首页 > 最新文献

Journal of Computer Security最新文献

英文 中文
The intrinsic dimensionality of network datasets and its applications1 网络数据集的内在维数及其应用
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3233/jcs-220131
Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray
Modern network infrastructures are in a constant state of transformation, in large part due to the exponential growth of Internet of Things (IoT) devices. The unique properties of IoT-connected networks, such as heterogeneity and non-standardized protocol, have created critical security holes and network mismanagement. In this paper we propose a new measurement tool, Intrinsic Dimensionality (ID), to aid in analyzing and classifying network traffic. A proxy for dataset complexity, ID can be used to understand the network as a whole, aiding in tasks such as network management and provisioning. We use ID to evaluate several modern network datasets empirically. Showing that, for network and device-level data, generated using IoT methodologies, the ID of the data fits into a low dimensional representation. Additionally we explore network data complexity at the sample level using Local Intrinsic Dimensionality (LID) and propose a novel unsupervised intrusion detection technique, the Weighted Hamming LID Estimator. We show that the algortihm performs better on IoT network datasets than the Autoencoder, KNN, and Isolation Forests. Finally, we propose the use of synthetic data as an additional tool for both network data measurement as well as intrusion detection. Synthetically generated data can aid in building a more robust network dataset, while also helping in downstream tasks such as machine learning based intrusion detection models. We explore the effects of synthetic data on ID measurements, as well as its role in intrusion detection systems.
现代网络基础设施处于不断转型的状态,这在很大程度上是由于物联网(IoT)设备的指数级增长。物联网连接网络的独特属性,如异构性和非标准化协议,造成了严重的安全漏洞和网络管理不善。本文提出了一种新的测量工具——内在维数(Intrinsic Dimensionality, ID),用于分析和分类网络流量。作为数据集复杂性的代理,ID可用于从整体上理解网络,帮助完成网络管理和供应等任务。我们使用ID对几个现代网络数据集进行了实证评估。这表明,对于使用物联网方法生成的网络和设备级数据,数据的ID适合低维表示。此外,我们使用局部固有维数(LID)在样本水平上探索网络数据的复杂性,并提出了一种新的无监督入侵检测技术,加权Hamming LID估计器。我们表明,该算法在物联网网络数据集上的性能优于自编码器、KNN和隔离森林。最后,我们建议使用合成数据作为网络数据测量和入侵检测的附加工具。综合生成的数据可以帮助构建更强大的网络数据集,同时也有助于下游任务,如基于机器学习的入侵检测模型。我们探讨了合成数据对ID测量的影响,以及它在入侵检测系统中的作用。
{"title":"The intrinsic dimensionality of network datasets and its applications1","authors":"Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray","doi":"10.3233/jcs-220131","DOIUrl":"https://doi.org/10.3233/jcs-220131","url":null,"abstract":"Modern network infrastructures are in a constant state of transformation, in large part due to the exponential growth of Internet of Things (IoT) devices. The unique properties of IoT-connected networks, such as heterogeneity and non-standardized protocol, have created critical security holes and network mismanagement. In this paper we propose a new measurement tool, Intrinsic Dimensionality (ID), to aid in analyzing and classifying network traffic. A proxy for dataset complexity, ID can be used to understand the network as a whole, aiding in tasks such as network management and provisioning. We use ID to evaluate several modern network datasets empirically. Showing that, for network and device-level data, generated using IoT methodologies, the ID of the data fits into a low dimensional representation. Additionally we explore network data complexity at the sample level using Local Intrinsic Dimensionality (LID) and propose a novel unsupervised intrusion detection technique, the Weighted Hamming LID Estimator. We show that the algortihm performs better on IoT network datasets than the Autoencoder, KNN, and Isolation Forests. Finally, we propose the use of synthetic data as an additional tool for both network data measurement as well as intrusion detection. Synthetically generated data can aid in building a more robust network dataset, while also helping in downstream tasks such as machine learning based intrusion detection models. We explore the effects of synthetic data on ID measurements, as well as its role in intrusion detection systems.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"78 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135087347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest editors’ introduction 特邀编辑介绍
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3233/jcs-230960
Shamik Sural, Haibing Lu
{"title":"Guest editors’ introduction","authors":"Shamik Sural, Haibing Lu","doi":"10.3233/jcs-230960","DOIUrl":"https://doi.org/10.3233/jcs-230960","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"63 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135092434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow-limited authorization for consensus, replication, and secret sharing1 用于共识、复制和秘密共享的流限制授权1
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230048
Priyanka Mondal, Maximilian Algehed, Owen Arden
Availability is crucial to the security of distributed systems, but guaranteeing availability is hard, especially when participants in the system may act maliciously. Quorum replication protocols provide both integrity and availability: data and computation is replicated at multiple independent hosts, and a quorum of these hosts must agree on the output of all operations applied to the data. Unfortunately, these protocols have high overhead and can be difficult to calibrate for a specific application’s needs. Ideally, developers could use high-level abstractions for consensus and replication to write fault-tolerant code that is secure by construction. This paper presents Flow-Limited Authorization for Quorum Replication (FLAQR), a core calculus for building distributed applications with heterogeneous quorum replication protocols while enforcing end-to-end information security. Our type system ensures that well-typed FLAQR programs cannot fail (experience an unrecoverable error) in ways that violate their type-level specifications. We present noninterference theorems that characterize FLAQR’s confidentiality, integrity, and availability in the presence of consensus, replication, and failures, as well as a liveness theorem for the class of majority quorum protocols under a bounded number of faults. Additionally, we present an extension to FLAQR that supports secret sharing as a form of declassification and prove it preserves integrity and availability security properties.
可用性对于分布式系统的安全性至关重要,但是保证可用性是很困难的,特别是当系统中的参与者可能有恶意行为时。仲裁复制协议同时提供完整性和可用性:数据和计算在多个独立主机上复制,这些主机的仲裁必须就应用于数据的所有操作的输出达成一致。不幸的是,这些协议有很高的开销,并且很难针对特定应用程序的需求进行校准。理想情况下,开发人员可以使用一致性和复制的高级抽象来编写通过构造安全的容错代码。介绍Flow-Limited法定授权复制(FLAQR)的核心微积分与异构群体复制协议而建立分布式应用程序执行端到端的信息安全。我们的类型系统确保类型良好的FLAQR程序不会以违反其类型级规范的方式失败(经历不可恢复的错误)。我们提出了在存在共识、复制和故障的情况下表征FLAQR的机密性、完整性和可用性的非干扰定理,以及在有限数量故障下多数仲裁协议类的活动性定理。此外,我们提出了flqr的扩展,支持秘密共享作为解密的一种形式,并证明它保留了完整性和可用性的安全属性。
{"title":"Flow-limited authorization for consensus, replication, and secret sharing1","authors":"Priyanka Mondal, Maximilian Algehed, Owen Arden","doi":"10.3233/jcs-230048","DOIUrl":"https://doi.org/10.3233/jcs-230048","url":null,"abstract":"Availability is crucial to the security of distributed systems, but guaranteeing availability is hard, especially when participants in the system may act maliciously. Quorum replication protocols provide both integrity and availability: data and computation is replicated at multiple independent hosts, and a quorum of these hosts must agree on the output of all operations applied to the data. Unfortunately, these protocols have high overhead and can be difficult to calibrate for a specific application’s needs. Ideally, developers could use high-level abstractions for consensus and replication to write fault-tolerant code that is secure by construction. This paper presents Flow-Limited Authorization for Quorum Replication (FLAQR), a core calculus for building distributed applications with heterogeneous quorum replication protocols while enforcing end-to-end information security. Our type system ensures that well-typed FLAQR programs cannot fail (experience an unrecoverable error) in ways that violate their type-level specifications. We present noninterference theorems that characterize FLAQR’s confidentiality, integrity, and availability in the presence of consensus, replication, and failures, as well as a liveness theorem for the class of majority quorum protocols under a bounded number of faults. Additionally, we present an extension to FLAQR that supports secret sharing as a form of declassification and prove it preserves integrity and availability security properties.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal optimality and robust utility bounds for metric differential privacy1 度量差分隐私的通用最优性和鲁棒效用界[j]
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230036
Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding
We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al. introduced the idea of universal optimality to characterise the “best” mechanism for a certain query that simultaneously satisfies (a fixed) ε-differential privacy constraint whilst at the same time providing better utility compared to any other ε-differentially private mechanism for the same query. They showed that the Geometric mechanism is universally optimal for the class of counting queries. On the other hand, Brenner and Nissim showed that outside the space of counting queries, and for the Bayes risk loss function, no such universally optimal mechanisms exist. Except for the universal optimality of the Laplace mechanism, there have been no generalisations of these universally optimal results to other classes of differentially-private mechanisms. In this paper, we use metric differential privacy and quantitative information flow as the fundamental principle for studying universal optimality. Metric differential privacy is a generalisation of both standard (i.e., central) differential privacy and local differential privacy, and it is increasingly being used in various application domains, for instance in location privacy and in privacy-preserving machine learning. Similar to the approaches adopted by Ghosh et al. and Brenner and Nissim, we measure utility in terms of loss functions, and we interpret the notion of a privacy mechanism as an information-theoretic channel satisfying constraints defined by ε-differential privacy and a metric meaningful to the underlying state space. Using this framework we are able to clarify Nissim and Brenner’s negative results by (a) that in fact all privacy types contain optimal mechanisms relative to certain kinds of non-trivial loss functions, and (b) extending and generalising their negative results beyond Bayes risk specifically to a wide class of non-trivial loss functions. Our exploration suggests that universally optimal mechanisms are indeed rare within privacy types. We therefore propose weaker universal benchmarks of utility called privacy type capacities. We show that such capacities always exist and can be computed using a convex optimisation algorithm. Further, we illustrate these ideas on a selection of examples with several different underlying metrics.
本文研究了度量差分隐私环境下的隐私-效用权衡问题。Ghosh等人引入了普遍最优性的概念来描述某个查询的“最佳”机制,该机制同时满足(固定的)ε-差分隐私约束,同时与同一查询的任何其他ε-差分隐私机制相比,提供更好的效用。他们证明了几何机制对于计数查询类是普遍最优的。另一方面,Brenner和Nissim表明,在计数查询空间之外,对于贝叶斯风险损失函数,不存在这样的普遍最优机制。除了拉普拉斯机制的普遍最优性外,还没有将这些普遍最优结果推广到其他类型的微分私有机制。本文将度量差分隐私和定量信息流作为研究全局最优性的基本原理。度量差分隐私是标准(即中央)差分隐私和局部差分隐私的概括,它越来越多地用于各种应用领域,例如位置隐私和保护隐私的机器学习。与Ghosh等人、Brenner和Nissim采用的方法类似,我们用损失函数来衡量效用,并将隐私机制的概念解释为满足ε-微分隐私定义的约束的信息理论通道和对底层状态空间有意义的度量。使用这个框架,我们能够通过(a)澄清Nissim和Brenner的负面结果,即实际上所有隐私类型都包含相对于某些类型的非平凡损失函数的最佳机制,以及(b)将他们的负面结果扩展和推广到贝叶斯风险之外,特别是广泛的非平凡损失函数。我们的研究表明,在隐私类型中,普遍最优的机制确实很少见。因此,我们提出了较弱的通用基准,称为隐私类型容量。我们证明了这样的容量总是存在的,并且可以使用凸优化算法计算。此外,我们通过几个不同的基本指标的示例来说明这些思想。
{"title":"Universal optimality and robust utility bounds for metric differential privacy1","authors":"Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding","doi":"10.3233/jcs-230036","DOIUrl":"https://doi.org/10.3233/jcs-230036","url":null,"abstract":"We study the privacy-utility trade-off in the context of metric differential privacy. Ghosh et al. introduced the idea of universal optimality to characterise the “best” mechanism for a certain query that simultaneously satisfies (a fixed) ε-differential privacy constraint whilst at the same time providing better utility compared to any other ε-differentially private mechanism for the same query. They showed that the Geometric mechanism is universally optimal for the class of counting queries. On the other hand, Brenner and Nissim showed that outside the space of counting queries, and for the Bayes risk loss function, no such universally optimal mechanisms exist. Except for the universal optimality of the Laplace mechanism, there have been no generalisations of these universally optimal results to other classes of differentially-private mechanisms. In this paper, we use metric differential privacy and quantitative information flow as the fundamental principle for studying universal optimality. Metric differential privacy is a generalisation of both standard (i.e., central) differential privacy and local differential privacy, and it is increasingly being used in various application domains, for instance in location privacy and in privacy-preserving machine learning. Similar to the approaches adopted by Ghosh et al. and Brenner and Nissim, we measure utility in terms of loss functions, and we interpret the notion of a privacy mechanism as an information-theoretic channel satisfying constraints defined by ε-differential privacy and a metric meaningful to the underlying state space. Using this framework we are able to clarify Nissim and Brenner’s negative results by (a) that in fact all privacy types contain optimal mechanisms relative to certain kinds of non-trivial loss functions, and (b) extending and generalising their negative results beyond Bayes risk specifically to a wide class of non-trivial loss functions. Our exploration suggests that universally optimal mechanisms are indeed rare within privacy types. We therefore propose weaker universal benchmarks of utility called privacy type capacities. We show that such capacities always exist and can be computed using a convex optimisation algorithm. Further, we illustrate these ideas on a selection of examples with several different underlying metrics.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine-checked proofs of privacy against malicious boards for Selene & Co1 针对Selene &恶意板的机器检查隐私证明Co1
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230045
Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y.A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
Privacy is a notoriously difficult property to achieve in complicated systems and especially in electronic voting schemes. Moreover, electronic voting schemes is a class of systems that require very high assurance. The literature contains a number of ballot privacy definitions along with security proofs for common systems. Some machine-checked security proofs have also appeared. We define a new ballot privacy notion that captures a larger class of voting schemes. This notion improves on the state of the art by taking into account that verification in many schemes will happen or must happen after the tally has been published, not before as in previous definitions. As a case study we give a machine-checked proof of privacy for Selene, which is a remote electronic voting scheme which offers an attractive mix of security properties and usability. Prior to our work, the computational privacy of Selene has never been formally verified. Finally, we also prove that MiniVoting and Belenios satisfies our definition.
在复杂的系统中,尤其是在电子投票方案中,隐私是一个众所周知的难以实现的属性。此外,电子投票方案是一类需要非常高的保证的系统。文献中包含许多选票隐私定义以及通用系统的安全证明。一些机器检查的安全证明也出现了。我们定义了一个新的选票隐私概念,它捕获了更大类的投票方案。考虑到许多方案中的验证将在或必须在统计公布之后进行,而不是像以前的定义那样在此之前进行,这一概念在目前的技术水平上得到了改进。作为一个案例研究,我们为Selene提供了一个机器检查的隐私证明,这是一个远程电子投票方案,它提供了一个有吸引力的安全属性和可用性组合。在我们的工作之前,Selene的计算隐私从未得到正式验证。最后,我们也证明了MiniVoting和Belenios满足我们的定义。
{"title":"Machine-checked proofs of privacy against malicious boards for Selene & Co1","authors":"Constantin Cătălin Drăgan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y.A. Ryan, Peter B. Rønne, Morten Rotvold Solberg","doi":"10.3233/jcs-230045","DOIUrl":"https://doi.org/10.3233/jcs-230045","url":null,"abstract":"Privacy is a notoriously difficult property to achieve in complicated systems and especially in electronic voting schemes. Moreover, electronic voting schemes is a class of systems that require very high assurance. The literature contains a number of ballot privacy definitions along with security proofs for common systems. Some machine-checked security proofs have also appeared. We define a new ballot privacy notion that captures a larger class of voting schemes. This notion improves on the state of the art by taking into account that verification in many schemes will happen or must happen after the tally has been published, not before as in previous definitions. As a case study we give a machine-checked proof of privacy for Selene, which is a remote electronic voting scheme which offers an attractive mix of security properties and usability. Prior to our work, the computational privacy of Selene has never been formally verified. Finally, we also prove that MiniVoting and Belenios satisfies our definition.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135805039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue: 35th IEEE Computer Security Symposium – CSF 2022 特刊:第35届IEEE计算机安全研讨会- CSF 2022
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230950
Stefano Calzavara, David Naumann
{"title":"Special issue: 35th IEEE Computer Security Symposium – CSF 2022","authors":"Stefano Calzavara, David Naumann","doi":"10.3233/jcs-230950","DOIUrl":"https://doi.org/10.3233/jcs-230950","url":null,"abstract":"","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How efficient are replay attacks against vote privacy? A formal quantitative analysis1 对投票隐私的重放攻击有多有效?正式的定量分析
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230047
David Mestel, Johannes Müller, Pascal Reisert
Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections. Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are. We study this question from commonly used and complementary perspectives on vote privacy, showing as an independent contribution that a simple extension of a popular game-based privacy definition corresponds to a strong entropy-based notion. Our results demonstrate that replay attacks can be devastating for a voter’s privacy even when an adversary’s resources are very limited. We illustrate our formal findings by applying them to a number of real-world elections, showing that a modest number of replays can result in significant privacy loss. Overall, our work reveals that, contrary to a common belief, replay attacks can be very efficient and must therefore be considered a serious threat.
重放攻击是针对投票隐私的最著名的攻击之一。许多电子投票系统已被证明容易受到重放攻击,包括在实际选举中使用的Helios系统。尽管重放攻击很受欢迎,但人们普遍认为重放攻击效率低下,但它们对投票隐私构成的实际威胁从未被正式研究过。因此,在本文中,我们首次精确地分析了重放攻击到底有多高效。我们从投票隐私的常用和互补角度研究了这个问题,作为一个独立的贡献,显示了一个流行的基于游戏的隐私定义的简单扩展对应于一个强大的基于熵的概念。我们的研究结果表明,即使对手的资源非常有限,重播攻击也可能对选民的隐私造成毁灭性的破坏。我们通过将我们的正式发现应用于许多现实世界的选举来说明它们,表明少量的重播可能导致严重的隐私损失。总的来说,我们的工作表明,与普遍的看法相反,重放攻击可以非常有效,因此必须被视为严重的威胁。
{"title":"How efficient are replay attacks against vote privacy? A formal quantitative analysis1","authors":"David Mestel, Johannes Müller, Pascal Reisert","doi":"10.3233/jcs-230047","DOIUrl":"https://doi.org/10.3233/jcs-230047","url":null,"abstract":"Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections. Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are. We study this question from commonly used and complementary perspectives on vote privacy, showing as an independent contribution that a simple extension of a popular game-based privacy definition corresponds to a strong entropy-based notion. Our results demonstrate that replay attacks can be devastating for a voter’s privacy even when an adversary’s resources are very limited. We illustrate our formal findings by applying them to a number of real-world elections, showing that a modest number of replays can result in significant privacy loss. Overall, our work reveals that, contrary to a common belief, replay attacks can be very efficient and must therefore be considered a serious threat.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A formal model of Checked C1 Checked C1的正式模型
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230040
Liyi Li, Yiyun Liu, Deena Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks
We present a formal model of Checked C, a dialect of C that aims to enforce spatial memory safety. Our model pays particular attention to the semantics of dynamically sized, potentially null-terminated arrays. We formalize this model in Coq, and prove that any spatial memory safety errors can be blamed on portions of the program labeled unchecked; this is a Checked C feature that supports incremental porting and backward compatibility. While our model’s operational semantics uses annotated (“fat”) pointers to enforce spatial safety, we show that such annotations can be safely erased. Using PLT Redex we formalize an executable version of our model and a compilation procedure to an untyped C-like language, as well as use randomized testing to validate that generated code faithfully simulates the original. Finally, we develop a custom random generator for well-typed and almost-well-typed terms in our Redex model, and use it to search for inconsistencies between our model and the Clang Checked C implementation. We find these steps to be a useful way to co-develop a language (Checked C is still in development) and a core model of it.
我们提出了Checked C的正式模型,Checked C是一种旨在加强空间内存安全的C方言。我们的模型特别关注动态大小的、可能以null结尾的数组的语义。我们在Coq中形式化了这个模型,并证明了任何空间存储安全错误都可以归咎于标记为未检查的部分程序;这是一个Checked C特性,支持增量移植和向后兼容性。虽然我们的模型的操作语义使用带注释的(“fat”)指针来加强空间安全性,但我们证明了这种注释可以安全地擦除。使用PLT Redex,我们将模型的可执行版本和编译过程形式化为无类型的类c语言,并使用随机测试来验证生成的代码忠实地模拟了原始代码。最后,我们为Redex模型中的类型良好和几乎类型良好的术语开发了一个自定义随机生成器,并使用它来搜索我们的模型和Clang Checked C实现之间的不一致之处。我们发现这些步骤是共同开发语言(Checked C仍在开发中)及其核心模型的有用方法。
{"title":"A formal model of Checked C1","authors":"Liyi Li, Yiyun Liu, Deena Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks","doi":"10.3233/jcs-230040","DOIUrl":"https://doi.org/10.3233/jcs-230040","url":null,"abstract":"We present a formal model of Checked C, a dialect of C that aims to enforce spatial memory safety. Our model pays particular attention to the semantics of dynamically sized, potentially null-terminated arrays. We formalize this model in Coq, and prove that any spatial memory safety errors can be blamed on portions of the program labeled unchecked; this is a Checked C feature that supports incremental porting and backward compatibility. While our model’s operational semantics uses annotated (“fat”) pointers to enforce spatial safety, we show that such annotations can be safely erased. Using PLT Redex we formalize an executable version of our model and a compilation procedure to an untyped C-like language, as well as use randomized testing to validate that generated code faithfully simulates the original. Finally, we develop a custom random generator for well-typed and almost-well-typed terms in our Redex model, and use it to search for inconsistencies between our model and the Clang Checked C implementation. We find these steps to be a useful way to co-develop a language (Checked C is still in development) and a core model of it.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic protocol verification with dice1 使用dice1进行符号协议验证
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-13 DOI: 10.3233/jcs-230037
Vincent Cheval, Raphaëlle Crubillé, Steve Kremer
Symbolic protocol verification generally abstracts probabilities away, considering computations that succeed only with negligible probability, such as guessing random numbers or breaking an encryption scheme, as impossible. This abstraction, sometimes referred to as the perfect cryptography assumption, has shown very useful as it simplifies automation of the analysis. However, probabilities may also appear in the control flow where they are generally not negligible. In this paper we consider a framework for symbolic protocol analysis with a probabilistic choice operator: the probabilistic applied π-calculus. We define and explore the relationships between several behavioral equivalences. In particular we show the need for randomized schedulers and exhibit a counter-example to a result in a previous work that relied on non-randomized ones. As in other frameworks that mix both non-deterministic and probabilistic choices, schedulers may sometimes be unrealistically powerful. We therefore consider two subclasses of processes that avoid this problem. In particular, when considering purely non-deterministic protocols, as is done in classical symbolic verification, we show that a probabilistic adversary has – maybe surprisingly – a strictly superior distinguishing power for may testing, which, when the number of sessions is bounded, we show to coincide with purely possibilistic similarity.
符号协议验证通常将概率抽象掉,认为只有在可以忽略不计的概率下才能成功的计算,比如猜测随机数或破解加密方案,是不可能的。这种抽象,有时被称为完美的密码学假设,已经证明非常有用,因为它简化了分析的自动化。然而,概率也可能出现在控制流中,它们通常是不可忽略的。本文考虑了一个带有概率选择算子的符号协议分析框架:概率应用π微积分。我们定义并探讨了几个行为等价之间的关系。特别地,我们展示了对随机调度程序的需求,并展示了一个反例,该反例在之前的工作中依赖于非随机调度程序。与其他混合了非确定性和概率选择的框架一样,调度器有时可能过于强大。因此,我们考虑两个子类的过程,以避免这个问题。特别是,当考虑纯粹的非确定性协议时,正如在经典符号验证中所做的那样,我们表明,概率对手(可能令人惊讶地)具有严格优于may测试的区分能力,当会话数量有限时,我们显示与纯粹的可能性相似性相一致。
{"title":"Symbolic protocol verification with dice1","authors":"Vincent Cheval, Raphaëlle Crubillé, Steve Kremer","doi":"10.3233/jcs-230037","DOIUrl":"https://doi.org/10.3233/jcs-230037","url":null,"abstract":"Symbolic protocol verification generally abstracts probabilities away, considering computations that succeed only with negligible probability, such as guessing random numbers or breaking an encryption scheme, as impossible. This abstraction, sometimes referred to as the perfect cryptography assumption, has shown very useful as it simplifies automation of the analysis. However, probabilities may also appear in the control flow where they are generally not negligible. In this paper we consider a framework for symbolic protocol analysis with a probabilistic choice operator: the probabilistic applied π-calculus. We define and explore the relationships between several behavioral equivalences. In particular we show the need for randomized schedulers and exhibit a counter-example to a result in a previous work that relied on non-randomized ones. As in other frameworks that mix both non-deterministic and probabilistic choices, schedulers may sometimes be unrealistically powerful. We therefore consider two subclasses of processes that avoid this problem. In particular, when considering purely non-deterministic protocols, as is done in classical symbolic verification, we show that a probabilistic adversary has – maybe surprisingly – a strictly superior distinguishing power for may testing, which, when the number of sessions is bounded, we show to coincide with purely possibilistic similarity.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135805040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud 使用代理加密的无证书签名加密,用于保护云中的农业数据
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-28 DOI: 10.3233/jcs-220107
I. Obiri, Abigail Akosua Addobea, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah
Precision agriculture (PA) involves collecting, processing, and analyzing datasets in agriculture for an informed decision. Due to the high data storage and application maintenance costs, farmers usually outsource their agricultural data obtained from PA to cloud service providers to leverage cloud services. Nonetheless, serious security concerns arise from using cloud services for farmers. For instance, an attacker can intercept agricultural data and run comprehensive statistical analyses to adjudicate farmers’ financial status, extort money, commit identity theft, etc. As a result, compelling data security schemes have become crucial for secure precision farming, where only legitimate users are required to access the agricultural data outsourced to the cloud. This article presents a certificateless signcryption scheme with proxy re-encryption (CLS-PRE) for secure access control in PA. An in-depth security analysis proves that the CLS-PRE scheme is secure in the Random Oracle Model. Detailed performance evaluation also shows that the scheme can reduce the time required to signcrypt and unsigncrypt messages and lower communication overhead.
精准农业(PA)涉及收集、处理和分析农业数据集,以做出明智的决策。由于数据存储和应用程序维护成本较高,农民通常将从PA获取的农业数据外包给云服务提供商,以利用云服务。然而,为农民使用云服务引发了严重的安全问题。例如,攻击者可以拦截农业数据,并进行全面的统计分析,以判定农民的财务状况,敲诈钱财,进行身份盗窃等。因此,令人信服的数据安全方案已成为安全精准农业的关键,只有合法用户才能访问外包给云的农业数据。提出了一种基于代理重加密的无证书签名加密方案(CLS-PRE),用于PA中的安全访问控制。深入的安全性分析证明了CLS-PRE方案在随机Oracle模型下是安全的。详细的性能评估还表明,该方案可以减少对消息进行签名和取消签名所需的时间,并降低通信开销。
{"title":"A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud","authors":"I. Obiri, Abigail Akosua Addobea, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah","doi":"10.3233/jcs-220107","DOIUrl":"https://doi.org/10.3233/jcs-220107","url":null,"abstract":"Precision agriculture (PA) involves collecting, processing, and analyzing datasets in agriculture for an informed decision. Due to the high data storage and application maintenance costs, farmers usually outsource their agricultural data obtained from PA to cloud service providers to leverage cloud services. Nonetheless, serious security concerns arise from using cloud services for farmers. For instance, an attacker can intercept agricultural data and run comprehensive statistical analyses to adjudicate farmers’ financial status, extort money, commit identity theft, etc. As a result, compelling data security schemes have become crucial for secure precision farming, where only legitimate users are required to access the agricultural data outsourced to the cloud. This article presents a certificateless signcryption scheme with proxy re-encryption (CLS-PRE) for secure access control in PA. An in-depth security analysis proves that the CLS-PRE scheme is secure in the Random Oracle Model. Detailed performance evaluation also shows that the scheme can reduce the time required to signcrypt and unsigncrypt messages and lower communication overhead.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":"69 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74504717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1