首页 > 最新文献

2006 IEEE Information Assurance Workshop最新文献

英文 中文
Profiling Users in GUI Based Systems for Masquerade Detection 在基于GUI的伪装检测系统中分析用户
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652076
Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, Kevin Kwiat
Masquerading or impersonation attack refers to the illegitimate activity on a computer system when one user impersonates another user. Masquerade attacks are serious in nature due to the fact that they are mostly carried by insiders and thus are extremely difficult to detect. Detection of these attacks is done by monitoring significant changes in user's behavior based on his/her profile. Currently, such profiles are based mostly on the user command line data and do not represent his/her complete behavior in a graphical user interface (GUI) based system and hence are not sufficient to quickly detect such masquerade attacks. In this paper, we present a new framework for creating a unique feature set for user behavior on GUI based systems. We have collected real user behavior data from live systems and extracted parameters to construct these feature vectors. These vectors contain user information such as mouse speed, distance, angles and amount of clicks during a user session. We model our technique of user identification and masquerade detection as a binary classification problem and use support vector machine (SVM) to learn and classify these feature vectors. We show that our technique can provide detection rates of up to 96% with few false positives based on these feature vectors. We have tested our technique with various feature vector parameters and conclude that these feature vectors can provide unique and comprehensive user behavior information and are powerful enough to detect masqueraders
伪装或冒充攻击是指一个用户冒充另一个用户在计算机系统上进行的非法活动。伪装攻击本质上是严重的,因为它们大多是由内部人员进行的,因此很难被发现。检测这些攻击是通过根据用户的个人资料监测用户行为的重大变化来完成的。目前,这些配置文件主要基于用户命令行数据,并不能代表他/她在基于图形用户界面(GUI)的系统中的完整行为,因此不足以快速检测此类伪装攻击。在本文中,我们提出了一个新的框架,为基于GUI的系统创建一个独特的用户行为特征集。我们从实时系统中收集了真实的用户行为数据,并提取参数来构建这些特征向量。这些向量包含用户信息,如鼠标速度、距离、角度和用户会话期间的点击次数。我们将用户识别和伪装检测技术建模为二元分类问题,并使用支持向量机(SVM)来学习和分类这些特征向量。我们表明,基于这些特征向量,我们的技术可以提供高达96%的检测率,并且很少有误报。我们用不同的特征向量参数测试了我们的技术,并得出结论,这些特征向量可以提供独特而全面的用户行为信息,并且足够强大,可以检测假面者
{"title":"Profiling Users in GUI Based Systems for Masquerade Detection","authors":"Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, Kevin Kwiat","doi":"10.1109/IAW.2006.1652076","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652076","url":null,"abstract":"Masquerading or impersonation attack refers to the illegitimate activity on a computer system when one user impersonates another user. Masquerade attacks are serious in nature due to the fact that they are mostly carried by insiders and thus are extremely difficult to detect. Detection of these attacks is done by monitoring significant changes in user's behavior based on his/her profile. Currently, such profiles are based mostly on the user command line data and do not represent his/her complete behavior in a graphical user interface (GUI) based system and hence are not sufficient to quickly detect such masquerade attacks. In this paper, we present a new framework for creating a unique feature set for user behavior on GUI based systems. We have collected real user behavior data from live systems and extracted parameters to construct these feature vectors. These vectors contain user information such as mouse speed, distance, angles and amount of clicks during a user session. We model our technique of user identification and masquerade detection as a binary classification problem and use support vector machine (SVM) to learn and classify these feature vectors. We show that our technique can provide detection rates of up to 96% with few false positives based on these feature vectors. We have tested our technique with various feature vector parameters and conclude that these feature vectors can provide unique and comprehensive user behavior information and are powerful enough to detect masqueraders","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Test Bed for Assessment of CNO and EW Against Emulated Wireless Ad Hoc Networks CNO和EW对模拟无线自组织网络的测试平台
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652112
Erika Johansson, Mats Persson
This paper describes a test bed for assessment of computer network operations (CNO) and electronic warfare (EW) against wireless ad hoc networks. The test bed allows real applications to exchange real traffic over the emulated wireless network. Examples of test bed use are presented, along with some initial results
本文介绍了一种用于对无线自组织网络进行计算机网络作战和电子战评估的试验台。测试平台允许真实的应用程序在模拟无线网络上交换真实的流量。给出了使用试验台的例子,以及一些初步结果
{"title":"Test Bed for Assessment of CNO and EW Against Emulated Wireless Ad Hoc Networks","authors":"Erika Johansson, Mats Persson","doi":"10.1109/IAW.2006.1652112","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652112","url":null,"abstract":"This paper describes a test bed for assessment of computer network operations (CNO) and electronic warfare (EW) against wireless ad hoc networks. The test bed allows real applications to exchange real traffic over the emulated wireless network. Examples of test bed use are presented, along with some initial results","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptography Software System using Galois Field Arithmetic 基于伽罗瓦域算法的密码软件系统
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652124
A. Desoky, A. Ashikhmin
Cryptography software system (CSS) is a set of tools to simulate and analyze a number of cryptography algorithms. It is written using Microsoft C# programming language and has a user friendly GUI. Arithmetic operations for encryption and decryption are in GF(28 ) and the analysis provides the user with the basic statistics of data before and after the application of the selected cryptography algorithm. Along with the implementation of five cryptography algorithms (affine, Vigenere, linear-feedback-shift-register, one-time-pad, and weighted sum), CSS is built modularly and the ability to add more algorithms is a definite advantage
密码学软件系统(Cryptography software system, CSS)是一套用于模拟和分析多种密码学算法的工具。它是使用微软c#编程语言编写的,具有用户友好的GUI。加密和解密的算术运算在GF(28)中,分析为用户提供了所选加密算法应用前后数据的基本统计。随着五种加密算法(仿射、Vigenere、线性反馈移位寄存器、一次性填充和加权和)的实现,CSS是模块化构建的,并且能够添加更多算法是一个明显的优势
{"title":"Cryptography Software System using Galois Field Arithmetic","authors":"A. Desoky, A. Ashikhmin","doi":"10.1109/IAW.2006.1652124","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652124","url":null,"abstract":"Cryptography software system (CSS) is a set of tools to simulate and analyze a number of cryptography algorithms. It is written using Microsoft C# programming language and has a user friendly GUI. Arithmetic operations for encryption and decryption are in GF(28 ) and the analysis provides the user with the basic statistics of data before and after the application of the selected cryptography algorithm. Along with the implementation of five cryptography algorithms (affine, Vigenere, linear-feedback-shift-register, one-time-pad, and weighted sum), CSS is built modularly and the ability to add more algorithms is a definite advantage","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Visualization of GIS Data GIS数据的安全可视化
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652096
S. Wolthusen
Modern GIS systems increasingly rely on server-side rendering and Web services for the rendering of geographical and application-specific data for both efficiency and security reasons since the underlying data sets for critical infrastructures and emergency operations are typically extremely sensitive. Given that display devices can be spread in the field on mobile devices, the ability to track and trace leaking and misuse of visualization data is of critical importance. In this paper we describe a technique to insert robust steganographic markings into the rendering process for GIS data based on context-sensitive texture adaptation along with a system architecture for marking and tracing GIS service data over a standards-based communication channel
出于效率和安全原因,现代地理信息系统越来越依赖服务器端呈现和Web服务来呈现地理和特定应用程序的数据,因为关键基础设施和紧急行动的底层数据集通常极其敏感。鉴于显示设备可以在移动设备上传播,因此跟踪和追踪可视化数据泄露和滥用的能力至关重要。在本文中,我们描述了一种将鲁棒隐写标记插入GIS数据渲染过程的技术,该技术基于上下文敏感的纹理自适应,以及通过基于标准的通信通道标记和跟踪GIS服务数据的系统架构
{"title":"Secure Visualization of GIS Data","authors":"S. Wolthusen","doi":"10.1109/IAW.2006.1652096","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652096","url":null,"abstract":"Modern GIS systems increasingly rely on server-side rendering and Web services for the rendering of geographical and application-specific data for both efficiency and security reasons since the underlying data sets for critical infrastructures and emergency operations are typically extremely sensitive. Given that display devices can be spread in the field on mobile devices, the ability to track and trace leaking and misuse of visualization data is of critical importance. In this paper we describe a technique to insert robust steganographic markings into the rendering process for GIS data based on context-sensitive texture adaptation along with a system architecture for marking and tracing GIS service data over a standards-based communication channel","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rendering the Elephant: Characterizing Sensitive Networks for an Uncleared Audience 渲染大象:为未清除的观众描述敏感网络
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652097
R. Stapleton-Gray, S. Gorton
There is a need to convey information on sensitive networks and systems, specifically, those carrying classified information, to researchers lacking clearances. Sanitization or use of analogs allows for uncleared researchers to make contributions, but as detail is removed, data may become less useful. A number of approaches to feeding research with relevant data are described, including creation of realistic traffic from a national intelligence community network, and recommendations made for improving current practices
有必要向缺乏许可的研究人员传达敏感网络和系统的信息,特别是那些携带机密信息的信息。消毒或使用类似物允许未被清除的研究人员做出贡献,但随着细节的删除,数据可能变得不那么有用。介绍了为研究提供相关数据的一些方法,包括从国家情报界网络创建实际流量,以及为改进当前做法提出的建议
{"title":"Rendering the Elephant: Characterizing Sensitive Networks for an Uncleared Audience","authors":"R. Stapleton-Gray, S. Gorton","doi":"10.1109/IAW.2006.1652097","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652097","url":null,"abstract":"There is a need to convey information on sensitive networks and systems, specifically, those carrying classified information, to researchers lacking clearances. Sanitization or use of analogs allows for uncleared researchers to make contributions, but as detail is removed, data may become less useful. A number of approaches to feeding research with relevant data are described, including creation of realistic traffic from a national intelligence community network, and recommendations made for improving current practices","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Location-Based Pairwise Key Establishment and Data Authentication for Wireless Sensor Networks 基于位置的无线传感器网络配对密钥建立与数据认证
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652102
Cungang Yang, Jie Xiao
Sensor networks are often deployed in unattended environment, thus leaving those networks vulnerable to false data injection attacks. Attackers often inject false data into the network in order to deceive the base station or deplete the resource and the energy of the relaying nodes. The existing authentication mechanisms cannot prevent this kind of attack after an amount of sensor nodes have been compromised. Pairwise key establishment is a fundamental security in wireless sensor networks, which makes it possible that sensor nodes can communicate securely one another using cryptographic techniques. However, the limited resource and energy of sensor nodes are not feasible to use such traditional key management techniques as public/private cryptography and key distribution center (KDC). In this paper, we present a novel key management and data authentication technique that pass sensing data securely and filter false data out on its way to base station. The framework of our design is to divide sensing area into a number of location cells and a group of local cells consist of a logical cell, where, pairwise key between two sensor nodes is established according to the grid-based bivariate polynomials. The established pairwise key is included in the message authentication code (MAC) and is forwarded several hops down to the base station for data authentication. Our result shows that this location scheme and data authentication method decreases communication overhead, avoids t-tolerance, and filters bogus report in wireless sensor networks
传感器网络通常部署在无人值守的环境中,因此容易受到虚假数据注入攻击。攻击者经常在网络中注入虚假数据,以欺骗基站或耗尽中继节点的资源和能量。在大量传感器节点被破坏后,现有的身份验证机制无法阻止这种攻击。密钥对建立是无线传感器网络的基本安全保障,它使传感器节点之间使用加密技术进行安全通信成为可能。然而,由于传感器节点的资源和能量有限,采用传统的公钥/私钥加密和密钥分发中心(KDC)等密钥管理技术并不可行。本文提出了一种新的密钥管理和数据认证技术,可以安全地传递感知数据,并在传输到基站的过程中过滤掉虚假数据。我们的设计框架是将传感区域划分为多个位置单元,一组局部单元由一个逻辑单元组成,其中根据基于网格的二元多项式建立两个传感器节点之间的成对键。建立的成对密钥包含在消息验证码(MAC)中,并被转发几跳到基站进行数据验证。研究结果表明,该定位方案和数据认证方法在无线传感器网络中降低了通信开销,避免了t容忍,并过滤了虚假报告
{"title":"Location-Based Pairwise Key Establishment and Data Authentication for Wireless Sensor Networks","authors":"Cungang Yang, Jie Xiao","doi":"10.1109/IAW.2006.1652102","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652102","url":null,"abstract":"Sensor networks are often deployed in unattended environment, thus leaving those networks vulnerable to false data injection attacks. Attackers often inject false data into the network in order to deceive the base station or deplete the resource and the energy of the relaying nodes. The existing authentication mechanisms cannot prevent this kind of attack after an amount of sensor nodes have been compromised. Pairwise key establishment is a fundamental security in wireless sensor networks, which makes it possible that sensor nodes can communicate securely one another using cryptographic techniques. However, the limited resource and energy of sensor nodes are not feasible to use such traditional key management techniques as public/private cryptography and key distribution center (KDC). In this paper, we present a novel key management and data authentication technique that pass sensing data securely and filter false data out on its way to base station. The framework of our design is to divide sensing area into a number of location cells and a group of local cells consist of a logical cell, where, pairwise key between two sensor nodes is established according to the grid-based bivariate polynomials. The established pairwise key is included in the message authentication code (MAC) and is forwarded several hops down to the base station for data authentication. Our result shows that this location scheme and data authentication method decreases communication overhead, avoids t-tolerance, and filters bogus report in wireless sensor networks","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cascaded Authorization with Anonymous-Signer Aggregate Signatures 使用匿名签名者聚合签名的级联授权
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652081
D. Yao, R. Tamassia
We introduce a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and transmission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new signature scheme that supports both signer anonymity and signature aggregation. Our scheme has compact role signatures that make it especially suitable for ubiquitous computing environments, where users may have mobile computing devices with narrow communication bandwidth and small storage units
我们引入了一种分散的信任管理模型,称为基于匿名角色的级联委托。在这个模型中,代理可以代表她的角色发出授权,而不泄露她的身份。这种类型的委托保护委托的敏感成员信息,并隐藏组织的内部结构。为了为匿名角色级联委托中使用的凭据提供有效的存储和传输机制,提出了一种既支持签名者匿名又支持签名聚合的签名方案。我们的方案具有紧凑的角色签名,使其特别适用于普适计算环境,在这种环境中,用户可能拥有通信带宽较窄、存储单元较小的移动计算设备
{"title":"Cascaded Authorization with Anonymous-Signer Aggregate Signatures","authors":"D. Yao, R. Tamassia","doi":"10.1109/IAW.2006.1652081","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652081","url":null,"abstract":"We introduce a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and transmission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new signature scheme that supports both signer anonymity and signature aggregation. Our scheme has compact role signatures that make it especially suitable for ubiquitous computing environments, where users may have mobile computing devices with narrow communication bandwidth and small storage units","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126420891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Service oriented modeling of communication infastructure for assurance 面向服务的通信基础设施建模
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652069
A. Zuccato, B. Marquet, S. Papillon, M. Alden
To be able to achieve security assurance for services, which run on large and complex communication infrastructures, support tools are needed. Such tools need a representations of the infrastructure that enables and provides security assurance. In this paper we suggest an assurance modeling profile for UML 2.0. The profile contains stereotypes that define assurance-relevant object types as observed and unobserved assurance-relevant infrastructure items or metrics. In addition, the model defines information relevant for the aggregation of assurance, to allow an assurance value for a service to be derived from its underlying infrastructure. Our modeling approach starts from a service-oriented flow model and stepwise refines the topology and hierarchy view of the infrastructure involved in the service. To validate our approach we model a voice-over-IP service and show how the approach satisfies initially stated requirements
为了能够实现对运行在大型复杂通信基础设施上的服务的安全保证,需要支持工具。这些工具需要表示支持和提供安全保证的基础设施。在本文中,我们为UML 2.0提出了一个保证建模概要文件。概要文件包含将保证相关的对象类型定义为观察到的和未观察到的保证相关的基础设施项目或度量的原型。此外,该模型定义了与保证聚合相关的信息,以允许从其底层基础结构派生出服务的保证值。我们的建模方法从面向服务的流模型开始,逐步细化服务中涉及的基础设施的拓扑结构和层次结构视图。为了验证我们的方法,我们对ip语音服务进行了建模,并展示了该方法如何满足最初声明的需求
{"title":"Service oriented modeling of communication infastructure for assurance","authors":"A. Zuccato, B. Marquet, S. Papillon, M. Alden","doi":"10.1109/IAW.2006.1652069","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652069","url":null,"abstract":"To be able to achieve security assurance for services, which run on large and complex communication infrastructures, support tools are needed. Such tools need a representations of the infrastructure that enables and provides security assurance. In this paper we suggest an assurance modeling profile for UML 2.0. The profile contains stereotypes that define assurance-relevant object types as observed and unobserved assurance-relevant infrastructure items or metrics. In addition, the model defines information relevant for the aggregation of assurance, to allow an assurance value for a service to be derived from its underlying infrastructure. Our modeling approach starts from a service-oriented flow model and stepwise refines the topology and hierarchy view of the infrastructure involved in the service. To validate our approach we model a voice-over-IP service and show how the approach satisfies initially stated requirements","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward a Boot Odometer 走向启动里程表
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652072
R. C. Vernon, C.E. Irvine, T. Levin
In trustworthy systems, object reuse requirements extend to all forms of memory on the platform and can include volatile elements such as RAM, cache, I/O device registers, and certain controllers. To ensure that residual information is not accessible from one session to another, these regions must be either protected or purged. In situations where the operating system cannot be trusted to meet object reuse requirements, an alternative is needed. In this paper, we address the object reuse problem in volatile memory. A "hard" reboot includes a power cycle, which ensures that sensitive information in volatile memory is purged, whereas a software initiated reboot does not. How can we prove that a hard reboot has occurred? To our knowledge, it is not possible for a remote entity using currently available technology, to sense whether a hard reboot has occurred on an PC client, e.g. between communication sessions. We propose a hardware-assisted design that uses a secure coprocessor to sense the reboot type of the host platform and that maintains a boot odometer that tracks the sum of hard reboots that have occurred on the host. In addition, secure coprocessor services allow trustworthy attestation to a remote entity, cognizant of a previous boot odometer value, that volatile memory has been purged
在可靠的系统中,对象重用需求扩展到平台上所有形式的内存,并可能包括易失性元素,如RAM、缓存、I/O设备寄存器和某些控制器。为了确保残留信息不能从一个会话访问到另一个会话,必须保护或清除这些区域。在不能信任操作系统来满足对象重用需求的情况下,需要一个替代方案。本文主要研究易失性内存中的对象重用问题。“硬”重启包括一个电源周期,它确保易失性内存中的敏感信息被清除,而软件启动的重启则不会。我们如何证明已经发生了硬重启?据我们所知,使用当前可用技术的远程实体不可能感知PC客户端上是否发生了硬重启,例如在通信会话之间。我们提出了一种硬件辅助设计,该设计使用安全协处理器来感知主机平台的重启类型,并维护一个引导里程表,跟踪主机上发生的硬重启次数的总和。此外,安全协处理器服务允许对远程实体进行可信的证明,并认识到以前的引导里程表值,即易失性内存已被清除
{"title":"Toward a Boot Odometer","authors":"R. C. Vernon, C.E. Irvine, T. Levin","doi":"10.1109/IAW.2006.1652072","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652072","url":null,"abstract":"In trustworthy systems, object reuse requirements extend to all forms of memory on the platform and can include volatile elements such as RAM, cache, I/O device registers, and certain controllers. To ensure that residual information is not accessible from one session to another, these regions must be either protected or purged. In situations where the operating system cannot be trusted to meet object reuse requirements, an alternative is needed. In this paper, we address the object reuse problem in volatile memory. A \"hard\" reboot includes a power cycle, which ensures that sensitive information in volatile memory is purged, whereas a software initiated reboot does not. How can we prove that a hard reboot has occurred? To our knowledge, it is not possible for a remote entity using currently available technology, to sense whether a hard reboot has occurred on an PC client, e.g. between communication sessions. We propose a hardware-assisted design that uses a secure coprocessor to sense the reboot type of the host platform and that maintains a boot odometer that tracks the sum of hard reboots that have occurred on the host. In addition, secure coprocessor services allow trustworthy attestation to a remote entity, cognizant of a previous boot odometer value, that volatile memory has been purged","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129855166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a Micro-kernel Based Secure System Architecture 基于微内核的安全系统架构设计
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652123
Jianjun Shen, S. Qing, Qingni Shen
We describe the Trium secure system architecture. It is based on Fiasco an implementation of the L4 microkernel interface - and L4Env - a programming environment for L4 systems. Compared to previous work on microkernel based secure systems, such as TMach and DTOS, Trium tries to minimize the trusted computing base (TCB) of a secure system by moving most functions of an operating system (OS) out of the TCB, and it emphasizes on the reuse of legacy software. We also try to achieve better isolation, privilege control and flexible configuration of system components, taking advantage of the specific features of the L4 microkernel as a second generation microkernel
我们描述了Trium安全系统架构。它基于Fiasco (L4微内核接口的实现)和L4Env (L4系统的编程环境)。与以前在基于微内核的安全系统(如TMach和DTOS)上的工作相比,Trium试图通过将操作系统(OS)的大多数功能移出TCB来最小化安全系统的可信计算基础(TCB),并强调遗留软件的重用。我们还尝试实现更好的隔离、特权控制和系统组件的灵活配置,利用L4微内核作为第二代微内核的特定特性
{"title":"Design of a Micro-kernel Based Secure System Architecture","authors":"Jianjun Shen, S. Qing, Qingni Shen","doi":"10.1109/IAW.2006.1652123","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652123","url":null,"abstract":"We describe the Trium secure system architecture. It is based on Fiasco an implementation of the L4 microkernel interface - and L4Env - a programming environment for L4 systems. Compared to previous work on microkernel based secure systems, such as TMach and DTOS, Trium tries to minimize the trusted computing base (TCB) of a secure system by moving most functions of an operating system (OS) out of the TCB, and it emphasizes on the reuse of legacy software. We also try to achieve better isolation, privilege control and flexible configuration of system components, taking advantage of the specific features of the L4 microkernel as a second generation microkernel","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2006 IEEE Information Assurance Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1