首页 > 最新文献

18th Annual Computer Security Applications Conference, 2002. Proceedings.最新文献

英文 中文
A context-aware security architecture for emerging applications 用于新兴应用程序的上下文感知安全体系结构
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176296
M. Covington, Prahlad Fogla, Zhiyuan Zhan, M. Ahamad
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of security-relevant "context" to provide flexible access control and policy enforcement. We previously presented a generalized access control model that makes significant use of contextual information in policy definition. This document provides a concrete realization of such a model by presenting a system-level service architecture, as well as early implementation experience with the framework. Through our context-aware security services, our system architecture offers enhanced authentication services, more flexible access control and a security subsystem that can adapt itself based on current conditions in the environment. We discuss our architecture and implementation and show how it can be used to secure several sample applications.
我们描述了一种为上下文感知环境构建安全服务的方法。具体地说,我们关注安全服务的设计,这些服务结合了与安全相关的“上下文”的使用,以提供灵活的访问控制和策略实施。我们之前提出了一个通用的访问控制模型,该模型在策略定义中大量使用了上下文信息。本文通过展示系统级服务体系结构以及该框架的早期实现经验,提供了这种模型的具体实现。通过上下文感知的安全服务,我们的系统架构提供了增强的身份验证服务、更灵活的访问控制和一个可以根据环境中的当前条件进行自我调整的安全子系统。我们将讨论我们的体系结构和实现,并展示如何使用它来保护几个示例应用程序。
{"title":"A context-aware security architecture for emerging applications","authors":"M. Covington, Prahlad Fogla, Zhiyuan Zhan, M. Ahamad","doi":"10.1109/CSAC.2002.1176296","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176296","url":null,"abstract":"We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of security-relevant \"context\" to provide flexible access control and policy enforcement. We previously presented a generalized access control model that makes significant use of contextual information in policy definition. This document provides a concrete realization of such a model by presenting a system-level service architecture, as well as early implementation experience with the framework. Through our context-aware security services, our system architecture offers enhanced authentication services, more flexible access control and a security subsystem that can adapt itself based on current conditions in the environment. We discuss our architecture and implementation and show how it can be used to secure several sample applications.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124782596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 216
Advanced features for enterprise-wide role-based access control 用于企业级基于角色的访问控制的高级功能
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176305
A. Kern
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implementation is normally restricted to single systems and applications. In this article we define enterprise roles capable of spanning all IT systems in an organisation. We show how the enterprise role-based access control (ERBAC) model exploits the RBAC model outlined in the NIST standard draft and describe its extensions. We have implemented ERBAC as a basic concept of SAM Jupiter, a commercial security administration tool. Based on practical experience with the deployment of Enterprise Roles during SAM implementation projects in large organisations, we have enhanced the ERBAC model by including different ways of parametrising the roles. We show that using parameters can significantly reduce the number of roles needed in an enterprise and simplify the role structure, thereby reducing the administration effort considerably. The enhanced ERBAC features are illustrated by real-life examples.
在大型企业中,用户和访问权限的管理是一项复杂而富有挑战性的任务。角色是简化访问控制的一个强大概念,但其实现通常仅限于单个系统和应用程序。在本文中,我们定义了能够跨越组织中所有IT系统的企业角色。我们将展示企业基于角色的访问控制(ERBAC)模型如何利用NIST标准草案中概述的RBAC模型,并描述其扩展。我们已经将ERBAC实现为商业安全管理工具SAM Jupiter的一个基本概念。基于在大型组织的SAM实施项目中部署企业角色的实际经验,我们通过包括不同的角色参数化方法来增强ERBAC模型。我们展示了使用参数可以显著减少企业中所需的角色数量,并简化角色结构,从而大大减少了管理工作。增强的ERBAC功能通过现实生活中的例子来说明。
{"title":"Advanced features for enterprise-wide role-based access control","authors":"A. Kern","doi":"10.1109/CSAC.2002.1176305","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176305","url":null,"abstract":"The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implementation is normally restricted to single systems and applications. In this article we define enterprise roles capable of spanning all IT systems in an organisation. We show how the enterprise role-based access control (ERBAC) model exploits the RBAC model outlined in the NIST standard draft and describe its extensions. We have implemented ERBAC as a basic concept of SAM Jupiter, a commercial security administration tool. Based on practical experience with the deployment of Enterprise Roles during SAM implementation projects in large organisations, we have enhanced the ERBAC model by including different ways of parametrising the roles. We show that using parameters can significantly reduce the number of roles needed in an enterprise and simplify the role structure, thereby reducing the administration effort considerably. The enhanced ERBAC features are illustrated by real-life examples.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Throttling viruses: restricting propagation to defeat malicious mobile code 节流病毒:限制传播以击败恶意移动代码
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176279
Matthew M. Williamson
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to restricting this high speed propagation automatically. The approach is based on the observation that during virus propagation, an infected machine will connect to as many different machines as fast as possible. An uninfected machine has a different behaviour: connections are made at a lower rate, and are locally correlated (repeat connections to recently accessed machines are likely). This paper describes a simple technique to limit the rate of connections to "new" machines that is remarkably effective at both slowing and halting virus propagation without affecting normal traffic. Results of applying the filter to Web browsing data are included. The paper concludes by suggesting an implementation and discussing the potential and limitations of this approach.
现代计算机病毒的传播速度快得令人难以置信,远远快于人类介导的反应。这大大增加了它们造成的伤害。本文提出了一种自动限制这种高速传播的方法。该方法基于以下观察:在病毒传播期间,一台受感染的机器将尽可能快地连接到多台不同的机器。未受感染的机器有不同的行为:以较低的速率建立连接,并且是局部相关的(可能与最近访问的机器重复连接)。本文描述了一种限制连接到“新”机器的速率的简单技术,它在不影响正常流量的情况下,在减缓和阻止病毒传播方面非常有效。最后给出了将过滤器应用于Web浏览数据的结果。本文最后提出了一种实现方法,并讨论了这种方法的潜力和局限性。
{"title":"Throttling viruses: restricting propagation to defeat malicious mobile code","authors":"Matthew M. Williamson","doi":"10.1109/CSAC.2002.1176279","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176279","url":null,"abstract":"Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to restricting this high speed propagation automatically. The approach is based on the observation that during virus propagation, an infected machine will connect to as many different machines as fast as possible. An uninfected machine has a different behaviour: connections are made at a lower rate, and are locally correlated (repeat connections to recently accessed machines are likely). This paper describes a simple technique to limit the rate of connections to \"new\" machines that is remarkably effective at both slowing and halting virus propagation without affecting normal traffic. Results of applying the filter to Web browsing data are included. The paper concludes by suggesting an implementation and discussing the potential and limitations of this approach.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 414
Wireless security: vulnerabilities and countermeasures 无线安全:漏洞与对策
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176282
Dale M. Johnson
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
小组会议将讨论无线安全的当前问题和问题以及解决这些问题的方法。
{"title":"Wireless security: vulnerabilities and countermeasures","authors":"Dale M. Johnson","doi":"10.1109/CSAC.2002.1176282","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176282","url":null,"abstract":"The panel session will cover current issues and problems in wireless security and approaches to dealing with them.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126544832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malicious code detection for open firmware 开放固件的恶意代码检测
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176312
F. Adelstein, M. Stillerman, D. Kozen
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. We describe an approach to this problem based on load-time verification of onboard device drivers against a standard security policy designed to limit access to system resources. We also describe our ongoing effort to construct a prototype of this technique for open firmware boot platforms.
恶意引导固件对我们的全球信息基础设施来说是一个很大程度上未被认识到的重大安全风险。由于引导固件在加载操作系统之前执行,因此它可以很容易地绕过任何基于操作系统的安全机制。引导固件程序通常由第三方设备制造商编写,可能来自各种来源不明的供应商。我们描述了一种解决此问题的方法,该方法基于针对旨在限制对系统资源访问的标准安全策略的板载设备驱动程序的加载时验证。我们还描述了为开放固件引导平台构建该技术原型的持续努力。
{"title":"Malicious code detection for open firmware","authors":"F. Adelstein, M. Stillerman, D. Kozen","doi":"10.1109/CSAC.2002.1176312","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176312","url":null,"abstract":"Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin. We describe an approach to this problem based on load-time verification of onboard device drivers against a standard security policy designed to limit access to system resources. We also describe our ongoing effort to construct a prototype of this technique for open firmware boot platforms.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A toolkit for detecting and analyzing malicious software 用于检测和分析恶意软件的工具包
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176314
Michael Weber, M. Schmid, M. Schatz, David Geyer
We present PEAT: the Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to examine structural aspects of a Windows Portable Executable (PE) file, with the goal of determining whether malicious code has been inserted into an application after compilation. These tools rely on structural features of executables that are likely to indicate the presence of inserted malicious code. The underlying premise is that typical application programs are compiled into one binary, homogeneous from beginning to end with respect to certain structural features; any disruption of this homogeneity is a strong indicator that the binary has been tampered with. For example, it could now harbor a virus or a Trojan horse program. We present our investigation into structural feature analysis, the development of these ideas into the PEAT prototype, and results that illustrate PEAT's practical effectiveness.
我们提出PEAT:便携式可执行分析工具包。它是一个软件原型,旨在为分析人员提供一系列工具,以便检查Windows可移植可执行文件(PE)的结构方面,其目标是确定编译后是否已将恶意代码插入应用程序。这些工具依赖于可执行文件的结构特征,这些特征可能表明存在插入的恶意代码。基本的前提是,典型的应用程序被编译成一个二进制,从头到尾都具有某些结构特征;这种同质性的任何破坏都是二进制被篡改的强烈迹象。例如,它现在可能包含病毒或特洛伊木马程序。我们介绍了我们对结构特征分析的研究,将这些想法发展到PEAT原型中,并展示了PEAT的实际有效性。
{"title":"A toolkit for detecting and analyzing malicious software","authors":"Michael Weber, M. Schmid, M. Schatz, David Geyer","doi":"10.1109/CSAC.2002.1176314","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176314","url":null,"abstract":"We present PEAT: the Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to examine structural aspects of a Windows Portable Executable (PE) file, with the goal of determining whether malicious code has been inserted into an application after compilation. These tools rely on structural features of executables that are likely to indicate the presence of inserted malicious code. The underlying premise is that typical application programs are compiled into one binary, homogeneous from beginning to end with respect to certain structural features; any disruption of this homogeneity is a strong indicator that the binary has been tampered with. For example, it could now harbor a virus or a Trojan horse program. We present our investigation into structural feature analysis, the development of these ideas into the PEAT prototype, and results that illustrate PEAT's practical effectiveness.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128156633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Composable tools for network discovery and security analysis 用于网络发现和安全分析的可组合工具
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176274
G. Vigna, Fredrik Valeur, Jingyu Zhou, R. Kemmerer
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network mapping tools. These tools rely on models to represent the entities of interest, and they leverage off network discovery techniques to populate the model structure with the data that is pertinent to a specific target network. Unfortunately, existing tools rely on incomplete data models. Networks are complex systems and most approaches oversimplify their target models in an effort to limit the problem space. In addition, the techniques used to populate the models are limited in scope and are difficult to extend. This paper presents NetMap, a security tool for network modeling, discovery, and analysis. NetMap relies on a comprehensive network model that is not limited to a specific network level; it integrates network information throughout the layers. The model contains information about topology, infrastructure, and deployed services. In addition, the relationships among different entities in different layers of the model are made explicit. The modeled information is managed by using a suite of composable network tools that can determine various aspects of network configurations through scanning techniques and heuristics. Tools in the suite are responsible for a single, well-defined task.
安全分析应该利用可靠的知识库,其中包含有关受保护网络的语义丰富的信息。这些知识由网络映射工具提供。这些工具依赖于模型来表示感兴趣的实体,它们利用网络发现技术,用与特定目标网络相关的数据填充模型结构。不幸的是,现有的工具依赖于不完整的数据模型。网络是复杂的系统,大多数方法为了限制问题空间而过度简化了它们的目标模型。此外,用于填充模型的技术在范围上是有限的,并且很难扩展。本文介绍了NetMap,一个用于网络建模、发现和分析的安全工具。NetMap依赖于不局限于特定网络级别的综合网络模型;它集成了各层的网络信息。该模型包含有关拓扑、基础设施和已部署服务的信息。此外,还明确了模型各层中不同实体之间的关系。通过使用一套可组合的网络工具来管理建模的信息,这些工具可以通过扫描技术和启发式方法确定网络配置的各个方面。套件中的工具负责单一的、定义良好的任务。
{"title":"Composable tools for network discovery and security analysis","authors":"G. Vigna, Fredrik Valeur, Jingyu Zhou, R. Kemmerer","doi":"10.1109/CSAC.2002.1176274","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176274","url":null,"abstract":"Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network mapping tools. These tools rely on models to represent the entities of interest, and they leverage off network discovery techniques to populate the model structure with the data that is pertinent to a specific target network. Unfortunately, existing tools rely on incomplete data models. Networks are complex systems and most approaches oversimplify their target models in an effort to limit the problem space. In addition, the techniques used to populate the models are limited in scope and are difficult to extend. This paper presents NetMap, a security tool for network modeling, discovery, and analysis. NetMap relies on a comprehensive network model that is not limited to a specific network level; it integrates network information throughout the layers. The model contains information about topology, infrastructure, and deployed services. In addition, the relationships among different entities in different layers of the model are made explicit. The modeled information is managed by using a suite of composable network tools that can determine various aspects of network configurations through scanning techniques and heuristics. Tools in the suite are responsible for a single, well-defined task.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131211181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Evaluating the impact of automated intrusion response mechanisms 评估自动入侵响应机制的影响
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176302
Thomas Tøth, Christopher Krügel
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators neither can keep up with the pace that an IDS is delivering alerts, nor can they react upon these within adequate time limits. Automatic response systems have to take over that task. In case of an identified intrusion, these components have to initiate appropriate actions to counter emerging threats. Most current intrusion response systems (IRSs) utilize static mappings to determine adequate response actions in reaction to detected intrusions. The problem with this approach is its inherent inflexibility. Countermeasures (such as changes of firewall rules) often do not only defend against the detected attack but may also have negative effects on legitimate users of the network and its services. To prevent a situation where a response action causes more damage that the actual attack, a mechanism is needed that compares the severity of an attack to the effects of a possible response mechanism. In this paper, we present a network model and an algorithm to evaluate the impact of response actions on the entities of a network. This allows the IRS to select the response among several alternatives which fulfills the security requirements and has a minimal negative effect on legitimate users.
入侵检测系统(ids)已经达到了高度的复杂程度,并且能够用各种方法检测入侵。不幸的是,系统管理员既不能跟上IDS发送警报的速度,也不能在足够的时间限制内对这些警报作出反应。自动反应系统必须接管这项任务。在识别入侵的情况下,这些组件必须启动适当的操作来应对新出现的威胁。当前大多数入侵响应系统(IRSs)利用静态映射来确定对检测到的入侵的适当响应动作。这种方法的问题在于其固有的不灵活性。对策(例如更改防火墙规则)通常不仅可以防御检测到的攻击,还可能对网络及其服务的合法用户产生负面影响。为了防止响应行为造成比实际攻击更大的损害,需要一种机制来比较攻击的严重程度和可能的响应机制的影响。在本文中,我们提出了一个网络模型和一种算法来评估响应行为对网络实体的影响。这允许IRS在满足安全需求的几个备选方案中选择响应,并且对合法用户的负面影响最小。
{"title":"Evaluating the impact of automated intrusion response mechanisms","authors":"Thomas Tøth, Christopher Krügel","doi":"10.1109/CSAC.2002.1176302","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176302","url":null,"abstract":"Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators neither can keep up with the pace that an IDS is delivering alerts, nor can they react upon these within adequate time limits. Automatic response systems have to take over that task. In case of an identified intrusion, these components have to initiate appropriate actions to counter emerging threats. Most current intrusion response systems (IRSs) utilize static mappings to determine adequate response actions in reaction to detected intrusions. The problem with this approach is its inherent inflexibility. Countermeasures (such as changes of firewall rules) often do not only defend against the detected attack but may also have negative effects on legitimate users of the network and its services. To prevent a situation where a response action causes more damage that the actual attack, a mechanism is needed that compares the severity of an attack to the effects of a possible response mechanism. In this paper, we present a network model and an algorithm to evaluate the impact of response actions on the entities of a network. This allows the IRS to select the response among several alternatives which fulfills the security requirements and has a minimal negative effect on legitimate users.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127324263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
With gaming technology towards secure user interfaces 用游戏技术实现安全的用户界面
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176277
Hanno Langweg
Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a game-friendly platform. However, this kind of programming interfaces can be used to promote security as well. We use Microsoft's DirectX platform to access input and output devices directly. Thereby we enable applications to distinguish between user actions and simulated behaviour by malicious code. With modest effort for a developer we are able to ensure authenticity and integrity of mouse and keyboard input and the display's integrity.
旨在让游戏开发者生活更轻松的技术在安全专家中是一个有争议的问题。反对意见源于对游戏友好型平台稳定性的担忧。然而,这种编程接口也可以用来提高安全性。我们使用微软的DirectX平台直接访问输入和输出设备。因此,我们使应用程序能够区分用户行为和恶意代码的模拟行为。对于开发人员来说,只要稍加努力,我们就能够确保鼠标和键盘输入的真实性和完整性以及显示的完整性。
{"title":"With gaming technology towards secure user interfaces","authors":"Hanno Langweg","doi":"10.1109/CSAC.2002.1176277","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176277","url":null,"abstract":"Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a game-friendly platform. However, this kind of programming interfaces can be used to promote security as well. We use Microsoft's DirectX platform to access input and output devices directly. Thereby we enable applications to distinguish between user actions and simulated behaviour by malicious code. With modest effort for a developer we are able to ensure authenticity and integrity of mouse and keyboard input and the display's integrity.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130995255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
GOSSIB vs. IP traceback rumors 流言vs. IP回溯谣言
Pub Date : 2002-12-09 DOI: 10.1109/CSAC.2002.1176273
M. Waldvogel
To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking (PPM) have received most attention, as they are easy to implement and deploy incrementally. We introduce a new concept, namely Groups Of Strongly SImilar Birthdays (GOSSIB), that can be used by to obtain effects similar to a successful birthday attack on PPM schemes. The original and most widely known IP traceback mechanism, compressed edge fragment sampling (CEFS), was developed by Savage et al. (2000). We analyze the effects of an attacker using GOSSIB against CEFS and show that the attacker can seed misinformation much more efficiently than the network is able to contribute real traceback information. Thus, GOSSIB will render PPM effectively useless. It can be expected that GOSSIB has similar effects on other PPM traceback schemes and that standard modifications to the systems will not solve the problem.
为了识别分布式拒绝服务攻击的来源,提出了路径回溯机制。依赖于概率包标记(PPM)的回溯机制受到了最多的关注,因为它们易于实现和增量部署。我们引入了一个新概念,即强相似生日组(gossip),可以用来获得类似于PPM方案成功的生日攻击的效果。原始的和最广为人知的IP回溯机制,压缩边缘片段采样(CEFS),是由Savage等人(2000)开发的。我们分析了攻击者使用gossip对CEFS的影响,并表明攻击者可以比网络提供真实追溯信息的效率更高地播种错误信息。因此,gossip将使PPM实际上毫无用处。可以预期,gossip对其他PPM追溯方案也有类似的影响,对系统进行标准修改并不能解决问题。
{"title":"GOSSIB vs. IP traceback rumors","authors":"M. Waldvogel","doi":"10.1109/CSAC.2002.1176273","DOIUrl":"https://doi.org/10.1109/CSAC.2002.1176273","url":null,"abstract":"To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking (PPM) have received most attention, as they are easy to implement and deploy incrementally. We introduce a new concept, namely Groups Of Strongly SImilar Birthdays (GOSSIB), that can be used by to obtain effects similar to a successful birthday attack on PPM schemes. The original and most widely known IP traceback mechanism, compressed edge fragment sampling (CEFS), was developed by Savage et al. (2000). We analyze the effects of an attacker using GOSSIB against CEFS and show that the attacker can seed misinformation much more efficiently than the network is able to contribute real traceback information. Thus, GOSSIB will render PPM effectively useless. It can be expected that GOSSIB has similar effects on other PPM traceback schemes and that standard modifications to the systems will not solve the problem.","PeriodicalId":389487,"journal":{"name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
18th Annual Computer Security Applications Conference, 2002. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1