首页 > 最新文献

2008 Third International Conference on Risks and Security of Internet and Systems最新文献

英文 中文
Security analysis of the Dependability, Security Reconfigurability framework 安全可靠性分析,安全可重构框架
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757468
T. Hartog, G. Kleinhuis
Introducing security and security functionality in a large scale communication and information system will increase the complexity of these systems. Complexity in general is seen as an important aspect of possible insecure systems. In this paper we describe the threats that need to be addressed if a specific security solution like the DESEREC (dependability and security by enhanced reconfigurability) framework is deployed in a large scale communication and information system. Also the necessary minimal countermeasures and corresponding security requirements are described. This work reflects our experiences within the DESEREC project, partly funded by the European Union.
在大型通信和信息系统中引入安全和安全功能将增加这些系统的复杂性。复杂性通常被视为不安全系统的一个重要方面。在本文中,我们描述了在大规模通信和信息系统中部署DESEREC(增强可重构性的可靠性和安全性)框架等特定安全解决方案时需要解决的威胁。并介绍了必要的最小对策和相应的安全要求。这项工作反映了我们在部分由欧洲联盟资助的DESEREC项目中的经验。
{"title":"Security analysis of the Dependability, Security Reconfigurability framework","authors":"T. Hartog, G. Kleinhuis","doi":"10.1109/CRISIS.2008.4757468","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757468","url":null,"abstract":"Introducing security and security functionality in a large scale communication and information system will increase the complexity of these systems. Complexity in general is seen as an important aspect of possible insecure systems. In this paper we describe the threats that need to be addressed if a specific security solution like the DESEREC (dependability and security by enhanced reconfigurability) framework is deployed in a large scale communication and information system. Also the necessary minimal countermeasures and corresponding security requirements are described. This work reflects our experiences within the DESEREC project, partly funded by the European Union.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aspect-based enforcement of formal delegation policies 正式委托策略的基于方面的实施
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757459
Slim Kallel, A. Charfi, M. Mezini, M. Jmaiel
Delegation is a powerful concept in access control systems, which allows users to assign all or part of their permissions to other users. Several types of delegation models for role-based access control have been proposed so far. However, most existing works focus on the specification of delegation policies and there is very little work on the monitoring and enforcement of such policies at runtime. In this paper, we use a security approach combining formal methods and aspect-oriented programming for specifying and enforcing delegation policies. In our approach, delegation models and their characteristics are specified formally using TemporalZ, which is a combination of Z notation and temporal logic. Then, we verify the formal specification to ensure consistency using theorem proving. Finally, we generate automatically a set of aspects in the aspect-oriented language ALPHA from the TemporalZ specifications. These aspects enforce the specified delegation policies at runtime.
授权是访问控制系统中的一个强大概念,它允许用户将其全部或部分权限分配给其他用户。到目前为止,已经提出了几种基于角色的访问控制委托模型。然而,大多数现有的工作都集中在委托策略的规范上,很少有在运行时监视和执行这些策略的工作。在本文中,我们使用一种安全方法,结合形式化方法和面向方面的编程来指定和执行委托策略。在我们的方法中,委托模型及其特征是使用TemporalZ正式指定的,它是Z符号和时态逻辑的组合。然后,我们使用定理证明来验证形式规范以确保一致性。最后,我们用面向方面语言ALPHA从TemporalZ规范中自动生成一组方面。这些方面在运行时强制执行指定的委托策略。
{"title":"Aspect-based enforcement of formal delegation policies","authors":"Slim Kallel, A. Charfi, M. Mezini, M. Jmaiel","doi":"10.1109/CRISIS.2008.4757459","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757459","url":null,"abstract":"Delegation is a powerful concept in access control systems, which allows users to assign all or part of their permissions to other users. Several types of delegation models for role-based access control have been proposed so far. However, most existing works focus on the specification of delegation policies and there is very little work on the monitoring and enforcement of such policies at runtime. In this paper, we use a security approach combining formal methods and aspect-oriented programming for specifying and enforcing delegation policies. In our approach, delegation models and their characteristics are specified formally using TemporalZ, which is a combination of Z notation and temporal logic. Then, we verify the formal specification to ensure consistency using theorem proving. Finally, we generate automatically a set of aspects in the aspect-oriented language ALPHA from the TemporalZ specifications. These aspects enforce the specified delegation policies at runtime.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
EESP: A Security protocol that supports QoS management esp:支持QoS管理的安全协议
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757476
M. Mostafa, A. A. E. Kalam, C. Fraboul
In order to effectively manage network resources and to serve different traffic needs, several works have been done in the QoS area. Basically, ldquomulti-field (MF) packet classifiersrdquo classify a packet by looking for multiple fields of the IP/TCP headers, recognize which flow the packet belongs to, and according to this information, provide service differentiation in IP networks. However, for security purposes, existing security protocols (such as the IPSec Encapsulating Security Payload (ESP) algorithm) hides much of this information in their encrypted payloads, preventing network control devices such as routers and switches from utilizing this information in performing classification appropriately. The ESPQ (ESP considered QoS) protocol deals with this problem but unfortunately, it has some security weaknesses. In this paper we present the ESPQ vulnerabilities and we propose EESP (Enhanced encapsulated security payload) as a security protocol that provides both security and QoS.
为了有效地管理网络资源,满足不同的流量需求,在QoS领域已经做了大量的工作。基本上,MF包分类器通过查找IP/TCP报头的多个字段来对数据包进行分类,识别数据包属于哪个流,并根据这些信息在IP网络中提供业务区分。然而,出于安全目的,现有的安全协议(例如IPSec封装安全有效负载(ESP)算法)在其加密的有效负载中隐藏了许多此类信息,从而阻止了路由器和交换机等网络控制设备在适当地执行分类时利用这些信息。ESPQ (ESP视为QoS)协议解决了这个问题,但不幸的是,它有一些安全弱点。在本文中,我们提出了ESPQ漏洞,并提出EESP (Enhanced encapsulation security payload)作为一种同时提供安全性和QoS的安全协议。
{"title":"EESP: A Security protocol that supports QoS management","authors":"M. Mostafa, A. A. E. Kalam, C. Fraboul","doi":"10.1109/CRISIS.2008.4757476","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757476","url":null,"abstract":"In order to effectively manage network resources and to serve different traffic needs, several works have been done in the QoS area. Basically, ldquomulti-field (MF) packet classifiersrdquo classify a packet by looking for multiple fields of the IP/TCP headers, recognize which flow the packet belongs to, and according to this information, provide service differentiation in IP networks. However, for security purposes, existing security protocols (such as the IPSec Encapsulating Security Payload (ESP) algorithm) hides much of this information in their encrypted payloads, preventing network control devices such as routers and switches from utilizing this information in performing classification appropriately. The ESPQ (ESP considered QoS) protocol deals with this problem but unfortunately, it has some security weaknesses. In this paper we present the ESPQ vulnerabilities and we propose EESP (Enhanced encapsulated security payload) as a security protocol that provides both security and QoS.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An ontology-based approach to react to network attacks 一种基于本体的网络攻击响应方法
Pub Date : 2008-10-01 DOI: 10.1504/IJICS.2009.031041
N. Cuppens-Boulahia, F. Cuppens, J. D. Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) project is defining and designing solutions to enhance the detection/reaction process, improving the overall resilience of IP networks to attacks and help telecommunication and service providers to maintain sufficient quality of service and respect service level agreements. Within this project, a main component is in charge of instantiating new security policies that counteract the network attacks. This paper proposes an ontology-based approach to instantiate these security policies. This technology provides a way to map alerts into attack contexts, which are used to identify the policies to be applied in the network to solve the threat. For this, ontologies to describe alerts and policies are defined, using inference rules to perform such mappings.
为了应对当前通信网络安全事件的演变,对攻击做出快速有效的反应是非常重要的。RED(检测后反应)项目正在定义和设计解决方案,以增强检测/反应过程,提高IP网络对攻击的整体弹性,并帮助电信和服务提供商保持足够的服务质量并遵守服务水平协议。在这个项目中,一个主要组件负责实例化对抗网络攻击的新安全策略。本文提出了一种基于本体的方法来实例化这些安全策略。该技术提供了一种将警报映射到攻击上下文的方法,攻击上下文用于识别要在网络中应用的策略以解决威胁。为此,定义了描述警报和策略的本体,并使用推理规则执行此类映射。
{"title":"An ontology-based approach to react to network attacks","authors":"N. Cuppens-Boulahia, F. Cuppens, J. D. Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar","doi":"10.1504/IJICS.2009.031041","DOIUrl":"https://doi.org/10.1504/IJICS.2009.031041","url":null,"abstract":"To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) project is defining and designing solutions to enhance the detection/reaction process, improving the overall resilience of IP networks to attacks and help telecommunication and service providers to maintain sufficient quality of service and respect service level agreements. Within this project, a main component is in charge of instantiating new security policies that counteract the network attacks. This paper proposes an ontology-based approach to instantiate these security policies. This technology provides a way to map alerts into attack contexts, which are used to identify the policies to be applied in the network to solve the threat. For this, ontologies to describe alerts and policies are defined, using inference rules to perform such mappings.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
VisAA: Visual analyzer for assembler Visual analyzer for汇编程序
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757482
Philippe Andouard, Olivier Ly, Davy Rouillard
Reading and understanding the structure of assembly code is often a tedious and difficult task. It becomes much more difficult when exact timing analysis on control flow paths is required to detect timing attacks. We describe our semi-automated tool VisAA used for visualization of control flow information and timing analysis of execution paths to detect portions of code vulnerable to timing attacks on 8-bit AVR microchip assembly code. Our system provides a great aid by saving much human effort in unravelling and analyzing assembly code.
阅读和理解汇编代码的结构通常是一项乏味而困难的任务。当需要对控制流路径进行精确的定时分析来检测定时攻击时,就变得更加困难了。我们描述了我们的半自动工具VisAA,用于控制流信息的可视化和执行路径的定时分析,以检测易受8位AVR微芯片汇编代码定时攻击的代码部分。我们的系统提供了很大的帮助,节省了解开和分析汇编代码的大量人力。
{"title":"VisAA: Visual analyzer for assembler","authors":"Philippe Andouard, Olivier Ly, Davy Rouillard","doi":"10.1109/CRISIS.2008.4757482","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757482","url":null,"abstract":"Reading and understanding the structure of assembly code is often a tedious and difficult task. It becomes much more difficult when exact timing analysis on control flow paths is required to detect timing attacks. We describe our semi-automated tool VisAA used for visualization of control flow information and timing analysis of execution paths to detect portions of code vulnerable to timing attacks on 8-bit AVR microchip assembly code. Our system provides a great aid by saving much human effort in unravelling and analyzing assembly code.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Byzantine solution to early detect massive attacks 早期发现大规模攻击的拜占庭式解决方案
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757470
Khaled Barbaria, Belhassen Zouari
The quality and the timeliness of the detection of massive attacks significantly limit their great danger. In this paper, we describe an existing solution based on a centralized treatment of threat reports generated by probes deployed at the edges of a national Cyber-space. We also propose a more reliable architecture based on a consensus algorithm that solves the interactive consistency problem under the Byzantine assumptions. We prove the correctness of our algorithm and show its contribution to the early detection of massive attacks.
大规模攻击的检测质量和及时性大大限制了它们的巨大危险。在本文中,我们描述了一种基于集中处理部署在国家网络空间边缘的探测器生成的威胁报告的现有解决方案。我们还提出了一种基于共识算法的更可靠的架构,该算法解决了拜占庭假设下的交互一致性问题。我们证明了算法的正确性,并展示了它对早期发现大规模攻击的贡献。
{"title":"A Byzantine solution to early detect massive attacks","authors":"Khaled Barbaria, Belhassen Zouari","doi":"10.1109/CRISIS.2008.4757470","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757470","url":null,"abstract":"The quality and the timeliness of the detection of massive attacks significantly limit their great danger. In this paper, we describe an existing solution based on a centralized treatment of threat reports generated by probes deployed at the edges of a national Cyber-space. We also propose a more reliable architecture based on a consensus algorithm that solves the interactive consistency problem under the Byzantine assumptions. We prove the correctness of our algorithm and show its contribution to the early detection of massive attacks.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verification of Workflow processes under multilevel security considerations 在多级安全考虑下验证工作流过程
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757466
Kamel Barkaoui, R. Ayed, H. Boucheneb, A. Hicheur
Traditional modelling and analysis of workflow aims at verifying the correctness of its control flow. When dealing with workflow security, the compliance of information flow with the adopted security policies needs also to be analyzed. In this paper, we propose a two-steps verification approach. While the first step is concerned by soundness of the workflow, the second one is concerned by the data consistency with respect to a multilevel security policy where the granting of access rights to objects by the workflow system is done according to information flow rules of Bell-LaPadula model. Our approach is based on the ECATNet formalism. It offers means to incorporate the security constraints on information flow into an initial WF net modeling the control flow of a workflow specification. We then show how to analyze the impact of the security rules on the whole Workflow through the model checker of the MAUDE environment and how to relax them before producing the correct specification and submitting it to the workflow system.
传统的工作流建模和分析旨在验证其控制流程的正确性。在处理工作流安全性时,还需要分析信息流与所采用的安全策略的遵从性。在本文中,我们提出了一种两步验证方法。第一步关注工作流的稳健性,第二步关注多级安全策略的数据一致性,其中工作流系统根据Bell-LaPadula模型的信息流规则授予对象访问权限。我们的方法是基于ECATNet的形式化。它提供了将信息流上的安全约束合并到对工作流规范的控制流建模的初始WF网络中的方法。然后,我们将展示如何通过MAUDE环境的模型检查器分析安全规则对整个工作流的影响,以及如何在生成正确的规范并将其提交给工作流系统之前放松它们。
{"title":"Verification of Workflow processes under multilevel security considerations","authors":"Kamel Barkaoui, R. Ayed, H. Boucheneb, A. Hicheur","doi":"10.1109/CRISIS.2008.4757466","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757466","url":null,"abstract":"Traditional modelling and analysis of workflow aims at verifying the correctness of its control flow. When dealing with workflow security, the compliance of information flow with the adopted security policies needs also to be analyzed. In this paper, we propose a two-steps verification approach. While the first step is concerned by soundness of the workflow, the second one is concerned by the data consistency with respect to a multilevel security policy where the granting of access rights to objects by the workflow system is done according to information flow rules of Bell-LaPadula model. Our approach is based on the ECATNet formalism. It offers means to incorporate the security constraints on information flow into an initial WF net modeling the control flow of a workflow specification. We then show how to analyze the impact of the security rules on the whole Workflow through the model checker of the MAUDE environment and how to relax them before producing the correct specification and submitting it to the workflow system.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126842433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Economic-based vs. nature-inspired intruder detection in sensor networks 基于经济的与基于自然的传感器网络入侵者检测
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757477
F. Mili, S. Ghanekar, Nancy Alrajei
Protecting computer networks from accidental and malicious harm is a critical issue. Researchers have sought a variety of solutions ranging from the purely statistical approach to approaches inspired from a variety of fields such as economics and biology. In this paper, we focus on the issue of intruder detection and propose two complementary approaches, one economics-based, the other biology-inspired. We discuss the effectiveness of these two approaches put together as compared to each one alone based on Matlab simulations.
保护计算机网络免受意外和恶意伤害是一个关键问题。研究人员寻求了各种各样的解决方案,从纯粹的统计方法到从经济学和生物学等各个领域受到启发的方法。在本文中,我们关注入侵者检测问题,并提出两种互补的方法,一种基于经济学,另一种基于生物学。我们讨论了这两种方法放在一起的有效性,与单独基于Matlab仿真的每种方法相比。
{"title":"Economic-based vs. nature-inspired intruder detection in sensor networks","authors":"F. Mili, S. Ghanekar, Nancy Alrajei","doi":"10.1109/CRISIS.2008.4757477","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757477","url":null,"abstract":"Protecting computer networks from accidental and malicious harm is a critical issue. Researchers have sought a variety of solutions ranging from the purely statistical approach to approaches inspired from a variety of fields such as economics and biology. In this paper, we focus on the issue of intruder detection and propose two complementary approaches, one economics-based, the other biology-inspired. We discuss the effectiveness of these two approaches put together as compared to each one alone based on Matlab simulations.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting enforceable security policies 重新审视可执行的安全策略
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757483
Naoyuki Nagatou
We algebraically characterize a class of enforceable security policies by execution monitoring using a modal logic. We regard monitors as processes in Milnerpsilas CCS and security policies as formulas in the modal logic. We show that a set of processes occurring in a monitor must be within the greatest fixed point for the formula, following Schneiderpsilas definition on execution monitors. We also consider monitors that can derive some sequences from a single captured action sequence. To discuss such monitors, we introduce variables ranging over sets of processes in CCS. We then show that there is fixed points under the extension. This work may help us to understand such monitors to detect covert channels at run time and to analyze safety properties for multithreads, which need to examine multiple paths.
我们通过使用模态逻辑的执行监视,从代数上描述了一类可执行的安全策略。我们将监视器视为Milnerpsilas CCS中的过程,将安全策略视为模态逻辑中的公式。我们展示了监视器中发生的一组进程必须在公式的最大固定点内,遵循Schneiderpsilas在执行监视器上的定义。我们还考虑可以从单个捕获的动作序列派生一些序列的监视器。为了讨论这些监视器,我们在CCS中引入了一系列进程的变量。然后证明在扩展下存在不动点。这项工作可以帮助我们理解这样的监视器,以便在运行时检测隐蔽通道,并分析需要检查多条路径的多线程的安全属性。
{"title":"Revisiting enforceable security policies","authors":"Naoyuki Nagatou","doi":"10.1109/CRISIS.2008.4757483","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757483","url":null,"abstract":"We algebraically characterize a class of enforceable security policies by execution monitoring using a modal logic. We regard monitors as processes in Milnerpsilas CCS and security policies as formulas in the modal logic. We show that a set of processes occurring in a monitor must be within the greatest fixed point for the formula, following Schneiderpsilas definition on execution monitors. We also consider monitors that can derive some sequences from a single captured action sequence. To discuss such monitors, we introduce variables ranging over sets of processes in CCS. We then show that there is fixed points under the extension. This work may help us to understand such monitors to detect covert channels at run time and to analyze safety properties for multithreads, which need to examine multiple paths.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal procedural security modeling and analysis 形式化的过程安全建模和分析
Pub Date : 2008-10-01 DOI: 10.1109/CRISIS.2008.4757486
Komminist Weldemariam, Adolfo Villafiorita
We are involved in a project related to the evaluation and possible introduction of e-voting for elections held in the Autonomous Province of Trento. One of the goals of the project is defining the laws and the procedures that will regulate e-voting and guarantee the same or an higher level of security than the traditional, paper-based, elections. To do so, we are tackling the problem (also) at the procedural level, namely, we are trying to understand weaknesses and strengths of the procedures regulating elections in Italy, in order to analyze possible attacks and their effects. The analyzes are based on formal specifications of the procedures and on model checkers to help us derive possible attacks. We believe the approach to be useful to help us systematically identifying the limits of the current procedures (i.e. under what hypotheses attacks are undetectable) and, consequently, to state more precisely under what hypotheses and conditions we can guarantee reasonably secure elections.
我们参与了一个项目,该项目涉及在特伦托自治省举行的选举中评估和可能引入电子投票。该项目的目标之一是制定法律和程序,以规范电子投票,并保证与传统的纸质选举相同或更高的安全水平。为此,我们(也)在程序层面处理这个问题,也就是说,我们正在努力了解意大利选举管理程序的弱点和长处,以便分析可能的攻击及其影响。分析基于程序的正式规范和模型检查器,以帮助我们得出可能的攻击。我们认为,这种方法有助于我们系统地确定当前程序的局限性(即,在哪些假设下攻击无法检测到),从而更准确地说明在哪些假设和条件下我们可以保证合理安全的选举。
{"title":"Formal procedural security modeling and analysis","authors":"Komminist Weldemariam, Adolfo Villafiorita","doi":"10.1109/CRISIS.2008.4757486","DOIUrl":"https://doi.org/10.1109/CRISIS.2008.4757486","url":null,"abstract":"We are involved in a project related to the evaluation and possible introduction of e-voting for elections held in the Autonomous Province of Trento. One of the goals of the project is defining the laws and the procedures that will regulate e-voting and guarantee the same or an higher level of security than the traditional, paper-based, elections. To do so, we are tackling the problem (also) at the procedural level, namely, we are trying to understand weaknesses and strengths of the procedures regulating elections in Italy, in order to analyze possible attacks and their effects. The analyzes are based on formal specifications of the procedures and on model checkers to help us derive possible attacks. We believe the approach to be useful to help us systematically identifying the limits of the current procedures (i.e. under what hypotheses attacks are undetectable) and, consequently, to state more precisely under what hypotheses and conditions we can guarantee reasonably secure elections.","PeriodicalId":346123,"journal":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2008 Third International Conference on Risks and Security of Internet and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1