客座社论:计算机和通信安全特刊

P. Syverson, S. Jha
{"title":"客座社论:计算机和通信安全特刊","authors":"P. Syverson, S. Jha","doi":"10.1145/2133375.2133376","DOIUrl":null,"url":null,"abstract":"This special issue contains extended versions of articles selected from the program of the 15th ACM Conference on Computer and Communications Security (CCS’08), which took place October 27 to 31, 2008 in Alexandria, Virginia (USA). This annual conference is a leading international forum for information-security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. Its mission is to promote and share novel research from academia, government, and industry covering all theoretical and practical aspects of computer security as well as case studies and implementation experiences. The selected articles represent the broad scope of the conference. Two articles focus primarily on what we can learn from novel and existing attacks on security, and the other two articles focus on the development of improved mechanisms to provide and assure security. The topics range from programming exploits to large network designs, from cryptographic advances to formal techniques to verify the use of cryptography in practical protocols. The four articles in this special issue were invited for submission from the fifty-one papers presented at CCS’08. These were selected from 280 papers submitted to the conference. The submissions to the special issue were required to contain at least 25% new material to differentiate the journal articles from the conference papers. All the journal submissions went through an additional thorough review process (the same review process as any submission to this journal) to further ensure their quality. The first article, “Return-Oriented Programming: Systems, Languages, and Applications” by Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, describes a technique to attack programs without injecting code by chaining instruction sequences already in a program’s address space. The technique they demonstrate challenges the assumption that preventing the introduction of malicious code can prevent malicious computation. The next article shows an advance on the defense side of program security. In “Verified Cryptographic Implementations for TLS”, Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zălinescu show how to develop a small functional implementation of TLS and then use novel and existing model-extraction and verification tools to provide security guarantees at both the symbolic and computational levels. The end result is the first automated verification of executable code using standard cryptographic assumptions. Next, Jan Camenisch and Thomas Gross, in their article “Efficient Attributes for Anonymous Credentials,” address a different aspect of cryptographic protocols, how to practically provide just the authorization needed. A novel approach permits much more efficient proofs of possession of even a large combination of attribute credentials. This makes it much more practical to anonymously show that one has needed attributes, for example, based on the set of credentials represented on a digital identity card or other computationally limited device. Finally Prateek Mittal and Nikita Borisov also examine anonymity, but for large networks rather than small devices. “Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems” analyzes the node lookup mechanisms in published systems. They show that robustness to active attacks can only be improved with an increased vulnerability to passive attacks, thus limiting the effectiveness of these approaches to scaling anonymous communication using peer-to-peer networks.","PeriodicalId":50912,"journal":{"name":"ACM Transactions on Information and System Security","volume":"19 1","pages":"1:1-1:2"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Guest Editorial: Special Issue on Computer and Communications Security\",\"authors\":\"P. Syverson, S. Jha\",\"doi\":\"10.1145/2133375.2133376\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This special issue contains extended versions of articles selected from the program of the 15th ACM Conference on Computer and Communications Security (CCS’08), which took place October 27 to 31, 2008 in Alexandria, Virginia (USA). This annual conference is a leading international forum for information-security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. Its mission is to promote and share novel research from academia, government, and industry covering all theoretical and practical aspects of computer security as well as case studies and implementation experiences. The selected articles represent the broad scope of the conference. Two articles focus primarily on what we can learn from novel and existing attacks on security, and the other two articles focus on the development of improved mechanisms to provide and assure security. The topics range from programming exploits to large network designs, from cryptographic advances to formal techniques to verify the use of cryptography in practical protocols. The four articles in this special issue were invited for submission from the fifty-one papers presented at CCS’08. These were selected from 280 papers submitted to the conference. The submissions to the special issue were required to contain at least 25% new material to differentiate the journal articles from the conference papers. All the journal submissions went through an additional thorough review process (the same review process as any submission to this journal) to further ensure their quality. The first article, “Return-Oriented Programming: Systems, Languages, and Applications” by Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, describes a technique to attack programs without injecting code by chaining instruction sequences already in a program’s address space. The technique they demonstrate challenges the assumption that preventing the introduction of malicious code can prevent malicious computation. The next article shows an advance on the defense side of program security. In “Verified Cryptographic Implementations for TLS”, Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zălinescu show how to develop a small functional implementation of TLS and then use novel and existing model-extraction and verification tools to provide security guarantees at both the symbolic and computational levels. The end result is the first automated verification of executable code using standard cryptographic assumptions. Next, Jan Camenisch and Thomas Gross, in their article “Efficient Attributes for Anonymous Credentials,” address a different aspect of cryptographic protocols, how to practically provide just the authorization needed. A novel approach permits much more efficient proofs of possession of even a large combination of attribute credentials. This makes it much more practical to anonymously show that one has needed attributes, for example, based on the set of credentials represented on a digital identity card or other computationally limited device. Finally Prateek Mittal and Nikita Borisov also examine anonymity, but for large networks rather than small devices. “Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems” analyzes the node lookup mechanisms in published systems. They show that robustness to active attacks can only be improved with an increased vulnerability to passive attacks, thus limiting the effectiveness of these approaches to scaling anonymous communication using peer-to-peer networks.\",\"PeriodicalId\":50912,\"journal\":{\"name\":\"ACM Transactions on Information and System Security\",\"volume\":\"19 1\",\"pages\":\"1:1-1:2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Transactions on Information and System Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2133375.2133376\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Information and System Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2133375.2133376","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 1

摘要

本特刊收录了2008年10月27日至31日在美国弗吉尼亚州亚历山大市举行的第15届ACM计算机与通信安全会议(CCS ' 08)的文章扩展版。这个年度会议是信息安全研究人员、从业人员、开发人员和用户探索前沿思想和成果、交流技术、工具和经验的主要国际论坛。它的使命是促进和分享来自学术界、政府和工业界的新颖研究,涵盖计算机安全的所有理论和实践方面,以及案例研究和实施经验。入选的文章代表了会议的广泛范围。两篇文章主要关注我们可以从新的和现有的安全攻击中学到什么,另外两篇文章关注改进机制的开发,以提供和确保安全性。主题范围从编程漏洞到大型网络设计,从密码学的进步到形式化技术,以验证密码学在实际协议中的使用。本期特刊的四篇文章是从CCS ' 08的51篇论文中挑选出来的。这些是从提交给会议的280篇论文中挑选出来的。特刊的投稿要求包含至少25%的新材料,以区分期刊文章和会议论文。所有提交的期刊都经过了额外的彻底审查过程(与任何提交给本期刊的审查过程相同),以进一步确保其质量。第一篇文章,“面向返回的编程:系统、语言和应用”,作者是Ryan Roemer、Erik Buchanan、Hovav shachham和Stefan Savage,描述了一种通过链接程序地址空间中的指令序列而不注入代码的攻击程序的技术。他们演示的技术挑战了防止恶意代码引入可以防止恶意计算的假设。下一篇文章将展示程序安全性防御方面的进展。在“已验证的TLS加密实现”一文中,Karthikeyan Bhargavan、Ricardo Corin、csamdric Fournet和Eugen zlinescu展示了如何开发一个小型的TLS功能实现,然后使用新的和现有的模型提取和验证工具在符号和计算层面提供安全保证。最终结果是使用标准加密假设对可执行代码进行第一次自动验证。接下来,Jan Camenisch和Thomas Gross在他们的文章“匿名凭证的有效属性”中讨论了加密协议的另一个方面,即如何实际地提供所需的授权。一种新颖的方法允许更有效地证明拥有甚至大量属性凭证的组合。这使得匿名显示需要的属性更加实际,例如,基于数字身份证或其他计算有限的设备上表示的凭据集。最后,Prateek Mittal和Nikita Borisov也研究了匿名性,但针对的是大型网络而不是小型设备。“结构化点对点匿名通信系统中的信息泄漏”分析了已发布系统中的节点查找机制。他们表明,主动攻击的鲁棒性只能通过增加被动攻击的脆弱性来提高,从而限制了这些方法使用点对点网络扩展匿名通信的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Guest Editorial: Special Issue on Computer and Communications Security
This special issue contains extended versions of articles selected from the program of the 15th ACM Conference on Computer and Communications Security (CCS’08), which took place October 27 to 31, 2008 in Alexandria, Virginia (USA). This annual conference is a leading international forum for information-security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. Its mission is to promote and share novel research from academia, government, and industry covering all theoretical and practical aspects of computer security as well as case studies and implementation experiences. The selected articles represent the broad scope of the conference. Two articles focus primarily on what we can learn from novel and existing attacks on security, and the other two articles focus on the development of improved mechanisms to provide and assure security. The topics range from programming exploits to large network designs, from cryptographic advances to formal techniques to verify the use of cryptography in practical protocols. The four articles in this special issue were invited for submission from the fifty-one papers presented at CCS’08. These were selected from 280 papers submitted to the conference. The submissions to the special issue were required to contain at least 25% new material to differentiate the journal articles from the conference papers. All the journal submissions went through an additional thorough review process (the same review process as any submission to this journal) to further ensure their quality. The first article, “Return-Oriented Programming: Systems, Languages, and Applications” by Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage, describes a technique to attack programs without injecting code by chaining instruction sequences already in a program’s address space. The technique they demonstrate challenges the assumption that preventing the introduction of malicious code can prevent malicious computation. The next article shows an advance on the defense side of program security. In “Verified Cryptographic Implementations for TLS”, Karthikeyan Bhargavan, Ricardo Corin, Cédric Fournet, and Eugen Zălinescu show how to develop a small functional implementation of TLS and then use novel and existing model-extraction and verification tools to provide security guarantees at both the symbolic and computational levels. The end result is the first automated verification of executable code using standard cryptographic assumptions. Next, Jan Camenisch and Thomas Gross, in their article “Efficient Attributes for Anonymous Credentials,” address a different aspect of cryptographic protocols, how to practically provide just the authorization needed. A novel approach permits much more efficient proofs of possession of even a large combination of attribute credentials. This makes it much more practical to anonymously show that one has needed attributes, for example, based on the set of credentials represented on a digital identity card or other computationally limited device. Finally Prateek Mittal and Nikita Borisov also examine anonymity, but for large networks rather than small devices. “Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems” analyzes the node lookup mechanisms in published systems. They show that robustness to active attacks can only be improved with an increased vulnerability to passive attacks, thus limiting the effectiveness of these approaches to scaling anonymous communication using peer-to-peer networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
ACM Transactions on Information and System Security
ACM Transactions on Information and System Security 工程技术-计算机:信息系统
CiteScore
4.50
自引率
0.00%
发文量
0
审稿时长
3.3 months
期刊介绍: ISSEC is a scholarly, scientific journal that publishes original research papers in all areas of information and system security, including technologies, systems, applications, and policies.
期刊最新文献
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics A New Framework for Privacy-Preserving Aggregation of Time-Series Data Behavioral Study of Users When Interacting with Active Honeytokens Model Checking Distributed Mandatory Access Control Policies Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure*
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1