首页 > 最新文献

J. Comput. Secur.最新文献

英文 中文
Invalid certificates in modern browsers: A socio-technical analysis 现代浏览器中的无效证书:社会技术分析
Pub Date : 2018-07-10 DOI: 10.3233/JCS-16891
Rosario Giustolisi, G. Bella, G. Lenzini
The authentication of a web server is a crucial procedure in the security of web browsing. It relies on certificate validation, a process that may require the participation of the user. Thus, the security of certificate validation is socio-technical as it depends on traditional security technology as well as on social elements such as cultural values, trust and human-computer interaction. This manuscript analyzes extensively the socio-technical security of certificate validation as carried out through today’s most popular browsers. First, we model processes, protocols and ceremonies that browsers run with servers and users as UML activity diagrams. We consider both classic and private browsing modes and focus on the certificate validation. We then translate each UML activity diagram to a CSP# model. The model is expanded with the LTL formalization of five socio-technical properties pivoted on user involvement with certificate validation. We automatically check whether the CSP# models are socio-technically secure against Man-in-the-Middle attacks using the PAT model checker. The findings turn out to be far from straightforward. From them, we state best-practice recommendations to browser vendors.
web服务器的身份验证是保证web浏览安全的关键环节。它依赖于证书验证,这一过程可能需要用户的参与。因此,证书验证的安全性是社会技术的,因为它既取决于传统的安全技术,也取决于文化价值观、信任和人机交互等社会因素。本文广泛分析了当今最流行的浏览器中证书验证的社会技术安全性。首先,我们将浏览器与服务器和用户一起运行的过程、协议和仪式建模为UML活动图。我们考虑了经典浏览模式和私有浏览模式,并重点讨论了证书验证。然后我们将每个UML活动图转换为CSP#模型。该模型扩展了五个社会技术属性的LTL形式化,这些属性以用户参与证书验证为中心。我们使用PAT模型检查器自动检查CSP#模型是否在社会技术上对中间人攻击是安全的。事实证明,这些发现远非直截了当。根据这些建议,我们向浏览器供应商提供最佳实践建议。
{"title":"Invalid certificates in modern browsers: A socio-technical analysis","authors":"Rosario Giustolisi, G. Bella, G. Lenzini","doi":"10.3233/JCS-16891","DOIUrl":"https://doi.org/10.3233/JCS-16891","url":null,"abstract":"The authentication of a web server is a crucial procedure in the security of web browsing. It relies on certificate validation, a process that may require the participation of the user. Thus, the security of certificate validation is socio-technical as it depends on traditional security technology as well as on social elements such as cultural values, trust and human-computer interaction. This manuscript analyzes extensively the socio-technical security of certificate validation as carried out through today’s most popular browsers. First, we model processes, protocols and ceremonies that browsers run with servers and users as UML activity diagrams. We consider both classic and private browsing modes and focus on the certificate validation. We then translate each UML activity diagram to a CSP# model. The model is expanded with the LTL formalization of five socio-technical properties pivoted on user involvement with certificate validation. We automatically check whether the CSP# models are socio-technically secure against Man-in-the-Middle attacks using the PAT model checker. The findings turn out to be far from straightforward. From them, we state best-practice recommendations to browser vendors.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131523250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Substring search over encrypted data 对加密数据进行子字符串搜索
Pub Date : 2018-03-15 DOI: 10.5339/QFARC.2018.ICTPP735
Tarik Moataz, I. Ray, I. Ray, Abdullatif Shikfa, F. Cuppens, N. Cuppens-Boulahia
Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, cloud computing has entered our lives inexorably: every owner of a smartphone, every user of a social network is using cloud computing, as most IT companies and tech giants in particular are using infrastructure as a service to offer services in the model of software as a service. These services (dropbox, google, facebook, twitter…) are simple to use, flexible…and free! Users just send their data and they get all services without paying. Actually, these companies are making most of their revenues by profiling the users thanks to the data that the users willingly provide. The data is the indirect payment to benefit from these services. This raises privacy concerns at the personal level, as well as confidentiality issues for sensitive documents in a professional environment. The classical way of dealing with confidentiality is to conceal the data through encryption. However, cloud providers need access to data in order to provide useful services, not only to profile users. Take a cloud email service as example, where the emails are stored and archived in the cloud and only downloaded to the user's phone or computer when the user wants to read them. If the emails are encrypted in the cloud, the cloud cannot access them and confidentiality is enforced. However, the cloud can also not provide any useful service to the user such as a search functionality over emails. To meet these conflicting requirements (hiding the data and accessing the data) a solution is to develop mechanisms that allow computation on encrypted data. While generic protocols for computation on encrypted data have been researched developed, such as Gentry's breakthrough fully homomorphic encryption, their performance remains unsatisfactory. On the contrary, tailoring solutions to specific needs result in more practical and efficient solution. In the case of searching over encrypted data, searchable encryptions algorithms have been developed for over decade and achieve now satisfactory performance (linear in the size of the dictionary). Most of the work in this field focus on single keyword search in the symmetric setting. To overcome this limitation, we first proposed a scheme based on letter orthogonalization that allows testing of string membership by performing efficient inner products (AsiaCCS 2013). Going further, we now propose a general solution to the problem of efficient substring search over encrypted data. The solution enhances existing “keyword” searchable encryption schemes by allowing searching for any part of encrypted keywords without requiring one to store all possible combinations of substrings from a given dictionary. The proposed technique is based on the previous idea of letter orthogonalization. We first propose SED-1, the base protocol for subs
我们的数据,无论是个人数据还是专业数据,都越来越多地被外包出去。这是过去十年中云计算发展的结果,这种范式将计算转变为实用程序。即使没有意识到,云计算已经无情地进入了我们的生活:每个智能手机的拥有者,每个社交网络的用户都在使用云计算,因为大多数it公司,尤其是科技巨头都在使用基础设施即服务,以软件即服务的模式提供服务。这些服务(dropbox, google, facebook, twitter…)使用简单,灵活,而且免费!用户只需发送数据,就可以免费获得所有服务。实际上,这些公司的大部分收入都是通过用户自愿提供的数据来分析用户的。数据是从这些服务中获益的间接支付。这引起了个人层面的隐私问题,以及专业环境中敏感文件的保密性问题。处理机密性的经典方法是通过加密来隐藏数据。然而,云提供商需要访问数据以提供有用的服务,而不仅仅是配置用户。以云电子邮件服务为例,电子邮件存储和存档在云中,只有当用户需要阅读时才下载到用户的手机或电脑上。如果电子邮件在云中加密,则云无法访问它们并强制执行机密性。然而,云也不能为用户提供任何有用的服务,比如电子邮件的搜索功能。为了满足这些相互冲突的需求(隐藏数据和访问数据),一种解决方案是开发允许对加密数据进行计算的机制。虽然已经研究开发了加密数据计算的通用协议,如Gentry的突破性全同态加密,但其性能仍然不尽人意。相反,根据特定需求定制解决方案会产生更实用和有效的解决方案。在搜索加密数据的情况下,可搜索的加密算法已经开发了十多年,并且现在实现了令人满意的性能(字典大小呈线性)。该领域的大部分工作集中在对称设置下的单个关键字搜索。为了克服这一限制,我们首先提出了一种基于字母正交的方案,该方案允许通过执行有效的内积来测试字符串成员(AsiaCCS 2013)。更进一步,我们现在提出一个通用的解决方案来解决在加密数据上高效搜索子字符串的问题。该解决方案增强了现有的“关键字”可搜索加密方案,允许搜索加密关键字的任何部分,而不需要存储给定字典中所有可能的子字符串组合。提出的技术是基于前面的字母正交的想法。我们首先提出了子串搜索的基本协议SED-1。然后,我们确定了一些针对SED-1的攻击,这些攻击展示了不同威胁场景下子字符串搜索问题的复杂性。这导致我们提出我们的第二个和主要协议SED-2。该协议的效率还在于,搜索复杂度与关键字字典的大小成线性关系。我们在一个相当大的真实世界数据集上运行了几个实验来评估我们协议的性能。这最后的工作已被接受发表在计算机安全的IOS杂志https://content.iospress.com/articles/journal-of-computer-security/jcs14652。
{"title":"Substring search over encrypted data","authors":"Tarik Moataz, I. Ray, I. Ray, Abdullatif Shikfa, F. Cuppens, N. Cuppens-Boulahia","doi":"10.5339/QFARC.2018.ICTPP735","DOIUrl":"https://doi.org/10.5339/QFARC.2018.ICTPP735","url":null,"abstract":"Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, cloud computing has entered our lives inexorably: every owner of a smartphone, every user of a social network is using cloud computing, as most IT companies and tech giants in particular are using infrastructure as a service to offer services in the model of software as a service. These services (dropbox, google, facebook, twitter…) are simple to use, flexible…and free! Users just send their data and they get all services without paying. Actually, these companies are making most of their revenues by profiling the users thanks to the data that the users willingly provide. The data is the indirect payment to benefit from these services. This raises privacy concerns at the personal level, as well as confidentiality issues for sensitive documents in a professional environment. The classical way of dealing with confidentiality is to conceal the data through encryption. However, cloud providers need access to data in order to provide useful services, not only to profile users. Take a cloud email service as example, where the emails are stored and archived in the cloud and only downloaded to the user's phone or computer when the user wants to read them. If the emails are encrypted in the cloud, the cloud cannot access them and confidentiality is enforced. However, the cloud can also not provide any useful service to the user such as a search functionality over emails. To meet these conflicting requirements (hiding the data and accessing the data) a solution is to develop mechanisms that allow computation on encrypted data. While generic protocols for computation on encrypted data have been researched developed, such as Gentry's breakthrough fully homomorphic encryption, their performance remains unsatisfactory. On the contrary, tailoring solutions to specific needs result in more practical and efficient solution. In the case of searching over encrypted data, searchable encryptions algorithms have been developed for over decade and achieve now satisfactory performance (linear in the size of the dictionary). Most of the work in this field focus on single keyword search in the symmetric setting. To overcome this limitation, we first proposed a scheme based on letter orthogonalization that allows testing of string membership by performing efficient inner products (AsiaCCS 2013). Going further, we now propose a general solution to the problem of efficient substring search over encrypted data. The solution enhances existing “keyword” searchable encryption schemes by allowing searching for any part of encrypted keywords without requiring one to store all possible combinations of substrings from a given dictionary. The proposed technique is based on the previous idea of letter orthogonalization. We first propose SED-1, the base protocol for subs","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123391295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards designing robust CAPTCHAs 设计健壮的验证码
Pub Date : 2017-12-13 DOI: 10.3233/JCS-17947
David Lorenzi, Emre Uzun, Jaideep Vaidya, S. Sural, V. Atluri
{"title":"Towards designing robust CAPTCHAs","authors":"David Lorenzi, Emre Uzun, Jaideep Vaidya, S. Sural, V. Atluri","doi":"10.3233/JCS-17947","DOIUrl":"https://doi.org/10.3233/JCS-17947","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterizing a property-driven obfuscation strategy 描述属性驱动的混淆策略
Pub Date : 2017-11-30 DOI: 10.3233/JCS-14672
M. Preda, Isabella Mastroeni
In recent years, code obfuscation has attracted both researchers and software developers as a useful technique for protecting secret properties of proprietary programs. The idea of code obfuscation is to modify a program, while preserving its functionality, in order to make it more difficult to analyze. Thus, the aim of code obfuscation is to conceal certain properties to an attacker, while revealing its intended behavior. However, a general methodology for deriving an obfuscating transformation from the properties to conceal and reveal is still missing. In this work, we start to address this problem by studying the existence and the characterization of function transformers that minimally or maximally modify a program in order to reveal or conceal a certain property. Based on this general formal framework, we are able to provide a characterization of the maximal obfuscating strategy for transformations concealing a given property while revealing the desired observational behavior. To conclude, we discuss the applicability of the proposed characterization by showing how some common obfuscation techniques can be interpreted in this framework. Moreover, we show how this approach allows us to deeply understand what are the behavioral properties that these transformations conceal, and therefore protect, and which are the ones that they reveal, and therefore disclose.
近年来,代码混淆作为一种保护专有程序的秘密属性的有用技术吸引了研究人员和软件开发人员。代码混淆的思想是修改程序,同时保留其功能,以使其更难以分析。因此,代码混淆的目的是向攻击者隐藏某些属性,同时揭示其预期的行为。然而,从隐藏和显示的属性派生混淆转换的通用方法仍然缺失。在这项工作中,我们开始通过研究最小或最大程度地修改程序以揭示或隐藏某些属性的函数变压器的存在性和特征来解决这个问题。基于这个一般的形式化框架,我们能够为隐藏给定属性的转换提供最大混淆策略的表征,同时揭示期望的观察行为。最后,我们通过展示如何在此框架中解释一些常见的混淆技术来讨论所提出的表征的适用性。此外,我们还展示了这种方法如何让我们深入了解这些转换隐藏并因此保护的行为属性,以及它们揭示并因此揭示的行为属性。
{"title":"Characterizing a property-driven obfuscation strategy","authors":"M. Preda, Isabella Mastroeni","doi":"10.3233/JCS-14672","DOIUrl":"https://doi.org/10.3233/JCS-14672","url":null,"abstract":"In recent years, code obfuscation has attracted both researchers and software developers as a useful technique for protecting secret properties of proprietary programs. The idea of code obfuscation is to modify a program, while preserving its functionality, in order to make it more difficult to analyze. Thus, the aim of code obfuscation is to conceal certain properties to an attacker, while revealing its intended behavior. However, a general methodology for deriving an obfuscating transformation from the properties to conceal and reveal is still missing. In this work, we start to address this problem by studying the existence and the characterization of function transformers that minimally or maximally modify a program in order to reveal or conceal a certain property. Based on this general formal framework, we are able to provide a characterization of the maximal obfuscating strategy for transformations concealing a given property while revealing the desired observational behavior. To conclude, we discuss the applicability of the proposed characterization by showing how some common obfuscation techniques can be interpreted in this framework. Moreover, we show how this approach allows us to deeply understand what are the behavioral properties that these transformations conceal, and therefore protect, and which are the ones that they reveal, and therefore disclose.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127953542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Refining security protocols 改进安全协议
Pub Date : 2017-11-30 DOI: 10.3233/JCS-16814
C. Sprenger, D. Basin
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy transforms abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. As intermediate levels of abstraction, we employ messageless guard protocols and channel protocols communicating over channels with security properties. These abstractions provide insights on why protocols are secure and foster the development of families of protocols sharing common structure and properties. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key establishment protocols, including realistic features such as key confirmation, replay caches, and encrypted tickets. Our development highlights that guard protocols and channel protocols provide fundamental abstractions for bridging the gap between security properties and standard protocol descriptions based on cryptographic messages. It also shows that our refinement approach scales to protocols of nontrivial size and complexity.
提出了一种基于逐步细化的安全协议开发方法。我们的改进策略将抽象的安全目标转换为在由dolev - yao风格的入侵者控制的不安全通道上操作时安全的协议。作为中间抽象层,我们采用无消息保护协议和通过具有安全属性的通道进行通信的通道协议。这些抽象提供了为什么协议是安全的见解,并促进了共享公共结构和属性的协议家族的发展。我们已经在Isabelle/HOL中实现了我们的方法,并使用它来开发不同的实体身份验证和密钥建立协议,包括密钥确认、重播缓存和加密票据等现实功能。我们的开发强调,保护协议和通道协议提供了基本的抽象,以弥合安全属性和基于加密消息的标准协议描述之间的差距。它还表明,我们的改进方法适用于非平凡大小和复杂性的协议。
{"title":"Refining security protocols","authors":"C. Sprenger, D. Basin","doi":"10.3233/JCS-16814","DOIUrl":"https://doi.org/10.3233/JCS-16814","url":null,"abstract":"We propose a development method for security protocols based on stepwise refinement. Our refinement strategy transforms abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. As intermediate levels of abstraction, we employ messageless guard protocols and channel protocols communicating over channels with security properties. These abstractions provide insights on why protocols are secure and foster the development of families of protocols sharing common structure and properties. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key establishment protocols, including realistic features such as key confirmation, replay caches, and encrypted tickets. Our development highlights that guard protocols and channel protocols provide fundamental abstractions for bridging the gap between security properties and standard protocol descriptions based on cryptographic messages. It also shows that our refinement approach scales to protocols of nontrivial size and complexity.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Per-Session Security: Password-Based Cryptography Revisited 每个会话的安全性:基于密码的密码学重访
Pub Date : 2017-09-11 DOI: 10.1007/978-3-319-66402-6_24
Grégory Demay, Peter Gazi, U. Maurer, Björn Tackmann
{"title":"Per-Session Security: Password-Based Cryptography Revisited","authors":"Grégory Demay, Peter Gazi, U. Maurer, Björn Tackmann","doi":"10.1007/978-3-319-66402-6_24","DOIUrl":"https://doi.org/10.1007/978-3-319-66402-6_24","url":null,"abstract":"","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An interpolation-based method for the verification of security protocols 基于插值的安全协议验证方法
Pub Date : 2017-08-24 DOI: 10.3233/JCS-16832
M. Rocchetto, L. Viganò, Marco Volpe
Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of interpolation. We address this problem and present an interpolation-based method for security protocol verification. Our method starts from a protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of concrete examples and discuss the results obtained by using a prototype implementation.
插值已成功地应用于序列程序的模型检查和测试用例生成的形式化方法中。然而,安全协议表现出这样的特性,使它们不适合直接应用插值。我们解决了这个问题,并提出了一种基于插值的安全协议验证方法。我们的方法从协议规范出发,结合Craig插值、符号执行和标准的Dolev-Yao入侵者模型来搜索对协议可能的攻击。插值是作为对搜索失败的响应而生成的,目的是修剪可能无用的痕迹,加快搜索速度。我们通过具体的例子来说明我们的方法,并讨论了使用原型实现所得到的结果。
{"title":"An interpolation-based method for the verification of security protocols","authors":"M. Rocchetto, L. Viganò, Marco Volpe","doi":"10.3233/JCS-16832","DOIUrl":"https://doi.org/10.3233/JCS-16832","url":null,"abstract":"Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of interpolation. We address this problem and present an interpolation-based method for security protocol verification. Our method starts from a protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of concrete examples and discuss the results obtained by using a prototype implementation.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Special issue on verified information flow security 关于已验证信息流安全的特刊
Pub Date : 2017-07-10 DOI: 10.3233/JCS-0559
Toby C. Murray, A. Sabelfeld, Lujo Bauer
Toby Murray a,b,∗, Andrei Sabelfeld c and Lujo Bauer d a School of Computing and Information Systems, University of Melbourne, Australia E-mail: toby.murray@unimelb.edu.au b Data61, CSIRO, Australia c Department of Computer Science and Engineering, Chalmers University of Technology, Sweden E-mail: andrei@chalmers.se d Department of Electrical and Computer Engineering and Institute for Software Research, Carnegie Mellon University, PA, USA E-mail: lbauer@cmu.edu
Toby Murray a,b, *, Andrei Sabelfeld c和Lujo Bauer d a澳大利亚墨尔本大学计算与信息系统学院E-mail: toby.murray@unimelb.edu.au b Data61,澳大利亚CSIRO c瑞典Chalmers理工大学计算机科学与工程系E-mail: andrei@chalmers.se d美国卡耐基梅隆大学电气与计算机工程系和软件研究所E-mail: lbauer@cmu.edu
{"title":"Special issue on verified information flow security","authors":"Toby C. Murray, A. Sabelfeld, Lujo Bauer","doi":"10.3233/JCS-0559","DOIUrl":"https://doi.org/10.3233/JCS-0559","url":null,"abstract":"Toby Murray a,b,∗, Andrei Sabelfeld c and Lujo Bauer d a School of Computing and Information Systems, University of Melbourne, Australia E-mail: toby.murray@unimelb.edu.au b Data61, CSIRO, Australia c Department of Computer Science and Engineering, Chalmers University of Technology, Sweden E-mail: andrei@chalmers.se d Department of Electrical and Computer Engineering and Institute for Software Research, Carnegie Mellon University, PA, USA E-mail: lbauer@cmu.edu","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Time, computational complexity, and probability in the analysis of distance-bounding protocols 分析距离边界协议的时间、计算复杂度和概率
Pub Date : 2017-02-12 DOI: 10.3233/JCS-0560
M. Kanovich, Tajana Ban Kirigin, Vivek Nigam, A. Scedrov, C. Talcott
Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with a novel attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks.
许多安全协议依赖于对其协议会话将在其中执行的物理属性的假设。例如,距离边界协议考虑消息的往返时间和传输速度来推断两个代理之间距离的上界。我们把这种安全协议归类为网络物理协议。时间在许多协议的设计和分析中起着关键作用。本文探讨了离散时间模型与密集时间模型的基本区别及其对分析的影响。我们表明,使用密集时间的模型可以发现攻击,但使用离散时间的模型却不能发现攻击。我们用一种新的攻击来说明这一点,这种攻击可以在大多数距离边界协议上进行。在这种攻击中,一个人利用一个时钟周期内指令的执行延迟来说服验证者他所处的位置与他的实际位置不同。我们还提出了这种新型攻击的概率分析。作为一种表示和分析网络物理特性的形式化模型,我们提出了一种适合指定网络物理安全协议的密集时间多集重写模型。我们引入了圆构型,并证明了它们可以用来象征性地解决模型的可达性问题,并证明了对于一类重要的平衡理论,可达性问题是pspace完全的。我们还展示了如何使用计算重写工具Maude实现我们的模型,Maude是自动搜索此类攻击的机器。
{"title":"Time, computational complexity, and probability in the analysis of distance-bounding protocols","authors":"M. Kanovich, Tajana Ban Kirigin, Vivek Nigam, A. Scedrov, C. Talcott","doi":"10.3233/JCS-0560","DOIUrl":"https://doi.org/10.3233/JCS-0560","url":null,"abstract":"Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with a novel attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks.","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Provably secure memory isolation for Linux on ARM 可证明的安全内存隔离Linux上的ARM
Pub Date : 2016-12-01 DOI: 10.3233/JCS-160558
R. Guanciale, Hamed Nemati, M. Dam, Christoph Baumann
The isolation of security critical components from an untrusted OS allows to both protect applications and to harden the OS itself. Virtualization of the memory subsystem is a key component to prov ...
将安全关键组件与不受信任的操作系统隔离开来,既可以保护应用程序,又可以强化操作系统本身。内存子系统的虚拟化是证明…
{"title":"Provably secure memory isolation for Linux on ARM","authors":"R. Guanciale, Hamed Nemati, M. Dam, Christoph Baumann","doi":"10.3233/JCS-160558","DOIUrl":"https://doi.org/10.3233/JCS-160558","url":null,"abstract":"The isolation of security critical components from an untrusted OS allows to both protect applications and to harden the OS itself. Virtualization of the memory subsystem is a key component to prov ...","PeriodicalId":142580,"journal":{"name":"J. Comput. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
J. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1