首页 > 最新文献

2012 IEEE Symposium on Security and Privacy Workshops最新文献

英文 中文
Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties 安全策略的语义比较:从访问控制策略到流属性
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.33
M. Jaume
This paper introduces two generic mechanisms allowing to compare security policies from a semantical point of view. First, a notion of embedding is defined in order to compare policies over a common domain. Then, interpretations of security policies are introduced in order to consider their properties over arbitrary domains. Thus, combining interpretations and embeddings allows to compare policies expressed over different domains. Along the lines of this paper, we illustrate our definitions by defining a flow-based interpretation of access control and by comparing classical access control policies according to a hierarchy of abstract flow policies, thus characterizing flow properties which can be ensured by access control policies.
本文介绍了两种通用机制,允许从语义的角度比较安全策略。首先,定义了嵌入的概念,以便比较公共域中的策略。然后,介绍了安全策略的解释,以便考虑它们在任意域上的属性。因此,结合解释和嵌入可以比较在不同领域上表达的策略。沿着本文的思路,我们通过定义基于流的访问控制解释和根据抽象流策略的层次结构比较经典访问控制策略来说明我们的定义,从而表征访问控制策略可以确保的流属性。
{"title":"Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties","authors":"M. Jaume","doi":"10.1109/SPW.2012.33","DOIUrl":"https://doi.org/10.1109/SPW.2012.33","url":null,"abstract":"This paper introduces two generic mechanisms allowing to compare security policies from a semantical point of view. First, a notion of embedding is defined in order to compare policies over a common domain. Then, interpretations of security policies are introduced in order to consider their properties over arbitrary domains. Thus, combining interpretations and embeddings allows to compare policies expressed over different domains. Along the lines of this paper, we illustrate our definitions by defining a flow-based interpretation of access control and by comparing classical access control policies according to a hierarchy of abstract flow policies, thus characterizing flow properties which can be ensured by access control policies.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks 基于看门狗的无线传感器网络信任内部威胁机制及防御方法
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.32
Youngho Cho, G. Qu, Yuanming Wu
Trust based approaches have been widely used to counter insider attacks in wireless sensor networks because traditional cryptography-based security mechanisms such as authentication and authorization are not effective against such attacks. A trust model, which is the core component of a trust mechanism, provides a quantitative way to evaluate the trustworthiness of sensor nodes. The trust evaluation is normally conducted by watchdog nodes, which monitor and collect other sensors' behavior information. Most existing works mainly focus on the design of the trust models and how these models can be used to defend against certain insider attacks. However, these studies are empirical with the implicit assumption that the trust models are secure and reliable. In this paper, we discuss several security vulnerabilities that watchdog and trust mechanisms have, examine how inside attackers can exploit these security holes, and finally propose defending approaches that can mitigate the weaknesses of trust mechanism and watchdog.
在无线传感器网络中,基于信任的方法被广泛用于对抗内部攻击,因为传统的基于密码的安全机制(如身份验证和授权)对此类攻击无效。信任模型是信任机制的核心组成部分,它提供了一种定量评估传感器节点可信度的方法。信任评估通常由看门狗节点进行,看门狗节点监控和收集其他传感器的行为信息。现有的大部分工作主要集中在信任模型的设计以及如何使用这些模型来防御某些内部攻击。然而,这些研究都是经验性的,隐含的假设是信任模型是安全可靠的。在本文中,我们讨论了监督机制和信任机制存在的几个安全漏洞,研究了内部攻击者如何利用这些安全漏洞,最后提出了可以减轻信任机制和监督机制弱点的防御方法。
{"title":"Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks","authors":"Youngho Cho, G. Qu, Yuanming Wu","doi":"10.1109/SPW.2012.32","DOIUrl":"https://doi.org/10.1109/SPW.2012.32","url":null,"abstract":"Trust based approaches have been widely used to counter insider attacks in wireless sensor networks because traditional cryptography-based security mechanisms such as authentication and authorization are not effective against such attacks. A trust model, which is the core component of a trust mechanism, provides a quantitative way to evaluate the trustworthiness of sensor nodes. The trust evaluation is normally conducted by watchdog nodes, which monitor and collect other sensors' behavior information. Most existing works mainly focus on the design of the trust models and how these models can be used to defend against certain insider attacks. However, these studies are empirical with the implicit assumption that the trust models are secure and reliable. In this paper, we discuss several security vulnerabilities that watchdog and trust mechanisms have, examine how inside attackers can exploit these security holes, and finally propose defending approaches that can mitigate the weaknesses of trust mechanism and watchdog.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Lost in Translation: Improving Decoy Documents via Automated Translation 迷失在翻译中:通过自动翻译改进诱饵文件
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.20
Jonathan Voris, Nathaniel Boggs, S. Stolfo
Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type of decoy to serve three main purposes. First, using a language that is not used in normal business practice gives real users a clear signal that the document is fake, so they waste less time examining it. Second, an attacker, if enticed, will need to exfiltrate the document's contents in order to translate it, providing a cleaner signal of malicious activity. Third, we consume significant adversarial resources as they must still read the document and decide if it contains valuable information, which is made more difficult as it will be somewhat scrambled through translation. In this paper, we expand upon the rationale behind using foreign language decoys. We present a preliminary evaluation which shows how they significantly increase the cost to attackers in terms of the amount of time that it takes to determine if a document is real and potentially contains valuable information or is entirely bogus, confounding their goal of exfiltrating important sensitive information.
在保护敏感数据方面,检测内部攻击仍然是最困难的挑战之一。诱饵信息和文档是检测恶意伪装者的一种很有前途的方法,但是,误报可能会干扰合法工作并占用用户时间。我们建议生成外语诱饵文档,其中散布着不可翻译的诱人专有名词,如公司名称、热门话题或明显的登录信息。我们的目标是让这种诱饵达到三个主要目的。首先,使用正常业务实践中不使用的语言会给真正的用户一个明确的信号,即文档是假的,这样他们就不会浪费太多时间来检查它。其次,如果受到引诱,攻击者将需要泄露文档的内容以便翻译它,从而提供更清晰的恶意活动信号。第三,我们消耗了大量的对抗性资源,因为他们仍然必须阅读文件并决定它是否包含有价值的信息,这就变得更加困难,因为它会在翻译过程中有些混乱。在本文中,我们扩展了使用外语诱饵的基本原理。我们提出了一个初步评估,显示了它们如何显著增加攻击者的成本,因为攻击者需要花费大量的时间来确定文件是真实的,可能包含有价值的信息,还是完全是假的,从而混淆了他们窃取重要敏感信息的目标。
{"title":"Lost in Translation: Improving Decoy Documents via Automated Translation","authors":"Jonathan Voris, Nathaniel Boggs, S. Stolfo","doi":"10.1109/SPW.2012.20","DOIUrl":"https://doi.org/10.1109/SPW.2012.20","url":null,"abstract":"Detecting insider attacks continues to prove to be one of the most difficult challenges in securing sensitive data. Decoy information and documents represent a promising approach to detecting malicious masqueraders, however, false positives can interfere with legitimate work and take up user time. We propose generating foreign language decoy documents that are sprinkled with untranslatable enticing proper nouns such as company names, hot topics, or apparent login information. Our goal is for this type of decoy to serve three main purposes. First, using a language that is not used in normal business practice gives real users a clear signal that the document is fake, so they waste less time examining it. Second, an attacker, if enticed, will need to exfiltrate the document's contents in order to translate it, providing a cleaner signal of malicious activity. Third, we consume significant adversarial resources as they must still read the document and decide if it contains valuable information, which is made more difficult as it will be somewhat scrambled through translation. In this paper, we expand upon the rationale behind using foreign language decoys. We present a preliminary evaluation which shows how they significantly increase the cost to attackers in terms of the amount of time that it takes to determine if a document is real and potentially contains valuable information or is entirely bogus, confounding their goal of exfiltrating important sensitive information.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Policy Aware Social Miner 有政策意识的社会矿工
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.28
Sharon Paradesi, O. Seneviratne, Lalana Kagal
There is a wealth of sensitive information available on the Web about any individual that is generated either by her or by others on social networking sites. This information could be used to make important decisions about that individual. The problem is that although people know that searches for their personal information are possible, they have no way to either control the data that is put on the Web by others or indicate how they would like to restrict usage of their own data. We describe a framework called Policy Aware Social Miner (PASM) that would provide a solution to these problems by giving users a way to semantically annotate data on the Web using policies to guide how searches about them should be executed. PASM accepts search queries and applies the user's policies on the results. It filters results over data the user owns and provides the user's refutation link on search results that the user does not own. These usage control mechanisms for privacy allow users to break away from siloed data privacy management and have their privacy settings applied to all their data available on the Web.
网络上有大量关于个人的敏感信息,这些信息要么是由个人产生的,要么是由社交网站上的其他人产生的。这些信息可以用来做出关于那个人的重要决定。问题是,尽管人们知道搜索他们的个人信息是可能的,但他们既没有办法控制其他人放到网络上的数据,也没有办法表明他们希望如何限制自己数据的使用。我们描述了一个名为策略感知社会挖掘器(Policy Aware Social Miner, PASM)的框架,该框架将为这些问题提供解决方案,它为用户提供了一种对Web上的数据进行语义注释的方法,使用策略来指导如何执行对它们的搜索。PASM接受搜索查询,并对结果应用用户的策略。它过滤用户拥有的数据的结果,并在用户不拥有的搜索结果上提供用户的反驳链接。这些隐私使用控制机制允许用户摆脱孤立的数据隐私管理,并将其隐私设置应用于Web上可用的所有数据。
{"title":"Policy Aware Social Miner","authors":"Sharon Paradesi, O. Seneviratne, Lalana Kagal","doi":"10.1109/SPW.2012.28","DOIUrl":"https://doi.org/10.1109/SPW.2012.28","url":null,"abstract":"There is a wealth of sensitive information available on the Web about any individual that is generated either by her or by others on social networking sites. This information could be used to make important decisions about that individual. The problem is that although people know that searches for their personal information are possible, they have no way to either control the data that is put on the Web by others or indicate how they would like to restrict usage of their own data. We describe a framework called Policy Aware Social Miner (PASM) that would provide a solution to these problems by giving users a way to semantically annotate data on the Web using policies to guide how searches about them should be executed. PASM accepts search queries and applies the user's policies on the results. It filters results over data the user owns and provides the user's refutation link on search results that the user does not own. These usage control mechanisms for privacy allow users to break away from siloed data privacy management and have their privacy settings applied to all their data available on the Web.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proactive Insider Threat Detection through Graph Learning and Psychological Context 通过图学习和心理环境的主动内部威胁检测
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.29
Oliver Brdiczka, Juan Liu, B. Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut
The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors. This paper proposes an approach that combines Structural Anomaly Detection (SA) from social and information networks and Psychological Profiling (PP) of individuals. SA uses technologies including graph analysis, dynamic tracking, and machine learning to detect structural anomalies in large-scale information network data, while PP constructs dynamic psychological profiles from behavioral patterns. Threats are finally identified through a fusion and ranking of outcomes from SA and PP. The proposed approach is illustrated by applying it to a large data set from a massively multi-player online game, World of War craft (WoW). The data set contains behavior traces from over 350,000 characters observed over a period of 6 months. SA is used to predict if and when characters quit their guild (a player association with similarities to a club or workgroup in non-gaming contexts), possibly causing damage to these social groups. PP serves to estimate the five-factor personality model for all characters. Both threads show good results on the gaming data set and thus validate the proposed approach.
内部攻击的年度发生率持续增长,有迹象表明这一趋势将持续下去。虽然有许多现有的工具可以准确地识别已知的攻击,但这些工具在实施时都是被动的(与主动攻击相反),并且可能会被以前看不见的敌对行为所避开。本文提出了一种将社会和信息网络中的结构异常检测(SA)与个体心理侧写(PP)相结合的方法。SA使用图形分析、动态跟踪和机器学习等技术来检测大规模信息网络数据中的结构异常,而PP则从行为模式中构建动态心理剖面。最后通过SA和PP结果的融合和排名来识别威胁。通过将所提出的方法应用于大型多人在线游戏《魔兽世界》(WoW)的大型数据集来说明该方法。该数据集包含在6个月内观察到的超过35万个字符的行为轨迹。SA用于预测角色是否以及何时退出公会(游戏邦注:这是一种与非游戏环境中的俱乐部或工作组相似的玩家协会),可能会对这些社交团体造成损害。PP用于估计所有角色的五因素人格模型。两个线程都在游戏数据集上显示了良好的结果,从而验证了所提出的方法。
{"title":"Proactive Insider Threat Detection through Graph Learning and Psychological Context","authors":"Oliver Brdiczka, Juan Liu, B. Price, Jianqiang Shen, Akshay Patil, Richard Chow, Eugene Bart, Nicolas Ducheneaut","doi":"10.1109/SPW.2012.29","DOIUrl":"https://doi.org/10.1109/SPW.2012.29","url":null,"abstract":"The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors. This paper proposes an approach that combines Structural Anomaly Detection (SA) from social and information networks and Psychological Profiling (PP) of individuals. SA uses technologies including graph analysis, dynamic tracking, and machine learning to detect structural anomalies in large-scale information network data, while PP constructs dynamic psychological profiles from behavioral patterns. Threats are finally identified through a fusion and ranking of outcomes from SA and PP. The proposed approach is illustrated by applying it to a large data set from a massively multi-player online game, World of War craft (WoW). The data set contains behavior traces from over 350,000 characters observed over a period of 6 months. SA is used to predict if and when characters quit their guild (a player association with similarities to a club or workgroup in non-gaming contexts), possibly causing damage to these social groups. PP serves to estimate the five-factor personality model for all characters. Both threads show good results on the gaming data set and thus validate the proposed approach.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122074541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers 弥合语义差距,以减轻内核级键盘记录器
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.22
Jesús Navarro, Enrique Naudon, Daniela Oliveira
Kernel-level key loggers, which are installed as part of the operating system (OS) with complete control of kernel code, data and resources, are a growing and very serious threat to the security of current systems. Defending against this type of malware means defending the kernel itself against compromise and it is still an open and difficult problem. This paper details the implementation of two classical kernel-level key loggers for Linux 2.6.38 and how current defense approaches still fail to protect OSes against this type of malware. We further present our current research directions to mitigate this threat by employing an architecture where a guest OS and a virtual machine layer actively collaborate to guarantee kernel integrity. This collaborative approach allows us to better bridge the semantic gap between the OS and architecture layers and devise stronger and more flexible defense solutions to protect the integrity of OS kernels.
内核级密钥记录器作为操作系统的一部分安装,可以完全控制内核代码、数据和资源,它对当前系统的安全性构成了日益严重的威胁。防御这种类型的恶意软件意味着保护内核本身不受损害,这仍然是一个开放和困难的问题。本文详细介绍了Linux 2.6.38的两个经典内核级密钥记录器的实现,以及当前的防御方法如何仍然无法保护操作系统免受此类恶意软件的攻击。我们进一步提出了当前的研究方向,通过采用客户机操作系统和虚拟机层主动协作以保证内核完整性的架构来减轻这种威胁。这种协作方法使我们能够更好地弥合操作系统和体系结构层之间的语义差距,并设计出更强大、更灵活的防御解决方案,以保护操作系统内核的完整性。
{"title":"Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers","authors":"Jesús Navarro, Enrique Naudon, Daniela Oliveira","doi":"10.1109/SPW.2012.22","DOIUrl":"https://doi.org/10.1109/SPW.2012.22","url":null,"abstract":"Kernel-level key loggers, which are installed as part of the operating system (OS) with complete control of kernel code, data and resources, are a growing and very serious threat to the security of current systems. Defending against this type of malware means defending the kernel itself against compromise and it is still an open and difficult problem. This paper details the implementation of two classical kernel-level key loggers for Linux 2.6.38 and how current defense approaches still fail to protect OSes against this type of malware. We further present our current research directions to mitigate this threat by employing an architecture where a guest OS and a virtual machine layer actively collaborate to guarantee kernel integrity. This collaborative approach allows us to better bridge the semantic gap between the OS and architecture layers and devise stronger and more flexible defense solutions to protect the integrity of OS kernels.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem 理论分析:物理不可克隆功能与软件保护问题
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.16
Rishab Nithyanand, John Solis
Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection and licensing, and certified execution. In this paper, we investigate the effectiveness of PUFs for software protection in hostile offline settings. We show that traditional non-computational (black-box) PUFs cannot solve the software protection problem in this context. We provide two real-world adversary models (weak and strong variants) and security definitions for each. We propose schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.
物理不可克隆功能(puf)或物理单向功能(p - owf)是对输入刺激的响应易于测量但难以克隆的物理系统。不可克隆性是由于复制大量不可控制造特性的公认难度,这使得puf在解决诸如设备身份验证、软件保护和许可以及认证执行等问题方面非常有用。在本文中,我们研究了puf在恶意离线设置下对软件保护的有效性。我们表明,传统的非计算(黑箱)puf不能解决在这种情况下的软件保护问题。我们提供了两个真实世界的对手模型(弱和强变体)以及每个模型的安全定义。我们提出了对弱对手安全的方案,并表明如果不使用可信硬件,任何方案都不能对强对手安全。最后,提出了一种基于可信硬件的防御方案。
{"title":"A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem","authors":"Rishab Nithyanand, John Solis","doi":"10.1109/SPW.2012.16","DOIUrl":"https://doi.org/10.1109/SPW.2012.16","url":null,"abstract":"Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli are easy to measure but hard to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection and licensing, and certified execution. In this paper, we investigate the effectiveness of PUFs for software protection in hostile offline settings. We show that traditional non-computational (black-box) PUFs cannot solve the software protection problem in this context. We provide two real-world adversary models (weak and strong variants) and security definitions for each. We propose schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Implementing Mental Models 实施心理模型
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.31
J. Blythe, L. Camp
Users' mental models of security, though possibly incorrect, embody patterns of reasoning about security that lead to systematic behaviors across tasks and may be shared across populations of users. Researchers have identified widely held mental models of security, usually with the purpose of improving communications and warnings about vulnerabilities. Here, we implement previously identified models in order to explore their use for predicting user behavior. We describe a general approach for implementing the models in agents that simulate human behavior within a network security test bed, and show that the implementations produce behaviors similar to those of users who hold them. The approach is relatively simple for researchers to implement new models within the agent platform to experiment with their effects in a multi-agent setting.
用户的安全心理模型,虽然可能不正确,但体现了关于安全的推理模式,这些模式导致跨任务的系统行为,并可能在用户群体中共享。研究人员已经确定了广泛持有的安全心理模型,通常是为了改善对漏洞的沟通和警告。在这里,我们实现了之前确定的模型,以探索它们在预测用户行为方面的用途。我们描述了在代理中实现模型的一般方法,这些代理在网络安全测试平台中模拟人类行为,并表明实现产生的行为与持有它们的用户的行为相似。对于研究人员来说,这种方法相对简单,可以在智能体平台内实现新模型,并在多智能体设置中实验它们的效果。
{"title":"Implementing Mental Models","authors":"J. Blythe, L. Camp","doi":"10.1109/SPW.2012.31","DOIUrl":"https://doi.org/10.1109/SPW.2012.31","url":null,"abstract":"Users' mental models of security, though possibly incorrect, embody patterns of reasoning about security that lead to systematic behaviors across tasks and may be shared across populations of users. Researchers have identified widely held mental models of security, usually with the purpose of improving communications and warnings about vulnerabilities. Here, we implement previously identified models in order to explore their use for predicting user behavior. We describe a general approach for implementing the models in agents that simulate human behavior within a network security test bed, and show that the implementations produce behaviors similar to those of users who hold them. The approach is relatively simple for researchers to implement new models within the agent platform to experiment with their effects in a multi-agent setting.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Towards a Semantics of Phish 论网络钓鱼的语义
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.12
H. Orman
Phishing constitutes more than half of all reported security incident son the Internet. The attacks cause users to erroneously trust websites and enter sensitive data because the email notifications and the website look familiar. Our hypothesis is that familiarity can be defined formally using history data from the user's computer, and effective presentation of the data can help users distinguishphishing messages from trustworthy messages.
网络钓鱼构成了所有已报告的互联网安全事件的一半以上。这些攻击导致用户错误地信任网站并输入敏感数据,因为电子邮件通知和网站看起来很熟悉。我们的假设是,熟悉度可以使用来自用户计算机的历史数据来正式定义,数据的有效表示可以帮助用户区分消息和可信消息。
{"title":"Towards a Semantics of Phish","authors":"H. Orman","doi":"10.1109/SPW.2012.12","DOIUrl":"https://doi.org/10.1109/SPW.2012.12","url":null,"abstract":"Phishing constitutes more than half of all reported security incident son the Internet. The attacks cause users to erroneously trust websites and enter sensitive data because the email notifications and the website look familiar. Our hypothesis is that familiarity can be defined formally using history data from the user's computer, and effective presentation of the data can help users distinguishphishing messages from trustworthy messages.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy in Online Review Sites 在线评论网站的隐私
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.23
M. Burkholder, R. Greenstadt
The increasing use of online review sites is creating new challenges for user privacy. Although reviews are public, many users inadvertently disclose private information about relationship, location, and temporal attributes to the world. This research protects users of online review sites from the inadvertent disclosure of private information in three ways. First, the types of unstructured and structured information made public by online review sites are characterized and used to grade those sites on their attention to privacy. Second, a privacy-check tool that uses keyword matching and named-entity recognition to annotate potentially sensitive review text is presented. Third, we raise awareness of the privacy threat in online review sites through examples and statistics derived from the privacy-check tool.
越来越多的在线评论网站给用户隐私带来了新的挑战。虽然评论是公开的,但许多用户无意中向外界透露了有关关系、位置和时间属性的私人信息。该研究通过三种方式保护在线评论网站的用户免受私人信息的无意泄露。首先,对在线评论网站公开的非结构化和结构化信息的类型进行了特征描述,并用于对这些网站对隐私的关注进行评级。其次,提出了一种使用关键字匹配和命名实体识别来注释潜在敏感评论文本的隐私检查工具。第三,我们通过隐私检查工具的例子和统计数据来提高人们对在线评论网站隐私威胁的认识。
{"title":"Privacy in Online Review Sites","authors":"M. Burkholder, R. Greenstadt","doi":"10.1109/SPW.2012.23","DOIUrl":"https://doi.org/10.1109/SPW.2012.23","url":null,"abstract":"The increasing use of online review sites is creating new challenges for user privacy. Although reviews are public, many users inadvertently disclose private information about relationship, location, and temporal attributes to the world. This research protects users of online review sites from the inadvertent disclosure of private information in three ways. First, the types of unstructured and structured information made public by online review sites are characterized and used to grade those sites on their attention to privacy. Second, a privacy-check tool that uses keyword matching and named-entity recognition to annotate potentially sensitive review text is presented. Third, we raise awareness of the privacy threat in online review sites through examples and statistics derived from the privacy-check tool.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 IEEE Symposium on Security and Privacy Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1