首页 > 最新文献

2022 IEEE 35th Computer Security Foundations Symposium (CSF)最新文献

英文 中文
Contingent payments from two-party signing and verification for abelian groups 阿贝尔群的两方签名和验证的或有支付
Pub Date : 2022-08-01 DOI: 10.1109/CSF54842.2022.9919674
Sergiu Bursuc, S. Mauw
The fair exchange problem has faced for a long time the bottleneck of a required trusted third party. The recent development of blockchains introduces a new type of party to this problem, whose trustworthiness relies on a public ledger and distributed computation. The challenge in this setting is to reconcile the minimalistic and public nature of blockchains with elaborate fair exchange requirements, from functionality to privacy. Zero-knowledge contingent payments (ZKCP) are a class of protocols that are promising in this direction, allowing the fair exchange of data for payment. We propose a new ZKCP protocol that, when compared to others, requires less computation from the blockchain and less interaction between parties. The protocol is based on two-party (weak) adaptor signatures, which we show how to instantiate from state of the art multiparty signing protocols. We improve the symbolic definition of ZKCP security and, for automated verification with Tamarin, we propose a general security reduction from the theory of abelian groups to the theory of exclusive or.
长期以来,公平交易问题一直面临着需要可信第三方的瓶颈。最近区块链的发展为这一问题引入了一种新型的当事方,其可信度依赖于公共分类账和分布式计算。这种情况下的挑战是如何将区块链的简约和公共性质与从功能到隐私的精心设计的公平交换要求相协调。零知识或有支付(ZKCP)是在这个方向上有希望的一类协议,允许公平交换数据进行支付。我们提出了一个新的ZKCP协议,与其他协议相比,它需要更少的区块链计算和更少的各方之间的交互。该协议基于两方(弱)适配器签名,我们将展示如何从最先进的多方签名协议实例化适配器签名。我们改进了ZKCP安全性的符号定义,并提出了从阿贝尔群理论到排他或理论的一般安全性约简。
{"title":"Contingent payments from two-party signing and verification for abelian groups","authors":"Sergiu Bursuc, S. Mauw","doi":"10.1109/CSF54842.2022.9919674","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919674","url":null,"abstract":"The fair exchange problem has faced for a long time the bottleneck of a required trusted third party. The recent development of blockchains introduces a new type of party to this problem, whose trustworthiness relies on a public ledger and distributed computation. The challenge in this setting is to reconcile the minimalistic and public nature of blockchains with elaborate fair exchange requirements, from functionality to privacy. Zero-knowledge contingent payments (ZKCP) are a class of protocols that are promising in this direction, allowing the fair exchange of data for payment. We propose a new ZKCP protocol that, when compared to others, requires less computation from the blockchain and less interaction between parties. The protocol is based on two-party (weak) adaptor signatures, which we show how to instantiate from state of the art multiparty signing protocols. We improve the symbolic definition of ZKCP security and, for automated verification with Tamarin, we propose a general security reduction from the theory of abelian groups to the theory of exclusive or.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124159122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mapping Synthesis for Hyperproperties 超属性的映射综合
Pub Date : 2022-08-01 DOI: 10.1109/CSF54842.2022.9919679
Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, S. Tripakis
In system design, high-level system models typically need to be mapped to an execution platform (e.g., hardware, environment, compiler, etc). The platform may naturally strengthen some constraints or weaken some others, but it is expected that the low-level implementation on the platform should preserve all the functional and extra-functional properties of the model, including the ones for information-flow security. It is, however, well known that simple notions of refinement do not preserve information-flow security properties. In this paper, we propose a novel automated mapping synthesis approach that preserves hyperproperties expressed in the temporal logic HyperLTL. The significance of our technique is that it can handle formulas with quantifier alternations, which is typically the source of difficulty in refinement for information-flow security policies. We reduce the mapping synthesis problem to HyperLTL model checking and leverage recent efforts in bounded model checking for hyperproperties. We demonstrate how mapping synthesis can be used in various applications, including enforcing non-interference and automating secrecy-preserving refinement mapping. We also evaluate our approach using the battleship game and password validation use cases.
在系统设计中,高级系统模型通常需要映射到执行平台(例如,硬件、环境、编译器等)。平台可能会自然地加强某些约束或削弱其他约束,但是期望平台上的低级实现应该保留模型的所有功能和功能外属性,包括用于信息流安全的属性。然而,众所周知,简单的细化概念并不能保留信息流的安全属性。在本文中,我们提出了一种新的自动映射综合方法,该方法保留了在时间逻辑HyperLTL中表达的超属性。我们的技术的意义在于,它可以处理具有量词变化的公式,这通常是信息流安全策略细化的困难来源。我们将映射综合问题简化为HyperLTL模型检查,并利用最近在超属性的有界模型检查方面的努力。我们演示了如何在各种应用程序中使用映射合成,包括强制不干扰和自动保密的精细映射。我们还使用战舰游戏和密码验证用例来评估我们的方法。
{"title":"Mapping Synthesis for Hyperproperties","authors":"Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, S. Tripakis","doi":"10.1109/CSF54842.2022.9919679","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919679","url":null,"abstract":"In system design, high-level system models typically need to be mapped to an execution platform (e.g., hardware, environment, compiler, etc). The platform may naturally strengthen some constraints or weaken some others, but it is expected that the low-level implementation on the platform should preserve all the functional and extra-functional properties of the model, including the ones for information-flow security. It is, however, well known that simple notions of refinement do not preserve information-flow security properties. In this paper, we propose a novel automated mapping synthesis approach that preserves hyperproperties expressed in the temporal logic HyperLTL. The significance of our technique is that it can handle formulas with quantifier alternations, which is typically the source of difficulty in refinement for information-flow security policies. We reduce the mapping synthesis problem to HyperLTL model checking and leverage recent efforts in bounded model checking for hyperproperties. We demonstrate how mapping synthesis can be used in various applications, including enforcing non-interference and automating secrecy-preserving refinement mapping. We also evaluate our approach using the battleship game and password validation use cases.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prophecy Variables for Hyperproperty Verification 用于超属性验证的预言变量
Pub Date : 2022-06-03 DOI: 10.1109/CSF54842.2022.9919658
Raven Beutner, B. Finkbeiner
Temporal logics for hyperproperties like HyperLTL use trace quantifiers to express properties that relate multiple system runs. In practice, the verification of such specifications is mostly limited to formulas without quantifier alternation, where verification can be reduced to checking a trace property over the self-composition of the system. Quantifier alternations like $forallpi.existspi^{prime}.phi$, can either be solved by complementation or with an interpretation as a two-person game between a v-player, who incrementally constructs the trace, and an 3-player, who constructs. The game-based approach is significantly cheaper but incomplete because the 3-player does not know the future moves of the $omega$-player. In this paper, we establish that the game-based approach can be made complete by adding (w-regular) temporal prophecies. Our proof is constructiphecies.
HyperLTL等超属性的时间逻辑使用跟踪量词来表示与多个系统运行相关的属性。在实践中,对这些规范的验证主要限于没有量词替代的公式,其中验证可以简化为检查系统自组成的跟踪属性。量词的变化,如$forallpi.existspi^{prime}.phi$,可以通过互补来解决,也可以解释为v玩家和3玩家之间的双人游戏,v玩家逐渐构建跟踪,3玩家构建。基于游戏的方法明显更便宜,但不完整,因为3-玩家不知道$omega$ -玩家未来的行动。在本文中,我们建立了基于博弈的方法可以通过添加(w规则)时间预言来完成。我们的证明是构造性的。
{"title":"Prophecy Variables for Hyperproperty Verification","authors":"Raven Beutner, B. Finkbeiner","doi":"10.1109/CSF54842.2022.9919658","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919658","url":null,"abstract":"Temporal logics for hyperproperties like HyperLTL use trace quantifiers to express properties that relate multiple system runs. In practice, the verification of such specifications is mostly limited to formulas without quantifier alternation, where verification can be reduced to checking a trace property over the self-composition of the system. Quantifier alternations like $forallpi.existspi^{prime}.phi$, can either be solved by complementation or with an interpretation as a two-person game between a v-player, who incrementally constructs the trace, and an 3-player, who constructs. The game-based approach is significantly cheaper but incomplete because the 3-player does not know the future moves of the $omega$-player. In this paper, we establish that the game-based approach can be made complete by adding (w-regular) temporal prophecies. Our proof is constructiphecies.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IFCIL: An Information Flow Configuration Language for SELinux IFCIL:用于SELinux的信息流配置语言
Pub Date : 2022-05-31 DOI: 10.1109/CSF54842.2022.9919690
Lorenzo Ceragioli, Letterio Galletta, P. Degano, D. Basin
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing mandatory access control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. But this is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-level policy languages and to write structured configurations. However, CIL lacks mechanisms for ensuring that the resulting configurations obey desired information flow policies. To remedy this, we propose IFCIL, a backward compatible extension of CIL for specifying fine-grained information flow requirements for CIL configurations. Using IFCIL, administrators can express, e.g., confidentiality, integrity, and non-interference properties. We also provide a tool to statically verify these requirements.
SELinux (Security Enhanced Linux)是一种用于实现强制访问控制的Linux安全体系结构。它已用于从服务器到移动设备的许多安全关键上下文中。但是这是具有挑战性的,因为SELinux安全策略很难编写、理解和维护。最近,引入了中间语言CIL来促进高级策略语言的开发和编写结构化配置。但是,CIL缺乏确保结果配置符合所需信息流策略的机制。为了解决这个问题,我们提出了IFCIL,这是一个向后兼容的CIL扩展,用于指定CIL配置的细粒度信息流需求。使用IFCIL,管理员可以表达保密性、完整性和非干扰性等属性。我们还提供了一个工具来静态地验证这些需求。
{"title":"IFCIL: An Information Flow Configuration Language for SELinux","authors":"Lorenzo Ceragioli, Letterio Galletta, P. Degano, D. Basin","doi":"10.1109/CSF54842.2022.9919690","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919690","url":null,"abstract":"Security Enhanced Linux (SELinux) is a security architecture for Linux implementing mandatory access control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. But this is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-level policy languages and to write structured configurations. However, CIL lacks mechanisms for ensuring that the resulting configurations obey desired information flow policies. To remedy this, we propose IFCIL, a backward compatible extension of CIL for specifying fine-grained information flow requirements for CIL configurations. Using IFCIL, administrators can express, e.g., confidentiality, integrity, and non-interference properties. We also provide a tool to statically verify these requirements.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying consensus and replication securely with FLAQR 使用FLAQR安全地应用共识和复制
Pub Date : 2022-05-09 DOI: 10.1109/CSF54842.2022.9919637
Priyanka Mondal, Maximilian Algehed, Owen Arden
Availability is crucial to the security of distributed systems, but guaranteeing availability is hard, especially when participants in the system may act maliciously. Quorum replication protocols provide both integrity and availability: data and computation is replicated at multiple independent hosts, and a quorum of these hosts must agree on the output of all operations applied to the data. Unfortunately, these protocols have high overhead and can be difficult to calibrate for a specific application's needs. Ideally, developers could use high-level abstractions for consensus and replication to write fault-tolerant code by that is secure by construction. This paper presents Flow-Limited Authorization for Quorum Replication (FLAQR), a core calculus for building distributed applications with heterogeneous quorum replication protocols while enforcing end-to-end information security. Our type system ensures that well-typed FLAQR programs cannot fail (experience an unrecoverable error) in ways that violate their type-level specifications. We present noninterference theorems that characterize FLAQR's confidentiality, integrity, and availability in the presence of consensus, replication, and failures, as well as a liveness theorem for the class of majority quorum protocols under a bounded number of faults.
可用性对于分布式系统的安全性至关重要,但是保证可用性是很困难的,特别是当系统中的参与者可能有恶意行为时。仲裁复制协议同时提供完整性和可用性:数据和计算在多个独立主机上复制,这些主机的仲裁必须就应用于数据的所有操作的输出达成一致。不幸的是,这些协议有很高的开销,并且很难针对特定应用程序的需求进行校准。理想情况下,开发人员可以使用一致性和复制的高级抽象来编写通过构造安全的容错代码。本文介绍了基于流量限制的仲裁复制授权(flqr),这是构建具有异构仲裁复制协议的分布式应用程序同时强制端到端信息安全的核心演算。我们的类型系统确保类型良好的FLAQR程序不会以违反其类型级规范的方式失败(经历不可恢复的错误)。我们提出了在存在共识、复制和故障的情况下表征FLAQR的机密性、完整性和可用性的非干扰定理,以及在有限数量故障下多数仲裁协议类的活动性定理。
{"title":"Applying consensus and replication securely with FLAQR","authors":"Priyanka Mondal, Maximilian Algehed, Owen Arden","doi":"10.1109/CSF54842.2022.9919637","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919637","url":null,"abstract":"Availability is crucial to the security of distributed systems, but guaranteeing availability is hard, especially when participants in the system may act maliciously. Quorum replication protocols provide both integrity and availability: data and computation is replicated at multiple independent hosts, and a quorum of these hosts must agree on the output of all operations applied to the data. Unfortunately, these protocols have high overhead and can be difficult to calibrate for a specific application's needs. Ideally, developers could use high-level abstractions for consensus and replication to write fault-tolerant code by that is secure by construction. This paper presents Flow-Limited Authorization for Quorum Replication (FLAQR), a core calculus for building distributed applications with heterogeneous quorum replication protocols while enforcing end-to-end information security. Our type system ensures that well-typed FLAQR programs cannot fail (experience an unrecoverable error) in ways that violate their type-level specifications. We present noninterference theorems that characterize FLAQR's confidentiality, integrity, and availability in the presence of consensus, replication, and failures, as well as a liveness theorem for the class of majority quorum protocols under a bounded number of faults.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126764295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy 度量差分隐私的通用最优性和鲁棒效用界
Pub Date : 2022-05-03 DOI: 10.1109/CSF54842.2022.9919647
Natasha Fernandes, Annabelle McIver, C. Palamidessi, Ming Ding
We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al. introduced the idea of universal optimality to characterise the “best” mechanism for a certain query that simultaneously satisfies (a fixed) $mathcal{E-}$ differential privacy constraint whilst at the same time providing better utility compared to any other s-differentially private mechanism for the same query. They showed that the Geometric mechanism is universally optimal for the class of counting queries. On the other hand, Brenner and Nissim showed that outside the space of counting queries, and for the Bayes risk loss function, no such universally optimal mechanisms exist. Except for universal optimality of the Laplace mechanism, there have been no generalisations of these universally optimal results to other classes of differentially-private mechanisms. In this paper we use metric differential privacy and quantitative information flow as the fundamental principle for studying universal optimality. Metric differential privacy is a generali-sation of both standard (i.e., central) differential privacy and local differential privacy, and it is increasingly being used in various application domains, for instance in location privacy and in privacy preserving machine learning. As do Ghosh et al. and Brenner and Nissim, we measure utility in terms of loss functions, and we interpret the notion of a privacy mechanism as an information-theoretic channel satisfying constraints defined by ε-differcntlal privacy and a metric meaningful to the underlying state space. Using this framework we are able to clarify Nissim and Brenner's negative results by (a) that in fact all privacy types contain optimal mechanisms relative to certain kinds of non-trivial loss functions, and (b) extending and generalising their negative results beyond Bayes risk specifically to a wide class of non-trivial loss functions. Our exploration suggests that universally optimal mechanisms are indeed rare within privacy types. We therefore propose weaker universal benchmarks of utility called privacy type ca-pacities. We show that such capacities always exist and can be computed using a convex optimisation algorithm. We illustrate these ideas on a selection of examples with several different underlying metrics.
本文研究了度量差分隐私环境下的隐私-效用权衡问题。Ghosh等人引入了普遍最优性的概念来描述特定查询的“最佳”机制,该机制同时满足(固定的)$mathcal{E-}$差分隐私约束,同时与相同查询的任何其他s-差分隐私机制相比,提供更好的效用。他们证明了几何机制对于计数查询类是普遍最优的。另一方面,Brenner和Nissim表明,在计数查询空间之外,对于贝叶斯风险损失函数,不存在这样的普遍最优机制。除了拉普拉斯机制的普遍最优性外,还没有将这些普遍最优结果推广到其他类型的微分私有机制。本文将度量差分隐私和定量信息流作为研究全局最优性的基本原理。度量差分隐私是标准(即中心)差分隐私和局部差分隐私的概括,它越来越多地用于各种应用领域,例如位置隐私和保护隐私的机器学习。与Ghosh等人、Brenner和Nissim一样,我们用损失函数来衡量效用,并将隐私机制的概念解释为满足ε-差分隐私和对底层状态空间有意义的度量所定义的约束的信息理论通道。使用这个框架,我们能够通过(a)澄清Nissim和Brenner的负面结果,即实际上所有隐私类型都包含相对于某些类型的非平凡损失函数的最佳机制,以及(b)将他们的负面结果扩展和推广到贝叶斯风险之外,特别是广泛的非平凡损失函数。我们的研究表明,在隐私类型中,普遍最优的机制确实很少见。因此,我们提出了较弱的通用基准,称为隐私类型容量。我们证明了这样的容量总是存在的,并且可以使用凸优化算法计算。我们通过几个不同的基本指标来说明这些想法。
{"title":"Universal Optimality and Robust Utility Bounds for Metric Differential Privacy","authors":"Natasha Fernandes, Annabelle McIver, C. Palamidessi, Ming Ding","doi":"10.1109/CSF54842.2022.9919647","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919647","url":null,"abstract":"We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al. introduced the idea of universal optimality to characterise the “best” mechanism for a certain query that simultaneously satisfies (a fixed) $mathcal{E-}$ differential privacy constraint whilst at the same time providing better utility compared to any other s-differentially private mechanism for the same query. They showed that the Geometric mechanism is universally optimal for the class of counting queries. On the other hand, Brenner and Nissim showed that outside the space of counting queries, and for the Bayes risk loss function, no such universally optimal mechanisms exist. Except for universal optimality of the Laplace mechanism, there have been no generalisations of these universally optimal results to other classes of differentially-private mechanisms. In this paper we use metric differential privacy and quantitative information flow as the fundamental principle for studying universal optimality. Metric differential privacy is a generali-sation of both standard (i.e., central) differential privacy and local differential privacy, and it is increasingly being used in various application domains, for instance in location privacy and in privacy preserving machine learning. As do Ghosh et al. and Brenner and Nissim, we measure utility in terms of loss functions, and we interpret the notion of a privacy mechanism as an information-theoretic channel satisfying constraints defined by ε-differcntlal privacy and a metric meaningful to the underlying state space. Using this framework we are able to clarify Nissim and Brenner's negative results by (a) that in fact all privacy types contain optimal mechanisms relative to certain kinds of non-trivial loss functions, and (b) extending and generalising their negative results beyond Bayes risk specifically to a wide class of non-trivial loss functions. Our exploration suggests that universally optimal mechanisms are indeed rare within privacy types. We therefore propose weaker universal benchmarks of utility called privacy type ca-pacities. We show that such capacities always exist and can be computed using a convex optimisation algorithm. We illustrate these ideas on a selection of examples with several different underlying metrics.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games 谨防希腊人承受纠缠?量子隐蔽信道、信息流和非局部博弈
Pub Date : 2022-02-04 DOI: 10.1109/CSF54842.2022.9919683
David Mestel
Can quantum entanglement increase the capacity of (classical) covert channels? To one familiar with Holevo's Theorem it is tempting to think that the answer is obviously no. However, in this work we show: quantum entanglement can in fact increase the capacity of a classical covert channel, in the presence of an active adversary; on the other hand, a zero-capacity channel is not improved by entanglement, so entanglement cannot create ‘purely quantum’ covert channels; the problem of determining the capacity of a given channel in the presence of entanglement is undecidable; but there is an algorithm to bound the entangled capacity of a channel from above, adapted from the semi-definite hierarchy from the theory of non-local games, whose close connection to channel capacity is at the core of all of our results.
量子纠缠能增加(经典)隐蔽信道的容量吗?对于熟悉霍尔沃定理的人来说,很容易认为答案显然是否定的。然而,在这项工作中,我们表明:在存在活跃对手的情况下,量子纠缠实际上可以增加经典隐蔽信道的容量;另一方面,零容量信道不会因纠缠而得到改善,因此纠缠不能产生“纯量子”隐蔽信道;在存在纠缠的情况下确定给定信道容量的问题是无法确定的;但是,有一种算法可以从上面约束信道的纠缠容量,该算法改编自非局部博弈理论中的半确定层次结构,其与信道容量的密切联系是我们所有结果的核心。
{"title":"Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games","authors":"David Mestel","doi":"10.1109/CSF54842.2022.9919683","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919683","url":null,"abstract":"Can quantum entanglement increase the capacity of (classical) covert channels? To one familiar with Holevo's Theorem it is tempting to think that the answer is obviously no. However, in this work we show: quantum entanglement can in fact increase the capacity of a classical covert channel, in the presence of an active adversary; on the other hand, a zero-capacity channel is not improved by entanglement, so entanglement cannot create ‘purely quantum’ covert channels; the problem of determining the capacity of a given channel in the presence of entanglement is undecidable; but there is an algorithm to bound the entangled capacity of a channel from above, adapted from the semi-definite hierarchy from the theory of non-local games, whose close connection to channel capacity is at the core of all of our results.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Model of Checked C 检查C的形式化模型
Pub Date : 2022-01-31 DOI: 10.1109/CSF54842.2022.9919657
Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, M. Hicks
We present a formal model of Checked C, a dialect of C that aims to enforce spatial memory safety. Our model pays particular attention to the semantics of dynamically sized, potentially null-terminated arrays. We formalize this model in Coq, and prove that any spatial memory safety errors can be blamed on portions of the program labeled unchecked; this is a Checked C feature that supports incremental porting and backward compatibility. While our model's operational semantics uses annotated (“fat”) pointers to enforce spatial safety, we show that such annotations can be safely erased. Using PLT Redex we formalize an executable version of our model and a compilation procedure to an untyped C-like language, as well as use randomized testing to validate that generated code faithfully simulates the original. Finally, we develop a custom random generator for well-typed and almost-well-typed terms in our Redex model, and use it to search for inconsistencies between our model and the Clang Checked C implementation. We find these steps to be a useful way to co-develop a language (Checked C is still in development) and a core model of it.
我们提出了Checked C的正式模型,Checked C是一种旨在加强空间内存安全的C方言。我们的模型特别关注动态大小的、可能以null结尾的数组的语义。我们在Coq中形式化了这个模型,并证明了任何空间存储安全错误都可以归咎于标记为未检查的部分程序;这是一个Checked C特性,支持增量移植和向后兼容性。虽然我们的模型的操作语义使用带注释的(“fat”)指针来加强空间安全性,但我们证明了这种注释可以安全地擦除。使用PLT Redex,我们将模型的可执行版本和编译过程形式化为无类型的类c语言,并使用随机测试来验证生成的代码忠实地模拟了原始代码。最后,我们为Redex模型中的类型良好和几乎类型良好的术语开发了一个自定义随机生成器,并使用它来搜索我们的模型和Clang Checked C实现之间的不一致之处。我们发现这些步骤是共同开发语言(Checked C仍在开发中)及其核心模型的有用方法。
{"title":"A Formal Model of Checked C","authors":"Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, M. Hicks","doi":"10.1109/CSF54842.2022.9919657","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919657","url":null,"abstract":"We present a formal model of Checked C, a dialect of C that aims to enforce spatial memory safety. Our model pays particular attention to the semantics of dynamically sized, potentially null-terminated arrays. We formalize this model in Coq, and prove that any spatial memory safety errors can be blamed on portions of the program labeled unchecked; this is a Checked C feature that supports incremental porting and backward compatibility. While our model's operational semantics uses annotated (“fat”) pointers to enforce spatial safety, we show that such annotations can be safely erased. Using PLT Redex we formalize an executable version of our model and a compilation procedure to an untyped C-like language, as well as use randomized testing to validate that generated code faithfully simulates the original. Finally, we develop a custom random generator for well-typed and almost-well-typed terms in our Redex model, and use it to search for inconsistencies between our model and the Clang Checked C implementation. We find these steps to be a useful way to co-develop a language (Checked C is still in development) and a core model of it.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129225855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems 随机系统的对抗鲁棒性验证与攻击综合
Pub Date : 2021-10-05 DOI: 10.1109/CSF54842.2022.9919660
Lisa Oakley, Alina Oprea, S. Tripakis
Probabilistic model checking is a useful technique for specifying and verifying properties of stochastic systems including randomized protocols and reinforcement learning models. However, these methods rely on the assumed structure and probabilities of certain system transitions. These assumptions may be incorrect, and may even be violated by an adversary who gains control of some system components. In this paper, we develop a formal framework for adversarial robustness in systems modeled as discrete time Markov chains (DTMCs). We base our framework on existing methods for verifying probabilistic temporal logic properties and extend it to include deterministic, memoryless policies acting in Markov decision processes (MDPs). Our framework includes a flexible approach for specifying structure-preserving and non structure-preserving adversarial models. We outline a class of threat models under which adversaries can perturb system transitions, constrained by an $varepsilon$ ball around the original transition probabilities. We define three main DTMC adversarial robustness problems: adversarial robustness verification, maximal $delta$ synthesis, and worst case attack synthesis. We present two optimization-based solutions to these three problems, leveraging traditional and parametric probabilistic model checking techniques. We then evaluate our solutions on two stochastic protocols and a collection of Grid World case studies, which model an agent acting in an environment described as an MDP. We find that the parametric solution results in fast computation for small parameter spaces. In the case of less restrictive (stronger) adversaries, the number of parameters increases, and directly computing property satisfaction probabilities is more scalable. We demonstrate the usefulness of our definitions and solutions by comparing system outcomes over various properties, threat models, and case studies.
概率模型检验是确定和验证随机系统特性的一种有用技术,包括随机协议和强化学习模型。然而,这些方法依赖于假设的结构和某些系统转换的概率。这些假设可能是不正确的,甚至可能被获得某些系统组件控制权的对手所违反。在本文中,我们开发了一个正式的框架,以对抗鲁棒系统建模为离散时间马尔可夫链(DTMCs)。我们的框架基于现有的验证概率时间逻辑属性的方法,并将其扩展到包括马尔可夫决策过程(mdp)中的确定性、无内存策略。我们的框架包括一种灵活的方法来指定结构保持和非结构保持对抗模型。我们概述了一类威胁模型,在这些模型下,对手可以在原始转移概率周围的$varepsilon$球的约束下干扰系统转移。我们定义了三个主要的DTMC对抗鲁棒性问题:对抗鲁棒性验证、最大$delta$合成和最坏情况攻击合成。我们提出了两种基于优化的解决方案来解决这三个问题,利用传统和参数概率模型检查技术。然后,我们在两个随机协议和Grid World案例研究的集合上评估我们的解决方案,这些案例研究建模了在称为MDP的环境中作用的代理。我们发现在小参数空间下,参数解的计算速度很快。在限制较少(更强)的对手的情况下,参数的数量增加,并且直接计算属性满足概率更具可伸缩性。通过比较不同属性、威胁模型和案例研究的系统结果,我们展示了定义和解决方案的实用性。
{"title":"Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems","authors":"Lisa Oakley, Alina Oprea, S. Tripakis","doi":"10.1109/CSF54842.2022.9919660","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919660","url":null,"abstract":"Probabilistic model checking is a useful technique for specifying and verifying properties of stochastic systems including randomized protocols and reinforcement learning models. However, these methods rely on the assumed structure and probabilities of certain system transitions. These assumptions may be incorrect, and may even be violated by an adversary who gains control of some system components. In this paper, we develop a formal framework for adversarial robustness in systems modeled as discrete time Markov chains (DTMCs). We base our framework on existing methods for verifying probabilistic temporal logic properties and extend it to include deterministic, memoryless policies acting in Markov decision processes (MDPs). Our framework includes a flexible approach for specifying structure-preserving and non structure-preserving adversarial models. We outline a class of threat models under which adversaries can perturb system transitions, constrained by an $varepsilon$ ball around the original transition probabilities. We define three main DTMC adversarial robustness problems: adversarial robustness verification, maximal $delta$ synthesis, and worst case attack synthesis. We present two optimization-based solutions to these three problems, leveraging traditional and parametric probabilistic model checking techniques. We then evaluate our solutions on two stochastic protocols and a collection of Grid World case studies, which model an agent acting in an environment described as an MDP. We find that the parametric solution results in fast computation for small parameter spaces. In the case of less restrictive (stronger) adversaries, the number of parameters increases, and directly computing property satisfaction probabilities is more scalable. We demonstrate the usefulness of our definitions and solutions by comparing system outcomes over various properties, threat models, and case studies.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131880945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation secureprs:用数据流反翻译和轮询模拟证明安全编译
Pub Date : 2021-10-04 DOI: 10.1109/CSF54842.2022.9919680
Akram El-Korashy, Roberto Blanco, J. Thibault, Adrien Durier, D. Garg, Catalin Hritcu
Proving secure compilation of partial programs typically requires back-translating an attack against the compiled program to an attack against the source program. To prove back-translation, one can syntactically translate the target attacker to a source one-i.e., syntax-directed back-translation-or show that the interaction traces of the target attacker can also be emitted by source attackers—i.e., trace-directed back-translation. Syntax-directed back-translation is not suitable when the target attacker may use unstructured control flow that the source language cannot directly represent. Trace-directed back-translation works with such syntactic dissimilarity because only the external interactions of the target attacker have to be mimicked in the source, not its internal control flow. Revealing only external interactions is, however, inconvenient when sharing memory via unforgeable pointers, since information about shared pointers stashed in private memory is not present on the trace. This made prior proofs unnecessarily complex, since the generated attacker had to instead stash all reachable pointers. In this work, we introduce more informative data-flow traces, combining the best of syntax- and trace-directed back-translation in a simpler technique that handles both syntactic dissimilarity and memory sharing well, and that is proved correct in Coq. Additionally, we develop a novel turn-taking simulation relation and use it to prove a recomposition lemma, which is key to reusing compiler correctness in such secure compilation proofs. We are the first to mechanize such a recomposition lemma in the presence of memory sharing. We use these two innovations in a secure compilation proof for a code generation compiler pass between a source language with structured control flow and a target language with unstructured control flow, both with safe pointers and components.
证明部分程序的安全编译通常需要将针对已编译程序的攻击反向转换为针对源程序的攻击。为了证明反向转换,可以从语法上将目标攻击者转换为源攻击者。——或者表明目标攻击者的交互痕迹也可以由源攻击者发出。,循迹反向翻译。当目标攻击者可能使用源语言无法直接表示的非结构化控制流时,语法定向反翻译是不合适的。跟踪导向的反向翻译在这种语法上是不一样的,因为只有目标攻击者的外部交互必须在源中模仿,而不是其内部控制流。然而,当通过不可伪造指针共享内存时,只显示外部交互是不方便的,因为关于存储在私有内存中的共享指针的信息不存在于跟踪中。这使得先前的证明不必要地复杂,因为生成的攻击者不得不隐藏所有可访问的指针。在这项工作中,我们引入了更多信息丰富的数据流跟踪,将语法导向和跟踪导向的最佳反向翻译结合在一个更简单的技术中,该技术可以很好地处理语法差异和内存共享,并且在Coq中被证明是正确的。此外,我们开发了一种新的轮流模拟关系,并用它来证明一个重组引理,这是在这种安全的编译证明中重用编译正确性的关键。我们是第一个在内存共享的情况下机械化这种重组引理的人。我们将这两项创新用于代码生成编译器在具有结构化控制流的源语言和具有非结构化控制流的目标语言之间传递的安全编译证明,这两种语言都具有安全指针和组件。
{"title":"SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation","authors":"Akram El-Korashy, Roberto Blanco, J. Thibault, Adrien Durier, D. Garg, Catalin Hritcu","doi":"10.1109/CSF54842.2022.9919680","DOIUrl":"https://doi.org/10.1109/CSF54842.2022.9919680","url":null,"abstract":"Proving secure compilation of partial programs typically requires back-translating an attack against the compiled program to an attack against the source program. To prove back-translation, one can syntactically translate the target attacker to a source one-i.e., syntax-directed back-translation-or show that the interaction traces of the target attacker can also be emitted by source attackers—i.e., trace-directed back-translation. Syntax-directed back-translation is not suitable when the target attacker may use unstructured control flow that the source language cannot directly represent. Trace-directed back-translation works with such syntactic dissimilarity because only the external interactions of the target attacker have to be mimicked in the source, not its internal control flow. Revealing only external interactions is, however, inconvenient when sharing memory via unforgeable pointers, since information about shared pointers stashed in private memory is not present on the trace. This made prior proofs unnecessarily complex, since the generated attacker had to instead stash all reachable pointers. In this work, we introduce more informative data-flow traces, combining the best of syntax- and trace-directed back-translation in a simpler technique that handles both syntactic dissimilarity and memory sharing well, and that is proved correct in Coq. Additionally, we develop a novel turn-taking simulation relation and use it to prove a recomposition lemma, which is key to reusing compiler correctness in such secure compilation proofs. We are the first to mechanize such a recomposition lemma in the presence of memory sharing. We use these two innovations in a secure compilation proof for a code generation compiler pass between a source language with structured control flow and a target language with unstructured control flow, both with safe pointers and components.","PeriodicalId":412553,"journal":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128406845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 35th Computer Security Foundations Symposium (CSF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1