首页 > 最新文献

2012 IEEE Symposium on Security and Privacy Workshops最新文献

英文 中文
Forensic Methods for Detecting Insider Turning Behaviors 检测内部转向行为的法医学方法
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.21
F. Cohen
This paper focuses on the use of forensic methodologies and methods for detecting subversions, an approach that may help to mitigate risk in a substantial portion of cases of types characterized to date. In essence, we look for the telltale signs of cover-ups.
本文侧重于使用法医方法和方法来检测颠覆,这种方法可能有助于减轻迄今为止特征类型的大部分案例中的风险。从本质上讲,我们寻找掩盖事实的迹象。
{"title":"Forensic Methods for Detecting Insider Turning Behaviors","authors":"F. Cohen","doi":"10.1109/SPW.2012.21","DOIUrl":"https://doi.org/10.1109/SPW.2012.21","url":null,"abstract":"This paper focuses on the use of forensic methodologies and methods for detecting subversions, an approach that may help to mitigate risk in a substantial portion of cases of types characterized to date. In essence, we look for the telltale signs of cover-ups.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud 雾计算:减少云中的内部数据盗窃攻击
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.19
S. Stolfo, M. B. Salem, A. Keromytis
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
云计算承诺将显著改变我们使用计算机以及访问和存储个人和商业信息的方式。随着这些新的计算和通信范式的出现,出现了新的数据安全挑战。加密等现有数据保护机制无法防止数据盗窃攻击,尤其是由云提供商内部人员实施的攻击。我们提出了一种使用进攻性诱饵技术来保护云中的数据的不同方法。我们监控云中的数据访问并检测异常的数据访问模式。当怀疑未经授权的访问并使用挑战问题进行验证时,我们通过向攻击者返回大量诱饵信息来发起虚假信息攻击。这可以防止滥用用户的真实数据。在本地文件设置中进行的实验证明,这种方法可以在云环境中提供前所未有的用户数据安全级别。
{"title":"Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud","authors":"S. Stolfo, M. B. Salem, A. Keromytis","doi":"10.1109/SPW.2012.19","DOIUrl":"https://doi.org/10.1109/SPW.2012.19","url":null,"abstract":"Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user's real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 288
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching 细长PUF协议:一种轻量级、鲁棒和安全的子串匹配认证
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.30
Mehrdad Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method's resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.
本文介绍了细长PUF协议,一种高效、安全的方法来验证由强物理不可克隆函数(Strong Physical unclable Function, PUF)产生的响应。新方法重量轻,适用于能量受限的平台,如用于识别和认证应用的超低功耗嵌入式系统。提议的协议不遵循在通信通道上公开完整PUF响应(或完整响应字符串的转换)的经典范例。相反,将显示响应的随机子集并发送以进行身份验证。响应模式用于以非常高的概率验证证明方设备。我们对该方法对各种攻击的弹性进行了彻底的分析,从而指导我们调整协议参数以实现高效和安全的实现。我们证明,细长PUF协议,如果精心设计,将抵御所有已知的机器学习攻击。此外,它还具有内置PUF容错的巨大优势。因此,细长PUF协议是轻量级的,不需要昂贵的额外错误纠正、模糊提取器和哈希模块,这些都是大多数已知的基于PUF的健壮身份验证技术所建议的。通过一组硬件实现和评估,验证了该协议的低开销和实用性。
{"title":"Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching","authors":"Mehrdad Majzoobi, M. Rostami, F. Koushanfar, D. Wallach, S. Devadas","doi":"10.1109/SPW.2012.30","DOIUrl":"https://doi.org/10.1109/SPW.2012.30","url":null,"abstract":"We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing the full PUF responses (or a transformation of the full string of responses) on the communication channel. Instead, random subsets of the responses are revealed and sent for authentication. The response patterns are used for authenticating the prover device with a very high probability. We perform a thorough analysis of the method's resiliency to various attacks which guides adjustment of our protocol parameters for an efficient and secure implementation. We demonstrate that Slender PUF protocol, if carefully designed, will be resilient against all known machine learning attacks. In addition, it has the great advantage of an inbuilt PUF error tolerance. Thus, Slender PUF protocol is lightweight and does not require costly additional error correction, fuzzy extractors, and hash modules suggested in most previously known PUF-based robust authentication techniques. The low overhead and practicality of the protocol are confirmed by a set of hardware implementation and evaluations.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"102 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120976848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 188
Decision Support Procedure in the Insider Threat Domain 内部威胁域的决策支持程序
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.17
J. P. Murphy, V. Berk, Ian D. Gregorio-De Souza
Effective mitigation of the Insider Threat in complex organizations is not simply a matter of 'fire-and-forget'. Thorough routines are required to minimize the chances of malicious insiders going undetected. While detecting policy violations and signatures of known-bad behavior are essential to a broader threat mitigation strategy, it is clear that behavior-based measurements, including anomaly detection and social network analysis, will be crucial to detecting technically savvy malicious users with legitimate network and data access. Due to the large number of potentially malicious behaviors users may display, the main thrust of detection falls in the hands of an analyst capable of correlating these behaviors. Based on our BANDIT system, we offer a 10-step analyst program, which offers a common-sense approach to limiting the damage a malicious trusted user can achieve.
在复杂的组织中有效地缓解内部威胁不是简单的“发了就忘了”的问题。需要彻底的例程来最大限度地减少未被发现的恶意内部人员的机会。虽然检测策略违规和已知不良行为的签名对于更广泛的威胁缓解战略至关重要,但很明显,基于行为的测量(包括异常检测和社交网络分析)对于检测具有合法网络和数据访问权限的精通技术的恶意用户至关重要。由于用户可能会显示大量潜在的恶意行为,因此检测的主要任务落在能够将这些行为关联起来的分析师手中。基于我们的BANDIT系统,我们提供了一个10步分析程序,它提供了一个常识性的方法来限制恶意可信用户可能造成的损害。
{"title":"Decision Support Procedure in the Insider Threat Domain","authors":"J. P. Murphy, V. Berk, Ian D. Gregorio-De Souza","doi":"10.1109/SPW.2012.17","DOIUrl":"https://doi.org/10.1109/SPW.2012.17","url":null,"abstract":"Effective mitigation of the Insider Threat in complex organizations is not simply a matter of 'fire-and-forget'. Thorough routines are required to minimize the chances of malicious insiders going undetected. While detecting policy violations and signatures of known-bad behavior are essential to a broader threat mitigation strategy, it is clear that behavior-based measurements, including anomaly detection and social network analysis, will be crucial to detecting technically savvy malicious users with legitimate network and data access. Due to the large number of potentially malicious behaviors users may display, the main thrust of detection falls in the hands of an analyst capable of correlating these behaviors. Based on our BANDIT system, we offer a 10-step analyst program, which offers a common-sense approach to limiting the damage a malicious trusted user can achieve.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results 社交媒体信息发布的博弈论模型及其实验结果
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.24
C. Griffin, A. Squicciarini
Social sites frequently ask for rich sets of user identity properties before granting access. Users are given the freedom to fail to respond to some of these requests, or can choose to submit fake identity properties, so as to reduce the risk of identification, surveillance or observation of any kind. However, this freedom has led to serious security and privacy incidents, due to the role users' identities play in establishing social and privacy settings. In this paper, we take a step toward addressing this open problem, by analyzing the dynamics of social identity verification protocols. Based on some real-world data, we develop a deception model for online users. The model takes a game theoretic approach to characterizing a user's willingness to release, withhold or lie about information depending on the behavior of individuals within the user's circle of friends. We provide an illustrative example and conjecture a relationship between the qualitative structure of Nash equilibria in the game and the auto orphism group of the social network.
社交网站在授予访问权限之前经常要求提供丰富的用户身份属性集。用户可以选择不回应其中的一些请求,也可以选择提交虚假的身份属性,以减少被识别、监视或观察的风险。然而,由于用户的身份在建立社交和隐私设置中所起的作用,这种自由导致了严重的安全和隐私事件。在本文中,我们通过分析社会身份验证协议的动态,朝着解决这个开放问题迈出了一步。基于一些真实世界的数据,我们开发了一个在线用户的欺骗模型。该模型采用博弈论的方法,根据用户朋友圈内个人的行为来描述用户发布、隐瞒或隐瞒信息的意愿。我们提供了一个例子,并推测了博弈中纳什均衡的质量结构与社会网络的自同构群之间的关系。
{"title":"Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results","authors":"C. Griffin, A. Squicciarini","doi":"10.1109/SPW.2012.24","DOIUrl":"https://doi.org/10.1109/SPW.2012.24","url":null,"abstract":"Social sites frequently ask for rich sets of user identity properties before granting access. Users are given the freedom to fail to respond to some of these requests, or can choose to submit fake identity properties, so as to reduce the risk of identification, surveillance or observation of any kind. However, this freedom has led to serious security and privacy incidents, due to the role users' identities play in establishing social and privacy settings. In this paper, we take a step toward addressing this open problem, by analyzing the dynamics of social identity verification protocols. Based on some real-world data, we develop a deception model for online users. The model takes a game theoretic approach to characterizing a user's willingness to release, withhold or lie about information depending on the behavior of individuals within the user's circle of friends. We provide an illustrative example and conjecture a relationship between the qualitative structure of Nash equilibria in the game and the auto orphism group of the social network.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129045682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The BlueJay Ultra-Lightweight Hybrid Cryptosystem BlueJay超轻量级混合密码系统
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.11
Markku-Juhani O. Saarinen
We report on the development of Blue Jay, a hybrid Rabin-based public key encryption cryptosystem that is suitable for ultra-lightweight (total 2000-3000 GE) platforms such as micro sensors and RFID authentication tags. The design is related to authors Passerine and the Oren-Feldhofer WIPR proposals, but is suitable to a wider array of applications. The encryption mechanism is significantly faster and the implementation more lightweight than RSA (even with public exponent 3) and ECC with the same security level. Hardware implementations of the asymmetric encryption component of the hybrid cryptosystem require less than a thousand gate equivalents in addition to the memory storage required for the payload and public key data. An inexpensive, mill scale MCU SoC Blue Jay implementation is reported and compared to RSA-AES on the same platform. The private key operation (not performed by the light-weight device but by the sensor network base station or a data acquisition reader) has roughly the same complexity as the RSA private key operation.
我们报告了Blue Jay的开发,这是一种基于rabin的混合公钥加密密码系统,适用于超轻量级(总计2000-3000 GE)平台,如微传感器和RFID认证标签。该设计与作者Passerine和Oren-Feldhofer的WIPR提案有关,但适用于更广泛的应用。与具有相同安全级别的RSA(即使具有公共指数3)和ECC相比,该加密机制明显更快,并且实现更轻量化。混合密码系统的非对称加密组件的硬件实现除了有效负载和公钥数据所需的内存存储外,还需要不到一千个门当量。报告了一种廉价的工厂级MCU SoC Blue Jay实现,并将其与同一平台上的RSA-AES进行了比较。私钥操作(不是由轻量级设备执行,而是由传感器网络基站或数据采集读取器执行)与RSA私钥操作具有大致相同的复杂性。
{"title":"The BlueJay Ultra-Lightweight Hybrid Cryptosystem","authors":"Markku-Juhani O. Saarinen","doi":"10.1109/SPW.2012.11","DOIUrl":"https://doi.org/10.1109/SPW.2012.11","url":null,"abstract":"We report on the development of Blue Jay, a hybrid Rabin-based public key encryption cryptosystem that is suitable for ultra-lightweight (total 2000-3000 GE) platforms such as micro sensors and RFID authentication tags. The design is related to authors Passerine and the Oren-Feldhofer WIPR proposals, but is suitable to a wider array of applications. The encryption mechanism is significantly faster and the implementation more lightweight than RSA (even with public exponent 3) and ECC with the same security level. Hardware implementations of the asymmetric encryption component of the hybrid cryptosystem require less than a thousand gate equivalents in addition to the memory storage required for the payload and public key data. An inexpensive, mill scale MCU SoC Blue Jay implementation is reported and compared to RSA-AES on the same platform. The private key operation (not performed by the light-weight device but by the sensor network base station or a data acquisition reader) has roughly the same complexity as the RSA private key operation.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133221287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Method for Preventing "Skipping" Attacks 一种防止“跳过”攻击的方法
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.14
M. Joye
Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems were supposed to be of rather theoretical nature, as they require a precise fault injection, e.g., a bit flip. However, Schmidt and Herbst (FDTC 2008) reported practical fault-attacks against RSA in standard mode using low-cost equipment. Although their attacks were described against RSA, they readily extend to any other exponentiation-based cryptosystem. This paper describes an efficient method to prevent those new attacks.
直到最近,针对(非crt)基于指数的密码系统的已知错误攻击被认为是相当理论性的,因为它们需要精确的错误注入,例如,一个位翻转。然而,Schmidt和Herbst (FDTC 2008)报告了使用低成本设备在标准模式下对RSA的实际故障攻击。尽管他们的攻击是针对RSA的,但他们很容易扩展到任何其他基于幂的密码系统。本文描述了一种有效的方法来防止这些新的攻击。
{"title":"A Method for Preventing \"Skipping\" Attacks","authors":"M. Joye","doi":"10.1109/SPW.2012.14","DOIUrl":"https://doi.org/10.1109/SPW.2012.14","url":null,"abstract":"Until recently, known fault attacks against (non-CRT) exponentiation-based cryptosystems were supposed to be of rather theoretical nature, as they require a precise fault injection, e.g., a bit flip. However, Schmidt and Herbst (FDTC 2008) reported practical fault-attacks against RSA in standard mode using low-cost equipment. Although their attacks were described against RSA, they readily extend to any other exponentiation-based cryptosystem. This paper describes an efficient method to prevent those new attacks.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Framework for Modeling Decision Making and Deception with Semantic Information 基于语义信息的决策与欺骗建模框架
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.25
C. Griffin, K. Moore
We propose a mixed logical and game theoretic framework for modeling decision making under the potential for deception. This framework is most appropriate for online communities in which a decision maker must act upon information being provided by various sources with various different motivations. We show that in the simple three-player game we propose there are always equilibria in pure strategies. We then extend the three player game to a case where there are mixed strategy equilibria. We discuss how to approximate the truth of a given statement using a logical construct and how this can be used as a proxy in payoff functions. Finally we discuss as future directions the use of regret functions and live play.
我们提出了一个混合逻辑和博弈论框架来模拟潜在欺骗下的决策。这个框架最适合在线社区,在这些社区中,决策者必须根据各种来源、各种不同动机提供的信息采取行动。我们证明了在简单的三人博弈中我们提出在纯策略中总是存在均衡。然后我们将三人博弈扩展到存在混合策略均衡的情况。我们讨论了如何使用逻辑构造来近似给定陈述的真值,以及如何将其用作支付函数中的代理。最后,我们讨论了后悔功能的使用和现场表演的未来方向。
{"title":"A Framework for Modeling Decision Making and Deception with Semantic Information","authors":"C. Griffin, K. Moore","doi":"10.1109/SPW.2012.25","DOIUrl":"https://doi.org/10.1109/SPW.2012.25","url":null,"abstract":"We propose a mixed logical and game theoretic framework for modeling decision making under the potential for deception. This framework is most appropriate for online communities in which a decision maker must act upon information being provided by various sources with various different motivations. We show that in the simple three-player game we propose there are always equilibria in pure strategies. We then extend the three player game to a case where there are mixed strategy equilibria. We discuss how to approximate the truth of a given statement using a logical construct and how this can be used as a proxy in payoff functions. Finally we discuss as future directions the use of regret functions and live play.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131824343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Side-Channel Analysis of Grøstl and Skein Grøstl和Skein的侧通道分析
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.13
Christina Boura, Sylvain Lévêque, David Vigilant
This work provides a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical MAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently, examples of software countermeasures thwarting first-order DPA or CPA are given. For the validation of our choices, we implemented HMAC-Grøstl, HMAC-Skein as well as countermeasure son a 32-bit ARM-based smart card. We also mounted power analysis attacks in practice on both unprotected and protected implementations. Finally, the performance difference between both versions is discussed.
这项工作从侧信道分析的角度对SHA-3竞赛的两个决赛选手进行了详细的研究。对于这两个功能,当用作MAC时,本文提出了执行功率分析的检测策略。除了经典的MAC模式外,还分析了另外两种被提出的MAC模式,即gro østl的包络MAC模式和Skein-MAC模式。因此,给出了阻碍一阶DPA或CPA的软件对策的例子。为了验证我们的选择,我们在一个32位基于arm的智能卡上实现了HMAC-Grøstl、HMAC-Skein以及对策。我们还在实践中对未保护和受保护的实现进行了功率分析攻击。最后,讨论了两个版本之间的性能差异。
{"title":"Side-Channel Analysis of Grøstl and Skein","authors":"Christina Boura, Sylvain Lévêque, David Vigilant","doi":"10.1109/SPW.2012.13","DOIUrl":"https://doi.org/10.1109/SPW.2012.13","url":null,"abstract":"This work provides a detailed study of two finalists of the SHA-3 competition from the side-channel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical MAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently, examples of software countermeasures thwarting first-order DPA or CPA are given. For the validation of our choices, we implemented HMAC-Grøstl, HMAC-Skein as well as countermeasure son a 32-bit ARM-based smart card. We also mounted power analysis attacks in practice on both unprotected and protected implementations. Finally, the performance difference between both versions is discussed.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116928583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using Consensus Clustering for Multi-view Anomaly Detection 基于一致性聚类的多视图异常检测
Pub Date : 2012-05-24 DOI: 10.1109/SPW.2012.18
Alexander Y. Liu, D. Lam
This paper presents work on automatically characterizing typical user activities across multiple sources (or views) of data, as well as finding anomalous users who engage in unusual combinations of activities across different views of data. This approach can be used to detect malicious insiders who may abuse their privileged access to systems in order to accomplish goals that are detrimental to the organizations that grant those privileges. To avoid detection, these malicious insiders want to appear as normal as possible with respect to the activities of other users with similar privileges and tasks. Therefore, given a single type or view of audit data, the activities of the malicious insider may appear normal. An anomaly may only be apparent when analyzing multiple sources of data. We propose and test domain-independent methods that combine consensus clustering and anomaly detection techniques. We benchmark the efficacy of these methods on simulated insider threat data. Experimental results show that combining anomaly detection and consensus clustering produces more accurate results than sequentially performing the two tasks independently.
本文介绍了跨多个数据源(或视图)自动描述典型用户活动的工作,以及发现跨不同数据视图从事不寻常活动组合的异常用户。此方法可用于检测恶意的内部人员,这些内部人员可能滥用对系统的特权访问,以实现对授予这些特权的组织有害的目标。为了避免被检测到,这些恶意的内部人员希望在具有类似权限和任务的其他用户的活动中表现得尽可能正常。因此,给定审计数据的单一类型或视图,恶意内部人员的活动可能看起来很正常。只有在分析多个数据源时才会发现异常。我们提出并测试了结合一致性聚类和异常检测技术的领域独立方法。我们在模拟的内部威胁数据上对这些方法的有效性进行了基准测试。实验结果表明,将异常检测和一致性聚类结合起来比单独执行这两个任务产生更准确的结果。
{"title":"Using Consensus Clustering for Multi-view Anomaly Detection","authors":"Alexander Y. Liu, D. Lam","doi":"10.1109/SPW.2012.18","DOIUrl":"https://doi.org/10.1109/SPW.2012.18","url":null,"abstract":"This paper presents work on automatically characterizing typical user activities across multiple sources (or views) of data, as well as finding anomalous users who engage in unusual combinations of activities across different views of data. This approach can be used to detect malicious insiders who may abuse their privileged access to systems in order to accomplish goals that are detrimental to the organizations that grant those privileges. To avoid detection, these malicious insiders want to appear as normal as possible with respect to the activities of other users with similar privileges and tasks. Therefore, given a single type or view of audit data, the activities of the malicious insider may appear normal. An anomaly may only be apparent when analyzing multiple sources of data. We propose and test domain-independent methods that combine consensus clustering and anomaly detection techniques. We benchmark the efficacy of these methods on simulated insider threat data. Experimental results show that combining anomaly detection and consensus clustering produces more accurate results than sequentially performing the two tasks independently.","PeriodicalId":201519,"journal":{"name":"2012 IEEE Symposium on Security and Privacy Workshops","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2012 IEEE Symposium on Security and Privacy Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1