首页 > 最新文献

2008 International Conference on Information Security and Assurance (isa 2008)最新文献

英文 中文
Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure 国家基础设施远程生物识别系统机制的生物识别握手协议
YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.
随着生物识别服务环境向开放系统的扩展,侵犯隐私和非法盗用信息的威胁也随之增加。然而,如果发现证书或智能卡丢失,可以很容易地取消和补发,但在发生安全漏洞后,没有办法恢复个人的独特生物特征信息。因此,必须保证服务机构之间的信任。本文根据模板存储位置的不同,提出了9种不同的生物认证模型,并定义了每种模型的威胁及其解决方法。提出的模型可以通过提供传输阶段的安全性来增强基于web的生物识别安全性,并通过提供基于标准的加密来提供稳定的性能。通过扩展TLS(传输层安全),设计和实现生物识别握手协议和生物识别传输协议,并将其应用于每个模型,这些模型可以应用于国家基础设施的要素,如电子护照和移民控制系统。
{"title":"Biometric Handshake Protocol on Telebiometric System Mechanism for National Infrastructure","authors":"YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi","doi":"10.1109/ISA.2008.24","DOIUrl":"https://doi.org/10.1109/ISA.2008.24","url":null,"abstract":"The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing biometric handshake protocols and biometric transfer protocols through the extension of TLS (transport layer security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Policy Pre-evaluation towards Risk Analysis 面向风险分析的安全策略预评估
Yiran Han, Y. Hori, K. Sakurai
Nowadays, security policy evaluation becomes a very hot topic since high QoP(quality of protection) is required by more and more people. Most of the researchers focus on the security policy evaluation after they have been enforced into real application systems via some real attacks. However, before security policy enforcement, the policy themselves may also contain some anomalies which shouldn't be ignored. In this paper, we pointed out the importance of security policy pre-evaluation which focuses on security policy evaluation before policy enforcement. In addition we propose a framework for it towards risk analysis. As a concrete example, we show how to apply our framework to firewall security policies. Finally we discuss about the difficulty of our proposal and show future work interests.
随着越来越多的人对安全策略的高质量要求,安全策略评估成为一个非常热门的话题。大多数研究人员关注的是安全策略通过实际攻击被强制应用到实际应用系统后的评估。但是,在实施安全策略之前,策略本身也可能包含一些不应忽视的异常情况。本文指出了安全策略预评估的重要性,即在安全策略实施前进行安全策略评估。此外,我们还提出了一个用于风险分析的框架。作为一个具体示例,我们将展示如何将框架应用于防火墙安全策略。最后我们讨论了我们的提案的难度和未来的工作兴趣。
{"title":"Security Policy Pre-evaluation towards Risk Analysis","authors":"Yiran Han, Y. Hori, K. Sakurai","doi":"10.1109/ISA.2008.114","DOIUrl":"https://doi.org/10.1109/ISA.2008.114","url":null,"abstract":"Nowadays, security policy evaluation becomes a very hot topic since high QoP(quality of protection) is required by more and more people. Most of the researchers focus on the security policy evaluation after they have been enforced into real application systems via some real attacks. However, before security policy enforcement, the policy themselves may also contain some anomalies which shouldn't be ignored. In this paper, we pointed out the importance of security policy pre-evaluation which focuses on security policy evaluation before policy enforcement. In addition we propose a framework for it towards risk analysis. As a concrete example, we show how to apply our framework to firewall security policies. Finally we discuss about the difficulty of our proposal and show future work interests.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116855161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fine Granularity Access Rights for Information Flow Control in Object Oriented Systems 面向对象系统中信息流控制的细粒度访问权限
A. Maamir, A. Fellah, L.A. Salem
One of the main features of information flow control is to ensure the enforcement of privacy and regulated accessibility. However, most information flow control models that have been proposed do not provide substantial assurance to enforce end-to-end confidentiality policies or they are too restrictive, overprotected, and inflexible. We present a model for discretionary access controls that is in harmony with the object oriented paradigm. The model uses access rights applied to object attributes and methods, thus allowing considerable flexibility without compromising system security by leaking sensitive information. Models based on message filtering intercept every message exchanged among objects to control the flow of information. We present an algorithm which enforces message filtering based on the defined access rights.
信息流控制的主要特征之一是确保隐私和可访问性的执行。然而,已经提出的大多数信息流控制模型并没有提供实质性的保证来强制执行端到端的机密性策略,或者它们过于限制、过度保护和不灵活。我们提出了一个与面向对象范例相协调的自由访问控制模型。该模型使用应用于对象属性和方法的访问权限,从而允许相当大的灵活性,而不会因泄露敏感信息而损害系统安全性。基于消息过滤的模型拦截对象之间交换的每条消息,以控制信息流。提出了一种基于定义的访问权限进行消息过滤的算法。
{"title":"Fine Granularity Access Rights for Information Flow Control in Object Oriented Systems","authors":"A. Maamir, A. Fellah, L.A. Salem","doi":"10.1109/ISA.2008.98","DOIUrl":"https://doi.org/10.1109/ISA.2008.98","url":null,"abstract":"One of the main features of information flow control is to ensure the enforcement of privacy and regulated accessibility. However, most information flow control models that have been proposed do not provide substantial assurance to enforce end-to-end confidentiality policies or they are too restrictive, overprotected, and inflexible. We present a model for discretionary access controls that is in harmony with the object oriented paradigm. The model uses access rights applied to object attributes and methods, thus allowing considerable flexibility without compromising system security by leaking sensitive information. Models based on message filtering intercept every message exchanged among objects to control the flow of information. We present an algorithm which enforces message filtering based on the defined access rights.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116869794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Attribute-based Signature Scheme 基于属性的签名方案
Guo Shaniqng, Z. Yingpei
In real life, one requires signatures from people who satisfy certain criteria like that they should possess some specific attributes. For example, Alice wants a document to be signed by some employee in Bob's company. This employee must have certain attributes such as being part of the IT staff and at least a junior manager in the cryptography team or a senior manager in the biometrics team. In order to satisfy these kinds of needs, we defined a common attribute-based signature scheme where the signing member has to have certain attributes or belong to a certain group, and we also proved our scheme to be secure.
在现实生活中,人们需要满足某些条件的人签名,比如他们应该拥有一些特定的属性。例如,Alice想要一份由Bob公司员工签名的文件。该员工必须具有某些属性,例如是IT人员的一部分,并且至少是密码学团队的初级经理或生物识别团队的高级经理。为了满足这些需求,我们定义了一种通用的基于属性的签名方案,其中签名成员必须具有特定的属性或属于特定的组,并证明了我们的方案是安全的。
{"title":"Attribute-based Signature Scheme","authors":"Guo Shaniqng, Z. Yingpei","doi":"10.1109/ISA.2008.111","DOIUrl":"https://doi.org/10.1109/ISA.2008.111","url":null,"abstract":"In real life, one requires signatures from people who satisfy certain criteria like that they should possess some specific attributes. For example, Alice wants a document to be signed by some employee in Bob's company. This employee must have certain attributes such as being part of the IT staff and at least a junior manager in the cryptography team or a senior manager in the biometrics team. In order to satisfy these kinds of needs, we defined a common attribute-based signature scheme where the signing member has to have certain attributes or belong to a certain group, and we also proved our scheme to be secure.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
IDEA: A New Intrusion Detection Data Source 思想:一种新的入侵检测数据源
W. Mahoney, W. Sousan
In the context of computer systems, an intrusion is generally considered to be a harmful endeavor to prevent others from legitimate use of that system, to obtain data which is not normally available to the intruder, or to plant data or disrupt data already existent on the machines. Traditionally intrusion detection has relied on two data sources: various log files which record user's activity, and network traffic which contains potential threats. This research presents a system which we call IDEA; the Intrusion DEtection Automata system. We utilize a third source of data for intrusion detection in the form of an instrumented process. Open source software is recompiled using a modified compiler we have created, and the resulting executable program generates the data as it runs. An external monitoring facility then checks the behavior of the program against known good execution paths. These paths are specified either using a domain specific language and hand-written rules, or by running the software in a learning mode and capturing the normal behavior for later comparison.
在计算机系统中,入侵通常被认为是一种有害的行为,目的是阻止他人合法使用该系统,获取入侵者通常无法获得的数据,或者植入数据或破坏机器上已经存在的数据。传统的入侵检测依赖于两个数据源:记录用户活动的各种日志文件和包含潜在威胁的网络流量。这项研究提出了一个系统,我们称之为IDEA;入侵检测自动机系统。我们以仪表化过程的形式利用第三种数据源进行入侵检测。使用我们创建的修改过的编译器重新编译开源软件,生成的可执行程序在运行时生成数据。然后,外部监视工具根据已知的良好执行路径检查程序的行为。这些路径可以使用特定于领域的语言和手写规则来指定,或者通过在学习模式下运行软件并捕获正常行为以供以后比较来指定。
{"title":"IDEA: A New Intrusion Detection Data Source","authors":"W. Mahoney, W. Sousan","doi":"10.1109/ISA.2008.32","DOIUrl":"https://doi.org/10.1109/ISA.2008.32","url":null,"abstract":"In the context of computer systems, an intrusion is generally considered to be a harmful endeavor to prevent others from legitimate use of that system, to obtain data which is not normally available to the intruder, or to plant data or disrupt data already existent on the machines. Traditionally intrusion detection has relied on two data sources: various log files which record user's activity, and network traffic which contains potential threats. This research presents a system which we call IDEA; the Intrusion DEtection Automata system. We utilize a third source of data for intrusion detection in the form of an instrumented process. Open source software is recompiled using a modified compiler we have created, and the resulting executable program generates the data as it runs. An external monitoring facility then checks the behavior of the program against known good execution paths. These paths are specified either using a domain specific language and hand-written rules, or by running the software in a learning mode and capturing the normal behavior for later comparison.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated Wireless Rogue Access Point Detection and Counterattack System 集成无线流氓接入点检测与反击系统
S. Srilasak, K. Wongthavarawat, A. Phonphoem
In this paper we propose the integrated solution for detection and counterattack the rogue access points. Classification of rogue access point and related risk assessment is analyzed. Rogue detection algorithm is also proposed. Our proposed solution is effective and low cost. It is designed to utilize the existing wireless LAN infrastructure. There is no need to acquire the new RF devices or dedicated wireless detection sensors. The experiments in the real system are demonstrated.
本文提出了一种检测和反击非法接入点的综合解决方案。分析了流氓接入点的分类及其风险评估。提出了流氓检测算法。我们提出的解决方案是有效和低成本的。它旨在利用现有的无线局域网基础设施。不需要购买新的射频设备或专用无线检测传感器。在实际系统中进行了实验验证。
{"title":"Integrated Wireless Rogue Access Point Detection and Counterattack System","authors":"S. Srilasak, K. Wongthavarawat, A. Phonphoem","doi":"10.1109/ISA.2008.103","DOIUrl":"https://doi.org/10.1109/ISA.2008.103","url":null,"abstract":"In this paper we propose the integrated solution for detection and counterattack the rogue access points. Classification of rogue access point and related risk assessment is analyzed. Rogue detection algorithm is also proposed. Our proposed solution is effective and low cost. It is designed to utilize the existing wireless LAN infrastructure. There is no need to acquire the new RF devices or dedicated wireless detection sensors. The experiments in the real system are demonstrated.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles 基于分布式角色结构信任范围的可靠信任管理
Gang Yin, Ning Zhou, Huaimin Wang
Role based trust management uses distributed role hierarchies (DRH) to provide flexible and scalable authorization in multi-domain environments, but DRH are inherently transitive and may easily lead to unexpected or even illegal authorization. In this paper, we propose TS-DRH, a generalized extension of DRH based on a novel trust scope model of distributed roles. TS-DRH introduces the notion of scoped roles with four kinds of structural trust scopes, and uses scoped roles to control the member scopes of senior roles and the permission scopes of junior roles, and thus helps to control the propagation of role memberships and permissions in DRH. This paper also designs rule based semantics and a compliance checking algorithm to compute authorization decisions for TS-DRH.
基于角色的信任管理使用分布式角色层次结构(DRH)在多域环境中提供灵活和可扩展的授权,但DRH本身具有可传递性,很容易导致意外甚至非法的授权。本文基于一种新的分布式角色信任范围模型,提出了对分布式角色信任范围模型的广义扩展——TS-DRH。TS-DRH引入了具有四种结构信任作用域的作用域角色概念,并利用作用域角色控制高级角色的成员作用域和低级角色的权限作用域,从而控制角色成员关系和权限在DRH中的传播。本文还设计了基于规则的语义和符合性检查算法来计算TS-DRH的授权决策。
{"title":"Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles","authors":"Gang Yin, Ning Zhou, Huaimin Wang","doi":"10.1109/ISA.2008.94","DOIUrl":"https://doi.org/10.1109/ISA.2008.94","url":null,"abstract":"Role based trust management uses distributed role hierarchies (DRH) to provide flexible and scalable authorization in multi-domain environments, but DRH are inherently transitive and may easily lead to unexpected or even illegal authorization. In this paper, we propose TS-DRH, a generalized extension of DRH based on a novel trust scope model of distributed roles. TS-DRH introduces the notion of scoped roles with four kinds of structural trust scopes, and uses scoped roles to control the member scopes of senior roles and the permission scopes of junior roles, and thus helps to control the propagation of role memberships and permissions in DRH. This paper also designs rule based semantics and a compliance checking algorithm to compute authorization decisions for TS-DRH.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128984720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Security Cockpit 打造安全驾驶舱
N. Pham, L. Baud, Patrick Bellot, Michel Riguidel
Building systems that are guaranteed to be secure or to remain secure over time is still an unachievable goal. The need for a security cockpit that helps to determine security assurance level of a system in a near real time manner is therefore vital in order to maintain and improve overall security. This paper discusses different steps in the whole security assurance assessment process in order to build such cockpit. To test and evaluate the applicability of our approach, we introduce then a system capable of assessing the security assurance level of a network system. Currently, this assessment system focuses on the availability aspect of the security.
构建保证安全或长期保持安全的系统仍然是一个无法实现的目标。因此,为了维护和提高整体安全性,需要一个安全座舱,以近乎实时的方式帮助确定系统的安全保证级别。本文对座舱安全保障评估过程中的不同环节进行了探讨。为了测试和评估我们的方法的适用性,我们引入了一个能够评估网络系统的安全保证级别的系统。目前,该评估系统主要侧重于安全性的可用性方面。
{"title":"Towards a Security Cockpit","authors":"N. Pham, L. Baud, Patrick Bellot, Michel Riguidel","doi":"10.1109/ISA.2008.95","DOIUrl":"https://doi.org/10.1109/ISA.2008.95","url":null,"abstract":"Building systems that are guaranteed to be secure or to remain secure over time is still an unachievable goal. The need for a security cockpit that helps to determine security assurance level of a system in a near real time manner is therefore vital in order to maintain and improve overall security. This paper discusses different steps in the whole security assurance assessment process in order to build such cockpit. To test and evaluate the applicability of our approach, we introduce then a system capable of assessing the security assurance level of a network system. Currently, this assessment system focuses on the availability aspect of the security.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129174619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging Techniques 使用中断调试技术的全虚拟化操作系统事件驱动内存快照
Ruo Ando, Y. Kadobayashi, Youichi Shinoda
Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper modification of guest OS, VMM is powerful tool for timely snapshot. In this paper, we propose an incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques. We modify debug register handler to invoke snapshot facility of VMM. Software interrupt or signal are generated in register handler. Then, we can take snapshot asynchronously when debug register is changed. On guest OS, we apply three kinds of interruptive debugging techniques: driver supplied callback function, DLL injection. IDT (interruption descriptor table) is modified by driver supplied callback function, which makes it possible to cope with vulnerability exploitation. DLL injection is applied to insert security check function into a resource access function. Proposed system is implemented XEN virtual machine monitor and KVM (Kernel Virtual machine).
内存取证越来越受到关注。为了有效地检索证据,及时地进行快照是非常重要的。通过对客户操作系统进行适当的修改,VMM是实时快照的强大工具。在本文中,我们提出了一种事件驱动的内存快照,用于使用中断调试技术的全虚拟化操作系统。我们修改调试寄存器处理程序来调用VMM的快照功能。在寄存器处理程序中产生软件中断或信号。然后,当调试寄存器发生变化时,我们可以异步地进行快照。在客户操作系统上,我们采用了三种中断调试技术:驱动程序提供的回调函数、DLL注入。IDT(中断描述符表)由驱动程序提供的回调函数修改,这使得应对漏洞利用成为可能。DLL注入用于将安全检查函数插入到资源访问函数中。本系统采用XEN虚拟机监视器和KVM (Kernel virtual machine)实现。
{"title":"Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging Techniques","authors":"Ruo Ando, Y. Kadobayashi, Youichi Shinoda","doi":"10.1109/ISA.2008.27","DOIUrl":"https://doi.org/10.1109/ISA.2008.27","url":null,"abstract":"Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper modification of guest OS, VMM is powerful tool for timely snapshot. In this paper, we propose an incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques. We modify debug register handler to invoke snapshot facility of VMM. Software interrupt or signal are generated in register handler. Then, we can take snapshot asynchronously when debug register is changed. On guest OS, we apply three kinds of interruptive debugging techniques: driver supplied callback function, DLL injection. IDT (interruption descriptor table) is modified by driver supplied callback function, which makes it possible to cope with vulnerability exploitation. DLL injection is applied to insert security check function into a resource access function. Proposed system is implemented XEN virtual machine monitor and KVM (Kernel Virtual machine).","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Deniable Authenticated Key Establishment for Internet Protocols 互联网协议安全可否认认证密钥建立
Meng-Hui Lim, Sanggon Lee, Youngho Park, S. Moon
In 2003, Boyd et al. have proposed two deniable authenticated key establishment protocols for Internet key exchange (IKE). However, both schemes have been broken by Chou et al. in 2005 due to their susceptibility to key-compromise impersonation (KCI) attack. In this paper, we put forward the improved variants of both Boyd et al.'s schemes in order to defeat the KCI attack. On top of justifying our improvements, we further present a detailed security analysis to ensure that the desired security attributes: deniability and authenticity remain preserved.
2003年,Boyd等人提出了两个可否认的互联网密钥交换(IKE)认证密钥建立协议。然而,这两个方案都被Chou等人在2005年攻破,因为它们容易受到密钥泄露模拟(KCI)攻击。在本文中,我们提出了Boyd等人的方案的改进变体,以挫败KCI攻击。除了证明我们的改进之外,我们还提供了详细的安全性分析,以确保保留所需的安全属性:可否认性和真实性。
{"title":"Secure Deniable Authenticated Key Establishment for Internet Protocols","authors":"Meng-Hui Lim, Sanggon Lee, Youngho Park, S. Moon","doi":"10.1109/ISA.2008.9","DOIUrl":"https://doi.org/10.1109/ISA.2008.9","url":null,"abstract":"In 2003, Boyd et al. have proposed two deniable authenticated key establishment protocols for Internet key exchange (IKE). However, both schemes have been broken by Chou et al. in 2005 due to their susceptibility to key-compromise impersonation (KCI) attack. In this paper, we put forward the improved variants of both Boyd et al.'s schemes in order to defeat the KCI attack. On top of justifying our improvements, we further present a detailed security analysis to ensure that the desired security attributes: deniability and authenticity remain preserved.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 International Conference on Information Security and Assurance (isa 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1