首页 > 最新文献

Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...最新文献

英文 中文
Stronger security model of group key agreement 更强的组密钥协议安全模型
Jian-jie Zhao, Dawu Gu, M. Choudary Gorantla
In PKC 2009, Gorantla, Boyd and González Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model (GBG model) that better supports the adversaries' queries than previous models for GKA protocols by considering KCI resilience. However, ephemeral key leakage attack resistance has been left outside the scope of the GBG model. In this paper, we demonstrate an ephemeral key leakage on an existing GKA protocol which has been shown secure in the GBG model. We then extend the GBG model by allowing the adversary greater attack powers of leaking ephemeral keys in GKA protocol session. We also apply the well known NAX-OS trick to propose an improvement to an existing GKA protocol, which can resist the ephemeral key leakage attack. The security of the improved protocol has been argued under the our new model.
在PKC 2009中,Gorantla、Boyd和González Nieto在组密钥协议(GKA)协议的安全性建模方面给出了一个很好的结果。他们提出了一种新的安全模型(GBG模型),该模型通过考虑KCI弹性,比以前的GKA协议模型更好地支持对手的查询。然而,短时密钥泄露攻击抵抗被排除在GBG模型的范围之外。在本文中,我们演示了现有GKA协议上的临时密钥泄漏,该协议在GBG模型中已被证明是安全的。然后,我们扩展了GBG模型,允许攻击者在GKA协议会话中泄露临时密钥的攻击能力更大。我们还应用了著名的NAX-OS技巧,对现有的GKA协议提出了一种改进,可以抵抗短暂密钥泄露攻击。在我们的新模型下,对改进后协议的安全性进行了论证。
{"title":"Stronger security model of group key agreement","authors":"Jian-jie Zhao, Dawu Gu, M. Choudary Gorantla","doi":"10.1145/1966913.1966975","DOIUrl":"https://doi.org/10.1145/1966913.1966975","url":null,"abstract":"In PKC 2009, Gorantla, Boyd and González Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model (GBG model) that better supports the adversaries' queries than previous models for GKA protocols by considering KCI resilience. However, ephemeral key leakage attack resistance has been left outside the scope of the GBG model. In this paper, we demonstrate an ephemeral key leakage on an existing GKA protocol which has been shown secure in the GBG model. We then extend the GBG model by allowing the adversary greater attack powers of leaking ephemeral keys in GKA protocol session. We also apply the well known NAX-OS trick to propose an improvement to an existing GKA protocol, which can resist the ephemeral key leakage attack. The security of the improved protocol has been argued under the our new model.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85056277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On the invisibility of designated confirmer signatures 指定确认签名的不可见性
Fubiao Xia, Guilin Wang, Rui Xue
As an important cryptographic primitive, designated confirmer signatures are introduced to control the public verifiability of signatures. That is, only the signer or a semi-trusted party, called designated confirmer, can interactively assist a verifier to check the validity of a designated confirmer signature. The central security property of a designated confirmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the validity of an alleged signature without direct cooperation from either the signer or the designated confirmer. However, in the literature researchers have proposed two other related properties, called impersonation and transcript simulatability, though the relations between them are not clear. In this paper, we first explore the relations among these three invisibility related concepts and conclude that invisibility, impersonation and transcript simulatability forms an increasing stronger order. After that, we turn to study the invisibility of two designated confirmer signature schemes recently presented by Zhang et al. and Wei et al. By demonstrating concrete and effective attacks, we show that both of those two scheme fail to meet invisibility, the central security property of designated confirmer signatures.
指定确认签名作为一种重要的密码原语,用于控制签名的公开可验证性。也就是说,只有签名者或半信任方(称为指定确认者)才能交互式地协助验证者检查指定确认者签名的有效性。指定确认者签名方案的核心安全属性被称为不可见性,这要求即使是自适应攻击者也不能在没有签名者或指定确认者的直接合作的情况下确定所谓签名的有效性。然而,在文献中,研究人员提出了另外两个相关的属性,称为模拟和转录模拟,尽管它们之间的关系并不清楚。本文首先探讨了这三个不可见性相关概念之间的关系,并得出不可见性、模拟性和转录可模拟性形成了一个越来越强的顺序。之后,我们转而研究最近由Zhang等人和Wei等人提出的两个指定确认人签名方案的不可见性。通过演示具体有效的攻击,我们证明这两种方案都不能满足指定确认签名的核心安全属性——不可见性。
{"title":"On the invisibility of designated confirmer signatures","authors":"Fubiao Xia, Guilin Wang, Rui Xue","doi":"10.1145/1966913.1966948","DOIUrl":"https://doi.org/10.1145/1966913.1966948","url":null,"abstract":"As an important cryptographic primitive, designated confirmer signatures are introduced to control the public verifiability of signatures. That is, only the signer or a semi-trusted party, called designated confirmer, can interactively assist a verifier to check the validity of a designated confirmer signature. The central security property of a designated confirmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the validity of an alleged signature without direct cooperation from either the signer or the designated confirmer. However, in the literature researchers have proposed two other related properties, called impersonation and transcript simulatability, though the relations between them are not clear. In this paper, we first explore the relations among these three invisibility related concepts and conclude that invisibility, impersonation and transcript simulatability forms an increasing stronger order. After that, we turn to study the invisibility of two designated confirmer signature schemes recently presented by Zhang et al. and Wei et al. By demonstrating concrete and effective attacks, we show that both of those two scheme fail to meet invisibility, the central security property of designated confirmer signatures.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81585372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
WebPatrol: automated collection and replay of web-based malware scenarios WebPatrol:自动收集和重播基于web的恶意软件场景
K. Chen, G. Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han
Traditional remote-server-exploiting malware is quickly evolving and adapting to the new web-centric computing paradigm. By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers (and their extensions), web-based malware becomes one of the most severe and common infection vectors nowadays. While traditional malware collection and analysis are mainly focusing on binaries, it is important to develop new techniques and tools for collecting and analyzing web-based malware, which should include a complete web-based malicious logic to reflect the dynamic, distributed, multi-step, and multi-path web infection trails, instead of just the binaries executed at end hosts. This paper is a first attempt in this direction to automatically collect web-based malware scenarios (including complete web infection trails) to enable fine-grained analysis. Based on the collections, we provide the capability for offline "live" replay, i.e., an end user (e.g., an analyst) can faithfully experience the original infection trail based on her current client environment, even when the original malicious web pages are not available or already cleaned. Our evaluation shows that WebPatrol can collect/cover much more complete infection trails than state-of-the-art honeypot systems such as PHoneyC [11] and Capture-HPC [1]. We also provide several case studies on the analysis of web-based malware scenarios we have collected from a large national education and research network, which contains around 35,000 web sites.
传统的利用远程服务器的恶意软件正在迅速发展并适应新的以网络为中心的计算范式。通过利用大量(不安全的)网站和利用客户端(复杂的)浏览器(及其扩展)的漏洞,基于web的恶意软件成为当今最严重和最常见的感染媒介之一。虽然传统的恶意软件收集和分析主要集中在二进制文件上,但重要的是开发新的技术和工具来收集和分析基于web的恶意软件,它应该包括一个完整的基于web的恶意逻辑,以反映动态的、分布式的、多步骤的、多路径的web感染轨迹,而不仅仅是在终端主机上执行的二进制文件。这篇论文是在这个方向上的第一次尝试,自动收集基于web的恶意软件场景(包括完整的web感染轨迹),以实现细粒度分析。基于这些收集,我们提供了离线“实时”重播的功能,即终端用户(例如,分析师)可以根据其当前的客户端环境忠实地体验原始感染轨迹,即使原始恶意网页不可用或已经被清除。我们的评估表明,与最先进的蜜罐系统(如PHoneyC[11]和Capture-HPC[1])相比,WebPatrol可以收集/覆盖更完整的感染路径。我们还提供了几个案例研究,分析了我们从一个大型国家教育和研究网络中收集的基于网络的恶意软件场景,该网络包含大约35,000个网站。
{"title":"WebPatrol: automated collection and replay of web-based malware scenarios","authors":"K. Chen, G. Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han","doi":"10.1145/1966913.1966938","DOIUrl":"https://doi.org/10.1145/1966913.1966938","url":null,"abstract":"Traditional remote-server-exploiting malware is quickly evolving and adapting to the new web-centric computing paradigm. By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers (and their extensions), web-based malware becomes one of the most severe and common infection vectors nowadays. While traditional malware collection and analysis are mainly focusing on binaries, it is important to develop new techniques and tools for collecting and analyzing web-based malware, which should include a complete web-based malicious logic to reflect the dynamic, distributed, multi-step, and multi-path web infection trails, instead of just the binaries executed at end hosts. This paper is a first attempt in this direction to automatically collect web-based malware scenarios (including complete web infection trails) to enable fine-grained analysis. Based on the collections, we provide the capability for offline \"live\" replay, i.e., an end user (e.g., an analyst) can faithfully experience the original infection trail based on her current client environment, even when the original malicious web pages are not available or already cleaned. Our evaluation shows that WebPatrol can collect/cover much more complete infection trails than state-of-the-art honeypot systems such as PHoneyC [11] and Capture-HPC [1]. We also provide several case studies on the analysis of web-based malware scenarios we have collected from a large national education and research network, which contains around 35,000 web sites.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87712733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Optimal message transmission protocols with flexible parameters 具有灵活参数的最优消息传输协议
R. Safavi-Naini, M. Tuhin, Hongsong Shi
In Secure message transmission (SMT) protocols two nodes in a network want to communicate securely, given that some of the nodes in the network are corrupted by an adversary with unlimited computational power. An SMT protocol uses multiple paths between the sender and a receiver to guarantee privacy and reliability of the message transmission. An (ε, Δ)-SMT protocol bounds the adversary's success probability of breaking privacy and reliability to ε and Δ, respectively. Rate optimal SMT protocols have the smallest transmission rate (amount of communication per one bit of message). Rate optimal protocols have been constructed for a restricted set of parameters. In this paper we use wire virtualization method to construct new optimal protocols for a wide range of parameters using previously known optimal protocols. In particular, we design, for the first time, an optimal 1-round (0, Δ)-SMT protocol for n = (2 + c)t, c ≥ 1/t, where n is the number of paths between the sender and the receiver, up to t of which are controlled by the adversary. We also design an optimal 2-round (0, 0)-SMT protocol for n = (2 + c)t, c ≥ 1/t, with communication cost better than the known protocols. The wire virtualization method can be used to construct other protocols with provable properties from component protocols.
在安全消息传输(SMT)协议中,如果网络中的一些节点被具有无限计算能力的对手破坏,则网络中的两个节点希望安全地通信。SMT协议在发送方和接收方之间使用多条路径来保证消息传输的私密性和可靠性。(ε, Δ)-SMT协议将攻击者破坏隐私和可靠性的成功概率分别限制为ε和Δ。速率最优的SMT协议具有最小的传输速率(每一位消息的通信量)。针对一组有限的参数,构造了速率最优协议。在本文中,我们采用有线虚拟化的方法,在已有的最优协议基础上,构建了适用于各种参数的新的最优协议。特别是,我们首次设计了n = (2 + c)t, c≥1/t的最优1轮(0,Δ)-SMT协议,其中n是发送方和接收方之间的路径数,其中最多t条路径由对手控制。我们还设计了n = (2 + c)t, c≥1/t时最优的2轮(0,0)-SMT协议,其通信成本优于已知协议。有线虚拟化方法可用于从组件协议中构造具有可证明属性的其他协议。
{"title":"Optimal message transmission protocols with flexible parameters","authors":"R. Safavi-Naini, M. Tuhin, Hongsong Shi","doi":"10.1145/1966913.1966978","DOIUrl":"https://doi.org/10.1145/1966913.1966978","url":null,"abstract":"In Secure message transmission (<b>SMT</b>) protocols two nodes in a network want to communicate securely, given that some of the nodes in the network are corrupted by an adversary with <i>unlimited computational power</i>. An SMT protocol uses multiple paths between the sender and a receiver to guarantee <i>privacy</i> and <i>reliability</i> of the message transmission. An (ε, Δ)-SMT protocol bounds the adversary's success probability of breaking privacy and reliability to ε and Δ, respectively. Rate optimal SMT protocols have the smallest transmission rate (amount of communication per one bit of message). Rate optimal protocols have been constructed for a restricted set of parameters.\u0000 In this paper we use wire virtualization method to construct new optimal protocols for a wide range of parameters using previously known optimal protocols. In particular, we design, for the first time, an optimal 1-round (0, Δ)-SMT protocol for <i>n</i> = (2 + <i>c</i>)<i>t</i>, <i>c</i> ≥ 1/<i>t</i>, where <i>n</i> is the number of paths between the sender and the receiver, up to <i>t</i> of which are controlled by the adversary. We also design an optimal 2-round (0, 0)-SMT protocol for <i>n</i> = (2 + <i>c</i>)<i>t</i>, <i>c</i> ≥ 1/<i>t</i>, with communication cost better than the known protocols. The wire virtualization method can be used to construct other protocols with provable properties from component protocols.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87713242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An ontology- and Bayesian-based approach for determining threat probabilities 一种基于本体和贝叶斯的威胁概率确定方法
Stefan Fenz
Information security risk management is crucial for ensuring long-term business success and thus numerous approaches to implementing an adequate information security risk management strategy have been proposed. The subjective threat probability determination is one of the main reasons for an inadequate information security strategy endangering the organization in performing its mission. To address the problem we developed an ontology- and Bayesian-based approach to determine threat probabilities taking general information security knowledge and organization-specific knowledge about existing control implementations and attacker profiles into account. The elaborated concepts enable risk managers to comprehensibly quantify by the Bayesian threat probability determination the current security status of their organization.
信息安全风险管理对于确保长期业务成功至关重要,因此已经提出了许多实现适当信息安全风险管理策略的方法。主观的威胁概率确定是信息安全策略不完善危及组织执行其任务的主要原因之一。为了解决这个问题,我们开发了一种基于本体和贝叶斯的方法来确定威胁概率,该方法考虑了关于现有控制实现和攻击者配置文件的一般信息安全知识和组织特定知识。详细阐述的概念使风险管理者能够通过贝叶斯威胁概率确定其组织的当前安全状态,从而全面量化。
{"title":"An ontology- and Bayesian-based approach for determining threat probabilities","authors":"Stefan Fenz","doi":"10.1145/1966913.1966958","DOIUrl":"https://doi.org/10.1145/1966913.1966958","url":null,"abstract":"Information security risk management is crucial for ensuring long-term business success and thus numerous approaches to implementing an adequate information security risk management strategy have been proposed. The subjective threat probability determination is one of the main reasons for an inadequate information security strategy endangering the organization in performing its mission. To address the problem we developed an ontology- and Bayesian-based approach to determine threat probabilities taking general information security knowledge and organization-specific knowledge about existing control implementations and attacker profiles into account. The elaborated concepts enable risk managers to comprehensibly quantify by the Bayesian threat probability determination the current security status of their organization.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87707448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A new and extended fault analysis on RSA 一种新的扩展的RSA故障分析方法
Caisen Chen, Tao Wang
As the preceding fault analysis on RSA Square-and-Multiple implementation which is based on modifying the public modulus N, is difficult to be executed in practice. This paper proposes a new method to execute fault analysis by regulating the voltage supply of the system to inject transient faults into multiplication operation instead of modifying the modulus N. In order to improve the feasibility of attack, we suggest an extension of fault analysis with recovering the key segment by segment instead of bit by bit. In the end, the complexity of the algorithm is analyzed. The expansibility and feasibility of algorithm are proved by demonstrating in theory and simulation experiments. The results of experiment show that the new fault analysis algorithm is more effective in practice.
由于前面对RSA平方乘数实现基于修改公共模N的故障分析,在实践中很难执行。本文提出了一种新的故障分析方法,即通过调整系统的电压供应,将暂态故障注入到乘法运算中,而不是修改模n来进行故障分析。为了提高攻击的可行性,我们提出了一种故障分析的扩展方法,即通过逐段恢复关键,而不是逐位恢复关键。最后,对算法的复杂度进行了分析。通过理论和仿真实验验证了算法的可扩展性和可行性。实验结果表明,新的故障分析算法在实际应用中更加有效。
{"title":"A new and extended fault analysis on RSA","authors":"Caisen Chen, Tao Wang","doi":"10.1145/1966913.1966980","DOIUrl":"https://doi.org/10.1145/1966913.1966980","url":null,"abstract":"As the preceding fault analysis on RSA Square-and-Multiple implementation which is based on modifying the public modulus N, is difficult to be executed in practice. This paper proposes a new method to execute fault analysis by regulating the voltage supply of the system to inject transient faults into multiplication operation instead of modifying the modulus N. In order to improve the feasibility of attack, we suggest an extension of fault analysis with recovering the key segment by segment instead of bit by bit. In the end, the complexity of the algorithm is analyzed. The expansibility and feasibility of algorithm are proved by demonstrating in theory and simulation experiments. The results of experiment show that the new fault analysis algorithm is more effective in practice.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78616167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantified risk-adaptive access control for patient privacy protection in health information systems 卫生信息系统中患者隐私保护的量化风险自适应访问控制
Qihua Wang, Hongxia Jin
In traditional access control systems, security administrators determine whether an information consumer can access a certain resource. However, in reality, it is very difficult for policy makers to foresee what information a user may need in various situations. In hospitals, failing to authorize a doctor for the medical information she needs about a patient could lead to severe or fatal consequences. In this paper, we propose a practical access control approach to protect patient privacy in health information systems by taking the realities in healthcare into consideration. First, unlike traditional access control systems, our proposed access control model allows information consumers (i.e. doctors) to make access decisions, while still being able to detect and control the over-accessing of patients' medical data by quantifying the risk associated with doctors' data-accessing activities. Second, we do not require doctors to do anything special in order to use our system. We learn about common practices among doctors and apply statistical methods and information theory techniques to quantify the risk of privacy violation. Third, occasional exceptions on information needs, which is common in healthcare, is taken into account in our model. We have implemented a prototype of our solution and performed simulations on real-world medical history records.
在传统的访问控制系统中,安全管理员决定信息使用者是否可以访问某个资源。然而,在现实中,决策者很难预见用户在各种情况下可能需要什么信息。在医院里,没有授权医生获得她需要的关于病人的医疗信息可能会导致严重甚至致命的后果。在本文中,我们提出了一种实用的访问控制方法,以保护患者隐私在卫生信息系统中,考虑到现实医疗保健。首先,与传统的访问控制系统不同,我们提出的访问控制模型允许信息消费者(即医生)做出访问决策,同时仍然能够通过量化与医生数据访问活动相关的风险来检测和控制对患者医疗数据的过度访问。其次,我们不要求医生为了使用我们的系统而做任何特别的事情。我们学习医生之间的常见做法,并应用统计方法和信息论技术来量化隐私侵犯的风险。第三,我们的模型考虑了信息需求的偶尔例外,这在医疗保健中很常见。我们已经实现了解决方案的原型,并对现实世界的病史记录进行了模拟。
{"title":"Quantified risk-adaptive access control for patient privacy protection in health information systems","authors":"Qihua Wang, Hongxia Jin","doi":"10.1145/1966913.1966969","DOIUrl":"https://doi.org/10.1145/1966913.1966969","url":null,"abstract":"In traditional access control systems, security administrators determine whether an information consumer can access a certain resource. However, in reality, it is very difficult for policy makers to foresee what information a user may need in various situations. In hospitals, failing to authorize a doctor for the medical information she needs about a patient could lead to severe or fatal consequences. In this paper, we propose a practical access control approach to protect patient privacy in health information systems by taking the realities in healthcare into consideration. First, unlike traditional access control systems, our proposed access control model allows information consumers (i.e. doctors) to make access decisions, while still being able to detect and control the over-accessing of patients' medical data by quantifying the risk associated with doctors' data-accessing activities. Second, we do not require doctors to do anything special in order to use our system. We learn about common practices among doctors and apply statistical methods and information theory techniques to quantify the risk of privacy violation. Third, occasional exceptions on information needs, which is common in healthcare, is taken into account in our model. We have implemented a prototype of our solution and performed simulations on real-world medical history records.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90416956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Strongly secure certificateless key exchange without pairing 高度安全的无证书密钥交换,无需配对
Guomin Yang, C. H. Tan
In certificateless cryptography, a user secret key is derived from two partial secrets: one is the identity-based secret key (corresponding to the user identity) generated by a Key Generation Center (KGC), and the other is the user self-generated secret key (corresponding to a user self-generated and uncertified public key). Two types of adversaries are considered for certificateless cryptography: a Type-I adversary who can replace the user self-generated public key (in transmission or in a public directory), and a Type-II adversary who is an honest-but-curious KGC. In this paper, we present a formal study on certificateless key exchange (CLKE). We show that the conventional definition of Type-I and Type-II security may not be suitable for certificateless key exchange when considering the notion of forward secrecy which is important for key exchange protocols. We then present a new security model in which a single adversary (instead of Type-I and Type-II adversaries) is considered. We also construct a strongly secure certificateless key exchange protocol without expensive pairing operations. As far as we know, our proposed protocol is the first proven secure CLKE protocol without pairing.
在无证书密码学中,用户密钥由两个部分密钥派生而来:一个是密钥生成中心(key Generation Center, KGC)生成的基于身份的密钥(对应于用户身份),另一个是用户自生成的密钥(对应于用户自生成且未经认证的公钥)。对于无证书加密,可以考虑两种类型的攻击者:Type-I攻击者可以替换用户自生成的公钥(在传输中或在公共目录中),Type-II攻击者是一个诚实但好奇的KGC。本文对无证书密钥交换(CLKE)进行了正式的研究。我们表明,当考虑到对密钥交换协议很重要的前向保密的概念时,传统的Type-I和Type-II安全定义可能不适用于无证书密钥交换。然后,我们提出了一个新的安全模型,其中考虑了单个攻击者(而不是i型和ii型攻击者)。我们还构造了一个不需要昂贵的配对操作的强安全的无证书密钥交换协议。据我们所知,我们提出的协议是第一个经过验证的安全的无需配对的CLKE协议。
{"title":"Strongly secure certificateless key exchange without pairing","authors":"Guomin Yang, C. H. Tan","doi":"10.1145/1966913.1966924","DOIUrl":"https://doi.org/10.1145/1966913.1966924","url":null,"abstract":"In certificateless cryptography, a user secret key is derived from two partial secrets: one is the identity-based secret key (corresponding to the user identity) generated by a Key Generation Center (KGC), and the other is the user self-generated secret key (corresponding to a user self-generated and uncertified public key). Two types of adversaries are considered for certificateless cryptography: a Type-I adversary who can replace the user self-generated public key (in transmission or in a public directory), and a Type-II adversary who is an honest-but-curious KGC. In this paper, we present a formal study on certificateless key exchange (CLKE). We show that the conventional definition of Type-I and Type-II security may not be suitable for certificateless key exchange when considering the notion of forward secrecy which is important for key exchange protocols. We then present a new security model in which a single adversary (instead of Type-I and Type-II adversaries) is considered. We also construct a strongly secure certificateless key exchange protocol without expensive pairing operations. As far as we know, our proposed protocol is the first proven secure CLKE protocol without pairing.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83189415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Threshold ring signature without random oracles 没有随机预言的阈值环签名
Tsz Hon Yuen, Joseph K. Liu, M. Au, W. Susilo, Jianying Zhou
In this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added.
本文提出了不含随机预言符的阈值环签名的概念和构造。这是文献中第一个在标准模型中被证明是安全的方案。我们的方案以一种非平凡的方式扩展了PKC 2007中的Shacham-Waters签名。我们注意到,我们的技术是专门设计用于在标准模型中实现阈值环签名的。有趣的是,我们仍然可以保持签名大小与Shacham-Waters签名相同,而只增加很小的计算成本。
{"title":"Threshold ring signature without random oracles","authors":"Tsz Hon Yuen, Joseph K. Liu, M. Au, W. Susilo, Jianying Zhou","doi":"10.1145/1966913.1966947","DOIUrl":"https://doi.org/10.1145/1966913.1966947","url":null,"abstract":"In this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90623649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Automatic construction of jump-oriented programming shellcode (on the x86) 自动构造面向跳转的编程shellcode(在x86上)
Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets which are ending in ret instruction without the corresponding call instruction. Based on this fact, several defense mechanisms have been proposed to detect the ROP malicious code. To circumvent these defenses, Return-Oriented Programming without returns has been proposed recently, which uses the gadgets ending in jmp instruction but with much diversity. In this paper, we propose an improved ROP techniques to construct the ROP shellcode without returns. Meanwhile we implement a tool to automatically construct the real-world Return-Oriented Programming without returns shellcode, which as demonstrated in our experiment can bypass most of the existing ROP defenses.
面向返回编程(Return-Oriented Programming, ROP)是一种利用现有库/可执行文件中的指令工具来构造图灵完全程序的技术。然而,ROP攻击通常由小工具组成,这些小工具以ret指令结束,而没有相应的调用指令。基于这一事实,提出了几种检测ROP恶意代码的防御机制。为了规避这些防御,最近提出了无返回的面向返回编程,它使用以jmp指令结尾的gadget,但具有很大的多样性。在本文中,我们提出了一种改进的ROP技术来构造无返回的ROP shell代码。同时,我们实现了一个工具来自动构建真实世界的面向返回的编程,而不需要返回shellcode,正如我们在实验中所展示的那样,它可以绕过大多数现有的ROP防御。
{"title":"Automatic construction of jump-oriented programming shellcode (on the x86)","authors":"Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin","doi":"10.1145/1966913.1966918","DOIUrl":"https://doi.org/10.1145/1966913.1966918","url":null,"abstract":"Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets which are ending in ret instruction without the corresponding call instruction. Based on this fact, several defense mechanisms have been proposed to detect the ROP malicious code. To circumvent these defenses, Return-Oriented Programming without returns has been proposed recently, which uses the gadgets ending in jmp instruction but with much diversity. In this paper, we propose an improved ROP techniques to construct the ROP shellcode without returns. Meanwhile we implement a tool to automatically construct the real-world Return-Oriented Programming without returns shellcode, which as demonstrated in our experiment can bypass most of the existing ROP defenses.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87778046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1