the Bluetooth wireless technology realizes a low-cost short-range wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement...
详细信息
ISBN:
(纸本)3540372466
the Bluetooth wireless technology realizes a low-cost short-range wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement protocol, which is the most critical part of this security architecture. Several security flaws have been identified within the Bluetooth protocols: an attacker can track users by monitoring the Bluetooth hardware address, all keys depend on a low-entropy shared secret (the PIN), there are some very easy to perform Denial of Service attacks. We propose a new initialization mechanism for the key agreement protocol of Bluetooth. this improved pairing protocol can be easily extended so that it will not only solve the dependency of the keys on the PIN, but also the location privacy problem and an important Denial of Service attack. Our solution is user friendly and energy-efficient, two essential features for Wireless Personal Area Networks (WPAN).
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about executable files? Can these files also be ...
详细信息
ISBN:
(纸本)1595933158
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about executable files? Can these files also be statically checked for security weaknesses such as buffer overflows? We have created a methodology that uses information located in the headers, sections, and tables of a Windows NT/XP executable file, along with information derived from the overall contents of the file, as a means to detect specific anomalies and software security vulnerabilities without having to disassemble the code. In addition, we have instantiated this methodology in a software utility program called findssv that automatically performs this static analysis. We tested findssv on six categories of files: executable installation files, software development files, Windows XP operating system files, Microsoft application files, security-centric applications files, and miscellaneous application files. through the test results on over 2700 files, we show that findssv can detect 1) inconsistent table sizes, 2) large zero-filled regions of bytes, 3) unknown regions of bytes, 4) compressed files placed in a file, 5) sections that are both writable and executable, and 6) the use of functions susceptible to buffer overflow attacks. We also identify key vulnerability findings about the software in the six categories. Copyright 2006 acm.
Withthe development of the networked storage and its application, the SNMNS (storage network merging NAS and SAN) came into being, which has such advantages as high performance, low cost, good connectivity and so on....
详细信息
ISBN:
(纸本)1424400600
Withthe development of the networked storage and its application, the SNMNS (storage network merging NAS and SAN) came into being, which has such advantages as high performance, low cost, good connectivity and so on. But the security issue has become more complicated, because the SNMNS serves the block I/O requests and the file I/O requests at the same time. In that paper, we have developed a security system module used to the SNMNS to prevent it from many types of attacks. this module not only uses effective authentication to keep data of the system from being obtained by unauthorized users, but also offers data integrality checking and user authentication. the experimental results have shown that the security module not only can guard against both remote attacks and those who gain physical access to the SNMNS, but also can be seamlessly integrated into underlying file systems, with little influence on their performance.
Location based service (LBS) is emerging as a killer application in mobile data services thanks to the rapid development in wireless communication and location positioning technologies. Users with location-aware wirel...
详细信息
In this paper we present a tool for browsing "semantically connected" datathat the user has collected (or subscribed to) from multiple sources. By allowing customized views of the data, our tool can be seen...
详细信息
In this paper we present a tool for browsing "semantically connected" datathat the user has collected (or subscribed to) from multiple sources. By allowing customized views of the data, our tool can be seen as an application platform for data-oriented applications. the view of the data can be customized based on the data itself (e.g., it can depend on specific datatypes);additionally, it can also vary based on the user's current "context" as well as any enforced policies (access, privacy, etc.). Our tool can be used to form spontaneous collaborations between mobile devices and their users by providing a personalized and localized view of the integrated semantic data from multiple users. Browsing semantic data on a mobile device also adds interesting dimensions to the scenario: A mobile device has a wealth of information about its user, and it also has data available for determining the user's context. the dynamic nature of mobile environments presents certain challenges as other devices can appear or disappear without forewarning. the physical proximity of local services and actors will also offer opportunities for, say, new ways of establishing trust between systems. We present some usage scenarios that make use of our system and the representation formalism (RDF++, an extension of RDF) that it employs.
Grid is a new technology which implements flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. Unlike in conventional network systems, the services and ...
详细信息
ISBN:
(纸本)1424400600
Grid is a new technology which implements flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. Unlike in conventional network systems, the services and resources in Grid are heterogeneous and dynamic, they also belong to different domains. So the intrusion detection system (IDS) for Grid should be a system which could rapidly and dynamically integrate the related node detection resources of a Grid Computing application according to the dynamic detection demand and ensure the security of Grid Computing. Conventional network IDS lack the necessary flexibility needed by Grid environment and could not dynamically adjust their structure to the dynamic Grid Computing applications. this paper provides a new flexible multi-agent approach to intrusion detection for Grid (MAIDG). MAIDG not only takes advantage of the flexibility and autonomy of agent technology, but also makes good use of the Globus Toolkit4.0 (GT4)'s data management components which provide the virtual interfaces for all the (heterogeneous or homogeneous) detection resources and realize the publication, location, and high performance transfer of detection data. In a word, this paper provides a new ideal and way to realize the intrusion detection system for Grid.
Recent work [27, 15] introduced a novel peer-to-peer applicationthat leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. this application poses interesting challen...
详细信息
ISBN:
(纸本)1595932267
Recent work [27, 15] introduced a novel peer-to-peer applicationthat leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. this application poses interesting challenges in preserving privacy of user configuration data and in maintaining integrity of troubleshooting results. In this paper, we provide a much more rigorous cryptographic and yet practical solution for preserving privacy, and we investigate and analyze solutions for ensuring integrity. Copyright 2005 acm.
In today information society, privacy protection has become a very important concern. In this paper we research the inference problems due to functional dependencies (FD) and multi-valued dependencies (MVD) in multile...
详细信息
ISBN:
(纸本)076952432X
In today information society, privacy protection has become a very important concern. In this paper we research the inference problems due to functional dependencies (FD) and multi-valued dependencies (MVD) in multilevel secure database (MLS) with element classification instances. To deal withthe secure problem brought by inference channels we present our FD and MVD based inference control algorithms working on the finest-grained data level which greatly improve the availability of data and minimize the information loss.
this paper reports on identification needs within a UK secondary school environment. the motivation behind the final biometric enabled system choice is discussed and a system design is presented. How the system will o...
详细信息
ISBN:
(纸本)1905305001
this paper reports on identification needs within a UK secondary school environment. the motivation behind the final biometric enabled system choice is discussed and a system design is presented. How the system will operate is portrayed using a typical school day for user groups (Students, Teachers, Administration and Parents). As enrolment for the system is non-mandatory, privacy concerns for user groups influence acceptability of the system. the paper discusses legal protections which help form the parameters of the system design and recommends further management policies that will enhance usability for each user group.
Information Discovery and Analysis Systems (IDAS) are designed to correlate multiple sources of data and use data mining techniques to identify potential significant events. application domains for IDAS are numerous a...
详细信息
Information Discovery and Analysis Systems (IDAS) are designed to correlate multiple sources of data and use data mining techniques to identify potential significant events. application domains for IDAS are numerous and include the emerging area of homeland security. Developing test cases for an IDAS requires background data sets into which hypothetical future scenarios can be overlaid. the IDAS can then be measured in terms of false positive and false negative error rates. Obtaining the test data sets can be an obstacle due to bothprivacy issues and also the time and cost associated with collecting a diverse set of data sources. In this paper, we give an overview of the design and architecture of an IDAS data Set Generator (IDSG) that enables a fast and comprehensive test of an IDAS. the IDSG generates data using statistical and rule-based algorithms and also semantic graphs that represent interdependencies between attributes. A credit card transaction application is used to illustrate the approach. Copyright 2005acm.
暂无评论