2010 International Conference on Availability, Reliability and Security最新文献

筛选
英文 中文
A Computer Architecture with Hardwarebased Malware Detection 基于硬件的恶意软件检测的计算机体系结构
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.39
Klaus Hildebrandt, Igor Podebrad, B. Klauer
{"title":"A Computer Architecture with Hardwarebased Malware Detection","authors":"Klaus Hildebrandt, Igor Podebrad, B. Klauer","doi":"10.1109/ARES.2010.39","DOIUrl":"https://doi.org/10.1109/ARES.2010.39","url":null,"abstract":"In the past the computer architetures and technologies have only been optimized for speed - never for security. The aspects of IT-security were always disregarded. [1] shows that it is possible to write malware that can not be detected or removed from an infected system by software. Stealth-features are possible by special properties of the x86 architecture. This work describes a general hardware architecture, that will improve the security.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132368205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet 在互联网上实现实际追溯的大规模示范实验
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.38
Ken Wakasa, H. Hazeyama, Toshifumi Kai, A. Hashiguchi, Masaya Yamagata, M. Fujinaga, Ryunosuke Ohshima, Takashi Shintani
{"title":"Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet","authors":"Ken Wakasa, H. Hazeyama, Toshifumi Kai, A. Hashiguchi, Masaya Yamagata, M. Fujinaga, Ryunosuke Ohshima, Takashi Shintani","doi":"10.1109/ARES.2010.38","DOIUrl":"https://doi.org/10.1109/ARES.2010.38","url":null,"abstract":"Recently, attacks involving source IP spoofing have become a critical issue for Internet security and operation from the viewpoint of ISP. Research and development into traceback systems that trace an end victim host to an end spoofing host via multiple ISPs is progressing. However, many difficult issues, including those that can't be resolved by IT technology alone, have prevented traceback systems from achieving widespread adoption. We had been researching issues of widespread traceback adoption since 2005, and resolved many challenges on a step-by-step basis. In 2006 we developed an operational model that provided a solution to the three cornered deadlock affecting traceback, which consisted of interrelated operational, legal and technical issues. In 2007 we constructed a three-layer traceback system. In 2008 we conducted a first of demonstration experiments with five ISPs, and found an efficient traceback deployment scenario applicable to Japan. In this paper, we introduce the results of large scale demonstration experiments conducted in 2009, and consider issues about system performance, operational efficiency, the management system’s validity, and system adaptability, all of which are necessary for our traceback system to achieve widespread adoption.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Architecture-Aware Adaptive Deployment of Contextual Security Policies 上下文安全策略的体系结构感知自适应部署
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.45
Stere Preda, N. Cuppens-Boulahia, F. Cuppens, L. Toutain
{"title":"Architecture-Aware Adaptive Deployment of Contextual Security Policies","authors":"Stere Preda, N. Cuppens-Boulahia, F. Cuppens, L. Toutain","doi":"10.1109/ARES.2010.45","DOIUrl":"https://doi.org/10.1109/ARES.2010.45","url":null,"abstract":"Abstract—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accurately evaluate the contexts viewed as constraints in which some security requirements are to be met. Dynamic or contextual requirements are problematic since they rely on specific functionalities which are not always available in the system or are even impossible to acquire given the current technologies. Therefore, it is essential to ensure that the contextual requirements are always managed and well deployed taking into account the existent functionalities in the system. We present a solution to cope with the following issue: ensuring that the contextual security requirements are always best deployed within the set of functionalities in the system.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysing and Visualising Security and Usability in IRIS IRIS的安全性和可用性分析与可视化
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.28
Shamal Faily, I. Flechais
{"title":"Analysing and Visualising Security and Usability in IRIS","authors":"Shamal Faily, I. Flechais","doi":"10.1109/ARES.2010.28","DOIUrl":"https://doi.org/10.1109/ARES.2010.28","url":null,"abstract":"Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a challenge. Balancing security and usability is difficult due to human biases in security perception, and managing the sheer volume of data arising from risk and task analysis. This paper presents an approach for qualitatively and quantitively analysing and visualising the results of risk and task analysis. We demonstrate this approach using a realistic example, and we discuss how these techniques fit within the larger context of secure systems design.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Continuous Authentication System Based on User Behavior Analysis 基于用户行为分析的连续认证系统
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.63
Ines Brosso, A. L. Neve, G. Bressan, W. Ruggiero
{"title":"A Continuous Authentication System Based on User Behavior Analysis","authors":"Ines Brosso, A. L. Neve, G. Bressan, W. Ruggiero","doi":"10.1109/ARES.2010.63","DOIUrl":"https://doi.org/10.1109/ARES.2010.63","url":null,"abstract":"This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users’ behavior analysis and Neuro-Fuzzy Logic. This system must be able to acquire information in context, making them into a computational environment. This information is the basis of user behavior. The System, based on the evidences of the behavior, establishes if it can trust the user or not. According to the user behavior, levels of trust are released, to access the application software. Weights are attributed in the fuzzyfication process, according to the rules that were previously established for the parameters which help to establish the evidences of behavioral trust, in its different degrees. The neuro-fuzzy logic allows that the user behavioral database be continuously updated, interacting with the fuzzyfication mechanism, so as to keep trust levels updated according to the user behavior, in a more accurate and faithful way.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Rejuvenating High Available Virtualized Systems 恢复高可用性虚拟化系统
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.69
Arash Rezaei, M. Sharifi
{"title":"Rejuvenating High Available Virtualized Systems","authors":"Arash Rezaei, M. Sharifi","doi":"10.1109/ARES.2010.69","DOIUrl":"https://doi.org/10.1109/ARES.2010.69","url":null,"abstract":"Virtualization technology in the form of server consolidation makes running of hot-standby replicas on one system possible, while software rejuvenation provides proactive recovery of failure. Both technologies have been used to make systems more dependable. However, the deployment of rejuvenation in virtualized systems had been limited only to virtual machines (VMs) or only to virtual machine monitors (VMMs), requiring changes to applications too. We propose a new rejuvenation technique for high available virtualized systems that is applied at both VM and VMM levels and yet it does not require any modifications to applications. Our proposition leverages the encapsulation of an application into a VM using this new combinatory rejuvenation technique that uses a time-based policy for VMM and a prediction-based policy for VMs. To demonstrate how much it can improve system availability, the stochastic reward net-based models of a typical virtualized consolidated server in cases of using a prediction-based policy, using a time-based policy, and using the proposed rejuvenation technique are presented and compared. We show that our method has higher system availability and lower downtime cost.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115675756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project 从安全目标建模中获得的实践经验:在工业项目中使用sgi
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.12
Christian Jung, Frank Elberzhager, A. Bagnato, Fabio Raiteri
{"title":"Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project","authors":"Christian Jung, Frank Elberzhager, A. Bagnato, Fabio Raiteri","doi":"10.1109/ARES.2010.12","DOIUrl":"https://doi.org/10.1109/ARES.2010.12","url":null,"abstract":"Security inspections, especially in the early development stage, are becoming increasingly important for bringing security-relevant aspects into software systems. Nowadays, such inspections often do not focus in detail on security. The well-known and approved benefits of inspections do not exploit their full potential regarding security. Thus, we have developed the Security Goal Indicator Tree (SGIT) for eliminating existing shortcomings. SGITs are a new approach for modeling and checking security-relevant aspects during the entire software development lifecycle. This article describes the modeling of such security-goal-based trees as part of requirements engineering. Initial experience was gathered from creating SGITs in an industrial environment. After the probands of our industry partner received training on existing security models, the necessary knowledge for creating security models was collected and applied. This resulted in three context-specific SGITs discussed in this article.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116660263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI) 基于Java虚拟机接口(JVMTI)的信息流控制
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.75
J. Howarth, I. Altas, B. Dalgarno
{"title":"Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI)","authors":"J. Howarth, I. Altas, B. Dalgarno","doi":"10.1109/ARES.2010.75","DOIUrl":"https://doi.org/10.1109/ARES.2010.75","url":null,"abstract":"e present an information flow control (IFC) Early attempts at preserving confidentiality in a computer system which monitors information leakage in single-threaded system relied on the use of an access control matrix to Java programs. Our implementation uses the Java Virtual identify the access rights an individual (or subject) had over Machine Tool Interface (JVMTI) and adapts the algorithms of a particular resource. But there is a problem with this Le Guernic et al. [1] for this purpose. We also offer a generic approach. The access rights that appear in the matrix only rule set for enforcing IFC. One advantage of our approach is control initial access to the resource. Once the resource is that it is dynamic, so that we are only concerned with the released from its access container there are no restrictions on security of the current execution of a program, not all possible its use. The mandatory access control (MAC) model was executions. Our system tracks flow at the level of primitive designed to prevent this type of abuse by removing the Java fields, allowing precise control over the information that ability of an arbitrary user to pass on permissions from the is monitored. Further, no modifications to the Java Virtual Machine (JVM) are needed for our system to work.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128253167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Challenging IS and ISM Standardization for Business Benefits 为企业利益挑战信息系统和管理系统标准化
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.113
J. Anttila, J. Kajava
{"title":"Challenging IS and ISM Standardization for Business Benefits","authors":"J. Anttila, J. Kajava","doi":"10.1109/ARES.2010.113","DOIUrl":"https://doi.org/10.1109/ARES.2010.113","url":null,"abstract":"This paper deals with challenges of the Information Security (IS) and Information Security Management (ISM) standards and their beneficial use in organizations. Emphasis is in the standardization within the committee ISO/IEC JTC1/SC27 and in its management standardization. It is also considered ISM standards’ complicated links with many other management standards. Principles, concepts and definitions are not considered consistently in the ISM standards. ISM standards use the recognized business management models very superficially. Standards do not make clear relations between ISM and Information Security Assurance (ISA). A real crisis in the ISM standardization is that it has no innovative solutions for modern business environments that emphasize speed, changes, agility, and complexity.The situational knowledge for the paper is based on worldwide observations by the authors through collaboration with many different contexts, organizations and expert networks. The paper provides a practical business-dedicated approach to the issue and brings together a business practitioner and an information security researcher knowing by long-standing experiences the real difficulties and possibilities in organizations. Recognized researchers have been referred for the links to sound multifaceted theoretical foundations.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134438076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recovery of Skype Application Activity Data from Physical Memory 从物理内存中恢复Skype应用程序活动数据
2010 International Conference on Availability, Reliability and Security Pub Date : 2010-03-25 DOI: 10.1109/ARES.2010.73
Matthew Simon, J. Slay
{"title":"Recovery of Skype Application Activity Data from Physical Memory","authors":"Matthew Simon, J. Slay","doi":"10.1109/ARES.2010.73","DOIUrl":"https://doi.org/10.1109/ARES.2010.73","url":null,"abstract":"The use of Internet based communication technologies has become more prevalent in recent years. Technologies such as Skype provide a highly secure and decentralised method of communication. These technologies may also leave little evidence on static media causing conventional digital forensic processes to be ineffective. This research looks at exploiting physical memory to recover evidence from Internet based communication technologies where conventional methods cannot. The paper first proposes a set of generic target artefacts that defines information that may be targeted for recovery and the meaning that can be inferred from this. A controlled test was then undertaken where Skype was executed and the memory from the target machine collected. The analysis showed that it is feasible to recover the target data as applied to Skype, which would not be otherwise available. As this is the first set of tests of a series, the future direction is also discussed.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信