Information leakage via timing side-channel attacksis one of the main threats that target code executing on remoteplatforms such as the cloud computing environment. Theseattacks can be further leveraged to reverse-eng...
详细信息
Information leakage via timing side-channel attacksis one of the main threats that target code executing on remoteplatforms such as the cloud computing environment. Theseattacks can be further leveraged to reverse-engineer or eventamper with the running code. In this paper, we propose asecurity obfuscation technique, which helps making the generatedcode more resistant to these attacks, by means of increasinglogical complexity to hinder the formulation of a solid hypothesisabout code behavior. More importantly, this software solutionis portable, generic and does not require special setup orhardware or software modifications. In particular, we considermangling the control-flow inside a program via converting arandom set of conditional branches into linear code, using ifconversiontransformation. Moreover, our method exploits thedynamic compilation technology to continually and randomlyalter the branches. All of this mangling should diversify codeexecution, hence it becomes difficult for an attacker to infertiming correlations through statistical analysis. We extend theLLVM JIT compiler to provide for an initial investigation of thisapproach. This makes our system applicable to a wide varietyof programminglanguages and hardware platforms. We havestudied the system using a simple test program and selectedbenchmarks from the standard SPEC CPU 2006 suite withdifferent input loads and experimental setups. Initial results showsignificant changes in program's control-flow and hence datadependences, resulting in noticeable different execution timeseven for the same input data, thereby complicating such *** notably, the performance penalty is within reasonablemargins.
The proceedings contain 11 papers. The topics discussed include: Object capabilities for security;applying flow-sensitive CQUAL to verify MINIX authorization check placement;certified in-lined reference monitoring on ...
详细信息
ISBN:
(纸本)1595933743
The proceedings contain 11 papers. The topics discussed include: Object capabilities for security;applying flow-sensitive CQUAL to verify MINIX authorization check placement;certified in-lined reference monitoring on .NET;combining type-based analysis and model checking for finding counterexamples against non-interference;precise alias analysis for static detection of web application vulnerabilities;specifying distributed trust management in LolliMon;a microkernel virtual machine: building security with clear interfaces;empirical relation between coupling and attackability in software systems: a case study on DOS;trusted declassification: high-level policy for a security-typed language;refactoring programs to secure information flows;and efficient type inference for secure information flow.
The proceedings contain 36 papers. The topics discussed include: optimizing memory transactions;compiler and runtime support for efficient software transactional memory;better extensibility through modular syntax;fast...
详细信息
ISBN:
(纸本)1595933743
The proceedings contain 36 papers. The topics discussed include: optimizing memory transactions;compiler and runtime support for efficient software transactional memory;better extensibility through modular syntax;fast and flexible instruction selection with on-demand tree-parsing automata;a framework for unrestricted whole-program optimization;practical dynamic software updating for C;an experimental analysis of self-adjusting computation;shared memory programming for large scale machines;optimizing data permutations for SIMD devices;auto-vectorization of interleaved data for SIMD;pruning dynamic slices with confidence;context-sensitive domain-independent algorithm composition and selection;reducing NoC energy consumption through compiler-directed channel voltage scaling;a global progressive register allocator;and automatic instruction scheduler retargeting by reverse-engineering.
Software security has been traditionally enforced at the level of operating systems. However, operating systems have become increasingly large and complex, and it is very difficult-if not impossible-to enforce softwar...
详细信息
The proceedings contain 15 papers. The topics discussed include: implementation, compilation, optimization of object-oriented languages, programs and systems;aspects, dependencies, and interactions;formal techniques f...
详细信息
ISBN:
(纸本)9783540717720
The proceedings contain 15 papers. The topics discussed include: implementation, compilation, optimization of object-oriented languages, programs and systems;aspects, dependencies, and interactions;formal techniques for Java-like programs;program analysis for security and privacy;object-oriented reengineering;quantitative approaches in object-oriented software engineering;component-oriented programming;fractal component-based software engineering;object technology for ambient intelligence and pervasive computing: language constructs and infrastructures;parallel/high-performance object-oriented scientific computing today;and tenth workshop on pedagogies and tools for the teaching and learning of object oriented concepts.
International crime and terrorism have drawn increasing attention in recent years. Retrieving relevant information from criminal records and suspect communications is important in combating international crime and ter...
详细信息
International crime and terrorism have drawn increasing attention in recent years. Retrieving relevant information from criminal records and suspect communications is important in combating international crime and terrorism. However, most of this information is written in languages other than English and is stored in various locations. Information sharing between countries therefore presents the challenge of cross-lingual semantic interoperability. In this work, we propose a new approach - the associate constraint network - to generate a cross-lingual concept space from a parallel corpus, and benchmark it with a previously developed technique, the Hopfield network. The associate constraint network is a constraint programming based algorithm, and the problem of generating the cross-lingual concept space is formulated as a constraint satisfaction problem. Nodes and arcs in an associate constraint network represent extracted terms from parallel corpora and their associations. Constraints are defined for the nodes in the associate constraint network, and node consistency and network satisfaction are also defined. Backmarking is developed to search for a feasible solution. Our experimental results show that the associate constraint network outperforms the Hopfield network in precision, recall and efficiency. The cross-lingual concept space that is generated with this method can assist crime analysts to determine the relevance of criminals, crimes, locations and activities in multiple languages, which is information that is not available in traditional thesauri and dictionaries. (C) 2006 Elsevier B.V. All rights reserved.
The proceedings contain 17 papers. The topics discussed include: crafting a proof assistant;crafting a proof assistant;on constructive cut admissibility in deduction modulo;fast reflexive arithmetic tactics the linear...
详细信息
ISBN:
(纸本)9783540744634
The proceedings contain 17 papers. The topics discussed include: crafting a proof assistant;crafting a proof assistant;on constructive cut admissibility in deduction modulo;fast reflexive arithmetic tactics the linear case and beyond;combining de Bruijn indices and higher-order abstract syntax in Coq;deciding equality in the constructor theory;a formalisation of a dependently typed language as an inductive-recursive family;truth values algebras and proof normalization;curry-style types for nominal terms;constructive type classes in Isabelle;a finite first-order theory of classes;coinductive correctness of homographic and quadratic algorithms for exact real numbers;using intersection types for cost-analysis of higher-order polymorphic functional programs;subset coercions in COQ;and a certified distributed security logic for authorizing code.
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how refactoring programs into distinct compo...
详细信息
In this paper we propose a novel microkernel-based virtual machine (μKVM), a new code-based security framework with a simple and declarative security architecture. The main design goals of the μKVM are to put a clea...
详细信息
暂无评论