Computer Sciences Dept.

Computer Security and Cryptography Reading Group
September 2004 List

Date &
Location
Reading
Wednesday, September 1, 2004
11:30 AM - 12:30 PM 5331 CS
Wednesday, September 8, 2004
11:30 AM - 12:30 PM 5331 CS

Rob Johnson

David Wagner
R. Johnson, D. Wagner
UC Berkeley
Finding User/Kernel Pointer Bugs with Type Inference
USENIX Security 2004

URL: http://www.cs.berkeley.edu/~rtjohnso/papers/cquk.ps

Local copy: http://www.cs.wisc.edu/areas/sec/cquk.ps

Today's operating systems struggle with vulnerabilities from careless handling of user space pointers. User/kernel pointer bugs have serious consequences for security: a malicious user could exploit a user/kernel pointer bug to gain elevated privileges, read sensitive data, or crash the system. We show how to detect user/kernel pointer bugs using type-qualifier inference, and we apply this method to the Linux kernel using CQUAL, a type-qualifier inference tool. We extend the basic type-inference capabilities of CQUAL to support context-sensitivity and greater precision when analyzing structures so that CQUAL requires fewer annotations and generates fewer false positives. With these enhancements, we were able to use CQUAL to find 17 exploitable user/kernel pointer bugs in the Linux kernel. Several of the bugs we found were missed by careful hand audits, other program analysis tools, or both.

Monday, September 13, 2004
2:30 PM - 3:30 PM 3331 CS

Leah H. Jamieson
R. Kennell, L. H. Jamieson
Purdue
Establishing the Genuinity of Remote Computer Systems
USENIX Security 2003

URL: http://www.usenix.org/events/sec03/tech/kennell/kennell.pdf

Local copy: http://www.cs.wisc.edu/areas/sec/kennell.pdf

A fundamental problem in distributed computing environments involves determining whether a remote computer system can be trusted to autonomously access secure resources via a network. In this paper, we describe a means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy. Upon passing a test, it can be granted access to distributed resources and can serve as a general-purpose host for distributed computation so long as it remains in contact with some certifying authority. The test we describe is applicable to consumer-grade computer systems with a conventional network interface and requires no additional hardware. The results of the test can be conveyed over an unsecured network; no trusted human intermediary is needed to relay the results. We examine potential attacks and weaknesses of the system and show how they can be avoided. Finally, we describe an implementation of a genuinity test for a representative set of computer systems.


Monica Chew

Doug Tygar
U. Shankar, M. Chew, J. D. Tygar
Berkeley
Side Effects Are Not Sufficient to Authenticate Software
USENIX Security 2004

URL: http://www.cs.berkeley.edu/~ushankar/research/side-effects/side-effects.pdf

Local copy (with page numbers): http://www.cs.wisc.edu/areas/sec/side-effects.pdf

Kennell and Jamieson recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on machine-specific computations, incorporating side effects that cannot be simulated quickly. The system is vulnerable to a novel attack, which we call a substitution attack. We implement a successful attack on Genuinity, and further argue this class of schemes are not only impractical but unlikely to succeed without trusted hardware.

Monday, September 20, 2004
1:30 PM - 2:30 PM 3331 CS

Dahlia Malkhi

Noam Nisan

Benny Pinkas
D. Malkhi, N. Nisan, B. Pinkas, Y. Sella
Hebrew University / HP Labs
Fairplay - Secure Two-Party Computation System
USENIX Security 2004

URL: http://www.pinkas.net/PAPERS/MNPS.pdf

Local copy (with page numbers): http://www.cs.wisc.edu/areas/sec/MNPS.pdf

Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure two-party computation a realistic paradigm. Yet, thus far, interest in this paradigm has remained mostly theoretical.

This paper introduces Fairplay, a full-fledged system that implements generic secure function evaluation (SFE). Fairplay comprises a high level procedural definition language called SFDL tailored to the SFE paradigm; a compiler of SFDL into a one-pass Boolean circuit presented in a language called SHDL; and Bob/Alice programs that evaluate the SHDL circuit in the manner suggested by Yao.

This system enables us to present the first evaluation of an overall SFE in real settings, as well as examining its components and identifying potential bottlenecks. It provides a test-bed of ideas and enhancements concerning SFE, whether by replacing parts of it, or by integrating with it. We exemplify its utility by examining several alternative implementations of oblivious transfer within the system, and reporting on their effect on overall performance.


< Back to the Sec & Crypto reading group page
Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Fri Jul 02 10:08:55 2004
 
Computer Science | UW Home