首页 > 最新文献

ACM Transactions on Information and System Security最新文献

英文 中文
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport 密码学理论与实践:公共交通的高效和隐私保护支付
Q Engineering Pub Date : 2015-03-27 DOI: 10.1145/2699904
Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, C. Paar
We propose a new lightweight cryptographic payment scheme for transit systems, called P4R (Privacy-Preserving Pre-Payments with Refunds), which is suitable for low-cost user devices with limited capabilities. Using P4R, users deposit money to obtain one-show credentials, where each credential allows the user to make an arbitrary ride on the system. The trip fare is determined on-the-fly at the end of the trip. If the deposit for the credential exceeds this fare, the user obtains a refund. Refund values collected over several trips are aggregated in a single token, thereby saving memory and increasing privacy. Our solution builds on Brands’s e-cash scheme to realize the prepayment system and on Boneh-Lynn-Shacham (BLS) signatures to implement the refund capabilities. Compared to a Brands-only solution for transportation payment systems, P4R allows us to minimize the number of coins a user needs to pay for his rides and thus minimizes the number of expensive withdrawal transactions, as well as storage requirements for the fairly large coins. Moreover, P4R enables flexible pricing because it allows for exact payments of arbitrary amounts (within a certain range) using a single fast paying (and refund) transaction. Fortunately, the mechanisms enabling these features require very little computational overhead. Choosing contemporary security parameters, we implemented P4R on a prototyping payment device and show its suitability for future transit payment systems. Estimation results demonstrate that the data required for 20 rides consume less than 10KB of memory, and the payment and refund transactions during a ride take less than half a second. We show that malicious users are not able to cheat the system by receiving a refund that exceeds the overall deposit minus the overall fare and can be identified during double-spending checks. At the same time, the system protects the privacy of honest users in that transactions are anonymous (except for deposits) and trips are unlinkable.
我们为交通系统提出了一种新的轻量级加密支付方案,称为P4R (Privacy-Preserving prepayments with re退款),它适用于功能有限的低成本用户设备。使用P4R,用户可以存入资金来获得一次显示凭证,其中每个凭证都允许用户在系统上任意使用。旅行费用在旅行结束时当场确定。如果凭据的押金超过这个费用,用户将获得退款。在几次旅行中收集的退款值汇总在一个令牌中,从而节省内存并增加隐私。我们的解决方案基于Brands的电子现金方案来实现预付款系统,并基于Boneh-Lynn-Shacham (BLS)签名来实现退款功能。与运输支付系统的纯品牌解决方案相比,P4R允许我们最大限度地减少用户需要支付的硬币数量,从而最大限度地减少昂贵的提款交易数量,以及对相当大的硬币的存储要求。此外,P4R支持灵活的定价,因为它允许使用单个快速支付(和退款)交易来精确支付任意金额(在一定范围内)。幸运的是,启用这些特性的机制只需要很少的计算开销。选择当代安全参数,我们在原型支付设备上实现了P4R,并展示了其对未来过境支付系统的适用性。估计结果表明,20次骑行所需的数据消耗的内存不到10KB,骑行期间的支付和退款事务花费的时间不到半秒。我们表明,恶意用户无法通过收到超过总押金减去总票价的退款来欺骗系统,并且可以在双重支出检查中识别。同时,该系统保护了诚实用户的隐私,因为交易是匿名的(存款除外),旅行是不可链接的。
{"title":"Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport","authors":"Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, C. Paar","doi":"10.1145/2699904","DOIUrl":"https://doi.org/10.1145/2699904","url":null,"abstract":"We propose a new lightweight cryptographic payment scheme for transit systems, called P4R (Privacy-Preserving Pre-Payments with Refunds), which is suitable for low-cost user devices with limited capabilities. Using P4R, users deposit money to obtain one-show credentials, where each credential allows the user to make an arbitrary ride on the system. The trip fare is determined on-the-fly at the end of the trip. If the deposit for the credential exceeds this fare, the user obtains a refund. Refund values collected over several trips are aggregated in a single token, thereby saving memory and increasing privacy. Our solution builds on Brands’s e-cash scheme to realize the prepayment system and on Boneh-Lynn-Shacham (BLS) signatures to implement the refund capabilities. Compared to a Brands-only solution for transportation payment systems, P4R allows us to minimize the number of coins a user needs to pay for his rides and thus minimizes the number of expensive withdrawal transactions, as well as storage requirements for the fairly large coins. Moreover, P4R enables flexible pricing because it allows for exact payments of arbitrary amounts (within a certain range) using a single fast paying (and refund) transaction. Fortunately, the mechanisms enabling these features require very little computational overhead. Choosing contemporary security parameters, we implemented P4R on a prototyping payment device and show its suitability for future transit payment systems. Estimation results demonstrate that the data required for 20 rides consume less than 10KB of memory, and the payment and refund transactions during a ride take less than half a second. We show that malicious users are not able to cheat the system by receiving a refund that exceeds the overall deposit minus the overall fare and can be identified during double-spending checks. At the same time, the system protects the privacy of honest users in that transactions are anonymous (except for deposits) and trips are unlinkable.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"3 1","pages":"10:1-10:31"},"PeriodicalIF":0.0,"publicationDate":"2015-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/2699904","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72525601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
StopWatch: A Cloud Architecture for Timing Channel Mitigation 秒表:用于时间通道缓解的云架构
Q Engineering Pub Date : 2014-11-17 DOI: 10.1145/2670940
Peng Li, Debin Gao, M. Reiter
This article presents StopWatch, a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch uses the timing of I/O events at a VM’s replicas collectively to determine the timings observed by each one or by an external observer, so that observable timing behaviors are similarly likely in the absence of any other individual, coresident VMs. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, demonstrate its advantages relative to alternative defenses against timing side channels with commodity hardware, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization.
本文介绍了StopWatch,这是一种防御基于时间的侧信道攻击的系统,这种攻击是由基础设施即服务云中的受害者和攻击者共存引起的。StopWatch将每个驻留在云上的客户虚拟机(VM)复制三份,并放置副本,以便一个客户虚拟机的三个副本与其他虚拟机的不重叠的副本集共存。StopWatch使用VM副本上的I/O事件的时间来确定每个副本或外部观察者观察到的时间,因此在没有任何其他单独的、驻留的VM的情况下,观察到的计时行为是类似的。我们详细介绍了StopWatch在Xen中的设计和实现,评估了影响其性能的因素,展示了其相对于使用商用硬件的定时侧信道的替代防御的优势,并解决了在StopWatch的约束下将VM副本放置在云中的问题,以便仍然能够充分利用云。
{"title":"StopWatch: A Cloud Architecture for Timing Channel Mitigation","authors":"Peng Li, Debin Gao, M. Reiter","doi":"10.1145/2670940","DOIUrl":"https://doi.org/10.1145/2670940","url":null,"abstract":"This article presents StopWatch, a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructure-as-a-service clouds. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs. StopWatch uses the timing of I/O events at a VM’s replicas collectively to determine the timings observed by each one or by an external observer, so that observable timing behaviors are similarly likely in the absence of any other individual, coresident VMs. We detail the design and implementation of StopWatch in Xen, evaluate the factors that influence its performance, demonstrate its advantages relative to alternative defenses against timing side channels with commodity hardware, and address the problem of placing VM replicas in a cloud under the constraints of StopWatch so as to still enable adequate cloud utilization.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"23 1","pages":"8:1-8:28"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75539450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption 面向安全磁盘加密的相互认证和信任引导
Q Engineering Pub Date : 2014-11-17 DOI: 10.1145/2663348
J. Götzfried, Tilo Müller
The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and infiltrated by bootkits that perform keystroke logging; consequently, password-based authentication schemes become attackable. The current technological response, as enforced by BitLocker, verifies the integrity of the boot process by use of the trusted platform module. But, as we show, this countermeasure is insufficient in practice. We present STARK, the first tamperproof authentication scheme that mutually authenticates the computer and the user in order to resist keylogging during boot. To achieve this, STARK implements trust bootstrapping from a secure token to the whole PC. The secure token is an active USB drive that verifies the integrity of the PC and indicates the verification status by an LED to the user. This way, users can ensure the authenticity of the PC before entering their passwords.
基于软件的全磁盘加密中最薄弱的环节是身份验证过程。由于主引导记录必须是未加密的,以便启动其余系统部分的解密,它很容易被执行击键记录的引导包操纵和渗透;因此,基于密码的身份验证方案变得容易受到攻击。目前的技术响应,由BitLocker强制执行,通过使用可信平台模块验证启动过程的完整性。但是,正如我们所展示的,这种对策在实践中是不够的。我们提出了STARK,这是第一个防篡改认证方案,它相互认证计算机和用户,以防止在启动过程中进行键盘记录。为了实现这一点,STARK实现了从安全令牌到整个PC的信任引导。安全令牌是一个活动的USB驱动器,用于验证PC的完整性,并通过LED向用户显示验证状态。这样,用户在输入密码之前就可以确保电脑的真实性。
{"title":"Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption","authors":"J. Götzfried, Tilo Müller","doi":"10.1145/2663348","DOIUrl":"https://doi.org/10.1145/2663348","url":null,"abstract":"The weakest link in software-based full disk encryption is the authentication procedure. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and infiltrated by bootkits that perform keystroke logging; consequently, password-based authentication schemes become attackable. The current technological response, as enforced by BitLocker, verifies the integrity of the boot process by use of the trusted platform module. But, as we show, this countermeasure is insufficient in practice. We present STARK, the first tamperproof authentication scheme that mutually authenticates the computer and the user in order to resist keylogging during boot. To achieve this, STARK implements trust bootstrapping from a secure token to the whole PC. The secure token is an active USB drive that verifies the integrity of the PC and indicates the verification status by an LED to the user. This way, users can ensure the authenticity of the PC before entering their passwords.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"31 1","pages":"6:1-6:23"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75626301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks
Q Engineering Pub Date : 2014-11-17 DOI: 10.1145/2644809
Peter C. Chapin, C. Skalka
We describe SpartanRPC, a secure middleware technology that supports cooperation between distinct security domains in wireless sensor networks. SpartanRPC extends nesC to provide a link-layer remote procedure call (RPC) mechanism, along with an enhancement of configuration wirings that allow specification of remote, dynamic endpoints. RPC invocation is secured via an authorization logic that enables servers to specify access policies and requires clients to prove authorization. This mechanism is implemented using a combination of symmetric and public key cryptography. We report on benchmark testing of a prototype implementation and on an application of the framework that supports secure collaborative use and administration of an existing WSN data-gathering system.
我们描述了SpartanRPC,一种安全的中间件技术,支持无线传感器网络中不同安全域之间的合作。SpartanRPC扩展了nesC,提供了一种链路层远程过程调用(RPC)机制,并增强了配置连接,允许对远程动态端点进行规范。RPC调用通过授权逻辑得到保护,该逻辑允许服务器指定访问策略,并要求客户端证明授权。这种机制是使用对称和公钥加密的组合来实现的。我们报告了原型实现的基准测试和支持现有WSN数据收集系统的安全协作使用和管理的框架应用程序。
{"title":"SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks","authors":"Peter C. Chapin, C. Skalka","doi":"10.1145/2644809","DOIUrl":"https://doi.org/10.1145/2644809","url":null,"abstract":"We describe SpartanRPC, a secure middleware technology that supports cooperation between distinct security domains in wireless sensor networks. SpartanRPC extends nesC to provide a link-layer remote procedure call (RPC) mechanism, along with an enhancement of configuration wirings that allow specification of remote, dynamic endpoints. RPC invocation is secured via an authorization logic that enables servers to specify access policies and requires clients to prove authorization. This mechanism is implemented using a combination of symmetric and public key cryptography. We report on benchmark testing of a prototype implementation and on an application of the framework that supports secure collaborative use and administration of an existing WSN data-gathering system.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"72 1","pages":"5:1-5:30"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76457038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Know Your Enemy: Compromising Adversaries in Protocol Analysis 了解你的敌人:协议分析中的妥协对手
Q Engineering Pub Date : 2014-11-17 DOI: 10.1145/2658996
D. Basin, C. Cremers
We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify different adversary capabilities, capturing different practically-relevant notions of key and state compromise. The resulting adversary models generalize the models currently used in different domains, such as security models for authenticated key exchange. We extend an existing security-protocol analysis tool, Scyther, with our adversary models. This extension systematically supports notions such as weak perfect forward secrecy, key compromise impersonation, and adversaries capable of state-reveal queries. Furthermore, we introduce the concept of a protocol-security hierarchy, which classifies the relative strength of protocols against different adversaries. In case studies, we use Scyther to analyse protocols and automatically construct protocol-security hierarchies in the context of our adversary models. Our analysis confirms known results and uncovers new attacks. Additionally, our hierarchies refine and correct relationships between protocols previously reported in the cryptographic literature.
我们提出了一个基于模块化操作语义的符号框架,用于形式化与加密协议的设计和分析相关的不同妥协概念。可以组合框架的规则来指定不同的对手能力,捕获不同的实际相关的密钥和状态妥协概念。生成的对手模型概括了目前在不同领域中使用的模型,例如用于经过身份验证的密钥交换的安全模型。我们用我们的对手模型扩展了现有的安全协议分析工具Scyther。这个扩展系统地支持弱完美前向保密、密钥泄露模拟和能够显示状态查询的对手等概念。此外,我们引入了协议安全层次结构的概念,它对不同对手的协议的相对强度进行了分类。在案例研究中,我们使用Scyther来分析协议,并在对手模型的上下文中自动构建协议安全层次结构。我们的分析证实了已知的结果,并发现了新的攻击。此外,我们的层次结构改进和纠正了密码学文献中先前报道的协议之间的关系。
{"title":"Know Your Enemy: Compromising Adversaries in Protocol Analysis","authors":"D. Basin, C. Cremers","doi":"10.1145/2658996","DOIUrl":"https://doi.org/10.1145/2658996","url":null,"abstract":"We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify different adversary capabilities, capturing different practically-relevant notions of key and state compromise. The resulting adversary models generalize the models currently used in different domains, such as security models for authenticated key exchange. We extend an existing security-protocol analysis tool, Scyther, with our adversary models. This extension systematically supports notions such as weak perfect forward secrecy, key compromise impersonation, and adversaries capable of state-reveal queries. Furthermore, we introduce the concept of a protocol-security hierarchy, which classifies the relative strength of protocols against different adversaries.\u0000 In case studies, we use Scyther to analyse protocols and automatically construct protocol-security hierarchies in the context of our adversary models. Our analysis confirms known results and uncovers new attacks. Additionally, our hierarchies refine and correct relationships between protocols previously reported in the cryptographic literature.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"1 1","pages":"7:1-7:31"},"PeriodicalIF":0.0,"publicationDate":"2014-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89775319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Using Architecture to Reason about Information Security 用体系结构推理信息安全
Q Engineering Pub Date : 2014-09-01 DOI: 10.1145/2829949
Stephen Chong, R. V. D. Meyden
We demonstrate, by a number of examples, that information flow security properties can be proved from abstract architectural descriptions, which describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed between communicating domains. A notion of refinement of such system architectures is developed that supports top-down development of architectural specifications and proofs by abstraction of information security properties. We also show that, in a concrete setting where the causal structure is enforced by access control, a static check of the access control setting plus local verification of the trusted components is sufficient to prove that a generalized intransitive noninterference policy is satisfied.
通过一些例子,我们证明了信息流安全属性可以从抽象的体系结构描述中得到证明,这些描述只描述了系统的因果结构和可信组件的局部属性。我们通过推广不可传递的不干扰策略来指定系统的这些体系结构描述,以允许过滤在通信域之间传递的信息的能力。这类系统架构的精化概念被开发出来,它支持架构规范的自顶向下开发,并通过对信息安全属性的抽象进行证明。我们还证明,在通过访问控制强制执行因果结构的具体设置中,访问控制设置的静态检查加上可信组件的本地验证足以证明满足广义不可传递不干扰策略。
{"title":"Using Architecture to Reason about Information Security","authors":"Stephen Chong, R. V. D. Meyden","doi":"10.1145/2829949","DOIUrl":"https://doi.org/10.1145/2829949","url":null,"abstract":"We demonstrate, by a number of examples, that information flow security properties can be proved from abstract architectural descriptions, which describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed between communicating domains. A notion of refinement of such system architectures is developed that supports top-down development of architectural specifications and proofs by abstraction of information security properties. We also show that, in a concrete setting where the causal structure is enforced by access control, a static check of the access control setting plus local verification of the trusted components is sufficient to prove that a generalized intransitive noninterference policy is satisfied.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"63 3 1","pages":"8:1-8:30"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79273538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Security Analysis of Accountable Anonymity in Dissent 异议中可问责匿名的安全性分析
Q Engineering Pub Date : 2014-08-01 DOI: 10.1145/2629621
Ewa Syta, Henry Corrigan-Gibbs, Shu-Chun Weng, D. Wolinsky, B. Ford, Aaron Johnson
Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks; mix networks are difficult to protect against traffic analysis; and accountable voting schemes are unsuited to general anonymous messaging. dissent is the first general protocol offering provable anonymity and accountability for moderate-size groups, while efficiently handling unbalanced communication demands among users. We present an improved and hardened dissent protocol, define its precise security properties, and offer rigorous proofs of these properties. The improved protocol systematically addresses the delicate balance between provably hiding the identities of well-behaved users, while provably revealing the identities of disruptive users, a challenging task because many forms of misbehavior are inherently undetectable. The new protocol also addresses several nontrivial attacks on the original dissent protocol stemming from subtle design flaws.
用户通常希望在Internet上匿名通信,例如,在组讨论或即时消息论坛中。然而,现有的解决方案很容易受到行为不端的用户的攻击,他们可能会滥用自己的匿名性来破坏通信。餐饮密码学网络(DC-nets)使组织容易受到拒绝服务和Sybil攻击;混合网络很难防止流量分析;负责任的投票方案不适合一般的匿名消息传递。异议是第一个为中等规模的群组提供可证明的匿名性和问责制的通用协议,同时有效地处理用户之间不平衡的通信需求。我们提出了一个改进和强化的异议协议,定义了其精确的安全属性,并提供了这些属性的严格证明。改进后的协议系统地解决了可证明隐藏行为良好用户身份的微妙平衡,同时可证明揭示破坏性用户的身份,这是一项具有挑战性的任务,因为许多形式的不当行为本质上是无法检测到的。新协议还解决了对原始异议协议的一些重要攻击,这些攻击源于微妙的设计缺陷。
{"title":"Security Analysis of Accountable Anonymity in Dissent","authors":"Ewa Syta, Henry Corrigan-Gibbs, Shu-Chun Weng, D. Wolinsky, B. Ford, Aaron Johnson","doi":"10.1145/2629621","DOIUrl":"https://doi.org/10.1145/2629621","url":null,"abstract":"Users often wish to communicate anonymously on the Internet, for example, in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks; mix networks are difficult to protect against traffic analysis; and accountable voting schemes are unsuited to general anonymous messaging.\u0000 dissent is the first general protocol offering provable anonymity and accountability for moderate-size groups, while efficiently handling unbalanced communication demands among users. We present an improved and hardened dissent protocol, define its precise security properties, and offer rigorous proofs of these properties. The improved protocol systematically addresses the delicate balance between provably hiding the identities of well-behaved users, while provably revealing the identities of disruptive users, a challenging task because many forms of misbehavior are inherently undetectable. The new protocol also addresses several nontrivial attacks on the original dissent protocol stemming from subtle design flaws.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"5 1","pages":"4:1-4:35"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80096999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Rumpole: An Introspective Break-Glass Access Control Language Rumpole:一种内省式破碎玻璃访问控制语言
Q Engineering Pub Date : 2014-08-01 DOI: 10.1145/2629502
Srdjan Marinovic, Naranker Dulay, M. Sloman
Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be permitted. For example, predicting and correctly encoding all emergency and exceptional situations is impractical. Traditional access control models simply deny all requests that are not permitted, and in doing so may cause unpredictable and unacceptable consequences. To overcome this issue, break-glass access control models permit a subject to override an access control denial if he accepts a set of obligatory actions and certain override conditions are met. Existing break-glass models are limited in how the override decision is specified. They either grant overrides for a predefined set of exceptional situations, or they grant unlimited overrides to selected subjects, and as such, they suffer from the difficulty of correctly encoding and predicting all override situations and permissions. To address this, we develop Rumpole, a novel break-glass language that explicitly represents and infers knowledge gaps and knowledge conflicts about the subject's attributes and the contextual conditions, such as emergencies. For example, a Rumpole policy can distinguish whether or not it is known that an emergency holds. This leads to a more informed decision for an override request, whereas current break-glass languages simply assume that there is no emergency if the evidence for it is missing. To formally define Rumpole, we construct a novel many-valued logic programming language called Beagle. It has a simple syntax similar to that of Datalog, and its semantics is an extension of Fitting's bilattice-based semantics for logic programs. Beagle is a knowledge non-monotonic langauge, and as such, is strictly more expressive than current many-valued logic programming languages.
访问控制策略定义了哪些主体和在哪些条件下可以访问哪些资源。然而,往往不可能预测所有应允许进入的对象以及应允许进入的条件。例如,预测和正确编码所有紧急和特殊情况是不切实际的。传统的访问控制模型简单地拒绝所有不允许的请求,这样做可能会导致不可预测和不可接受的后果。为了克服这个问题,破玻璃访问控制模型允许对象在接受一组强制操作并且满足某些覆盖条件的情况下重写访问控制拒绝。现有的破玻璃模型在如何指定覆盖决策方面受到限制。它们要么为一组预定义的异常情况授予覆盖,要么为选定的主题授予无限覆盖,因此,它们难以正确编码和预测所有覆盖情况和权限。为了解决这个问题,我们开发了Rumpole,这是一种新颖的破玻璃语言,可以明确地表示和推断关于主体属性和上下文条件(如紧急情况)的知识差距和知识冲突。例如,Rumpole策略可以区分是否已知紧急情况是否存在。这导致对推翻请求做出更明智的决定,而目前的破玻璃语言只是假设,如果证据缺失,就不存在紧急情况。为了正式定义Rumpole,我们构造了一种新的多值逻辑编程语言Beagle。它具有与Datalog类似的简单语法,其语义是fit用于逻辑程序的基于双格的语义的扩展。Beagle是一种知识非单调语言,因此,严格地说,它比当前的多值逻辑编程语言更具表现力。
{"title":"Rumpole: An Introspective Break-Glass Access Control Language","authors":"Srdjan Marinovic, Naranker Dulay, M. Sloman","doi":"10.1145/2629502","DOIUrl":"https://doi.org/10.1145/2629502","url":null,"abstract":"Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be permitted. For example, predicting and correctly encoding all emergency and exceptional situations is impractical. Traditional access control models simply deny all requests that are not permitted, and in doing so may cause unpredictable and unacceptable consequences. To overcome this issue, break-glass access control models permit a subject to override an access control denial if he accepts a set of obligatory actions and certain override conditions are met. Existing break-glass models are limited in how the override decision is specified. They either grant overrides for a predefined set of exceptional situations, or they grant unlimited overrides to selected subjects, and as such, they suffer from the difficulty of correctly encoding and predicting all override situations and permissions. To address this, we develop Rumpole, a novel break-glass language that explicitly represents and infers knowledge gaps and knowledge conflicts about the subject's attributes and the contextual conditions, such as emergencies. For example, a Rumpole policy can distinguish whether or not it is known that an emergency holds. This leads to a more informed decision for an override request, whereas current break-glass languages simply assume that there is no emergency if the evidence for it is missing. To formally define Rumpole, we construct a novel many-valued logic programming language called Beagle. It has a simple syntax similar to that of Datalog, and its semantics is an extension of Fitting's bilattice-based semantics for logic programs. Beagle is a knowledge non-monotonic langauge, and as such, is strictly more expressive than current many-valued logic programming languages.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"41 1","pages":"2:1-2:32"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84677050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies 表达和执行基于目的的隐私策略的框架
Q Engineering Pub Date : 2014-08-01 DOI: 10.1145/2629689
Mohammad Jafari, R. Safavi-Naini, Philip W. L. Fong, K. Barker
Purpose is a key concept in privacy policies. Although some models have been proposed for enforcing purpose-based privacy policies, little has been done in defining formal semantics for purpose, and therefore an effective enforcement mechanism for such policies has remained a challenge. We have developed a framework for expressing and enforcing such policies by giving a formal definition of purpose and proposing a modal-logic language for formally expressing purpose constraints. The semantics of this language are defined over an abstract model of workflows. Based on this formal framework, we discuss some properties of purpose, show how common forms of purpose constraints can be formalized, how purpose-based constraints can be connected to more general access control policies, and how they can be enforced in a workflow-based information system by extending common access control technologies.
目的是隐私政策中的一个关键概念。尽管已经提出了一些模型来执行基于目的的隐私策略,但在为目的定义形式化语义方面做得很少,因此为此类策略提供有效的执行机制仍然是一个挑战。我们已经开发了一个框架,通过给出目的的正式定义,并提出一种用于正式表达目的约束的模态逻辑语言,来表达和执行这样的策略。这种语言的语义是在工作流的抽象模型上定义的。在此形式化框架的基础上,我们讨论了目的的一些属性,展示了如何形式化通用形式的目的约束,如何将基于目的的约束连接到更通用的访问控制策略,以及如何通过扩展通用访问控制技术在基于工作流的信息系统中实施这些约束。
{"title":"A Framework for Expressing and Enforcing Purpose-Based Privacy Policies","authors":"Mohammad Jafari, R. Safavi-Naini, Philip W. L. Fong, K. Barker","doi":"10.1145/2629689","DOIUrl":"https://doi.org/10.1145/2629689","url":null,"abstract":"Purpose is a key concept in privacy policies. Although some models have been proposed for enforcing purpose-based privacy policies, little has been done in defining formal semantics for purpose, and therefore an effective enforcement mechanism for such policies has remained a challenge. We have developed a framework for expressing and enforcing such policies by giving a formal definition of purpose and proposing a modal-logic language for formally expressing purpose constraints. The semantics of this language are defined over an abstract model of workflows. Based on this formal framework, we discuss some properties of purpose, show how common forms of purpose constraints can be formalized, how purpose-based constraints can be connected to more general access control policies, and how they can be enforced in a workflow-based information system by extending common access control technologies.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"24 6 1","pages":"3:1-3:31"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77950809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
vVote: A Verifiable Voting System vVote:一个可验证的投票系统
Q Engineering Pub Date : 2014-04-27 DOI: 10.1145/2746338
C. Culnane, P. Ryan, Steve A. Schneider, Vanessa Teague
The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this article, we present our development of the Prêt à Voter design to a practical implementation used in a real state election in November 2014, called vVote. As well as solving practical engineering challenges, we have also had to tailor the system to the idiosyncrasies of elections in the Australian state of Victoria and the requirements of the Victorian Electoral Commission. This article includes general background, user experience, and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyze their security properties and explain how they tie in to other design decisions.
Prêt选民加密投票系统设计灵活,为选民提供熟悉和轻松的投票体验。在本文中,我们将介绍我们对Prêt Voter设计的开发,并将其用于2014年11月的实际州选举(称为vVote)中的实际实现。除了解决实际的工程挑战外,我们还必须根据澳大利亚维多利亚州选举的特点和维多利亚州选举委员会的要求定制系统。本文包括一般背景、用户体验以及加密协议和人工流程的详细信息。我们解释问题,提出解决方案,然后分析它们的安全属性,并解释它们如何与其他设计决策相关联。
{"title":"vVote: A Verifiable Voting System","authors":"C. Culnane, P. Ryan, Steve A. Schneider, Vanessa Teague","doi":"10.1145/2746338","DOIUrl":"https://doi.org/10.1145/2746338","url":null,"abstract":"The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this article, we present our development of the Prêt à Voter design to a practical implementation used in a real state election in November 2014, called vVote. As well as solving practical engineering challenges, we have also had to tailor the system to the idiosyncrasies of elections in the Australian state of Victoria and the requirements of the Victorian Electoral Commission. This article includes general background, user experience, and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyze their security properties and explain how they tie in to other design decisions.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"35 1","pages":"3:1-3:30"},"PeriodicalIF":0.0,"publicationDate":"2014-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73776237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
期刊
ACM Transactions on Information and System Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1