首页 > 最新文献

2015 10th International Conference on Availability, Reliability and Security最新文献

英文 中文
Deploying Honeypots and Honeynets: Issue of Privacy 部署蜜罐和蜜网:隐私问题
Pavol Sokol, M. Husák, Frantiek Liptak
Honey pots and honey nets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered together. In this paper, we outline privacy issues of honey pots and honey nets with respect to technical aspects. The paper discusses the legal framework of privacy, legal ground to data processing, and data collection. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues. This paper is one of the first papers which discuss in detail privacy issues of honey pots and honey nets in accordance with EU law.
蜜罐和蜜网是网络安全和网络取证领域的常用工具。这些工具的部署和使用受到许多技术和法律问题的影响,需要一起仔细考虑这些问题。在本文中,我们从技术方面概述了蜜罐和蜜网的隐私问题。本文讨论了隐私的法律框架、数据处理和数据收集的法律依据。法律问题的分析以欧盟法律为基础,并以隐私和相关问题的讨论为支持。本文是第一批根据欧盟法律详细讨论蜜罐和蜜网隐私问题的论文之一。
{"title":"Deploying Honeypots and Honeynets: Issue of Privacy","authors":"Pavol Sokol, M. Husák, Frantiek Liptak","doi":"10.1109/ARES.2015.91","DOIUrl":"https://doi.org/10.1109/ARES.2015.91","url":null,"abstract":"Honey pots and honey nets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered together. In this paper, we outline privacy issues of honey pots and honey nets with respect to technical aspects. The paper discusses the legal framework of privacy, legal ground to data processing, and data collection. The analysis of legal issues is based on EU law and is supported by discussions on privacy and related issues. This paper is one of the first papers which discuss in detail privacy issues of honey pots and honey nets in accordance with EU law.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting 一种新的安全增强敏捷软件开发过程在工业环境中的应用
D. Baca, Martin Boldt, B. Carlsson, A. Jacobsson
A security-enhanced agile software development process, SEAP, is introduced in the development of a mobile money transfer system at Ericsson Corp. A specific characteristic of SEAP is that it includes a security group consisting of four different competences, i.e., Security manager, security architect, security master and penetration tester. Another significant feature of SEAP is an integrated risk analysis process. In analyzing risks in the development of the mobile money transfer system, a general finding was that SEAP either solves risks that were previously postponed or solves a larger proportion of the risks in a timely manner. The previous software development process, i.e., The baseline process of the comparison outlined in this paper, required 2.7 employee hours spent for every risk identified in the analysis process compared to, on the average, 1.5 hours for the SEAP. The baseline development process left 50% of the risks unattended in the software version being developed, while SEAP reduced that figure to 22%. Furthermore, SEAP increased the proportion of risks that were corrected from 12.5% to 67.1%, i.e., More than a five times increment. This is important, since an early correction may avoid severe attacks in the future. The security competence in SEAP accounts for 5% of the personnel cost in the mobile money transfer system project. As a comparison, the corresponding figure, i.e., For security, was 1% in the previous development process.
在爱立信公司的移动转账系统开发中引入了一种安全增强的敏捷软件开发过程SEAP。SEAP的具体特点是它包括一个由四种不同能力组成的安全组,即安全经理、安全架构师、安全主管和渗透测试人员。SEAP的另一个重要特征是集成的风险分析过程。在分析移动转账系统开发过程中的风险时,一个普遍的发现是,SEAP要么解决了之前被推迟的风险,要么及时解决了更大比例的风险。之前的软件开发过程,即本文中概述的比较的基线过程,在分析过程中识别的每个风险需要2.7个员工小时,而SEAP平均为1.5个小时。基线开发过程在正在开发的软件版本中留下了50%的未处理风险,而SEAP将这一数字减少到22%。此外,SEAP将被纠正的风险比例从12.5%增加到67.1%,即增加了5倍以上。这一点很重要,因为早期的调整可能会避免未来的严重攻击。在移动转账系统项目中,SEAP的安全能力占人员成本的5%。作为对比,在之前的开发过程中,相应的数字,即For security,为1%。
{"title":"A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting","authors":"D. Baca, Martin Boldt, B. Carlsson, A. Jacobsson","doi":"10.1109/ARES.2015.45","DOIUrl":"https://doi.org/10.1109/ARES.2015.45","url":null,"abstract":"A security-enhanced agile software development process, SEAP, is introduced in the development of a mobile money transfer system at Ericsson Corp. A specific characteristic of SEAP is that it includes a security group consisting of four different competences, i.e., Security manager, security architect, security master and penetration tester. Another significant feature of SEAP is an integrated risk analysis process. In analyzing risks in the development of the mobile money transfer system, a general finding was that SEAP either solves risks that were previously postponed or solves a larger proportion of the risks in a timely manner. The previous software development process, i.e., The baseline process of the comparison outlined in this paper, required 2.7 employee hours spent for every risk identified in the analysis process compared to, on the average, 1.5 hours for the SEAP. The baseline development process left 50% of the risks unattended in the software version being developed, while SEAP reduced that figure to 22%. Furthermore, SEAP increased the proportion of risks that were corrected from 12.5% to 67.1%, i.e., More than a five times increment. This is important, since an early correction may avoid severe attacks in the future. The security competence in SEAP accounts for 5% of the personnel cost in the mobile money transfer system project. As a comparison, the corresponding figure, i.e., For security, was 1% in the previous development process.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130209111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Structural Weaknesses in the Open Smart Grid Protocol 开放式智能电网协议的结构性缺陷
K. Kursawe, C. Peters
The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in large-scale Smart Metering projects. The protocol was developed by the OSGP Alliance and published as a standard by the European Telecommunications Standards Institute (ETSI). We identify several security issues in the OSG Protocol, primarily the use of a weak digest function and the way the protocol utilizes the RC4 algorithm for encryption. A straight-forward oracle attack triggers the leakage of key material of the digest function. We outline how an attacker can make use of the simple protocol structure to send maliciously altered messages with valid authentication tags to the meters.
开放智能电网协议(OSGP)目前已在多个国家的大型智能电表项目中部署。该协议由OSGP联盟开发,并由欧洲电信标准协会(ETSI)作为标准发布。我们确定了OSG协议中的几个安全问题,主要是弱摘要函数的使用以及协议利用RC4算法进行加密的方式。直接的oracle攻击会触发digest函数的关键材料泄漏。我们概述了攻击者如何利用简单的协议结构向仪表发送带有有效身份验证标记的恶意更改的消息。
{"title":"Structural Weaknesses in the Open Smart Grid Protocol","authors":"K. Kursawe, C. Peters","doi":"10.1109/ARES.2015.67","DOIUrl":"https://doi.org/10.1109/ARES.2015.67","url":null,"abstract":"The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in large-scale Smart Metering projects. The protocol was developed by the OSGP Alliance and published as a standard by the European Telecommunications Standards Institute (ETSI). We identify several security issues in the OSG Protocol, primarily the use of a weak digest function and the way the protocol utilizes the RC4 algorithm for encryption. A straight-forward oracle attack triggers the leakage of key material of the digest function. We outline how an attacker can make use of the simple protocol structure to send maliciously altered messages with valid authentication tags to the meters.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Accountable Redactable Signatures 可负责的可重写签名
H. C. Pöhls, Kai Samelin
Redactable signature schemes (RSS) allow removing blocks from signed data. State-of-the-art schemes have public redactions, i.e., Any party can remove parts from a signed message. This prohibits meaningful definitions of accountability. We address this gap by introducing the notion of accountable redactable signature schemes (ARSS). We present a generic construction which couples a sanitizable signature scheme (SSS) to profit from its accountability with an RSS to maintain the reduced malleability of RSSs. Depending on the building blocks, the resulting scheme offers transparency or public accountability. Transparency provides stronger privacy guarantees, while public accountability meets legal and application requirements.
可读签名方案(RSS)允许从签名数据中删除块。最先进的方案具有公共编辑功能,即任何一方都可以从已签名的消息中删除部分内容。这妨碍了对责任的有意义的定义。我们通过引入可问责可读签名方案(ARSS)的概念来解决这一差距。我们提出了一种通用结构,该结构将一个可消毒签名方案(SSS)与一个RSS耦合在一起,以保持其降低的可延展性。根据构建模块的不同,最终的方案提供透明度或公共问责制。透明度提供了更强的隐私保障,而公共问责符合法律和应用要求。
{"title":"Accountable Redactable Signatures","authors":"H. C. Pöhls, Kai Samelin","doi":"10.1109/ARES.2015.10","DOIUrl":"https://doi.org/10.1109/ARES.2015.10","url":null,"abstract":"Redactable signature schemes (RSS) allow removing blocks from signed data. State-of-the-art schemes have public redactions, i.e., Any party can remove parts from a signed message. This prohibits meaningful definitions of accountability. We address this gap by introducing the notion of accountable redactable signature schemes (ARSS). We present a generic construction which couples a sanitizable signature scheme (SSS) to profit from its accountability with an RSS to maintain the reduced malleability of RSSs. Depending on the building blocks, the resulting scheme offers transparency or public accountability. Transparency provides stronger privacy guarantees, while public accountability meets legal and application requirements.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Physically Secure Code and Data Storage in Autonomously Booting Systems 自主启动系统中的物理安全代码和数据存储
J. Götzfried, Johannes Hampel, Tilo Müller
Today, full disk encryption is a common practice to protect data on desktop computers and notebooks from unauthorized physical access. For embedded systems, however, the situation is different and they often lack physical protection. Usually no user or remotely connected system is involved during the boot phase which requires autonomously booting systems. For this paper an entire software stack for secure code and data storage in embedded systems has been designed, implemented and evaluated regarding security aspects and performance. For the security evaluation, physical attacks on the flash chip and RAM access have been taken into account. The system is a combined hardware and software solution and provides a considerable amount of security without a second party involved that could participate in a trust bootstrapping protocol. A symmetric key hierarchy enables the use of applications from different vendors which are not able to decrypt each others software. For code, a signature chain ensures the authenticity of the code being run. For data, integrity is ensured on a per sector basis such that targeted manipulations are not only mitigated but can be detected as well. This is a novel technique that is currently not known from any publicly available full disk encryption system. We show that the confidentiality, integrity and authenticity of code and data protected with our system can be ensured provided that small parts of the hardware are considered trusted.
今天,全磁盘加密是一种常见的做法,以保护台式机和笔记本电脑上的数据免受未经授权的物理访问。然而,对于嵌入式系统,情况就不同了,它们通常缺乏物理保护。通常在引导阶段不涉及用户或远程连接的系统,这需要自主引导系统。本文设计、实现了嵌入式系统中用于安全代码和数据存储的整个软件栈,并对其安全性和性能进行了评估。在安全评估中,考虑了对闪存芯片和RAM访问的物理攻击。该系统是一个结合了硬件和软件的解决方案,在没有参与信任引导协议的第二方的情况下提供了相当大的安全性。对称密钥层次结构允许使用来自不同供应商的应用程序,这些应用程序不能相互解密软件。对于代码,签名链确保正在运行的代码的真实性。对于数据,在每个部门的基础上确保完整性,这样不仅可以减轻有针对性的操纵,而且可以检测到。这是一种新技术,目前在任何公开可用的全磁盘加密系统中都不知道。我们表明,只要一小部分硬件被认为是可信的,我们的系统所保护的代码和数据的机密性、完整性和真实性就可以得到保证。
{"title":"Physically Secure Code and Data Storage in Autonomously Booting Systems","authors":"J. Götzfried, Johannes Hampel, Tilo Müller","doi":"10.1109/ARES.2015.19","DOIUrl":"https://doi.org/10.1109/ARES.2015.19","url":null,"abstract":"Today, full disk encryption is a common practice to protect data on desktop computers and notebooks from unauthorized physical access. For embedded systems, however, the situation is different and they often lack physical protection. Usually no user or remotely connected system is involved during the boot phase which requires autonomously booting systems. For this paper an entire software stack for secure code and data storage in embedded systems has been designed, implemented and evaluated regarding security aspects and performance. For the security evaluation, physical attacks on the flash chip and RAM access have been taken into account. The system is a combined hardware and software solution and provides a considerable amount of security without a second party involved that could participate in a trust bootstrapping protocol. A symmetric key hierarchy enables the use of applications from different vendors which are not able to decrypt each others software. For code, a signature chain ensures the authenticity of the code being run. For data, integrity is ensured on a per sector basis such that targeted manipulations are not only mitigated but can be detected as well. This is a novel technique that is currently not known from any publicly available full disk encryption system. We show that the confidentiality, integrity and authenticity of code and data protected with our system can be ensured provided that small parts of the hardware are considered trusted.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework 基于摄像机和目标物体轨迹的视频时空滤波——视频监控取证框架
Pub Date : 2015-08-24 DOI: 10.1109/ARES.2015.102
D. Codreanu, A. Péninou, F. Sèdes
This paper presents our work about assisting video-surveillance agents in the search for particular video scenes of interest in transit network. This work has been developed based on requirements defined within different projects with the French National Police in a forensic goal. The video-surveillance agent inputs a query in the form of a hybrid trajectory (date, time, locations expressed with regards to different reference systems) and potentially some visual descriptions of the scene. The query processing starts with the interpretation of the hybrid trajectory and continues with a selection of a set of cameras likely to have filmed the spatial trajectory. The main contributions of this paper are: (1) a definition of the hybrid trajectory query concept, trajectory that is constituted of geometrical and symbolic segments represented with regards to different reference systems (e.g., Geodesic system, road network), (2) a spatio-temporal filtering framework based on a spatio-temporal modeling of the transit network and associated cameras.
本文介绍了我们在交通网络中协助视频监控代理搜索感兴趣的特定视频场景的工作。这项工作是根据与法国国家警察在法医目标方面的不同项目中确定的要求开展的。视频监控代理以混合轨迹的形式输入查询(根据不同的参考系统表达的日期、时间、位置),并可能对场景进行一些视觉描述。查询处理从混合轨迹的解释开始,然后继续选择一组可能拍摄过空间轨迹的摄像机。本文的主要贡献有:(1)定义了混合轨迹查询概念,即由几何段和符号段组成的轨迹,这些轨迹是根据不同的参考系统(如测地线系统、道路网络)来表示的;(2)基于交通网络和相关摄像机的时空建模的时空过滤框架。
{"title":"Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories -- Videosurveillance Forensic Framework","authors":"D. Codreanu, A. Péninou, F. Sèdes","doi":"10.1109/ARES.2015.102","DOIUrl":"https://doi.org/10.1109/ARES.2015.102","url":null,"abstract":"This paper presents our work about assisting video-surveillance agents in the search for particular video scenes of interest in transit network. This work has been developed based on requirements defined within different projects with the French National Police in a forensic goal. The video-surveillance agent inputs a query in the form of a hybrid trajectory (date, time, locations expressed with regards to different reference systems) and potentially some visual descriptions of the scene. The query processing starts with the interpretation of the hybrid trajectory and continues with a selection of a set of cameras likely to have filmed the spatial trajectory. The main contributions of this paper are: (1) a definition of the hybrid trajectory query concept, trajectory that is constituted of geometrical and symbolic segments represented with regards to different reference systems (e.g., Geodesic system, road network), (2) a spatio-temporal filtering framework based on a spatio-temporal modeling of the transit network and associated cameras.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware 多家族Android恶意软件检测的操作码程序的有效性
G. Canfora, A. D. Lorenzo, Eric Medvet, F. Mercaldo, C. A. Visaggio
With the wide diffusion of smartphones and their usage in a plethora of processes and activities, these devices have been handling an increasing variety of sensitive resources. Attackers are hence producing a large number of malware applications for Android (the most spread mobile platform), often by slightly modifying existing applications, which results in malware being organized in families. Some works in the literature showed that opcodes are informative for detecting malware, not only in the Android platform. In this paper, we investigate if frequencies of ngrams of opcodes are effective in detecting Android malware and if there is some significant malware family for which they are more or less effective. To this end, we designed a method based on state-of-the-art classifiers applied to frequencies of opcodes ngrams. Then, we experimentally evaluated it on a recent dataset composed of 11120 applications, 5560 of which are malware belonging to several different families. Results show that an accuracy of 97% can be obtained on the average, whereas perfect detection rate is achieved for more than one malware family.
随着智能手机的广泛普及及其在众多过程和活动中的使用,这些设备一直在处理越来越多的敏感资源。因此,攻击者为Android(最广泛的移动平台)制作了大量恶意软件应用程序,通常是通过对现有应用程序进行轻微修改,从而导致恶意软件以家族为单位组织。一些文献表明,操作码不仅在Android平台上具有检测恶意软件的信息。在本文中,我们研究了操作码的ngrams频率是否有效检测Android恶意软件,以及是否存在一些重要的恶意软件家族,它们或多或少有效。为此,我们设计了一种基于最先进的分类器的方法,应用于操作码的频率。然后,我们在一个由11120个应用程序组成的最新数据集上进行了实验评估,其中5560个是属于几个不同家族的恶意软件。结果表明,该方法平均准确率可达97%,对多个恶意软件家族的检测均达到了完美的检测率。
{"title":"Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware","authors":"G. Canfora, A. D. Lorenzo, Eric Medvet, F. Mercaldo, C. A. Visaggio","doi":"10.1109/ARES.2015.57","DOIUrl":"https://doi.org/10.1109/ARES.2015.57","url":null,"abstract":"With the wide diffusion of smartphones and their usage in a plethora of processes and activities, these devices have been handling an increasing variety of sensitive resources. Attackers are hence producing a large number of malware applications for Android (the most spread mobile platform), often by slightly modifying existing applications, which results in malware being organized in families. Some works in the literature showed that opcodes are informative for detecting malware, not only in the Android platform. In this paper, we investigate if frequencies of ngrams of opcodes are effective in detecting Android malware and if there is some significant malware family for which they are more or less effective. To this end, we designed a method based on state-of-the-art classifiers applied to frequencies of opcodes ngrams. Then, we experimentally evaluated it on a recent dataset composed of 11120 applications, 5560 of which are malware belonging to several different families. Results show that an accuracy of 97% can be obtained on the average, whereas perfect detection rate is achieved for more than one malware family.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications Nomad:用于开发关键任务云应用程序的框架
Mamadou H. Diallo, M. August, Roger A. Hallman, Megan Kline, Henry Au, Vic Beach
The practicality of existing techniques for processing encrypted data stored in untrusted cloud environments is a limiting factor in the adoption of cloud-based applications. Both public and private sector organizations are reluctant to push their data to the cloud due to strong requirements for security and privacy of their data. In particular, mission-critical defense applications used by governments do not tolerate any leakage of sensitive data. In this paper, we propose Nomad, a framework for developing mission-critical cloud-based applications. The framework is comprised of: 1) a homomorphism encryption-based service for processing encrypted data directly within the untrusted cloud infrastructure, and 2) a client service for encrypting and decrypting data within the trusted environment, and storing and retrieving these data to and from the cloud. Both services are equipped with GPU-based parallelization to accelerate the expensive homomorphic encryption operations. To evaluate the Nomad framework, we developed Call For Fire, amission-critical application which enables defense personnel to call for fire on targets. Due to the nature of the mission, this application requires guaranteed security. The experimental results highlight the performance enhancements of the GPU-based acceleration mechanism and the feasibility of the Nomad framework.
处理存储在不可信云环境中的加密数据的现有技术的实用性是采用基于云的应用程序的一个限制因素。由于对数据安全性和隐私性的强烈要求,公共和私营部门组织都不愿意将数据推送到云端。特别是,政府使用的关键任务防御应用程序不能容忍任何敏感数据的泄露。在本文中,我们提出Nomad,一个用于开发基于云的关键任务应用程序的框架。该框架包括:1)一个基于同态加密的服务,用于直接在不受信任的云基础设施中处理加密数据;2)一个客户端服务,用于在受信任的环境中加密和解密数据,并在云中存储和检索这些数据。这两个服务都配备了基于gpu的并行化,以加速昂贵的同态加密操作。为了评估Nomad框架,我们开发了呼叫火力,这是一个任务关键型应用程序,使国防人员能够呼叫对目标开火。由于任务的性质,此应用程序需要保证安全性。实验结果表明了基于gpu的加速机制的性能增强和Nomad框架的可行性。
{"title":"Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications","authors":"Mamadou H. Diallo, M. August, Roger A. Hallman, Megan Kline, Henry Au, Vic Beach","doi":"10.1109/ARES.2015.94","DOIUrl":"https://doi.org/10.1109/ARES.2015.94","url":null,"abstract":"The practicality of existing techniques for processing encrypted data stored in untrusted cloud environments is a limiting factor in the adoption of cloud-based applications. Both public and private sector organizations are reluctant to push their data to the cloud due to strong requirements for security and privacy of their data. In particular, mission-critical defense applications used by governments do not tolerate any leakage of sensitive data. In this paper, we propose Nomad, a framework for developing mission-critical cloud-based applications. The framework is comprised of: 1) a homomorphism encryption-based service for processing encrypted data directly within the untrusted cloud infrastructure, and 2) a client service for encrypting and decrypting data within the trusted environment, and storing and retrieving these data to and from the cloud. Both services are equipped with GPU-based parallelization to accelerate the expensive homomorphic encryption operations. To evaluate the Nomad framework, we developed Call For Fire, amission-critical application which enables defense personnel to call for fire on targets. Due to the nature of the mission, this application requires guaranteed security. The experimental results highlight the performance enhancements of the GPU-based acceleration mechanism and the feasibility of the Nomad framework.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Overview of the Forensic Investigation of Cloud Services 云服务取证调查概述
Jason Farina, M. Scanlon, Nhien-An Le-Khac, Mohand Tahar Kechadi
Cloud Computing is a commonly used, yet ambiguous term, which can be used to refer to a multitude of differing dynamically allocated services. From a law enforcement and forensic investigation perspective, cloud computing can be thought of as a double edged sword. While on one hand, the gathering of digital evidence from cloud sources can bring with it complicated technical and cross-jurisdictional legal challenges. On the other, the employment of cloud storage and processing capabilities can expedite the forensics process and focus the investigation onto pertinent data earlier in an investigation. This paper examines the state-of-the-art in cloud-focused, digital forensic practises for the collection and analysis of evidence and an overview of the potential use of cloud technologies to provide Digital Forensics as a Service.
云计算是一个常用的,但模棱两可的术语,它可以用来指大量不同的动态分配的服务。从执法和司法调查的角度来看,云计算可以被认为是一把双刃剑。一方面,从云来源收集数字证据可能会带来复杂的技术和跨司法管辖区的法律挑战。另一方面,使用云存储和处理功能可以加快取证过程,并在调查早期将调查重点放在相关数据上。本文探讨了以云为中心的数字取证实践的最新技术,用于收集和分析证据,并概述了云技术在提供数字取证即服务方面的潜在用途。
{"title":"Overview of the Forensic Investigation of Cloud Services","authors":"Jason Farina, M. Scanlon, Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.1109/ARES.2015.81","DOIUrl":"https://doi.org/10.1109/ARES.2015.81","url":null,"abstract":"Cloud Computing is a commonly used, yet ambiguous term, which can be used to refer to a multitude of differing dynamically allocated services. From a law enforcement and forensic investigation perspective, cloud computing can be thought of as a double edged sword. While on one hand, the gathering of digital evidence from cloud sources can bring with it complicated technical and cross-jurisdictional legal challenges. On the other, the employment of cloud storage and processing capabilities can expedite the forensics process and focus the investigation onto pertinent data earlier in an investigation. This paper examines the state-of-the-art in cloud-focused, digital forensic practises for the collection and analysis of evidence and an overview of the potential use of cloud technologies to provide Digital Forensics as a Service.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
PALPAS -- PAssword Less PAssword Synchronization PALPAS—密码少密码同步
M. Horsch, Andreas Hülsing, J. Buchmann
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which can lead to the disclosure of all passwords by an offline brute-force attack. In this paper, we present PALPAS, a secure and user-friendly tool that synchronizes passwords between user devices without storing information about them centrally. The idea of PALPAS is to generate a password from a high entropy secret shared by all devices and a random salt value for each service. Only the salt values are stored on a server but not the secret. The salt enables the user devices to generate the same password but is statistically independent of the password. In order for PALPAS to generate passwords according to different password policies, we also present a mechanism that automatically retrieves and processes the password requirements of services. PALPAS users need to only memorize a single password and the setup of PALPAS on a further device demands only a one-time transfer of few static data.
在多个用户设备上同步密码的工具通常将加密的密码存储在中央在线数据库中。对于加密,使用低熵的、基于密码的密钥。这样的数据库可能受到未经授权的访问,这可能导致离线暴力攻击泄露所有密码。在本文中,我们提出了PALPAS,一个安全且用户友好的工具,可以在用户设备之间同步密码,而无需集中存储有关密码的信息。PALPAS的思想是从所有设备共享的高熵秘密和每个服务的随机盐值中生成密码。服务器上只存储盐值,而不存储密钥。salt允许用户设备生成相同的密码,但在统计上独立于密码。为了使PALPAS能够根据不同的密码策略生成密码,我们还提出了一种自动检索和处理服务密码需求的机制。PALPAS用户只需要记住一个密码,在另一个设备上设置PALPAS只需要一次性传输少量静态数据。
{"title":"PALPAS -- PAssword Less PAssword Synchronization","authors":"M. Horsch, Andreas Hülsing, J. Buchmann","doi":"10.1109/ARES.2015.23","DOIUrl":"https://doi.org/10.1109/ARES.2015.23","url":null,"abstract":"Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used. Such a database may be subject to unauthorized access which can lead to the disclosure of all passwords by an offline brute-force attack. In this paper, we present PALPAS, a secure and user-friendly tool that synchronizes passwords between user devices without storing information about them centrally. The idea of PALPAS is to generate a password from a high entropy secret shared by all devices and a random salt value for each service. Only the salt values are stored on a server but not the secret. The salt enables the user devices to generate the same password but is statistically independent of the password. In order for PALPAS to generate passwords according to different password policies, we also present a mechanism that automatically retrieves and processes the password requirements of services. PALPAS users need to only memorize a single password and the setup of PALPAS on a further device demands only a one-time transfer of few static data.","PeriodicalId":331539,"journal":{"name":"2015 10th International Conference on Availability, Reliability and Security","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116515893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 10th International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1