INRIA Rennes Bretagne Atlantique jeremy fr
15 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

INRIA Rennes Bretagne Atlantique jeremy fr

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
15 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Niveau: Supérieur
Opacity and Abstractions Jeremy Dubreil INRIA Rennes - Bretagne Atlantique, Abstract. The opacity property characterises the absence of confidential infor- mation flow towards inquisitive attackers. Verifying opacity is well established for finite automata but is known to be not decidable for more expressive models like Turing machines or Petri nets. As a consequence, for a system dealing with confidential information, formally certifying its confidentiality may be impossi- ble, but attackers can still infer confidential information by approximating sys- tems' behaviours. Taking such attackers into account, we investigate the verifica- tion of opacity using abstraction techniques to compute executable counterexam- ples (attack scenarios). Considering a system and a predicate over its executions, attackers are modelled as semi-conservative decision process determining from observed traces the truth of that predicate. Moreover, we will show that the most precise the abstraction is, the most accurate(and then dangerous) the correspond- ing class of attackers will be. Consequently, when no attack scenario is detected on an approximate analysis, we know that this system is safe against all “less precise” attackers. Therefore, this can be used to provide a level of certification relative to the precision of abstractions. Introduction Ensuring the confidentiality of critical information stored on or transferred through computer systems has become one of the most challenging objectives of modern hard- ware and software design.

  • certification process

  • all ?

  • systems let

  • secrecy can

  • security breaches

  • purpose security properties

  • can infer

  • gain confidence since

  • expressive models like


Sujets

Informations

Publié par
Nombre de lectures 5
Langue English

Extrait

OpacityandAbstractionsJe´re´myDubreilINRIARennes-BretagneAtlantique,jeremy.dubreil@irisa.frAbstract.Theopacitypropertycharacterisestheabsenceofconfidentialinfor-mationflowtowardsinquisitiveattackers.VerifyingopacityiswellestablishedforfiniteautomatabutisknowntobenotdecidableformoreexpressivemodelslikeTuringmachinesorPetrinets.Asaconsequence,forasystemdealingwithconfidentialinformation,formallycertifyingitsconfidentialitymaybeimpossi-ble,butattackerscanstillinferconfidentialinformationbyapproximatingsys-tems’behaviours.Takingsuchattackersintoaccount,weinvestigatetheverifica-tionofopacityusingabstractiontechniquestocomputeexecutablecounterexam-ples(attackscenarios).Consideringasystemandapredicateoveritsexecutions,attackersaremodelledassemi-conservativedecisionprocessdeterminingfromobservedtracesthetruthofthatpredicate.Moreover,wewillshowthatthemostprecisetheabstractionis,themostaccurate(andthendangerous)thecorrespond-ingclassofattackerswillbe.Consequently,whennoattackscenarioisdetectedonanapproximateanalysis,weknowthatthissystemissafeagainstall“lessprecise”attackers.Therefore,thiscanbeusedtoprovidealevelofcertificationrelativetotheprecisionofabstractions.IntroductionEnsuringtheconfidentialityofcriticalinformationstoredonortransferredthroughcomputersystemshasbecomeoneofthemostchallengingobjectivesofmodernhard-wareandsoftwaredesign.InterconnectednetworkslikeInternetormobilephonesareopenbynatureandthenvulnerabletomaliciousattacker.Butinpractise,thelevelofsecurityisoftendeterminedbythequantityofknownandpublicvulnerabilities.Thisapproach,possiblyforgettingvulnerabilitiesthatareonlyknownbyamaliciousgroupofusers,isnotsatisfyingregardingthesignificantplaceofinformationtechnologiesinsomecriticalsectorslikemedicine,e-governmentorfinance.Forexample,largescalestealingofmedicalrecordsormassivemodificationofvotesone-votingsystemscanbeverydangerous.Then,thereshouldbenosecuritybreachesonsuchinfrastructures.Furthermore,securityofsystemsaloneisnotsufficient,theconfidenceusershaveintheirsecurityisalsoimperative.Indeed,evenifasystemhappenstobesecure,itiscru-cialforuserstoknowthatitissecure.Thissituationimpliesthedevelopmentofreliablemethodsforcertifyingtheabsenceofsecuritybreachesonsuchcriticalservices.Whenaserviceneedstokeepinformationsecret,formalcertificationisessentiallytheonlywaytogainconfidencesinceinformationflowattacksmaybehardtodetectandthedamagesintricatetorecover.Unfortunately,manualanalysisisveryexpensiveandre-quiresahighlevelofexpertise.Moreover,itsuchanalysisisoftenimpossibletoachieveinpractiseforlargeinfrastructures,especiallywhenupdatesareregularlyperformed.
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents