Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2021
Friendly Fire: Cross-app Interactions in IoT Platforms
ACM Transactions on Privacy and Security (TOPS), Volume 24, Issue 3Article No.: 16, Pages 1–40https://doi.org/10.1145/3444963IoT platforms enable users to connect various smart devices and online services via reactive apps running on the cloud. These apps, often developed by third-parties, perform simple computations on data triggered by external information sources and ...
- research-articleJuly 2017
Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores
ACM Transactions on Privacy and Security (TOPS), Volume 20, Issue 3Article No.: 8, Pages 1–30https://doi.org/10.1145/3079762Cloud services have turned remote computation into a commodity and enable convenient online collaboration. However, they require that clients fully trust the service provider in terms of confidentiality, integrity, and availability. Toward reducing this ...
- research-articleJuly 2015
Model Checking Distributed Mandatory Access Control Policies
ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 2Article No.: 6, Pages 1–25https://doi.org/10.1145/2785966This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting virtual machines. Specifically, we examine how local access control policies implemented in individual virtual machines and ...
- research-articleJune 2015
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
ACM Transactions on Information and System Security (TISSEC), Volume 18, Issue 1Article No.: 4, Pages 1–32https://doi.org/10.1145/2756550We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive set of ...
- research-articleApril 2015
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems
ACM Transactions on Information and System Security (TISSEC), Volume 17, Issue 4Article No.: 13, Pages 1–34https://doi.org/10.1145/2714565In this article, we propose Gatling, a framework that automatically finds performance attacks caused by insider attackers in large-scale message-passing distributed systems. In performance attacks, malicious nodes deviate from the protocol when sending ...
-
- research-articleNovember 2014
Know Your Enemy: Compromising Adversaries in Protocol Analysis
ACM Transactions on Information and System Security (TISSEC), Volume 17, Issue 2Article No.: 7, Pages 1–31https://doi.org/10.1145/2658996We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework’s rules can be combined to specify different ...
- research-articleDecember 2013
Secure and verifiable outsourcing of large-scale biometric computations
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 3Article No.: 11, Pages 1–33https://doi.org/10.1145/2535523Cloud computing services are becoming more prevalent and readily available today, bringing to us economies of scale and making large-scale computation feasible. Security and privacy considerations, however, stand in the way of fully utilizing the ...
- research-articleDecember 2013
Bringing java's wild native world under control
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 3Article No.: 9, Pages 1–28https://doi.org/10.1145/2535505For performance and for incorporating legacy libraries, many Java applications contain native-code components written in unsafe languages such as C and C++. Native-code components interoperate with Java components through the Java Native Interface (JNI)...
- research-articleSeptember 2013
Modelling Access Propagation in Dynamic Systems
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 2Article No.: 5, Pages 1–31https://doi.org/10.1145/2516951.2516952Access control is a critical feature of many systems, including networks of services, processes within a computer, and objects within a running process. The security consequences of a particular architecture or access control policy are often difficult ...
- research-articleJune 2013
Enforceable Security Policies Revisited
ACM Transactions on Information and System Security (TISSEC), Volume 16, Issue 1Article No.: 3, Pages 1–26https://doi.org/10.1145/2487222.2487225We revisit Schneider’s work on policy enforcement by execution monitoring. We overcome limitations of Schneider’s setting by distinguishing between system actions that are controllable by an enforcement mechanism and those actions that are only ...
- research-articleApril 2013
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 4Article No.: 18, Pages 1–28https://doi.org/10.1145/2445566.2445570Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to protect tens of thousands of resources, and there is a need for verification to ...
- research-articleNovember 2012
Probabilistic analysis of onion routing in a black-box model
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 3Article No.: 14, Pages 1–28https://doi.org/10.1145/2382448.2382452We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable (UC) framework that abstracts the essential properties of onion routing in the presence of an ...
- research-articleJuly 2012
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 2Article No.: 10, Pages 1–27https://doi.org/10.1145/2240276.2240281Runtime monitoring is an increasingly popular method to ensure the safe execution of untrusted codes. Monitors observe and transform the execution of these codes, responding when needed to correct or prevent a violation of a user-defined security ...
- research-articleMarch 2012
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 1Article No.: 5, Pages 1–28https://doi.org/10.1145/2133375.2133380We analyze information leaks in the lookup mechanisms of structured peer-to-peer (P2P) anonymous communication systems and how these leaks can be used to compromise anonymity. We show that the techniques used to combat active attacks on the lookup ...
- research-articleMarch 2012
Verified Cryptographic Implementations for TLS
ACM Transactions on Information and System Security (TISSEC), Volume 15, Issue 1Article No.: 3, Pages 1–32https://doi.org/10.1145/2133375.2133378We narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable code ...
- research-articleSeptember 2011
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM
ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 2Article No.: 19, Pages 1–28https://doi.org/10.1145/2019599.2019604Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software ...
- research-articleJune 2011
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1Article No.: 8, Pages 1–28https://doi.org/10.1145/1952982.1952990Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends prior access control logics that are based on “says” and “speaks for” operators. NAL enables authorization ...
- research-articleJune 2011
Authorization recycling in hierarchical RBAC systems
ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1Article No.: 3, Pages 1–29https://doi.org/10.1145/1952982.1952985As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance ...
- research-articleDecember 2010
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC), Volume 13, Issue 4Article No.: 38, Pages 1–34https://doi.org/10.1145/1880022.1880032Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all of the nodes in the network. Many of the proposed systems were designed ...
- research-articleDecember 2010
MPSS: Mobile Proactive Secret Sharing
ACM Transactions on Information and System Security (TISSEC), Volume 13, Issue 4Article No.: 34, Pages 1–32https://doi.org/10.1145/1880022.1880028This article describes MPSS, a new way to do proactive secret sharing. MPSS provides mobility: The group of nodes holding the shares of the secret can change at each resharing, which is essential in a long-lived system. MPSS additionally allows the ...