofs of data possession using trusted hardware 使用可信硬件的多用户数据占有动态证明
S. Tate, Roopa Vishwanathan, Lance Everhart
In storage outsourcing services, clients store their data on a potentially untrusted server, which has more computational power and storage capacity than the individual clients. In this model, security properties such as integrity, authenticity, and freshness of stored data ought to be provided, while minimizing computational costs at the client, and communication costs between the client and the server. Using trusted computing technology on the server's side, we propose practical constructions in the provable data possession model that provide integrity and freshness in a dynamic, multi-user setting, where groups of users can update their shared files on the remote, untrusted server. Unlike previous solutions based on a single-user, single-device model, we consider a multi-user, multi-device model. Using trusted hardware on the server helps us to eliminate some of the previously known challenges with this model, such as forking and rollback attacks by the server. We logically separate bulk storage and data authentication issues to different untrusted remote services, which can be implemented either on the same or different physical servers. With only minor modifications to existing services, the bulk storage component can be provided by large-scale storage providers such as Google, CloudDrive, DropBox, and a smaller specialized server equipped with a trusted hardware chip can be used for providing data authentication. Our constructions eliminate client-side storage costs (clients do not need to maintain persistent state), and are suitable for situations in which multiple clients work collaboratively on remotely stored, outsourced data.
在存储外包服务中,客户将其数据存储在可能不受信任的服务器上,该服务器比单个客户具有更强的计算能力和存储容量。在这个模型中,应该提供存储数据的完整性、真实性和新鲜度等安全属性,同时最小化客户机上的计算成本以及客户机和服务器之间的通信成本。在服务器端使用可信计算技术,我们提出了可证明数据占有模型的实际结构,该模型在动态多用户设置中提供完整性和新鲜度,其中用户组可以更新远程,不受信任的服务器上的共享文件。与以前基于单用户、单设备模型的解决方案不同,我们考虑的是多用户、多设备模型。在服务器上使用受信任的硬件有助于我们消除该模型之前已知的一些挑战,例如服务器的分叉和回滚攻击。我们在逻辑上将大容量存储和数据身份验证问题分离给不同的不受信任的远程服务,这些服务可以在相同或不同的物理服务器上实现。只需对现有服务进行少量修改,大容量存储组件就可以由大型存储提供商(如Google、CloudDrive、DropBox)提供,并且可以使用配备可信硬件芯片的小型专用服务器来提供数据认证。我们的结构消除了客户端存储成本(客户端不需要维护持久状态),并且适用于多个客户端协作处理远程存储的外包数据的情况。
{"title":"Multi-user dynamic proofs of data possession using trusted hardware","authors":"S. Tate, Roopa Vishwanathan, Lance Everhart","doi":"10.1145/2435349.2435400","DOIUrl":"https://doi.org/10.1145/2435349.2435400","url":null,"abstract":"In storage outsourcing services, clients store their data on a potentially untrusted server, which has more computational power and storage capacity than the individual clients. In this model, security properties such as integrity, authenticity, and freshness of stored data ought to be provided, while minimizing computational costs at the client, and communication costs between the client and the server. Using trusted computing technology on the server's side, we propose practical constructions in the provable data possession model that provide integrity and freshness in a dynamic, multi-user setting, where groups of users can update their shared files on the remote, untrusted server. Unlike previous solutions based on a single-user, single-device model, we consider a multi-user, multi-device model. Using trusted hardware on the server helps us to eliminate some of the previously known challenges with this model, such as forking and rollback attacks by the server. We logically separate bulk storage and data authentication issues to different untrusted remote services, which can be implemented either on the same or different physical servers. With only minor modifications to existing services, the bulk storage component can be provided by large-scale storage providers such as Google, CloudDrive, DropBox, and a smaller specialized server equipped with a trusted hardware chip can be used for providing data authentication. Our constructions eliminate client-side storage costs (clients do not need to maintain persistent state), and are suitable for situations in which multiple clients work collaboratively on remotely stored, outsourced data.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114784382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Session details: Privacy-preserving techniques and usage control 会话细节:隐私保护技术和使用控制
M. Reiter
{"title":"Session details: Privacy-preserving techniques and usage control","authors":"M. Reiter","doi":"10.1145/3260271","DOIUrl":"https://doi.org/10.1145/3260271","url":null,"abstract":"","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the third ACM conference on Data and application security and privacy 第三届ACM数据与应用安全与隐私会议论文集
E. Bertino, R. Sandhu, Lujo Bauer, Jaehong Park
It is our great pleasure to welcome you to the third edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), which follows the successful first and second editions held in February 2011 and 2012. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept came up in a conversation between the two co-founders when both happened to be at the same meeting. This was followed by discussions with a number of fellow cyber security researchers. Their enthusiastic encouragement persuaded us to move ahead with the always daunting task of creating a high-quality conference. Data and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and the mobile devices they carry and computing new information of benefit to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. In response to the call for papers of CODASPY 2013 a total of 107 papers were submitted from Africa, Asia, Australia, Europe, and North America. The program committee selected 24 fulllength research papers, which is three more than last year. These papers cover a variety of topics, including privacy of social networks, novel privacy techniques and applications, and access control and security of smart appliances and mobile devices. The program committee also selected nine short papers for presentation. This year for the first time the program also includes a poster paper session presenting exciting work in progress. The program is complemented by keynote speeches by Mike Reiter and by Ronnie Killough, as well as a panel (topic not yet decided at press time).
我们非常高兴地欢迎您参加第三届ACM数据和应用程序安全与隐私会议(CODASPY 2013),继2011年2月和2012年2月成功举办的第一届和第二届会议之后。这个系列会议的成立是为了在这个领域促进新颖和令人兴奋的研究,并帮助为进一步的研究和发展创造新的方向。最初的想法是在两位联合创始人的一次谈话中提出的,当时他们碰巧都在同一个会议上。随后,他与一些网络安全研究人员进行了讨论。他们的热情鼓励说服我们继续进行创建一次高质量会议这一始终艰巨的任务。在当今的信息时代,数据和操作数据的应用程序是至关重要的资产。随着人们对数据和服务随时随地可用性的要求越来越高,安全和隐私风险也在增加。如今,由于各种原因,组织正在收集大量的隐私敏感数据。未经授权的披露、修改、使用或拒绝访问这些数据和相应的服务可能会导致高昂的人力和财务成本。诸如社交网络和社交计算之类的新应用程序通过聚合来自众多个人用户及其携带的移动设备的输入并计算对社会和个人有益的新信息来提供价值。为了在医疗保健等传统领域实现效率和有效性,需要推动这些记录电子化和高可用性。商业世界的快速创新需要跨越传统边界的密切合作,这就强调了组织有效地共享信息的必要性。只有在应用程序域的上下文中,才能有意义地实现这些领域和其他领域的安全和隐私。数据和应用程序安全与隐私作为一个研究领域迅速发展,有许多重要的挑战需要解决。本次会议共收到来自非洲、亚洲、澳大利亚、欧洲和北美的107篇论文。计划委员会选出了24篇长篇研究论文,比去年增加了3篇。这些论文涵盖了各种主题,包括社交网络的隐私,新的隐私技术和应用,以及智能家电和移动设备的访问控制和安全。项目委员会还选出了9篇短文作报告。今年,该项目还首次包括一个海报会议,介绍正在进行的令人兴奋的工作。该项目由Mike Reiter和Ronnie Killough的主题演讲以及一个小组(截止发稿时主题尚未确定)补充。
{"title":"Proceedings of the third ACM conference on Data and application security and privacy","authors":"E. Bertino, R. Sandhu, Lujo Bauer, Jaehong Park","doi":"10.1145/2435349","DOIUrl":"https://doi.org/10.1145/2435349","url":null,"abstract":"It is our great pleasure to welcome you to the third edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), which follows the successful first and second editions held in February 2011 and 2012. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. The initial concept came up in a conversation between the two co-founders when both happened to be at the same meeting. This was followed by discussions with a number of fellow cyber security researchers. Their enthusiastic encouragement persuaded us to move ahead with the always daunting task of creating a high-quality conference. \u0000 \u0000Data and applications that manipulate data are crucial assets in today's information age. With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. New applications such as social networking and social computing provide value by aggregating input from numerous individual users and the mobile devices they carry and computing new information of benefit to society and individuals. To achieve efficiency and effectiveness in traditional domains such as healthcare there is a drive to make these records electronic and highly available. The need for organizations to share information effectively is underscored by rapid innovations in the business world that require close collaboration across traditional boundaries. Security and privacy in these and other arenas can be meaningfully achieved only in context of the application domain. Data and applications security and privacy has rapidly expanded as a research field with many important challenges to be addressed. \u0000 \u0000In response to the call for papers of CODASPY 2013 a total of 107 papers were submitted from Africa, Asia, Australia, Europe, and North America. The program committee selected 24 fulllength research papers, which is three more than last year. These papers cover a variety of topics, including privacy of social networks, novel privacy techniques and applications, and access control and security of smart appliances and mobile devices. The program committee also selected nine short papers for presentation. This year for the first time the program also includes a poster paper session presenting exciting work in progress. The program is complemented by keynote speeches by Mike Reiter and by Ronnie Killough, as well as a panel (topic not yet decided at press time).","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cross-layer detection of malicious websites 恶意网站跨层检测
Li Xu, Zhenxin Zhan, Shouhuai Xu, K. Ye
Web threats pose the most significant cyber threat. Websites have been developed or manipulated by attackers for use as attack tools. Existing malicious website detection techniques can be classified into the categories of static and dynamic detection approaches, which respectively aim to detect malicious websites by analyzing web contents, and analyzing run-time behaviors using honeypots. However, existing malicious website detection approaches have technical and computational limitations to detect sophisticated attacks and analyze massive collected data. The main objective of this research is to minimize the limitations of malicious website detection. This paper presents a novel cross-layer malicious website detection approach which analyzes network-layer traffic and application-layer website contents simultaneously. Detailed data collection and performance evaluation methods are also presented. Evaluation based on data collected during 37 days shows that the computing time of the cross-layer detection is 50 times faster than the dynamic approach while detection can be almost as effective as the dynamic approach. Experimental results indicate that the cross-layer detection outperforms existing malicious website detection techniques.
网络威胁是最严重的网络威胁。网站已被攻击者开发或操纵,用作攻击工具。现有的恶意网站检测技术可以分为静态检测和动态检测两大类,分别是通过分析网站内容来检测恶意网站,以及通过蜜罐分析运行时行为来检测恶意网站。然而,现有的恶意网站检测方法在检测复杂的攻击和分析大量收集的数据方面存在技术和计算上的局限性。本研究的主要目的是尽量减少恶意网站检测的局限性。提出了一种同时分析网络层流量和应用层网站内容的跨层恶意网站检测方法。给出了详细的数据收集和性能评价方法。基于37天采集数据的评估表明,跨层检测的计算时间比动态方法快50倍,而检测效果几乎与动态方法一样有效。实验结果表明,跨层检测技术优于现有的恶意网站检测技术。
{"title":"Cross-layer detection of malicious websites","authors":"Li Xu, Zhenxin Zhan, Shouhuai Xu, K. Ye","doi":"10.1145/2435349.2435366","DOIUrl":"https://doi.org/10.1145/2435349.2435366","url":null,"abstract":"Web threats pose the most significant cyber threat. Websites have been developed or manipulated by attackers for use as attack tools. Existing malicious website detection techniques can be classified into the categories of static and dynamic detection approaches, which respectively aim to detect malicious websites by analyzing web contents, and analyzing run-time behaviors using honeypots. However, existing malicious website detection approaches have technical and computational limitations to detect sophisticated attacks and analyze massive collected data. The main objective of this research is to minimize the limitations of malicious website detection. This paper presents a novel cross-layer malicious website detection approach which analyzes network-layer traffic and application-layer website contents simultaneously. Detailed data collection and performance evaluation methods are also presented. Evaluation based on data collected during 37 days shows that the computing time of the cross-layer detection is 50 times faster than the dynamic approach while detection can be almost as effective as the dynamic approach. Experimental results indicate that the cross-layer detection outperforms existing malicious website detection techniques.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Sweetening android lemon markets: measuring and combating malware in application marketplaces 甜蜜的安卓柠檬市场:测量和打击恶意软件在应用程序市场
Timothy M. Vidas, Nicolas Christin
Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application "repackaging". We provide a quantitative assessment of this phenomenon by collecting 41,057 applications from 194 alternative Android application markets in October 2011, in addition to a sample of 35,423 applications from the official Android market, Google Play. We observe that certain alternative markets almost exclusively distribute repackaged applications containing malware. To remedy this situation we propose a simple verification protocol, and discuss a proof-of-concept implementation, AppIntegrity. AppIntegrity strengthens the authentication properties offered in application marketplaces, thereby making it more difficult for miscreants to repackage apps, while presenting very little computational or communication overhead, and being deployable without requiring significant changes to the Android platform.
应用程序市场是现代移动设备的主要软件分发机制,但也正在成为个人电脑实体商店的可行替代方案。虽然大多数应用程序市场要求开发人员对应用程序进行加密签名,但在Android市场中,自签名证书很常见,因此提供的身份验证属性非常有限。因此,有报道称恶意软件通过应用程序“重新包装”进行分发。我们在2011年10月从194个Android应用市场中收集了41,057个应用,以及从Android官方市场Google Play中收集的35,423个应用,对这一现象进行了定量评估。我们观察到,某些替代市场几乎只分发包含恶意软件的重新包装的应用程序。为了纠正这种情况,我们提出了一个简单的验证协议,并讨论了一个概念验证实现,AppIntegrity。AppIntegrity增强了应用程序市场中提供的认证属性,从而使不法分子更难以重新打包应用程序,同时提供很少的计算或通信开销,并且无需对Android平台进行重大更改即可部署。
{"title":"Sweetening android lemon markets: measuring and combating malware in application marketplaces","authors":"Timothy M. Vidas, Nicolas Christin","doi":"10.1145/2435349.2435378","DOIUrl":"https://doi.org/10.1145/2435349.2435378","url":null,"abstract":"Application marketplaces are the main software distribution mechanism for modern mobile devices but are also emerging as a viable alternative to brick-and-mortar stores for personal computers. While most application marketplaces require applications to be cryptographically signed by their developers, in Android marketplaces, self-signed certificates are common, thereby offering very limited authentication properties. As a result, there have been reports of malware being distributed through application \"repackaging\". We provide a quantitative assessment of this phenomenon by collecting 41,057 applications from 194 alternative Android application markets in October 2011, in addition to a sample of 35,423 applications from the official Android market, Google Play. We observe that certain alternative markets almost exclusively distribute repackaged applications containing malware. To remedy this situation we propose a simple verification protocol, and discuss a proof-of-concept implementation, AppIntegrity. AppIntegrity strengthens the authentication properties offered in application marketplaces, thereby making it more difficult for miscreants to repackage apps, while presenting very little computational or communication overhead, and being deployable without requiring significant changes to the Android platform.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Geolocation of data in the cloud 数据在云中的地理位置
Mark A. Gondree, Zachary N. J. Peterson
We introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to re-locate cloud data. We then evaluate a preliminary solution in this framework that combines constraint-based host geolocation with proofs of data possession, called constraint-based data geolocation (CBDG). We evaluate CBDG using a combination of experiments with PlanetLab and real cloud storage services, demonstrating that we can bind fetched data to the location originally hosting it with high precision. We geolocate data hosted on the majority of our PlanetLab targets to regions no larger than 118,000 km^2, and we geolocate data hosted on Amazon S3 to an area no larger than 12,000 km^2, sufficiently small to identify the state or service region.
我们介绍并分析了一个通用框架,用于将数据真实地绑定到一个位置,同时提供强大的保证,防止云存储提供商(意外或恶意)试图重新定位云数据。然后,我们评估了该框架中的初步解决方案,该解决方案将基于约束的主机地理定位与数据拥有证明相结合,称为基于约束的数据地理定位(CBDG)。我们使用PlanetLab和真实云存储服务的实验组合来评估CBDG,证明我们可以以高精度将获取的数据绑定到最初托管数据的位置。我们将托管在大多数PlanetLab目标上的数据定位到不大于118,000 km^2的区域,并将托管在Amazon S3上的数据定位到不大于12,000 km^2的区域,该区域小到足以识别州或服务区域。
{"title":"Geolocation of data in the cloud","authors":"Mark A. Gondree, Zachary N. J. Peterson","doi":"10.1145/2435349.2435353","DOIUrl":"https://doi.org/10.1145/2435349.2435353","url":null,"abstract":"We introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to re-locate cloud data. We then evaluate a preliminary solution in this framework that combines constraint-based host geolocation with proofs of data possession, called constraint-based data geolocation (CBDG). We evaluate CBDG using a combination of experiments with PlanetLab and real cloud storage services, demonstrating that we can bind fetched data to the location originally hosting it with high precision. We geolocate data hosted on the majority of our PlanetLab targets to regions no larger than 118,000 km^2, and we geolocate data hosted on Amazon S3 to an area no larger than 12,000 km^2, sufficiently small to identify the state or service region.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users AppProfiler:一种向终端用户暴露android应用中与隐私相关行为的灵活方法
S. Rosen, Zhiyun Qian, Z. Morley Mao
Although Android's permission system is intended to allow users to make informed decisions about their privacy, it is often ineffective at conveying meaningful, useful information on how a user's privacy might be impacted by using an application. We present an alternate approach to providing users the knowledge needed to make informed decisions about the applications they install. First, we create a knowledge base of mappings between API calls and fine-grained privacy-related behaviors. We then use this knowledge base to produce, through static analysis, high-level behavior profiles of application behavior. We have analyzed almost 80,000 applications to date and have made the resulting behavior profiles available both through an Android application and online. Nearly 1500 users have used this application to date. Based on 2782 pieces of application-specific feedback, we analyze users' opinions about how applications affect their privacy and demonstrate that these profiles have had a substantial impact on their understanding of those applications. We also show the benefit of these profiles in understanding large-scale trends in how applications behave and the implications for user privacy.
尽管Android的权限系统旨在让用户对自己的隐私做出明智的决定,但它在传达有意义的、有用的信息方面往往是无效的,比如用户的隐私可能会因使用应用程序而受到怎样的影响。我们提出了另一种方法,为用户提供对所安装的应用程序做出明智决策所需的知识。首先,我们创建API调用和细粒度隐私相关行为之间映射的知识库。然后,我们使用这个知识库,通过静态分析,生成应用程序行为的高级行为概要。到目前为止,我们已经分析了近80,000个应用程序,并通过Android应用程序和在线提供了结果行为配置文件。到目前为止,已有近1500名用户使用了这个应用程序。基于2782条特定于应用程序的反馈,我们分析了用户对应用程序如何影响其隐私的看法,并证明这些配置文件对他们对这些应用程序的理解产生了实质性影响。我们还展示了这些概要文件在理解应用程序行为的大规模趋势以及对用户隐私的影响方面的好处。
{"title":"AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users","authors":"S. Rosen, Zhiyun Qian, Z. Morley Mao","doi":"10.1145/2435349.2435380","DOIUrl":"https://doi.org/10.1145/2435349.2435380","url":null,"abstract":"Although Android's permission system is intended to allow users to make informed decisions about their privacy, it is often ineffective at conveying meaningful, useful information on how a user's privacy might be impacted by using an application. We present an alternate approach to providing users the knowledge needed to make informed decisions about the applications they install. First, we create a knowledge base of mappings between API calls and fine-grained privacy-related behaviors. We then use this knowledge base to produce, through static analysis, high-level behavior profiles of application behavior. We have analyzed almost 80,000 applications to date and have made the resulting behavior profiles available both through an Android application and online. Nearly 1500 users have used this application to date. Based on 2782 pieces of application-specific feedback, we analyze users' opinions about how applications affect their privacy and demonstrate that these profiles have had a substantial impact on their understanding of those applications. We also show the benefit of these profiles in understanding large-scale trends in how applications behave and the implications for user privacy.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Session details: Usable security and privacy 会话细节:可用的安全性和隐私性
Gabriel Ghinita
{"title":"Session details: Usable security and privacy","authors":"Gabriel Ghinita","doi":"10.1145/3260272","DOIUrl":"https://doi.org/10.1145/3260272","url":null,"abstract":"","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient certificateless cryptography scheme without pairing 无配对的高效无证书加密方案
Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, E. Bertino
We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this poster, we propose a novel mCL-PKE scheme. We implement our mCL-PKE scheme and a recent scheme, and evaluate the security and performance. Our results show that our algorithms are efficient and practical.
提出了一种不需要配对操作的无证书中介加密方案。中介无证书公钥加密解决了基于身份的加密中的密钥托管问题和公钥加密中的证书撤销问题。然而,现有的mCL-PKE方案要么由于使用昂贵的配对操作而效率低下,要么容易受到部分解密攻击。为了解决性能和安全问题,在这张海报中,我们提出了一种新的mCL-PKE方案。我们实现了我们的mCL-PKE方案和最近的一个方案,并对其安全性和性能进行了评估。实验结果表明,该算法是有效和实用的。
{"title":"An efficient certificateless cryptography scheme without pairing","authors":"Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, E. Bertino","doi":"10.1145/2435349.2435375","DOIUrl":"https://doi.org/10.1145/2435349.2435375","url":null,"abstract":"We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this poster, we propose a novel mCL-PKE scheme. We implement our mCL-PKE scheme and a recent scheme, and evaluate the security and performance. Our results show that our algorithms are efficient and practical.","PeriodicalId":118139,"journal":{"name":"Proceedings of the third ACM conference on Data and application security and privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the third ACM conference on Data and application security and privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1