No abstract available.
Message from the Program Chairs
Conference Committee
Some weaknesses of the TCB model
This paper summarizes the affirmative argument supporting the proposition that "the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to ...
Toward acceptable metrics of authentication
Abstract: Authentication using a path of trusted intermediaries, each able to authenticate the next one in the path, is a well-known technique for authenticating entities in a large-scale system. Recent work has extended this technique to include ...
An Authorization Scheme For Distributed Object Systems
This paper addresses the problem of distributed object system protection. A new authorization scheme is presented and described. It is based on the collaboration between a central authorization server and security kernels located on each site of the ...
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of ...
Anonymous Connections and Onion Routing
Onion Routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication ...
The design and implementation of a multilevel secure log manager
Abstract: This paper discusses the security issues involved in log management for a multilevel secure database system and presents a design and implementation of a prototype multilevel secure log manager. The main goal of a log manager is to provide ...
A secure and reliable bootstrap architecture
Abstract: In a computer system, the integrity of lower layers is typically treated as axiomatic by higher layers. Under the presumption that the hardware comprising the machine (the lowest layer) is valid, the integrity of a layer can be guaranteed if ...
An MBone Proxy for an Application Gateway Firewall
The Internet's multicast backbone (MBone) holds great potential for many organizations because it supports low-cost audio and video conferencing and carries live broadcasts of an increasing number of public interest events. MBone conferences are ...
Secure software architectures
Abstract: The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software ...
A general theory of security properties
Abstract: We present a general theory of possibilistic security properties. We show that we can express a security property as a predicate that is true of every set containing all the traces with the same low level event sequence. Given this security ...
Analyzing consistency of security policies
Abstract: We discuss the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifies what actions some agents are permitted, obliged or forbidden to perform ...
Ensuring assurance in mobile computing
Abstract: This paper introduces a panel discussion on establishing assurance evidence that mobile code applications perform as expected by the user, without the side effects that have been demonstrated as possible in constructed examples of malicious or ...
Filtering postures: local enforcement for global policies
A Abstract: When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will do so correctly. We introduce a simple language for expressing ...
Providing flexibility in information flow control for object oriented systems
Abstract: This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by ...
Automated analysis of cryptographic protocols using Mur/spl phi/
Abstract: A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) ...
How to Systematically Classify Computer Security Intrusions
This paper presents a classification of intrusions with respect to technique as well as to result. The taxonomy is intended to be a step on the road to an established taxonomy of intrusions for use in incident reporting, statistics, warning bulletins, ...
Surviving information warfare attacks on databases
Abstract: We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of ...
Execution monitoring of security-critical programs in distributed systems: a Specification-based approach
Abstract: We describe a specification-based approach to detect exploitations of vulnerabilities in security-critical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for ...
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery
Knowledge discovery in databases can be enhanced by introducing "catalytic relations" conveying external knowledge. The new information catalyzes database inference, manifesting latent channels. Catalytic inference is imprecise in nature, but the ...
Escort: securing Scout paths
Abstract: Scout is a communication oriented operating system that can be specialized for different information appliances. It uses paths as an explicit first class object to describe the flow of information through the system. Escort is the security ...
Analysis of a Denial of Service Attack on TCP
- Christoph L. Schuba,
- Ivan V. Krsul,
- Markus G. Kuhn,
- Eugene H. spafford,
- Aurobindo Sundaram,
- Diego Zamboni
This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source ...
Deniable password snatching: on the possibility of evasive electronic espionage
Abstract: Cryptovirology has recently been introduced as a means of mounting active viral attacks using public key cryptography. It has been shown to be a tool for extortion attacks and "electronic warfare", where attacks are mounted against information ...
Number theoretic attacks on secure password schemes
Abstract: Encrypted Key Exchange (EKE) (S. Bellovin and M. Merritt, 1992; 1993) allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secret key cryptography. EKE ...
Recommendations
The IEEE Security and Privacy Symposium Workshops
To bring the IEEE Symposium on Security and Privacy to a wider audience, IEEE Security & Privacy magazine's editorial board decided to devote one special issue each year to a reprise of selected symposium papers. This year, the special issue focuses on ...