首页 > 最新文献

2011 IEEE 24th Computer Security Foundations Symposium最新文献

英文 中文
Automated Proofs for Diffie-Hellman-Based Key Exchanges 基于diffie - hellman的密钥交换的自动证明
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.11
Long Ngo, C. Boyd, J. G. Nieto
We present an automated verification method for security of Diffie-Hellman-based key exchange protocols. The method includes a Hoare-style logic and syntactic checking. The method is applied to protocols in a simplified version of the Bellare-Rogaway-Pointcheval model (2000). The security of the protocol in the complete model can be established automatically by a modular proof technique of Kudla and Paterson (2005).
提出了一种基于diffie - hellman密钥交换协议安全性的自动验证方法。该方法包括hoare风格的逻辑和语法检查。该方法在Bellare-Rogaway-Pointcheval模型(2000)的简化版本中应用于协议。通过Kudla和Paterson(2005)的模块化证明技术,可以自动建立协议在完整模型中的安全性。
{"title":"Automated Proofs for Diffie-Hellman-Based Key Exchanges","authors":"Long Ngo, C. Boyd, J. G. Nieto","doi":"10.1109/CSF.2011.11","DOIUrl":"https://doi.org/10.1109/CSF.2011.11","url":null,"abstract":"We present an automated verification method for security of Diffie-Hellman-based key exchange protocols. The method includes a Hoare-style logic and syntactic checking. The method is applied to protocols in a simplified version of the Bellare-Rogaway-Pointcheval model (2000). The security of the protocol in the complete model can be established automatically by a modular proof technique of Kudla and Paterson (2005).","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122403632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols 指导通用C验证器证明加密协议
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.8
François Dupressoir, A. Gordon, J. Jürjens, D. Naumann
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography. Our techniques include: use of ghost state to attach formal algebraic terms to concrete byte arrays and to detect collisions when two distinct terms map to the same byte array, decoration of a crypto API with contracts based on symbolic terms, and expression of the attacker model in terms of C programs. We rely on the general-purpose verifier VCC, we guide VCC to prove security simply by writing suitable header files and annotations in implementation files, rather than by changing VCC itself. We formalize the symbolic model in Coq in order to justify the addition of axioms to VCC.
我们描述了如何使用通用验证器来验证加密协议的C代码的安全属性。我们证明了密码学符号模型中的安全定理。我们的技术包括:使用幽灵状态将形式化代数术语附加到具体的字节数组,并在两个不同的术语映射到相同的字节数组时检测碰撞,使用基于符号术语的契约装饰加密API,以及用C程序表达攻击者模型。我们依赖于通用验证器VCC,我们指导VCC简单地通过在实现文件中编写合适的头文件和注释来证明安全性,而不是通过更改VCC本身。为了证明在VCC中添加公理的合理性,我们在Coq中形式化了符号模型。
{"title":"Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols","authors":"François Dupressoir, A. Gordon, J. Jürjens, D. Naumann","doi":"10.1109/CSF.2011.8","DOIUrl":"https://doi.org/10.1109/CSF.2011.8","url":null,"abstract":"We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography. Our techniques include: use of ghost state to attach formal algebraic terms to concrete byte arrays and to detect collisions when two distinct terms map to the same byte array, decoration of a crypto API with contracts based on symbolic terms, and expression of the attacker model in terms of C programs. We rely on the general-purpose verifier VCC, we guide VCC to prove security simply by writing suitable header files and annotations in implementation files, rather than by changing VCC itself. We formalize the symbolic model in Coq in order to justify the addition of axioms to VCC.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Vertical Protocol Composition 垂直协议组成
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.23
Thomas Gross, S. Mödersheim
The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actuallyused -- to run some protocol securely over the established "channel". We call this a vertical protocol composition, and it is truly commonplace in today's communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this self-composition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application protocols that fulfills a number of sufficient preconditions. These preconditions are satisfied for many practically relevant protocols such as TLS.
密钥交换和安全通道协议(如TLS)的安全性已经得到了深入的研究。然而,只有很少的作品考虑到当建立的密钥被实际使用时会发生什么——在建立的“通道”上安全地运行一些协议。我们称之为垂直协议组合,它在当今各种vpn和安全浏览器会话的通信中确实很常见。事实上,我们有几层安全通道是正常的:例如,在vpn连接的顶部,浏览器可能建立另一个安全通道(可能具有不同的端点)。即使在这样的通道堆栈中多次使用相同的协议也很常见:应用程序很可能在已建立的通道上建立另一个TLS通道。我们称之为自我合成。事实上,没有什么能告诉我们所有这些组合都是可靠的,也就是说,这些组合不能引入单独的单个协议所没有的攻击。在这项工作中,我们证明了符号模型中的可组合性结果,该模型允许任意垂直组合(包括自组合)。它适用于满足许多充分先决条件的任何通道和应用程序协议套件中的协议。这些前提条件满足了许多实际相关的协议,如TLS。
{"title":"Vertical Protocol Composition","authors":"Thomas Gross, S. Mödersheim","doi":"10.1109/CSF.2011.23","DOIUrl":"https://doi.org/10.1109/CSF.2011.23","url":null,"abstract":"The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actuallyused -- to run some protocol securely over the established \"channel\". We call this a vertical protocol composition, and it is truly commonplace in today's communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this self-composition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application protocols that fulfills a number of sufficient preconditions. These preconditions are satisfied for many practically relevant protocols such as TLS.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols 静态类型加密协议的资源感知授权策略
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.13
M. Bugliesi, Stefano Calzavara, F. Eigner, Matteo Maffei
Type systems for authorization are a popular device for the specification and verification of security properties in cryptographic applications. Though promising, existing frameworks exhibit limited expressive power, as the underlying specification languages fail to account for powerful notions of authorization based on access counts, usage bounds, and mechanisms of resource consumption, which instead characterize most of the modern online services and applications. We present a new type system that features a novel combination of affine logic, refinement types, and types for cryptography, to support the verification of resource-aware security policies. The type system allows us to analyze a number of cryptographic protocol patterns and security properties, which are out of reach for existing verification frameworks based on static analysis.
用于授权的类型系统是加密应用程序中用于规范和验证安全属性的常用设备。尽管前景很好,但现有框架表现出有限的表达能力,因为底层规范语言没有考虑到基于访问计数、使用界限和资源消耗机制的强大授权概念,而这些概念是大多数现代在线服务和应用程序的特征。我们提出了一个新的类型系统,它以仿射逻辑、细化类型和密码学类型的新组合为特征,以支持资源感知安全策略的验证。类型系统允许我们分析许多加密协议模式和安全属性,这是现有的基于静态分析的验证框架无法实现的。
{"title":"Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols","authors":"M. Bugliesi, Stefano Calzavara, F. Eigner, Matteo Maffei","doi":"10.1109/CSF.2011.13","DOIUrl":"https://doi.org/10.1109/CSF.2011.13","url":null,"abstract":"Type systems for authorization are a popular device for the specification and verification of security properties in cryptographic applications. Though promising, existing frameworks exhibit limited expressive power, as the underlying specification languages fail to account for powerful notions of authorization based on access counts, usage bounds, and mechanisms of resource consumption, which instead characterize most of the modern online services and applications. We present a new type system that features a novel combination of affine logic, refinement types, and types for cryptography, to support the verification of resource-aware security policies. The type system allows us to analyze a number of cryptographic protocol patterns and security properties, which are out of reach for existing verification frameworks based on static analysis.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126830885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Attacking and Fixing Helios: An Analysis of Ballot Secrecy 攻击和修正太阳神:选票保密分析
Pub Date : 2011-06-27 DOI: 10.3233/JCS-2012-0458
V. Cortier, B. Smyth
Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this paper, we analyse ballot secrecy and discover a vulnerability which allows an adversary to compromise the privacy of voters. This vulnerability has been successfully exploited to break privacy in a mock election using the current Helios implementation. Moreover, the feasibility of an attack is considered in the context of French legislative elections and, based upon our findings, we believe it constitutes a real threat to ballot secrecy in such settings. Finally, we present a fix and show that our solution satisfies a formal definition of ballot secrecy using the applied pi calculus.
Helios 2.0是一个开源的基于web的端到端可验证电子投票系统,适合在低强制环境中使用。在本文中,我们分析了选票保密性,并发现了一个允许对手损害选民隐私的漏洞。这个漏洞已经被成功利用,利用当前的Helios实现来破坏模拟选举中的隐私。此外,攻击的可行性是在法国立法选举的背景下考虑的,根据我们的调查结果,我们认为它在这种情况下对投票保密构成了真正的威胁。最后,我们给出了一个修正,并表明我们的解决方案使用应用的pi演算满足选票保密的正式定义。
{"title":"Attacking and Fixing Helios: An Analysis of Ballot Secrecy","authors":"V. Cortier, B. Smyth","doi":"10.3233/JCS-2012-0458","DOIUrl":"https://doi.org/10.3233/JCS-2012-0458","url":null,"abstract":"Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this paper, we analyse ballot secrecy and discover a vulnerability which allows an adversary to compromise the privacy of voters. This vulnerability has been successfully exploited to break privacy in a mock election using the current Helios implementation. Moreover, the feasibility of an attack is considered in the context of French legislative elections and, based upon our findings, we believe it constitutes a real threat to ballot secrecy in such settings. Finally, we present a fix and show that our solution satisfies a formal definition of ballot secrecy using the applied pi calculus.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132252779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 180
Information-Theoretic Bounds for Differentially Private Mechanisms 差分私有机制的信息论界
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.20
G. Barthe, Boris Köpf
There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its own notion of confidentiality: on the one hand, differential privacy is the emerging consensus guarantee used for privacy-preserving data analysis. On the other hand, information-theoretic notions of leakage are used for characterizing the confidentiality properties of programs in language-based settings. The purpose of this article is to establish formal connections between both notions of confidentiality, and to compare them in terms of the security guarantees they deliver. We obtain the following results. First, we establish upper bounds for the leakage of every eps-differentially private mechanism in terms of eps and the size of the mechanism's input domain. We achieve this by identifying and leveraging a connection to coding theory. Second, we construct a class of eps-differentially private channels whose leakage grows with the size of their input domains. Using these channels, we show that there cannot be domain-size-independent bounds for the leakage of all eps-differentially private mechanisms. Moreover, we perform an empirical evaluation that shows that the leakage of these channels almost matches our theoretical upper bounds, demonstrating the accuracy of these bounds. Finally, we show that the question of providing optimal upper bounds for the leakage of eps-differentially private mechanisms in terms of rational functions of eps is in fact decidable.
目前有两个活跃且独立的研究方向,旨在量化通过计算机密数据而泄露的信息量。每个研究领域都发展了自己的机密性概念:一方面,差分隐私是用于保护隐私的数据分析的新兴共识保证。另一方面,泄漏的信息论概念被用于描述基于语言设置的程序的机密性。本文的目的是建立两种机密性概念之间的正式联系,并根据它们提供的安全保证对它们进行比较。我们得到以下结果。首先,我们根据eps和机制输入域的大小建立了每个eps-差分私有机制的泄漏上界。我们通过识别和利用与编码理论的联系来实现这一点。其次,我们构造了一类eps差分私有通道,其泄漏随其输入域的大小而增长。使用这些通道,我们证明了所有ep -差分私有机制的泄漏不可能存在与域大小无关的边界。此外,我们进行了经验评估,表明这些通道的泄漏几乎符合我们的理论上限,证明了这些边界的准确性。最后,我们证明了在eps的有理函数下,为eps-差分私有机制的泄漏提供最优上界的问题实际上是可决定的。
{"title":"Information-Theoretic Bounds for Differentially Private Mechanisms","authors":"G. Barthe, Boris Köpf","doi":"10.1109/CSF.2011.20","DOIUrl":"https://doi.org/10.1109/CSF.2011.20","url":null,"abstract":"There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its own notion of confidentiality: on the one hand, differential privacy is the emerging consensus guarantee used for privacy-preserving data analysis. On the other hand, information-theoretic notions of leakage are used for characterizing the confidentiality properties of programs in language-based settings. The purpose of this article is to establish formal connections between both notions of confidentiality, and to compare them in terms of the security guarantees they deliver. We obtain the following results. First, we establish upper bounds for the leakage of every eps-differentially private mechanism in terms of eps and the size of the mechanism's input domain. We achieve this by identifying and leveraging a connection to coding theory. Second, we construct a class of eps-differentially private channels whose leakage grows with the size of their input domains. Using these channels, we show that there cannot be domain-size-independent bounds for the leakage of all eps-differentially private mechanisms. Moreover, we perform an empirical evaluation that shows that the leakage of these channels almost matches our theoretical upper bounds, demonstrating the accuracy of these bounds. Finally, we show that the question of providing optimal upper bounds for the leakage of eps-differentially private mechanisms in terms of rational functions of eps is in fact decidable.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Dynamic Enforcement of Knowledge-Based Security Policies 基于知识的安全策略的动态实施
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.15
Piotr (Peter) Mardziel, Stephen Magill, M. Hicks, M. Srivatsa
This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier's (possibly increased) knowledge given the results. Limiting knowledge is the goal of existing information release policies that employ mechanisms such as noising, anonymization, and redaction. Knowledge-based policies are more general: they increase flexibility by not fixing the means to restrict information flow. We enforce a knowledge-based policy by explicitly tracking a model of a querier's belief about secret data, represented as a probability distribution, and denying any query that could increase knowledge above a given threshold. We implement query analysis and belief tracking via abstract interpretation using a novel probabilistic polyhedral domain, whose design permits trading off precision with performance while ensuring estimates of a querier's knowledge are sound. Experiments with our implementation show that several useful queries can be handled efficiently, and performance scales far better than would more standard implementations of probabilistic computation based on sampling.
本文探讨了基于知识的安全策略的思想,该策略用于根据给定结果对查询者(可能增加的)知识的估计来决定是否回答对秘密数据的查询。限制知识是现有信息发布策略的目标,这些策略采用诸如噪声、匿名化和编校等机制。以知识为基础的政策更为普遍:它们通过不固定限制信息流的手段来增加灵活性。我们通过显式跟踪查询者对秘密数据的信念模型(表示为概率分布)来执行基于知识的策略,并拒绝任何可能将知识增加到给定阈值以上的查询。我们使用一种新的概率多面体域通过抽象解释实现查询分析和信念跟踪,其设计允许在精度和性能之间进行权衡,同时确保对查询者知识的估计是合理的。使用我们的实现进行的实验表明,可以有效地处理几个有用的查询,并且性能扩展远远优于基于采样的概率计算的更标准实现。
{"title":"Dynamic Enforcement of Knowledge-Based Security Policies","authors":"Piotr (Peter) Mardziel, Stephen Magill, M. Hicks, M. Srivatsa","doi":"10.1109/CSF.2011.15","DOIUrl":"https://doi.org/10.1109/CSF.2011.15","url":null,"abstract":"This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier's (possibly increased) knowledge given the results. Limiting knowledge is the goal of existing information release policies that employ mechanisms such as noising, anonymization, and redaction. Knowledge-based policies are more general: they increase flexibility by not fixing the means to restrict information flow. We enforce a knowledge-based policy by explicitly tracking a model of a querier's belief about secret data, represented as a probability distribution, and denying any query that could increase knowledge above a given threshold. We implement query analysis and belief tracking via abstract interpretation using a novel probabilistic polyhedral domain, whose design permits trading off precision with performance while ensuring estimates of a querier's knowledge are sound. Experiments with our implementation show that several useful queries can be handled efficiently, and performance scales far better than would more standard implementations of probabilistic computation based on sampling.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Local Memory via Layout Randomization 通过布局随机化的本地内存
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.18
R. Jagadeesan, Corin Pitcher, J. Rathke, J. Riely
Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve the secrecy and integrity guarantees for local memory. We follow the approach set out by Abadi and Plot kin. We consider the execution of an idealized language in two environments. In the strict environment, opponents cannot access local variables of the user program. In the lax environment, opponents may attempt to guess allocated memory locations and thus, with small probability, gain access the local memory of the user program. We model these environments using two novel calculi: lambda-mu-hashref and lambda-mu-proberef. Our contribution to the Abadi-Plot kin program is to enrich the programming language with dynamic memory allocation, first class and higher order references and call/cc-style control. On the one hand, these enhancements allow us to directly model a larger class of system hardening principles. On the other hand, the class of opponents is also enhanced since our enriched language permits natural and direct encoding of attacks that alter the control flow of programs. Our main technical result is a fully abstract translation (up to probability) of lambda-mu-hashref into lambda-mu-proberef. Thus, in the presence of randomized layouts, the opponent gains no new power from being able to guess local references of the user program. Our numerical bounds are similar to those of Abadi and Plot kin, thus, the extra programming language features do not cause a concomitant increase in the resources required for protection via randomization.
在计算机安全中,随机化是一种将不可预测性引入软件基础结构的工具。在本文中,我们研究了使用随机化来实现局部内存的保密性和完整性保证。我们遵循阿巴迪和普劳金提出的方法。我们考虑在两种环境中执行一种理想语言。在严格环境下,对手不能访问用户程序的局部变量。在松散的环境中,对手可能会尝试猜测分配的内存位置,从而以很小的概率访问用户程序的本地内存。我们使用两个新颖的演算:lambda-mu-hashref和lambda-mu-proberef来模拟这些环境。我们对Abadi-Plot kin程序的贡献是通过动态内存分配、一级和高阶引用以及调用/cc风格控制来丰富编程语言。一方面,这些增强允许我们直接对更大的系统强化原则类进行建模。另一方面,由于我们丰富的语言允许对改变程序控制流的攻击进行自然和直接的编码,因此对手的类别也得到了增强。我们的主要技术成果是将lambda-mu-hashref完全抽象地转换为lambda-mu-proberef。因此,在随机布局的情况下,对手无法从猜测用户程序的局部引用中获得新的力量。我们的数值界限与Abadi和Plot kin的相似,因此,额外的编程语言特征不会导致通过随机化保护所需资源的增加。
{"title":"Local Memory via Layout Randomization","authors":"R. Jagadeesan, Corin Pitcher, J. Rathke, J. Riely","doi":"10.1109/CSF.2011.18","DOIUrl":"https://doi.org/10.1109/CSF.2011.18","url":null,"abstract":"Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve the secrecy and integrity guarantees for local memory. We follow the approach set out by Abadi and Plot kin. We consider the execution of an idealized language in two environments. In the strict environment, opponents cannot access local variables of the user program. In the lax environment, opponents may attempt to guess allocated memory locations and thus, with small probability, gain access the local memory of the user program. We model these environments using two novel calculi: lambda-mu-hashref and lambda-mu-proberef. Our contribution to the Abadi-Plot kin program is to enrich the programming language with dynamic memory allocation, first class and higher order references and call/cc-style control. On the one hand, these enhancements allow us to directly model a larger class of system hardening principles. On the other hand, the class of opponents is also enhanced since our enriched language permits natural and direct encoding of attacks that alter the control flow of programs. Our main technical result is a fully abstract translation (up to probability) of lambda-mu-hashref into lambda-mu-proberef. Thus, in the presence of randomized layouts, the opponent gains no new power from being able to guess local references of the user program. Our numerical bounds are similar to those of Abadi and Plot kin, thus, the extra programming language features do not cause a concomitant increase in the resources required for protection via randomization.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
StatVerif: Verification of Stateful Processes StatVerif:有状态进程的验证
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.10
Myrto Arapinis, J. Phillips, Eike Ritter, M. Ryan
We present StatVerif, which is an extension the ProVerif process calculus with constructs for explicit state, in order to be able to reason about protocols that manipulate global state. Global state is required by protocols used in hardware devices (such as smart cards and the TPM), as well as by protocols involving databases that store persistent information. We provide the operational semantics of StatVerif. We extend the ProVerif compiler to a compiler for StatVerif: it takes processes written in the extended process language, and produces Horn clauses. Our compilation is carefully engineered to avoid many false attacks. We prove the correctness of the StatVerif compiler. We illustrate our method on two examples: a small hardware security device, and a contract signing protocol. We are able to prove their desired properties automatically.
我们介绍了StatVerif,它是ProVerif处理演算的扩展,带有显式状态的构造,以便能够推断操纵全局状态的协议。硬件设备(如智能卡和TPM)中使用的协议以及涉及存储持久信息的数据库的协议都需要全局状态。我们提供StatVerif的操作语义。我们将ProVerif编译器扩展为StatVerif编译器:它接受用扩展过程语言编写的进程,并生成Horn子句。我们的编译经过精心设计,以避免许多错误攻击。我们证明了StatVerif编译器的正确性。我们通过两个示例来说明我们的方法:一个小型硬件安全设备和一个合同签署协议。我们能够自动地证明它们想要的性质。
{"title":"StatVerif: Verification of Stateful Processes","authors":"Myrto Arapinis, J. Phillips, Eike Ritter, M. Ryan","doi":"10.1109/CSF.2011.10","DOIUrl":"https://doi.org/10.1109/CSF.2011.10","url":null,"abstract":"We present StatVerif, which is an extension the ProVerif process calculus with constructs for explicit state, in order to be able to reason about protocols that manipulate global state. Global state is required by protocols used in hardware devices (such as smart cards and the TPM), as well as by protocols involving databases that store persistent information. We provide the operational semantics of StatVerif. We extend the ProVerif compiler to a compiler for StatVerif: it takes processes written in the extended process language, and produces Horn clauses. Our compilation is carefully engineered to avoid many false attacks. We prove the correctness of the StatVerif compiler. We illustrate our method on two examples: a small hardware security device, and a contract signing protocol. We are able to prove their desired properties automatically.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129163227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Modular Protections against Non-control Data Attacks 针对非控制数据攻击的模块化保护
Pub Date : 2011-06-27 DOI: 10.3233/JCS-140502
Cole Schlesinger, K. Pattabiraman, N. Swamy, D. Walker, B. Zorn
This paper introduces Yarra, a conservative extension to C to protect applications from non-control data attacks. Yarra programmers specify their data integrity requirements by declaring critical data types and ascribing these critical types to important data structures. Yarra guarantees that such critical data is only written through pointers with the given static type. Any attempt to write to critical data through a pointer with an invalid type (perhaps because of a buffer overrun) is detected dynamically. We formalize Yarra's semantics and prove the soundness of a program logic designed for use with the language. A key contribution is to show that Yarra's semantics are strong enough to support sound local reasoning and the use of a frame rule, even across calls to unknown, unverified code. We evaluate a prototype implementation of a compiler and runtime system for Yarra by using it to harden four common server applications against known non-control data vulnerabilities. We show that Yarra defends against these attacks with only a negligible impact on their end-to-end performance.
本文介绍了Yarra,它是C语言的一个保守扩展,用于保护应用程序免受非受控数据攻击。Yarra程序员通过声明关键数据类型并将这些关键类型归属于重要的数据结构来指定他们的数据完整性要求。Yarra保证这样的关键数据只能通过具有给定静态类型的指针写入。任何试图通过无效类型的指针(可能是因为缓冲区溢出)写入关键数据的行为都会被动态检测到。我们形式化了Yarra的语义,并证明了为使用该语言而设计的程序逻辑的合理性。一个关键的贡献是展示了Yarra的语义足够强大,可以支持合理的本地推理和框架规则的使用,甚至可以跨调用未知的、未经验证的代码。我们评估了Yarra编译器和运行时系统的原型实现,通过使用它来强化四个常见的服务器应用程序,以防止已知的非控制数据漏洞。我们展示了Yarra对这些攻击的防御,对它们的端到端性能只有微不足道的影响。
{"title":"Modular Protections against Non-control Data Attacks","authors":"Cole Schlesinger, K. Pattabiraman, N. Swamy, D. Walker, B. Zorn","doi":"10.3233/JCS-140502","DOIUrl":"https://doi.org/10.3233/JCS-140502","url":null,"abstract":"This paper introduces Yarra, a conservative extension to C to protect applications from non-control data attacks. Yarra programmers specify their data integrity requirements by declaring critical data types and ascribing these critical types to important data structures. Yarra guarantees that such critical data is only written through pointers with the given static type. Any attempt to write to critical data through a pointer with an invalid type (perhaps because of a buffer overrun) is detected dynamically. We formalize Yarra's semantics and prove the soundness of a program logic designed for use with the language. A key contribution is to show that Yarra's semantics are strong enough to support sound local reasoning and the use of a frame rule, even across calls to unknown, unverified code. We evaluate a prototype implementation of a compiler and runtime system for Yarra by using it to harden four common server applications against known non-control data vulnerabilities. We show that Yarra defends against these attacks with only a negligible impact on their end-to-end performance.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2011 IEEE 24th Computer Security Foundations Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1