首页 > 最新文献

18th Annual Computer Security Applications Conference, 2002. Proceedings.最新文献

英文 中文
Controlled physical random functions 受控物理随机函数
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176287
B. Gassend, Dwaine E. Clarke, Marten van Dijk, S. Devadas
A physical random function (PUF) is a random function that can only be evaluated with the help of a complex physical system. We introduce controlled physical random functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way. CPUFs can be used to establish a shared secret between a physical device and a remote user. We present protocols that make this possible in a secure and flexible way, even in the case of multiple mutually mistrusting parties. Once established, the shared secret can be used to enable a wide range of applications. We describe certified execution, where a certificate is produced that proves that a specific computation was carried out on a specific processor. Certified execution has many benefits, including protection against malicious nodes in distributed computation networks. We also briefly discuss a software licensing application.
物理随机函数(PUF)是一种随机函数,它只能借助复杂的物理系统来求值。我们引入受控物理随机函数(cpuf),这些PUF只能通过以不可分割的方式物理绑定到PUF的算法来访问。cpuf可用于在物理设备和远程用户之间建立共享密钥。我们提出的协议使这以一种安全和灵活的方式成为可能,即使在多个相互不信任的各方的情况下也是如此。一旦建立了共享秘密,就可以使用它来启用广泛的应用程序。我们描述了经过认证的执行,即生成证明特定计算是在特定处理器上执行的证书。认证执行有很多好处,包括防止分布式计算网络中的恶意节点。我们还简要讨论了软件许可申请。
{"title":"Controlled physical random functions","authors":"B. Gassend, Dwaine E. Clarke, Marten van Dijk, S. Devadas","doi":"10.1109/CSAC.2002.1176287","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176287","url":null,"abstract":"A physical random function (PUF) is a random function that can only be evaluated with the help of a complex physical system. We introduce controlled physical random functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way. CPUFs can be used to establish a shared secret between a physical device and a remote user. We present protocols that make this possible in a secure and flexible way, even in the case of multiple mutually mistrusting parties. Once established, the shared secret can be used to enable a wide range of applications. We describe certified execution, where a certificate is produced that proves that a specific computation was carried out on a specific processor. Certified execution has many benefits, including protection against malicious nodes in distributed computation networks. We also briefly discuss a software licensing application.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 413
Security architecture of the Austrian citizen card concept 奥地利公民卡概念的安全架构
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176311
H. Leitold, Arno Hollosi, R. Posch
When admitting electronic media as a means for citizens to approach public authorities (e-government), security is an indispensable precondition for concerns of legal certainty and for achieving acceptance by the citizens. While the security-enabling technologies such as smartcards, digital signatures, and PKI are mature, questions of scalability, technology-neutrality, and forward-compatibility arise when being deployed on the large scale. The security architecture of the Austrian citizen card is presented. We briefly present the legal provisions that enable e-government. We then reflect on requirements to be fulfilled to achieve a lasting security architecture that provides swift deployment of applications, but provides the flexibility to not discriminate against service providers and technologies that will emerge in future. The concept called "security layer" is discussed as the core part of the security architecture, which basically is an open interface that hides the security-relevant functionality of the citizen card on a high abstraction level. A few e-government applications that are being launched in the short-term are sketched.
当允许电子媒体作为公民接近公共当局(电子政府)的手段时,安全是关注法律确定性和获得公民接受的不可或缺的先决条件。虽然智能卡、数字签名和PKI等安全支持技术已经成熟,但在大规模部署时,会出现可扩展性、技术中立性和前向兼容性的问题。介绍了奥地利公民卡的安全体系结构。我们简要介绍了实现电子政务的法律规定。然后,我们考虑需要满足的需求,以实现持久的安全体系结构,该体系结构提供了应用程序的快速部署,但提供了不歧视将来出现的服务提供者和技术的灵活性。作为安全体系结构的核心部分,讨论了“安全层”的概念,它基本上是一个开放的接口,将市民卡的安全相关功能隐藏在一个较高的抽象层次上。一些电子政务应用程序将在短期内启动。
{"title":"Security architecture of the Austrian citizen card concept","authors":"H. Leitold, Arno Hollosi, R. Posch","doi":"10.1109/CSAC.2002.1176311","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176311","url":null,"abstract":"When admitting electronic media as a means for citizens to approach public authorities (e-government), security is an indispensable precondition for concerns of legal certainty and for achieving acceptance by the citizens. While the security-enabling technologies such as smartcards, digital signatures, and PKI are mature, questions of scalability, technology-neutrality, and forward-compatibility arise when being deployed on the large scale. The security architecture of the Austrian citizen card is presented. We briefly present the legal provisions that enable e-government. We then reflect on requirements to be fulfilled to achieve a lasting security architecture that provides swift deployment of applications, but provides the flexibility to not discriminate against service providers and technologies that will emerge in future. The concept called \"security layer\" is discussed as the core part of the security architecture, which basically is an open interface that hides the security-relevant functionality of the citizen card on a high abstraction level. A few e-government applications that are being launched in the short-term are sketched.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
Protecting Web usage of credit cards using One-Time Pad cookie encryption 使用一次性Pad cookie加密保护信用卡的Web使用情况
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176278
Donghua Xu, Chenghuai Lu, A. D. Santos
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding all these data in a central database of the Web sites would attract hackers' attacks, impose unnecessary liability on the merchant Web sites, and raise the customers' privacy concerns. We introduce and discuss in detail the secure distributed storage of sensitive information using HTTP cookie encryption. We are able to employ One-Time Pads to encrypt the cookies, because encryption and decryption are both done by the server, which is an interesting characteristic overlooked by the existing systems. We implemented this protocol and showed that it is simple, fast and easy to program with.
蓬勃发展的电子商务要求更好的方法来保护在线用户的隐私,特别是在网上购物中广泛使用的信用卡信息。将所有这些数据放在一个网站的中央数据库中会吸引黑客的攻击,给商业网站带来不必要的责任,并引起客户对隐私的担忧。详细介绍并讨论了利用HTTP cookie加密技术实现敏感信息的安全分布式存储。我们能够使用一次性的pad来加密cookie,因为加密和解密都是由服务器完成的,这是现有系统忽略的一个有趣的特性。我们实现了该协议,并表明它简单、快速、易于编程。
{"title":"Protecting Web usage of credit cards using One-Time Pad cookie encryption","authors":"Donghua Xu, Chenghuai Lu, A. D. Santos","doi":"10.1109/CSAC.2002.1176278","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176278","url":null,"abstract":"The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding all these data in a central database of the Web sites would attract hackers' attacks, impose unnecessary liability on the merchant Web sites, and raise the customers' privacy concerns. We introduce and discuss in detail the secure distributed storage of sensitive information using HTTP cookie encryption. We are able to employ One-Time Pads to encrypt the cookies, because encryption and decryption are both done by the server, which is an interesting characteristic overlooked by the existing systems. We implemented this protocol and showed that it is simple, fast and easy to program with.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122046183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A model for attribute-based user-role assignment 基于属性的用户角色分配模型
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176307
M. A. Al-Kahtani, R. Sandhu
The role-based access control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to use the roles' permissions. In environments where the service-providing enterprise has a huge customer base this task becomes formidable. An appealing solution is to automatically assign users to roles. The central contribution of this paper is to describe a model to dynamically assign users to roles based on a finite set of rules defined by the enterprise. These rules take into consideration the attributes of users and any constraints set forth by the enterprise's security policy. The model also allows dynamic revocation of assigned roles based on conditions specified in the security policy. The model provides a language to express these rules and defines a mechanism to determine seniority among different rules. The paper also shows how to use the model to express mandatory access controls (MAC).
基于角色的访问控制(RBAC)模型传统上用于根据特定的企业策略手动将用户分配到适当的角色,从而授权他们使用角色的权限。在提供服务的企业拥有庞大客户群的环境中,这项任务变得非常艰巨。一个吸引人的解决方案是自动为用户分配角色。本文的核心贡献是描述了一个模型,该模型可以根据企业定义的有限规则集动态地为用户分配角色。这些规则考虑了用户的属性和企业安全策略规定的任何约束。该模型还允许基于安全策略中指定的条件动态撤销分配的角色。该模型提供了一种语言来表达这些规则,并定义了一种机制来确定不同规则之间的优先级。本文还展示了如何使用该模型来表示强制访问控制(MAC)。
{"title":"A model for attribute-based user-role assignment","authors":"M. A. Al-Kahtani, R. Sandhu","doi":"10.1109/CSAC.2002.1176307","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176307","url":null,"abstract":"The role-based access control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to use the roles' permissions. In environments where the service-providing enterprise has a huge customer base this task becomes formidable. An appealing solution is to automatically assign users to roles. The central contribution of this paper is to describe a model to dynamically assign users to roles based on a finite set of rules defined by the enterprise. These rules take into consideration the attributes of users and any constraints set forth by the enterprise's security policy. The model also allows dynamic revocation of assigned roles based on conditions specified in the security policy. The model provides a language to express these rules and defines a mechanism to determine seniority among different rules. The paper also shows how to use the model to express mandatory access controls (MAC).","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 198
Gender-preferential text mining of e-mail discourse 电子邮件话语的性别偏好文本挖掘
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176299
M. Corney, O. Vel, Alison Anderson, G. Mohay
This paper describes an investigation of authorship gender attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a support vector machine learning algorithm. Experiments using a corpus of e-mail documents generated by a large number of authors of both genders gave promising results for author gender categorisation.
本文研究了一种基于电子邮件文本文档的作者性别归属挖掘方法。我们使用了一组扩展的主要主题内容无关的电子邮件文档特征,如样式标记、结构特征和性别偏好语言特征,以及支持向量机器学习算法。使用由大量男女作者生成的电子邮件文档语料库进行的实验在作者性别分类方面取得了令人鼓舞的结果。
{"title":"Gender-preferential text mining of e-mail discourse","authors":"M. Corney, O. Vel, Alison Anderson, G. Mohay","doi":"10.1109/CSAC.2002.1176299","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176299","url":null,"abstract":"This paper describes an investigation of authorship gender attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a support vector machine learning algorithm. Experiments using a corpus of e-mail documents generated by a large number of authors of both genders gave promising results for author gender categorisation.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 195
Safe virtual execution using software dynamic translation 使用软件动态翻译安全虚拟执行
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176292
K. Scott, J. Davidson
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing system resources, thereby giving the host the ability to control how individual resources may be used. SVE is used in a variety, of safety-conscious software systems, including the Java Virtual Machine (JVM), software fault isolation (SFI), system call interposition layers, and execution monitors. While SVE is the conceptual foundation for these systems, each uses a different implementation technology. The lack of a unifying framework for building SVE systems results in a variety of problems: many useful SVE systems are not portable and therefore are usable only on a limited number of platforms; code reuse among different SVE systems is often difficult or impossible; and building SVE systems from scratch can be both time consuming and error prone. To address these concerns, we have developed a portable, extensible framework for constructing SVE systems. Our framework, called Strata, is based on software dynamic translation (SDT), a technique for modifying binary programs as they execute. Strata is designed to be ported easily to new platforms and to date has been targeted to SPARC/Solaris, x86/Linux, and MIPS/IRIX. This portability ensures that SVE applications implemented in Strata are available to a wide variety of host systems. Strata also affords the opportunity for code reuse among different SVE applications by establishing a common implementation framework. Strata implements a basic safe virtual execution engine using SDT The base functionality supplied by this engine is easily extended to implement specific SVE systems. In this paper we describe the organization of Strata and demonstrate its extension by building two SVE systems: system call interposition and stack-smashing prevention. To illustrate the use of the system call interposition extensions, the paper presents implementations of several useful security policies.
安全虚拟执行(SVE)允许主机系统减少与运行不受信任程序相关的风险。SVE防止不受信任的程序直接访问系统资源,从而使主机能够控制如何使用单个资源。SVE用于各种具有安全意识的软件系统,包括Java虚拟机(JVM)、软件故障隔离(SFI)、系统调用插入层和执行监视器。虽然SVE是这些系统的概念基础,但每个系统都使用不同的实现技术。构建SVE系统缺乏统一的框架导致了各种各样的问题:许多有用的SVE系统是不可移植的,因此只能在有限数量的平台上使用;不同SVE系统之间的代码重用通常是困难的或不可能的;从头开始构建SVE系统既耗时又容易出错。为了解决这些问题,我们开发了一个可移植的、可扩展的框架来构建SVE系统。我们的框架称为Strata,它基于软件动态翻译(SDT),这是一种在二进制程序执行时修改它们的技术。Strata被设计成可以很容易地移植到新的平台,到目前为止,它的目标是SPARC/Solaris、x86/Linux和MIPS/IRIX。这种可移植性确保了Strata中实现的SVE应用程序可用于各种主机系统。Strata还通过建立一个通用的实现框架,为不同的SVE应用程序之间的代码重用提供了机会。Strata使用SDT实现了一个基本的安全虚拟执行引擎,该引擎提供的基本功能很容易扩展到实现特定的SVE系统。本文通过构建两个SVE系统:系统调用干预系统和防止砸栈系统,描述了Strata的组织结构,并论证了它的扩展。为了说明系统调用插入扩展的使用,本文给出了几个有用的安全策略的实现。
{"title":"Safe virtual execution using software dynamic translation","authors":"K. Scott, J. Davidson","doi":"10.1109/CSAC.2002.1176292","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176292","url":null,"abstract":"Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing system resources, thereby giving the host the ability to control how individual resources may be used. SVE is used in a variety, of safety-conscious software systems, including the Java Virtual Machine (JVM), software fault isolation (SFI), system call interposition layers, and execution monitors. While SVE is the conceptual foundation for these systems, each uses a different implementation technology. The lack of a unifying framework for building SVE systems results in a variety of problems: many useful SVE systems are not portable and therefore are usable only on a limited number of platforms; code reuse among different SVE systems is often difficult or impossible; and building SVE systems from scratch can be both time consuming and error prone. To address these concerns, we have developed a portable, extensible framework for constructing SVE systems. Our framework, called Strata, is based on software dynamic translation (SDT), a technique for modifying binary programs as they execute. Strata is designed to be ported easily to new platforms and to date has been targeted to SPARC/Solaris, x86/Linux, and MIPS/IRIX. This portability ensures that SVE applications implemented in Strata are available to a wide variety of host systems. Strata also affords the opportunity for code reuse among different SVE applications by establishing a common implementation framework. Strata implements a basic safe virtual execution engine using SDT The base functionality supplied by this engine is easily extended to implement specific SVE systems. In this paper we describe the organization of Strata and demonstrate its extension by building two SVE systems: system call interposition and stack-smashing prevention. To illustrate the use of the system call interposition extensions, the paper presents implementations of several useful security policies.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"os-16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
LOCK: an historical perspective LOCK:历史的视角
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176283
O. S. Saydjari
LOCK is an advanced development of hardware-based computer security and crypto-graphic service modules. Much of the design and some of the implementation specifications are complete. The Formal Top Level Specification (FTLS) also is complete and the advanced noninterference proofs are beginning. This hardware-based approach has brought the LOCK project into many uncharted areas in the design, verification, and evaluation of an integrated information security system. System integration promises to be the single largest programmatic problem. Our verification tools seem able to verify design only and not implementation.
LOCK是基于硬件的计算机安全和加密服务模块的先进发展。大部分设计和一些实现规范已经完成。正式的顶层规范(FTLS)也已经完成,高级的抗干扰证明已经开始。这种基于硬件的方法使LOCK项目在集成信息安全系统的设计、验证和评估方面进入了许多未知的领域。系统集成将成为最大的编程问题。我们的验证工具似乎只能验证设计而不能验证实现。
{"title":"LOCK: an historical perspective","authors":"O. S. Saydjari","doi":"10.1109/CSAC.2002.1176283","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176283","url":null,"abstract":"LOCK is an advanced development of hardware-based computer security and crypto-graphic service modules. Much of the design and some of the implementation specifications are complete. The Formal Top Level Specification (FTLS) also is complete and the advanced noninterference proofs are beginning. This hardware-based approach has brought the LOCK project into many uncharted areas in the design, verification, and evaluation of an integrated information security system. System integration promises to be the single largest programmatic problem. Our verification tools seem able to verify design only and not implementation.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting and defending against Web-server fingerprinting 检测和防御web服务器指纹
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176304
Dustin Lee, J. Rowe, C. Ko, K. Levitt
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered vulnerability. This paper discusses techniques for remote identification of web servers and suggests possible defenses to the probing activity. General concepts of finger-printing and their application to the identification of Web servers, even where server information has been omitted are described and methodologies for detecting and limiting such activity are discussed.
网络攻击越来越复杂。高级攻击者通常在发动精确攻击以利用发现的漏洞之前收集有关目标系统的信息。本文讨论了web服务器的远程识别技术,并提出了对探测活动的可能防御措施。本文描述了指纹识别的一般概念及其在Web服务器识别中的应用,甚至在省略了服务器信息的情况下也是如此,并讨论了检测和限制此类活动的方法。
{"title":"Detecting and defending against Web-server fingerprinting","authors":"Dustin Lee, J. Rowe, C. Ko, K. Levitt","doi":"10.1109/CSAC.2002.1176304","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176304","url":null,"abstract":"Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered vulnerability. This paper discusses techniques for remote identification of web servers and suggests possible defenses to the probing activity. General concepts of finger-printing and their application to the identification of Web servers, even where server information has been omitted are described and methodologies for detecting and limiting such activity are discussed.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Digging for worms, fishing for answers 挖掘蠕虫,寻找答案
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176293
Florian P. Buchholz, Thomas E. Daniels, James P. Early, R. Gopalakrishna, R. P. Gorman, Benjamin A. Kuperman, S. Nystrom, A. Schroll, Andrew Smith
Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way, it becomes apparent that the majority of detection techniques used today focus on the first three stages. This paper presents a technique that is used in the fourth stage to detect the class of worms that use a horizontal scan to propagate. An argument is also made that detection in the fourth stage is a viable, but under-used technique.
蠕虫仍然是互联网上主要的安全威胁。本文分析了几种分布较广的蠕虫,并发展了它们的一般生命周期。从受害宿主的角度来看,生命周期包括四个阶段:目标选择、利用、感染和传播。虽然不是所有的蠕虫都完全符合这个框架,但通过这种方式理解它们,很明显,今天使用的大多数检测技术都集中在前三个阶段。本文介绍了在第四阶段使用的一种技术,用于检测使用水平扫描传播的蠕虫类。还有一种观点认为,第四阶段的检测是可行的,但使用不足。
{"title":"Digging for worms, fishing for answers","authors":"Florian P. Buchholz, Thomas E. Daniels, James P. Early, R. Gopalakrishna, R. P. Gorman, Benjamin A. Kuperman, S. Nystrom, A. Schroll, Andrew Smith","doi":"10.1109/CSAC.2002.1176293","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176293","url":null,"abstract":"Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way, it becomes apparent that the majority of detection techniques used today focus on the first three stages. This paper presents a technique that is used in the fourth stage to detect the class of worms that use a horizontal scan to propagate. An argument is also made that detection in the fourth stage is a viable, but under-used technique.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115063232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Enforcing resource bound safety for mobile SNMP agents 加强移动SNMP代理的资源绑定安全性
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176280
Weijiang Yu, A. Mok
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology limit its acceptance in practice. A key issue is to safeguard resource usage abuse by malicious or buggy mobile agents on the hosting system. This paper describes how the TINMAN architecture, a framework and a suite of tools for enforcing resource safety of mobile code is applied to mobile SNMP agents. TINMAN uses a suite of resource-usage checking tools which consists of a resource bound predictor a usage certification generator and a verifier at compile-time, and certificate validation and monitoring tools at run-time. This paper shows how TINMAN tools can provide 100% coverage by a combination of off-line static analysis and run-time monitoring in enforcing safety on resource consumption of mobile SNMP agents. Experimental results from the current TINMAN implementation are given.
移动代理与SNMP的集成为复杂网络的管理创造了显著的优势。然而,移动代理技术的安全问题限制了其在实践中的应用。一个关键问题是防止托管系统上恶意或有缺陷的移动代理滥用资源。本文描述了如何将TINMAN体系结构,一个框架和一套工具用于加强移动代码的资源安全,并应用于移动SNMP代理。TINMAN使用一套资源使用情况检查工具,其中包括资源绑定预测器、编译时的使用情况认证生成器和验证器,以及运行时的证书验证和监视工具。本文展示了TINMAN工具如何通过离线静态分析和运行时监控的组合来提供100%的覆盖率,从而加强移动SNMP代理的资源消耗安全性。给出了目前TINMAN实现的实验结果。
{"title":"Enforcing resource bound safety for mobile SNMP agents","authors":"Weijiang Yu, A. Mok","doi":"10.1109/CSAC.2002.1176280","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176280","url":null,"abstract":"The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology limit its acceptance in practice. A key issue is to safeguard resource usage abuse by malicious or buggy mobile agents on the hosting system. This paper describes how the TINMAN architecture, a framework and a suite of tools for enforcing resource safety of mobile code is applied to mobile SNMP agents. TINMAN uses a suite of resource-usage checking tools which consists of a resource bound predictor a usage certification generator and a verifier at compile-time, and certificate validation and monitoring tools at run-time. This paper shows how TINMAN tools can provide 100% coverage by a combination of off-line static analysis and run-time monitoring in enforcing safety on resource consumption of mobile SNMP agents. Experimental results from the current TINMAN implementation are given.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
18th Annual Computer Security Applications Conference, 2002. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1