Computer Sciences Dept.

Computer Security and Cryptography Reading Group
April 2004 List

Date &
Location
Reading
1 Mar. 2004
1304 CS
2:30 - 3:30 PM
Nevin Heintze, Jon G. Riecke
Bell Labs, Murray Hill
The SLam Calculus: Programming with Secrecy and Integrity
Published in POPL'98

URL: http://citeseer.nj.nec.com/heintze98slam.html

The SLam calculus is a typed λ-calculus that maintains security information as well as type information. The type system propagates security information for each object in four forms: the object's creators and readers, and the object's indirect creators and readers (i.e., those agents who, through flow-of-control or the actions of other agents, can influence or be influenced by the content of the object). We prove that the type system prevents security violations and give some examples of its power.

7 Apr. 2004
5331 CS 11:30 AM - 12:30 PM
Philip W. L. Fong
Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada
Access Control By Tracking Shallow Execution History
Published in Oakland'04

URL: http://www2.cs.uregina.ca/~pwlfong/Pub/sp-2004.pdf

Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages caused by malicious code. Monitoring the execution history of the latter provides an effective means for controlling the access pattern of system services. Several authors have recently proposed increasingly general automata models for characterizing various classes of security policies enforceable by execution monitoring. An open question raised by Bauer, Ligatti and Walker is whether one can further classify the space of security policies by constraining the capabilities of the execution monitor. This paper presents a novel information-based approach to address the research problem. Specifically, security policies are characterized by the information consumed by an enforcing execution monitor.

By restricting the execution monitor to track only a shallow history of previously granted access events, a precise characterization of a class of security policies enforceable by restricted access to information is identified. Although provably less expressive than the general class of policies enforceable by execution monitoring, this class does contain naturally occurring policies including Chinese Wall policy, low-water-mark policy, one-out-of-k authorization, assured pipelines, etc. Encouraged by this success, the technique is generalized to produce a lattice of policy classes. Within the lattice, policy classes are ordered by the information required for enforcing member policies. Such a finegrained policy classification lays the semantic foundation for future studies on special-purpose policy languages.

14 Apr. 2004
5331 CS 11:30 AM - 12:30 PM
J. McLean
NRL
The Algebra of Security
Published in Oakland'88

URL: http://ieeexplore.ieee.org/xpls/abs_all.jsp?isNumber=427&prod=CNF&arnumber=8092&arSt=2&ared=7&arAuthor=McLean%2C+J.&arNumber=8092&a_id0=8091&a_id1=8092&a_id2=8093&a_id3=8094&a_id4=8095&a_id5=8096&a_id6=8097&a_id7=8098&a_id8=8099&a_id9=8100&a_id10=8101&a_id11=8103&a_id12=8104&a_id13=8105&a_id14=8106&count=15

A general framework is developed in which various mandatory access control security models that allow changes in security levels can be formalized. These models form a Boolean Algebra. The framework is expanded to include models that allow n-person rules necessary for discretionary access controls in an industrial security setting. The resulting framework is a distributive lattice.

21 Apr. 2004
5331 CS 11:30 AM - 12:30 PM
C. Collberg, E. Carter, S. Debray, A. Huntwork, C. Linn, M. Stepp
University of Arizona
Dynamic Path-Based Software Watermarking
Published in PLDI'04

URL: http://www.cs.arizona.edu/solar/papers/pbw.pdf

Software watermarks - bitstrings encoding some sort of identifying information that are embedded into executable programs - are an important tool against software piracy. Most existing proposals for software watermarking have the shortcoming that they can be destroyed via fairly straight-forward semantics-preserving code transformations. This paper introduces path-based watermarking, a new approach to software watermarking based on the dynamic branching behavior of programs. We show how error-correcting and tamper-proofing techniques can be used to make path-based watermarks resilient against a wide variety of attacks. Experimental results, using both Java bytecode and IA-32 native code, indicate that even relatively large watermarks can be embedded into programs at modest cost.

28 Apr. 2004
5331 CS 11:30 AM - 12:30 PM
A. Yao
Berkeley
Protocols for Secure Computation
Published in FOCS'82

URL: http://www.cs.wisc.edu/areas/sec/Yao1982.pdf

Two millionaires wish to know who is richer; however, they do not want to find out inadvertently any additional information about each other's wealth. How can they carry out such a conversation?

This is a special case of the following general problem. Suppose m people wish to compute the value of a function f(x1, x2, x3,..., xm), which is an integer-valued function of $m$ integer variables xi of bounded range. Assume initially person Pi knows the value of xi and no other x's. Is it possible for them to compute the value of f, by communicating among themselves, without unduly giving away any information about the values of their own variables? The millionaires' problem corresponds to the case when m = 2 and f(x1, x2) = 1 if x1 < x2, and 0 otherwise. In this paper, we will give precise formulation of this general problem and describe three ways of solving it by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert). These results have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc. We will also discuss the complexity question ``How many bits need to be exchanged for the computation'', and describe methods to prevent participants from cheating. Finally, we study the question ``What cannot be accomplished with one-way functions''.


< Back to the Sec & Crypto reading group page
Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Thu Apr 01 10:29:26 CDT 2004
 
Computer Science | UW Home