18th Annual Computer Security Applications Conference, 2002. Proceedings.

9-13 Dec. 2002

Filter Results

Displaying Results 1 - 25 of 44
  • Proceedings 18th Annual Computer Security Applications Conference

    Publication Year: 2002
    Request permission for reuse | PDF file iconPDF (322 KB)
    Freely Available from IEEE
  • GOSSIB vs. IP traceback rumors

    Publication Year: 2002, Page(s):5 - 13
    Cited by:  Papers (17)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking (PPM) have received most attention, as they are easy to implement and deploy incrementally. We introduce a new concept, namely Groups Of Strongly SImilar Birthdays (GOSSIB), that can be used by to obtain effects similar to a succes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composable tools for network discovery and security analysis

    Publication Year: 2002, Page(s):14 - 24
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network mapping tools. These tools rely on models to represent the entities of interest, and they leverage off network discovery techniques to populate the model structure with the data that is pertinent to a specific target netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representing TCP/IP connectivity for topological analysis of network security

    Publication Year: 2002, Page(s):25 - 31
    Cited by:  Papers (30)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2338 KB) | HTML iconHTML

    The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently available tools report vulnerabilities in isolation and in the context of individual hosts in a network. Topological vulnerability analysis (TVA) extends this by searching for sequences of interdependent vulnerabilities, distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulating e-commerce through certified contracts

    Publication Year: 2002, Page(s):35 - 43
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Access control has traditionally assumed a single, monolithic authorization policy, generally expressed as an access matrix. We argue that this assumption does not fit e-commerce applications, which are governed by a potentially large set of independently stated, evolving contracts. In order to support this growing class of applications we propose an enforcement mechanism which uses certified-cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • With gaming technology towards secure user interfaces

    Publication Year: 2002, Page(s):44 - 50
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a game-friendly platform. However, this kind of programming interfaces can be used to promote security as well. We use Microsoft's DirectX platform to access input and output devices directly. Thereby we enable applications to distinguish be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Web usage of credit cards using One-Time Pad cookie encryption

    Publication Year: 2002, Page(s):51 - 58
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding all these data in a central database of the Web sites would attract hackers' attacks, impose unnecessary liability on the merchant Web sites, and raise the customers' privacy concerns. We introduce and discuss in detail the sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throttling viruses: restricting propagation to defeat malicious mobile code

    Publication Year: 2002, Page(s):61 - 68
    Cited by:  Papers (94)  |  Patents (45)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to restricting this high speed propagation automatically. The approach is based on the observation that during virus propagation, an infected machine will connect to as many different machines as fast as possible. An uninfec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing resource bound safety for mobile SNMP agents

    Publication Year: 2002, Page(s):69 - 77
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology limit its acceptance in practice. A key issue is to safeguard resource usage abuse by malicious or buggy mobile agents on the hosting system. This paper describes how the TINMAN architecture, a framework and a suite of tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of Internet location management

    Publication Year: 2002, Page(s):78 - 87
    Cited by:  Papers (11)  |  Patents (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this location information must be authenticated. This paper discusses several threats created by location management that go beyond unauthentic location data. In particular, the attacker can redirect data to bomb third parties and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless security: vulnerabilities and countermeasures

    Publication Year: 2002, Page(s): 91
    Cited by:  Papers (1)
    Request permission for reuse | PDF file iconPDF (266 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LOCK: an historical perspective

    Publication Year: 2002, Page(s):96 - 108
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    LOCK is an advanced development of hardware-based computer security and crypto-graphic service modules. Much of the design and some of the implementation specifications are complete. The Formal Top Level Specification (FTLS) also is complete and the advanced noninterference proofs are beginning. This hardware-based approach has brought the LOCK project into many uncharted areas in the design, veri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical approach to identifying storage and timing channels: twenty years later

    Publication Year: 2002, Page(s):109 - 118
    Cited by:  Papers (17)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared memory and process signals. Unfortunately, in practice one finds that computer systems are built such that users are not limited to communicating only through the intended communication channels. As a result, a well-founded... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thirty years later: lessons from the Multics security evaluation

    Publication Year: 2002, Page(s):119 - 126
    Cited by:  Papers (22)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and current) computer systems. Considerably more important than any of the individual design and implementation flaws was the demonstration of subversion of the protection mechanism using malicious software (e.g., trap doors an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multics security evaluation: vulnerability analysis

    Publication Year: 2002, Page(s):127 - 146
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A security evaluation of Multics for potential use as a two-level (Secret/Top Secret) system in the Air Force Data Services Center (AFDSC) is presented. An overview is provided of the present implementation of the Multics Security controls. The report then details the results of a penetration exercise of Multics on the HIS 645 computer. In addition, preliminary results of a penetration exercise of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled physical random functions

    Publication Year: 2002, Page(s):149 - 160
    Cited by:  Papers (132)  |  Patents (83)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    A physical random function (PUF) is a random function that can only be evaluated with the help of a complex physical system. We introduce controlled physical random functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way. CPUFs can be used to establish a shared secret between a physical device and a remote user. We prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security architecture for object-based distributed systems

    Publication Year: 2002, Page(s):161 - 171
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure directory service based on exclusive encryption

    Publication Year: 2002, Page(s):172 - 182
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    We describe the design of a Windows file-system directory service that ensures the persistence, integrity, privacy, syntactic legality, and case-insensitive uniqueness of the names it indexes. Byzantine state replication provides persistence and integrity, and encryption imparts privacy. To enforce Windows' baroque name syntax - including restrictions on allowable characters, on the terminal chara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Penetration testing: a duet

    Publication Year: 2002, Page(s):185 - 195
    Cited by:  Papers (16)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3059 KB) | HTML iconHTML

    Penetration testing is the art of finding an open door. It is not a science as science depends on falsifiable hypotheses. The most penetration testing can hope for is to be the science of insecurity - not the science of security nasmuch as penetration testing can at most prove insecurity by falsifying the hypothesis that any system, network, or application is secure. To be a science of security wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting data from malicious software

    Publication Year: 2002, Page(s):199 - 208
    Cited by:  Papers (8)  |  Patents (113)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target files that are likely to contain important user data. Researchers have approached this problem by developing techniques for restricting access to resources on an application-by-application basis. These so-called "sandbox en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safe virtual execution using software dynamic translation

    Publication Year: 2002, Page(s):209 - 218
    Cited by:  Papers (21)  |  Patents (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing system resources, thereby giving the host the ability to control how individual resources may be used. SVE is used in a variety, of safety-conscious software systems, including the Java Virtual Machine (JVM), software fau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digging for worms, fishing for answers

    Publication Year: 2002, Page(s):219 - 226
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Worms continue to be a leading security threat on the Internet. This paper analyzes several of the more widespread worms and develops a general life-cycle for them. The lifecycle, from the point of view of the victim host, consists of four stages: target selection, exploitation, infection, and propagation. While not all worms fall into this framework perfectly, by understanding them in this way, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for organisational control principles

    Publication Year: 2002, Page(s):229 - 238
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Organisational control principles, such as those expressed in the separation of duties, supervision, review and delegation, support the main business goals and activities of an organisation. Some of these principles have previously been described and analysed within the context of role- and policy-based distributed systems, but little has been done with respect to the more general context they are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusable components for developing security-aware applications

    Publication Year: 2002, Page(s):239 - 248
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2786 KB) | HTML iconHTML

    Today, security is considered to be an important aspect of multi-tier application development. Thoroughly researched concepts for access control exist and have been proven in mainframe computing. However, they are often not used in today's development of multi-tier applications. One reason may be the lack of appropriate reusable components that support application developers that frequently have t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A context-aware security architecture for emerging applications

    Publication Year: 2002, Page(s):249 - 258
    Cited by:  Papers (65)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of security-relevant "context" to provide flexible access control and policy enforcement. We previously presented a generalized access control model that makes significant use of contextual information in policy definition. This do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.