199,665 research outputs found

    Secure Federated Learning Within Isolated Environments

    Get PDF
    Isolation of processes within operating systems enables portions of an application to run in a secure privacy-compliant sandbox. However, isolated processes are required to be stateless. Statelessness implies that no data can be stored, even for valid use cases such as federated learning. This disclosure describes techniques to perform federated learning within secure isolated data-processing environments and to share the results of federated learning via provably private means. A trusted trainer is deployed within the same secure sandbox as a trusted processor. The trusted processor requests the operating system to store data in a secure private cache inaccessible to the trusted processor and to the host application. The trusted trainer runs federated learning on data in the secure, private cache. The trusted trainer shares the results of its computation (e.g., updated machine-learning models) via provably private techniques, without compromising the security, confidentiality, or identity of training data

    L'authentification sécurisée utilisant le trusted computing

    Get PDF
    La sécurité des systèmes informatiques demeure un sujet pertinent malgré les efforts sans cesse apportés pour l’améliorer. À cet effet, un nouveau concept prometteur, qui touche simultanément le matériel et le logiciel, a été déployé. Il s’agit du trusted computing. L’utilisation de ce concept a pour but de s’assurer de l’intégrité du système que nous utilisons à travers différents mécanismes, comme la vérification d’intégrité ou l’isolation logicielle et matérielle. Ce concept pourrait être utilisé dans différentes applications nécessitant une sécurité accrue. L’un des principaux domaines où nous sommes encore concernés par la sécurité est l’authentification en ligne, particulièrement pour les services critiques comme les services financiers ou le courriel. En effet, la sécurité des données d’authentification en ligne peut être compromise par des logiciels malveillants, tels les chevaux de Troie et les enregistreurs de frappes, ou encore par des attaques matérielles, les enregistreurs de frappes physiques à titre d’exemple. Dans le cadre de ce mémoire, nous utilisons le concept de trusted computing afin de proposer une solution d’authentification offrant un compromis entre la sécurité, la facilité d’utilisation et la facilité de déploiement tout en mettant l’accent sur la sécurité. Dans notre schéma nous voulons prévenir les attaques sur les données l’authentifications effectuées à partir de l’ordinateur de l’utilisateur. Un autre but est s’assurer de la compatibilité de notre solution avec la méthode d’authentification actuelle qui consiste en un nom d’utilisateur et un mot de passe. Notre objectif principal est d’implémenter une application utilisant les mécanismes du trusted computing sur un système embarqué. Cette application a pour rôle de fournir une authentification sécurisée aux sites web pour les utilisateurs. Nous avons débuté par étudier les différentes approches possibles en termes de trusted computing et d’exécution isolée. Ensuite, nous avons démontré l’utilisation du trusted computing sur un système embarqué. Nous avons alors implémenté notre application d’authentification sécurisée en utilisant les possibilités offertes par le trusted computing. Cette implémentation a permis d’étudier la viabilité de l’utilisation du trusted computing pour régler les problèmes de sécurité. Finalement, nous avons discuté des différents modèles d’attaques possibles ainsi que des limitations de notre système pour l’évaluer. Notre système nous protège contre plusieurs attaques possibles dans les schémas d’authentification actuels, nous pouvons encore le rendre plus résistant et plus sécuritaire. Nous constatons aussi que le trusted computing peut être utilisé dans d’autres contextes de sécurité, car même avec quelques difficultés de développement, il offre beaucoup d’avantages.----------ABSTRACT: Computer systems security remains a top priority for researchers and industry as cyber attacks are improving and costing millions of dollars to companies. One of the recent concepts introduced is trusted computing. It is used to guarantee the integrity of the system we are using. The main mechanisms used by trusted computing are integrity verification and software and hardware isolation; they are achieved via hardware and software implementations. The application domain of trusted computing is large and usually used in sensitive contexts. One of the areas where security is critical but with no definitive solution is online authentication, in particular for sensitive services like online banking or email. Currently, online authentication is vulnerable to multiple software and hardware attacks such as trojans, software and hardware keyloggers. We propose a scheme for online authentication offering a compromise between security, ease of use and backward compatibility, but focusing more on security. We use trusted computing concepts for our solution. We try to prevent attacks aiming user credentials exchanged from the computer of the user. Another objective was to assure backward compatibility with current authentication methods which usually consist of username and password through websites. Our goal throughout this dissertation is to implement an application using the mechanisms of trusted computing on an embedded system. This application will provide users with a secure authentication mechanism to connect to websites. We began by studying the different possible approaches in terms of trusted computing and isolated execution. Then we ran trusted computing on an embedded system. Next, we implemented the secure authentication application using trusted computing. Finally, we discussed the possible threat models and limitations of our solution. Our system protects us against a range of attacks under current authentication schemes, although there is room for improvement to make it even more resistant and secure. The concept of trusted computing can be explored further to solve security-related problems. Despite some development difficulties, it can offer many advantages

    Advancing Federated Learning in 6G: A Trusted Architecture with Graph-based Analysis

    Full text link
    Integrating native AI support into the network architecture is an essential objective of 6G. Federated Learning (FL) emerges as a potential paradigm, facilitating decentralized AI model training across a diverse range of devices under the coordination of a central server. However, several challenges hinder its wide application in the 6G context, such as malicious attacks and privacy snooping on local model updates, and centralization pitfalls. This work proposes a trusted architecture for supporting FL, which utilizes Distributed Ledger Technology (DLT) and Graph Neural Network (GNN), including three key features. First, a pre-processing layer employing homomorphic encryption is incorporated to securely aggregate local models, preserving the privacy of individual models. Second, given the distributed nature and graph structure between clients and nodes in the pre-processing layer, GNN is leveraged to identify abnormal local models, enhancing system security. Third, DLT is utilized to decentralize the system by selecting one of the candidates to perform the central server's functions. Additionally, DLT ensures reliable data management by recording data exchanges in an immutable and transparent ledger. The feasibility of the novel architecture is validated through simulations, demonstrating improved performance in anomalous model detection and global model accuracy compared to relevant baselines.Comment: Accepted by IEEE Global Communications Conference (GLOBECOM) 202

    Identifying Native Applications with High Assurance

    Get PDF
    The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. We solve the application identication problem by proposing a novel iden- tication model in which user-level applications are required to present identication proofs at run time to be authenti- cated by the kernel using an embedded secret key. The se- cret key of an application is registered with a trusted kernel using a key registrar and is used to uniquely authenticate and authorize the application. We present a protocol for secure authentication of applications. Additionally, we de- velop a system call monitoring architecture that uses our model to verify the identity of applications when making critical system calls. Our system call monitoring can be integrated with existing policy specication frameworks to enforce application-level access rights. We implement and evaluate a prototype of our monitoring architecture in Linux as device drivers with nearly no modication of the ker- nel. The results from our extensive performance evaluation shows that our prototype incurs low overhead, indicating the feasibility of our model

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

    Get PDF
    This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for future research regarding trust establishment in dynamic networks have been collected and elaboration on some different approaches for future research has been done.This work was supported by the Knowledge foundation and RISE within the ARIES project
    • …
    corecore