The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

A Secure Architecture Design Based on Code Minimization and Application Isolation

CERIAS TR 2013-4
Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino
Download: PDF

With fast evolving attacks, using software patches for fixing software bugs is not enough as there are often considerable delays in their application to vulnerable systems and the attackers may find other vulnerabilities to exploit. A secure architecture design that provides robust protection against malware must be guided by strong security design principles. In this work, we propose a system design based on the security principles that aim at achieving isolation and reducing attack surface. Our design leverages multi-core architecture to enforce physical isolation between application processes so that a malicious or infected application is unable to affect other parts of the system. Further, we significantly reduce the software attack surface by executing each application on its own customized operating system image that is minimized to only contain code required by the given application.

Added 2013-07-15

BISTRO: Binary Component Extraction and Embedding for Software Security Applications

CERIAS TR 2013-3
Zhui Deng, Xiangyu Zhang, Dongyan Xu
Download: PDF

In software security and malware analysis, researchers often need to directly manipulate binary program—benign or malicious—without source code. A useful pair of binary manipulation primitives are binary functional component extraction and embedding, for extracting a functional component from a binary program and for embedding a functional component in a binary program, respectively. Such primitives are applicable to a wide range of security scenarios such as legacy program hardening, binary semantic patching, and malware function analysis. Unfortunately, existing binary rewriting techniques are inadequate to support binary function carving and embedding. In this paper, we present BISTRO, a system that supports these primitives without symbolic information, relocation information, or compiler support. BISTRO preserves functional correctness of both the extracted functional component and the stretched binary program (with the component embedded) by properly patching them using—interestingly—the same technique and algorithm. We have implemented an IDA Pro-based prototype of BISTRO and evaluated it using real-world Windows software. Our results show that BISTRO performs these primitives efficiently; Each stretched binary program only incurs small time and space overhead. Furthermore, we demonstrate BISTRO’s capabilities in various security applications.

Added 2013-06-17

Role Mining on Relational Data

CERIAS TR 2013-2
Zahid Pervaiz, Arif Ghafoor, Walid G. Aref
Download: PDF

Fine-grained access control for relational data defines user authorizations at the tuple level. Role Based Access Control (RBAC) has been proposed for relational data where roles are allowed access to tuples based on the authorized view defined by a selection predicate. During the last few years, extensive research has been conducted in the area of role engineering. The existing approaches for role engineering are top-down (using domain experts), bottom-up (role-mining), or a hybrid of both. However, no research has been conducted for role engineering in relational data. In this paper, we address this problem. The challenge is to extract an RBAC policy with authorized selection predicates for users given an existing tuple-level fine-grained access control policy. We formulate the problem for relational data, propose a role mining algorithm and conduct experimental evaluation. Experiments demonstrate that the proposed algorithm can achieve up to 400% improvement in performance for relational data as compared to existing role mining techniques.

Added 2013-03-11

Four Views on Security

Teemupekka Virtanen
Added 2013-01-30


Securing Cyberspace for the 44th Presidency

James R. Langevin, Michael T. McCaul, Scott Charney, Lt. General Harry Raduege
Added 2013-01-30

Federal Plan for Cyber Security and Information Assurance Research and Development

Interagency Working Group on Cyber Security and Information Assurance
Added 2013-01-30


An Information Security Meta-policy for Emergent Organizations

Richard Baskerville, Mikko Siponen
Added 2013-01-17


A Denial of Service and Some IPsec-implementations

M Muller, T Virtanen, J Arkko, Erricsson Finland
Added 2013-01-16

The Inevitable Pain of Software Development: Why There is No Silver Bullet

Daniel M. Berry

A variety of programming accidents, i.e., models, methods, artifacts, and tools, are examined to determine that each has a step that programmers find painful enough that they habitually avoid or postpone the step. This pain is generally where the programming accident meets requirements, the essence of software, and their relentless volatility. Hence, there is no silver bullet.

Added 2013-01-16


Privacy Preserving Context Aware Publish Subscribe Systems

CERIAS TR 2013-01
Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro Buchmann
Download: PDF

Publish/subscribe (pub/sub) systems support highly scalable, manyto- many communications among loosely coupled publishers and subscribers. Modern pub/sub systems perform message routing based on the message content and allow subscribers to receive messages related to their subscriptions and the current context. However, both content and context encode sensitive information which should be protected from third-party brokers that make routing decisions. In this work, we address this issue by proposing an approach for constructing a privacy preserving context-based pub/sub system. In particular, our approach assures the confidentiality of the messages being published and subscriptions being issued while allowing the brokers to make routing decisions without decrypting individual messages and subscriptions, and without learning the context. Further, subscribers with a frequently changing context such as location are able to issue and update subscriptions without revealing the subscriptions in plaintext to the broker and without the need to contact a trusted third party for each subscription change resulting from a change in the context. Our approach is based on a modified version of the Paillier additive homomorphic cryptosystem and a recent expressive group key management scheme. The former construct is used to perform privacy preserving matching and covering, and the latter construct is used to enforce fine-grained encryption based access control on the messages being published. We optimize our approach in order to efficiently handle frequently changing contexts. We have implemented our approach in a prototype using an industry strength JMS broker middleware. The experimental results show that our approach is highly practical.

Added 2013-01-15

Ensemble Classification for Relational Domains

CERIAS TR 2011-25
Hoda Eldardiry
Download: PDF
Added 2012-12-11