首页 > 最新文献

Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security最新文献

英文 中文
Automatic error finding in access-control policies 在访问控制策略中自动查找错误
K. Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, M. Rinard, S. Chapin
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to protect tens of thousands of resources, and there is a need for verification to scale commensurately. We present a new abstraction-refinement technique for automatically finding errors in Administrative Role-Based Access Control (ARBAC) security policies. ARBAC is the first and most comprehensive administrative scheme for Role-Based Access Control (RBAC) systems. Underlying our approach is a change in mindset: we propose that error finding complements verification, can be more scalable, and allows for the use of a wider variety of techniques. In our approach, we use an abstraction-refinement technique to first identify and discard roles that are unlikely to be relevant to the verification question (the abstraction step), and then restore such abstracted roles incrementally (the refinement steps). Errors are one-sided: if there is an error in the abstracted policy, then there is an error in the original policy. If there is an error in a policy whose role-dependency graph diameter is smaller than a certain bound, then we find the error. Our abstraction-refinement technique complements conventional state-space exploration techniques such as model checking. We have implemented our technique in an access-control policy analysis tool. We show empirically that our tool scales well to realistic policies, and is orders of magnitude faster than prior tools.
验证访问控制系统保持预期的安全属性是公认的安全中的一个重要问题。企业访问控制系统已经发展到可以保护数以万计的资源,因此需要相应地进行验证。提出了一种新的抽象细化技术,用于自动发现基于管理角色的访问控制(ARBAC)安全策略中的错误。ARBAC是基于角色的访问控制(RBAC)系统的第一个也是最全面的管理方案。我们的方法背后是一种思维方式的改变:我们建议错误查找补充验证,可以更具可伸缩性,并且允许使用更广泛的技术。在我们的方法中,我们使用抽象细化技术首先识别和丢弃不太可能与验证问题相关的角色(抽象步骤),然后逐步恢复这些抽象角色(细化步骤)。错误是片面的:如果抽象策略中有错误,那么原始策略中也有错误。如果策略中的角色依赖图直径小于某一界限,则找出错误。我们的抽象细化技术补充了传统的状态空间探索技术,如模型检查。我们已经在访问控制策略分析工具中实现了我们的技术。我们的经验表明,我们的工具可以很好地适应现实的政策,并且比以前的工具快几个数量级。
{"title":"Automatic error finding in access-control policies","authors":"K. Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, M. Rinard, S. Chapin","doi":"10.1145/2046707.2046727","DOIUrl":"https://doi.org/10.1145/2046707.2046727","url":null,"abstract":"Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to protect tens of thousands of resources, and there is a need for verification to scale commensurately. We present a new abstraction-refinement technique for automatically finding errors in Administrative Role-Based Access Control (ARBAC) security policies. ARBAC is the first and most comprehensive administrative scheme for Role-Based Access Control (RBAC) systems. Underlying our approach is a change in mindset: we propose that error finding complements verification, can be more scalable, and allows for the use of a wider variety of techniques. In our approach, we use an abstraction-refinement technique to first identify and discard roles that are unlikely to be relevant to the verification question (the abstraction step), and then restore such abstracted roles incrementally (the refinement steps). Errors are one-sided: if there is an error in the abstracted policy, then there is an error in the original policy. If there is an error in a policy whose role-dependency graph diameter is smaller than a certain bound, then we find the error. Our abstraction-refinement technique complements conventional state-space exploration techniques such as model checking. We have implemented our technique in an access-control policy analysis tool. We show empirically that our tool scales well to realistic policies, and is orders of magnitude faster than prior tools.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"45 1","pages":"163-174"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84307792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Poster: using quantified risk and benefit to strengthen the security of information sharing 海报:用量化的风险效益加强信息共享的安全性
Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen
Risk and benefit are two implicit key factors to determine accesses in secure information sharing. Recent researches have shown that they can be explicitly quantified and used to improve the flexibility in information systems. This paper introduces the motivation and a technical design of Quantified riSk and Benefit adaptive Access Control (QSBAC) to strengthen the security of information sharing. The paper also introduces the key issues to design policies in QSBAC.
在安全信息共享中,风险和收益是决定访问的两个隐含的关键因素。最近的研究表明,它们可以明确量化并用于提高信息系统的灵活性。本文介绍了量化风险收益自适应访问控制(QSBAC)的动机和技术设计,以增强信息共享的安全性。本文还介绍了QSBAC中策略设计的关键问题。
{"title":"Poster: using quantified risk and benefit to strengthen the security of information sharing","authors":"Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen","doi":"10.1145/2046707.2093492","DOIUrl":"https://doi.org/10.1145/2046707.2093492","url":null,"abstract":"Risk and benefit are two implicit key factors to determine accesses in secure information sharing. Recent researches have shown that they can be explicitly quantified and used to improve the flexibility in information systems. This paper introduces the motivation and a technical design of Quantified riSk and Benefit adaptive Access Control (QSBAC) to strengthen the security of information sharing. The paper also introduces the key issues to design policies in QSBAC.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"198 1","pages":"781-784"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80027706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic investigation of the OneSwarm anonymous filesharing system OneSwarm匿名文件共享系统的法医调查
Swagatika Prusty, B. Levine, M. Liberatore
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate several flaws in OneSwarm's design and implementation through three different attacks available to forensic investigators. First, we prove that the current design is vulnerable to a novel timing attack that allows just two attackers attached to the same target to determine if it is the source of queried content. When attackers comprise 15% of OneSwarm peers, we expect over 90% of remaining peers will be attached to two attackers and therefore vulnerable. Thwarting the attack increases OneSwarm query response times, making them longer than the equivalent in Onion Routing. Second, we show that OneSwarm's vulnerability to traffic analysis by colluding attackers is much greater than was previously reported, and is much worse than Onion Routing. We show for this second attack that when investigators comprise 25% of peers, over 40% of the network can be investigated with 80% precision to find the sources of content. Our examination of the OneSwarm source code found differences with the technical paper that significantly reduce security. For the implementation in use by thousands of people, attackers that comprise 25% of the network can successfully use this second attack against 98% of remaining peers with 95% precision. Finally, we show that a novel application of a known TCP-based attack allows a single attacker to identify whether a neighbor is the source of data or a proxy for it. Users that turn off the default rate-limit setting are exposed. Each attack can be repeated as investigators leave and rejoin the network. All of our attacks are successful in a forensics context: Law enforcement can use them legally ahead of a warrant. Furthermore, private investigators, who have fewer restrictions on their behavior, can use them more easily in pursuit of evidence for such civil suits as copyright infringement.
OneSwarm是一个匿名p2p文件共享系统,被成千上万的同行使用。它旨在提供类似洋葱路由的隐私和类似bittorrent的性能。我们通过法医调查人员可以使用的三种不同的攻击来展示OneSwarm设计和实现中的几个缺陷。首先,我们证明了当前的设计很容易受到一种新的定时攻击,这种定时攻击允许两个攻击者连接到同一个目标上,以确定它是否是查询内容的来源。当攻击者占OneSwarm对等体的15%时,我们预计超过90%的剩余对等体将连接到两个攻击者,因此容易受到攻击。阻止攻击会增加OneSwarm查询响应时间,使其比洋葱路由中的响应时间更长。其次,我们表明,OneSwarm对串通攻击者的流量分析的脆弱性比之前报道的要大得多,而且比洋葱路由更糟糕。对于第二次攻击,我们表明,当调查人员占同行的25%时,可以以80%的精度调查超过40%的网络,以找到内容的来源。我们对OneSwarm源代码的检查发现了与技术论文的差异,这些差异显著降低了安全性。对于数千人使用的实现,占网络25%的攻击者可以成功地对剩余的98%的对等体使用第二次攻击,准确率为95%。最后,我们展示了一种已知的基于tcp的攻击的新应用程序,它允许单个攻击者识别邻居是数据源还是它的代理。关闭默认速率限制设置的用户将被暴露。每次攻击都可以在调查人员离开并重新加入网络时重复进行。我们所有的攻击在取证环境中都是成功的:执法部门可以在获得搜查令之前合法地使用它们。此外,私人侦探对其行为的限制较少,可以更容易地利用它们来追查版权侵权等民事诉讼的证据。
{"title":"Forensic investigation of the OneSwarm anonymous filesharing system","authors":"Swagatika Prusty, B. Levine, M. Liberatore","doi":"10.1145/2046707.2046731","DOIUrl":"https://doi.org/10.1145/2046707.2046731","url":null,"abstract":"OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate several flaws in OneSwarm's design and implementation through three different attacks available to forensic investigators. First, we prove that the current design is vulnerable to a novel timing attack that allows just two attackers attached to the same target to determine if it is the source of queried content. When attackers comprise 15% of OneSwarm peers, we expect over 90% of remaining peers will be attached to two attackers and therefore vulnerable. Thwarting the attack increases OneSwarm query response times, making them longer than the equivalent in Onion Routing. Second, we show that OneSwarm's vulnerability to traffic analysis by colluding attackers is much greater than was previously reported, and is much worse than Onion Routing. We show for this second attack that when investigators comprise 25% of peers, over 40% of the network can be investigated with 80% precision to find the sources of content. Our examination of the OneSwarm source code found differences with the technical paper that significantly reduce security. For the implementation in use by thousands of people, attackers that comprise 25% of the network can successfully use this second attack against 98% of remaining peers with 95% precision. Finally, we show that a novel application of a known TCP-based attack allows a single attacker to identify whether a neighbor is the source of data or a proxy for it. Users that turn off the default rate-limit setting are exposed. Each attack can be repeated as investigators leave and rejoin the network. All of our attacks are successful in a forensics context: Law enforcement can use them legally ahead of a warrant. Furthermore, private investigators, who have fewer restrictions on their behavior, can use them more easily in pursuit of evidence for such civil suits as copyright infringement.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"165 1","pages":"201-214"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83875854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
App isolation: get the security of multiple browsers with just one 应用隔离:仅用一个浏览器即可获得多个浏览器的安全性
E. Chen, Jason Bau, C. Reis, A. Barth, Collin Jackson
Many browser-based attacks can be prevented by using separate browsers for separate web sites. However, most users access the web with only one browser. We explain the security benefits that using multiple browsers provides in terms of two concepts: entry-point restriction and state isolation. We combine these concepts into a general app isolation mechanism that can provide the same security benefits in a single browser. While not appropriate for all types of web sites, many sites with high-value user data can opt in to app isolation to gain defenses against a wide variety of browser-based attacks. We implement app isolation in the Chromium browser and verify its security properties using finite-state model checking. We also measure the performance overhead of app isolation and conduct a large-scale study to evaluate its adoption complexity for various types of sites, demonstrating how the app isolation mechanisms are suitable for protecting a number of high-value Web applications, such as online banking.
许多基于浏览器的攻击可以通过为不同的网站使用不同的浏览器来防止。然而,大多数用户只使用一个浏览器访问web。我们从两个概念来解释使用多个浏览器带来的安全好处:入口点限制和状态隔离。我们将这些概念组合成一个通用的应用隔离机制,可以在单个浏览器中提供相同的安全优势。虽然并不适用于所有类型的网站,但许多拥有高价值用户数据的网站可以选择应用程序隔离,以防御各种基于浏览器的攻击。我们在Chromium浏览器中实现应用隔离,并使用有限状态模型检查来验证其安全属性。我们还测量了应用程序隔离的性能开销,并进行了大规模的研究,以评估其在不同类型站点上的采用复杂性,展示了应用程序隔离机制如何适合于保护许多高价值的Web应用程序,例如在线银行。
{"title":"App isolation: get the security of multiple browsers with just one","authors":"E. Chen, Jason Bau, C. Reis, A. Barth, Collin Jackson","doi":"10.1145/2046707.2046734","DOIUrl":"https://doi.org/10.1145/2046707.2046734","url":null,"abstract":"Many browser-based attacks can be prevented by using separate browsers for separate web sites. However, most users access the web with only one browser. We explain the security benefits that using multiple browsers provides in terms of two concepts: entry-point restriction and state isolation. We combine these concepts into a general app isolation mechanism that can provide the same security benefits in a single browser. While not appropriate for all types of web sites, many sites with high-value user data can opt in to app isolation to gain defenses against a wide variety of browser-based attacks. We implement app isolation in the Chromium browser and verify its security properties using finite-state model checking. We also measure the performance overhead of app isolation and conduct a large-scale study to evaluate its adoption complexity for various types of sites, demonstrating how the app isolation mechanisms are suitable for protecting a number of high-value Web applications, such as online banking.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"3 1","pages":"227-238"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87585669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Text-based CAPTCHA strengths and weaknesses 基于文本的CAPTCHA的优点和缺点
Elie Bursztein, Matthieu Martin, John C. Mitchell
We carry out a systematic study of existing visual CAPTCHAs based on distorted characters that are augmented with anti-segmentation techniques. Applying a systematic evaluation methodology to 15 current CAPTCHA schemes from popular web sites, we find that 13 are vulnerable to automated attacks. Based on this evaluation, we identify a series of recommendations for CAPTCHA designers and attackers, and possible future directions for producing more reliable human/computer distinguishers.
我们对现有的基于反分割技术增强的扭曲字符的视觉验证码进行了系统的研究。应用系统评估方法对15个当前流行网站的CAPTCHA方案进行评估,我们发现13个方案容易受到自动攻击。基于这一评估,我们为CAPTCHA设计者和攻击者确定了一系列建议,以及生产更可靠的人/计算机区分器的可能未来方向。
{"title":"Text-based CAPTCHA strengths and weaknesses","authors":"Elie Bursztein, Matthieu Martin, John C. Mitchell","doi":"10.1145/2046707.2046724","DOIUrl":"https://doi.org/10.1145/2046707.2046724","url":null,"abstract":"We carry out a systematic study of existing visual CAPTCHAs based on distorted characters that are augmented with anti-segmentation techniques. Applying a systematic evaluation methodology to 15 current CAPTCHA schemes from popular web sites, we find that 13 are vulnerable to automated attacks. Based on this evaluation, we identify a series of recommendations for CAPTCHA designers and attackers, and possible future directions for producing more reliable human/computer distinguishers.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"39 1","pages":"125-138"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74866137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 335
Poster: towards attribute based group key management 海报:迈向基于属性的组密钥管理
Mohamed Nabeel, E. Bertino
Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. However, current group key management schemes are not well designed to manage group keys based on the attributes of the group members. In this poster, we propose a novel key management scheme that allows users whose attributes satisfy a certain policy to derive the group key. Our scheme efficiently supports rekeying operations when the group changes due to joins or leaves of group members. During a rekey operation, the private information issued to existing members remains unaffected and only the public information is updated to change the group key. Our scheme is expressive; it is able to support any monotonic policy over a set of attributes. Our scheme is resistant to collusion attacks; group members are unable to pool their attributes and derive the group key which they cannot derive individually.
基于属性的系统支持在一组用户之间进行细粒度的访问控制,每个用户由一组属性标识。安全的协作应用程序需要这种灵活的基于属性的系统来管理和分发组密钥。但是,当前的组密钥管理方案没有很好地设计为根据组成员的属性来管理组密钥。在这篇海报中,我们提出了一种新的密钥管理方案,允许其属性满足一定策略的用户派生组密钥。当组由于组成员的加入或离开而发生变化时,我们的方案有效地支持重键操作。在重键操作期间,发给现有成员的私有信息不受影响,仅更新公共信息以更改组密钥。我们的方案是富有表现力的;它能够支持一组属性上的任何单调策略。我们的方案能够抵抗合谋攻击;组成员无法汇集它们的属性并派生它们无法单独派生的组键。
{"title":"Poster: towards attribute based group key management","authors":"Mohamed Nabeel, E. Bertino","doi":"10.1145/2046707.2093502","DOIUrl":"https://doi.org/10.1145/2046707.2093502","url":null,"abstract":"Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. However, current group key management schemes are not well designed to manage group keys based on the attributes of the group members. In this poster, we propose a novel key management scheme that allows users whose attributes satisfy a certain policy to derive the group key. Our scheme efficiently supports rekeying operations when the group changes due to joins or leaves of group members. During a rekey operation, the private information issued to existing members remains unaffected and only the public information is updated to change the group key. Our scheme is expressive; it is able to support any monotonic policy over a set of attributes. Our scheme is resistant to collusion attacks; group members are unable to pool their attributes and derive the group key which they cannot derive individually.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"108 1","pages":"821-824"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74416806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Reflections on the evolution of internet threats: the growing imperative for a cyber secure society 反思互联网威胁的演变:建立一个网络安全社会的日益迫切需要
F. Jahanian
Critical infrastructure, including the Internet, plays a vital role in the economic, political, and social fabric of society. This interdependency leaves society vulnerable to a wide range of threats that impact the security, reliability, availability, and overall trustworthiness of information technology resources. Assuring these properties in the face of adversarial behavior and an Internet that has changed dramatically in size, complexity, and diversity over the last decade has proven to be a critical challenge. In this talk, I will reflect on the evolution of Internet threats - from early threats, such as viruses and worms, to modern botnets. I will explore how changing attacker's technological means (e.g., resilient infrastructure, covert communication) have intertwined with attacker's changing social, behavioral, and economic motives (e.g., vandalism, crime, activism) to create today's large, complex, and diverse ecosystem of threats. I will also touch on how future innovation in the threat landscape will likely be driven by Internet adoption patterns such as the explosive growth of on-line data, the proliferation of mobile devices, and the emergence of the "cloud" computing paradigm. In response to these challenges, I will discuss the need for sustained, long-term research investments in a spectrum of scientific and technical areas with particular emphasis on calls to develop the scientific foundations of cyber-security and to accelerate the transition of knowledge into practice. I will articulate a vision in which a cyber secure society is necessary if we are to achieve the promise of computing to address a wide range of national priorities including health, energy, transportation, education and life-long learning, and public safety/emergency preparedness.
包括互联网在内的关键基础设施在社会的经济、政治和社会结构中起着至关重要的作用。这种相互依赖使社会容易受到各种威胁的影响,这些威胁影响信息技术资源的安全性、可靠性、可用性和整体可信度。在面对对抗行为和过去十年中在规模、复杂性和多样性方面发生了巨大变化的互联网时,确保这些特性已被证明是一项关键挑战。在这次演讲中,我将回顾互联网威胁的演变——从早期的威胁,如病毒和蠕虫,到现代的僵尸网络。我将探讨不断变化的攻击者的技术手段(例如,弹性基础设施,秘密通信)如何与攻击者不断变化的社会,行为和经济动机(例如,破坏,犯罪,激进主义)交织在一起,以创造当今庞大,复杂和多样化的威胁生态系统。我还将谈到未来威胁领域的创新将如何受到互联网采用模式的驱动,例如在线数据的爆炸性增长、移动设备的扩散以及“云”计算范式的出现。为了应对这些挑战,我将讨论在一系列科学和技术领域进行持续、长期研究投资的必要性,特别强调呼吁发展网络安全的科学基础,并加速知识向实践的转变。我将阐述一个愿景,即如果我们要实现计算的承诺,以解决包括卫生、能源、交通、教育和终身学习以及公共安全/应急准备在内的广泛的国家优先事项,就必须建立一个网络安全的社会。
{"title":"Reflections on the evolution of internet threats: the growing imperative for a cyber secure society","authors":"F. Jahanian","doi":"10.1145/2046707.2046709","DOIUrl":"https://doi.org/10.1145/2046707.2046709","url":null,"abstract":"Critical infrastructure, including the Internet, plays a vital role in the economic, political, and social fabric of society. This interdependency leaves society vulnerable to a wide range of threats that impact the security, reliability, availability, and overall trustworthiness of information technology resources. Assuring these properties in the face of adversarial behavior and an Internet that has changed dramatically in size, complexity, and diversity over the last decade has proven to be a critical challenge. In this talk, I will reflect on the evolution of Internet threats - from early threats, such as viruses and worms, to modern botnets. I will explore how changing attacker's technological means (e.g., resilient infrastructure, covert communication) have intertwined with attacker's changing social, behavioral, and economic motives (e.g., vandalism, crime, activism) to create today's large, complex, and diverse ecosystem of threats. I will also touch on how future innovation in the threat landscape will likely be driven by Internet adoption patterns such as the explosive growth of on-line data, the proliferation of mobile devices, and the emergence of the \"cloud\" computing paradigm.\u0000 In response to these challenges, I will discuss the need for sustained, long-term research investments in a spectrum of scientific and technical areas with particular emphasis on calls to develop the scientific foundations of cyber-security and to accelerate the transition of knowledge into practice. I will articulate a vision in which a cyber secure society is necessary if we are to achieve the promise of computing to address a wide range of national priorities including health, energy, transportation, education and life-long learning, and public safety/emergency preparedness.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"6 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90626090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms SICE:用于x86多核平台的硬件级强隔离计算环境
Ahmed M. Azab, P. Ning, Xiaolan Zhang
SICE is a novel framework to provide hardware-level isolation and protection for sensitive workloads running on x86 platforms in compute clouds. Unlike existing isolation techniques, SICE does not rely on any software component in the host environment (i.e., an OS or a hypervisor). Instead, the security of the isolated environments is guaranteed by a trusted computing base that only includes the hardware, the BIOS, and the System Management Mode (SMM). SICE provides fast context switching to and from an isolated environment, allowing isolated workloads to time-share the physical platform with untrusted workloads. Moreover, SICE supports a large range (up to 4GB) of isolated memory. Finally, the most unique feature of SICE is the use of multicore processors to allow the isolated environments to run concurrently and yet securely beside the untrusted host. We have implemented a SICE prototype using an AMD x86 hardware platform. Our experiments show that SICE performs fast context switching (67 microseconds) to and from the isolated environment and that it imposes a reasonable overhead (3% on all but one benchmark) on the operation of an isolated Linux virtual machine. Our prototype demonstrates that, subject to a careful security review of the BIOS software and the SMM hardware implementation, current hardware architecture already provides abstractions that can support building strong isolation mechanisms using a very small SMM software foundation of about 300 lines of code.
SICE是一个新颖的框架,用于为运行在计算云中的x86平台上的敏感工作负载提供硬件级隔离和保护。与现有的隔离技术不同,SICE不依赖于主机环境中的任何软件组件(即操作系统或管理程序)。相反,隔离环境的安全性由一个仅包括硬件、BIOS和系统管理模式(SMM)的可信计算基础来保证。SICE提供与隔离环境之间的快速上下文切换,允许隔离的工作负载与不受信任的工作负载共享物理平台。此外,SICE支持大范围(高达4GB)的隔离内存。最后,SICE最独特的特性是使用多核处理器,允许隔离的环境在不受信任的主机旁边并发地安全地运行。我们已经使用AMD x86硬件平台实现了一个SICE原型。我们的实验表明,SICE在隔离环境之间执行快速上下文切换(67微秒),并且它对隔离的Linux虚拟机的操作施加了合理的开销(除了一个基准测试之外,所有基准测试都是3%)。我们的原型表明,经过对BIOS软件和SMM硬件实现的仔细安全审查,当前的硬件体系结构已经提供了一些抽象,可以使用大约300行代码的非常小的SMM软件基础来支持构建强大的隔离机制。
{"title":"SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms","authors":"Ahmed M. Azab, P. Ning, Xiaolan Zhang","doi":"10.1145/2046707.2046752","DOIUrl":"https://doi.org/10.1145/2046707.2046752","url":null,"abstract":"SICE is a novel framework to provide hardware-level isolation and protection for sensitive workloads running on x86 platforms in compute clouds. Unlike existing isolation techniques, SICE does not rely on any software component in the host environment (i.e., an OS or a hypervisor). Instead, the security of the isolated environments is guaranteed by a trusted computing base that only includes the hardware, the BIOS, and the System Management Mode (SMM). SICE provides fast context switching to and from an isolated environment, allowing isolated workloads to time-share the physical platform with untrusted workloads. Moreover, SICE supports a large range (up to 4GB) of isolated memory. Finally, the most unique feature of SICE is the use of multicore processors to allow the isolated environments to run concurrently and yet securely beside the untrusted host. We have implemented a SICE prototype using an AMD x86 hardware platform. Our experiments show that SICE performs fast context switching (67 microseconds) to and from the isolated environment and that it imposes a reasonable overhead (3% on all but one benchmark) on the operation of an isolated Linux virtual machine. Our prototype demonstrates that, subject to a careful security review of the BIOS software and the SMM hardware implementation, current hardware architecture already provides abstractions that can support building strong isolation mechanisms using a very small SMM software foundation of about 300 lines of code.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"185 1","pages":"375-388"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89005410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
MIDeA: a multi-parallel intrusion detection architecture MIDeA:多并行入侵检测架构
G. Vasiliadis, M. Polychronakis, S. Ioannidis
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Gigabit speeds, while performing highly-complex per-packet and per-flow data processing. In this paper, we present a multi-parallel intrusion detection architecture tailored for high speed networks. To cope with the increased processing throughput requirements, our system parallelizes network traffic processing and analysis at three levels, using multi-queue NICs, multiple CPUs, and multiple GPUs. The proposed design avoids locking, optimizes data transfers between the different processing units, and speeds up data processing by mapping different operations to the processing units where they are best suited. Our experimental evaluation shows that our prototype implementation based on commodity off-the-shelf equipment can reach processing speeds of up to 5.2 Gbit/s with zero packet loss when analyzing traffic in a real network, whereas the pattern matching engine alone reaches speeds of up to 70 Gbit/s, which is an almost four times improvement over prior solutions that use specialized hardware.
在高速网络环境下,网络入侵检测系统面临着识别各种攻击的挑战。因此,它们必须以千兆位的速度运行,同时执行高度复杂的逐包和逐流数据处理。本文提出了一种适合高速网络的多并行入侵检测体系结构。为了应对不断增加的处理吞吐量需求,我们的系统在三个级别上并行处理网络流量处理和分析,使用多队列网卡、多个cpu和多个gpu。提出的设计避免了锁定,优化了不同处理单元之间的数据传输,并通过将不同的操作映射到最适合的处理单元来加快数据处理速度。我们的实验评估表明,在分析真实网络中的流量时,我们基于商品现货设备的原型实现可以达到高达5.2 Gbit/s的处理速度,并且没有丢包,而模式匹配引擎单独达到高达70 Gbit/s的速度,这比使用专用硬件的先前解决方案提高了近四倍。
{"title":"MIDeA: a multi-parallel intrusion detection architecture","authors":"G. Vasiliadis, M. Polychronakis, S. Ioannidis","doi":"10.1145/2046707.2046741","DOIUrl":"https://doi.org/10.1145/2046707.2046741","url":null,"abstract":"Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Gigabit speeds, while performing highly-complex per-packet and per-flow data processing. In this paper, we present a multi-parallel intrusion detection architecture tailored for high speed networks. To cope with the increased processing throughput requirements, our system parallelizes network traffic processing and analysis at three levels, using multi-queue NICs, multiple CPUs, and multiple GPUs. The proposed design avoids locking, optimizes data transfers between the different processing units, and speeds up data processing by mapping different operations to the processing units where they are best suited. Our experimental evaluation shows that our prototype implementation based on commodity off-the-shelf equipment can reach processing speeds of up to 5.2 Gbit/s with zero packet loss when analyzing traffic in a real network, whereas the pattern matching engine alone reaches speeds of up to 70 Gbit/s, which is an almost four times improvement over prior solutions that use specialized hardware.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"20 1","pages":"297-308"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77309018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 154
Practical delegation of computation using multiple servers 使用多个服务器的实际计算委托
R. Canetti, Ben Riva, G. Rothblum
The current move to Cloud Computing raises the need for verifiable delegation of computations, where a weak client delegates his computation to a powerful server, while maintaining the ability to verify that the result is correct. Although there are prior solutions to this problem, none of them is yet both general and practical for real-world use. We demonstrate a relatively efficient and general solution where the client delegates the computation to several servers, and is guaranteed to determine the correct answer as long as even a single server is honest. We show: A protocol for any efficiently computable function, with logarithmically many rounds, based on any collision-resistant hash family. The protocol is set in terms of Turing Machines but can be adapted to other computation models. An adaptation of the protocol for the X86 computation model and a prototype implementation, called Quin, for Windows executables. We describe the architecture of Quin and experiment with several parameters on live clouds. We show that the protocol is practical, can work with nowadays clouds, and is efficient both for the servers and for the client.
当前向云计算的迁移提出了对可验证的计算委托的需求,弱客户机将其计算委托给功能强大的服务器,同时保持验证结果是否正确的能力。虽然这个问题已经有了一些解决方案,但是没有一个是既通用又实用的。我们展示了一个相对有效和通用的解决方案,其中客户端将计算委托给多个服务器,并且只要单个服务器是诚实的,就保证确定正确的答案。我们展示了:基于任何抗碰撞哈希族的任何有效可计算函数的协议,具有对数多轮。该协议是根据图灵机设置的,但可以适应其他计算模型。针对X86计算模型的协议改编,以及针对Windows可执行文件的原型实现,称为Quin。我们描述了Quin的架构,并在实时云中进行了几个参数的实验。我们证明了该协议是实用的,可以与当今的云一起工作,并且对服务器和客户端都是有效的。
{"title":"Practical delegation of computation using multiple servers","authors":"R. Canetti, Ben Riva, G. Rothblum","doi":"10.1145/2046707.2046759","DOIUrl":"https://doi.org/10.1145/2046707.2046759","url":null,"abstract":"The current move to Cloud Computing raises the need for verifiable delegation of computations, where a weak client delegates his computation to a powerful server, while maintaining the ability to verify that the result is correct. Although there are prior solutions to this problem, none of them is yet both general and practical for real-world use. We demonstrate a relatively efficient and general solution where the client delegates the computation to several servers, and is guaranteed to determine the correct answer as long as even a single server is honest. We show: A protocol for any efficiently computable function, with logarithmically many rounds, based on any collision-resistant hash family. The protocol is set in terms of Turing Machines but can be adapted to other computation models. An adaptation of the protocol for the X86 computation model and a prototype implementation, called Quin, for Windows executables. We describe the architecture of Quin and experiment with several parameters on live clouds. We show that the protocol is practical, can work with nowadays clouds, and is efficient both for the servers and for the client.","PeriodicalId":72687,"journal":{"name":"Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security","volume":"17 1","pages":"445-454"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81277941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
期刊
Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1