8-11 May 2005
Filter Results
-
[Cover]
Publication Year: 2005, Page(s): c1|
PDF (821 KB)
-
Proceedings. 2005 IEEE Symposium on Security and Privacy
Publication Year: 2005|
PDF (76 KB)
-
Table of contents
Publication Year: 2005, Page(s):v - vi|
PDF (38 KB)
-
Message from the Program Chairs
Publication Year: 2005, Page(s): vii -
Conference Organizers
Publication Year: 2005, Page(s): viii|
PDF (16 KB)
-
Program Committee
Publication Year: 2005, Page(s): ix|
PDF (18 KB)
-
Language-based generation and evaluation of NIDS signatures
Publication Year: 2005, Page(s):3 - 17
Cited by: Papers (13)We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated. Our methodology is based on two formal languages that describe different properties of a given attack. The first language, called a session signature, describes temporal relations between the attack events. The second, called an attack invariant, ... View full abstract»
-
Efficient intrusion detection using automaton inlining
Publication Year: 2005, Page(s):18 - 31
Cited by: Papers (17) | Patents (2)Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is detected is appealing, existing systems exhibit serious shortcomings in terms of accuracy and/or efficiency. To gain acceptance, a number of technic... View full abstract»
-
Semantics-aware malware detection
Publication Year: 2005, Page(s):32 - 46
Cited by: Papers (212) | Patents (33)A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern-matching approach (such as commercial virus scanners) are susceptible to obfuscations used by hackers. The fundamental deficiency in the pattern-matching approach to... View full abstract»
-
Distributed detection of node replication attacks in sensor networks
Publication Year: 2005, Page(s):49 - 63
Cited by: Papers (233) | Patents (1)The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks may have severe consequences; they may allow the adversary to corrupt network data or even disconnect ... View full abstract»
-
Detection of denial-of-message attacks on sensor network broadcasts
Publication Year: 2005, Page(s):64 - 78
Cited by: Papers (59)So far sensor network broadcast protocols assume a trustworthy environment. However in safety and mission-critical sensor networks this assumption may not be valid and some sensor nodes might be adversarial. In these environments, malicious sensor nodes can deprive other nodes from receiving a broadcast message. We call this attack a denial-of-message attack (DoM). In this paper we model and analy... View full abstract»
-
Distributed proving in access-control systems
Publication Year: 2005, Page(s):81 - 95
Cited by: Papers (19) | Patents (3)We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. (1992). We show analytically that our distributed proof-generation algorithm succeeds in assembling a proof whenever a centralized prover utilizing remote certificate retrieval would do so. In addition, we show empirically that ... View full abstract»
-
On safety in discretionary access control
Publication Year: 2005, Page(s):96 - 109
Cited by: Papers (4)An apparently prevailing myth is that safety is undecidable in discretionary access control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decidable. In this paper we dispel this myth. We argue that DAC should not be equated with the Harrison-Ruzzo-Ullman (1976) access matrix scheme, in which safety is undecidable. We present an efficient (running time cubic in i... View full abstract»
-
Seeing-is-believing: using camera phones for human-verifiable authentication
Publication Year: 2005, Page(s):110 - 124
Cited by: Papers (141) | Patents (38)Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze seeing-is-believing, a system that utilizes 2D barcodes and camera-telephones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual chan... View full abstract»
-
A generic attack on checksumming-based software tamper resistance
Publication Year: 2005, Page(s):127 - 138
Cited by: Papers (29) | Patents (4)Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002) have been promoted as an alternative to other software integrity verification techniques. Appealing aspects include the promise of being able to verify the integrity of software independent of the external support environment, ... View full abstract»
-
Towards constant bandwidth overhead integrity checking of untrusted data
Publication Year: 2005, Page(s):139 - 153
Cited by: Papers (14) | Patents (1)We present an adaptive tree-log scheme to improve the performance of checking the integrity of arbitrarily large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's execution... View full abstract»
-
BIND: a fine-grained attestation service for secure distributed systems
Publication Year: 2005, Page(s):154 - 168
Cited by: Papers (85) | Patents (10)In this paper we propose BIND (binding instructions and data), a fine-grained attestation service for securing distributed systems. Code attestation has recently received considerable attention in trusted computing. However, current code attestation technology is relatively immature. First, due to the great variability in software versions and configurations, verification of the hash is difficult.... View full abstract»
-
Relating symbolic and cryptographic secrecy
Publication Year: 2005, Page(s):171 - 182
Cited by: Papers (5)We investigate the relation between symbolic and cryptographic secrecy properties for cryptographic protocols. Symbolic secrecy of payload messages or exchanged keys is arguably the most important notion of secrecy shown with automated proof tools. It means that an adversary restricted to symbolic operations on terms can never get the entire considered object into its knowledge set. Cryptographic ... View full abstract»
-
Low-cost traffic analysis of Tor
Publication Year: 2005, Page(s):183 - 195
Cited by: Papers (129) | Patents (2)Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common tasks, such as Web browsing, but insecure against traffic-analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are be... View full abstract»
-
Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts
Publication Year: 2005, Page(s):196 - 207
Cited by: Papers (10) | Patents (1)We present two new approaches to improving the integrity of network broadcasts and multicasts with low storage and computation overhead. The first approach is a leapfrog linking protocol for securing the integrity of packets as they traverse a network during a broadcast, such as in the setup phase for link-state routing. This technique allows each router to gain confidence about the integrity of a... View full abstract»
-
Remote physical device fingerprinting
Publication Year: 2005, Page(s):211 - 225
Cited by: Papers (60) | Patents (16)We introduce the area of remote physical device fingerprinting, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation. We accomplish this goal by exploiting small, microscopic deviations in device hardware: clock skews. Our techniques do not require any modification to the fingerprinted devices... View full abstract»
-
Polygraph: automatically generating signatures for polymorphic worms
Publication Year: 2005, Page(s):226 - 241
Cited by: Papers (213) | Patents (115)It is widely believed that content-signature-based intrusion detection systems (IDS) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match polymorphic worms. Polygraph generates signatures that consist of multiple disjoint content substrings. In... View full abstract»
-
Worm origin identification using random moonwalks
Publication Year: 2005, Page(s):242 - 256
Cited by: Papers (14) | Patents (1)We propose a novel technique that can determine both the host responsible for originating a propagating worm attack and the set of attack flows that make up the initial stages of the attack tree via which the worm infected successive generations of victims. We argue that knowledge of both is important for combating worms: knowledge of the origin supports law enforcement, and knowledge of the causa... View full abstract»
-
Author index
Publication Year: 2005, Page(s): 257|
PDF (16 KB)