首页 > 最新文献

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security最新文献

英文 中文
Checking Intent-based Communication in Android with Intent Space Analysis 用意图空间分析检查Android中基于意图的通信
Yiming Jing, Gail-Joon Ahn, Adam Doupé, J. Yi
Intent-based communication is an inter-application communication mechanism in Android. While its importance has been proven by plenty of security extensions that protect it with policy-driven mandatory access control, an overlooked problem is the verification of the security policies. Checking one security extension's policy is indeed complex. Furthermore, intent-based communication introduces even more complexities because it is mediated by multiple security extensions that respectively enforce their own incompatible, distributed, and dynamic policies. This paper seeks a systematic approach to address the complexities involved in checking intent-based communication. To this end, we propose intent space analysis. Intent space analysis formulates the intent forwarding functionalities of security extensions as transformations on a geometric intent space. We further introduce a policy checking framework called IntentScope that proactively and automatically aggregates distributed policies into a holistic and verifiable view. We evaluate our approach against customized Android OSs and commodity Android devices. In addition, we further conduct experiments with four security extensions to demonstrate how our approach helps identify potential vulnerabilities in each extension.
基于意图的通信是Android中的一种应用间通信机制。尽管许多安全扩展已经证明了它的重要性,这些扩展使用策略驱动的强制访问控制来保护它,但一个被忽视的问题是安全策略的验证。检查一个安全扩展的策略确实很复杂。此外,基于意图的通信引入了更多的复杂性,因为它是由多个安全扩展介导的,这些扩展分别执行它们自己不兼容的、分布式的和动态的策略。本文寻求一种系统的方法来解决检查基于意图的通信所涉及的复杂性。为此,我们提出意图空间分析。意图空间分析将安全扩展的意图转发功能表述为几何意图空间上的转换。我们进一步引入了一个名为IntentScope的策略检查框架,它主动地、自动地将分布式策略聚合到一个整体的、可验证的视图中。我们根据定制的Android操作系统和商用Android设备来评估我们的方法。此外,我们进一步使用四个安全扩展进行实验,以演示我们的方法如何帮助识别每个扩展中的潜在漏洞。
{"title":"Checking Intent-based Communication in Android with Intent Space Analysis","authors":"Yiming Jing, Gail-Joon Ahn, Adam Doupé, J. Yi","doi":"10.1145/2897845.2897904","DOIUrl":"https://doi.org/10.1145/2897845.2897904","url":null,"abstract":"Intent-based communication is an inter-application communication mechanism in Android. While its importance has been proven by plenty of security extensions that protect it with policy-driven mandatory access control, an overlooked problem is the verification of the security policies. Checking one security extension's policy is indeed complex. Furthermore, intent-based communication introduces even more complexities because it is mediated by multiple security extensions that respectively enforce their own incompatible, distributed, and dynamic policies. This paper seeks a systematic approach to address the complexities involved in checking intent-based communication. To this end, we propose intent space analysis. Intent space analysis formulates the intent forwarding functionalities of security extensions as transformations on a geometric intent space. We further introduce a policy checking framework called IntentScope that proactively and automatically aggregates distributed policies into a holistic and verifiable view. We evaluate our approach against customized Android OSs and commodity Android devices. In addition, we further conduct experiments with four security extensions to demonstrate how our approach helps identify potential vulnerabilities in each extension.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext 接收者可撤销的基于身份的广播加密:如何在不知道明文的情况下撤销IBBE中的某些接收者
W. Susilo, Rongmao Chen, F. Guo, Guomin Yang, Y. Mu, Yang-Wai Chow
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption scheme. In this notion, a content provider will produce encrypted content and send them to a third party (which is a broadcaster). This third party will be able to revoke some identities from the ciphertext. We present a security model to capture these requirements, as well as a concrete construction. The ciphertext consists of k+3 group elements, assuming that the maximum number of revocation identities is k. That is, the ciphertext size is linear in the maximal size of R, where R is the revocation identity set. However, we say that the additional elements compared to that from an IBBE scheme are only for the revocation but not for decryption. Therefore, the ciphertext sent to the users for decryption will be of constant size (i.e.,3 group elements). Finally, we present the proof of security of our construction.
本文提出了一种基于接收方可撤销身份的广播加密方案。在这个概念中,内容提供者将生成加密的内容并将其发送给第三方(即广播者)。这个第三方将能够从密文中撤销一些身份。我们提出了一个安全模型来捕获这些需求,以及一个具体的结构。密文由k+3个群元素组成,假设最大撤销身份个数为k,即密文的大小在最大大小R中是线性的,其中R为撤销身份集。然而,我们说,与IBBE方案相比,额外的元素仅用于撤销,而不是用于解密。因此,发送给用户解密的密文将是固定大小的(即3个组元素)。最后,给出了构造的安全性证明。
{"title":"Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext","authors":"W. Susilo, Rongmao Chen, F. Guo, Guomin Yang, Y. Mu, Yang-Wai Chow","doi":"10.1145/2897845.2897848","DOIUrl":"https://doi.org/10.1145/2897845.2897848","url":null,"abstract":"In this paper, we present the notion of recipient-revocable identity-based broadcast encryption scheme. In this notion, a content provider will produce encrypted content and send them to a third party (which is a broadcaster). This third party will be able to revoke some identities from the ciphertext. We present a security model to capture these requirements, as well as a concrete construction. The ciphertext consists of k+3 group elements, assuming that the maximum number of revocation identities is k. That is, the ciphertext size is linear in the maximal size of R, where R is the revocation identity set. However, we say that the additional elements compared to that from an IBBE scheme are only for the revocation but not for decryption. Therefore, the ciphertext sent to the users for decryption will be of constant size (i.e.,3 group elements). Finally, we present the proof of security of our construction.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 第11届计算机与通信安全亚洲会议论文集
Xiaofeng Chen, Xiaofeng Wang, Xinyi Huang
It is our great pleasure to present you the proceedings of the 11th Asia CCS (held in Xi'an, China), an ACM SIGSAC venue just renamed ACM Asia Conference on Computer and Communications Security to reflect its leadership stance in the Asia security community and world-wide impact on security research. This name change also comes with a new high in the conference's academic excellence, thanks to the unprecedented number of high-quality submissions. This year, we received 350 submissions from 34 countries, a new record in the conference's decade-long history. These papers were reviewed by 104 security researchers from 17 countries, assisted by 218 external reviewers, based upon their novelty, technical quality and presentation. First time in the conference's history, we adopted a two-round review mechanism with early notifications, together with a three-week online discussion. This thoughtful and rigorous review process has led to 73 full papers selected for the program, representing an acceptance rate of 20.8%, and additional 8 short papers. This wonderful program was made possible by a team effort. Most important here are the authors, to whom we are grateful for submitting their best research outcomes to the conference. Also, we thank the Program Committee and external reviewers who worked very hard to provide valuable feedbacks to the authors. On average, each PC member reviewed 11 papers and actively participated in the discussion and some also volunteered to shepherd accepted papers to ensure their qualities. Their professionalism exemplifies the volunteer peer-review process that is so important to moving the security science forward. This year's technical program comes together with 5 workshops: CPSS'16, AsiaPKC'16, SCC'16, WTMC'16 and IoTPTS'16, also a new record. We thank the workshop organizers for their hard work for building up their individual programs. Also, we are so fortunate to have three distinguished speakers, Giovanni Vigna, Michael Backes and Yang Xiang, from three continents, to share with us their visions of security and privacy research.
我们很高兴向您介绍第11届亚洲计算机与通信安全会议(在中国西安举行)的会议记录,这是ACM SIGSAC的会场,刚刚更名为ACM亚洲计算机与通信安全会议,以反映其在亚洲安全界的领导地位和全球安全研究的影响。由于提交了数量空前的高质量论文,这次更名也使会议的学术成就达到了一个新的高度。今年,我们收到了来自34个国家的350份意见书,创下了大会十年来的新纪录。这些论文由来自17个国家的104名安全研究人员在218名外部审稿人的协助下,根据其新颖性、技术质量和表达方式进行了审查。我们在大会历史上首次采用了提前通知的两轮审议机制,并进行了为期三周的在线讨论。经过深思熟虑和严格的审查过程,73篇完整论文入选该项目,录取率为20.8%,另外还有8篇短文。这个精彩的节目是团队努力的结果。这里最重要的是作者,我们感谢他们向会议提交了他们最好的研究成果。同时,我们感谢项目委员会和外部审稿人,他们非常努力地为作者提供了有价值的反馈。每位委员平均审阅11篇论文,并积极参与讨论,有些委员还自愿指导论文,以确保论文的质量。他们的专业精神体现了志愿者同行评审过程,这对推动安全科学的发展至关重要。今年的技术计划包括5个研讨会:CPSS'16, AsiaPKC'16, SCC'16, WTMC'16和IoTPTS'16,也是一个新的纪录。我们感谢研讨会组织者为建立他们的个人项目所做的辛勤工作。此外,我们很荣幸邀请到三位杰出的演讲者,Giovanni Vigna, Michael Backes和Yang Xiang,他们来自三个大洲,与我们分享他们对安全和隐私研究的看法。
{"title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","authors":"Xiaofeng Chen, Xiaofeng Wang, Xinyi Huang","doi":"10.1145/2897845","DOIUrl":"https://doi.org/10.1145/2897845","url":null,"abstract":"It is our great pleasure to present you the proceedings of the 11th Asia CCS (held in Xi'an, China), an ACM SIGSAC venue just renamed ACM Asia Conference on Computer and Communications Security to reflect its leadership stance in the Asia security community and world-wide impact on security research. This name change also comes with a new high in the conference's academic excellence, thanks to the unprecedented number of high-quality submissions. \u0000 \u0000This year, we received 350 submissions from 34 countries, a new record in the conference's decade-long history. These papers were reviewed by 104 security researchers from 17 countries, assisted by 218 external reviewers, based upon their novelty, technical quality and presentation. First time in the conference's history, we adopted a two-round review mechanism with early notifications, together with a three-week online discussion. This thoughtful and rigorous review process has led to 73 full papers selected for the program, representing an acceptance rate of 20.8%, and additional 8 short papers. \u0000 \u0000This wonderful program was made possible by a team effort. Most important here are the authors, to whom we are grateful for submitting their best research outcomes to the conference. Also, we thank the Program Committee and external reviewers who worked very hard to provide valuable feedbacks to the authors. On average, each PC member reviewed 11 papers and actively participated in the discussion and some also volunteered to shepherd accepted papers to ensure their qualities. Their professionalism exemplifies the volunteer peer-review process that is so important to moving the security science forward. \u0000 \u0000This year's technical program comes together with 5 workshops: CPSS'16, AsiaPKC'16, SCC'16, WTMC'16 and IoTPTS'16, also a new record. We thank the workshop organizers for their hard work for building up their individual programs. Also, we are so fortunate to have three distinguished speakers, Giovanni Vigna, Michael Backes and Yang Xiang, from three continents, to share with us their visions of security and privacy research.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Anonymous Identification for Ad Hoc Group Ad Hoc组的匿名标识
Xingye Lu, M. Au
An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. We propose a highly efficient construction of this cryptographic primitive in the symmetric key setting based on the idea of program obfuscation. The salient feature of our scheme is that only hash evaluations are needed. Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. Technically, the participant only needs to evaluate one hash operation to identify himself. While the time complexity of the verifier is linearly in the size of the ad hoc group, the actual running time is rather insignificant since the constant factor of this linear dependence is the time of a single hash evaluation. To analyse the security of our proposal, we develop a security model to capture the security requirements of this primitive and prove that our construction satisfies these requirements in the random oracle model against unbounded attackers. Similar to other identification schemes secure in the random oracle model, our proposed protocol requires only two message flow.
临时组的匿名标识方案允许参与者以不泄露其实际身份的方式将自己标识为用户组的成员。基于程序混淆的思想,我们提出了一种在对称密钥设置中高效构造这种密码原语的方法。我们方案的显著特点是只需要哈希计算。因此,对于相当大的临时组规模(大约50000个用户),我们的方案优于所有现有结构,因为不涉及求幂和配对操作。从技术上讲,参与者只需要评估一个哈希操作来标识自己。虽然验证者的时间复杂度与特设组的大小呈线性关系,但实际运行时间相当微不足道,因为这种线性依赖的恒定因素是单个哈希计算的时间。为了分析我们的提议的安全性,我们开发了一个安全模型来捕获这个原语的安全需求,并证明我们的构造在随机oracle模型中满足这些需求,以对抗无界攻击者。与其他在随机oracle模型中安全的标识方案类似,我们提出的协议只需要两个消息流。
{"title":"Anonymous Identification for Ad Hoc Group","authors":"Xingye Lu, M. Au","doi":"10.1145/2897845.2897903","DOIUrl":"https://doi.org/10.1145/2897845.2897903","url":null,"abstract":"An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. We propose a highly efficient construction of this cryptographic primitive in the symmetric key setting based on the idea of program obfuscation. The salient feature of our scheme is that only hash evaluations are needed. Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. Technically, the participant only needs to evaluate one hash operation to identify himself. While the time complexity of the verifier is linearly in the size of the ad hoc group, the actual running time is rather insignificant since the constant factor of this linear dependence is the time of a single hash evaluation. To analyse the security of our proposal, we develop a security model to capture the security requirements of this primitive and prove that our construction satisfies these requirements in the random oracle model against unbounded attackers. Similar to other identification schemes secure in the random oracle model, our proposed protocol requires only two message flow.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122494157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher 基于单感兴趣点侧信道CPA区分器的容错性
Changhai Ou, Zhu Wang, J. Ai, Xinping Zhou, Degang Sun, V. DeBrunner
The efficiency can be significantly improved if the attacker uses interesting points to perform Correlation Power Analysis (CPA). The prerequisite for this is that the attacker knows the positions of interesting points. However, it is difficult for the attacker to accurately find the locations of interesting points if he only has a small number of power traces. In this paper, we propose a Frequency based Interesting Points Selection algorithm (FIPS) to select interesting points under the condition that the attacker only has a very small number of power traces. Moreover, an error tolerant Single Interesting Point based CPA (SIP-CPA) is proposed. Experiments on AES algorithm implemented on an AT89S52 single chip and power trace set of DPA contest v1 of DES algorithm implemented on the Side Channel Attack Standard Evaluation Board (SASEBO) show that, our SIP-CPA can significantly improve the efficiency of CPA.
如果攻击者利用感兴趣点执行相关功率分析(CPA),可以显著提高效率。这样做的先决条件是攻击者知道感兴趣点的位置。然而,如果攻击者只有少量的电源走线,则很难准确地找到感兴趣点的位置。在本文中,我们提出了一种基于频率的兴趣点选择算法(FIPS),用于在攻击者只有很少的功率走线的情况下选择兴趣点。此外,还提出了一种容错的基于单兴趣点的CPA (SIP-CPA)算法。在AT89S52单片机上实现的AES算法和在SASEBO上实现的DES算法的DPA竞赛v1功率跟踪集的实验表明,我们的SIP-CPA可以显著提高CPA的效率。
{"title":"Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher","authors":"Changhai Ou, Zhu Wang, J. Ai, Xinping Zhou, Degang Sun, V. DeBrunner","doi":"10.1145/2897845.2897902","DOIUrl":"https://doi.org/10.1145/2897845.2897902","url":null,"abstract":"The efficiency can be significantly improved if the attacker uses interesting points to perform Correlation Power Analysis (CPA). The prerequisite for this is that the attacker knows the positions of interesting points. However, it is difficult for the attacker to accurately find the locations of interesting points if he only has a small number of power traces. In this paper, we propose a Frequency based Interesting Points Selection algorithm (FIPS) to select interesting points under the condition that the attacker only has a very small number of power traces. Moreover, an error tolerant Single Interesting Point based CPA (SIP-CPA) is proposed. Experiments on AES algorithm implemented on an AT89S52 single chip and power trace set of DPA contest v1 of DES algorithm implemented on the Side Channel Attack Standard Evaluation Board (SASEBO) show that, our SIP-CPA can significantly improve the efficiency of CPA.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122914776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Locks: Lessons for Securing Commodity Internet of Things Devices 智能锁:保护商品物联网设备的经验教训
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, D. Song, D. Wagner
We examine the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock manufacturer's remote servers. We present two categories of attacks against smart locks and analyze the security of five commercially-available locks with respect to these attacks. Our security analysis reveals that flaws in the design, implementation, and interaction models of existing locks can be exploited by several classes of adversaries, allowing them to learn private information about users and gain unauthorized home access. To guide future development of smart locks and similar Internet of Things devices, we propose several defenses that mitigate the attacks we present. One of these defenses is a novel approach to securely and usably communicate a user's intended actions to smart locks, which we prototype and evaluate. Ultimately, our work takes a first step towards illuminating security challenges in the system design and novel functionality introduced by emerging IoT systems.
我们研究了家庭智能锁的安全性:一种网络物理设备,它用可以通过移动设备或锁制造商的远程服务器进行电子控制的门栓取代了传统的门锁。我们提出了针对智能锁的两类攻击,并针对这些攻击分析了五种商用锁的安全性。我们的安全分析显示,现有锁的设计、实现和交互模型中的缺陷可以被几类攻击者利用,使他们能够了解用户的私人信息并获得未经授权的家庭访问。为了指导智能锁和类似物联网设备的未来发展,我们提出了几种防御措施来减轻我们提出的攻击。其中一种防御是一种新颖的方法,可以安全有效地将用户的预期动作传达给智能锁,我们对智能锁进行了原型化和评估。最终,我们的工作为阐明系统设计中的安全挑战和新兴物联网系统引入的新功能迈出了第一步。
{"title":"Smart Locks: Lessons for Securing Commodity Internet of Things Devices","authors":"Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, D. Song, D. Wagner","doi":"10.1145/2897845.2897886","DOIUrl":"https://doi.org/10.1145/2897845.2897886","url":null,"abstract":"We examine the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock manufacturer's remote servers. We present two categories of attacks against smart locks and analyze the security of five commercially-available locks with respect to these attacks. Our security analysis reveals that flaws in the design, implementation, and interaction models of existing locks can be exploited by several classes of adversaries, allowing them to learn private information about users and gain unauthorized home access. To guide future development of smart locks and similar Internet of Things devices, we propose several defenses that mitigate the attacks we present. One of these defenses is a novel approach to securely and usably communicate a user's intended actions to smart locks, which we prototype and evaluate. Ultimately, our work takes a first step towards illuminating security challenges in the system design and novel functionality introduced by emerging IoT systems.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126496863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 239
Efficient Techniques for Publicly Verifiable Delegation of Computation 公开可验证的计算委托的有效技术
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, R. Molva
With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation. Nevertheless, the reliance on the cloud to perform computation raises the unavoidable challenge of how to assure the correctness of the delegated computation. In this regard, we introduce two cryptographic protocols for publicly verifiable computation that allow a lightweight client to securely outsource to a cloud server the evaluation of high-degree univariate polynomials and the multiplication of large matrices. Similarly to existing work, our protocols follow the amortized verifiable computation approach. Furthermore, by exploiting the mathematical properties of polynomials and matrices, they are more efficient and give way to public delegatability. Finally, besides their efficiency, our protocols are provably secure under well-studied assumptions.
随着云计算的出现,个人和公司都在寻找利用云资源的机会,不仅用于存储,还用于计算。然而,依赖云来执行计算提出了一个不可避免的挑战,即如何确保委托计算的正确性。在这方面,我们引入了两种用于公开可验证计算的加密协议,它们允许轻量级客户端安全地将高度单变量多项式的评估和大型矩阵的乘法外包给云服务器。与现有工作类似,我们的协议遵循平摊可验证计算方法。此外,通过利用多项式和矩阵的数学性质,它们更有效,并让位于公共可委托性。最后,除了效率之外,我们的协议在经过充分研究的假设下是可证明的安全的。
{"title":"Efficient Techniques for Publicly Verifiable Delegation of Computation","authors":"Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, R. Molva","doi":"10.1145/2897845.2897910","DOIUrl":"https://doi.org/10.1145/2897845.2897910","url":null,"abstract":"With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation. Nevertheless, the reliance on the cloud to perform computation raises the unavoidable challenge of how to assure the correctness of the delegated computation. In this regard, we introduce two cryptographic protocols for publicly verifiable computation that allow a lightweight client to securely outsource to a cloud server the evaluation of high-degree univariate polynomials and the multiplication of large matrices. Similarly to existing work, our protocols follow the amortized verifiable computation approach. Furthermore, by exploiting the mathematical properties of polynomials and matrices, they are more efficient and give way to public delegatability. Finally, besides their efficiency, our protocols are provably secure under well-studied assumptions.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications CDRep:自动修复密码滥用在Android应用程序
Siqi Ma, D. Lo, Teng Li, R. Deng
Cryptography is increasingly being used in mobile applications to provide various security services; from user authentication, data privacy, to secure communications. However, there are plenty of mistakes that developers could accidentally make when using cryptography in their mobile apps and such mistakes can lead to a false sense of security. Recent research efforts indeed show that a significant portion of mobile apps in both Android and iOS platforms misused cryptographic APIs. In this paper, we present CDRep, a tool for automatically repairing cryptographic misuse defects in Android apps. We classify such defects into seven types and manually assemble the corresponding fix patterns based on the best practices in cryptographic implementations. CDRep consists of two phases, a detection phase which identifies defect locations in a mobile app and a repair phase which repairs the vulnerable app automatically. In our validation, CDRep is able to successfully repair 94.5% of 1,262 vulnerable apps. Furthermore, CDRep is lightweight, the average runtime to generate a patch is merely 19.3 seconds and the size of a repaired app increases by only 0.667% on average.
密码学越来越多地被用于移动应用程序,以提供各种安全服务;从用户认证,数据隐私,到安全通信。然而,在移动应用中使用加密技术时,开发者可能会犯很多错误,而这些错误可能会导致错误的安全感。最近的研究确实表明,Android和iOS平台上的大部分移动应用程序都滥用了加密api。在本文中,我们提出了CDRep,一个自动修复Android应用程序中密码滥用缺陷的工具。我们将这些缺陷分为七种类型,并根据加密实现中的最佳实践手动组装相应的修复模式。CDRep包括两个阶段,一个是检测阶段,用于识别移动应用程序中的缺陷位置,另一个是修复阶段,用于自动修复易受攻击的应用程序。在我们的验证中,CDRep能够成功修复1262个易受攻击的应用中的94.5%。此外,CDRep是轻量级的,生成补丁的平均运行时间仅为19.3秒,修复后的应用程序的大小平均仅增加0.667%。
{"title":"CDRep: Automatic Repair of Cryptographic Misuses in Android Applications","authors":"Siqi Ma, D. Lo, Teng Li, R. Deng","doi":"10.1145/2897845.2897896","DOIUrl":"https://doi.org/10.1145/2897845.2897896","url":null,"abstract":"Cryptography is increasingly being used in mobile applications to provide various security services; from user authentication, data privacy, to secure communications. However, there are plenty of mistakes that developers could accidentally make when using cryptography in their mobile apps and such mistakes can lead to a false sense of security. Recent research efforts indeed show that a significant portion of mobile apps in both Android and iOS platforms misused cryptographic APIs. In this paper, we present CDRep, a tool for automatically repairing cryptographic misuse defects in Android apps. We classify such defects into seven types and manually assemble the corresponding fix patterns based on the best practices in cryptographic implementations. CDRep consists of two phases, a detection phase which identifies defect locations in a mobile app and a repair phase which repairs the vulnerable app automatically. In our validation, CDRep is able to successfully repair 94.5% of 1,262 vulnerable apps. Furthermore, CDRep is lightweight, the average runtime to generate a patch is merely 19.3 seconds and the size of a repaired app increases by only 0.667% on average.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption 完全非延展性CCA安全公钥加密的高效构造
Shifeng Sun, Dawu Gu, Joseph K. Liu, P. Udaya, Tsz Hon Yuen
Non-malleability is an important and intensively studied security notion for many cryptographic primitives. In the context of public key encryption, this notion means it is infeasible for an adversary to transform an encryption of some message m into one of a related message m' under the given public key. Although it has provided a strong security property for many applications, it still does not suffice for some scenarios like the system where the users could issue keys on-the-fly. In such settings, the adversary may have the power to transform the given public key and the ciphertext. To withstand such attacks, Fischlin introduced a stronger notion, known as complete non-malleability, which requires that the non-malleability property be preserved even for the adversaries attempting to produce a ciphertext of some related message under the transformed public key. To date, many schemes satisfying this stronger security have been proposed, but they are either inefficient or proved secure in the random oracle model. In this work, we put forward a new encryption scheme in the common reference string model. Based on the standard DBDH assumption, the proposed scheme is proved completely non-malleable secure against adaptive chosen ciphertext attacks in the standard model. In our scheme, the well-formed public keys and ciphertexts could be publicly recognized without drawing support from unwieldy techniques like non-interactive zero knowledge proofs or one-time signatures, thus achieving a better performance.
不可延展性是许多密码原语研究的重要安全概念。在公钥加密的上下文中,这一概念意味着攻击者无法将某些消息m的加密转换为给定公钥下的相关消息m'中的一个。尽管它为许多应用程序提供了强大的安全性,但对于某些场景,例如用户可以动态发布密钥的系统,它仍然不够。在这种情况下,攻击者可能有能力转换给定的公钥和密文。为了抵御这样的攻击,Fischlin引入了一个更强的概念,称为完全不可延展性,它要求即使对于试图在转换后的公钥下产生某些相关消息的密文的对手,也要保持不可延展性的性质。迄今为止,已经提出了许多满足这种更强安全性的方案,但它们要么效率低下,要么在随机oracle模型中被证明是安全的。在本文中,我们提出了一种新的基于通用参考字符串模型的加密方案。基于标准DBDH假设,在标准模型下证明了该方案对自适应选择密文攻击的完全不可延展性安全。在我们的方案中,可以公开识别格式良好的公钥和密文,而不需要非交互式零知识证明或一次性签名等笨拙的技术支持,从而获得更好的性能。
{"title":"Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption","authors":"Shifeng Sun, Dawu Gu, Joseph K. Liu, P. Udaya, Tsz Hon Yuen","doi":"10.1145/2897845.2897921","DOIUrl":"https://doi.org/10.1145/2897845.2897921","url":null,"abstract":"Non-malleability is an important and intensively studied security notion for many cryptographic primitives. In the context of public key encryption, this notion means it is infeasible for an adversary to transform an encryption of some message m into one of a related message m' under the given public key. Although it has provided a strong security property for many applications, it still does not suffice for some scenarios like the system where the users could issue keys on-the-fly. In such settings, the adversary may have the power to transform the given public key and the ciphertext. To withstand such attacks, Fischlin introduced a stronger notion, known as complete non-malleability, which requires that the non-malleability property be preserved even for the adversaries attempting to produce a ciphertext of some related message under the transformed public key. To date, many schemes satisfying this stronger security have been proposed, but they are either inefficient or proved secure in the random oracle model. In this work, we put forward a new encryption scheme in the common reference string model. Based on the standard DBDH assumption, the proposed scheme is proved completely non-malleable secure against adaptive chosen ciphertext attacks in the standard model. In our scheme, the well-formed public keys and ciphertexts could be publicly recognized without drawing support from unwieldy techniques like non-interactive zero knowledge proofs or one-time signatures, thus achieving a better performance.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114936848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DroidDisintegrator: Intra-Application Information Flow Control in Android Apps DroidDisintegrator: Android应用程序内部信息流控制
Eran Tromer, R. Schuster
In mobile platforms and their app markets, controlling app permissions and preventing abuse of private information are crucial challenges. Information Flow Control (IFC) is a powerful approach for formalizing and answering user concerns such as: "Does this app send my geolocation to the Internet?" Yet despite intensive research efforts, IFC has not been widely adopted in mainstream programming practice. Abstract We observe that the typical structure of Android apps offers an opportunity for a novel and effective application of IFC. In Android, an app consists of a collection of a few dozen "components", each in charge of some high-level functionality. Most components do not require access to most resources. These components are a natural and effective granularity at which to apply IFC (as opposed to the typical process-level or language-level granularity). By assigning different permission labels to each component, and limiting information flow between components, it is possible to express and enforce IFC constraints. Yet nuances of the Android platform, such as its multitude of discretionary (and somewhat arcane) communication channels, raise challenges in defining and enforcing component boundaries. Abstract We build a system, DroidDisintegrator, which demonstrates the viability of component-level IFC for expressing and controlling app behavior. DroidDisintegrator uses dynamic analysis to generate IFC policies for Android apps, repackages apps to embed these policies, and enforces the policies at runtime. We evaluate DroidDisintegrator on dozens of apps.
在移动平台及其应用程序市场,控制应用程序权限和防止滥用私人信息是至关重要的挑战。信息流控制(IFC)是一种强大的方法,用于形式化和回答用户的问题,例如:“这个应用程序是否将我的地理位置发送到互联网上?”然而,尽管进行了大量的研究,IFC仍未被主流编程实践广泛采用。Android应用程序的典型结构为IFC的新颖有效应用提供了机会。在Android中,一个应用程序由几十个“组件”组成,每个组件负责一些高级功能。大多数组件不需要访问大多数资源。这些组件是应用IFC的自然而有效的粒度(与典型的流程级或语言级粒度相反)。通过为每个组件分配不同的权限标签,并限制组件之间的信息流,可以表达和执行IFC约束。然而,Android平台的细微差别,如其大量的自由(和有些神秘的)通信渠道,在定义和执行组件边界方面提出了挑战。我们构建了一个系统,DroidDisintegrator,它证明了组件级IFC表达和控制应用程序行为的可行性。DroidDisintegrator使用动态分析为Android应用生成IFC策略,重新打包应用以嵌入这些策略,并在运行时强制执行这些策略。我们在几十个应用程序上评估了DroidDisintegrator。
{"title":"DroidDisintegrator: Intra-Application Information Flow Control in Android Apps","authors":"Eran Tromer, R. Schuster","doi":"10.1145/2897845.2897888","DOIUrl":"https://doi.org/10.1145/2897845.2897888","url":null,"abstract":"In mobile platforms and their app markets, controlling app permissions and preventing abuse of private information are crucial challenges. Information Flow Control (IFC) is a powerful approach for formalizing and answering user concerns such as: \"Does this app send my geolocation to the Internet?\" Yet despite intensive research efforts, IFC has not been widely adopted in mainstream programming practice. Abstract We observe that the typical structure of Android apps offers an opportunity for a novel and effective application of IFC. In Android, an app consists of a collection of a few dozen \"components\", each in charge of some high-level functionality. Most components do not require access to most resources. These components are a natural and effective granularity at which to apply IFC (as opposed to the typical process-level or language-level granularity). By assigning different permission labels to each component, and limiting information flow between components, it is possible to express and enforce IFC constraints. Yet nuances of the Android platform, such as its multitude of discretionary (and somewhat arcane) communication channels, raise challenges in defining and enforcing component boundaries. Abstract We build a system, DroidDisintegrator, which demonstrates the viability of component-level IFC for expressing and controlling app behavior. DroidDisintegrator uses dynamic analysis to generate IFC policies for Android apps, repackages apps to embed these policies, and enforces the policies at runtime. We evaluate DroidDisintegrator on dozens of apps.","PeriodicalId":166633,"journal":{"name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1