首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Monitor placement for large-scale systems 大型系统的监视器放置
Nirupama Talele, Jason Teutsch, R. Erbacher, T. Jaeger
System administrators employ network monitors, such as traffic analyzers, network intrusion prevention systems, and firewalls, to protect the network's hosts from remote adversaries. The problem is that vulnerabilities are caused primarily by errors in the host software and/or configuration, but modern hosts are too complex for system administrators to understand, limiting monitoring to known attacks. Researchers have proposed automated methods to compute network monitor placements, but these methods also fail to model attack paths within hosts and/or fail to scale beyond tens of hosts. In this paper, we propose a method to compute network monitor placements that leverages commonality in available access control policies across hosts to compute network monitor placement for large-scale systems. We introduce an equivalence property, called flow equivalence, which reduces the size of the placement problem to be proportional to the number of unique host configurations. This process enables us to solve mediation placement problems for thousands of hosts with access control policies containing of thousands of rules in seconds (less than 125 for a network of 9500 hosts). Our method enables administrators to place network monitors in large-scale networks automatically, leveraging the actual host configuration, to detect and prevent network-borne threats.
系统管理员使用网络监视器(如流量分析器、网络入侵防御系统和防火墙)来保护网络主机免受远程攻击。问题是,漏洞主要是由主机软件和/或配置中的错误引起的,但是现代主机太复杂,系统管理员无法理解,这限制了对已知攻击的监视。研究人员提出了自动计算网络监视器位置的方法,但这些方法也无法模拟主机内的攻击路径和/或无法扩展到数十台主机以上。在本文中,我们提出了一种计算网络监视器放置位置的方法,该方法利用跨主机可用访问控制策略中的共性来计算大型系统的网络监视器放置位置。我们引入了一个等价属性,称为流等价,它将放置问题的大小减小到与唯一主机配置的数量成正比。此过程使我们能够在几秒钟内解决具有包含数千条规则的访问控制策略的数千台主机的中介放置问题(对于9500台主机的网络,不到125台)。我们的方法使管理员能够在大规模网络中自动放置网络监视器,利用实际的主机配置来检测和防止网络传播的威胁。
{"title":"Monitor placement for large-scale systems","authors":"Nirupama Talele, Jason Teutsch, R. Erbacher, T. Jaeger","doi":"10.1145/2613087.2613107","DOIUrl":"https://doi.org/10.1145/2613087.2613107","url":null,"abstract":"System administrators employ network monitors, such as traffic analyzers, network intrusion prevention systems, and firewalls, to protect the network's hosts from remote adversaries. The problem is that vulnerabilities are caused primarily by errors in the host software and/or configuration, but modern hosts are too complex for system administrators to understand, limiting monitoring to known attacks. Researchers have proposed automated methods to compute network monitor placements, but these methods also fail to model attack paths within hosts and/or fail to scale beyond tens of hosts. In this paper, we propose a method to compute network monitor placements that leverages commonality in available access control policies across hosts to compute network monitor placement for large-scale systems. We introduce an equivalence property, called flow equivalence, which reduces the size of the placement problem to be proportional to the number of unique host configurations. This process enables us to solve mediation placement problems for thousands of hosts with access control policies containing of thousands of rules in seconds (less than 125 for a network of 9500 hosts). Our method enables administrators to place network monitors in large-scale networks automatically, leveraging the actual host configuration, to detect and prevent network-borne threats.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"41 1","pages":"29-40"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81203198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attribute based access control for APIs in spring security spring安全中api的基于属性的访问控制
A. Armando, R. Carbone, Eyasu Getahun Chekole, Silvio Ranise
The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the way business is done by permitting the implementation of a multitude of apps, customized to user needs. While supporting a more flexible exploitation of available data, services and applications developed on top of APIs are vulnerable to a variety of attacks, ranging from SQL injection to unauthorized access of sensitive data. Available security solutions must be re-used and/or adapted to work with APIs. In this paper, we focus on the development of a flexible access control mechanism for APIs. This is an important security mechanism to guarantee the enforcement of authorization constraints on resources while invoking their API functions. We have developed an extension of the Spring Security framework, the standard for securing services and apps built in the popular (open source) Spring framework, for the specification and enforcement of Attribute-Based Access Control (ABAC) policies. We demonstrate our work with scenarios arising in a smart energy eco-system.
企业广泛采用应用程序编程接口(api),允许实现大量的应用程序,根据用户需求进行定制,从而改变了开展业务的方式。虽然支持更灵活地利用可用数据,但基于api开发的服务和应用程序容易受到各种攻击,从SQL注入到对敏感数据的未经授权访问。可用的安全解决方案必须被重用和/或调整以使用api。在本文中,我们着重于开发一种灵活的api访问控制机制。这是一种重要的安全机制,可以在调用资源的API函数时保证对资源实施授权约束。我们开发了Spring Security框架的扩展,该框架是用于保护流行(开源)Spring框架中构建的服务和应用程序的标准,用于规范和实施基于属性的访问控制(ABAC)策略。我们通过智能能源生态系统中出现的场景来展示我们的工作。
{"title":"Attribute based access control for APIs in spring security","authors":"A. Armando, R. Carbone, Eyasu Getahun Chekole, Silvio Ranise","doi":"10.1145/2613087.2613109","DOIUrl":"https://doi.org/10.1145/2613087.2613109","url":null,"abstract":"The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the way business is done by permitting the implementation of a multitude of apps, customized to user needs. While supporting a more flexible exploitation of available data, services and applications developed on top of APIs are vulnerable to a variety of attacks, ranging from SQL injection to unauthorized access of sensitive data. Available security solutions must be re-used and/or adapted to work with APIs. In this paper, we focus on the development of a flexible access control mechanism for APIs. This is an important security mechanism to guarantee the enforcement of authorization constraints on resources while invoking their API functions. We have developed an extension of the Spring Security framework, the standard for securing services and apps built in the popular (open source) Spring framework, for the specification and enforcement of Attribute-Based Access Control (ABAC) policies. We demonstrate our work with scenarios arising in a smart energy eco-system.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"30 1","pages":"85-88"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84059578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An access control concept for novel automotive HMI systems 一种新型汽车人机界面系统的访问控制概念
Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, V. Friesen, Frank Dürr, K. Rothermel, Christian Maihöfer
The relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer or navigation system. However, so far applications are restricted to using dedicated displays. In order to increase flexibility, the requirement of sharing displays between applications has emerged. Sharing displays leads to safety and security concerns since safety-critical applications as the dashboard warning lights share the same displays with uncritical or untrusted applications like the navigation system or third-party applications. To guarantee the safe and secure sharing of displays, we present a formal model for defining and controlling the access to display areas in this paper. We prove the validity of this model, and present a proof-of-concept implementation to demonstrate the feasibility of our concept.
在过去几年中,图形功能在车辆应用中的相关性显著增加。现代汽车配备了多个显示器,用于不同的应用,如速度计或导航系统。然而,到目前为止,应用仅限于使用专用显示器。为了增加灵活性,出现了应用程序之间共享显示的需求。由于仪表板警示灯等安全关键应用与导航系统或第三方应用等不重要或不受信任的应用共享相同的显示,因此共享显示会导致安全问题。为了保证显示区域的安全共享,本文提出了一种定义和控制显示区域访问的形式化模型。我们证明了该模型的有效性,并提出了一个概念验证实现来证明我们的概念的可行性。
{"title":"An access control concept for novel automotive HMI systems","authors":"Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, V. Friesen, Frank Dürr, K. Rothermel, Christian Maihöfer","doi":"10.1145/2613087.2613104","DOIUrl":"https://doi.org/10.1145/2613087.2613104","url":null,"abstract":"The relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer or navigation system. However, so far applications are restricted to using dedicated displays. In order to increase flexibility, the requirement of sharing displays between applications has emerged. Sharing displays leads to safety and security concerns since safety-critical applications as the dashboard warning lights share the same displays with uncritical or untrusted applications like the navigation system or third-party applications. To guarantee the safe and secure sharing of displays, we present a formal model for defining and controlling the access to display areas in this paper. We prove the validity of this model, and present a proof-of-concept implementation to demonstrate the feasibility of our concept.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"5 1","pages":"17-28"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84349073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hardware-enhanced distributed access enforcement for role-based access control 用于基于角色的访问控制的硬件增强分布式访问强制
Gedare Bloom, R. Simha
The protection of information in enterprise and cloud platforms is growing more important and complex with increasing numbers of users who need to access resources with distinct permissions. Role-based access control (RBAC) eases administrative complexity for large-scale access control, while a client-server model can ease performance bottlenecks by distributing access enforcement across multiple servers that consult the centralized access decision policy server as needed. In this paper, we propose a new approach to access enforcement using an existing associative array hardware data structure (HWDS) to cache authorizations in a distributed system using RBAC. This HWDS approach uses hardware that has previous been demonstrated as useful for several application domains including access control, network packet routing, and generic comparison-based integer search algorithms. We reproduce experiments from prior work on distributed access enforcement for RBAC systems, and we design and conduct new experiments to evaluate HWDS-based access enforcement. Experimental data show the HWDS cuts session initiation time by about a third compared to existing solutions, while achieving similar performance to authorize access requests. These results suggest that distributed systems using RBAC could use HWDS-based access enforcement to increase session throughput or to decrease the number of access enforcement servers without losing performance.
随着需要以不同权限访问资源的用户数量的增加,企业和云平台中的信息保护变得越来越重要和复杂。基于角色的访问控制(RBAC)减轻了大规模访问控制的管理复杂性,而客户机-服务器模型可以通过跨多个服务器分布访问强制来缓解性能瓶颈,这些服务器可以根据需要咨询集中式访问决策策略服务器。在本文中,我们提出了一种新的访问强制方法,使用现有的关联数组硬件数据结构(HWDS)来缓存使用RBAC的分布式系统中的授权。这种HWDS方法使用的硬件已经被证明对几个应用领域很有用,包括访问控制、网络数据包路由和基于比较的通用整数搜索算法。我们重现了之前关于RBAC系统分布式访问强制的实验,并设计和实施了新的实验来评估基于hwds的访问强制。实验数据表明,与现有解决方案相比,HWDS将会话启动时间减少了约三分之一,同时在授权访问请求方面取得了类似的性能。这些结果表明,使用RBAC的分布式系统可以使用基于hwds的访问强制来增加会话吞吐量或减少访问强制服务器的数量,而不会损失性能。
{"title":"Hardware-enhanced distributed access enforcement for role-based access control","authors":"Gedare Bloom, R. Simha","doi":"10.1145/2613087.2613096","DOIUrl":"https://doi.org/10.1145/2613087.2613096","url":null,"abstract":"The protection of information in enterprise and cloud platforms is growing more important and complex with increasing numbers of users who need to access resources with distinct permissions. Role-based access control (RBAC) eases administrative complexity for large-scale access control, while a client-server model can ease performance bottlenecks by distributing access enforcement across multiple servers that consult the centralized access decision policy server as needed. In this paper, we propose a new approach to access enforcement using an existing associative array hardware data structure (HWDS) to cache authorizations in a distributed system using RBAC. This HWDS approach uses hardware that has previous been demonstrated as useful for several application domains including access control, network packet routing, and generic comparison-based integer search algorithms. We reproduce experiments from prior work on distributed access enforcement for RBAC systems, and we design and conduct new experiments to evaluate HWDS-based access enforcement. Experimental data show the HWDS cuts session initiation time by about a third compared to existing solutions, while achieving similar performance to authorize access requests. These results suggest that distributed systems using RBAC could use HWDS-based access enforcement to increase session throughput or to decrease the number of access enforcement servers without losing performance.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"12 1","pages":"5-16"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85108794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards fine grained RDF access control 实现细粒度RDF访问控制
Jyothsna Rachapalli, V. Khadilkar, Murat Kantarcioglu, B. Thuraisingham
The Semantic Web is envisioned as the future of the current web, where the information is enriched with machine understandable semantics. According to the World Wide Web Consortium (W3C), "The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries". Among the various technologies that empower Semantic Web, the most significant ones are Resource Description Framework (RDF) and SPARQL, which facilitate data integration and a means to query respectively. Although Semantic Web is elegantly and effectively equipped for data sharing and integration via RDF, lack of efficient means to securely share data pose limitations in practice. In order to make data sharing and integration pragmatic for Semantic Web, we present a query language based secure data sharing mechanism. We extend SPARQL with a new query form called SANITIZE which comprises a set of sanitization operations that are used to sanitize or mask sensitive data within an RDF graph. The sanitization operations can be further leveraged towards RDF access control and anonymization, thus enabling secure sharing of RDF data.
语义网被设想为当前网络的未来,其中的信息丰富了机器可理解的语义。根据万维网联盟(W3C)的说法,“语义网提供了一个公共框架,允许跨应用程序、企业和社区边界共享和重用数据”。在支持语义Web的各种技术中,最重要的是资源描述框架(RDF)和SPARQL,它们分别促进了数据集成和查询。尽管语义Web通过RDF为数据共享和集成提供了优雅而有效的装备,但缺乏安全共享数据的有效手段在实践中构成了限制。为了实现语义Web的数据共享和集成,提出了一种基于查询语言的安全数据共享机制。我们使用名为SANITIZE的新查询表单扩展了SPARQL,该表单包含一组清理操作,用于清理或屏蔽RDF图中的敏感数据。清理操作可以进一步用于RDF访问控制和匿名化,从而实现RDF数据的安全共享。
{"title":"Towards fine grained RDF access control","authors":"Jyothsna Rachapalli, V. Khadilkar, Murat Kantarcioglu, B. Thuraisingham","doi":"10.1145/2613087.2613092","DOIUrl":"https://doi.org/10.1145/2613087.2613092","url":null,"abstract":"The Semantic Web is envisioned as the future of the current web, where the information is enriched with machine understandable semantics. According to the World Wide Web Consortium (W3C), \"The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries\". Among the various technologies that empower Semantic Web, the most significant ones are Resource Description Framework (RDF) and SPARQL, which facilitate data integration and a means to query respectively. Although Semantic Web is elegantly and effectively equipped for data sharing and integration via RDF, lack of efficient means to securely share data pose limitations in practice. In order to make data sharing and integration pragmatic for Semantic Web, we present a query language based secure data sharing mechanism. We extend SPARQL with a new query form called SANITIZE which comprises a set of sanitization operations that are used to sanitize or mask sensitive data within an RDF graph. The sanitization operations can be further leveraged towards RDF access control and anonymization, thus enabling secure sharing of RDF data.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"58 1","pages":"165-176"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80981000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Limiting access to unintentionally leaked sensitive documents using malware signatures 使用恶意软件签名限制对无意泄露的敏感文档的访问
Mordechai Guri, Gabi Kedma, B. Carmeli, Y. Elovici
Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditionally handled either by preventive means, which are evidently not hermetic, or by punitive measures taken after the main damage has already been done. Yet, the challenge of preventing a leaked file from spreading further among computers and over the Internet is not resolved by existing approaches. This paper presents a novel method, which aims at reducing and limiting the potential damage of a leakage that has already occurred. The main idea is to tag sensitive documents within the organization's boundaries by attaching a benign detectable malware signature (DMS). While the DMS is masked inside the organization, if a tagged document is somehow leaked out of the organization's boundaries, common security services such as Anti-Virus (AV) programs, firewalls or email gateways will detect the file as a real threat and will consequently delete or quarantine it, preventing it from spreading further. This paper discusses various aspects of the DMS, such as signature type and attachment techniques, along with proper design considerations and implementation issues. The proposed method was implemented and successfully tested on various file types including documents, spreadsheets, presentations, images, executable binaries and textual source code. The evaluation results have demonstrated its effectiveness in limiting the spread of leaked documents.
当敏感的数字文件被公开或落入对手手中时,组织经常会感到尴尬,这通常是由于无意或无意的泄露。传统上,处理这种泄漏的办法要么是显然不是密封的预防性手段,要么是在主要损害已经造成之后采取惩罚性措施。然而,现有的方法无法解决防止泄露文件在计算机之间和互联网上进一步传播的挑战。本文提出了一种新的方法,旨在减少和限制已经发生的泄漏的潜在损害。其主要思想是通过附加良性可检测恶意软件签名(DMS)来标记组织边界内的敏感文档。当DMS在组织内部被屏蔽时,如果标记的文档以某种方式泄露出组织边界,反病毒(AV)程序、防火墙或电子邮件网关等常见安全服务将检测到该文件为真正的威胁,并将其删除或隔离,从而防止其进一步传播。本文讨论了DMS的各个方面,例如签名类型和附件技术,以及适当的设计考虑和实现问题。所提出的方法已在各种文件类型(包括文档、电子表格、演示文稿、图像、可执行二进制文件和文本源代码)上实现并成功测试。评价结果表明,该方法有效地限制了外泄文件的传播。
{"title":"Limiting access to unintentionally leaked sensitive documents using malware signatures","authors":"Mordechai Guri, Gabi Kedma, B. Carmeli, Y. Elovici","doi":"10.1145/2613087.2613103","DOIUrl":"https://doi.org/10.1145/2613087.2613103","url":null,"abstract":"Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditionally handled either by preventive means, which are evidently not hermetic, or by punitive measures taken after the main damage has already been done. Yet, the challenge of preventing a leaked file from spreading further among computers and over the Internet is not resolved by existing approaches. This paper presents a novel method, which aims at reducing and limiting the potential damage of a leakage that has already occurred. The main idea is to tag sensitive documents within the organization's boundaries by attaching a benign detectable malware signature (DMS). While the DMS is masked inside the organization, if a tagged document is somehow leaked out of the organization's boundaries, common security services such as Anti-Virus (AV) programs, firewalls or email gateways will detect the file as a real threat and will consequently delete or quarantine it, preventing it from spreading further. This paper discusses various aspects of the DMS, such as signature type and attachment techniques, along with proper design considerations and implementation issues. The proposed method was implemented and successfully tested on various file types including documents, spreadsheets, presentations, images, executable binaries and textual source code. The evaluation results have demonstrated its effectiveness in limiting the spread of leaked documents.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"27 1","pages":"129-140"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77966531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy models to protect resource retrieval 保护资源检索的策略模型
H. Vijayakumar, Xinyang Ge, T. Jaeger
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional access control methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. This model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide.
流程需要来自其操作环境的各种资源才能正常运行,但是攻击者可能会控制资源检索的输入或最终资源本身,从而导致各种漏洞。传统的访问控制方法不适合防止此类漏洞,因为它们对所有系统调用调用使用一组权限。在本文中,我们定义了一个新的策略模型,用于描述资源检索何时是不安全的,因此可以阻止它们。该模型突出了两个贡献:(1)对手模型作为对抗角色的显式定义,它列出了决定一个主体是否为另一个主体的对手的权限,以及(2)数据流的应用程序,以确定对手对用于检索资源的名称的控制。使用多个对手模型的评估表明,在90%以上的系统调用中,数据流是授权资源检索所必需的。通过明确攻击者模型和攻击者对资源检索各方面的可访问性,我们可以在系统范围内阻止资源访问攻击。
{"title":"Policy models to protect resource retrieval","authors":"H. Vijayakumar, Xinyang Ge, T. Jaeger","doi":"10.1145/2613087.2613111","DOIUrl":"https://doi.org/10.1145/2613087.2613111","url":null,"abstract":"Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional access control methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. This model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"279 1","pages":"211-222"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74376719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-centric management of distributed credential repositories: balancing availability and vulnerability 以用户为中心的分布式凭证存储库管理:平衡可用性和脆弱性
Jens Köhler, Jens Mittag, H. Hartenstein
To relieve users of the burden to memorize and manage their credentials while allowing for seamless roaming between various end devices, the idea of so-called credential repositories that store credentials for users came to attention. Both the risk of the credential repository being unavailable and the risk of the credentials becoming compromised are managed by the party that hosts the credential repository and that has to be trusted by the user. Removing the need for a trust relationship to a single party implies that users have to manage the risks themselves, for instance, by splitting the credentials across multiple systems/parties. However, if the systems differ in terms of availability and vulnerability, determining a suitable splitting strategy to manage the tradeoff between credential availability and vulnerability constitutes a complex problem. In this paper we present CREDIS, an approach that supports the user in building a credential repository based on heterogeneous systems that differ in terms of vulnerability and availability. CREDIS enables users to specify requirements on the availability and the vulnerability of the distributed credential repository and determines an optimal strategy on how to split secrets across the heterogeneous systems. We prove the NP-hardness of finding an optimal strategy, introduce an approach based on Integer Linear Programming to find optimal strategies for medium sized scenarios and propose heuristics for larger ones. We show that the CREDIS approach yields a reasonably secure and available credential repository even when the distributed repository is built based on low-grade devices or systems.
为了减轻用户记忆和管理其凭据的负担,同时允许在各种终端设备之间无缝漫游,为用户存储凭据的所谓凭据存储库的想法引起了人们的注意。凭据存储库不可用的风险和凭据被泄露的风险都由承载凭据存储库的一方来管理,并且必须得到用户的信任。消除对单一方的信任关系的需求意味着用户必须自己管理风险,例如,通过跨多个系统/多方拆分凭证。但是,如果系统在可用性和脆弱性方面有所不同,那么确定一个合适的分离策略来管理凭证可用性和脆弱性之间的权衡就构成了一个复杂的问题。在本文中,我们介绍了CREDIS,这是一种支持用户基于在脆弱性和可用性方面不同的异构系统构建凭据存储库的方法。CREDIS使用户能够指定关于分布式凭据存储库的可用性和漏洞的需求,并确定关于如何跨异构系统拆分秘密的最佳策略。我们证明了寻找最优策略的np -硬度,引入了一种基于整数线性规划的方法来寻找中型场景的最优策略,并提出了大型场景的启发式方法。我们表明,即使分布式存储库是基于低级设备或系统构建的,CREDIS方法也会产生相当安全且可用的凭据存储库。
{"title":"User-centric management of distributed credential repositories: balancing availability and vulnerability","authors":"Jens Köhler, Jens Mittag, H. Hartenstein","doi":"10.1145/2462410.2462412","DOIUrl":"https://doi.org/10.1145/2462410.2462412","url":null,"abstract":"To relieve users of the burden to memorize and manage their credentials while allowing for seamless roaming between various end devices, the idea of so-called credential repositories that store credentials for users came to attention. Both the risk of the credential repository being unavailable and the risk of the credentials becoming compromised are managed by the party that hosts the credential repository and that has to be trusted by the user. Removing the need for a trust relationship to a single party implies that users have to manage the risks themselves, for instance, by splitting the credentials across multiple systems/parties. However, if the systems differ in terms of availability and vulnerability, determining a suitable splitting strategy to manage the tradeoff between credential availability and vulnerability constitutes a complex problem. In this paper we present CREDIS, an approach that supports the user in building a credential repository based on heterogeneous systems that differ in terms of vulnerability and availability. CREDIS enables users to specify requirements on the availability and the vulnerability of the distributed credential repository and determines an optimal strategy on how to split secrets across the heterogeneous systems. We prove the NP-hardness of finding an optimal strategy, introduce an approach based on Integer Linear Programming to find optimal strategies for medium sized scenarios and propose heuristics for larger ones. We show that the CREDIS approach yields a reasonably secure and available credential repository even when the distributed repository is built based on low-grade devices or systems.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"16 1","pages":"237-248"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72872309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Private data warehouse queries 私有数据仓库查询
X. Yi, Russell Paulet, E. Bertino, Guandong Xu
Publicly accessible data warehouses are an indispensable resource for data analysis. But they also pose a significant risk to the privacy of the clients, since a data warehouse operator may follow the client's queries and infer what the client is interested in. Private Information Retrieval (PIR) techniques allow the client to retrieve a cell from a data warehouse without revealing to the operator which cell is retrieved. However, PIR cannot be used to hide OLAP operations performed by the client, which may disclose the client's interest. This paper presents a solution for private data warehouse queries on the basis of the Boneh-Goh-Nissim cryptosystem which allows one to evaluate any multi-variate polynomial of total degree 2 on ciphertexts. By our solution, the client can perform OLAP operations on the data warehouse and retrieve one (or more) cell without revealing any information about which cell is selected. Furthermore, our solution supports some types of statistical analysis on data warehouse, such as regression and variance analysis, without revealing the client's interest. Our solution ensures both the server's security and the client's security.
可公开访问的数据仓库是数据分析不可或缺的资源。但是它们也对客户机的隐私构成了重大风险,因为数据仓库操作员可能会跟踪客户机的查询并推断客户机感兴趣的内容。私有信息检索(Private Information Retrieval, PIR)技术允许客户机从数据仓库中检索单元,而不向操作员透露所检索的单元。但是,PIR不能用于隐藏客户机执行的OLAP操作,这可能会泄露客户机的兴趣。本文提出了一种基于Boneh-Goh-Nissim密码系统的私有数据仓库查询解决方案,该系统允许对密文上的任何总次为2的多变量多项式求值。通过我们的解决方案,客户机可以在数据仓库上执行OLAP操作并检索一个(或多个)单元,而无需透露有关选择哪个单元的任何信息。此外,我们的解决方案支持对数据仓库进行某些类型的统计分析,例如回归和方差分析,而不会暴露客户的兴趣。我们的解决方案既保证了服务器的安全性,又保证了客户端的安全性。
{"title":"Private data warehouse queries","authors":"X. Yi, Russell Paulet, E. Bertino, Guandong Xu","doi":"10.1145/2462410.2462418","DOIUrl":"https://doi.org/10.1145/2462410.2462418","url":null,"abstract":"Publicly accessible data warehouses are an indispensable resource for data analysis. But they also pose a significant risk to the privacy of the clients, since a data warehouse operator may follow the client's queries and infer what the client is interested in. Private Information Retrieval (PIR) techniques allow the client to retrieve a cell from a data warehouse without revealing to the operator which cell is retrieved. However, PIR cannot be used to hide OLAP operations performed by the client, which may disclose the client's interest. This paper presents a solution for private data warehouse queries on the basis of the Boneh-Goh-Nissim cryptosystem which allows one to evaluate any multi-variate polynomial of total degree 2 on ciphertexts. By our solution, the client can perform OLAP operations on the data warehouse and retrieve one (or more) cell without revealing any information about which cell is selected. Furthermore, our solution supports some types of statistical analysis on data warehouse, such as regression and variance analysis, without revealing the client's interest. Our solution ensures both the server's security and the client's security.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"1 1","pages":"25-36"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83176398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A white-box policy analysis and its efficient implementation 白盒策略分析及其有效实施
Jayalakshmi Balasubramaniam, Philip W. L. Fong
In policy composition frameworks, such as XACML, composite policies can be formed by the application of policy composition algorithms (PCAs), which combine authorization decisions of component policies. Understanding the behaviour of composite policies is a non-trivial endeavour, but instrumental in the engineering of correct access control policies. Existing policy analyses take a black-box approach, in which the global behaviour of the composite policy is assessed. A black-box approach is useful for detecting the presence of erroneous behaviour, but not particularly useful for locating the source of the error. In this work, we propose a white-box policy analysis, known as Decision in Context (DIC), that assesses the behaviour of component policies situated in a composite policy. We show that the DIC query can be applied to facilitate policy change impact analysis, break-glass reduction analysis, dead policy identification, as well as the pruning of redundant subpolicies. For generality, the DIC query is defined in an XACML-style policy composition framework that is agnostic of the underlying access control model. The DIC query is implemented via a reduction to either propositional satisfiability (SAT) or pseudo boolean satisfiability (PBS) instances, after which standard solvers can be invoked to complete the evaluation. Empirical analyses have been conducted to compare the relative efficiency of the SAT and PBS encodings. The latter is found to be a more effective encoding, especially for composite policies containing majority-voting PCAs.
在策略组合框架(如XACML)中,可以通过应用策略组合算法来形成组合策略,策略组合算法将组件策略的授权决策组合在一起。理解复合策略的行为是一项非常重要的工作,但它有助于设计正确的访问控制策略。现有的政策分析采用黑盒方法,评估复合政策的全局行为。黑盒方法对于检测错误行为的存在是有用的,但对于定位错误的来源不是特别有用。在这项工作中,我们提出了一种白盒策略分析,称为上下文决策(DIC),它评估位于复合策略中的组件策略的行为。我们证明DIC查询可以用于促进策略变化影响分析、减少破玻璃分析、失效策略识别以及冗余子策略的修剪。为了通用性,DIC查询是在xacml风格的策略组合框架中定义的,该框架与底层访问控制模型无关。DIC查询是通过约简到命题可满足性(SAT)或伪布尔可满足性(PBS)实例来实现的,之后可以调用标准求解器来完成评估。我们进行了实证分析,比较了SAT和PBS编码的相对效率。发现后者是一种更有效的编码,特别是对于包含多数投票pca的复合策略。
{"title":"A white-box policy analysis and its efficient implementation","authors":"Jayalakshmi Balasubramaniam, Philip W. L. Fong","doi":"10.1145/2462410.2462416","DOIUrl":"https://doi.org/10.1145/2462410.2462416","url":null,"abstract":"In policy composition frameworks, such as XACML, composite policies can be formed by the application of policy composition algorithms (PCAs), which combine authorization decisions of component policies. Understanding the behaviour of composite policies is a non-trivial endeavour, but instrumental in the engineering of correct access control policies. Existing policy analyses take a black-box approach, in which the global behaviour of the composite policy is assessed. A black-box approach is useful for detecting the presence of erroneous behaviour, but not particularly useful for locating the source of the error. In this work, we propose a white-box policy analysis, known as Decision in Context (DIC), that assesses the behaviour of component policies situated in a composite policy. We show that the DIC query can be applied to facilitate policy change impact analysis, break-glass reduction analysis, dead policy identification, as well as the pruning of redundant subpolicies. For generality, the DIC query is defined in an XACML-style policy composition framework that is agnostic of the underlying access control model. The DIC query is implemented via a reduction to either propositional satisfiability (SAT) or pseudo boolean satisfiability (PBS) instances, after which standard solvers can be invoked to complete the evaluation. Empirical analyses have been conducted to compare the relative efficiency of the SAT and PBS encodings. The latter is found to be a more effective encoding, especially for composite policies containing majority-voting PCAs.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"21 1","pages":"149-160"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79072044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1