首页> 外文会议>IEEE Computer Security Foundations Symposium >Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
【24h】

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications

机译:自动检测滥用秘密:基础,设计原则和应用

获取原文

摘要

We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such constructions can be used, e.g., to automatically shut down compromised services, or to automatically revoke misused secrets to minimize the effects of compromise. Our threat model includes malicious agents, (temporarily or permanently) compromised agents, and clones. Previous works have studied domain-specific partial solutions to this problem. For example, Google's Certificate Transparency aims to provide infrastructure to detect the misuse of a certificate authority's signing key, logs have been used for detecting endpoint compromise, and protocols have been proposed to detect cloned RFID/smart cards. Contrary to these existing approaches, for which the designs are interwoven with domain-specific considerations and which usually do not enable fully automatic response (i.e., they need human assessment), our approach shows where automatic action is possible. Our results unify, provide design rationales, and suggest improvements for the existing domainspecific solutions. Based on our analysis, we construct several mechanisms for the detection of misuse. Our mechanisms enable automatic response, such as revoking keys or shutting down services, thereby substantially limiting the impact of a compromise. In several case studies, we show how our mechanisms can be used to substantially increase the security guarantees of a wide range of systems, such as web logins, payment systems, or electronic door locks. For example, we propose and formally verify an improved version of Cloudflare's Keyless SSL protocol that enables key misuse detection.
机译:我们为安全协议开发基础和几种结构,可以自动检测,如果秘密(例如密钥或密码)被滥用,则可以在没有误报的情况下自动检测。可以使用这种结构,例如,自动关闭受损服务,或者自动撤消误用的秘密,以最大限度地减少妥协的影响。我们的威胁模型包括恶意代理商,(暂时或永久)受损代理和克隆。以前的作品已经研究了这个问题的域特定的部分解决方案。例如,谷歌的证书透明度旨在提供基础架构来检测证书颁发机构的签名密钥的滥用,已经用于检测端点妥协,并且已经提出了检测克隆的RFID /智能卡的协议。与这些现有方法相反,设计与域特异性考虑因素相互交织,并且通常不会启用完全自动响应(即,它们需要人性化评估),我们的方法显示了自动操作的何处。我们的成绩统一,提供设计理由,并建议现有域特异性解决方案的改进。基于我们的分析,我们构建了滥用滥用的几种机制。我们的机制能够实现自动响应,例如撤销键或关闭服务,从而大大限制了妥协的影响。在几个案例研究中,我们展示了我们的机制如何用于大大增加各种系统的安全保障,例如网络登录,支付系统或电子门锁。例如,我们提出并正式验证了CloudFlare的无钥匙SSL协议的改进版本,可以误用检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号