首页> 外文OA文献 >Automatically detecting the misuse of secrets: foundations, design principles, and applications
【2h】

Automatically detecting the misuse of secrets: foundations, design principles, and applications

机译:自动检测对秘密的滥用:基础,设计原则和应用

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We develop foundations and several constructions forsecurity protocols that can automatically detect, without falsepositives, if a secret (such as a key or password) has been misused.Such constructions can be used, e.g., to automatically shut downcompromised services, or to automatically revoke misused secrets tominimize the effects of compromise. Our threat model includes malicious agents, (temporarily or permanently)compromised agents, and clones. Previous works have studied domain-specific partial solutions to thisproblem. For example, Google's Certificate Transparency aims to provideinfrastructure to detect the misuse of a certificate authority's signingkey, logs have been used for detecting endpoint compromise, andprotocols have been proposed to detect cloned RFID/smart cards.Contrary to these existing approaches, for which the designs areinterwoven with domain-specific considerations and which usually do notenable fully automatic response (i.e., they need human assessment), ourapproach shows where automatic action is possible. Our resultsunify, provide design rationales, and suggest improvements for theexisting domain-specific solutions. Based on our analysis, we construct several mechanisms for the detectionof misuse. Our mechanisms enable automatic response, such as revokingkeys or shutting down services, thereby substantially limiting theimpact of a compromise.In several case studies, we show how our mechanisms can be used tosubstantially increase the security guarantees of a wide range ofsystems, such as web logins, payment systems, or electronic door locks.For example, we propose and formally verify an improved version ofCloudflare's Keyless SSL protocol that enables key misuse detection.
机译:我们为安全协议开发了基础和几种构造,这些协议可以自动检测到秘密(例如密钥或密码)是否被滥用,而不会出现误报。此类构造可以用于例如自动关闭受损的服务或自动撤消被滥用的服务。机密,以尽量减少妥协的影响。我们的威胁模型包括恶意代理,(临时或永久)受损的代理和克隆。先前的工作已经研究了针对该问题的特定领域的部分解决方案。例如,谷歌的证书透明旨在提供基础结构来检测证书颁发机构签名密钥的滥用,日志已被用于检测端点泄露,协议已被提议用于检测克隆的RFID /智能卡。与这些现有方法相反,本设计如果将特定领域的考虑因素交织在一起,并且通常无法实现全自动响应(即,需要人工评估),我们的方法就表明可以采取自动措施。我们的结果统一,提供了设计依据,并提出了针对现有领域特定解决方案的改进建议。基于我们的分析,我们构造了几种检测滥用的机制。我们的机制可以实现自动响应,例如吊销密钥或关闭服务,从而从实质上限制了折衷的影响。在一些案例研究中,我们展示了如何使用我们的机制来大幅提高各种系统(例如Web登录)的安全性,支付系统或电子门锁。例如,我们提议并正式验证Cloudflare的Keyless SSL协议的改进版本,该协议可实现密钥滥用检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号