11 research outputs found
Alloy experiments for a least privilege separation kernel
A least privilege separation kernel (LPSK) is part of a long-term project known as the Trusted Computing Exemplar (TCX). A major objective of the TCX is the creation of an open framework for high assurance development. A relatively new specification tool called Alloy has shown potential for high assurance development. We implemented the formal security policy model (FSPM) and the formal top level specification (FTLS) of the TCX LPSK in Alloy and concluded that Alloy has few limitations and is more than sufficiently useful, as measured by utility and ease of use, to include in the TCX framework.http://archive.org/details/alloyexperiments109453390Civilian author.Approved for public release; distribution is unlimited
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of the communications between clients and servers. Following Snowden's revelations on US surveillance programs, the adoption of TLS has steadily increased. However, encrypted traffic prevents legitimate inspection. Therefore, security solutions such as personal antiviruses and enterprise firewalls may intercept encrypted connections in search for malicious or unauthorized content. Therefore, the end-to-end property of TLS is broken by these TLS proxies (a.k.a. middleboxes) for arguably laudable reasons; yet, may pose a security risk. While TLS clients and servers have been analyzed to some extent, such proxies have remained unexplored until recently. We propose a framework for analyzing client-end TLS proxies, and apply it to 14 consumer antivirus and parental control applications as they break end-to-end TLS connections. Overall, the security of TLS connections was systematically worsened compared to the guarantees provided by modern browsers. Next, we aim at exploring the non-public HTTPS ecosystem, composed of locally-trusted proxy-issued certificates, from the user's perspective and from several countries in residential and enterprise settings. We focus our analysis on the long tail of interception events. We characterize the customers of network appliances, ranging from small/medium businesses and institutes to hospitals, hotels, resorts, insurance companies, and government agencies. We also discover regional cases of traffic interception malware/adware that mostly rely on the same Software Development Kit (i.e., NetFilter). Our scanning and analysis techniques allow us to identify more middleboxes and intercepting apps than previously found from privileged server vantages looking at billions of connections. We further perform a longitudinal study over six years of the evolution of a prominent traffic-intercepting adware found in our dataset: Wajam. We expose the TLS interception techniques it has used and the weaknesses it has introduced on hundreds of millions of user devices. This study also (re)opens the neglected problem of privacy-invasive adware, by showing how adware evolves sometimes stronger than even advanced malware and poses significant detection and reverse-engineering challenges. Overall, whether beneficial or not, TLS interception often has detrimental impacts on security without the end-user being alerted
Toward a flexible facial analysis framework in OpenISS for visual effects
Facial analysis, including tasks such as face detection, facial landmark detection, and facial expression recognition, is a significant research domain in computer vision for visual effects. It can be used in various domains such as facial feature mapping for
movie animation, biometrics/face recognition for security systems, and driver fatigue monitoring for transportation safety assistance. Most applications involve basic face and landmark detection as preliminary analysis approaches before proceeding into further specialized processing applications. As technology develops, there are plenty of implementations and resources for each task available for researchers, but the key missing properties among them all are fexibility and usability. The integration of functionality components involves complex configurations for each connection joint which is typically problematic with poor reusability and adjustability. The lack of support for integrating different functionality components greatly impact the research effort and cost for individual researchers, which also leads us to the idea of providing a framework solution that can help regarding the issue once and for all. To address this
problem, we propose a user-friendly and highly expandable facial analysis framework solution. It contains a core that supports fundamental services for the framework, and a facial analysis module composed of implementations for facial analysis tasks.
We evaluate our framework solution and achieve our goals of instantiating the facial analysis specialized framework, which essentially perform tasks in face detection, facial landmark detection, and facial expression recognition. This framework solution as a whole, solves the industry problem of lacking an execution platform for integrated facial analysis implementations and fills the gap in visual effects industry
Construction, Operation and Maintenance of Network System(Junior Level)
This open access book follows the development rules of network technical talents, simultaneously placing its focus on the transfer of network knowledge, the accumulation of network skills, and the improvement of professionalism. Through the complete process from the elaboration of the theories of network technology to the analysis of application scenarios then to the design and implementation of case projects, readers are enabled to accumulate project experience and eventually acquire knowledge and cultivate their ability so as to lay a solid foundation for adapting to their future positions. This book comprises six chapters, which include âGeneral Operation Safety of Network System,â âCabling Project,â âHardware Installation of Network System,â âBasic Knowledge of Network System,â âBasic Operation of Network System,â and âBasic Operation and Maintenance of Network System.â This book can be used for teaching and training for the vocational skills certification of network system construction, operation, and maintenance in the pilot work of Huaweiâs â1+Xâ Certification System, and it is also suitable as a textbook for application-oriented universities, vocational colleges, and technical colleges. In the meantime, it can also serve as a reference book for technicians engaged in network technology development, network management and maintenance, and network system integration. As the worldâs leading ICT (information and communications technology) infrastructure and intelligent terminal provider, Huawei Technologies Co., Ltd. has covered many fields such as data communication, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence. Taking Huawei network equipment (routers, switches, wireless controllers, and wireless access points) as the platform, and based on network engineering projects, this book organizes all the contents according to the actual needs of the industry
Construction, Operation and Maintenance of Network System(Junior Level)
This open access book follows the development rules of network technical talents, simultaneously placing its focus on the transfer of network knowledge, the accumulation of network skills, and the improvement of professionalism. Through the complete process from the elaboration of the theories of network technology to the analysis of application scenarios then to the design and implementation of case projects, readers are enabled to accumulate project experience and eventually acquire knowledge and cultivate their ability so as to lay a solid foundation for adapting to their future positions. This book comprises six chapters, which include âGeneral Operation Safety of Network System,â âCabling Project,â âHardware Installation of Network System,â âBasic Knowledge of Network System,â âBasic Operation of Network System,â and âBasic Operation and Maintenance of Network System.â This book can be used for teaching and training for the vocational skills certification of network system construction, operation, and maintenance in the pilot work of Huaweiâs â1+Xâ Certification System, and it is also suitable as a textbook for application-oriented universities, vocational colleges, and technical colleges. In the meantime, it can also serve as a reference book for technicians engaged in network technology development, network management and maintenance, and network system integration. As the worldâs leading ICT (information and communications technology) infrastructure and intelligent terminal provider, Huawei Technologies Co., Ltd. has covered many fields such as data communication, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence. Taking Huawei network equipment (routers, switches, wireless controllers, and wireless access points) as the platform, and based on network engineering projects, this book organizes all the contents according to the actual needs of the industry
Secure portable execution and storage environments: A capability to improve security for remote working
Remote working is a practice that provides economic benefits to both the employing organisation and the individual. However, evidence suggests that organisations implementing remote working have limited appreciation of the security risks, particularly those impacting upon the confidentiality and integrity of information and also on the integrity and availability of the remote workerâs computing environment. Other research suggests that an organisation that does appreciate these risks may veto remote working, resulting in a loss of economic benefits. With the implementation of high speed broadband, remote working is forecast to grow and therefore it is appropriate that improved approaches to managing security risks are researched. This research explores the use of secure portable execution and storage environments (secure PESEs) to improve information security for the remote work categories of telework, and mobile and deployed working.
This thesis with publication makes an original contribution to improving remote work information security through the development of a body of knowledge (consisting of design models and design instantiations) and the assertion of a nascent design theory. The research was conducted using design science research (DSR), a paradigm where the research philosophies are grounded in design and construction.
Following an assessment of both the remote work information security issues and threats, and preparation of a set of functional requirements, a secure PESE concept was defined. The concept is represented by a set of attributes that encompass the security properties of preserving the confidentiality, integrity and availability of the computing environment and data. A computing environment that conforms to the concept is considered to be a secure PESE, the implementation of which consists of a highly portable device utilising secure storage and an up-loadable (on to a PC) secure execution environment. The secure storage and execution environment combine to address the information security risks in the remote work location.
A research gap was identified as no existing âsecure PESE likeâ device fully conformed to the concept, enabling a research problem and objectives to be defined. Novel secure storage and execution environments were developed and used to construct a secure PESE suitable for commercial remote work and a high assurance secure PESE suitable for security critical remote work. The commercial secure PESE was trialled with an existing telework team looking to improve security and the high assurance secure PESE was trialled within an organisation that had previously vetoed remote working due to the sensitivity of the data it processed.
An evaluation of the research findings found that the objectives had been satisfied. Using DSR evaluation frameworks it was determined that the body of knowledge had improved an area of study with sufficient evidence generated to assert a nascent design theory for secure PESEs.
The thesis highlights the limitations of the research while opportunities for future work are also identified. This thesis presents ten published papers coupled with additional doctoral research (that was not published) which postulates the research argument that âsecure PESEs can be used to manage information security risks within the remote work environmentâ
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
Digital Transformation
The amount of literature on Digital Transformation is staggeringâand it keeps growing. Why, then,
come out with yet another such document? Moreover, any text aiming at explaining the Digital
Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to
be already obsolete at the time it is first published.
The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the
point of view of a profound change that is pervading the entire societyâa change made possible by
technology and that keeps changing due to technology evolution opening new possibilities but is also a
change happening because it has strong economic reasons. The direction of this change is not easy to
predict because it is steered by a cultural evolution of society, an evolution that is happening in niches
and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation,
selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario
so unpredictable and continuously changing.The amount of literature on Digital Transformation is staggeringâand it keeps growing. Why, then,
come out with yet another such document? Moreover, any text aiming at explaining the Digital
Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to
be already obsolete at the time it is first published.
The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the
point of view of a profound change that is pervading the entire societyâa change made possible by
technology and that keeps changing due to technology evolution opening new possibilities but is also a
change happening because it has strong economic reasons. The direction of this change is not easy to
predict because it is steered by a cultural evolution of society, an evolution that is happening in niches
and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation,
selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario
so unpredictable and continuously changing
Ingénierie des exigences pour la conception d'architectures de sécurité de systÚmes embarqués distribués
During the last ten years, the impact of security concerns on the development and exploration of distributed embedded systems never ceased to grow. This is mainly related to the fact that these systems are increasingly interconnected and thus vulnerable to attacks, and that the economic interest in attacking them has simultane- ously increased. In such a context, requirement engineering methodologies and tools have become necessary to take appropriate decisions regarding security early on. Security requirements engineering should thus strongly support the elicitation and specifica- tion of software security issues and solutions well before designers and developers are committed to a particular implementation. However, and that is especially true in embedded systems, security requirements should not be considered only as the abstract expression of a set of properties independently from the system architecture or from the threats and attacks that may occur. We believe this consideration is of utmost importance for security requirements engineering to be the driving force behind the design and implementation of a secure system. We thus describe in this thesis a security engineering requirement methodology depending upon a constant dialog between the design of system functions, the requirements that are attached to them, the design and development of the system architecture, and the assessment of the threats to system assets. Our approach in particular relies on a knowledge-centric approach to security requirement engineering, applicable from the early phases of system conceptualization to the enforcement of security requirements.Au cours des dix dernieÌres anneÌes, lâimpact des questions de seÌcuriteÌ sur le deÌveloppement et la mise en oeuvre des systeÌmes embarqueÌs distribueÌs nâa jamais cesseÌ de croiÌtre. Ceci est principalement lieÌ aÌ lâinterconnexion toujours plus importante de ces systeÌmes qui les rend vulneÌrables aux attaques, ainsi quâaÌ lâinteÌreÌt eÌconomique dâattaquer ces systeÌmes qui sâest simultaneÌment accru. Dans un tel contexte, meÌthodologies et outils dâingeÌnierie des exigences de seÌcuriteÌ sont devenus indispensables pour prendre des deÌcisions approprieÌes quant a` la seÌcuriteÌ, et ce le plus toÌt possible. LâingeÌnierie des exigences devrait donc fournir une aide substantielle aÌ lâexplicitation et aÌ la speÌcification des probleÌmes et solutions de seÌcuriteÌ des logiciels bien avant que concepteurs et deÌveloppeurs ne soient engageÌs dans une implantation en particulier. Toutefois, et câest particulieÌrement vrai dans les systeÌmes embarqueÌs, les exigences de seÌcuriteÌ ne doivent pas eÌtre consideÌreÌes seulement comme lâexpression abstraite dâun ensemble de proprieÌteÌs indeÌpendamment de lâarchitecture systeÌme ou des menaces et des attaques qui pourraient y survenir. Nous estimons que cette consideÌration est dâune importance capitale pour faire de lâingeÌnierie des exigences un guide et un moteur de la conception et de la mise en Ćuvre dâun systeÌme seÌcuriseÌ. Notre approche sâappuie en particulier sur une approche centreÌe sur les connaissances de lâingeÌnierie des exigences de seÌcuriteÌ, applicable deÌs les premieÌres phases de conception du systeÌme jusquâaÌ la mise en application des exigences de seÌcuriteÌ dans lâimplantation