首页 > 最新文献

2014 IEEE Security and Privacy Workshops最新文献

英文 中文
Nail: A Practical Interface Generator for Data Formats 一个实用的数据格式接口生成器
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.31
Julian Bangert, N. Zeldovich
We present Nail, an interface generator that allows programmers to safely parse and generate protocols defined by a Parser-Expression based grammar. Nail uses a richer set of parser combinators that induce an internal representation, obviating the need to write semantic actions. Nail also provides solutions parsing common patterns such as length and offset fields within binary formats that are hard to process with existing parser generators.
我们介绍了一个接口生成器Nail,它允许程序员安全地解析和生成由基于解析器表达式的语法定义的协议。Nail使用一组更丰富的解析器组合子来生成内部表示,从而避免了编写语义操作的需要。Nail还提供了解析常见模式的解决方案,例如二进制格式中的长度和偏移量字段,现有解析器生成器很难处理这些模式。
{"title":"Nail: A Practical Interface Generator for Data Formats","authors":"Julian Bangert, N. Zeldovich","doi":"10.1109/SPW.2014.31","DOIUrl":"https://doi.org/10.1109/SPW.2014.31","url":null,"abstract":"We present Nail, an interface generator that allows programmers to safely parse and generate protocols defined by a Parser-Expression based grammar. Nail uses a richer set of parser combinators that induce an internal representation, obviating the need to write semantic actions. Nail also provides solutions parsing common patterns such as length and offset fields within binary formats that are hard to process with existing parser generators.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Finite State Machine Parsing for Internet Protocols: Faster Than You Think 互联网协议的有限状态机解析:比你想象的要快
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.34
R. Graham, Peter C. Johnson
A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the Internet) and the soft, chewy center of computer systems, where performance and security are paramount. A firewall, for instance, is precisely a trust-creating parser for Internet protocols, permitting valid packets to pass through and dropping or actively rejecting malformed packets. Despite the prevalence of finite state machines (FSMs) in both protocol specifications and protocol implementations, they have gained little traction in parser code for such protocols. Typical reasons for avoiding the FSM computation model claim poor performance, poor scalability, poor expressibility, and difficult or time-consuming programming. In this research report, we present our motivations for and designs of finite state machines to parse a variety of existing Internet protocols, both binary and ASCII. Our hand-written parsers explicitly optimize around L1 cache hit latency, branch misprediction penalty, and program-wide memory overhead to achieve aggressive performance and scalability targets. Our work demonstrates that such parsers are, contrary to popular belief, sufficiently expressive for meaningful protocols, sufficiently performant for high-throughput applications, and sufficiently simple to construct and maintain. We hope that, in light of other research demonstrating the security benefits of such parsers over more complex, Turing-complete codes, our work serves as evidence that certain ``practical'' reasons for avoiding FSM-based parsers are invalid.
解析器的工作是获取非结构化、不透明的数据,并将其转换为结构化、语义上有意义的格式。因此,解析器经常在不受信任的数据源(例如Internet)和计算机系统的软的、有嚼劲的中心之间的边界上操作,在那里性能和安全性是至关重要的。例如,防火墙就是为Internet协议创建信任的解析器,它允许有效的数据包通过,并丢弃或主动拒绝不正确的数据包。尽管有限状态机(fsm)在协议规范和协议实现中都很流行,但它们在这类协议的解析器代码中却很少受到关注。避免使用FSM计算模型的典型原因是性能差、可扩展性差、可表达性差、编程困难或耗时。在本研究报告中,我们介绍了有限状态机的动机和设计,以解析各种现有的互联网协议,包括二进制和ASCII。我们手工编写的解析器明确地围绕L1缓存命中延迟、分支错误预测惩罚和程序范围内的内存开销进行优化,以实现积极的性能和可伸缩性目标。我们的工作表明,与普遍的看法相反,这样的解析器对于有意义的协议具有足够的表现力,对于高吞吐量的应用程序具有足够的性能,并且构造和维护足够简单。我们希望,鉴于其他研究证明了这种解析器相对于更复杂的图灵完备代码的安全性优势,我们的工作可以作为证据,证明避免基于fsm的解析器的某些“实际”理由是无效的。
{"title":"Finite State Machine Parsing for Internet Protocols: Faster Than You Think","authors":"R. Graham, Peter C. Johnson","doi":"10.1109/SPW.2014.34","DOIUrl":"https://doi.org/10.1109/SPW.2014.34","url":null,"abstract":"A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the Internet) and the soft, chewy center of computer systems, where performance and security are paramount. A firewall, for instance, is precisely a trust-creating parser for Internet protocols, permitting valid packets to pass through and dropping or actively rejecting malformed packets. Despite the prevalence of finite state machines (FSMs) in both protocol specifications and protocol implementations, they have gained little traction in parser code for such protocols. Typical reasons for avoiding the FSM computation model claim poor performance, poor scalability, poor expressibility, and difficult or time-consuming programming. In this research report, we present our motivations for and designs of finite state machines to parse a variety of existing Internet protocols, both binary and ASCII. Our hand-written parsers explicitly optimize around L1 cache hit latency, branch misprediction penalty, and program-wide memory overhead to achieve aggressive performance and scalability targets. Our work demonstrates that such parsers are, contrary to popular belief, sufficiently expressive for meaningful protocols, sufficiently performant for high-throughput applications, and sufficiently simple to construct and maintain. We hope that, in light of other research demonstrating the security benefits of such parsers over more complex, Turing-complete codes, our work serves as evidence that certain ``practical'' reasons for avoiding FSM-based parsers are invalid.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF Parser 协议设计的陷阱:尝试编写一个正式验证的PDF解析器
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.36
Andreas Bogk, Marco Schopl
Parsers for complex data formats generally present a big attack surface for input-driven exploitation. In practice, this has been especially true for implementations of the PDF data format, as witnessed by dozens of known vulnerabilities exploited in many real world attacks, with the Acrobat Reader implementation being the main target. In this report, we describe our attempts to use Coq, a theorem prover based on a functional programming language making use of dependent types and the Curry-Howard isomorphism, to implement a formally verified PDF parser. We ended up implementing a subset of the PDF format and proving termination of the combinator-based parser. Noteworthy results include a dependent type representing a list of strictly monotonically decreasing length of remaining symbols to parse, which allowed us to show termination of parser combinators. Also, difficulties showing termination of parsing some features of the PDF format readily translated into denial of service attacks against existing PDF parsers-we came up with a single PDF file that made all the existing PDF implementations we could test enter an endless loop.
复杂数据格式的解析器通常为输入驱动的攻击提供了很大的攻击面。在实践中,PDF数据格式的实现尤其如此,正如在许多现实世界的攻击中利用的数十个已知漏洞所证明的那样,Acrobat Reader实现是主要目标。在本报告中,我们描述了使用Coq的尝试,Coq是一种基于函数式编程语言的定理证明器,它利用依赖类型和Curry-Howard同构来实现正式验证的PDF解析器。我们最终实现了PDF格式的一个子集,并证明了基于组合器的解析器的终止。值得注意的结果包括一个表示待解析的剩余符号长度严格单调递减的列表的依赖类型,它允许我们显示解析器组合子的终止。此外,显示PDF格式的某些特性解析终止的困难很容易转化为针对现有PDF解析器的拒绝服务攻击——我们提出了一个PDF文件,使我们可以测试的所有现有PDF实现进入一个无限循环。
{"title":"The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF Parser","authors":"Andreas Bogk, Marco Schopl","doi":"10.1109/SPW.2014.36","DOIUrl":"https://doi.org/10.1109/SPW.2014.36","url":null,"abstract":"Parsers for complex data formats generally present a big attack surface for input-driven exploitation. In practice, this has been especially true for implementations of the PDF data format, as witnessed by dozens of known vulnerabilities exploited in many real world attacks, with the Acrobat Reader implementation being the main target. In this report, we describe our attempts to use Coq, a theorem prover based on a functional programming language making use of dependent types and the Curry-Howard isomorphism, to implement a formally verified PDF parser. We ended up implementing a subset of the PDF format and proving termination of the combinator-based parser. Noteworthy results include a dependent type representing a list of strictly monotonically decreasing length of remaining symbols to parse, which allowed us to show termination of parser combinators. Also, difficulties showing termination of parsing some features of the PDF format readily translated into denial of service attacks against existing PDF parsers-we came up with a single PDF file that made all the existing PDF implementations we could test enter an endless loop.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130764484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits 源自社会工程漏洞的非故意内部威胁分析
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.39
F. Greitzer, Jeremy R. Strozer, Sholom G. Cohen, A. Moore, David A. Mundie, Jennifer Cowley
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical patterns and to inform future research and development of UIT mitigation strategies.
组织经常受到个人的伤害,这些人对组织没有恶意,但他们的行为无意中使组织面临风险——无意的内部威胁(UIT)。在本文中,我们研究了来自社会工程漏洞的UIT案例。我们报告了我们为收集和分析来自UIT社会工程事件的数据所做的努力,以确定可能的行为和技术模式,并为未来的UIT缓解战略研究和开发提供信息。
{"title":"Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits","authors":"F. Greitzer, Jeremy R. Strozer, Sholom G. Cohen, A. Moore, David A. Mundie, Jennifer Cowley","doi":"10.1109/SPW.2014.39","DOIUrl":"https://doi.org/10.1109/SPW.2014.39","url":null,"abstract":"Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical patterns and to inform future research and development of UIT mitigation strategies.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114206363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Parsifal: A Pragmatic Solution to the Binary Parsing Problems Parsifal:二进制解析问题的实用解决方案
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.35
O. Levillain
Parsers are pervasive software basic blocks: as soon as a program needs to communicate with another program or to read a file, a parser is involved. However, writing robust parsers can be difficult, as is revealed by the amount of bugs and vulnerabilities related to programming errors in parsers. It is especially true for network analysis tools, which led the network and protocols laboratory of the French Network and Information Security Agency (ANSSI) to write custom tools. One of them, Parsifal, is a generic framework to describe parsers in OCaml, and gave us some insight into binary formats and parsers. After describing our tool, this article presents some use cases and lessons we learned about format complexity, parser robustness and the role the language used played.
解析器是普遍存在的软件基本模块:只要一个程序需要与另一个程序通信或读取文件,就会涉及到解析器。然而,编写健壮的解析器可能很困难,正如解析器中与编程错误相关的大量错误和漏洞所揭示的那样。对于网络分析工具来说尤其如此,这使得法国网络和信息安全局(ANSSI)的网络和协议实验室编写了自定义工具。其中之一,Parsifal,是一个描述OCaml中的解析器的通用框架,它让我们对二进制格式和解析器有了一些了解。在描述了我们的工具之后,本文介绍了一些用例和我们学到的关于格式复杂性、解析器健壮性和所使用语言所扮演的角色的经验教训。
{"title":"Parsifal: A Pragmatic Solution to the Binary Parsing Problems","authors":"O. Levillain","doi":"10.1109/SPW.2014.35","DOIUrl":"https://doi.org/10.1109/SPW.2014.35","url":null,"abstract":"Parsers are pervasive software basic blocks: as soon as a program needs to communicate with another program or to read a file, a parser is involved. However, writing robust parsers can be difficult, as is revealed by the amount of bugs and vulnerabilities related to programming errors in parsers. It is especially true for network analysis tools, which led the network and protocols laboratory of the French Network and Information Security Agency (ANSSI) to write custom tools. One of them, Parsifal, is a generic framework to describe parsers in OCaml, and gave us some insight into binary formats and parsers. After describing our tool, this article presents some use cases and lessons we learned about format complexity, parser robustness and the role the language used played.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage 二级数据共享和使用的隐私策略规范语言
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.12
J. Iyilade, Julita Vassileva
Within the last decade, there are growing economic social incentives and opportunities for secondary use of data in many sectors, and strong market forces currently drive the active development of systems that aggregate user data gathered by many sources. This secondary use of data poses privacy threats due to unwanted use of data for the wrong purposes such as discriminating the user for employment, loan and insurance. Traditional privacy policy languages such as the Platform for Privacy Preferences (P3P) are inadequate since they were designed long before many of these technologies were invented and basically focus on enabling user-awareness and control during primary data collection (e.g. by a website). However, with the advent of Web 2.0 and Social Networking Sites, the landscape of privacy is shifting from limiting collection of data by websites to ensuring ethical use of the data after initial collection. To meet the current challenges of privacy protection in secondary context, we propose a privacy policy language, Purpose-to-Use (P2U), aimed at enforcing privacy while enabling secondary user information sharing across applications, devices, and services on the Web.
在过去十年中,许多部门对数据的二次使用有越来越多的经济、社会激励和机会,目前强大的市场力量推动了系统的积极发展,这些系统可以汇总从许多来源收集的用户数据。这种数据的二次使用会对隐私构成威胁,因为数据被不必要地用于错误的目的,例如在就业、贷款和保险方面歧视用户。传统的隐私政策语言,如隐私偏好平台(P3P)是不够的,因为它们是在许多这些技术发明之前很久设计的,基本上侧重于在主要数据收集(例如通过网站)过程中实现用户意识和控制。然而,随着Web 2.0和社交网站的出现,隐私的格局正在从限制网站收集数据转向确保在最初收集数据后合乎道德地使用数据。为了应对当前二级环境中隐私保护的挑战,我们提出了一种隐私政策语言,目的-使用(P2U),旨在加强隐私,同时使二级用户信息能够在Web上跨应用程序、设备和服务共享。
{"title":"P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage","authors":"J. Iyilade, Julita Vassileva","doi":"10.1109/SPW.2014.12","DOIUrl":"https://doi.org/10.1109/SPW.2014.12","url":null,"abstract":"Within the last decade, there are growing economic social incentives and opportunities for secondary use of data in many sectors, and strong market forces currently drive the active development of systems that aggregate user data gathered by many sources. This secondary use of data poses privacy threats due to unwanted use of data for the wrong purposes such as discriminating the user for employment, loan and insurance. Traditional privacy policy languages such as the Platform for Privacy Preferences (P3P) are inadequate since they were designed long before many of these technologies were invented and basically focus on enabling user-awareness and control during primary data collection (e.g. by a website). However, with the advent of Web 2.0 and Social Networking Sites, the landscape of privacy is shifting from limiting collection of data by websites to ensuring ethical use of the data after initial collection. To meet the current challenges of privacy protection in secondary context, we propose a privacy policy language, Purpose-to-Use (P2U), aimed at enforcing privacy while enabling secondary user information sharing across applications, devices, and services on the Web.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Resilience as a New Enforcement Model for IT Security Based on Usage Control 弹性:一种新的基于使用控制的IT安全实施模型
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.14
Sven Wohlgemuth
Security and privacy are not only general requirements of a society but also indispensable enablers for innovative IT infrastructure applications aiming at increased, sustainable welfare and safety of a society. A critical activity of these IT applications is spontaneous information exchange. This information exchange, however, creates inevitable, unknown dependencies between the participating IT systems, which, in turn threaten security and privacy. With the current approach to IT security, security and privacy follow changes and incidents rather than anticipating them. By sticking to a given threat model, the current approach fails to consider vulnerabilities which arise during a spontaneous information exchange. With the goal of improving security and privacy, this work proposes adapting an IT security model and its enforcement to current and most probable incidents before they result in an unacceptable risk for the participating parties or failure of IT applications. Usage control is the suitable security policy model, since it allows changes during run-time without conceptually raising additional incidents.
安全和隐私不仅是社会的一般要求,也是创新的信息技术基础设施应用的不可或缺的推动力,旨在提高社会的可持续福利和安全。这些IT应用程序的一个关键活动是自发的信息交换。然而,这种信息交换在参与的IT系统之间产生了不可避免的、未知的依赖关系,这反过来又威胁到安全和隐私。使用当前的IT安全方法,安全性和隐私遵循变化和事件,而不是预测它们。由于坚持给定的威胁模型,当前的方法无法考虑在自发信息交换过程中出现的漏洞。为了提高安全性和隐私性,这项工作建议在当前和最可能发生的事件对参与各方造成不可接受的风险或IT应用程序失败之前,调整IT安全模型及其实施。使用控制是合适的安全策略模型,因为它允许在运行时进行更改,而不会在概念上引发其他事件。
{"title":"Resilience as a New Enforcement Model for IT Security Based on Usage Control","authors":"Sven Wohlgemuth","doi":"10.1109/SPW.2014.14","DOIUrl":"https://doi.org/10.1109/SPW.2014.14","url":null,"abstract":"Security and privacy are not only general requirements of a society but also indispensable enablers for innovative IT infrastructure applications aiming at increased, sustainable welfare and safety of a society. A critical activity of these IT applications is spontaneous information exchange. This information exchange, however, creates inevitable, unknown dependencies between the participating IT systems, which, in turn threaten security and privacy. With the current approach to IT security, security and privacy follow changes and incidents rather than anticipating them. By sticking to a given threat model, the current approach fails to consider vulnerabilities which arise during a spontaneous information exchange. With the goal of improving security and privacy, this work proposes adapting an IT security model and its enforcement to current and most probable incidents before they result in an unacceptable risk for the participating parties or failure of IT applications. Usage control is the suitable security policy model, since it allows changes during run-time without conceptually raising additional incidents.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115295716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Weird Machines in Proof-Carrying Code 携带证明代码中的奇怪机器
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.37
Julien Vanegue
We review different attack vectors on Proof-Carrying Code (PCC) related to policy, memory model, machine abstraction, and formal system. We capture the notion of weird machines in PCC to formalize the shadow execution arising in programs when their proofs do not sufficiently capture and disallow the execution of untrusted computations. We suggest a few ideas to improve existing PCC systems so they are more resilient to memory attacks.
本文从策略、内存模型、机器抽象和形式化系统等方面综述了PCC的不同攻击向量。我们在PCC中捕获了奇怪机器的概念,以形式化程序中出现的影子执行,当它们的证明不能充分捕获和禁止执行不可信的计算时。我们提出了一些改进现有PCC系统的想法,使它们对内存攻击更有弹性。
{"title":"The Weird Machines in Proof-Carrying Code","authors":"Julien Vanegue","doi":"10.1109/SPW.2014.37","DOIUrl":"https://doi.org/10.1109/SPW.2014.37","url":null,"abstract":"We review different attack vectors on Proof-Carrying Code (PCC) related to policy, memory model, machine abstraction, and formal system. We capture the notion of weird machines in PCC to formalize the shadow execution arising in programs when their proofs do not sufficiently capture and disallow the execution of untrusted computations. We suggest a few ideas to improve existing PCC systems so they are more resilient to memory attacks.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Understanding Insider Threat: A Framework for Characterising Attacks 理解内部威胁:描述攻击的框架
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.38
Jason R. C. Nurse, Oliver Buckley, P. Legg, M. Goldsmith, S. Creese, Gordon R. T. Wright, M. Whitty
The threat that insiders pose to businesses, institutions and governmental organisations continues to be of serious concern. Recent industry surveys and academic literature provide unequivocal evidence to support the significance of this threat and its prevalence. Despite this, however, there is still no unifying framework to fully characterise insider attacks and to facilitate an understanding of the problem, its many components and how they all fit together. In this paper, we focus on this challenge and put forward a grounded framework for understanding and reflecting on the threat that insiders pose. Specifically, we propose a novel conceptualisation that is heavily grounded in insider-threat case studies, existing literature and relevant psychological theory. The framework identifies several key elements within the problem space, concentrating not only on noteworthy events and indicators- technical and behavioural- of potential attacks, but also on attackers (e.g., the motivation behind malicious threats and the human factors related to unintentional ones), and on the range of attacks being witnessed. The real value of our framework is in its emphasis on bringing together and defining clearly the various aspects of insider threat, all based on real-world cases and pertinent literature. This can therefore act as a platform for general understanding of the threat, and also for reflection, modelling past attacks and looking for useful patterns.
内部人士对企业、机构和政府组织构成的威胁仍然令人严重关切。最近的行业调查和学术文献提供了明确的证据来支持这种威胁的重要性及其普遍性。然而,尽管如此,仍然没有统一的框架来全面描述内部攻击,并促进对问题的理解,它的许多组成部分以及它们如何组合在一起。在本文中,我们将重点关注这一挑战,并提出了一个理解和反思内部人员构成的威胁的基础框架。具体而言,我们提出了一种新的概念,该概念在很大程度上基于内部威胁案例研究、现有文献和相关心理学理论。该框架确定了问题空间中的几个关键元素,不仅关注潜在攻击的值得注意的事件和指标(技术和行为),还关注攻击者(例如,恶意威胁背后的动机和与无意攻击相关的人为因素),以及所目睹的攻击范围。我们的框架的真正价值在于它强调汇集和明确定义内部威胁的各个方面,所有这些都基于现实世界的案例和相关文献。因此,这可以作为一个了解威胁的平台,也可以作为一个反思的平台,为过去的攻击建模,并寻找有用的模式。
{"title":"Understanding Insider Threat: A Framework for Characterising Attacks","authors":"Jason R. C. Nurse, Oliver Buckley, P. Legg, M. Goldsmith, S. Creese, Gordon R. T. Wright, M. Whitty","doi":"10.1109/SPW.2014.38","DOIUrl":"https://doi.org/10.1109/SPW.2014.38","url":null,"abstract":"The threat that insiders pose to businesses, institutions and governmental organisations continues to be of serious concern. Recent industry surveys and academic literature provide unequivocal evidence to support the significance of this threat and its prevalence. Despite this, however, there is still no unifying framework to fully characterise insider attacks and to facilitate an understanding of the problem, its many components and how they all fit together. In this paper, we focus on this challenge and put forward a grounded framework for understanding and reflecting on the threat that insiders pose. Specifically, we propose a novel conceptualisation that is heavily grounded in insider-threat case studies, existing literature and relevant psychological theory. The framework identifies several key elements within the problem space, concentrating not only on noteworthy events and indicators- technical and behavioural- of potential attacks, but also on attackers (e.g., the motivation behind malicious threats and the human factors related to unintentional ones), and on the range of attacks being witnessed. The real value of our framework is in its emphasis on bringing together and defining clearly the various aspects of insider threat, all based on real-world cases and pertinent literature. This can therefore act as a platform for general understanding of the threat, and also for reflection, modelling past attacks and looking for useful patterns.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 177
Ethics in Data Sharing: Developing a Model for Best Practice 数据共享中的伦理:开发最佳实践模型
Pub Date : 2014-05-17 DOI: 10.1109/SPW.2014.43
S. Dietrich, J. V. D. Ham, A. Pras, R. V. Rijswijk-Deij, Darren Shou, A. Sperotto, A. Wynsberghe, L. Zuck
As an outcome of a seminar on the 'Ethics in Data Sharing', we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.
作为“数据共享伦理”研讨会的成果,我们概述了在研究中共享数据的最佳实践模型。我们从计算机和网络安全的背景下,用两个当前和及时的现实案例来说明这个模型。
{"title":"Ethics in Data Sharing: Developing a Model for Best Practice","authors":"S. Dietrich, J. V. D. Ham, A. Pras, R. V. Rijswijk-Deij, Darren Shou, A. Sperotto, A. Wynsberghe, L. Zuck","doi":"10.1109/SPW.2014.43","DOIUrl":"https://doi.org/10.1109/SPW.2014.43","url":null,"abstract":"As an outcome of a seminar on the 'Ethics in Data Sharing', we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 IEEE Security and Privacy Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1