18 research outputs found

    Toward least-privilege isolation for software

    Get PDF
    Hackers leverage software vulnerabilities to disclose, tamper with, or destroy sensitive data. To protect sensitive data, programmers can adhere to the principle of least-privilege, which entails giving software the minimal privilege it needs to operate, which ensures that sensitive data is only available to software components on a strictly need-to-know basis. Unfortunately, applying this principle in practice is dif- �cult, as current operating systems tend to provide coarse-grained mechanisms for limiting privilege. Thus, most applications today run with greater-than-necessary privileges. We propose sthreads, a set of operating system primitives that allows �ne-grained isolation of software to approximate the least-privilege ideal. sthreads enforce a default-deny model, where software components have no privileges by default, so all privileges must be explicitly granted by the programmer. Experience introducing sthreads into previously monolithic applications|thus, partitioning them|reveals that enumerating privileges for sthreads is di�cult in practice. To ease the introduction of sthreads into existing code, we include Crowbar, a tool that can be used to learn the privileges required by a compartment. We show that only a few changes are necessary to existing code in order to partition applications with sthreads, and that Crowbar can guide the programmer through these changes. We show that applying sthreads to applications successfully narrows the attack surface by reducing the amount of code that can access sensitive data. Finally, we show that applications using sthreads pay only a small performance overhead. We applied sthreads to a range of applications. Most notably, an SSL web server, where we show that sthreads are powerful enough to protect sensitive data even against a strong adversary that can act as a man-in-the-middle in the network, and also exploit most code in the web server; a threat model not addressed to date

    Simple Opportunistic Encryption

    Get PDF
    Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a communal effort so a solution that gives partial benefits until fully deployed is needed. A solution that requires little changes to existing infrastructure will also help as it can be quickly deployed to give immediate shortterm benefits. We argue that tcpcrypt, a TCP option for opportunistic encryption is the path of least-resistance for a solution against large-scale traffic encryption. Tcpcrypt requires no changes to applications, is compatible with existing networks (works with NATs), and just works by default. It is high performance, so it can be deployed on servers without much concern. tcpcrypt attempts to maximize security for any given setting. By default, it will protect against passive eavesdropping, and also allows detecting large scale interception. With authentication, tcpcrypt can provide full security against active attackers and so it is a complete solution both for the short-term and long-term

    Implementing mass rearing of trissolcus japonicus (Hymenoptera: Scelionidae) on cold-stored host eggs

    Get PDF
    Halyomorpha halys (Stål) (Hemiptera: Pentatomidae), a pest of Asian origin, has been causing severe damage to Italian agriculture. The application of classical biological control by the release of Trissolcus japonicus (Ashmead) (Hymenoptera: Scelionidae), an exotic egg parasitoid, appears to be one promising solution. In Italy, releases of T. japonicus in the field were authorized in 2020. In this study, some parameters that could influence the rearing of T. japonicus in insectaries were investigated. A significantly higher production of progeny was observed on host eggs stored at 6◦C (86.5%) compared to −24◦C (48.8%) for up to two months prior to exposure to parasitism. There were no significant differences in progeny production from single females in a vial provided with only one egg mass (83.2%) or 10 females inside a cage with 6 egg masses (83.9%). The exposure of parasitoids to refrigerated (6◦C) egg masses of H. halys for 72 h led to a significantly higher production of progeny (62.1%) compared to shorter exposures for 48 (44.0%) or 24 h (37.1%). A decline in production of progeny by the same female was detected between the first (62.1%) and the second parasitization (41.3%). Adult parasitoids stored at 16◦C for up to 90 days had an 87.1% survival rate, but a significant decrease in progeny production was detected. These parameters could be adjusted when rearing T. japonicus for specific aims such as the production of individuals for field release or colony maintenance

    The Case for Ubiquitous Transport-Level Encryption

    Get PDF
    Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpcrypt is a TCP extension designed to make end-to-end encryption of TCP traffic the default, not the exception. To facilitate adoption tcpcrypt provides backwards compatibility with legacy TCP stacks and middle-boxes. Because it is implemented in the transport layer, it protects legacy applications. However, it also provides a hook for integration with application-layer authentication, largely obviating the need for applications to encrypt their own network traffic and minimizing the need for duplication of functionality. Finally, tcpcrypt minimizes the cost of key negotiation on servers; a server using tcpcrypt can accept connections at 36 times the rate achieved using SSL

    Secure Opportunistic Multipath Key Exchange

    Get PDF
    The security of today\u27s widely used communication security protocols is based on trust in Certificate Authorities (CAs). However, the real security of this approach is debatable, since certificate handling is tedious and many recent attacks have undermined the trust in CAs. On the other hand, opportunistic encryption protocols such as Tcpcrypt, which are currently gaining momentum as an alternative to no encryption, have similar security to using untrusted CAs or self-signed certificates: they only protect against passive attackers. In this paper, we present a key exchange protocol, Secure Multipath Key Exchange (SMKEX), that enables all the benefits of opportunistic encryption (no need for trusted third parties or pre-established secrets), as well as proven protection against some classes of active attackers. Furthermore, SMKEX can be easily extended to a trust-on-first-use setting and can be easily integrated with TLS, providing the highest security for opportunistic encryption to date while also increasing the security of standard TLS. We show that SMKEX is made practical by the current availability of path diversity between different AS-es. We also show a method to create path diversity with encrypted tunnels without relying on the network topology. These allow SMKEX to provide protection against most adversaries for a majority of Alexa top 100 web sites. We have implemented SMKEX using a modified Multipath TCP kernel implementation and a user library that overwrites part of the socket API, allowing unmodified applications to take advantage of the security provided by SMKEX

    Cetaceans in the Mediterranean Sea. Encounter rate, dominant species, and diversity hotspots

    Get PDF
    We investigated the presence and diversity of cetaceans in the Mediterranean Sea, analysing the data collected by 32 different research units, over a period of 15 years (2004–2018), and shared on the common web-GIS platform named Intercet. We used the encounter rate, the species prevalence, and the Shannon diversity index as parameters for data analysis. The results show that cetacean diversity, in the context of the Mediterranean basin, is generally quite low when compared with the eastern Atlantic, as few species, namely the striped dolphin, the bottlenose dolphin, the fin whale, and the sperm whale, dominate over all the others. However, some areas, such as the Alboran Sea or the north-western Mediterranean Sea, which includes the Pelagos Sanctuary (the Specially Protected Area of Mediterranean Interest located in the northern portion of the western basin), show higher levels of diversity and should be considered hotspots to be preserved. Primary production and seabed profile seem to be the two main drivers influencing the presence and distribution of cetaceans, with the highest levels of diversity observed in areas characterized by high levels of primary production and high bathymetric variability and gradient. This collective work underlines the importance of data sharing to deepen our knowledge on marine fauna at the scale of the whole Mediterranean Sea and encourages greater efforts in the networking process, also to accomplish the requirements of the Marine Strategy Framework Directive, with particular reference to Descriptor 1: biological diversity is maintained

    High Efficiency CdTe Solar Cells by Low Temperature Deposition with MgZnO HRT Layer

    No full text
    CdTe solar cells have shown high efficiency and the technology is scalable. As a result thin film CdTe modules are competitive with crystalline silicon modules. Thin film CdTe devices with efficiency above 22% have been reported using high substrate temperatures during the deposition process. It is known that high substrate temperatures result in large grain size with a reduced number of grain boundaries and this is believed to contribute to the high efficiency. However, use of high temperature requires robust substrates and excludes the use of most flexible substrate materials. It also involves higher energy consumption and more complicated machinery. In this work we present a process for high efficiency solar cells with an improved front contact, by introducing magnesium-doped zinc oxide high resistance transparent layer. By optimizing the fabrication process we have achieved a conversion efficiency exceeding 16%, which is one of the highest reported for substrate temperatures below 500\ub0C
    corecore