首页 > 最新文献

2016 IEEE 29th Computer Security Foundations Symposium (CSF)最新文献

英文 中文
A Verified Extensible Library of Elliptic Curves 一个验证的椭圆曲线可扩展库
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.28
J. Zinzindohoué, Evmorfia-Iro Bartzia, K. Bhargavan
In response to increasing demand for elliptic curve cryptography, and specifically for curves that are free from the suspicion of influence by the NSA, new elliptic curves such as Curve25519 and Curve448 are currently being standardized, implemented, and deployed in major protocols such as Transport Layer Security. As with all new cryptographic code, the correctness of these curve implementations is of concern, because any bug or backdoor in this code can potentially compromise the security of important Internet protocols. We present a principled approach towards the verification of elliptic curve implementations by writing them in the dependently-typed programming language F* and proving them functionally correct against a readable mathematical specification derived from a previous Coq development. A key technical innovation in our work is the use of templates to write and verify arbitrary precision arithmetic once and for all for a variety of Bignum representations used in different curves. We also show how to use abstract types to enforce a coding discipline that mitigates side-channels at the source level. We present a verified F* library that implements the popular curves Curve25519, Curve448, and NIST-P256, and we show how developers can add new curves to this library with minimal programming and verification effort.
为了应对日益增长的对椭圆曲线加密的需求,特别是对不受NSA影响的曲线的需求,Curve25519和Curve448等新的椭圆曲线目前正在标准化、实现和部署在诸如传输层安全等主要协议中。与所有新的加密代码一样,这些曲线实现的正确性值得关注,因为这些代码中的任何错误或后门都可能危及重要Internet协议的安全性。我们提出了一种原则性的方法来验证椭圆曲线的实现,通过在依赖类型的编程语言F*中编写它们,并根据先前Coq开发的可读数学规范证明它们在功能上是正确的。我们工作中的一个关键技术创新是使用模板来一劳永逸地编写和验证用于不同曲线的各种Bignum表示的任意精度算法。我们还将展示如何使用抽象类型来强制执行编码规则,从而减少源级的侧通道。我们提供了一个经过验证的F*库,它实现了流行的曲线Curve25519、Curve448和NIST-P256,并且我们展示了开发人员如何通过最少的编程和验证工作向该库添加新的曲线。
{"title":"A Verified Extensible Library of Elliptic Curves","authors":"J. Zinzindohoué, Evmorfia-Iro Bartzia, K. Bhargavan","doi":"10.1109/CSF.2016.28","DOIUrl":"https://doi.org/10.1109/CSF.2016.28","url":null,"abstract":"In response to increasing demand for elliptic curve cryptography, and specifically for curves that are free from the suspicion of influence by the NSA, new elliptic curves such as Curve25519 and Curve448 are currently being standardized, implemented, and deployed in major protocols such as Transport Layer Security. As with all new cryptographic code, the correctness of these curve implementations is of concern, because any bug or backdoor in this code can potentially compromise the security of important Internet protocols. We present a principled approach towards the verification of elliptic curve implementations by writing them in the dependently-typed programming language F* and proving them functionally correct against a readable mathematical specification derived from a previous Coq development. A key technical innovation in our work is the use of templates to write and verify arbitrary precision arithmetic once and for all for a variety of Bignum representations used in different curves. We also show how to use abstract types to enforce a coding discipline that mitigates side-channels at the source level. We present a verified F* library that implements the popular curves Curve25519, Curve448, and NIST-P256, and we show how developers can add new curves to this library with minimal programming and verification effort.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"6 1","pages":"296-309"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90819894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Certified Compiler for Verifiable Computing 可验证计算的认证编译器
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.26
C. Fournet, C. Keller, Vincent Laporte
In cryptology, verifiable computing aims at verifying the remote execution of a program on an untrusted machine, based on its I/O and constant-sized evidence collected during its execution. Recent cryptographic schemes and compilers enable practical verifiable computations for some programs written in C, but their soundness with regards to C semantics remains informal and poorly understood. We present the first certified, semantics-preserving compiler for verifiable computing. Based on CompCert and developed in Coq, our compiler targets an architecture whose instructions consist solely of quadratic equations over a large finite field, amenable to succinct verification using the Pinocchio cryptographic scheme. We explain how to encode the integer operations of a C program first to quadratic equations, then to a single cryptographically-checkable polynomial test. We formally prove that, when compilation succeeds, there is a correct execution of the source program for any I/O that pass this test. We link our compiler to the Pinocchio cryptographic runtime, and report experimental results as we compile, run, and verify the execution of sample C programs.
在密码学中,可验证计算旨在根据程序的I/O和执行过程中收集的恒定大小的证据,验证程序在不受信任的机器上的远程执行。最近的加密方案和编译器为一些用C编写的程序提供了实际的可验证计算,但是它们在C语义方面的合理性仍然是非正式的,而且很难理解。我们提出了第一个用于可验证计算的认证的、保留语义的编译器。基于CompCert并在Coq中开发,我们的编译器针对的是一种架构,其指令仅由大型有限域上的二次方程组成,可以使用Pinocchio加密方案进行简洁验证。我们首先解释如何将C程序的整数运算编码为二次方程,然后编码为单个密码可检查的多项式检验。我们正式证明,当编译成功时,对于通过此测试的任何I/O,源程序都有正确的执行。我们将编译器链接到匹诺曹加密运行时,并在编译、运行和验证示例C程序的执行时报告实验结果。
{"title":"A Certified Compiler for Verifiable Computing","authors":"C. Fournet, C. Keller, Vincent Laporte","doi":"10.1109/CSF.2016.26","DOIUrl":"https://doi.org/10.1109/CSF.2016.26","url":null,"abstract":"In cryptology, verifiable computing aims at verifying the remote execution of a program on an untrusted machine, based on its I/O and constant-sized evidence collected during its execution. Recent cryptographic schemes and compilers enable practical verifiable computations for some programs written in C, but their soundness with regards to C semantics remains informal and poorly understood. We present the first certified, semantics-preserving compiler for verifiable computing. Based on CompCert and developed in Coq, our compiler targets an architecture whose instructions consist solely of quadratic equations over a large finite field, amenable to succinct verification using the Pinocchio cryptographic scheme. We explain how to encode the integer operations of a C program first to quadratic equations, then to a single cryptographically-checkable polynomial test. We formally prove that, when compilation succeeds, there is a correct execution of the source program for any I/O that pass this test. We link our compiler to the Pinocchio cryptographic runtime, and report experimental results as we compile, run, and verify the execution of sample C programs.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"7 1","pages":"268-280"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77710008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Runtime Verification of k-Safety Hyperproperties in HyperLTL HyperLTL中k-Safety超属性的运行时验证
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.24
Shreya Agrawal, Borzoo Bonakdarpour
This paper introduces a novel runtime verification technique for a rich sub-class of Clarkson and Schneider's hyperproperties. The primary application of such properties is in expressing security policies (e.g., information flow) that cannot be expressed in trace-based specification languages (e.g., LTL). First, to incorporate syntactic means, we draw connections between safety and co-safety hyperproperties and the temporal logic HYPERLTL, which allows explicit quantification over multiple executions. We also define the notion of monitorability in HYPERLTL and identify classes of monitorable HYPERLTL formulas. Then, we introduce an algorithm for monitoring k-safety and co-k-safety hyperproperties expressed in HYPERLTL. Our technique is based on runtime formula progression as well as on-the-fly monitor synthesis across multiple executions. We analyze different performance aspects of our technique by conducting thorough experiments on monitoring security policies for information flow and observational determinism on a real-world location-based service dataset as well as synthetic trace sets.
本文介绍了一种新的Clarkson和Schneider超性质富子类的运行时验证技术。这些属性的主要应用是表示不能用基于跟踪的规范语言(例如LTL)表示的安全策略(例如信息流)。首先,为了结合语法方法,我们在安全和共安全超属性与时间逻辑HYPERLTL之间建立了联系,后者允许对多个执行进行显式量化。我们还定义了HYPERLTL中的可监视性概念,并确定了可监视的HYPERLTL公式的类。然后,我们介绍了一种监测HYPERLTL中表达的k-安全和co-k-安全超性质的算法。我们的技术基于运行时公式进度以及跨多个执行的实时监视器合成。我们通过在真实世界的基于位置的服务数据集以及合成跟踪集上对信息流和观察确定性的安全策略进行全面的监控实验,分析了我们技术的不同性能方面。
{"title":"Runtime Verification of k-Safety Hyperproperties in HyperLTL","authors":"Shreya Agrawal, Borzoo Bonakdarpour","doi":"10.1109/CSF.2016.24","DOIUrl":"https://doi.org/10.1109/CSF.2016.24","url":null,"abstract":"This paper introduces a novel runtime verification technique for a rich sub-class of Clarkson and Schneider's hyperproperties. The primary application of such properties is in expressing security policies (e.g., information flow) that cannot be expressed in trace-based specification languages (e.g., LTL). First, to incorporate syntactic means, we draw connections between safety and co-safety hyperproperties and the temporal logic HYPERLTL, which allows explicit quantification over multiple executions. We also define the notion of monitorability in HYPERLTL and identify classes of monitorable HYPERLTL formulas. Then, we introduce an algorithm for monitoring k-safety and co-k-safety hyperproperties expressed in HYPERLTL. Our technique is based on runtime formula progression as well as on-the-fly monitor synthesis across multiple executions. We analyze different performance aspects of our technique by conducting thorough experiments on monitoring security policies for information flow and observational determinism on a real-world location-based service dataset as well as synthetic trace sets.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"24 1","pages":"239-252"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87553188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete 具有前任优先权的弹性委托撤销是np完全的
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.37
M. Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, M. Denecker
In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is resilient to a later reissuing of the rights, and to resolve conflicts between principals by giving precedence to predecessors, i.e. principals that come earlier in the delegation chain. However, the effects of negative authorizations have been defined differently by different authors. Having identified three definitions of this effect from the literature, the first contribution of this paper is to point out that two of these three definitions pose a security threat. However, avoiding this security threat comes at a price: We prove that with the safe definition of the effect of negative authorizations, deciding whether a principal does have access to a resource is an NP-complete decision problem. We discuss two limitations that can be imposed on an access-control system in order to reduce the complexity of the problem back to a polynomial complexity: Limiting the length of delegation chains to an integer m reduces the runtime complexity of determining access to O(nm), and requiring that principals form a hierarchy that graph-theoretically forms a rooted tree makes this decision problem solvable in quadratic runtime. Finally we discuss an approach that can mitigate the complexity problem in practice without fully getting rid of NP-completeness.
在具有委派权限和管理权限的可能性的基于所有权的访问控制框架中,将形成委派访问链。在撤销权利时,有不同的方式来处理这些委托链,这就产生了不同的撤销方案。文献中研究的一种可能性是通过发布负面授权来撤销权利,这意味着确保撤销对稍后重新发布的权利具有弹性,并通过优先考虑前辈(即在授权链中较早出现的主体)来解决主体之间的冲突。然而,不同的作者对否定授权的影响有不同的定义。从文献中确定了这种效应的三个定义,本文的第一个贡献是指出这三个定义中的两个构成了安全威胁。然而,避免这种安全威胁是有代价的:我们证明,根据负面授权效果的安全定义,确定主体是否确实有权访问资源是一个np完全决策问题。我们讨论了两个可以强加在访问控制系统上的限制,以便将问题的复杂性降低到多项式复杂性:将授权链的长度限制为整数m降低了确定访问O(nm)的运行时复杂性,并且要求主体形成一个层次结构,从图论上形成一个有根树,使得这个决策问题在二次运行时可解决。最后,我们讨论了一种在不完全摆脱np完备性的情况下,在实践中减轻复杂性问题的方法。
{"title":"Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete","authors":"M. Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, M. Denecker","doi":"10.1109/CSF.2016.37","DOIUrl":"https://doi.org/10.1109/CSF.2016.37","url":null,"abstract":"In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is resilient to a later reissuing of the rights, and to resolve conflicts between principals by giving precedence to predecessors, i.e. principals that come earlier in the delegation chain. However, the effects of negative authorizations have been defined differently by different authors. Having identified three definitions of this effect from the literature, the first contribution of this paper is to point out that two of these three definitions pose a security threat. However, avoiding this security threat comes at a price: We prove that with the safe definition of the effect of negative authorizations, deciding whether a principal does have access to a resource is an NP-complete decision problem. We discuss two limitations that can be imposed on an access-control system in order to reduce the complexity of the problem back to a polynomial complexity: Limiting the length of delegation chains to an integer m reduces the runtime complexity of determining access to O(nm), and requiring that principals form a hierarchy that graph-theoretically forms a rooted tree makes this decision problem solvable in quadratic runtime. Finally we discuss an approach that can mitigate the complexity problem in practice without fully getting rid of NP-completeness.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"34 1","pages":"432-442"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87956006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
In the Nick of Time: Proactive Prevention of Obligation Violations 关键时刻:主动预防违反义务
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.16
D. Basin, S. Debois, Thomas T. Hildebrandt
We present a system model, an enforcement mechanism, and a policy language for the proactive enforcement of timed provisions and obligations. Our approach improves upon existing formalisms in two ways: (1) we exploit the target system's existing functionality to avert policy violations proactively, rather than compensate for them reactively, and, (2) instead of requiring the manual specification of remedial actions in the policy, we automatically deduce required actions directly from the policy. As a policy language, we employ timed dynamic condition response (DCR) processes. DCR primitives declaratively express timed provisions and obligations as causal relationships between events, and DCR states explicitly represent pending obligations. As key technical results, we show that enforceability of DCR policies is decidable, we give a sufficient polynomial time verifiable condition for a policy to be enforceable, and we give an algorithm for determining from a DCR state a sequence of actions that discharge impending obligations.
我们提出了一个系统模型、执行机制和政策语言,用于主动执行定时条款和义务。我们的方法以两种方式改进了现有的形式化:(1)我们利用目标系统的现有功能来主动避免策略违反,而不是被动地对它们进行补偿;(2)我们不需要在策略中手动说明补救行动,而是直接从策略中自动推断出所需的行动。作为策略语言,我们采用定时动态条件响应(DCR)过程。DCR原语将时间规定和义务声明为事件之间的因果关系,而DCR状态明确表示待处理的义务。作为关键的技术成果,我们证明了DCR策略的可执行性是可决定的,我们给出了一个足够的多项式时间可验证条件,使策略具有可执行性,并且我们给出了一种算法,用于从DCR状态确定履行即将发生的义务的一系列动作。
{"title":"In the Nick of Time: Proactive Prevention of Obligation Violations","authors":"D. Basin, S. Debois, Thomas T. Hildebrandt","doi":"10.1109/CSF.2016.16","DOIUrl":"https://doi.org/10.1109/CSF.2016.16","url":null,"abstract":"We present a system model, an enforcement mechanism, and a policy language for the proactive enforcement of timed provisions and obligations. Our approach improves upon existing formalisms in two ways: (1) we exploit the target system's existing functionality to avert policy violations proactively, rather than compensate for them reactively, and, (2) instead of requiring the manual specification of remedial actions in the policy, we automatically deduce required actions directly from the policy. As a policy language, we employ timed dynamic condition response (DCR) processes. DCR primitives declaratively express timed provisions and obligations as causal relationships between events, and DCR states explicitly represent pending obligations. As key technical results, we show that enforceability of DCR policies is decidable, we give a sufficient polynomial time verifiable condition for a policy to be enforceable, and we give an algorithm for determining from a DCR state a sequence of actions that discharge impending obligations.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"57 1","pages":"120-134"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80227128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Methodology for Formalizing Model-Inversion Attacks 一种形式化模型反转攻击的方法
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.32
Xi Wu, Matt Fredrikson, S. Jha, J. Naughton
Confidentiality of training data induced by releasing machine-learning models, and has recently received increasing attention. Motivated by existing MI attacks and other previous attacks that turn out to be MI "in disguise," this paper initiates a formal study of MI attacks by presenting a game-based methodology. Our methodology uncovers a number of subtle issues, and devising a rigorous game-based definition, analogous to those in cryptography, is an interesting avenue for future work. We describe methodologies for two types of attacks. The first is for black-box attacks, which consider an adversary who infers sensitive values with only oracle access to a model. The second methodology targets the white-box scenario where an adversary has some additional knowledge about the structure of a model. For the restricted class of Boolean models and black-box attacks, we characterize model invertibility using the concept of influence from Boolean analysis in the noiseless case, and connect model invertibility with stable influence in the noisy case. Interestingly, we also discovered an intriguing phenomenon, which we call "invertibility interference," where a highly invertible model quickly becomes highly non-invertible by adding little noise. For the white-box case, we consider a common phenomenon in machine-learning models where the model is a sequential composition of several sub-models. We show, quantitatively, that even very restricted communication between layers could leak a significant amount of information. Perhaps more importantly, our study also unveils unexpected computational power of these restricted communication channels, which, to the best of our knowledge, were not previously known.
由发布机器学习模型引起的训练数据的保密性,最近受到越来越多的关注。受现有的MI攻击和其他先前被证明是MI“伪装”的攻击的启发,本文通过提出基于游戏的方法,启动了对MI攻击的正式研究。我们的方法揭示了许多微妙的问题,设计一个严格的基于游戏的定义,类似于密码学中的定义,是未来工作的一个有趣的途径。我们描述了两种攻击的方法。第一种是针对黑盒攻击,它考虑的是对手仅通过对模型的oracle访问来推断敏感值。第二种方法针对的是白盒场景,攻击者对模型的结构有一些额外的知识。对于布尔模型和黑盒攻击的限制类,我们在无噪声情况下使用布尔分析的影响概念来表征模型的可逆性,在有噪声情况下将模型的可逆性与稳定影响联系起来。有趣的是,我们还发现了一个有趣的现象,我们称之为“可逆性干扰”,即通过添加少量噪声,高度可逆的模型很快变得高度不可逆。对于白盒案例,我们考虑机器学习模型中的一个常见现象,其中模型是几个子模型的顺序组合。我们从数量上表明,即使是层之间非常有限的通信也可能泄露大量信息。也许更重要的是,我们的研究还揭示了这些受限制的通信渠道的意想不到的计算能力,据我们所知,这是以前不知道的。
{"title":"A Methodology for Formalizing Model-Inversion Attacks","authors":"Xi Wu, Matt Fredrikson, S. Jha, J. Naughton","doi":"10.1109/CSF.2016.32","DOIUrl":"https://doi.org/10.1109/CSF.2016.32","url":null,"abstract":"Confidentiality of training data induced by releasing machine-learning models, and has recently received increasing attention. Motivated by existing MI attacks and other previous attacks that turn out to be MI \"in disguise,\" this paper initiates a formal study of MI attacks by presenting a game-based methodology. Our methodology uncovers a number of subtle issues, and devising a rigorous game-based definition, analogous to those in cryptography, is an interesting avenue for future work. We describe methodologies for two types of attacks. The first is for black-box attacks, which consider an adversary who infers sensitive values with only oracle access to a model. The second methodology targets the white-box scenario where an adversary has some additional knowledge about the structure of a model. For the restricted class of Boolean models and black-box attacks, we characterize model invertibility using the concept of influence from Boolean analysis in the noiseless case, and connect model invertibility with stable influence in the noisy case. Interestingly, we also discovered an intriguing phenomenon, which we call \"invertibility interference,\" where a highly invertible model quickly becomes highly non-invertible by adding little noise. For the white-box case, we consider a common phenomenon in machine-learning models where the model is a sequential composition of several sub-models. We show, quantitatively, that even very restricted communication between layers could leak a significant amount of information. Perhaps more importantly, our study also unveils unexpected computational power of these restricted communication channels, which, to the best of our knowledge, were not previously known.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"30 6","pages":"355-370"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91455157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
Correlated Secrets in Quantitative Information Flow 定量信息流中的相关秘密
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.14
N. E. Bordenabe, Geoffrey Smith
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental equivalence between Dalenius min-entropy leakage under arbitrary correlations and g-leakage under arbitrary gain functions, and show how this equivalence increases the significance of the composition refinement relation. We also consider Dalenius leakage in the case when the marginal distributions induced by the correlation are known, giving techniques to compute stronger upper bounds in this case.
控制计算机系统敏感信息泄露的一个基本挑战是不同秘密之间可能存在相关性,其结果是泄露一个秘密的信息也可能泄露另一个秘密的信息。我们在g泄漏测量家族的背景下探讨这种泄漏,这里称为Dalenius泄漏。我们证明了任意相关下的Dalenius最小熵泄漏与任意增益函数下的g泄漏之间的基本等价,并说明了这种等价如何增加了组成细化关系的重要性。当相关性引起的边际分布已知时,我们还考虑了Dalenius泄漏,给出了在这种情况下计算更强上界的技术。
{"title":"Correlated Secrets in Quantitative Information Flow","authors":"N. E. Bordenabe, Geoffrey Smith","doi":"10.1109/CSF.2016.14","DOIUrl":"https://doi.org/10.1109/CSF.2016.14","url":null,"abstract":"A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental equivalence between Dalenius min-entropy leakage under arbitrary correlations and g-leakage under arbitrary gain functions, and show how this equivalence increases the significance of the composition refinement relation. We also consider Dalenius leakage in the case when the marginal distributions induced by the correlation are known, giving techniques to compute stronger upper bounds in this case.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"1 1","pages":"93-104"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91322352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Calculational Design of Information Flow Monitors 信息流监视器的计算设计
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.22
Mounir Assaf, D. Naumann
Fine grained information flow monitoring can in principle address a wide range of security and privacy goals, for example in web applications. But it is very difficult to achieve sound monitoring with acceptable runtime cost and sufficient precision to avoid impractical restrictions on programs and policies. We present a systematic technique for design of monitors that are correct by construction. It encompasses policies with downgrading. The technique is based on abstract interpretation which is a standard basis for static analysis of programs. This should enable integration of a wide range of analysis techniques, enabling more sophisticated engineering of monitors to address the challenges of precision and scaling to widely used programming languages.
细粒度的信息流监控原则上可以解决广泛的安全和隐私目标,例如在web应用程序中。但是,要实现具有可接受的运行成本和足够的精度以避免对程序和策略的不切实际的限制的健全监控是非常困难的。本文提出了一种系统的监测系统设计技术,以保证监测系统的施工精度。它包含有降级的政策。该技术基于抽象解释,抽象解释是程序静态分析的标准基础。这应该能够集成广泛的分析技术,使更复杂的监视器工程能够解决精度和扩展到广泛使用的编程语言的挑战。
{"title":"Calculational Design of Information Flow Monitors","authors":"Mounir Assaf, D. Naumann","doi":"10.1109/CSF.2016.22","DOIUrl":"https://doi.org/10.1109/CSF.2016.22","url":null,"abstract":"Fine grained information flow monitoring can in principle address a wide range of security and privacy goals, for example in web applications. But it is very difficult to achieve sound monitoring with acceptable runtime cost and sufficient precision to avoid impractical restrictions on programs and policies. We present a systematic technique for design of monitors that are correct by construction. It encompasses policies with downgrading. The technique is based on abstract interpretation which is a standard basis for static analysis of programs. This should enable integration of a wide range of analysis techniques, enabling more sophisticated engineering of monitors to address the challenges of precision and scaling to widely used programming languages.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"53 1","pages":"210-224"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88537304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers 带屏障的应用π微积分中等价的自动推理
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.29
B. Blanchet, B. Smyth
Observational equivalence allows us to study important security properties such as anonymity. Unfortunately, the difficulty of proving observational equivalence hinders analysis. Blanchet, Abadi & Fournet simplify its proof by introducing a sufficient condition for observational equivalence, called diff-equivalence, which is a reachability condition that can be proved automatically by ProVerif. However, diff-equivalence is a very strong condition, which often does not hold even if observational equivalence does. In particular, when proving equivalence between processes that contain several parallel components, e.g., P | Q and P' | Q', diff-equivalence requires that P is equivalent to P' and Q is equivalent to Q'. To relax this constraint, Delaune, Ryan & Smyth introduced the idea of swapping data between parallel processes P' and Q' at synchronisation points, without proving its soundness. We extend their work by formalising the semantics of synchronisation, formalising the definition of swapping, and proving its soundness. We also relax some restrictions they had on the processes to which swapping can be applied. Moreover, we have implemented our results in ProVerif. Hence, we extend the class of equivalences that can be proved automatically. We showcase our results by analysing privacy in election schemes by Fujioka, Okamoto & Ohta and Lee et al., and in the vehicular ad-hoc network by Freudiger et al.
观察等效性允许我们研究重要的安全特性,如匿名性。不幸的是,证明观测等效性的困难阻碍了分析。Blanchet, Abadi & Fournet通过引入观测等价的一个充分条件(称为diffi -equivalence)来简化其证明,diffi -equivalence是一个可以被ProVerif自动证明的可达性条件。然而,差分等效是一个非常强的条件,即使观测等效成立,它也常常不成立。特别是,当证明包含多个平行分量的过程之间的等价性时,例如,P | Q和P' | Q', diffi -等价要求P等于P', Q等于Q'。为了放松这一限制,Delaune, Ryan & Smyth引入了在同步点的并行进程P'和Q'之间交换数据的想法,但没有证明其合理性。我们通过形式化同步的语义,形式化交换的定义,并证明其合理性来扩展他们的工作。我们还放宽了它们对可以应用交换的进程的一些限制。此外,我们已经在ProVerif中实现了我们的结果。因此,我们扩展了可自动证明的等价类。我们通过分析Fujioka, Okamoto & Ohta和Lee等人的选举方案中的隐私以及Freudiger等人的车载自组织网络中的隐私来展示我们的结果。
{"title":"Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers","authors":"B. Blanchet, B. Smyth","doi":"10.1109/CSF.2016.29","DOIUrl":"https://doi.org/10.1109/CSF.2016.29","url":null,"abstract":"Observational equivalence allows us to study important security properties such as anonymity. Unfortunately, the difficulty of proving observational equivalence hinders analysis. Blanchet, Abadi & Fournet simplify its proof by introducing a sufficient condition for observational equivalence, called diff-equivalence, which is a reachability condition that can be proved automatically by ProVerif. However, diff-equivalence is a very strong condition, which often does not hold even if observational equivalence does. In particular, when proving equivalence between processes that contain several parallel components, e.g., P | Q and P' | Q', diff-equivalence requires that P is equivalent to P' and Q is equivalent to Q'. To relax this constraint, Delaune, Ryan & Smyth introduced the idea of swapping data between parallel processes P' and Q' at synchronisation points, without proving its soundness. We extend their work by formalising the semantics of synchronisation, formalising the definition of swapping, and proving its soundness. We also relax some restrictions they had on the processes to which swapping can be applied. Moreover, we have implemented our results in ProVerif. Hence, we extend the class of equivalences that can be proved automatically. We showcase our results by analysing privacy in election schemes by Fujioka, Okamoto & Ohta and Lee et al., and in the vehicular ad-hoc network by Freudiger et al.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"277 1","pages":"310-324"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73285224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems 基于arbac的工作流系统中串通攻击的静态检测
Pub Date : 2016-06-01 DOI: 10.1109/CSF.2016.39
Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, M. Bugliesi
Authorization in workflow systems is usually built on top of role-based access control (RBAC), security policies on workflows are then expressed as constraints on the users performing a set of tasks and the roles assigned to them. Unfortunately, when role administration is distributed and potentially untrusted users contribute to the role assignment process, like in the case of Administrative RBAC (ARBAC), collusions may take place to circumvent the intended workflow security policies. In a collusion attack, a set of users of a workflow system collaborates by changing the user-to-role assignment, so as to sidestep the security policies and run up to completion a workflow they could not complete otherwise. In this paper, we study the problem of collusion attacks in a formal model of workflows based on stable event structures and we define a precise notion of security against collusion. We then propose a static analysis technique based on a reduction to a role reachability problem for ARBAC, which can be used to prove or disprove security for a large class of workflow systems. We also discuss how to aggressively optimise the obtained role reachability problem to ensure its tractability. Finally, we implement our analysis in a tool, WARBAC, and we experimentally show its effectiveness on a set of publicly available examples, including a realistic case study.
工作流系统中的授权通常建立在基于角色的访问控制(RBAC)之上,然后工作流上的安全策略被表示为对执行一组任务的用户和分配给他们的角色的约束。不幸的是,当角色管理是分布式的,并且潜在的不受信任的用户参与角色分配过程时(例如在Administrative RBAC (ARBAC)的情况下),可能会发生共谋,以绕过预期的工作流安全策略。在串通攻击中,工作流系统的一组用户通过改变用户到角色的分配进行协作,从而绕过安全策略,完成他们原本无法完成的工作流。本文研究了基于稳定事件结构的形式化工作流模型中的合谋攻击问题,并定义了一个精确的合谋安全概念。然后,我们提出了一种静态分析技术,该技术基于对ARBAC角色可达性问题的简化,可用于证明或反驳大型工作流系统的安全性。我们还讨论了如何积极优化得到的角色可达性问题,以确保其可追溯性。最后,我们在WARBAC工具中实现了我们的分析,并在一组公开可用的示例(包括一个实际的案例研究)上实验地展示了它的有效性。
{"title":"Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems","authors":"Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, M. Bugliesi","doi":"10.1109/CSF.2016.39","DOIUrl":"https://doi.org/10.1109/CSF.2016.39","url":null,"abstract":"Authorization in workflow systems is usually built on top of role-based access control (RBAC), security policies on workflows are then expressed as constraints on the users performing a set of tasks and the roles assigned to them. Unfortunately, when role administration is distributed and potentially untrusted users contribute to the role assignment process, like in the case of Administrative RBAC (ARBAC), collusions may take place to circumvent the intended workflow security policies. In a collusion attack, a set of users of a workflow system collaborates by changing the user-to-role assignment, so as to sidestep the security policies and run up to completion a workflow they could not complete otherwise. In this paper, we study the problem of collusion attacks in a formal model of workflows based on stable event structures and we define a precise notion of security against collusion. We then propose a static analysis technique based on a reduction to a role reachability problem for ARBAC, which can be used to prove or disprove security for a large class of workflow systems. We also discuss how to aggressively optimise the obtained role reachability problem to ensure its tractability. Finally, we implement our analysis in a tool, WARBAC, and we experimentally show its effectiveness on a set of publicly available examples, including a realistic case study.","PeriodicalId":6500,"journal":{"name":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","volume":"1 1","pages":"458-470"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87036644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1