首页 > 最新文献

J. Comput. Secur.最新文献

英文 中文
On the semantics of communications when verifying equivalence properties 在验证等效属性时对通信语义的影响
Pub Date : 2020-02-04 DOI: 10.3233/jcs-191366
Kushal Babel, Vincent Cheval, S. Kremer
Symbolic models for security protocol verification were pioneered by Dolev and Yao in their seminal work. Since then, although inspired by the same ideas, many variants of the original model were developed. In particular, a common assumption is that the attacker has complete control over the network and can therefore intercept any message. This assumption has been interpreted in slightly different ways depending on the particular models: either any protocol output is directly routed to the adversary, or communications may be among any two participants, including the attacker-the scheduling between which exact parties the communication happens is left to the attacker. This difference may seem unimportant at first glance and, depending on the verification tools, either one or the other semantics is implemented. We show that, unsurprisingly, they indeed coincide for reachability properties. However, for indistinguishability properties, we prove that these two interpretations lead to incomparable semantics. We also introduce and study a new semantics, where internal communications are allowed but messages are always eavesdropped by the attacker. This new semantics yields strictly stronger equivalence relations. Moreover, we identify two subclasses of protocols for which the three semantics coincide. Finally, we implemented verification of trace equivalence for each of the three semantics in the DeepSec tool and compare their performances on several classical examples.
安全协议验证的符号模型是由Dolev和Yao在他们的开创性工作中开创的。从那时起,尽管受到相同想法的启发,原始模型的许多变体被开发出来。特别是,一个常见的假设是攻击者完全控制了网络,因此可以拦截任何消息。根据特定的模型,对这个假设的解释略有不同:要么任何协议输出都直接路由到攻击者,要么通信可能在任何两个参与者(包括攻击者)之间进行——通信发生在哪一方之间的调度留给攻击者。乍一看,这种差异似乎并不重要,并且根据验证工具的不同,可以实现其中一种语义或另一种语义。我们表明,毫不奇怪,它们在可达性属性上确实是一致的。然而,对于不可区分的性质,我们证明了这两种解释导致了不可比较的语义。我们还引入并研究了一种新的语义,允许内部通信,但消息总是被攻击者窃听。这种新的语义产生严格更强的等价关系。此外,我们还确定了三个语义一致的协议的两个子类。最后,我们在DeepSec工具中实现了对三种语义的跟踪等效性验证,并在几个经典示例上比较了它们的性能。
{"title":"On the semantics of communications when verifying equivalence properties","authors":"Kushal Babel, Vincent Cheval, S. Kremer","doi":"10.3233/jcs-191366","DOIUrl":"https://doi.org/10.3233/jcs-191366","url":null,"abstract":"Symbolic models for security protocol verification were pioneered by Dolev and Yao in their seminal work. Since then, although inspired by the same ideas, many variants of the original model were developed. In particular, a common assumption is that the attacker has complete control over the network and can therefore intercept any message. This assumption has been interpreted in slightly different ways depending on the particular models: either any protocol output is directly routed to the adversary, or communications may be among any two participants, including the attacker-the scheduling between which exact parties the communication happens is left to the attacker. This difference may seem unimportant at first glance and, depending on the verification tools, either one or the other semantics is implemented. We show that, unsurprisingly, they indeed coincide for reachability properties. However, for indistinguishability properties, we prove that these two interpretations lead to incomparable semantics. We also introduce and study a new semantics, where internal communications are allowed but messages are always eavesdropped by the attacker. This new semantics yields strictly stronger equivalence relations. Moreover, we identify two subclasses of protocols for which the three semantics coincide. Finally, we implemented verification of trace equivalence for each of the three semantics in the DeepSec tool and compare their performances on several classical examples.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
How persuasive is a phishing email? A phishing game for phishing awareness 网络钓鱼邮件的说服力如何?一个网络钓鱼游戏的网络钓鱼意识
Pub Date : 2019-10-11 DOI: 10.3233/jcs-181253
R. Fatima, Affan Yasin, Lin Liu, Jianmin Wang
{"title":"How persuasive is a phishing email? A phishing game for phishing awareness","authors":"R. Fatima, Affan Yasin, Lin Liu, Jianmin Wang","doi":"10.3233/jcs-181253","DOIUrl":"https://doi.org/10.3233/jcs-181253","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123334683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Using side channel TCP features for real-time detection of malware connections 使用侧通道TCP功能实时检测恶意软件连接
Pub Date : 2019-09-17 DOI: 10.3233/JCS-191286
G. Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, D. Gritzalis
{"title":"Using side channel TCP features for real-time detection of malware connections","authors":"G. Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, D. Gritzalis","doi":"10.3233/JCS-191286","DOIUrl":"https://doi.org/10.3233/JCS-191286","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134325085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments 通过维护任务分配减轻云中的远程管理员的内部威胁
Pub Date : 2019-07-18 DOI: 10.3233/JCS-191306
Nawaf Alhebaishi, Lingyu Wang, S. Jajodia, A. Singhal
{"title":"Mitigating the insider threat of remote administrators in clouds through maintenance task assignments","authors":"Nawaf Alhebaishi, Lingyu Wang, S. Jajodia, A. Singhal","doi":"10.3233/JCS-191306","DOIUrl":"https://doi.org/10.3233/JCS-191306","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing leakage of personal information by malware 分析恶意软件泄露个人信息
Pub Date : 2019-07-18 DOI: 10.3233/JCS-191287
Tobias Urban, Dennis Tatang, Thorsten Holz, N. Pohlmann
{"title":"Analyzing leakage of personal information by malware","authors":"Tobias Urban, Dennis Tatang, Thorsten Holz, N. Pohlmann","doi":"10.3233/JCS-191287","DOIUrl":"https://doi.org/10.3233/JCS-191287","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128060665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin 共谋攻击和公平的比特币快速支付交易的定时存款
Pub Date : 2019-06-10 DOI: 10.3233/JCS-191274
Xingjie Yu, M. Shiwen, Yingjiu Li, R. Deng
In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending attacks, it requires a certain amount of time to detect the doublespending attacks after the transaction has been initiated. Therefore, it is impractical to protect the payees from suffering in double-spending attacks in fast payment scenarios where the time between the exchange of currency and goods or services is shorten to few seconds. Although we cannot prevent double-spending attacks immediately for fast payments, decentralized non-equivocation contracts have been proposed to penalize the malicious payer after the attacks have been detected. The basic idea of these contracts is that the payer locks some coins in a deposit when he initiates a transaction with the payee. If the payer double-spends, a cryptographic primitive called accountable assertions can be used to reveal his Bitcoin credentials for the deposit. Thus, the malicious payer could be penalized by the loss of deposit coins. However, such decentralized nonequivocation contracts are subjected to collusion attacks where the payer colludes with the beneficiary of the depoist and transfers the Bitcoin deposit back to himself when he double-spends, resulting in no penalties. On the other hand, even if the beneficiary behaves honestly, the victim payee cannot get any compensation directly from the deposit in the original design. To prevent such collusion attacks, we design fair time-locked deposits for Bitcoin transactions to defend against doublespending. The fair deposits ensure that the payer will be penalized by the loss of his deposit coins if he double-spends and the victim payee’s loss will be compensated within a locked time period. We start with the protocols of making a deposit for one transaction. In particular, for the transaction with single input and output and the transaction with multiple inputs and outputs, we provide different designs of the deposits. We analyze the performance of deposits made for one transaction and show how the fair deposits work efficiently in Bitcoin. We also provide protocols of making a deposit for multiple transactions, which can reduce the burdens of a honest payer. In the end, we extend the fair deposits to non-equivocation contracts for other distributed systems.
在比特币网络中,区块链的多个副本的分布式存储为双重支付提供了可能性,即付款人向两个不同的收款人发出两笔单独的交易,转移相同的硬币。虽然比特币具有固有的安全机制来防止双重支出攻击,但在交易启动后,需要一定的时间来检测双重支出攻击。因此,在快速支付场景中,货币与商品或服务的交换时间缩短到几秒钟,保护收款人免受双重支付攻击是不切实际的。虽然我们无法立即阻止快速支付的双重支付攻击,但已经提出了去中心化的无歧义合约,以便在检测到攻击后惩罚恶意付款人。这些合约的基本思想是,当付款人发起与收款人的交易时,他将一些硬币锁定在存款中。如果付款人重复支出,可以使用一种称为可问责断言的加密原语来显示他的比特币存款凭据。因此,恶意的付款人可能会受到损失存款硬币的惩罚。然而,这种去中心化的无歧义合约会受到串通攻击,即付款人与存款的受益人串通,并在他重复支出时将比特币存款转回给自己,从而不会受到惩罚。另一方面,即使受益人行为诚实,原设计中的受害收款人也不能直接从保证金中获得任何补偿。为了防止这种串通攻击,我们为比特币交易设计了公平的定时存款,以防止双重支出。公平存款确保付款人如果重复使用,将因其存款硬币的损失而受到惩罚,而受害的收款人的损失将在锁定的时间内得到补偿。我们从一笔交易的存款协议开始。特别是对于单输入输出的交易和多输入输出的交易,我们提供了不同的存款设计。我们分析了一次交易的存款表现,并展示了公平存款如何在比特币中有效地工作。我们还提供为多个交易进行存款的协议,这可以减轻诚实付款人的负担。最后,我们将公平存款扩展到其他分布式系统的无歧义合同。
{"title":"Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin","authors":"Xingjie Yu, M. Shiwen, Yingjiu Li, R. Deng","doi":"10.3233/JCS-191274","DOIUrl":"https://doi.org/10.3233/JCS-191274","url":null,"abstract":"In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending attacks, it requires a certain amount of time to detect the doublespending attacks after the transaction has been initiated. Therefore, it is impractical to protect the payees from suffering in double-spending attacks in fast payment scenarios where the time between the exchange of currency and goods or services is shorten to few seconds. Although we cannot prevent double-spending attacks immediately for fast payments, decentralized non-equivocation contracts have been proposed to penalize the malicious payer after the attacks have been detected. The basic idea of these contracts is that the payer locks some coins in a deposit when he initiates a transaction with the payee. If the payer double-spends, a cryptographic primitive called accountable assertions can be used to reveal his Bitcoin credentials for the deposit. Thus, the malicious payer could be penalized by the loss of deposit coins. However, such decentralized nonequivocation contracts are subjected to collusion attacks where the payer colludes with the beneficiary of the depoist and transfers the Bitcoin deposit back to himself when he double-spends, resulting in no penalties. On the other hand, even if the beneficiary behaves honestly, the victim payee cannot get any compensation directly from the deposit in the original design. To prevent such collusion attacks, we design fair time-locked deposits for Bitcoin transactions to defend against doublespending. The fair deposits ensure that the payer will be penalized by the loss of his deposit coins if he double-spends and the victim payee’s loss will be compensated within a locked time period. We start with the protocols of making a deposit for one transaction. In particular, for the transaction with single input and output and the transaction with multiple inputs and outputs, we provide different designs of the deposits. We analyze the performance of deposits made for one transaction and show how the fair deposits work efficiently in Bitcoin. We also provide protocols of making a deposit for multiple transactions, which can reduce the burdens of a honest payer. In the end, we extend the fair deposits to non-equivocation contracts for other distributed systems.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Last man standing: Static, decremental and dynamic resiliency via controller synthesis 最后一个人:静态,递减和动态弹性通过控制器合成
Pub Date : 2019-06-10 DOI: 10.3233/JCS-181244
Matteo Zavatteri, L. Viganò
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e., a plan) so that all authorization constraints are satisfied. The workflow resiliency problem is a dynamic workflow satisfiability problem coping with the absence of users. If a workflow is resilient, it is of course satisfiable, but the vice versa does not hold. There are three levels of resiliency: in static resiliency, up to k users might be absent before the execution starts and never become available for that execution; in decremental resiliency, up to k users might be absent before or during execution and, again, they never become available for that execution; in dynamic resiliency, up to k users might be absent before executing any task and they may in general turn absent and available continuously, before or during the execution. Much work has been carried out to address static resiliency, little for decremental resiliency and, to the best of our knowledge, for dynamic resiliency no exact approach that returns a dynamic execution plan if and only if a workflow is resilient has been provided so far. In this paper, we tackle workflow resiliency via extended game automata . We provide three encodings (having polynomial-time complexity) from workflows to extended game automata to model each kind of resiliency as an instantaneous game and we use Uppaal-TIGA to synthesize a winning strategy (i.e., a controller) for such a game. If a controller exists, then the workflow is resilient (as the controller’s strategy corresponds to a dynamic plan). If it doesn’t, then the workflow is breakable . The approach that we propose is correct because it corresponds to a reachability problem for extended game automata (TCTL model checking). Moreover, we have developed Erre , the first tool for workflow resiliency that relies on a controller synthesis approach for the three kinds of resiliency. Thanks to Erre , our approach is thus also fully-automated from analysis to simulation.
工作流可满足性问题是找到用户对任务(例如,一个计划)的分配以便满足所有授权约束的问题。工作流弹性问题是指在用户缺席的情况下,动态工作流的满意度问题。如果工作流是弹性的,那么它当然是可满足的,但反之则不成立。有三种级别的弹性:在静态弹性中,在执行开始之前可能有多达k个用户缺席,并且永远无法用于该执行;在递减弹性中,在执行之前或执行期间可能缺席多达k个用户,并且它们永远不会在执行中可用;在动态弹性中,在执行任何任务之前,可能会有多达k个用户缺席,并且在执行之前或执行期间,这些用户通常会缺席并持续可用。在解决静态弹性方面已经做了很多工作,而在增量弹性方面做得很少,而且据我们所知,在动态弹性方面,目前还没有提供了当且仅当工作流具有弹性时返回动态执行计划的确切方法。在本文中,我们通过扩展游戏自动机来解决工作流弹性问题。我们提供了从工作流到扩展游戏自动机的三种编码(具有多项式时间复杂度),将每种弹性建模为瞬时游戏,我们使用Uppaal-TIGA来合成这种游戏的制胜策略(即控制器)。如果存在一个控制器,那么工作流是有弹性的(因为控制器的策略对应于一个动态计划)。如果没有,那么工作流是可破坏的。我们提出的方法是正确的,因为它对应于扩展游戏自动机(TCTL模型检查)的可达性问题。此外,我们还开发了Erre,这是工作流弹性的第一个工具,它依赖于三种弹性的控制器综合方法。多亏了Erre,我们的方法从分析到模拟都是全自动的。
{"title":"Last man standing: Static, decremental and dynamic resiliency via controller synthesis","authors":"Matteo Zavatteri, L. Viganò","doi":"10.3233/JCS-181244","DOIUrl":"https://doi.org/10.3233/JCS-181244","url":null,"abstract":"The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e., a plan) so that all authorization constraints are satisfied. The workflow resiliency problem is a dynamic workflow satisfiability problem coping with the absence of users. If a workflow is resilient, it is of course satisfiable, but the vice versa does not hold. There are three levels of resiliency: in static resiliency, up to k users might be absent before the execution starts and never become available for that execution; in decremental resiliency, up to k users might be absent before or during execution and, again, they never become available for that execution; in dynamic resiliency, up to k users might be absent before executing any task and they may in general turn absent and available continuously, before or during the execution. Much work has been carried out to address static resiliency, little for decremental resiliency and, to the best of our knowledge, for dynamic resiliency no exact approach that returns a dynamic execution plan if and only if a workflow is resilient has been provided so far. In this paper, we tackle workflow resiliency via extended game automata . We provide three encodings (having polynomial-time complexity) from workflows to extended game automata to model each kind of resiliency as an instantaneous game and we use Uppaal-TIGA to synthesize a winning strategy (i.e., a controller) for such a game. If a controller exists, then the workflow is resilient (as the controller’s strategy corresponds to a dynamic plan). If it doesn’t, then the workflow is breakable . The approach that we propose is correct because it corresponds to a reachability problem for extended game automata (TCTL model checking). Moreover, we have developed Erre , the first tool for workflow resiliency that relies on a controller synthesis approach for the three kinds of resiliency. Thanks to Erre , our approach is thus also fully-automated from analysis to simulation.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DABKE: Secure deniable attribute-based key exchange framework 安全的基于可否认属性的密钥交换框架
Pub Date : 2019-03-29 DOI: 10.3233/JCS-181201
Yangguang Tian, Yingjiu Li, Guomin Yang, W. Susilo, Y. Mu, Hui Cui, Yinghui Zhang
We introduce the first deniable attribute-based key exchange (DABKE) framework that is resilient to impersonation attacks. We define the formal security models for DABKE framework, and propose a generic compiler that converts any attribute-based key exchanges into deniable ones. We prove that it can achieve session key security and user privacy in the standard model, and strong deniability in the simulation-based paradigm. In particular, the proposed generic compiler ensures: 1) a dishonest user cannot impersonate other user’s session participation in conversations since implicit authentication is used among authorized users; 2) an authorized user can plausibly deny his/her participation after secure conversations with others; 3) the strongest form of deniability is achieved using one-round communication between two authorized users.
我们介绍了第一个可否认的基于属性的密钥交换(DABKE)框架,它可以抵御模拟攻击。我们定义了DABKE框架的正式安全模型,并提出了一个通用的编译器,可以将任何基于属性的密钥交换转换为可否认的密钥交换。证明了该方法在标准模型下可以实现会话密钥安全和用户隐私,在基于仿真的范式下可以实现强可否认性。特别地,所提出的通用编译器确保:1)由于在授权用户之间使用隐式认证,因此不诚实的用户无法在会话中冒充其他用户的会话参与;2)授权用户在与他人进行安全对话后,可以合理地拒绝参与;3)通过两个授权用户之间的一轮通信实现最强形式的可否认性。
{"title":"DABKE: Secure deniable attribute-based key exchange framework","authors":"Yangguang Tian, Yingjiu Li, Guomin Yang, W. Susilo, Y. Mu, Hui Cui, Yinghui Zhang","doi":"10.3233/JCS-181201","DOIUrl":"https://doi.org/10.3233/JCS-181201","url":null,"abstract":"We introduce the first deniable attribute-based key exchange (DABKE) framework that is resilient to impersonation attacks. We define the formal security models for DABKE framework, and propose a generic compiler that converts any attribute-based key exchanges into deniable ones. We prove that it can achieve session key security and user privacy in the standard model, and strong deniability in the simulation-based paradigm. In particular, the proposed generic compiler ensures: 1) a dishonest user cannot impersonate other user’s session participation in conversations since implicit authentication is used among authorized users; 2) an authorized user can plausibly deny his/her participation after secure conversations with others; 3) the strongest form of deniability is achieved using one-round communication between two authorized users.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying Constant-Time Implementations by Abstract Interpretation 通过抽象解释验证恒定时间实现
Pub Date : 2019-01-11 DOI: 10.1007/978-3-319-66402-6_16
Sandrine Blazy, David Pichardie, Alix Trieu
{"title":"Verifying Constant-Time Implementations by Abstract Interpretation","authors":"Sandrine Blazy, David Pichardie, Alix Trieu","doi":"10.1007/978-3-319-66402-6_16","DOIUrl":"https://doi.org/10.1007/978-3-319-66402-6_16","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Group ORAM for privacy and access control in outsourced personal records 外判个人纪录的私隐及查阅控制
Pub Date : 2019-01-11 DOI: 10.3233/JCS-171030
Matteo Maffei, Giulio Malavolta, M. Reinert, Dominique Schröder
{"title":"Group ORAM for privacy and access control in outsourced personal records","authors":"Matteo Maffei, Giulio Malavolta, M. Reinert, Dominique Schröder","doi":"10.3233/JCS-171030","DOIUrl":"https://doi.org/10.3233/JCS-171030","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
J. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1