Scheduled System Maintenance
On Tuesday, September 25, IEEE Xplore will undergo scheduled maintenance from 1:00–5:00 pm ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004

12-12 May 2004

Filter Results

Displaying Results 1 - 25 of 27
  • Proceedings. 2004 IEEE Symposium on Security and Privacy

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (1226 KB)
    Freely Available from IEEE
  • Proceedings 2004 IEEE Symposium on Security and Privacy

    Publication Year: 2004, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (1260 KB)
    Freely Available from IEEE
  • Proceedings 2004 IEEE Symposium on Security and Privacy Copyright Page

    Publication Year: 2004, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (1259 KB)
    Freely Available from IEEE
  • Proceedings 2004 IEEE Symposium on Security and Privacy Table of contents

    Publication Year: 2004, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (1251 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2004, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (1245 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2004, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (1233 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2004, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (1236 KB)
    Freely Available from IEEE
  • Keyboard acoustic emanations

    Publication Year: 2004, Page(s):3 - 11
    Cited by:  Papers (67)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1469 KB) | HTML iconHTML

    We show that PC keyboards, notebook keyboards, telephone and ATM pads are vulnerable to attacks based on differentiating the sound emanated by different keys. Our attack employs a neural network to recognize the key being pressed. We also investigate why different keys produce different sounds and provide hints for the design of homophonic keyboards that would be resistant to this type of attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of mobility and multihoming on transport-protocol security

    Publication Year: 2004, Page(s):12 - 26
    Cited by:  Papers (9)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1507 KB) | HTML iconHTML

    The Stream Control Transmission Protocol (SCTP) is a reliable message-based transport protocol developed by the IETF that could replace TCP in some applications. SCTP allows endpoints to have multiple IP addresses for the purposes of fault tolerance. There is on-going work to extend the SCTP multihoming functions to support dynamic addressing and endpoint mobility. This paper explains how the mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of an electronic voting system

    Publication Year: 2004, Page(s):27 - 40
    Cited by:  Papers (105)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1443 KB) | HTML iconHTML

    With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access control by tracking shallow execution history

    Publication Year: 2004, Page(s):43 - 55
    Cited by:  Papers (30)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB) | HTML iconHTML

    Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered design of discretionary access controls with decidable safety properties

    Publication Year: 2004, Page(s):56 - 67
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    An access control design can be viewed as a three layered entity: the general access control model; the parameterization of the access control model; and the initial users and objects of the system before it goes live. The design of this three-tiered mechanism can be evaluated according to two broad measures, the expressiveness versus the complexity of the system. In particular, the question arise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symmetric encryption in automatic analyses for confidentiality against active adversaries

    Publication Year: 2004, Page(s):71 - 85
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1572 KB) | HTML iconHTML

    In this article we present a technique for static analysis, correct with respect to complexity-theoretic definitions of security, of cryptographic protocols for checking whether these protocols satisfy confidentiality properties. The approach is similar to Abadi and Rogaway - we define patterns for cryptographic protocols (they did it for formal expressions), such that the protocol is secure iff t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic proof of strong secrecy for security protocols

    Publication Year: 2004, Page(s):86 - 100
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1784 KB) | HTML iconHTML

    We present a new automatic technique for proving strong secrecy for security protocols. Strong secrecy means that an adversary cannot see any difference when the value of the secret changes. Our technique relies on an automatic translation of the protocol into Horn clauses, and a resolution algorithm on the clauses. It requires important extensions with respect to previous work for the proof of (s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical analysis of target-resident DoS filters

    Publication Year: 2004, Page(s):103 - 114
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1468 KB) | HTML iconHTML

    Numerous techniques have been proposed by which an end-system, subjected to a denial-of-service flood, filters the offending traffic. In this paper, we provide an empirical analysis of several such proposals, using traffic recorded at the border of a large network and including real DoS traffic. We focus our analysis on four filtering techniques, two based on the addresses from which the victim se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation

    Publication Year: 2004, Page(s):115 - 129
    Cited by:  Papers (33)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2522 KB) | HTML iconHTML

    Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service (DDoS) attacks. In this paper, we propose a novel packet logging based (i.e., hash-based) traceback scheme that requires an order of magnitude smaller processing and storage cost than the hash-based scheme proposed by Snoeren, et al. (2001), thereby being able to scalable t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks

    Publication Year: 2004, Page(s):130 - 143
    Cited by:  Papers (131)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1499 KB) | HTML iconHTML

    One of the fundamental limitations of the Internet is the inability of a packet flow recipient to halt disruptive flows before they consume the recipient's network link resources. Critical infrastructures and businesses alike are vulnerable to DoS attacks or flash-crowds that can incapacitate their networks with traffic floods. Unfortunately, current mechanisms require per-flow state at routers, I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety in automated trust negotiation

    Publication Year: 2004, Page(s):147 - 160
    Cited by:  Papers (46)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1483 KB) | HTML iconHTML

    Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as potentially sensitive resources, access to which is under policy control. Negotiations that correctly enf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing OLAP data cubes against privacy breaches

    Publication Year: 2004, Page(s):161 - 175
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1520 KB) | HTML iconHTML

    An OLAP (On-line Analytic Processing) system with insufficient security countermeasures may disclose sensitive information and breach an individual's privacy. Both unauthorized accesses and malicious inferences may lead to such inappropriate disclosures. Existing access control models in relational databases are unsuitable for the multi-dimensional data cubes used by OLAP. Inference control method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Run-time principals in information-flow type systems

    Publication Year: 2004, Page(s):179 - 193
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1541 KB) | HTML iconHTML

    Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiality and integrity policies. Such policies, however, are usually specified in term of static information-data is labeled high or low security at compile time. In practice, the confidentiality of data may depend on information available only while the system is running. This paper studies language supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing sensitivity in static analysis for intrusion detection

    Publication Year: 2004, Page(s):194 - 208
    Cited by:  Papers (20)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1498 KB) | HTML iconHTML

    A key function of a host-based intrusion detection system is to monitor program execution. Models constructed using static analysis have the highly desirable feature that they do not produce false alarms; however, they may still miss attacks. Prior work has shown a trade-off between efficiency and precision. In particular, the more accurate models based upon pushdown automata (PDA) are very ineffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast portscan detection using sequential hypothesis testing

    Publication Year: 2004, Page(s):211 - 225
    Cited by:  Papers (200)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1591 KB) | HTML iconHTML

    Attackers routinely perform random portscans of IP addresses to find vulnerable servers to compromise. Network intrusion detection systems (NIDS) attempt to detect such behavior and flag these portscanners as malicious. An important need in such systems is prompt response: the sooner a NIDS detects malice, the lower the resulting damage. At the same time, a NIDS should not falsely implicate benign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-the-fly verification of rateless erasure codes for efficient content distribution

    Publication Year: 2004, Page(s):226 - 240
    Cited by:  Papers (139)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1576 KB) | HTML iconHTML

    The quality of peer-to-peer content distribution can suffer when malicious participants intentionally corrupt content. Some systems using simple block-by-block downloading can verify blocks with traditional cryptographic signatures and hashes, but these techniques do not apply well to more elegant systems that use rateless erasure codes for efficient multicast transfers. This paper presents a prac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast authentication in fully adversarial networks

    Publication Year: 2004, Page(s):241 - 253
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1488 KB) | HTML iconHTML

    We study a general version of the multicast authentication problem where the underlying network, controlled by an adversary, may drop chosen packets, rearrange the order of the packets in an arbitrary way, and inject new packets into the transmitted stream. Prior work on the problem has focused on less general models, where random, rather than adversarially-selected packets may be dropped and alte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

    Publication Year: 2004, Page(s):259 - 271
    Cited by:  Papers (112)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1475 KB) | HTML iconHTML

    Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small numb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.