首页 > 最新文献

21st Annual Computer Security Applications Conference (ACSAC'05)最新文献

英文 中文
Countering trusting trust through diverse double-compiling 通过多种双重编译对抗信任信任
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.17
D. A. Wheeler
An air force evaluation of Multics, and Ken Thompson's famous Turing award lecture "reflections on trusting trust, " showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code can not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some compiler defects as well. Simply recompile the source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This paper describes the technique, justifies it, describes how to overcome practical challenges, and demonstrates it
空军对Multics的一项评估,以及肯·汤普森著名的图灵奖演讲“关于信任的思考”表明,编译器可以被破坏,将恶意的特洛伊木马植入关键软件,包括它们自己。如果这种攻击未被检测到,即使对系统源代码进行完整的分析也无法找到正在运行的恶意代码,并且检测这种特定攻击的方法也不为人所知。本文描述了一种实用的技术,称为多元双重编译(DDC),它可以检测这种攻击和一些编译器缺陷。只需重新编译源代码两次:一次使用第二个(可信的)编译器,另一次使用第一次编译的结果。如果结果与不受信任的二进制完全相同,则源代码准确地表示二进制。这种技术已经被非正式地提到过,但它的问题和后果还没有在同行评审的工作中被确定或讨论过,也没有公开的演示。本文描述了该技术,证明了它,描述了如何克服实际挑战,并演示了它
{"title":"Countering trusting trust through diverse double-compiling","authors":"D. A. Wheeler","doi":"10.1109/CSAC.2005.17","DOIUrl":"https://doi.org/10.1109/CSAC.2005.17","url":null,"abstract":"An air force evaluation of Multics, and Ken Thompson's famous Turing award lecture \"reflections on trusting trust, \" showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code can not find the malicious code that is running, and methods for detecting this particular attack are not widely known. This paper describes a practical technique, termed diverse double-compiling (DDC), that detects this attack and some compiler defects as well. Simply recompile the source code twice: once with a second (trusted) compiler, and again using the result of the first compilation. If the result is bit-for-bit identical with the untrusted binary, then the source code accurately represents the binary. This technique has been mentioned informally, but its issues and ramifications have not been identified or discussed in a peer-reviewed work, nor has a public demonstration been made. This paper describes the technique, justifies it, describes how to overcome practical challenges, and demonstrates it","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Automatic generation of buffer overflow attack signatures: an approach based on program behavior models 自动生成缓冲区溢出攻击签名:一种基于程序行为模型的方法
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.12
Zhenkai Liang, R. Sekar
Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated attacks. Although many techniques have been developed to prevent server compromises due to buffer overflows, these defenses still lead to server crashes. When attacks occur repeatedly, as is common with automated attacks, these protection mechanisms lead to repeated restarts of the victim application, rendering its service unavailable. To overcome this problem, we develop a new approach that can learn the characteristics of a particular attack, and filter out future instances of the same attack or its variants. By doing so, our approach significantly increases the availability of servers subjected to repeated attacks. The approach is fully automatic, does not require source code, and has low runtime overheads. In our experiments, it was effective against most attacks, and did not produce any false positives
缓冲区溢出已经成为基于网络的攻击最常见的目标。它们也是蠕虫和其他形式的自动攻击所使用的主要机制。尽管已经开发了许多技术来防止由于缓冲区溢出而危及服务器,但这些防御仍然会导致服务器崩溃。当攻击重复发生时(自动攻击很常见),这些保护机制会导致受害应用程序反复重启,使其服务不可用。为了克服这个问题,我们开发了一种新的方法,可以学习特定攻击的特征,并过滤掉相同攻击或其变体的未来实例。通过这样做,我们的方法显著提高了遭受重复攻击的服务器的可用性。这种方法是全自动的,不需要源代码,运行时开销也很低。在我们的实验中,它对大多数攻击都有效,并且没有产生任何误报
{"title":"Automatic generation of buffer overflow attack signatures: an approach based on program behavior models","authors":"Zhenkai Liang, R. Sekar","doi":"10.1109/CSAC.2005.12","DOIUrl":"https://doi.org/10.1109/CSAC.2005.12","url":null,"abstract":"Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated attacks. Although many techniques have been developed to prevent server compromises due to buffer overflows, these defenses still lead to server crashes. When attacks occur repeatedly, as is common with automated attacks, these protection mechanisms lead to repeated restarts of the victim application, rendering its service unavailable. To overcome this problem, we develop a new approach that can learn the characteristics of a particular attack, and filter out future instances of the same attack or its variants. By doing so, our approach significantly increases the availability of servers subjected to repeated attacks. The approach is fully automatic, does not require source code, and has low runtime overheads. In our experiments, it was effective against most attacks, and did not produce any false positives","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Dynamic taint propagation for Java Java的动态污染传播
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.21
Vivek Haldar, Deepak Chandra, M. Franz
Improperly validated user input is the underlying root cause for a wide variety of attacks on Web-based applications. Static approaches for detecting this problem help at the time of development, but require source code and report a number of false positives. Hence, they are of little use for securing fully deployed and rapidly evolving applications. We propose a dynamic solution that tags and tracks user input at runtime and prevents its improper use to maliciously affect the execution of the program. Our implementation can be transparently applied to Java classfiles, and does not require source code. Benchmarks show that the overhead of this runtime enforcement is negligible and can prevent a number of attacks
未经正确验证的用户输入是针对基于web的应用程序的各种攻击的根本原因。用于检测此问题的静态方法在开发时很有帮助,但需要源代码并报告许多误报。因此,它们对于保护完全部署和快速发展的应用程序几乎没有用处。我们提出了一个动态的解决方案,在运行时标记和跟踪用户输入,并防止其被不当使用来恶意影响程序的执行。我们的实现可以透明地应用于Java类文件,并且不需要源代码。基准测试表明,这种运行时强制执行的开销可以忽略不计,并且可以防止许多攻击
{"title":"Dynamic taint propagation for Java","authors":"Vivek Haldar, Deepak Chandra, M. Franz","doi":"10.1109/CSAC.2005.21","DOIUrl":"https://doi.org/10.1109/CSAC.2005.21","url":null,"abstract":"Improperly validated user input is the underlying root cause for a wide variety of attacks on Web-based applications. Static approaches for detecting this problem help at the time of development, but require source code and report a number of false positives. Hence, they are of little use for securing fully deployed and rapidly evolving applications. We propose a dynamic solution that tags and tracks user input at runtime and prevents its improper use to maliciously affect the execution of the program. Our implementation can be transparently applied to Java classfiles, and does not require source code. Benchmarks show that the overhead of this runtime enforcement is negligible and can prevent a number of attacks","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 252
Intrusion detection in RBAC-administered databases rbac管理数据库中的入侵检测
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.33
E. Bertino, Ashish Kamra, Evimaria Terzi, A. Vakali
A considerable effort has been recently devoted to the development of database management systems (DBMS) which guarantee high assurance security and privacy. An important component of any strong security solution is represented by intrusion detection (ID) systems, able to detect anomalous behavior by applications and users. To date, however, there have been very few ID mechanisms specifically tailored to database systems. In this paper, we propose such a mechanism. The approach we propose to ID is based on mining database traces stored in log files. The result of the mining process is used to form user profiles that can model normal behavior and identify intruders. An additional feature of our approach is that we couple our mechanism with role based access control (RBAC). Under a RBAC system permissions are associated with roles, usually grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals that while holding a specific role, have a behavior different from the normal behavior of the role. An important advantage of providing an ID mechanism specifically tailored to databases is that it can also be used to protect against insider threats. Furthermore, the use of roles makes our approach usable even for databases with large user population. Our preliminary experimental evaluation on both real and synthetic database traces show that our methods work well in practical situations
数据库管理系统(DBMS)的开发最近投入了相当大的努力,以保证高安全性和私密性。入侵检测(ID)系统是任何强大的安全解决方案的一个重要组成部分,它能够检测应用程序和用户的异常行为。然而,到目前为止,专门为数据库系统量身定制的ID机制非常少。在本文中,我们提出了这样一个机制。我们提出的ID方法是基于挖掘存储在日志文件中的数据库跟踪。挖掘过程的结果用于形成可以对正常行为建模并识别入侵者的用户配置文件。我们的方法的另一个特性是将我们的机制与基于角色的访问控制(RBAC)耦合在一起。在RBAC下,系统权限与角色相关联,通常将多个用户分组,而不是单个用户。我们的ID系统能够确定角色入侵者,即持有特定角色的个体,其行为与角色的正常行为不同。提供专门为数据库量身定制的ID机制的一个重要优点是,它还可以用于防止内部威胁。此外,角色的使用使我们的方法甚至可以用于具有大量用户的数据库。我们对真实和合成数据库痕迹的初步实验评估表明,我们的方法在实际情况下工作良好
{"title":"Intrusion detection in RBAC-administered databases","authors":"E. Bertino, Ashish Kamra, Evimaria Terzi, A. Vakali","doi":"10.1109/CSAC.2005.33","DOIUrl":"https://doi.org/10.1109/CSAC.2005.33","url":null,"abstract":"A considerable effort has been recently devoted to the development of database management systems (DBMS) which guarantee high assurance security and privacy. An important component of any strong security solution is represented by intrusion detection (ID) systems, able to detect anomalous behavior by applications and users. To date, however, there have been very few ID mechanisms specifically tailored to database systems. In this paper, we propose such a mechanism. The approach we propose to ID is based on mining database traces stored in log files. The result of the mining process is used to form user profiles that can model normal behavior and identify intruders. An additional feature of our approach is that we couple our mechanism with role based access control (RBAC). Under a RBAC system permissions are associated with roles, usually grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals that while holding a specific role, have a behavior different from the normal behavior of the role. An important advantage of providing an ID mechanism specifically tailored to databases is that it can also be used to protect against insider threats. Furthermore, the use of roles makes our approach usable even for databases with large user population. Our preliminary experimental evaluation on both real and synthetic database traces show that our methods work well in practical situations","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Multi-level security requirements for hypervisors 管理程序的多级安全要求
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.41
P. Karger
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on secure hypervisors, including PR/SM, NetTop, sHype, and others. This paper looks at the requirements that users of MLS systems have and discusses their implications on the design of multi-level secure hypervisors. It contrasts the new directions for secure hypervisors with the earlier efforts of KVM/370 and Digital's A1-secure VMM kernel
近年来,使用管理程序或虚拟机监视器来实现安全性已经变得非常流行,并且已经提出了许多建议来支持安全管理程序上的多级安全性,包括PR/SM、NetTop、sHype等。本文着眼于MLS系统用户的需求,并讨论了这些需求对多级安全管理程序设计的影响。它将安全管理程序的新方向与KVM/370和Digital的a1安全VMM内核的早期工作进行了对比
{"title":"Multi-level security requirements for hypervisors","authors":"P. Karger","doi":"10.1109/CSAC.2005.41","DOIUrl":"https://doi.org/10.1109/CSAC.2005.41","url":null,"abstract":"Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on secure hypervisors, including PR/SM, NetTop, sHype, and others. This paper looks at the requirements that users of MLS systems have and discusses their implications on the design of multi-level secure hypervisors. It contrasts the new directions for secure hypervisors with the earlier efforts of KVM/370 and Digital's A1-secure VMM kernel","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Paranoid: a global secure file access control system 偏执:一个全球安全的文件访问控制系统
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.42
Fareed Zaffar, G. Kedem, Ashish Gehani
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, UNIX-like, file access to peer groups across administrative boundaries. Files are kept encrypted and access control translates into key management. The system uses a novel transformation key scheme to effect access revocation. The file system works seamlessly with existing applications through the use of interposition agents. The interposition agents provide a layer of indirection making it possible to implement transparent remote file access and data encryption/decryption without any kernel modifications. System performance evaluations show that encryption and remote file-access overheads are small, demonstrating that the Paranoid system is practical
Paranoid文件系统是一个加密的、安全的、具有用户管理访问控制的全局文件系统。系统提供高效的点对点应用透明文件共享。本文介绍了Paranoid文件系统及其访问控制体系结构的设计、实现和评估。该系统允许用户跨管理边界向对等组授予安全的、选择性的、类似unix的文件访问权限。文件保持加密,访问控制转换为密钥管理。该系统采用一种新颖的转换密钥方案实现访问撤销。文件系统通过使用中介代理与现有应用程序无缝协作。中介代理提供了一个间接层,使实现透明的远程文件访问和数据加密/解密成为可能,而无需对内核进行任何修改。系统性能评估表明,加密和远程文件访问开销很小,表明Paranoid系统是实用的
{"title":"Paranoid: a global secure file access control system","authors":"Fareed Zaffar, G. Kedem, Ashish Gehani","doi":"10.1109/CSAC.2005.42","DOIUrl":"https://doi.org/10.1109/CSAC.2005.42","url":null,"abstract":"The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, UNIX-like, file access to peer groups across administrative boundaries. Files are kept encrypted and access control translates into key management. The system uses a novel transformation key scheme to effect access revocation. The file system works seamlessly with existing applications through the use of interposition agents. The interposition agents provide a layer of indirection making it possible to implement transparent remote file access and data encryption/decryption without any kernel modifications. System performance evaluations show that encryption and remote file-access overheads are small, demonstrating that the Paranoid system is practical","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116539056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
mSSL: extending SSL to support data sharing among collaborative clients mSSL:扩展SSL以支持协作客户机之间的数据共享
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.40
Jun Yu Li, Xun Kang
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from other peer clients, in addition to from the server directly. This paradigm, which we call the hybrid peer-to-peer paradigm, is friendly to the server's scalability, but also faces new security challenges. For example, how can the server authenticate its clients and support data confidentiality? How can a client trust the data downloaded from other clients? What if a client refuses to acknowledge the service it received or overstates the service it offered? In this paper, we present a protocol, called mSSL, that provides a set of security functions to enable secure sharing of the data of a server among its clients. In addition to access control and confidentiality support, mSSL provides an original design on supporting data integrity and proof of service in this new context. Our evaluation further shows that mSSL has a reasonable overhead
当大量客户机访问单个服务器时,客户机-服务器应用程序通常不能很好地扩展。为了解决这个问题,除了直接从服务器下载数据外,一个新的趋势是允许客户机从其他对等客户机下载数据。这种范式,我们称之为混合点对点范式,有利于服务器的可伸缩性,但也面临着新的安全挑战。例如,服务器如何对其客户机进行身份验证并支持数据机密性?客户端如何信任从其他客户端下载的数据?如果客户端拒绝承认它收到的服务或夸大了它提供的服务,该怎么办?在本文中,我们提出了一个名为mSSL的协议,它提供了一组安全功能,以实现服务器在其客户端之间的数据安全共享。除了访问控制和机密性支持之外,mSSL还提供了在这个新环境中支持数据完整性和服务证明的原始设计。我们的评估进一步表明,mSSL具有合理的开销
{"title":"mSSL: extending SSL to support data sharing among collaborative clients","authors":"Jun Yu Li, Xun Kang","doi":"10.1109/CSAC.2005.40","DOIUrl":"https://doi.org/10.1109/CSAC.2005.40","url":null,"abstract":"Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from other peer clients, in addition to from the server directly. This paradigm, which we call the hybrid peer-to-peer paradigm, is friendly to the server's scalability, but also faces new security challenges. For example, how can the server authenticate its clients and support data confidentiality? How can a client trust the data downloaded from other clients? What if a client refuses to acknowledge the service it received or overstates the service it offered? In this paper, we present a protocol, called mSSL, that provides a set of security functions to enable secure sharing of the data of a server among its clients. In addition to access control and confidentiality support, mSSL provides an original design on supporting data integrity and proof of service in this new context. Our evaluation further shows that mSSL has a reasonable overhead","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generating policies for defense in depth 为纵深防御生成策略
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.26
P. Rubel, Michael Ihde, S. Harp, C. Payne
Coordinating multiple overlapping defense mechanisms, at differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate policies for those mechanisms from a single specification in order to avoid that risk. This paper presents our experience and the lessons learned as we developed, validated and coordinated network communication security policies for a defense-in-depth enabled system that withstood sustained red team attack. Network communication was mediated by host-based firewalls, process domain mechanisms and application-level security policies enforced by the Java virtual machine. We coordinated the policies across the layers using a variety of tools, but we discovered that, at least for defense-in-depth enabled systems, constructing a single specification from which to derive all policies is probably neither practical nor even desirable
在不同的抽象层次上协调多个重叠的防御机制充满了错误配置的可能性,因此有强烈的动机从单个规范为这些机制生成策略,以避免这种风险。本文介绍了我们为抵御红队持续攻击的纵深防御启用系统开发、验证和协调网络通信安全策略的经验和教训。网络通信由基于主机的防火墙、进程域机制和由Java虚拟机实施的应用程序级安全策略进行调解。我们使用各种工具跨层协调策略,但是我们发现,至少对于支持纵深防御的系统来说,构建一个单一的规范来派生所有策略可能既不实际,也不可取
{"title":"Generating policies for defense in depth","authors":"P. Rubel, Michael Ihde, S. Harp, C. Payne","doi":"10.1109/CSAC.2005.26","DOIUrl":"https://doi.org/10.1109/CSAC.2005.26","url":null,"abstract":"Coordinating multiple overlapping defense mechanisms, at differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate policies for those mechanisms from a single specification in order to avoid that risk. This paper presents our experience and the lessons learned as we developed, validated and coordinated network communication security policies for a defense-in-depth enabled system that withstood sustained red team attack. Network communication was mediated by host-based firewalls, process domain mechanisms and application-level security policies enforced by the Java virtual machine. We coordinated the policies across the layers using a variety of tools, but we discovered that, at least for defense-in-depth enabled systems, constructing a single specification from which to derive all policies is probably neither practical nor even desirable","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A user-level framework for auditing and monitoring 用于审计和监视的用户级框架
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.8
Yongzheng Wu, R. Yap
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implementing user-level auditing monitors which: (i) does not require superuser privileges; (ii) makes it simple to create user defined monitors which are transparent; and (iii) provides security guarantees such as mandatory and reliable monitoring while maintaining confidentiality of setuid processes. We avoid problems of self-referential monitoring. Monitor use policies can be specified to increase flexibility. We show that our framework can be tailored so that it is very efficient with low overhead on macro and micro benchmarks. This demonstrates that it is feasible to make use of arbitrary and programmable user-level monitors for system security and auditing applications
日志记录和审计是用于监视正确的系统操作和检测潜在安全问题的重要系统功能。我们提出了一种实现用户级审计监控的架构:(i)不需要超级用户权限;(ii)使创建透明的用户自定义监视器变得简单;(iii)提供安全保障,如强制性和可靠的监控,同时保持固定进程的机密性。我们避免了自我参照监控的问题。可以指定监视器使用策略以增加灵活性。我们展示了我们的框架可以定制,因此它在宏观和微观基准测试中非常高效,开销很低。这表明,使用任意可编程的用户级监视器进行系统安全和审计应用程序是可行的
{"title":"A user-level framework for auditing and monitoring","authors":"Yongzheng Wu, R. Yap","doi":"10.1109/CSAC.2005.8","DOIUrl":"https://doi.org/10.1109/CSAC.2005.8","url":null,"abstract":"Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implementing user-level auditing monitors which: (i) does not require superuser privileges; (ii) makes it simple to create user defined monitors which are transparent; and (iii) provides security guarantees such as mandatory and reliable monitoring while maintaining confidentiality of setuid processes. We avoid problems of self-referential monitoring. Monitor use policies can be specified to increase flexibility. We show that our framework can be tailored so that it is very efficient with low overhead on macro and micro benchmarks. This demonstrates that it is feasible to make use of arbitrary and programmable user-level monitors for system security and auditing applications","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy requirements implemented with a JavaCard 使用JavaCard实现的隐私需求
Pub Date : 2005-12-05 DOI: 10.1109/CSAC.2005.44
A. A. E. Kalam, Y. Deswarte
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solutions, this paper describes an analytic and generic approach to protect personal data by anonymization. This approach is then applied to some representative scenarios. The architecture and its implementation with a JavaCard are finally presented. Our analysis, solution and implementation are generic enough to be adapted to various collaborative systems that process sensitive data such as e-commerce, e-government, social applications, etc
隐私在医疗保健系统中极为重要。不幸的是,大多数已经部署的解决方案都是根据经验开发的。在讨论了一些现有的解决方案之后,本文描述了一种通过匿名化保护个人数据的分析和通用方法。然后将此方法应用于一些具有代表性的场景。最后给出了该体系结构及其在JavaCard上的实现。我们的分析、解决方案和实现是通用的,足以适应处理敏感数据的各种协作系统,如电子商务、电子政务、社会应用程序等
{"title":"Privacy requirements implemented with a JavaCard","authors":"A. A. E. Kalam, Y. Deswarte","doi":"10.1109/CSAC.2005.44","DOIUrl":"https://doi.org/10.1109/CSAC.2005.44","url":null,"abstract":"Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solutions, this paper describes an analytic and generic approach to protect personal data by anonymization. This approach is then applied to some representative scenarios. The architecture and its implementation with a JavaCard are finally presented. Our analysis, solution and implementation are generic enough to be adapted to various collaborative systems that process sensitive data such as e-commerce, e-government, social applications, etc","PeriodicalId":422994,"journal":{"name":"21st Annual Computer Security Applications Conference (ACSAC'05)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
21st Annual Computer Security Applications Conference (ACSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1