首页 > 最新文献

2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)最新文献

英文 中文
FP -TESTER : Automated Testing of Browser Fingerprint Resilience FP -TESTER:自动测试浏览器指纹弹性
Pub Date : 2018-04-27 DOI: 10.1109/EuroSPW.2018.00020
Antoine Vastel, Walter Rudametkin, Romain Rouvoy
Despite recent regulations and growing user awareness, undesired browser tracking is increasing. In addition to cookies, browser fingerprinting is a stateless technique that exploits a device's configuration for tracking purposes. In particular, browser fingerprinting builds on attributes made available from Javascript and HTTP headers to create a unique and stable fingerprint. For example, browser plugins have been heavily exploited by state-of-the-art browser fingerprinters as a rich source of entropy. However, as browser vendors abandon plugins in favor of extensions, fingerprinters will adapt. We present FP-TESTER, an approach to automatically test the effectiveness of browser fingerprinting countermeasure extensions. We implement a testing toolkit to be used by developers to reduce browser fingerprintability. While countermeasures aim to hinder tracking by changing or blocking attributes, they may easily introduce subtle side-effects that make browsers more identifiable, rendering the extensions counterproductive. FP-TESTER reports on the side-effects introduced by the countermeasure, as well as how they impact tracking duration from a fingerprinter's point-of-view. To the best of our knowledge, FP-TESTER is the first tool to assist developers in fighting browser fingerprinting and reducing the exposure of end-users to such privacy leaks.
尽管最近出台了相关法规,用户意识也在不断增强,但不受欢迎的浏览器跟踪仍在增加。除了cookie之外,浏览器指纹识别也是一种无状态技术,它利用设备的配置进行跟踪。特别是,浏览器指纹建立在Javascript和HTTP标头提供的属性上,以创建唯一且稳定的指纹。例如,浏览器插件已经被最先进的浏览器指纹识别器大量利用,成为一个丰富的熵源。然而,随着浏览器厂商放弃插件,转而支持扩展,指纹识别也会适应。我们提出了一种自动测试浏览器指纹对抗扩展有效性的方法FP-TESTER。我们实现了一个测试工具包,供开发人员使用,以减少浏览器的可识别性。虽然对策旨在通过更改或阻止属性来阻碍跟踪,但它们可能很容易引入微妙的副作用,使浏览器更容易被识别,从而使扩展产生反效果。FP-TESTER报告了反措施引入的副作用,以及它们如何从指纹识别者的角度影响跟踪时间。据我们所知,FP-TESTER是第一个帮助开发人员对抗浏览器指纹识别并减少最终用户暴露于此类隐私泄漏的工具。
{"title":"FP -TESTER : Automated Testing of Browser Fingerprint Resilience","authors":"Antoine Vastel, Walter Rudametkin, Romain Rouvoy","doi":"10.1109/EuroSPW.2018.00020","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00020","url":null,"abstract":"Despite recent regulations and growing user awareness, undesired browser tracking is increasing. In addition to cookies, browser fingerprinting is a stateless technique that exploits a device's configuration for tracking purposes. In particular, browser fingerprinting builds on attributes made available from Javascript and HTTP headers to create a unique and stable fingerprint. For example, browser plugins have been heavily exploited by state-of-the-art browser fingerprinters as a rich source of entropy. However, as browser vendors abandon plugins in favor of extensions, fingerprinters will adapt. We present FP-TESTER, an approach to automatically test the effectiveness of browser fingerprinting countermeasure extensions. We implement a testing toolkit to be used by developers to reduce browser fingerprintability. While countermeasures aim to hinder tracking by changing or blocking attributes, they may easily introduce subtle side-effects that make browsers more identifiable, rendering the extensions counterproductive. FP-TESTER reports on the side-effects introduced by the countermeasure, as well as how they impact tracking duration from a fingerprinter's point-of-view. To the best of our knowledge, FP-TESTER is the first tool to assist developers in fighting browser fingerprinting and reducing the exposure of end-users to such privacy leaks.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Transparency and Consent in the IoT 提高物联网的透明度和共识
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00023
C. Castelluccia, M. Cunche, D. Métayer, Victor Morel
The development of the IoT raises specific questions in terms of privacy, especially with respect to information to users and consent. We argue that (1) all necessary information about collected data and the collecting devices should be communicated electronically to all data subjects in their range and (2) data subjects should be able to reply also electronically and express their own privacy choices. In this position paper, we take some examples of technologies and initiatives to illustrate our position (including direct and registry-based communications) and discuss them in the light of the GDPR and the WP29 recommendations.
物联网的发展在隐私方面提出了具体的问题,特别是在用户信息和同意方面。我们认为(1)关于收集数据和收集设备的所有必要信息应以电子方式传达给其范围内的所有数据主体;(2)数据主体也应能够以电子方式回复并表达他们自己的隐私选择。在本立场文件中,我们采用了一些技术和举措的例子来说明我们的立场(包括直接和基于注册的通信),并根据GDPR和WP29建议进行讨论。
{"title":"Enhancing Transparency and Consent in the IoT","authors":"C. Castelluccia, M. Cunche, D. Métayer, Victor Morel","doi":"10.1109/EuroSPW.2018.00023","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00023","url":null,"abstract":"The development of the IoT raises specific questions in terms of privacy, especially with respect to information to users and consent. We argue that (1) all necessary information about collected data and the collecting devices should be communicated electronically to all data subjects in their range and (2) data subjects should be able to reply also electronically and express their own privacy choices. In this position paper, we take some examples of technologies and initiatives to illustrate our position (including direct and registry-based communications) and discuss them in the light of the GDPR and the WP29 recommendations.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies 如何挤人群:减少混合加密货币的带宽
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00012
Alishah Chator, M. Green
Several popular cryptocurrencies incorporate privacy features that "mix" real transactions with cover traffic in order to obfuscate the public transaction graph. The underlying protocols, which include CryptoNote and Monero's RingCT, work by first identifying a real transaction output (TXO), sampling a number of cover outputs, and transmitting the entire resulting set to verifiers, along with a zero knowledge (or WI) proof that hides the identity of the real transaction. Unfortunately, many of these schemes suffer from a practical limitation: the description of the combined input set grows linearly with size of the anonymity set. In this work we propose a simple technique for efficiently sampling cover traffic from a finite (and public) set of known values, while deriving a compact description of the resulting transaction set. This technique, which is based on programmable hash functions, allows us to dramatically reduce transaction bandwidth when large cover sets are used.We refer to our construction as a recoverable sampling scheme, and note that it may be of independent interest for other privacy applications. We present formal security definitions; prove our constructions secure; and show how these constructions can be integrated with various currencies and different cover sampling distributions.
一些流行的加密货币包含隐私功能,将真实交易与覆盖流量“混合”在一起,以混淆公共交易图。底层协议,包括CryptoNote和Monero的RingCT,通过首先识别真实交易输出(TXO),采样一些覆盖输出,并将整个结果集传输给验证者,以及隐藏真实交易身份的零知识(或WI)证明来工作。不幸的是,这些方案中的许多都有一个实际的限制:组合输入集的描述随着匿名集的大小线性增长。在这项工作中,我们提出了一种简单的技术,可以从有限的(和公共的)已知值集中有效地采样覆盖流量,同时推导出结果事务集的紧凑描述。这种基于可编程散列函数的技术允许我们在使用大型覆盖集时显着减少事务带宽。我们将我们的构造称为可恢复采样方案,并注意它可能对其他隐私应用程序具有独立的兴趣。我们给出了正式的安全定义;证明我们的建筑是安全的;并说明如何将这些结构与各种货币和不同的覆盖抽样分布相结合。
{"title":"How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies","authors":"Alishah Chator, M. Green","doi":"10.1109/EuroSPW.2018.00012","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00012","url":null,"abstract":"Several popular cryptocurrencies incorporate privacy features that \"mix\" real transactions with cover traffic in order to obfuscate the public transaction graph. The underlying protocols, which include CryptoNote and Monero's RingCT, work by first identifying a real transaction output (TXO), sampling a number of cover outputs, and transmitting the entire resulting set to verifiers, along with a zero knowledge (or WI) proof that hides the identity of the real transaction. Unfortunately, many of these schemes suffer from a practical limitation: the description of the combined input set grows linearly with size of the anonymity set. In this work we propose a simple technique for efficiently sampling cover traffic from a finite (and public) set of known values, while deriving a compact description of the resulting transaction set. This technique, which is based on programmable hash functions, allows us to dramatically reduce transaction bandwidth when large cover sets are used.We refer to our construction as a recoverable sampling scheme, and note that it may be of independent interest for other privacy applications. We present formal security definitions; prove our constructions secure; and show how these constructions can be integrated with various currencies and different cover sampling distributions.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy Risk Analysis to Enable Informed Privacy Settings 隐私风险分析以启用知情隐私设置
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00019
S. De, D. Métayer
The work described in this paper is a contribution to enhancing individual control over personal data which is promoted, inter alia, by the new EU General Data Protection Regulation. We propose a method to enable better informed choices of privacy settings. The method relies on a privacy risk analysis parameterized by privacy settings. The user can express his choices, visualize their impact on the privacy risks through a user-friendly interface and, if needed, decide to revise them to reduce risks to an acceptable level.
本文中描述的工作是对加强个人对个人数据的控制的贡献,除其他外,这是由新的欧盟一般数据保护条例所促进的。我们提出了一种方法,以实现更好的知情选择的隐私设置。该方法依赖于隐私设置参数化的隐私风险分析。用户可以通过用户友好的界面表达他的选择,可视化其对隐私风险的影响,并在需要时决定修改它们以将风险降低到可接受的水平。
{"title":"Privacy Risk Analysis to Enable Informed Privacy Settings","authors":"S. De, D. Métayer","doi":"10.1109/EuroSPW.2018.00019","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00019","url":null,"abstract":"The work described in this paper is a contribution to enhancing individual control over personal data which is promoted, inter alia, by the new EU General Data Protection Regulation. We propose a method to enable better informed choices of privacy settings. The method relies on a privacy risk analysis parameterized by privacy settings. The user can express his choices, visualize their impact on the privacy risks through a user-friendly interface and, if needed, decide to revise them to reduce risks to an acceptable level.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution 基于分布式无信任证明的物联网软件更新激励交付网络
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00011
Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, A. Shabtai
The Internet of Things (IoT) network of connected devices currently contains more than 11 billion devices and is estimated to double in size within the next four years. The prevalence of these devices makes them an ideal target for attackers. To reduce the risk of attacks vendors routinely deliver security updates (patches) for their devices. The delivery of security updates becomes challenging due to the issue of scalability as the number of devices may grow much quicker than vendors' distribution systems. Previous studies have suggested a permissionless and decentralized blockchainbased network in which nodes can host and deliver security updates, thus the addition of new nodes scales out the network. However, these studies do not provide an incentive for nodes to join the network, making it unlikely for nodes to freely contribute their hosting space, bandwidth, and computation resources. In this paper, we propose a novel decentralized IoT software update delivery network in which participating nodes (referred to as distributors) are compensated by vendors with digital currency for delivering updates to devices. Upon the release of a new security update, a vendor will make a commitment to provide digital currency to distributors that deliver the update; the commitment will be made with the use of smart contracts, and hence will be public, binding, and irreversible. The smart contract promises compensation to any distributor that provides proof-of-distribution, which is unforgeable proof that a single update was delivered to a single device. A distributor acquires the proof-of-distribution by exchanging a security update for a device signature using the Zero-Knowledge Contingent Payment (ZKCP) trustless data exchange protocol. Eliminating the need for trust between the security update distributor and the security consumer (IoT device) by providing fair compensation, can significantly increase the number of distributors, thus facilitating rapid scale out.
物联网(IoT)连接设备网络目前包含超过110亿个设备,预计在未来四年内将翻一番。这些设备的流行使它们成为攻击者的理想目标。为了降低攻击的风险,供应商通常会为其设备提供安全更新(补丁)。由于设备数量的增长速度可能比供应商的分发系统快得多,因此由于可伸缩性问题,安全更新的交付变得具有挑战性。先前的研究提出了一种基于区块链的无许可和去中心化网络,其中节点可以托管和提供安全更新,因此增加新节点可以扩展网络。然而,这些研究并没有为节点加入网络提供激励,使得节点不太可能自由地贡献它们的托管空间、带宽和计算资源。在本文中,我们提出了一种新的分散式物联网软件更新交付网络,其中参与节点(称为分销商)由供应商用数字货币补偿向设备提供更新。在发布新的安全更新后,供应商将承诺向提供更新的分销商提供数字货币;承诺将使用智能合约进行,因此将是公开的、有约束力的和不可逆转的。智能合约承诺补偿任何提供分发证明的分销商,这是一个不可伪造的证明,证明单个更新被传递到单个设备。分发者通过使用零知识或有支付(ZKCP)无信任数据交换协议交换设备签名的安全更新来获得分发证明。通过提供公平的补偿,消除安全更新分发者和安全消费者(物联网设备)之间的信任需求,可以显着增加分发者的数量,从而促进快速扩展。
{"title":"Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution","authors":"Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, A. Shabtai","doi":"10.1109/EuroSPW.2018.00011","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00011","url":null,"abstract":"The Internet of Things (IoT) network of connected devices currently contains more than 11 billion devices and is estimated to double in size within the next four years. The prevalence of these devices makes them an ideal target for attackers. To reduce the risk of attacks vendors routinely deliver security updates (patches) for their devices. The delivery of security updates becomes challenging due to the issue of scalability as the number of devices may grow much quicker than vendors' distribution systems. Previous studies have suggested a permissionless and decentralized blockchainbased network in which nodes can host and deliver security updates, thus the addition of new nodes scales out the network. However, these studies do not provide an incentive for nodes to join the network, making it unlikely for nodes to freely contribute their hosting space, bandwidth, and computation resources. In this paper, we propose a novel decentralized IoT software update delivery network in which participating nodes (referred to as distributors) are compensated by vendors with digital currency for delivering updates to devices. Upon the release of a new security update, a vendor will make a commitment to provide digital currency to distributors that deliver the update; the commitment will be made with the use of smart contracts, and hence will be public, binding, and irreversible. The smart contract promises compensation to any distributor that provides proof-of-distribution, which is unforgeable proof that a single update was delivered to a single device. A distributor acquires the proof-of-distribution by exchanging a security update for a device signature using the Zero-Knowledge Contingent Payment (ZKCP) trustless data exchange protocol. Eliminating the need for trust between the security update distributor and the security consumer (IoT device) by providing fair compensation, can significantly increase the number of distributors, thus facilitating rapid scale out.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The Impact of Uncle Rewards on Selfish Mining in Ethereum 大叔奖励对以太坊自私挖矿的影响
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00013
Fabian Ritz, A. Zugenmaier
Many of today's crypto currencies use blockchains as decentralized ledgers and secure them with proof of work. In case of a fork of the chain, Bitcoin's rule for achieving consensus is selecting the longest chain and discarding the other chain as stale. It has been demonstrated that this consensus rule has a weakness against selfish mining in which the selfish miner exploits the variance in block generation by partially withholding blocks. In Ethereum, however, under certain conditions stale blocks don't have to be discarded but can be referenced from the main chain as uncle blocks yielding a partial reward. This concept limits the impact of network delays on the expected revenue for miners. But the concept also reduces the risk for a selfish miner to gain no rewards from withholding a freshly minted block. This paper uses a Monte Carlo simulation to quantify the effect of uncle blocks both to the profitability of selfish mining and the blockchain's security in Ethereum (ETH). A brief outlook about a recent Ethereum Classic (ETC) improvement proposal that weighs uncle blocks during the selection of the main chain will be given.
今天的许多加密货币使用区块链作为分散的分类账,并通过工作量证明来保护它们。在链分叉的情况下,比特币达成共识的规则是选择最长的链,并丢弃另一条过时的链。已经证明,这种共识规则对自私挖矿有一个弱点,在自私挖矿中,自私的矿工通过部分扣留区块来利用区块生成的方差。然而,在以太坊中,在某些条件下,陈旧的区块不必被丢弃,而是可以从主链中引用,作为产生部分奖励的大叔区块。这个概念限制了网络延迟对矿工预期收入的影响。但这个概念也降低了自私的矿工从扣留新挖出的区块中得不到奖励的风险。本文使用蒙特卡罗模拟来量化大叔块对自私采矿的盈利能力和以太坊(ETH)区块链安全性的影响。本文将简要介绍最近的以太坊经典(ETC)改进提案,该提案在选择主链时对叔块进行加权。
{"title":"The Impact of Uncle Rewards on Selfish Mining in Ethereum","authors":"Fabian Ritz, A. Zugenmaier","doi":"10.1109/EuroSPW.2018.00013","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00013","url":null,"abstract":"Many of today's crypto currencies use blockchains as decentralized ledgers and secure them with proof of work. In case of a fork of the chain, Bitcoin's rule for achieving consensus is selecting the longest chain and discarding the other chain as stale. It has been demonstrated that this consensus rule has a weakness against selfish mining in which the selfish miner exploits the variance in block generation by partially withholding blocks. In Ethereum, however, under certain conditions stale blocks don't have to be discarded but can be referenced from the main chain as uncle blocks yielding a partial reward. This concept limits the impact of network delays on the expected revenue for miners. But the concept also reduces the risk for a selfish miner to gain no rewards from withholding a freshly minted block. This paper uses a Monte Carlo simulation to quantify the effect of uncle blocks both to the profitability of selfish mining and the blockchain's security in Ethereum (ETH). A brief outlook about a recent Ethereum Classic (ETC) improvement proposal that weighs uncle blocks during the selection of the main chain will be given.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115580511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Privacy Compliance Via Model Transformations 通过模型转换实现隐私遵从性
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00024
Thibaud Antignac, R. Scandariato, G. Schneider
Due to the upcoming, more restrictive regulations (like the European GDPR), designing privacy preserving architectures for information systems is becoming a pressing concern for practitioners. In particular, verifying that a design is compliant with the regulations might be a challenging task for engineers. This work presents an approach based on model transformations, which guarantee that an architectural design encompasses regulation-oriented principles such as purpose limitation, or accountability of the data controller. Our work improves the state of the art along two main dimensions. The approach we propose (i) embeds privacy principles coming from regulations, thus helping to bridge the gap between the technical and the legal worlds, (ii) systematize the embedding of the privacy principles coming from regulations, thus enabling a constructive approach to privacy by design.
由于即将出台的更严格的法规(如欧洲GDPR),为信息系统设计隐私保护架构正成为从业者迫切关注的问题。特别是,验证设计是否符合法规对工程师来说可能是一项具有挑战性的任务。这项工作提出了一种基于模型转换的方法,它保证体系结构设计包含面向规则的原则,如目的限制或数据控制器的责任。我们的工作在两个主要方面提高了技术水平。我们提出的方法(i)嵌入来自法规的隐私原则,从而有助于弥合技术和法律世界之间的差距;(ii)将来自法规的隐私原则的嵌入系统化,从而通过设计实现建设性的隐私方法。
{"title":"Privacy Compliance Via Model Transformations","authors":"Thibaud Antignac, R. Scandariato, G. Schneider","doi":"10.1109/EuroSPW.2018.00024","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00024","url":null,"abstract":"Due to the upcoming, more restrictive regulations (like the European GDPR), designing privacy preserving architectures for information systems is becoming a pressing concern for practitioners. In particular, verifying that a design is compliant with the regulations might be a challenging task for engineers. This work presents an approach based on model transformations, which guarantee that an architectural design encompasses regulation-oriented principles such as purpose limitation, or accountability of the data controller. Our work improves the state of the art along two main dimensions. The approach we propose (i) embeds privacy principles coming from regulations, thus helping to bridge the gap between the technical and the legal worlds, (ii) systematize the embedding of the privacy principles coming from regulations, thus enabling a constructive approach to privacy by design.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Blockchain as a Service (BaaS): Providers and Trust 区块链即服务(BaaS):提供者和信任
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00015
Jatinder Singh, Johan David Michels
Distributed ledger technologies (DLTs) are receiving much attention. As discussion focuses on the potential applications of DLTs, Blockchain-as-a-Service (BaaS) offerings are emerging to provide the underlying supporting infrastructure. BaaS entails a service provider supplying and managing aspects of a DLT infrastructure to facilitate and bring efficiencies regarding the development, experimentation, deployment, and the ongoing management of DLT applications. However, much of the interest in DLTs stems from their potential to decentralise, disintermediate, and enable ‘trustless’ interactions. At first sight, BaaS – being offered by a provider – appears to run counter to this. In practice, whether BaaS raises substantive trust concerns depends on the nature of the offering, the application's specifics, and the participants' goals and risk appetite. This paper elaborates the nature of BaaS and explores the trust considerations it raises, particularly regarding the role of providers as part of a wider infrastructure.
分布式账本技术(dlt)正受到越来越多的关注。随着讨论集中在dlt的潜在应用上,区块链即服务(BaaS)产品正在出现,以提供底层支持基础设施。BaaS需要服务提供商提供和管理DLT基础设施的各个方面,以促进和提高DLT应用程序的开发、实验、部署和持续管理的效率。然而,人们对dlt的兴趣很大程度上源于它们去中心化、去中介化和实现“无需信任”互动的潜力。乍一看,由提供商提供的BaaS似乎与此背道而驰。在实践中,BaaS是否会引起实质性的信任问题取决于产品的性质、应用程序的细节以及参与者的目标和风险偏好。本文阐述了BaaS的本质,并探讨了它所引起的信任问题,特别是关于提供商作为更广泛的基础设施的一部分的角色。
{"title":"Blockchain as a Service (BaaS): Providers and Trust","authors":"Jatinder Singh, Johan David Michels","doi":"10.1109/EuroSPW.2018.00015","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00015","url":null,"abstract":"Distributed ledger technologies (DLTs) are receiving much attention. As discussion focuses on the potential applications of DLTs, Blockchain-as-a-Service (BaaS) offerings are emerging to provide the underlying supporting infrastructure. BaaS entails a service provider supplying and managing aspects of a DLT infrastructure to facilitate and bring efficiencies regarding the development, experimentation, deployment, and the ongoing management of DLT applications. However, much of the interest in DLTs stems from their potential to decentralise, disintermediate, and enable ‘trustless’ interactions. At first sight, BaaS – being offered by a provider – appears to run counter to this. In practice, whether BaaS raises substantive trust concerns depends on the nature of the offering, the application's specifics, and the participants' goals and risk appetite. This paper elaborates the nature of BaaS and explores the trust considerations it raises, particularly regarding the role of providers as part of a wider infrastructure.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Decentralizing Digital Identity: Open Challenges for Distributed Ledgers 去中心化数字身份:分布式账本的公开挑战
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00016
Paul Dunphy, L. Garratt, F. Petitcolas
Distributed Ledger Technology (DLT) has been proposed as a new way to incorporate decentralization into a wide range of digital infrastructures. Applications of DLT to digital identity are increasing in prevalence, with a recent survey reporting that 55% of DLT technologies in development track digital identity. However, while proofs of concept, open source software, and new ideas are readily available, it is still unclear the extent to which DLT can play a role to underpin new forms of digital identity. In this position paper, we situate this fast-moving application domain into the broader challenges faced in digital identity, with the aim to highlight the socio-technical nature of the challenge at hand, and to propose directions for future research.
分布式账本技术(DLT)已被提出作为一种将去中心化纳入广泛的数字基础设施的新方法。DLT在数字身份方面的应用越来越普遍,最近的一项调查显示,55%的DLT技术正在开发中,追踪数字身份。然而,尽管概念证明、开源软件和新想法很容易获得,但DLT在支持新形式的数字身份方面能发挥多大作用仍不清楚。在本立场文件中,我们将这个快速发展的应用领域置于数字身份面临的更广泛挑战中,旨在突出当前挑战的社会技术性质,并为未来的研究提出方向。
{"title":"Decentralizing Digital Identity: Open Challenges for Distributed Ledgers","authors":"Paul Dunphy, L. Garratt, F. Petitcolas","doi":"10.1109/EuroSPW.2018.00016","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00016","url":null,"abstract":"Distributed Ledger Technology (DLT) has been proposed as a new way to incorporate decentralization into a wide range of digital infrastructures. Applications of DLT to digital identity are increasing in prevalence, with a recent survey reporting that 55% of DLT technologies in development track digital identity. However, while proofs of concept, open source software, and new ideas are readily available, it is still unclear the extent to which DLT can play a role to underpin new forms of digital identity. In this position paper, we situate this fast-moving application domain into the broader challenges faced in digital identity, with the aim to highlight the socio-technical nature of the challenge at hand, and to propose directions for future research.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Vulnerability Detection on Mobile Applications Using State Machine Inference 基于状态机推理的移动应用漏洞检测
Pub Date : 2018-04-23 DOI: 10.1109/EuroSPW.2018.00008
Wesley van der Lee, S. Verwer
Although the importance of mobile applications grows every day, recent vulnerability reports argue the application's deficiency to meet modern security standards. Testing strategies alleviate the problem by identifying security violations in software implementations. This paper proposes a novel testing methodology that applies state machine learning of mobile Android applications in combination with algorithms that discover attack paths in the learned state machine. The presence of an attack path evidences the existence of a vulnerability in the mobile application. We apply our methods to real-life apps and show that the novel methodology is capable of identifying vulnerabilities.
尽管移动应用程序的重要性与日俱增,但最近的漏洞报告认为,该应用程序在满足现代安全标准方面存在不足。测试策略通过识别软件实现中的安全违规来缓解这个问题。本文提出了一种新的测试方法,该方法将移动Android应用程序的状态机学习与在学习状态机中发现攻击路径的算法相结合。攻击路径的存在证明移动应用程序中存在漏洞。我们将我们的方法应用于现实生活中的应用程序,并表明这种新方法能够识别漏洞。
{"title":"Vulnerability Detection on Mobile Applications Using State Machine Inference","authors":"Wesley van der Lee, S. Verwer","doi":"10.1109/EuroSPW.2018.00008","DOIUrl":"https://doi.org/10.1109/EuroSPW.2018.00008","url":null,"abstract":"Although the importance of mobile applications grows every day, recent vulnerability reports argue the application's deficiency to meet modern security standards. Testing strategies alleviate the problem by identifying security violations in software implementations. This paper proposes a novel testing methodology that applies state machine learning of mobile Android applications in combination with algorithms that discover attack paths in the learned state machine. The presence of an attack path evidences the existence of a vulnerability in the mobile application. We apply our methods to real-life apps and show that the novel methodology is capable of identifying vulnerabilities.","PeriodicalId":326280,"journal":{"name":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1