首页 > 最新文献

J. Comput. Secur.最新文献

英文 中文
Permissive runtime information flow control in the presence of exceptions 在存在异常的情况下允许运行时信息流控制
Pub Date : 2021-03-30 DOI: 10.3233/JCS-211385
Abhishek Bichhawat, Vineet Rajani, D. Garg, Christian Hammer
Information flow control (IFC) has been extensively studied as an approach to mitigate information leaks in applications. A vast majority of existing work in this area is based on static analysis. However, some applications, especially on the Web, are developed using dynamic languages like JavaScript where static analyses for IFC do not scale well. As a result, there has been a growing interest in recent years to develop dynamic or runtime information flow analysis techniques. In spite of the advances in the field, runtime information flow analysis has not been at the helm of information flow security, one of the reasons being that the analysis techniques and the security property related to them (non-interference) over-approximate information flows (particularly implicit flows), generating many false positives. In this paper, we present a sound and precise approach for handling implicit leaks at runtime. In particular, we present an improvement and enhancement of the so-called permissive-upgrade strategy, which is widely used to tackle implicit leaks in dynamic information flow control. We improve the strategy’s permissiveness and generalize it. Building on top of it, we present an approach to handle implicit leaks when dealing with complex features like unstructured control flow and exceptions in higher-order languages. We explain how we address the challenge of handling unstructured control flow using immediate post-dominator analysis. We prove that our approach is sound and precise.
信息流控制(IFC)作为一种缓解应用程序中信息泄漏的方法已经得到了广泛的研究。这一领域的大部分现有工作都是基于静态分析的。然而,一些应用程序,特别是Web上的应用程序,是使用JavaScript等动态语言开发的,而IFC的静态分析不能很好地扩展。因此,近年来人们对开发动态或运行时信息流分析技术越来越感兴趣。尽管该领域取得了进步,但运行时信息流分析并没有成为信息流安全的掌舵,原因之一是分析技术及其相关的安全属性(不干扰)过于近似信息流(特别是隐式流),产生了许多误报。在本文中,我们提出了一种可靠而精确的方法来处理运行时的隐式泄漏。特别是,我们提出了一种改进和增强的所谓的许可升级策略,该策略被广泛用于解决动态信息流控制中的隐式泄漏。我们改进了策略的容忍度,并对其进行了推广。在此基础上,我们提出了一种在处理复杂特性(如高阶语言中的非结构化控制流和异常)时处理隐式泄漏的方法。我们解释了如何使用即时后支配分析解决处理非结构化控制流的挑战。我们证明了我们的方法是合理和精确的。
{"title":"Permissive runtime information flow control in the presence of exceptions","authors":"Abhishek Bichhawat, Vineet Rajani, D. Garg, Christian Hammer","doi":"10.3233/JCS-211385","DOIUrl":"https://doi.org/10.3233/JCS-211385","url":null,"abstract":"Information flow control (IFC) has been extensively studied as an approach to mitigate information leaks in applications. A vast majority of existing work in this area is based on static analysis. However, some applications, especially on the Web, are developed using dynamic languages like JavaScript where static analyses for IFC do not scale well. As a result, there has been a growing interest in recent years to develop dynamic or runtime information flow analysis techniques. In spite of the advances in the field, runtime information flow analysis has not been at the helm of information flow security, one of the reasons being that the analysis techniques and the security property related to them (non-interference) over-approximate information flows (particularly implicit flows), generating many false positives. In this paper, we present a sound and precise approach for handling implicit leaks at runtime. In particular, we present an improvement and enhancement of the so-called permissive-upgrade strategy, which is widely used to tackle implicit leaks in dynamic information flow control. We improve the strategy’s permissiveness and generalize it. Building on top of it, we present an approach to handle implicit leaks when dealing with complex features like unstructured control flow and exceptions in higher-order languages. We explain how we address the challenge of handling unstructured control flow using immediate post-dominator analysis. We prove that our approach is sound and precise.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directed adversarial sampling attacks on phishing detection 网络钓鱼检测中的定向对抗性抽样攻击
Pub Date : 2021-02-03 DOI: 10.3233/JCS-191411
H. Shirazi, Bruhadeshwar Bezawada, I. Ray, Charles Anderson
Phishing websites trick honest users into believing that they interact with a legitimate website and capture sensitive information, such as user names, passwords, credit card numbers, and other personal information. Machine learning is a promising technique to distinguish between phishing and legitimate websites. However, machine learning approaches are susceptible to adversarial learning attacks where a phishing sample can bypass classifiers. Our experiments on publicly available datasets reveal that the phishing detection mechanisms are vulnerable to adversarial learning attacks. We investigate the robustness of machine learning-based phishing detection in the face of adversarial learning attacks. We propose a practical approach to simulate such attacks by generating adversarial samples through direct feature manipulation. To enhance the sample’s success probability, we describe a clustering approach that guides an attacker to select the best possible phishing samples that can bypass the classifier by appearing as legitimate samples. We define the notion of vulnerability level for each dataset that measures the number of features that can be manipulated and the cost for such manipulation. Further, we clustered phishing samples and showed that some clusters of samples are more likely to exhibit higher vulnerability levels than others. This helps an adversary identify the best candidates of phishing samples to generate adversarial samples at a lower cost. Our finding can be used to refine the dataset and develop better learning models to compensate for the weak samples in the training dataset.
网络钓鱼网站欺骗诚实的用户,让他们相信他们在与一个合法的网站互动,并获取敏感信息,如用户名、密码、信用卡号和其他个人信息。机器学习是一种很有前途的区分网络钓鱼和合法网站的技术。然而,机器学习方法容易受到对抗性学习攻击,其中网络钓鱼样本可以绕过分类器。我们在公开可用数据集上的实验表明,网络钓鱼检测机制容易受到对抗性学习攻击。我们研究了面对对抗性学习攻击时基于机器学习的网络钓鱼检测的鲁棒性。我们提出了一种实用的方法来模拟这种攻击,即通过直接特征操作生成对抗性样本。为了提高样本的成功概率,我们描述了一种聚类方法,该方法指导攻击者选择可能的最佳网络钓鱼样本,这些样本可以通过作为合法样本出现而绕过分类器。我们为每个数据集定义了漏洞级别的概念,该概念衡量了可以被操纵的特征的数量以及这种操纵的成本。此外,我们对网络钓鱼样本进行了聚类,并表明一些样本集群比其他样本更有可能表现出更高的漏洞级别。这有助于攻击者识别网络钓鱼样本的最佳候选,从而以较低的成本生成对抗性样本。我们的发现可以用来改进数据集,开发更好的学习模型来补偿训练数据集中的弱样本。
{"title":"Directed adversarial sampling attacks on phishing detection","authors":"H. Shirazi, Bruhadeshwar Bezawada, I. Ray, Charles Anderson","doi":"10.3233/JCS-191411","DOIUrl":"https://doi.org/10.3233/JCS-191411","url":null,"abstract":"Phishing websites trick honest users into believing that they interact with a legitimate website and capture sensitive information, such as user names, passwords, credit card numbers, and other personal information. Machine learning is a promising technique to distinguish between phishing and legitimate websites. However, machine learning approaches are susceptible to adversarial learning attacks where a phishing sample can bypass classifiers. Our experiments on publicly available datasets reveal that the phishing detection mechanisms are vulnerable to adversarial learning attacks. We investigate the robustness of machine learning-based phishing detection in the face of adversarial learning attacks. We propose a practical approach to simulate such attacks by generating adversarial samples through direct feature manipulation. To enhance the sample’s success probability, we describe a clustering approach that guides an attacker to select the best possible phishing samples that can bypass the classifier by appearing as legitimate samples. We define the notion of vulnerability level for each dataset that measures the number of features that can be manipulated and the cost for such manipulation. Further, we clustered phishing samples and showed that some clusters of samples are more likely to exhibit higher vulnerability levels than others. This helps an adversary identify the best candidates of phishing samples to generate adversarial samples at a lower cost. Our finding can be used to refine the dataset and develop better learning models to compensate for the weak samples in the training dataset.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A systematic review of security threats and countermeasures in SaaS 对SaaS中的安全威胁和对策的系统回顾
Pub Date : 2020-11-27 DOI: 10.3233/jcs-200002
M. A. Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez
Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.
在云提供的服务模型中,软件即服务(SaaS)模型增长最快。这种服务模型对组织来说是一个很有吸引力的选择,因为它们可以将部分或全部IT功能转移到云服务提供商。然而,决定将所有数据迁移到云上仍然存在一些不确定性,主要是由于安全问题。SaaS模型不仅继承了传统应用程序的安全问题,而且SaaS体系结构还存在独特的攻击和漏洞。此外,由于SaaS模型中共享资源的特性,这种环境中的一些攻击更具破坏性。其中一些攻击和漏洞对于软件设计人员和开发人员来说还不是很熟悉。这种知识的缺乏会带来负面后果,因为它可能会暴露用户和组织的敏感数据。本文使用SALSA框架进行了严格的系统审查,以了解威胁、攻击和对策,以减轻SaaS环境中发生的安全问题。作为审查结果的一部分,本文对SaaS环境中的威胁、攻击和对策进行了分类。
{"title":"A systematic review of security threats and countermeasures in SaaS","authors":"M. A. Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez","doi":"10.3233/jcs-200002","DOIUrl":"https://doi.org/10.3233/jcs-200002","url":null,"abstract":"Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols 绢毛猴源引理的自动生成:迈向安全协议的自动证明
Pub Date : 2020-09-14 DOI: 10.1007/978-3-030-59013-0_1
V. Cortier, S. Delaune, Jannik Dreier
{"title":"Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols","authors":"V. Cortier, S. Delaune, Jannik Dreier","doi":"10.1007/978-3-030-59013-0_1","DOIUrl":"https://doi.org/10.1007/978-3-030-59013-0_1","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new framework for privacy-preserving biometric-based remote user authentication 基于隐私保护生物特征的远程用户认证新框架
Pub Date : 2020-06-19 DOI: 10.3233/jcs-191336
Yangguang Tian, Yingjiu Li, R. Deng, Nan Li, Pengfei Wu, Anyi Liu
In this paper, we introduce the first general framework for strong privacy-preserving biometric-based remote user authentication based on oblivious RAM (ORAM) protocol and computational fuzzy extractors. We define formal security models for the general framework, and we prove that it can achieve user authenticity and strong privacy. In particular, the general framework ensures that: 1) a strong privacy and a log-linear time-complexity are achieved by using a new tree-based ORAM protocol; 2) a constant bandwidth cost is achieved by exploiting computational fuzzy extractors in the challenge-response phase of remote user authentications.
本文介绍了基于遗忘RAM (ORAM)协议和计算模糊提取器的基于生物特征的强隐私保护远程用户认证的第一个通用框架。我们定义了通用框架的形式化安全模型,并证明了它可以实现用户真实性和强隐私性。特别是,总体框架确保:1)通过使用新的基于树的ORAM协议实现强隐私和对数线性时间复杂度;2)在远程用户认证的挑战-响应阶段,利用计算模糊提取器实现了恒定的带宽成本。
{"title":"A new framework for privacy-preserving biometric-based remote user authentication","authors":"Yangguang Tian, Yingjiu Li, R. Deng, Nan Li, Pengfei Wu, Anyi Liu","doi":"10.3233/jcs-191336","DOIUrl":"https://doi.org/10.3233/jcs-191336","url":null,"abstract":"In this paper, we introduce the first general framework for strong privacy-preserving biometric-based remote user authentication based on oblivious RAM (ORAM) protocol and computational fuzzy extractors. We define formal security models for the general framework, and we prove that it can achieve user authenticity and strong privacy. In particular, the general framework ensures that: 1) a strong privacy and a log-linear time-complexity are achieved by using a new tree-based ORAM protocol; 2) a constant bandwidth cost is achieved by exploiting computational fuzzy extractors in the challenge-response phase of remote user authentications.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards adding verifiability to web-based Git repositories 向基于web的Git存储库添加可验证性
Pub Date : 2020-06-19 DOI: 10.3233/jcs-191371
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos
. Web-based Git hosting services such as GitHub and GitLab are popular choices to manage and interact with Git repositories. However, they lack an important security feature – the ability to sign Git commits. Users instruct the server to perform repository operations on their behalf and have to trust that the server will execute their requests faithfully. Such trust may be unwarranted though because a malicious or a compromised server may execute the requested actions in an incorrect manner, leading to a different state of the repository than what the user intended. In this paper, we show a range of high-impact attacks that can be executed stealthily when developers use the web UI of a Git hosting service to perform common actions such as editing files or merging branches. We then propose le-git-imate , a defense against these attacks, which enables users to protect their commits using Git’s standard commit signing mechanism. We implement le-git-imate as a Chrome browser extension. le-git-imate does not require changes on the server side and can thus be used immediately. It also preserves current workflows used in Github/GitLab and does not require the user to leave the browser, and it allows anyone to verify that the server’s actions faithfully follow the user’s requested actions. Moreover, experimental evaluation using the browser extension shows that le-git-imate has comparable performance with Git’s standard commit signature mechanism. With our solution in place, users can take advantage of GitHub/GitLab’s web-based features without sacrificing security, thus paving the way towards verifiable web-based Git repositories.
. 基于web的Git托管服务(如GitHub和GitLab)是管理和与Git存储库交互的流行选择。然而,它们缺少一个重要的安全特性——签名Git提交的能力。用户指示服务器代表他们执行存储库操作,并且必须信任服务器将忠实地执行他们的请求。但是,这种信任可能是没有保证的,因为恶意的或受损害的服务器可能以不正确的方式执行请求的操作,从而导致存储库的状态与用户预期的状态不同。在本文中,我们展示了一系列高影响攻击,这些攻击可以在开发人员使用Git托管服务的web UI执行常见操作(如编辑文件或合并分支)时秘密执行。然后我们提出了le-git-imate,这是一种针对这些攻击的防御,它使用户能够使用Git的标准提交签名机制来保护他们的提交。我们实现了le-git-imate作为Chrome浏览器扩展。Le-git-imate不需要在服务器端进行更改,因此可以立即使用。它还保留了Github/GitLab中使用的当前工作流,不需要用户离开浏览器,并且允许任何人验证服务器的操作忠实地遵循用户请求的操作。此外,使用浏览器扩展的实验评估表明,le-git-imate具有与Git标准提交签名机制相当的性能。有了我们的解决方案,用户可以在不牺牲安全性的情况下利用GitHub/GitLab的基于web的功能,从而为可验证的基于web的Git存储库铺平道路。
{"title":"Towards adding verifiability to web-based Git repositories","authors":"Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos","doi":"10.3233/jcs-191371","DOIUrl":"https://doi.org/10.3233/jcs-191371","url":null,"abstract":". Web-based Git hosting services such as GitHub and GitLab are popular choices to manage and interact with Git repositories. However, they lack an important security feature – the ability to sign Git commits. Users instruct the server to perform repository operations on their behalf and have to trust that the server will execute their requests faithfully. Such trust may be unwarranted though because a malicious or a compromised server may execute the requested actions in an incorrect manner, leading to a different state of the repository than what the user intended. In this paper, we show a range of high-impact attacks that can be executed stealthily when developers use the web UI of a Git hosting service to perform common actions such as editing files or merging branches. We then propose le-git-imate , a defense against these attacks, which enables users to protect their commits using Git’s standard commit signing mechanism. We implement le-git-imate as a Chrome browser extension. le-git-imate does not require changes on the server side and can thus be used immediately. It also preserves current workflows used in Github/GitLab and does not require the user to leave the browser, and it allows anyone to verify that the server’s actions faithfully follow the user’s requested actions. Moreover, experimental evaluation using the browser extension shows that le-git-imate has comparable performance with Git’s standard commit signature mechanism. With our solution in place, users can take advantage of GitHub/GitLab’s web-based features without sacrificing security, thus paving the way towards verifiable web-based Git repositories.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Threshold Padlock Systems 最佳阈值挂锁系统
Pub Date : 2020-04-23 DOI: 10.3233/jcs-210065
Jannik Dreier, J. Dumas, P. Lafourcade, Léo Robert
In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient k-out-of-n secret sharing scheme based on Lagrange’s interpolation. Liu and Shamir also claimed that the minimal solution using physical locks is clearly impractical and exponential in the number of participants. In this paper we relax some implicit assumptions in their claim and propose an optimal physical solution to the problem of Liu that uses physical padlocks, but the number of padlocks is not greater than the number of participants. Then, we show that no device can do better for k-out-of-n threshold padlock systems as soon as k ⩾ 2 n , which holds true in particular for Liu’s example. More generally, we derive bounds required to implement any threshold system and prove a lower bound of O ( log ( n ) ) padlocks for any threshold larger than 2. For instance we propose an optimal scheme reaching that bound for 2-out-of-n threshold systems and requiring less than 2 log 2 ( n ) padlocks. We also discuss more complex access structures, a wrapping technique, and other sublinear realizations like an algorithm to generate 3-out-of-n systems with 2.5 n padlocks. Finally we give an algorithm building k-out-of-n threshold padlock systems with only O ( log ( n ) k − 1 ) padlocks. Apart from the physical world, our results also show that it is possible to implement secret sharing over small fields.
1968年,刘描述了在一个共享的秘密项目中保护文件的问题。例如,11名参与的科学家中至少有6人需要在场才能打开保护秘密文件的锁。Shamir在1979年提出了这个物理问题的数学解决方案,他设计了一个基于拉格朗日插值的高效k-out- n秘密共享方案。Liu和Shamir还声称,使用物理锁的最小解决方案显然是不切实际的,并且参与者的数量呈指数级增长。本文放宽了他们声明中的一些隐含假设,提出了Liu问题的最优物理解,该解使用物理挂锁,但挂锁的数量不大于参与者的数量。然后,我们表明,只要k大于或等于2 n,就没有设备可以为k- of-n阈值锁系统做得更好,这尤其适用于Liu的例子。更一般地说,我们推导了实现任何阈值系统所需的边界,并证明了任何大于2的阈值的O (log (n))个挂锁的下界。例如,我们提出了一个最优方案,达到2-out- n阈值系统的边界,需要少于2 log 2 (n)个挂锁。我们还讨论了更复杂的访问结构、封装技术和其他次线性实现,比如用2.5 n个挂锁生成3 of-n系统的算法。最后给出了一种构造k- of-n门限挂锁系统的算法,该系统只有O (log (n) k−1)个挂锁。除了物理世界之外,我们的结果还表明,在小领域内实现秘密共享是可能的。
{"title":"Optimal Threshold Padlock Systems","authors":"Jannik Dreier, J. Dumas, P. Lafourcade, Léo Robert","doi":"10.3233/jcs-210065","DOIUrl":"https://doi.org/10.3233/jcs-210065","url":null,"abstract":"In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient k-out-of-n secret sharing scheme based on Lagrange’s interpolation. Liu and Shamir also claimed that the minimal solution using physical locks is clearly impractical and exponential in the number of participants. In this paper we relax some implicit assumptions in their claim and propose an optimal physical solution to the problem of Liu that uses physical padlocks, but the number of padlocks is not greater than the number of participants. Then, we show that no device can do better for k-out-of-n threshold padlock systems as soon as k ⩾ 2 n , which holds true in particular for Liu’s example. More generally, we derive bounds required to implement any threshold system and prove a lower bound of O ( log ( n ) ) padlocks for any threshold larger than 2. For instance we propose an optimal scheme reaching that bound for 2-out-of-n threshold systems and requiring less than 2 log 2 ( n ) padlocks. We also discuss more complex access structures, a wrapping technique, and other sublinear realizations like an algorithm to generate 3-out-of-n systems with 2.5 n padlocks. Finally we give an algorithm building k-out-of-n threshold padlock systems with only O ( log ( n ) k − 1 ) padlocks. Apart from the physical world, our results also show that it is possible to implement secret sharing over small fields.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134570546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIF: Reactive information flow labels RIF:反应性信息流标签
Pub Date : 2020-03-17 DOI: 10.3233/jcs-191316
Elisavet Kozyri, F. Schneider
{"title":"RIF: Reactive information flow labels","authors":"Elisavet Kozyri, F. Schneider","doi":"10.3233/jcs-191316","DOIUrl":"https://doi.org/10.3233/jcs-191316","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114824687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verification of stateful cryptographic protocols with exclusive OR 用异或验证有状态加密协议
Pub Date : 2020-02-04 DOI: 10.3233/jcs-191358
Jannik Dreier, L. Hirschi, S. Radomirovic, R. Sasse
In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR. In this paper, we improve the TAMARIN prover and its underlying theory to deal with an equational theory modeling XOR operations. The XOR theory can be combined with all equational theories previously supported, including user-defined equational theories. This makes TAMARIN the first verification tool for cryptographic protocols in the symbolic model to support simultaneously this large set of equational theories, protocols with global mutable state, an unbounded number of sessions, and complex security properties including observational equivalence. We demonstrate the effectiveness of our approach by analyzing several protocols that rely on XOR, in particular multiple RFID-protocols, where we can identify attacks as well as provide proofs.
在加密协议中,特别是RFID协议,异或操作是常见的。由于XOR忠实模型固有的复杂性,只有有限的工具支持使用XOR验证加密协议。在本文中,我们改进了TAMARIN证明及其基础理论,以处理一个方程理论建模异或操作。异或理论可以与以前支持的所有方程理论相结合,包括用户定义的方程理论。这使得TAMARIN成为符号模型中第一个验证加密协议的工具,它同时支持大量的等式理论、具有全局可变状态的协议、无限大的会话数以及包括观测等价在内的复杂安全属性。我们通过分析几个依赖于异或的协议来证明我们方法的有效性,特别是多个rfid协议,在这些协议中我们可以识别攻击并提供证据。
{"title":"Verification of stateful cryptographic protocols with exclusive OR","authors":"Jannik Dreier, L. Hirschi, S. Radomirovic, R. Sasse","doi":"10.3233/jcs-191358","DOIUrl":"https://doi.org/10.3233/jcs-191358","url":null,"abstract":"In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR. In this paper, we improve the TAMARIN prover and its underlying theory to deal with an equational theory modeling XOR operations. The XOR theory can be combined with all equational theories previously supported, including user-defined equational theories. This makes TAMARIN the first verification tool for cryptographic protocols in the symbolic model to support simultaneously this large set of equational theories, protocols with global mutable state, an unbounded number of sessions, and complex security properties including observational equivalence. We demonstrate the effectiveness of our approach by analyzing several protocols that rely on XOR, in particular multiple RFID-protocols, where we can identify attacks as well as provide proofs.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning 过拟合、鲁棒性和恶意算法:机器学习中隐私风险潜在原因的研究
Pub Date : 2020-02-04 DOI: 10.3233/jcs-191362
Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson, S. Jha
. Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these algorithms may leak specific private information in the training data to an attacker, either through the models’ structure or their observable behavior. This article examines the factors that can allow a training set membership inference attacker or an attribute inference attacker to learn such information. Using both formal and empirical analyses, we illustrate a clear relationship between these factors and the privacy risk that arises in several popular machine learning algorithms. We find that overfitting is sufficient to allow an attacker to perform membership inference and, when the target attribute meets certain conditions about its influence, attribute inference attacks. We also explore the connection between membership inference and attribute inference, showing that there are deep connections between the two that lead to effective new attacks. We show that overfitting is not necessary for these attacks, demonstrating that other factors, such as robustness to norm-bounded input perturbations and malicious training algorithms, can also significantly increase the privacy risk. Notably, as robustness is intended to be a defense against attacks on the integrity of model predictions, these results suggest it may be difficult in some cases to simultaneously defend against privacy and integrity attacks.
. 当机器学习算法应用于敏感数据时,对隐私构成了明显的威胁。越来越多的先前工作表明,由这些算法产生的模型可能会通过模型的结构或其可观察的行为将训练数据中的特定私人信息泄露给攻击者。本文研究了允许训练集成员推理攻击者或属性推理攻击者学习此类信息的因素。使用正式和实证分析,我们说明了这些因素与几种流行的机器学习算法中出现的隐私风险之间的明确关系。我们发现,过拟合足以允许攻击者进行隶属度推理,当目标属性满足其影响的一定条件时,进行属性推理攻击。我们还探讨了隶属推理和属性推理之间的联系,表明两者之间存在深刻的联系,导致有效的新攻击。我们表明过拟合对于这些攻击是不必要的,这表明其他因素,如对范数有界输入扰动的鲁棒性和恶意训练算法,也会显著增加隐私风险。值得注意的是,由于鲁棒性旨在防御对模型预测完整性的攻击,这些结果表明,在某些情况下,同时防御隐私和完整性攻击可能很困难。
{"title":"Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning","authors":"Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson, S. Jha","doi":"10.3233/jcs-191362","DOIUrl":"https://doi.org/10.3233/jcs-191362","url":null,"abstract":". Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these algorithms may leak specific private information in the training data to an attacker, either through the models’ structure or their observable behavior. This article examines the factors that can allow a training set membership inference attacker or an attribute inference attacker to learn such information. Using both formal and empirical analyses, we illustrate a clear relationship between these factors and the privacy risk that arises in several popular machine learning algorithms. We find that overfitting is sufficient to allow an attacker to perform membership inference and, when the target attribute meets certain conditions about its influence, attribute inference attacks. We also explore the connection between membership inference and attribute inference, showing that there are deep connections between the two that lead to effective new attacks. We show that overfitting is not necessary for these attacks, demonstrating that other factors, such as robustness to norm-bounded input perturbations and malicious training algorithms, can also significantly increase the privacy risk. Notably, as robustness is intended to be a defense against attacks on the integrity of model predictions, these results suggest it may be difficult in some cases to simultaneously defend against privacy and integrity attacks.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
J. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1