首页 > 最新文献

2017 International Conference on Software Security and Assurance (ICSSA)最新文献

英文 中文
Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications 作为架构解决方案的安全模式——减轻Web应用程序中的跨站点脚本攻击
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.30
Priya Anand, J. Ryoo
Security patterns are solutions for a recurring security issues that can be applied to mitigate security weaknesses in a software system. With an increased number of security patterns, the selection of a precise pattern to mitigate a vulnerability may become a challenging for software developers. When an appropriate pattern is identified as a potential solution by a software professional, applying that pattern and its level of integration is purely dependent on the software experts' skill and knowledge. Also, adopting the security pattern at an architectural level may be a time consuming and cumbersome task for software developers. To help the software developers' community by making this pattern implementation to be a relatively easy task, we developed a tool named - SPAAS - Security Patterns As Architectural Solution. This tool would automate the process of implementing the selected security pattern in the software system at an architectural level. Our tool was developed to assess potential vulnerabilities at an architectural level and possible fixes by adopting the selected security patterns. This tool checks the possibility of security patterns that have been already implemented in the system and accurately reports the results. In this paper, we demonstrate the use of our tool by conducting a case study on an open-source medical software, OpenEMR. Our analysis on OpenEMR software using the SPAAS tool pointed out the vulnerable source codes in the system that have been missed by some generic vulnerability assessment tools. Using our tool, we implemented the input validation pattern as a solution to mitigate cross-site scripting attacks. Using our pattern application tool, SPAAS, we analyzed OpenEMR software that has 121819 lines of codes. Our experiment on OpenEMR software that are vulnerable to XSS attacks took 2.03 seconds, and reported the presence of 341 spots of vulnerable codes from a total of 121819 lines of source code. We used our tool to implement intercepting validator pattern on those 341 lines, and we could successfully implement the patterns in 2.28 seconds at an architectural level. Our modified version of OpenEMR with security patterns implementation is presented to its software architect and it would be merged as a security solution in the repository. Without a deep understanding of security patterns, any software professional can implement the security pattern at an architectural level using our proposed tool, SPAAS.
安全模式是针对反复出现的安全问题的解决方案,可以应用于减轻软件系统中的安全弱点。随着安全模式数量的增加,选择精确的模式来减轻漏洞可能成为软件开发人员面临的挑战。当一个合适的模式被软件专家识别为潜在的解决方案时,应用该模式及其集成级别完全取决于软件专家的技能和知识。此外,在体系结构级别采用安全模式对于软件开发人员来说可能是一项耗时且繁琐的任务。为了帮助软件开发人员社区,使此模式实现成为一项相对容易的任务,我们开发了一个名为SPAAS的工具——安全模式即体系结构解决方案。该工具将在体系结构级别上自动化在软件系统中实现所选安全模式的过程。开发我们的工具是为了通过采用选定的安全模式来评估体系结构级别上的潜在漏洞和可能的修复。该工具检查系统中已经实现的安全模式的可能性,并准确报告结果。在本文中,我们通过对开源医疗软件OpenEMR进行案例研究来演示我们的工具的使用。我们使用SPAAS工具对OpenEMR软件进行分析,指出了系统中存在一些被一般漏洞评估工具遗漏的漏洞源代码。使用我们的工具,我们实现了输入验证模式,作为减轻跨站点脚本攻击的解决方案。使用我们的模式应用工具SPAAS,我们分析了包含121819行代码的OpenEMR软件。我们对易受XSS攻击的OpenEMR软件进行的实验耗时2.03秒,报告了总共121819行源代码中存在341个漏洞。我们使用我们的工具在这341行上实现拦截验证器模式,并且我们可以在2.28秒内在体系结构级别上成功地实现这些模式。我们修改的带有安全模式实现的OpenEMR版本将呈现给它的软件架构师,它将作为一个安全解决方案合并到存储库中。没有对安全模式的深刻理解,任何软件专业人员都可以使用我们建议的工具SPAAS在体系结构级别实现安全模式。
{"title":"Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications","authors":"Priya Anand, J. Ryoo","doi":"10.1109/ICSSA.2017.30","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.30","url":null,"abstract":"Security patterns are solutions for a recurring security issues that can be applied to mitigate security weaknesses in a software system. With an increased number of security patterns, the selection of a precise pattern to mitigate a vulnerability may become a challenging for software developers. When an appropriate pattern is identified as a potential solution by a software professional, applying that pattern and its level of integration is purely dependent on the software experts' skill and knowledge. Also, adopting the security pattern at an architectural level may be a time consuming and cumbersome task for software developers. To help the software developers' community by making this pattern implementation to be a relatively easy task, we developed a tool named - SPAAS - Security Patterns As Architectural Solution. This tool would automate the process of implementing the selected security pattern in the software system at an architectural level. Our tool was developed to assess potential vulnerabilities at an architectural level and possible fixes by adopting the selected security patterns. This tool checks the possibility of security patterns that have been already implemented in the system and accurately reports the results. In this paper, we demonstrate the use of our tool by conducting a case study on an open-source medical software, OpenEMR. Our analysis on OpenEMR software using the SPAAS tool pointed out the vulnerable source codes in the system that have been missed by some generic vulnerability assessment tools. Using our tool, we implemented the input validation pattern as a solution to mitigate cross-site scripting attacks. Using our pattern application tool, SPAAS, we analyzed OpenEMR software that has 121819 lines of codes. Our experiment on OpenEMR software that are vulnerable to XSS attacks took 2.03 seconds, and reported the presence of 341 spots of vulnerable codes from a total of 121819 lines of source code. We used our tool to implement intercepting validator pattern on those 341 lines, and we could successfully implement the patterns in 2.28 seconds at an architectural level. Our modified version of OpenEMR with security patterns implementation is presented to its software architect and it would be merged as a security solution in the repository. Without a deep understanding of security patterns, any software professional can implement the security pattern at an architectural level using our proposed tool, SPAAS.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enriching Security Education Hands-on Labs with Practical Exercises 丰富安全教育实践实验与实践练习
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.8
Min Jin Kwon, G. Kwak, Siyoung Jun, Hyung-Jong Kim, Hae Young Lee
It is widely known that learning-by-doing could significantly enhance students' learning in information security. SEED (SEcurity EDucation) labs being developed at Syracuse University can be particularly useful for students to learn security principles. Although the current version of SEED labs is mainly for university education, the labs could be also useful for job seekers and new employees in information security, by adding practical exercises. This paper presents our hands-on labs that could help these people perform more practical, compared to SEED labs, exercises within risk-free environments. Currently, our labs deal with macro malware, vulnerability scanning and mitigation, layer-7 DDoS attacks, and OS fingerprinting. Our labs are designed with the consideration of possible integration with SEED labs.
众所周知,边做边学可以显著提高学生在信息安全方面的学习。雪城大学(Syracuse University)正在开发的SEED(安全教育)实验室对于学生学习安全原理尤其有用。虽然目前的SEED实验室主要用于大学教育,但通过增加实践练习,这些实验室对求职者和信息安全领域的新员工也很有用。本文介绍了我们的动手实验,与SEED实验室相比,可以帮助这些人在无风险环境中进行更实际的练习。目前,我们的实验室处理宏恶意软件、漏洞扫描和缓解、7层DDoS攻击和操作系统指纹识别。我们的实验室在设计时考虑到可能与SEED实验室集成。
{"title":"Enriching Security Education Hands-on Labs with Practical Exercises","authors":"Min Jin Kwon, G. Kwak, Siyoung Jun, Hyung-Jong Kim, Hae Young Lee","doi":"10.1109/ICSSA.2017.8","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.8","url":null,"abstract":"It is widely known that learning-by-doing could significantly enhance students' learning in information security. SEED (SEcurity EDucation) labs being developed at Syracuse University can be particularly useful for students to learn security principles. Although the current version of SEED labs is mainly for university education, the labs could be also useful for job seekers and new employees in information security, by adding practical exercises. This paper presents our hands-on labs that could help these people perform more practical, compared to SEED labs, exercises within risk-free environments. Currently, our labs deal with macro malware, vulnerability scanning and mitigation, layer-7 DDoS attacks, and OS fingerprinting. Our labs are designed with the consideration of possible integration with SEED labs.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Quantification of Effectiveness of Simulation Models by Managing Cost of Development 通过管理开发成本来量化仿真模型的有效性
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.32
Hyung-Jong Kim, Hae Young Lee
Modeling and simulation is a way to improve the quality of a product. The people who make use of the model can interact with them and learn from them. The learning from simulation models includes user experiences, data gathering and analysis from the computer model. Meanwhile, the funding organizations and government bodies want to know the effectiveness of the construction and simulation of the models because it costs a lot. In this work, we are suggesting a procedure for data gathering and cost management of research and development project and we show that the procedure can be used to speculate effectiveness of simulation model construction. The contribution of this work is in showing a way to quantify the effectiveness of modeling and simulation for R&D projects.
建模和仿真是提高产品质量的一种方法。使用该模型的人可以与它们交互并向它们学习。从仿真模型中学习包括用户体验、数据收集和计算机模型分析。同时,由于模型的构建和仿真的成本很高,资助机构和政府机构都想知道模型的构建和仿真的有效性。在这项工作中,我们提出了一个研究开发项目的数据收集和成本管理程序,并表明该程序可以用来推测仿真模型构建的有效性。这项工作的贡献在于展示了一种量化研发项目建模和仿真有效性的方法。
{"title":"A Quantification of Effectiveness of Simulation Models by Managing Cost of Development","authors":"Hyung-Jong Kim, Hae Young Lee","doi":"10.1109/ICSSA.2017.32","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.32","url":null,"abstract":"Modeling and simulation is a way to improve the quality of a product. The people who make use of the model can interact with them and learn from them. The learning from simulation models includes user experiences, data gathering and analysis from the computer model. Meanwhile, the funding organizations and government bodies want to know the effectiveness of the construction and simulation of the models because it costs a lot. In this work, we are suggesting a procedure for data gathering and cost management of research and development project and we show that the procedure can be used to speculate effectiveness of simulation model construction. The contribution of this work is in showing a way to quantify the effectiveness of modeling and simulation for R&D projects.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124330751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Impact of Kernel Code Vulnerabilities in IoT Devices 物联网设备内核代码漏洞影响研究
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.16
Sebastian Eresheim, R. Luh, S. Schrittwieser
During the lifetime of an advanced persistent threat (APT) attackers compromise a potentially large number of computers to accomplish their ultimate objective. Very often these infected machines are used as a stepping stone towards obtaining control over the network and its resources. Stealth malware is left behind on these intermediate machines to disguise such propagation and takeover actions. With the Internet of things (IoT) gaining prominence, more and more devices appear on local networks, which significantly increase the overall attack surface. This new category of devices brings up new challenges and sees the return of many known attacks. Because of their rapidly growing numbers, IoT devices are being increasingly focused by APT actors during the initial installation phase. This paper focuses on one such a foothold attack, called Direct Kernel Object Manipulation (DKOM), and brings it into the context of the Internet of things.
在高级持续性威胁(APT)的生命周期中,攻击者会破坏潜在的大量计算机以实现其最终目标。通常,这些受感染的机器被用作控制网络及其资源的跳板。隐藏的恶意软件被留在这些中间机器上,以掩盖这种传播和接管行为。随着物联网(IoT)的日益突出,越来越多的设备出现在本地网络中,这大大增加了整体攻击面。这种新类型的设备带来了新的挑战,并且看到了许多已知攻击的回归。由于物联网设备的数量迅速增长,APT参与者在初始安装阶段越来越关注物联网设备。本文重点研究了一种称为直接核心对象操作(DKOM)的立足点攻击,并将其引入物联网的背景下。
{"title":"On the Impact of Kernel Code Vulnerabilities in IoT Devices","authors":"Sebastian Eresheim, R. Luh, S. Schrittwieser","doi":"10.1109/ICSSA.2017.16","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.16","url":null,"abstract":"During the lifetime of an advanced persistent threat (APT) attackers compromise a potentially large number of computers to accomplish their ultimate objective. Very often these infected machines are used as a stepping stone towards obtaining control over the network and its resources. Stealth malware is left behind on these intermediate machines to disguise such propagation and takeover actions. With the Internet of things (IoT) gaining prominence, more and more devices appear on local networks, which significantly increase the overall attack surface. This new category of devices brings up new challenges and sees the return of many known attacks. Because of their rapidly growing numbers, IoT devices are being increasingly focused by APT actors during the initial installation phase. This paper focuses on one such a foothold attack, called Direct Kernel Object Manipulation (DKOM), and brings it into the context of the Internet of things.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CNN-Based Android Malware Detection 基于cnn的Android恶意软件检测
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.18
M. Ganesh, Priyanka Pednekar, P. Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon
The growth in mobile devices has exponentially increased, making information easy to access but at the same time vulnerable. Malicious applications can gain access to sensitive and critical user information by exploiting unsolicited permission controls. Since high false detection rates render signature-based antivirus solutions on mobile phones ineffective, especially in malware variants, it is imperative to develop a more efficient and adaptable solution. This paper presents a deep learning-based malware detection to identify and categorize malicious applications. The proposed method investigates permission patterns based on a convolutional neural network. Our solution identifies malware with 93% accuracy on a dataset of 2500 Android applications, of which 2000 were malicious and 500 were benign.
移动设备的增长呈指数级增长,使信息易于访问,但同时也容易受到攻击。恶意应用程序可以利用未经请求的权限控制来访问敏感和关键的用户信息。由于高误检率使得基于签名的手机防病毒解决方案无效,特别是在恶意软件变体中,因此开发更高效、适应性更强的解决方案势在必行。本文提出了一种基于深度学习的恶意软件检测方法来识别和分类恶意应用程序。该方法基于卷积神经网络研究权限模式。我们的解决方案在2500个Android应用程序的数据集上识别恶意软件的准确率为93%,其中2000个是恶意的,500个是良性的。
{"title":"CNN-Based Android Malware Detection","authors":"M. Ganesh, Priyanka Pednekar, P. Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon","doi":"10.1109/ICSSA.2017.18","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.18","url":null,"abstract":"The growth in mobile devices has exponentially increased, making information easy to access but at the same time vulnerable. Malicious applications can gain access to sensitive and critical user information by exploiting unsolicited permission controls. Since high false detection rates render signature-based antivirus solutions on mobile phones ineffective, especially in malware variants, it is imperative to develop a more efficient and adaptable solution. This paper presents a deep learning-based malware detection to identify and categorize malicious applications. The proposed method investigates permission patterns based on a convolutional neural network. Our solution identifies malware with 93% accuracy on a dataset of 2500 Android applications, of which 2000 were malicious and 500 were benign.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
An Efficient Method for Securely Storing and Handling of Genomic Data 一种安全存储和处理基因组数据的有效方法
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.13
Youngjoon Ki, J. Yoon
With the growth of cloud computing, genomic data is considered to be stored and processed on cloud platform. However, existing file formats to store genomic data does not guarantee the security in case of data leakage by hacker. In this paper, we therefore propose an encrypted version of the variant call format (VCF), which is one of the most widely used file formats to store genomic sequences. The encrypted variant call format (eVCF) supports a privacy preserving data processing on encrypted data and requires only few more seconds and data size than existing VCF.
随着云计算的发展,基因组数据被认为是在云平台上存储和处理的。然而,现有的存储基因组数据的文件格式不能保证数据被黑客泄露时的安全性。因此,在本文中,我们提出了一种变体调用格式(VCF)的加密版本,这是最广泛使用的存储基因组序列的文件格式之一。加密变体调用格式(eVCF)支持对加密数据进行隐私保护数据处理,并且只需要比现有VCF多几秒钟和数据大小。
{"title":"An Efficient Method for Securely Storing and Handling of Genomic Data","authors":"Youngjoon Ki, J. Yoon","doi":"10.1109/ICSSA.2017.13","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.13","url":null,"abstract":"With the growth of cloud computing, genomic data is considered to be stored and processed on cloud platform. However, existing file formats to store genomic data does not guarantee the security in case of data leakage by hacker. In this paper, we therefore propose an encrypted version of the variant call format (VCF), which is one of the most widely used file formats to store genomic sequences. The encrypted variant call format (eVCF) supports a privacy preserving data processing on encrypted data and requires only few more seconds and data size than existing VCF.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Pattern Detection Using Ordered Matrix Matching 使用有序矩阵匹配的安全模式检测
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.24
A. Alvi, Mohammad Zulkernine
Security patterns implement security features in a software system. The missing or incomplete application of security patterns may produce vulnerabilities and invite attackers. Therefore, the detection of security patterns is the key to assuring security to software systems before release. In this paper, we propose a security pattern detection framework (SPDF) based on ordered matrix matching (OMM) technique. The framework provides a platform for data extraction, matching, and dictionary data checking. The experimental results show appropriate detection accuracy, reasonable time consumption, and zero false positives.
安全模式在软件系统中实现安全特性。缺少或不完整的安全模式应用可能会产生漏洞并招致攻击者。因此,安全模式的检测是保证软件系统在发布前安全性的关键。本文提出了一个基于有序矩阵匹配技术的安全模式检测框架(SPDF)。该框架为数据提取、匹配和字典数据检查提供了一个平台。实验结果表明,该方法检测精度高,耗时合理,无误报。
{"title":"Security Pattern Detection Using Ordered Matrix Matching","authors":"A. Alvi, Mohammad Zulkernine","doi":"10.1109/ICSSA.2017.24","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.24","url":null,"abstract":"Security patterns implement security features in a software system. The missing or incomplete application of security patterns may produce vulnerabilities and invite attackers. Therefore, the detection of security patterns is the key to assuring security to software systems before release. In this paper, we propose a security pattern detection framework (SPDF) based on ordered matrix matching (OMM) technique. The framework provides a platform for data extraction, matching, and dictionary data checking. The experimental results show appropriate detection accuracy, reasonable time consumption, and zero false positives.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adopting Attribute-Based Access Control to Data Distribution Service 基于属性的数据分发服务访问控制
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.23
P. Murugesan, S. Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim
The Internet of Things (IoT) is characterized by heterogeneous protocols and technologies which co-operate to provide various innovative services in various application domains. In the last few years, several protocols and approaches have been developed and proposed to support the connectivity, interoperability, and security in the IoT. The Data Distribution Service (DDS), which is a standard for data-centric publish/subscribe communication, is introduced to address interoperability in the IoT. DDS defines its own access control model that can be adapted to Attribute-Based Access Control (ABAC) for greater flexibility. In this work, we present a feasibility study on how Attribute-Based Access Control (ABAC) can be adopted to DDS.
物联网(IoT)的特点是异构协议和技术,这些协议和技术相互协作,在各种应用领域提供各种创新服务。在过去的几年中,已经开发并提出了几种协议和方法来支持物联网中的连通性、互操作性和安全性。数据分发服务(DDS)是一种以数据为中心的发布/订阅通信标准,旨在解决物联网中的互操作性问题。DDS定义了自己的访问控制模型,该模型可以适应基于属性的访问控制(ABAC),以获得更大的灵活性。本文对基于属性的访问控制(ABAC)在DDS中的应用进行了可行性研究。
{"title":"Adopting Attribute-Based Access Control to Data Distribution Service","authors":"P. Murugesan, S. Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim","doi":"10.1109/ICSSA.2017.23","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.23","url":null,"abstract":"The Internet of Things (IoT) is characterized by heterogeneous protocols and technologies which co-operate to provide various innovative services in various application domains. In the last few years, several protocols and approaches have been developed and proposed to support the connectivity, interoperability, and security in the IoT. The Data Distribution Service (DDS), which is a standard for data-centric publish/subscribe communication, is introduced to address interoperability in the IoT. DDS defines its own access control model that can be adapted to Attribute-Based Access Control (ABAC) for greater flexibility. In this work, we present a feasibility study on how Attribute-Based Access Control (ABAC) can be adopted to DDS.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116539392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration 通过循环枚举发现二进制代码中的加密算法
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.22
D. Buhov, Patrick Kochberger, Richard Thron, S. Schrittwieser
In benign programs, encryption is used to prevent sensitive data from being exposed. Malware, on the other hand, uses encryption to hide from analysis or perform malicious activities, e.g. ransomware. The challenge in detecting the presence of these cryptographic algorithms lies in the fact that it is generally not possible to identify the entire functionality of binary programs through static analysis. In this paper we present a novel approach for detecting specific cryptographic algorithms through control flow analysis based on symbolic execution. The control flow graph generated and symbolic execution done by the angr framework is used to search for loops. Nodes that are executed a certain number of times and in a specific order let us point out possible cryptographic activities. In the proof-of-concept implementation we were able to identify and differentiate DES, TripleDES and several variants of the AES algorithm. Our solution is able to detect the presence of these algorithms without access to the source code of the program. It also eliminates the need for a skilled operator to perform the analysis.
在良性程序中,加密用于防止敏感数据暴露。另一方面,恶意软件使用加密来隐藏分析或执行恶意活动,例如勒索软件。检测这些加密算法存在的挑战在于,通常不可能通过静态分析来识别二进制程序的全部功能。本文提出了一种基于符号执行的控制流分析来检测特定密码算法的新方法。使用angr框架生成的控制流图和符号执行来搜索循环。以特定顺序执行一定次数的节点可以让我们指出可能的加密活动。在概念验证实现中,我们能够识别和区分DES、TripleDES和AES算法的几个变体。我们的解决方案能够检测这些算法的存在,而无需访问程序的源代码。它还消除了对熟练操作员执行分析的需要。
{"title":"Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration","authors":"D. Buhov, Patrick Kochberger, Richard Thron, S. Schrittwieser","doi":"10.1109/ICSSA.2017.22","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.22","url":null,"abstract":"In benign programs, encryption is used to prevent sensitive data from being exposed. Malware, on the other hand, uses encryption to hide from analysis or perform malicious activities, e.g. ransomware. The challenge in detecting the presence of these cryptographic algorithms lies in the fact that it is generally not possible to identify the entire functionality of binary programs through static analysis. In this paper we present a novel approach for detecting specific cryptographic algorithms through control flow analysis based on symbolic execution. The control flow graph generated and symbolic execution done by the angr framework is used to search for loops. Nodes that are executed a certain number of times and in a specific order let us point out possible cryptographic activities. In the proof-of-concept implementation we were able to identify and differentiate DES, TripleDES and several variants of the AES algorithm. Our solution is able to detect the presence of these algorithms without access to the source code of the program. It also eliminates the need for a skilled operator to perform the analysis.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen 饼干和会议:研究它们是什么,它们是如何工作的以及它们是如何被窃取的
Pub Date : 2017-07-01 DOI: 10.1109/ICSSA.2017.9
Kenneth P. LaCroix, Yin L. Loo, Young B. Choi
We discuss cookies, a vital and relevant piece of technology that is used by many on the Internet today. Specifically, we talk about what a cookie is, how they work and how a cookie may be stolen from an end user to gain illegitimate access to accounts. A lab, utilized for both testing and demonstration consists of an attacker and a victim. Finally, we discuss mitigation techniques for end users.
我们将讨论cookie,这是当今互联网上许多人使用的一项至关重要且相关的技术。具体来说,我们将讨论什么是cookie,它们是如何工作的,以及如何从最终用户那里窃取cookie以获得对帐户的非法访问。用于测试和演示的实验室由攻击者和受害者组成。最后,我们讨论了针对最终用户的缓解技术。
{"title":"Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen","authors":"Kenneth P. LaCroix, Yin L. Loo, Young B. Choi","doi":"10.1109/ICSSA.2017.9","DOIUrl":"https://doi.org/10.1109/ICSSA.2017.9","url":null,"abstract":"We discuss cookies, a vital and relevant piece of technology that is used by many on the Internet today. Specifically, we talk about what a cookie is, how they work and how a cookie may be stolen from an end user to gain illegitimate access to accounts. A lab, utilized for both testing and demonstration consists of an attacker and a victim. Finally, we discuss mitigation techniques for end users.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124651365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 International Conference on Software Security and Assurance (ICSSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1