Catálogo de publicaciones - libros

Compartir en
redes sociales


On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (vol. # 4277): OTM Confederated International Conferences and Posters, AWeSOMe, CAMS,COMINF,IS,KSinBIT,MIOS-CIAO,MONET,OnToContent,ORM,PerSys,OTM Academ

Robert Meersman ; Zahir Tari ; Pilar Herrero (eds.)

En conferencia: OTM Confederated International Conferences "On the Move to Meaningful Internet Systems" (OTM) . Montpellier, France . October 29, 2006 - November 3, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-48269-7

ISBN electrónico

978-3-540-48272-7

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Reverse Engineering of Embedded Software Using Syntactic Pattern Recognition

Mike Fournigault; Pierre-Yvan Liardet; Yannick Teglia; Alain Trémeau; Frédérique Robert-Inacio

When a secure component executes sensitive operations, the information carried by the power consumption can be used to recover secret information. Many different techniques have been developped to recover this secret, but only few of them focus on the recovering of the executed code itself. Indeed, the code knowledge acquired through this step of Simple Power Analysis (SPA) can help to identify implementation weaknesses and to improve further kinds of attacks. In this paper we present a new approach improving the SPA based on a pattern recognition methodology, that can be used to automatically identify the processed instructions that leak through power consumption. We firstly process a geometrical classification with chosen instructions to enable the automatic identification of any sequence of instructions. Such an analysis is used to reverse general purpose code executions of a recent secure component.

Pp. 527-536

Disaster Coverable PKI Model Utilizing the Existing PKI Structure

Bo Man Kim; Kyu Young Choi; Dong Hoon Lee

A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service. Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it. It is significantly important for a CA to ensure its service to continue to operate properly by preparing for any disaster caused by a CA’s private key compromise no matter what the cause is.

In this paper, we provide the definitions of PKI disaster recovery and PKI business continuity, which are more clear and specific than ever before. We also present three requirements for a PKI model preparing for a disaster. Then we propose a PKI model that ensures business continuity in the event of a disaster in which a CA key is exposed. It is easily applied to the existing PKI structure. We stress that the proposed PKI model in this paper is the first to ensure both applicability to the existing models and business continuity in the event of a disaster.

Pp. 537-545

A Corporate Capital Protection and Assurance Model

Colette Reekie; Basie von Solms

This paper introduces the concept of Corporate Capital Protection Assurance. The authors provide a holistic Corporate Capital Protection Assurance model consisting of effective due diligence controls so that any organization regardless of its size or state of maturity can provide assurance to its members and stakeholders that all relevant ‘Corporate Capital’ (in the widest sense including aspects like intellectual capital, brand name, electronic assets, public opinion, trust, human capital, competitiveness etc) will be adequately protected. Corporate Capital Protection Assurance is more than information security protection of the confidentiality, integrity and availability of information. It includes the aspects mentioned above, as well as the policies, procedures, processes and human skills that must be protected. Therefore the authors have defined Corporate Capital Protection Assurance as the management commitment and leadership, with all the supporting people and structures all working together to provide for the adequate protection of the company’s Corporate Capital. Thus Corporate Capital Protection Assurance entails more than information security and information security governance. It includes for e.g. the protection of a digital forensic infrastructure, aspects relating to risk management, to business continuity planning and control, to the protection of human resource information, knowledge and human resource skills, as well as the protection of information relating to policy formulation and content. All of theses aspects need to be controlled in a formalized cohesive manner so that they are aligned with the overall business strategy and culture of the organization. This model will provide a consolidated view of all these above-mentioned types of corporate capital resources that cannot alone be protected by Information Security Governance controls and yet still require that require protection. Therefore this paper will provide a consolidated view of all these types of protection that should be provided by an organization, as well as provide a detailed exposition on the creation of and use of this Corporate Capital Protection Assurance model for organizations globally.

Pp. 546-553

Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach

Spyros T. Halkidis; Alexander Chatzigeorgiou; George Stephanides

The importance of Software Security has been evident, since it has been shown that most attacks to software systems are based on vulnerabilities caused by software poorly designed and developed. Furthermore, it has been discovered that it is desirable to embed security already at design phase. Therefore, patterns aiming at enhancing the security of a software system, called security patterns, have been suggested. The main target of this paper is to propose a mathematical model, based on fuzzy set theory, in order to quantify the security characteristics of systems using security patterns. In order to achieve this we first determine experimentally to what extent specific security patterns enhance several security aspects of systems. To determine this, we have developed two systems, one without security patterns and one containing them and have experimentally determined the level of the higher robustness to attacks of the latter. The proposed mathematical model follows.

Pp. 554-564

Managing Critical Information Infrastructure Security Compliance: A Standard Based Approach Using ISO/IEC 17799 and 27001

Wipul Jayawickrama

Information technology constitutes a substantial component of the critical infrastructure of many nations. Systems used by utilities and service industries such as electricity, water, wastewater treatment and gas are key components of these critical infrastructures. These critical infrastructures rely on a range of technologies commonly known as Process Control Systems in the production, distribution or management aspects of their services.

To ensure continued delivery of these critical services, it is important to ensure that the process control systems used to control, monitor and manage the infrastructure are secured against physical and cyber security threats. A number of information security standards have been defined by various industry and government regulatory bodies to provide guidance in securing process control systems. However, managing compliance to several standards can become an added administrative overhead to organizations.

This paper reviews the challenges in maintaining compliance with multiple standards and postulates that a holistic information security management system is required to ensure ongoing security of these process control systems. It proposes the implementation of international standards ISO/IEC 17799 and 27001 as a practical approach to managing the various compliance requirements and providing a framework to implement, monitor, manage and improve the security of process control systems.

Pp. 565-574

Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks

Cao Trong Hieu; Tran Thanh Dai; Choong Seon Hong; Jae-Jo Lee

Wireless PAN Mesh Network (WMN) is currently going to be standardized and enhanced to take full advantages of the flexible and heterogeneous networks. Although the standard (802.15.5) is under-construction, WMNs are expected to become popular as they have the ability to connect all kinds of current networks. So far, there is no applied architecture which is efficient enough to completely solve routing and security problems in WMN. To assist IEEE P805.15 in routing and security aspects, in this paper, we propose an adaptive algorithm for detecting bogus nodes when they attempt to intrude into the network by attacking routing protocol. In addition, a procedure to find the most optimal path between two nodes is presented along with adaptive pre-conditions for WMNs. We also show that our algorithm is robust according to the mobility of the nodes and it is easy to implement in currently proposed architectures. It can work with many kinds of wireless networks as well as can reduce computational costs.

Pp. 585-594

Secure and Seamless Handoff Scheme for a Wireless LAN System

Jaesung Park; Beomjoon Kim; Iksoon Hwang

IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLANs where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a seamless and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused only for the handoff session. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.

Pp. 595-604

A CAPTCHA in the Text Domain

Pablo Ximenes; André dos Santos; Marcial Fernandez; Joaquim Celestino

Research on CAPTCHA has led CAPTCHA design into adopting almost exclusively graphical implementations that deal mostly with character recognition. This has reached an exhaustion point, where new approaches are vital to the survival of the technique. This paper discusses the early stages of a research that intends to solve the open problem of a CAPTCHA in the text domain offering, this way, innovative research possibilities to the CAPTCHA paradigm. It is essentially an investigation on a CAPTCHA that draws its security from the cognitive and computational aspects behind phonetic punning riddles found on Knock-Knock Jokes. By the specification of a computational model, the implementation of a prototype and its experimentation with human individuals, it is shown that the proposal is indeed feasible and that studies in non conventional areas for Information Security are the key for developing the proposed goal.

Pp. 605-615

Examining the DoS Resistance of HIP

Suratose Tritilanunt; Colin Boyd; Ernest Foo; Juan Manuel González Nieto

We examine DoS resistance of the Host Identity Protocol (HIP) and discuss a technique to deny legitimate services. To demonstrate the experiment, we implement a formal model of HIP based on Timed Petri Nets and use a simulation approach provided in CPN Tools to achieve a formal analysis. By integrating adjustable puzzle difficulty, HIP can mitigate the effect of DoS attacks. However, the inability to protect against coordinated adversaries on a hash-based puzzle causes the responder to be susceptible to DoS attacks at the identity verification phase. As a result, we propose an enhanced approach by employing a time-lock puzzle instead of a hash-based scheme. Once the time-lock puzzle is adopted, the effect of coordinated attacks will be removed and the throughput from legitimate users will return to the desirable level.

Pp. 616-625

Privacy Friendly Information Disclosure

Steven Gevers; Bart De Decker

When using electronic services, people are often asked to provide personal information. This raises many privacy issues. To gain the trust of the user, service providers can use privacy policy languages such as P3P to declare the purpose and usage of this personal information. User agents can compare these policies to privacy preferences of a user and warn the user if his privacy is threatened. This paper extends two languages: P3P and APPEL. It makes it possible to refer to certified data and credentials. This allows service providers to define the minimal level of assurance. It is also shown how different ways of disclosure (exact, blurred, verifiably encrypted, ...) can be specified to achieve more privacy friendly policies. Last, the paper describes a privacy agent that makes use of the policies to automate privacy friendly information disclosure.

Pp. 636-646