首页 > 最新文献

Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security最新文献

英文 中文
Experimental results of covert channel limitation in one-way communication systems 单向通信系统中隐蔽信道限制的实验结果
N. Ogurtsov, H. Orman, R. Schroeppel, S. O'Malley, O. Spatscheck
With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce the Bell-LaPadula (1973) security model. We also introduce a new protocol called "Quantized Pump" that offers several advantages, and present experimental results to support our claims.
随着电子通信的日益增长,提供一种机制来对网络通信实施各种安全策略变得越来越重要。本文讨论了我们之前提出的几个协议的实现,这些协议强制执行Bell-LaPadula(1973)安全模型。我们还介绍了一种称为“量化泵”的新协议,它具有几个优点,并提出了实验结果来支持我们的主张。
{"title":"Experimental results of covert channel limitation in one-way communication systems","authors":"N. Ogurtsov, H. Orman, R. Schroeppel, S. O'Malley, O. Spatscheck","doi":"10.1109/NDSS.1997.579214","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579214","url":null,"abstract":"With the increasing growth of electronic communications, it is becoming important to provide a mechanism for enforcing various security policies on network communications. This paper discusses our implementation of several previously proposed protocols that enforce the Bell-LaPadula (1973) security model. We also introduce a new protocol called \"Quantized Pump\" that offers several advantages, and present experimental results to support our claims.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114671886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed authentication in Kerberos using public key cryptography Kerberos中使用公钥加密的分布式身份验证
M. Sirbu, J. Chuang
The authors describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.
作者描述了一种在Kerberos票据框架中使用公钥加密实现完全分布式身份验证的方法。通过将大部分身份验证工作负载从受信任的中介分发到通信各方,与Kerberos V5相比,可以实现对安全性和可伸缩性的显著增强。Kerberos客户机的隐私性也得到了增强。已经开发了这个扩展协议的工作实现,并提出了从传统的Kerberos向基于公钥的Kerberos过渡的迁移计划。
{"title":"Distributed authentication in Kerberos using public key cryptography","authors":"M. Sirbu, J. Chuang","doi":"10.1109/NDSS.1997.579231","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579231","url":null,"abstract":"The authors describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authentication workload away from the trusted intermediary and to the communicating parties, significant enhancements to security and scalability can be achieved as compared to Kerberos V5. Privacy of Kerberos clients is also enhanced. A working implementation of this extended protocol has been developed, and a migration plan is proposed for a transition from traditional to public key based Kerberos.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114949258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Securing Web access with DCE 使用DCE保护Web访问
B. Schimpf
Internet tools, especially Web browsers and servers, are being widely used for information access. However, these tools have some limitations in terms of the security available for those information accesses and of the robustness and availability of the infrastructure used to provide that security. This paper describes work done to utilize the security services and infrastructure of the Open Software Foundation (OSF) Distributed Computing Environment (DCE) to secure Web accesses. This work was done as part of an Advanced Technology Offering (ATO) by the OSF Research Institute jointly with Gradient Technologies Inc. and other ATO sponsors. A practical implementation has been completed. These combined technologies allow users to securely access both Web documents and application servers from a variety of desktop systems using standard, off-the-shelf Web browsers.
Internet工具,特别是Web浏览器和服务器,正被广泛用于信息访问。然而,就这些信息访问的可用安全性以及用于提供该安全性的基础设施的健壮性和可用性而言,这些工具有一些限制。本文描述了利用开放软件基金会(OSF)分布式计算环境(DCE)的安全服务和基础设施来保护Web访问的工作。这项工作是OSF研究所与Gradient Technologies Inc.和其他ATO赞助商共同完成的先进技术产品(ATO)的一部分。已经完成了实际的实现。这些组合的技术允许用户使用标准的、现成的Web浏览器从各种桌面系统安全地访问Web文档和应用服务器。
{"title":"Securing Web access with DCE","authors":"B. Schimpf","doi":"10.1109/NDSS.1997.579227","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579227","url":null,"abstract":"Internet tools, especially Web browsers and servers, are being widely used for information access. However, these tools have some limitations in terms of the security available for those information accesses and of the robustness and availability of the infrastructure used to provide that security. This paper describes work done to utilize the security services and infrastructure of the Open Software Foundation (OSF) Distributed Computing Environment (DCE) to secure Web accesses. This work was done as part of an Advanced Technology Offering (ATO) by the OSF Research Institute jointly with Gradient Technologies Inc. and other ATO sponsors. A practical implementation has been completed. These combined technologies allow users to securely access both Web documents and application servers from a variety of desktop systems using standard, off-the-shelf Web browsers.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hierarchical organization of certification authorities for secure environments 用于安全环境的证书颁发机构的分层组织
L. Lopez, J. Carracedo
The paper presents a model of hierarchical organization of certification authorities which can be applied to any open system network. In order to study the feasibility of the proposed model, a pilot experiment within a university environment is being carried out. The authors have developed an application which provides the users with security services using X.509 certificates. The authors have also developed a security server to provide RSA keys and management of certificates. The hierarchical infrastructure that is being created needs a multi-level policy which implies the use of various types of documents which are managed by people with different roles. One of the objectives being followed is to formalize the treatment of the information about policy, for which some components of the extensions field of the version 3 certificate have been used and other new ones are proposed.
提出了一种适用于任何开放系统网络的证书颁发机构分层组织模型。为了研究所提出的模型的可行性,正在大学环境中进行试点实验。作者开发了一个使用X.509证书为用户提供安全服务的应用程序。作者还开发了一个安全服务器来提供RSA密钥和证书管理。正在创建的分层基础结构需要多级策略,这意味着使用由不同角色的人员管理的各种类型的文档。所遵循的目标之一是形式化处理有关策略的信息,为此已经使用了版本3证书的扩展字段的一些组件,并提出了其他新组件。
{"title":"Hierarchical organization of certification authorities for secure environments","authors":"L. Lopez, J. Carracedo","doi":"10.1109/NDSS.1997.579229","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579229","url":null,"abstract":"The paper presents a model of hierarchical organization of certification authorities which can be applied to any open system network. In order to study the feasibility of the proposed model, a pilot experiment within a university environment is being carried out. The authors have developed an application which provides the users with security services using X.509 certificates. The authors have also developed a security server to provide RSA keys and management of certificates. The hierarchical infrastructure that is being created needs a multi-level policy which implies the use of various types of documents which are managed by people with different roles. One of the objectives being followed is to formalize the treatment of the information about policy, for which some components of the extensions field of the version 3 certificate have been used and other new ones are proposed.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Misplaced trust: Kerberos 4 session keys 错误的信任:Kerberos 4会话密钥
Bryn Dole, S. Lodin, E. Spafford
One of the commonly accepted principles of software design for security is that making the source code openly available leads to better security. The presumption is that the open publication of source code will lead others to review the code for errors, however this openness is no guarantee of correctness. One of the most widely published and used pieces of security software in recent memory is the MIT implementation of the Kerberos authentication protocol. In the design of the protocol, random session keys are the basis for establishing the authenticity of service requests. Because of the way that the Kerberos Version 4 implementation selected its random keys, the secret keys could easily be guessed in a matter of seconds. This paper discusses the difficulty of generating good random numbers, the mistakes that were made in implementing Kerberos Version 4, and the breakdown of software engineering that allowed this flaw to remain unfixed for ten years. We discuss this as a particularly notable example of the need to examine security-critical code carefully, even when it is made publicly available.
一个被普遍接受的软件安全性设计原则是,开放源代码可以带来更好的安全性。假设源代码的公开发布将导致其他人审查代码中的错误,但是这种开放性并不能保证代码的正确性。最近发布和使用最广泛的安全软件之一是Kerberos身份验证协议的MIT实现。在协议设计中,随机会话密钥是建立服务请求真实性的基础。由于Kerberos Version 4实现选择其随机密钥的方式,可以很容易地在几秒钟内猜出秘密密钥。本文讨论了生成好的随机数的困难,在实现Kerberos Version 4时所犯的错误,以及软件工程的崩溃导致这个缺陷十年都没有得到修复。我们将此作为需要仔细检查安全关键代码的一个特别值得注意的示例来讨论,即使它是公开可用的。
{"title":"Misplaced trust: Kerberos 4 session keys","authors":"Bryn Dole, S. Lodin, E. Spafford","doi":"10.1109/NDSS.1997.579221","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579221","url":null,"abstract":"One of the commonly accepted principles of software design for security is that making the source code openly available leads to better security. The presumption is that the open publication of source code will lead others to review the code for errors, however this openness is no guarantee of correctness. One of the most widely published and used pieces of security software in recent memory is the MIT implementation of the Kerberos authentication protocol. In the design of the protocol, random session keys are the basis for establishing the authenticity of service requests. Because of the way that the Kerberos Version 4 implementation selected its random keys, the secret keys could easily be guessed in a matter of seconds. This paper discusses the difficulty of generating good random numbers, the mistakes that were made in implementing Kerberos Version 4, and the breakdown of software engineering that allowed this flaw to remain unfixed for ten years. We discuss this as a particularly notable example of the need to examine security-critical code carefully, even when it is made publicly available.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Securing the Nimrod routing architecture 保护宁录路由架构
Karen E. Sirois, S. Kent
This paper describes the work undertaken to secure Nimrod, a complex and sophisticated routing system that unifies interior and exterior routing functions. The focus of this work is countering attacks that would degrade or deny service to network subscribers. The work began with an analysis of security requirements for Nimrod, based on a hybrid approach that refines top-down requirements generation with an understanding of attack scenarios and the capabilities and limitations of countermeasures. The countermeasures selected for use here include several newly developed sequence integrity mechanisms, plus a protocol for shared secret establishment. A novel aspect of this work is the protection of subscriber traffic in support of the overall communication availability security goal.
本文描述了为保护Nimrod所做的工作,这是一个复杂而复杂的路由系统,统一了内部和外部路由功能。这项工作的重点是对抗可能降低或拒绝向网络用户提供服务的攻击。工作开始于对Nimrod的安全需求的分析,该分析基于一种混合方法,该方法通过对攻击场景和对策的能力和限制的理解来细化自顶向下的需求生成。这里选择使用的对策包括几种新开发的序列完整性机制,以及用于共享秘密建立的协议。这项工作的一个新颖方面是保护用户流量以支持总体通信可用性安全目标。
{"title":"Securing the Nimrod routing architecture","authors":"Karen E. Sirois, S. Kent","doi":"10.1109/NDSS.1997.579223","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579223","url":null,"abstract":"This paper describes the work undertaken to secure Nimrod, a complex and sophisticated routing system that unifies interior and exterior routing functions. The focus of this work is countering attacks that would degrade or deny service to network subscribers. The work began with an analysis of security requirements for Nimrod, based on a hybrid approach that refines top-down requirements generation with an understanding of attack scenarios and the capabilities and limitations of countermeasures. The countermeasures selected for use here include several newly developed sequence integrity mechanisms, plus a protocol for shared secret establishment. A novel aspect of this work is the protection of subscriber traffic in support of the overall communication availability security goal.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124065355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An interface specification language for automatically analyzing cryptographic protocols 用于自动分析加密协议的接口规范语言
S. Brackin
This paper describes a simple interface specification language (ISL) for cryptographic protocols and their desired properties, and an automatic authentication protocol analyzer (AAPA) that automatically either proves-using an extension of the Gong, Needham, Yahalom (1990) belief logic-that specified protocols have their desired properties, or identifies precisely where these proof attempts fail. The ISL and the AAPA make it easy for protocol designers to incorporate formal analysis into the protocol design process, where they clarify designs and reveals a large class of common errors. The ISL and the AAPA have already shown potential deficiencies in published protocols and been useful in designing new protocols.
本文描述了用于加密协议及其所需属性的简单接口规范语言(ISL),以及一个自动认证协议分析器(AAPA),该分析器使用Gong, Needham, Yahalom(1990)信念逻辑的扩展自动证明指定协议具有其所需属性,或者精确识别这些证明尝试失败的地方。ISL和AAPA使协议设计人员可以轻松地将形式化分析纳入协议设计过程,在此过程中,它们阐明了设计并揭示了一大类常见错误。ISL和AAPA已经表明了已发表协议的潜在缺陷,并在设计新协议方面很有用。
{"title":"An interface specification language for automatically analyzing cryptographic protocols","authors":"S. Brackin","doi":"10.1109/NDSS.1997.579219","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579219","url":null,"abstract":"This paper describes a simple interface specification language (ISL) for cryptographic protocols and their desired properties, and an automatic authentication protocol analyzer (AAPA) that automatically either proves-using an extension of the Gong, Needham, Yahalom (1990) belief logic-that specified protocols have their desired properties, or identifies precisely where these proof attempts fail. The ISL and the AAPA make it easy for protocol designers to incorporate formal analysis into the protocol design process, where they clarify designs and reveals a large class of common errors. The ISL and the AAPA have already shown potential deficiencies in published protocols and been useful in designing new protocols.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Reducing the cost of security in link-state routing 降低链路状态路由的安全成本
R. Hauser, T. Przygienda, G. Tsudik
Security in link-state routing protocols is a feature that is both desirable and costly. This paper examines the cost of security and presents two techniques for efficient and secure processing of link state updates. The first technique is geared towards a relatively stable internetwork environment while the second is designed with a more volatile environment in mind.
链路状态路由协议中的安全性是一个既需要又昂贵的特性。本文研究了安全的代价,并提出了两种有效和安全处理链路状态更新的技术。第一种技术是针对相对稳定的互联网环境设计的,而第二种技术是针对更不稳定的环境设计的。
{"title":"Reducing the cost of security in link-state routing","authors":"R. Hauser, T. Przygienda, G. Tsudik","doi":"10.1109/NDSS.1997.579226","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579226","url":null,"abstract":"Security in link-state routing protocols is a feature that is both desirable and costly. This paper examines the cost of security and presents two techniques for efficient and secure processing of link state updates. The first technique is geared towards a relatively stable internetwork environment while the second is designed with a more volatile environment in mind.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
Continuous assessment of a Unix configuration: integrating intrusion detection and configuration analysis Unix配置的持续评估:集成入侵检测和配置分析
Abdelaziz Mounji, B. L. Charlier
Computer security is a topic of growing concern because, on the one hand, the power of computers continues to increase at exponential speed and all computers are virtually connected to each other and because, on the other hand, the lack of reliability of software systems may cause dramatic and unrecoverable damage to computer systems and hence to the newly emerging computerized society. Among the possible approaches to improve the current situation, expert systems have been advocated to be an important one. Typical tasks that such expert systems attempt to achieve include finding system vulnerabilities and detecting malicious behaviour of users. We extend our intrusion detection system ASAX with a deductive subsystem that allows us to assess the security level of a software configuration on a real time basis. By coupling the two subsystems-intrusion detection and configuration analysis-we moreover achieve a better tuning of the intrusion detection since the system has only to enable intrusion detection rules that are specifically required by the current state of the configuration. We also report some preliminary performance measurements, which suggest that our approach can be practical in real life contexts.
计算机安全是一个日益受到关注的话题,因为一方面,计算机的能力继续以指数级的速度增长,所有的计算机实际上都是相互连接的,另一方面,因为软件系统缺乏可靠性可能会对计算机系统造成巨大的和不可恢复的损害,从而对新兴的计算机化社会造成损害。在改善这种状况的可能途径中,专家系统被认为是一种重要的途径。这类专家系统试图实现的典型任务包括发现系统漏洞和检测用户的恶意行为。我们用演绎子系统扩展了我们的入侵检测系统ASAX,它允许我们实时评估软件配置的安全级别。通过耦合两个子系统—入侵检测和配置分析—我们还实现了入侵检测的更好调优,因为系统只启用当前配置状态特别需要的入侵检测规则。我们还报告了一些初步的性能测量结果,这表明我们的方法在现实生活中是可行的。
{"title":"Continuous assessment of a Unix configuration: integrating intrusion detection and configuration analysis","authors":"Abdelaziz Mounji, B. L. Charlier","doi":"10.1109/NDSS.1997.579216","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579216","url":null,"abstract":"Computer security is a topic of growing concern because, on the one hand, the power of computers continues to increase at exponential speed and all computers are virtually connected to each other and because, on the other hand, the lack of reliability of software systems may cause dramatic and unrecoverable damage to computer systems and hence to the newly emerging computerized society. Among the possible approaches to improve the current situation, expert systems have been advocated to be an important one. Typical tasks that such expert systems attempt to achieve include finding system vulnerabilities and detecting malicious behaviour of users. We extend our intrusion detection system ASAX with a deductive subsystem that allows us to assess the security level of a software configuration on a real time basis. By coupling the two subsystems-intrusion detection and configuration analysis-we moreover achieve a better tuning of the intrusion detection since the system has only to enable intrusion detection rules that are specifically required by the current state of the configuration. We also report some preliminary performance measurements, which suggest that our approach can be practical in real life contexts.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127709052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Blocking Java applets at the firewall 在防火墙阻止Java小程序
David M. Martin, S. Rajagopalan, A. Rubin
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.
本文探讨了在允许受信任的内部小程序运行的同时保护Internet上的站点免受恶意外部Java小程序的攻击的问题。通过仔细的实现,站点可以抵抗当前的Java安全弱点以及那些尚未被发现的弱点。此外,我们还描述了一种针对某些复杂防火墙的新攻击,这种攻击最有效地实现为Java applet。
{"title":"Blocking Java applets at the firewall","authors":"David M. Martin, S. Rajagopalan, A. Rubin","doi":"10.1109/NDSS.1997.579215","DOIUrl":"https://doi.org/10.1109/NDSS.1997.579215","url":null,"abstract":"This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet.","PeriodicalId":224439,"journal":{"name":"Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
期刊
Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1