SECRYPT 2006 Abstracts


Area 1 - Security in Information Systems

Full Papers
Paper Nr: 24
Title:

COLLABORATION SECURITY FOR MODERN INFORMATION SYSTEMS

Authors:

Richard Whittaker, Gonzalo Argote-Garcia, Peter Clarke and Raimund K. Ege

Abstract: One of the main approaches to accessing heterogeneous data is via the use of a mediation framework. The current problem with mediation systems is that they are viewed as black boxes from the perspective of their clients. As clients enter their data, they are unable to control the access to their data from entities within the mediation system. In this paper we present a solution in the form of a security framework, named Collaboration Security Framework that addresses the needs of all entities, i.e. external clients, mediators or data sources, to have autonomy in applying security policies during collaboration. As a result all entities participating in a collaboration have control over the access to their data by applying local, global and collaboration channel security rules, which can be changed at runtime and that are security model independent.
Download

Paper Nr: 33
Title:

SECURE ONLINE ENGLISH AUCTIONS

Authors:

Jarrod Trevathan and Wayne Read

Abstract: Security and privacy in online auctions is a major concern as auction participants have many opportunities to cheat (e.g., repudiate bids, not deliver items, etc.). Online auctions such as those used by eBay are based on a type of auction referred to as an English auction. Dispite the English auction being the most popular type of auction, it has received less security coverage than other types of auctions (e.g., sealed-bid auctions). An existing proposal for a “secure” English auction prevents the Auctioneer from closing the auction early and from blocking bids, but does not protect a bidder’s anonymity. Another proposal provides anonymity, but does not stop an Auctioneer from skewing its clock or blocking bids. This paper proposes a new scheme for conducting secure and anonymous online English auctions using a modified type of group signature. Trust is divided among three servers owned by separate companies to ensure anonymity and fairness. Our scheme solves the problems of the existing English auction schemes and has following characteristics: unforgeability, anonymity, unlinkability, exculpability, coalition-resistance, verifiability, robustness, traceability, revocation, one-off registration, unskewability and unblockability. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.
Download

Paper Nr: 36
Title:

USING MICROSOFT OFFICE INFOPATH TO GENERATE XACML POLICIES

Authors:

Manuel Sánchez Cuenca, Gabriel López, Antonio Gómez-skarmeta and Óscar Cánovas

Abstract: Today, when organizations perform access control over their resources they are not only interested in the user’s identity, but in other data such as user’s attributes or contextual information. These requirements can be found, for example, in a network access control scenario where end users pay for a specific access level and depending on it, they can get different network quality of service. The network provider has to check, not only the user identity, but the user’s attributes to make sure that he can access to the specified resource. These systems are based on the use of policy languages to define the authorization process. However, due to the increasing complexity of current systems, policies are becoming more and more complex to be managed by system administrators. Therefore, in this paper we present an user friendly approach to policy specification, based on the use of high level templates and common desktop applications. These templates are easily built from XML schemas, and once they have been filled, a XACML policy is automatically generated using a XML transformation.
Download

Paper Nr: 78
Title:

LEAST PRIVILEGE IN SEPARATION KERNELS

Authors:

Tim Levin, Cynthia Irvine and Thuy Nguyen

Abstract: We extend the separation kernel abstraction to represent the enforcement of the principle of least privilege. In addition to the inter-block flow control policy prescribed by the traditional separation kernel paradigm, we describe an orthogonal, finer-grained flow control policy by extending the protection of elements to subjects and resources, as well as blocks, within a partitioned system. We show how least privilege applied to the actions of subjects provides enhanced protection for secure systems.
Download

Paper Nr: 106
Title:

FLEXIBLE LICENSE TRANSFER SYSTEM USING MOBILE TERMINAL

Authors:

Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa and Takeshi Kimura

Abstract: Content delivery is one of the promising services for both digital broadcasting and the Internet. The provision of home gateway for connecting the internet provider or set top box for broadcasting causes a variety of content services and convenient functions. However, if a user wants to enjoy digital content not only in his home but also outside of it, it is difficult to use, because a license for digital content is usually bound to the set top box or home gateway. For the purpose to utilize the digital content in the open space, we propose a new system where a user can purchase a license and securely delegate the license stored in the set top box to the mobile terminal. Therefore he can enjoy content by showing the license stored in the mobile terminal as a prepaid ticket. Moreover, to protect user’s privacy, our proposed mechanism supports anonymity when using the ticket.
Download

Short Papers
Paper Nr: 26
Title:

IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH

Authors:

Zaobin Gan, Dengwei Wei and Vijay Varadharajan

Abstract: It has been recognized that the main source of problems with application software security is in most cases that the software is poorly designed and developed with respect to authentication and authorization. Aiming at preventing the security issues in the course of software design and development, this paper presents a framework for integrating a security policy specification with a system function integration. On the basis of the Role-Based Access Control (RBAC) model, this framework moves the responsibility of security through a central authorization management mechanism, Single Sign-On (SSO) access and integration management of security resources. The design can integrate the enterprise’s multiple new, developing and existing application systems, and provide end users access these systems as a single system. An application instance of the framework is given in a large-sized enterprise information integrated system as well. The results show that the framework may provide enterprises with uniform and robust enforcement policies to improve the security of sensitive information systems.
Download

Paper Nr: 27
Title:

DESIGN AND IMPLEMENTATION OF A PRACTICAL SECURE DISTRIBUTED HEALTHCARE APPLICATION

Authors:

Zaobin Gan and Vijay Varadharajan

Abstract: Security plays a vital role in the design and practical deployment of distributed applications. All companies have to repeatedly spend considerable time, capital and effort on the implementation of the security mechanism for their applications, and the result is also unsatisfactory. Nowadays, more and more integrated security management tools are emerging. If we can properly use these tools in our practical applications, the development schedule of applications will be greatly cut down, the cost will be reduced considerably as well as the security of the applications can be guaranteed. In this paper, we investigate an integrated security management tool - ManageSecure, present a formal description of the healthcare system requirements. and then describe how to implement the healthcare system security objectives by means of ManageSecure. The result shows that the use of the integrated security management tool in the practice application is economical and feasible.
Download

Paper Nr: 28
Title:

EXTENDING XML SIGNATURE AND APPLYING IT TO WEB PAGE SIGNING

Authors:

Takahito Tsukuba and Kenichiro Noguchi

Abstract: Security technologies for XML, the XML Encryption and the XML Signature developed by the World Wide Web Consortium, will play a vital role in security on the Internet. A binary X.509 certificate encoded in ASN.1 is included in the XML Signature. We propose to extend the XML Signature to fully represent X.509 certificate information in XML. We developed the specifications for extensions. We implemented a converter that transforms between the ASN.1 representation and XML representation of an X.509 certificate that was aimed to verify the validity of our proposal. World Wide Web security is an important issue on the Internet and trusted information is critical. We experimented with Web page signing, applying the extended XML Signature. We propose the scheme for signed Web pages based on the XML Signature. We conducted a test implementation of the scheme with the extended XML Signature. We verified that the proposed scheme could easily be implemented and incorporated into the current Web environment as well as the effectiveness of the extended XML Signature. The paper concludes by identifying necessary areas for future standardization.
Download

Paper Nr: 62
Title:

A NEW (t , n) MULTI-SECRET SHARING SCHEME BASED ON LINEAR ALGEBRA

Authors:

Seyed H. Hassani and Mohammad Reza Aref

Abstract: In this paper, a new multi-secret threshold scheme based on linear algebra and matrices is proposed. Unlike many recently proposed methods, this method lets the use of conventional cryptographic algorithms in shar- ing multiple secrets. Our scheme is a multi-use scheme, which in some cases, the amount of computations is considerably reduced. Also, in this paper bounds on the maximum number of participants, for a given threshold value, are obtained.
Download

Paper Nr: 87
Title:

UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS

Authors:

Jarrod Trevathan and Wayne Read

Abstract: Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In addition, an outsider or rival seller can lure away bidders by directly offering them better deals, or a malicious seller can auction mis-represented or non-existent items. This conduct is a problem as it results in market failure, thereby inhibiting the usefulness of online auctions as an exchange medium. While cryptography has been used to provide security in terms of bid authentication and privacy, there is no documented means to prevent many of the aforementioned problems. This paper investigates undesirable and fraudulent behaviour in online auctions. We examine the following practices: bid shielding, shill bidding, bid sniping, siphoning and selling non-existent or misrepresented items. We describe the characteristics of such behaviour and how to identify it in an auction. We also provide recommendations for recourse against undesirable and fraudulent participants.
Download

Paper Nr: 116
Title:

DEFINING VIEWPOINTS FOR SECURITY ARCHITECTURAL PATTERNS

Authors:

David G. Rosado, Carlos Gutiérrez, Eduardo Fernández-medina and Mario Piattini

Abstract: For decades, the security community has undertaken detailed research into specific areas of security, while largely ignoring the design process. Software architecture has emerged as an important sub-discipline of software engineering, particularly in the realm of large system development. This paper describes how security architectural patterns lack of a comprehensive and complete well-structured documentation that conveys essential information of their logical structure, deployment-time, run-time behaviour, monitoring configuration, and so on. Thus we will propose a viewpoints model for describing security architectural patterns. We will investigate security architectural patterns from several IEEE 1471-2000 compliant viewpoints and develop an example that demonstrates how to describe a security architectural pattern with viewpoints. We will make use of well-known language notations such as UML to maximize comprehensibility.
Download

Paper Nr: 120
Title:

MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES

Authors:

Sharon Nachtigal and Chris Mitchell

Abstract: Organisations (enterprises, businesses, government institutions, etc.) have changed their way of doing business from a traditional approach to embrace e-business processes. This change makes the perimeter security approach inappropriate for such organisations. The well-known and widely used security mechanisms, including cryptography-based tools and techniques, cannot provide a sufficient level of security without being a part of a comprehensive organisational approach/philosophy. This approach must be different from the current dominant approach, i.e. perimeter security, and must focus on different organisational components. In this paper we suggest a process security approach, and describe ongoing research with the aim of developing an e-business security model based on this new, process security, approach.
Download

Paper Nr: 122
Title:

SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)

Authors:

Kari A. Haaland and Chunming Rong

Abstract: There is obvious need in cooperation between organizations. A recent trend is cooperation online, which result in the need of facilitating and managing cross-domain access to information and applications. It is important to utilize open standards that leverage existing technologies instead of replacing them. WS-Security, emitted by OASIS, defines standards on how to encode security tokens. In this paper we look at the use of Identity-based Encryption to leverage the exchange of security tokens, and how it can be implemented with WS-Security. Identity-based encryption offers, compared to the more conventional PKI, some additional advantages. For instance: databases maintaining public-key certificates are now longer necessary, this simplify key management, saves space, and eliminate the threat of attacks on these databases. It is also more suitable to grant collective access to groups, and is therefore suited for role based access control. We do not suggest Identity-based encryption as a replacement, but rather a complementary.
Download

Paper Nr: 143
Title:

SECURITY RISK ANALYSIS IN WEB SERVICES SYSTEMS

Authors:

Eduardo Fernández-medina, Eduardo Fernández-medina and Mario Piattini

Abstract: Nowadays, best practices dictate that security requirements of distributed software-intensive systems should be based on security risk assessments. Web services-based systems supporting network alliances among organizations through Internet are such type of systems. In this article we present how we’ve adopted the risk analysis and management methodology of the Spanish Public Administration, which conforms to ISO 15408 Common Criteria Framework (CCF), to the Process for Web Services Security (PWSSec) developed by the authors. In addition, a real case study where this adaptation was applied is shown.
Download

Paper Nr: 52
Title:

SECURE INFORMATION SYSTEMS DEVELOPMENT - Based on a Security Requirements Engineering Process

Authors:

Daniel Mellado, Eduardo Fernández-medina and Mario Piattini

Abstract: Integration of security into the early stages of the system development is necessary to build secure systems. However, in the majority of software projects security is dealt with when the system has already been designed and put into operation. This paper will propose an approach called SREP (Security Requirements Engineering Process) for the development of secure software. We will present an iterative and incremental micro-process for the security requirements analysis that is repeatedly performed at each phase. It integrates the Common Criteria into the software lifecycle model as well as it is based on the reuse of security requirements, by providing a security resources repository. In brief, we will present an approach which deals with the security requirements at the early stages of software development in a systematic and intuitive way, and which also conforms to ISO/IEC 17799:2005.
Download

Paper Nr: 83
Title:

AN EXTENDED ROLE-BASED ACCESS CONTROL FOR WEB SERVICES

Authors:

Yi-qun Zhu, Jianhua Li and Quan-hai Zhang

Abstract: A key challenge in Web services security is the design of effective access control schemes that can adequately satisfy Web services security requirements. Despite the recent advances in Web based access control, there remain issues that impede the development of effective access control models for Web services environments. One of them is the lacks of dynamic role management and attributes access control for Web services. In this paper, we present a dynamic attribute-based role-based access control model (DARBAC) to address the issues. The proposed approach introduces authorization group, which is used to dynamically manages roles and privileges, and attribute based access control mechanism which is used to protect the services and services parameters. We outline the configuration mechanism needed to apply our model to the Web services environments.
Download

Area 2 - Access Control and Intrusion Detection

Full Papers
Paper Nr: 51
Title:

INTRUSION DETECTION FOR WEB APPLICATIONS (SHORT VERSION)

Authors:

Nathalie Dagorn

Abstract: Intrusion detection systems (IDS) are usually classified into two categories: misuse- and anomaly detection systems. Misuse detection is based on signatures; it is precise but can only accommodate already known attacks. Unlike this, anomaly detection models a system’s usual behavior and is able to detect new attacks, but some major challenges remain to be solved in this field, in particular the improvement of the detection process and the reduction of false alarms. On the application/service level, several misuse detection systems exist and work, but only one anomaly detection system is known to be efficient for now. In this short paper, we propose a Web learning-based anomaly detection system based on this system, and resulting from the junction of academic research in several fields, which we improved. The system analyzes HTTP requests as logged by most of the Web servers; it exclusively relates to the queries containing attributes. The analysis process implements a multi-model statistical approach. A Bayesian network is used as decision process, specifying six states (one normal state and five attack states) at the classification node. The system is improved after each log analysis thanks to a technique of alarm clustering, which allows filtering false positive. Compared to traditional anomaly detection systems, the system we present globally gains in sensitivity (each step of the process reduces the number of false positive to be dealt with) and in specificity (if an attack is detected, its type is immediately specified). Moreover, a co-operation feature (alarm correlation) with other systems is proposed for distributed intrusion detection. To date, the system has only been partially implemented but the preliminary experiments in real environment show encouraging results.
Download

Paper Nr: 74
Title:

WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION

Authors:

Juan Manuel García, Tomás Navarrete and Carlos Orozco

Abstract: We present an approach to anomaly detection based on the construction of a Hidden Markov Model trained on processor workload data. Based on processor load measurements, a HMM is constructed as a model of the system normal behavior. Any observed sequence of processor load measurements that is unlikely generated by the HMM is then considered as an anomaly. We test our approach taking real data of a mail server processor load to construct a HMM and then we test it under several experimental conditions including a simulated DoS attacks. We show some evidence suggesting that this method could be successful to detect attacks or misuse that directly affects processor performance.
Download

Paper Nr: 74
Title:

WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION

Authors:

Juan Manuel García, Tomás Navarrete and Carlos Orozco

Abstract: We present an approach to anomaly detection based on the construction of a Hidden Markov Model trained on processor workload data. Based on processor load measurements, a HMM is constructed as a model of the system normal behavior. Any observed sequence of processor load measurements that is unlikely generated by the HMM is then considered as an anomaly. We test our approach taking real data of a mail server processor load to construct a HMM and then we test it under several experimental conditions including a simulated DoS attacks. We show some evidence suggesting that this method could be successful to detect attacks or misuse that directly affects processor performance.
Download

Paper Nr: 74
Title:

WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION

Authors:

Juan Manuel García, Tomás Navarrete and Carlos Orozco

Abstract: We present an approach to anomaly detection based on the construction of a Hidden Markov Model trained on processor workload data. Based on processor load measurements, a HMM is constructed as a model of the system normal behavior. Any observed sequence of processor load measurements that is unlikely generated by the HMM is then considered as an anomaly. We test our approach taking real data of a mail server processor load to construct a HMM and then we test it under several experimental conditions including a simulated DoS attacks. We show some evidence suggesting that this method could be successful to detect attacks or misuse that directly affects processor performance.
Download

Paper Nr: 76
Title:

SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME

Authors:

Behnam Sattarzadeh, Mahdi Asadpour and Rasool Jalili

Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart cards. Later, Yang and Wang pointed out that Wu and Chieu’s scheme is vulnerable to the password guessing and forgery attacks. Recently, Lee et al. proposed an improved authentication scheme and claimed that their scheme is secure against forgery attack. However, in this paper, we illustrate that Lee et al.’s scheme is still vulnerable to the forgery attack. We also propose an enhancement of the scheme to resist such that attack.
Download

Paper Nr: 92
Title:

COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION DETECTION

Authors:

Montaceur Zaghdoud and Mohamed Ben Ahmed

Abstract: Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationship which can affect attack types. Bayesian Network (BN) is known as causal graphical model which can learn from data and after that it can be used to deduce conclusion about a fact based on causal relations with other prior facts. Causal relationships in BN are modeled by conditional probabilities. Recently, Possibilistic Network (PN) is being a complementary or sometimes concurrently model of BN and demonstrated superiority in computing imprecise and/or incomplete data. PN is based on the same principle as BN but it uses conditional possibilities rather than conditional probabilities to modal causal relationships. Several researchers worked on comparison between BN and PN in many domains. But, in this paper we are interested by comparison between BN and PN network in Intrusion Detection. Comparison criteria covered detection rate and false alarms rate. Experimentation process used DARPA’99 data set. Comparison results show a global superiority of PN versus BN when detecting intrusion. The main outcome of this research work is to develop an Intrusion Detection System (IDS) based on BN and/or PN network depending comparison results.
Download

Paper Nr: 101
Title:

EVALUATION OF THE INTRUSION DETECTION CAPABILITIES AND PERFORMANCE OF A SECURITY OPERATION CENTER

Authors:

Abdoul K. Ganame, Julien Bourgeois, Renaud Bidou and Francois Spies

Abstract: Detecting all kinds of intrusions efficiently requires a global view of the monitored network. We have developed a security operation center which is able to detect coordinated attacks that are not detected by traditional IDS. In this article, we present several methods used to test the accuracy and the performance of our security operation center. A real ISP network have been used as well as experiments in our lab.
Download

Paper Nr: 108
Title:

SPOOFED ARP PACKETS DETECTION IN SWITCHED LAN NETWORKS

Authors:

Zouheir Trabelsi and Khaled Shuaib

Abstract: Spoofed ARP packets are used by malicious users to redirect network’s traffic to their hosts. The potential damage to a network from an attack of this nature can be very important. This paper discusses first how malicious users redirect network traffic using spoofed ARP packets. Then, the paper proposes a practical and efficient mechanism for detecting malicious hosts that are performing traffic redirection attack against other hosts in switched LAN networks. The proposed mechanism consists of sending first spoofed packets to the network’s hosts. Then, by collecting and analyzing the responses packets, it is shown how hosts performing traffic redirection attack can be identified efficiently and accurately. The affect of the proposed mechanism on the performance of the network is discussed and shown to be minimal. The limits of current IDSs regarding their ability to detect malicious traffic redirection attack, based on spoofed ARP packets, in switched LAN networks are discussed. Our work is concerned with the detection of malicious network traffic redirection attack, at the Data Link layer. Other works proposed protection mechanisms against this attack, but at the Application layer, using cryptographic techniques and protocols.
Download

Paper Nr: 129
Title:

THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly

Authors:

Roberto Ricci, G. Chollet, M. V. Crispino, S. Jassim, J. Koreman, A. Morris, M. Olivar-Dimas and P. Soria-Rodríguez

Abstract: This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone’s primary aim is to realise a mobile phone prototype - the “SecurePhone” - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (e-signed) documents and voice recordings. SecurePhone’s “biometric recogniser” is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone’s built-in e-signature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation.
Download

Paper Nr: 147
Title:

PERSON VERIFICATION BY FUSION OF PROSODIC, VOICE SPECTRAL AND FACIAL PARAMETERS

Authors:

Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde and Jordi Luque

Abstract: Prosodic information can be used successfully for automatic speaker recognition, although most of the speaker recognition systems use only short-term spectral features as voice information. In this work, prosody information is added to a multimodal system based on face and voice characteristics in order to improve the performance of the system. Fusion is carried out by using various fusion strategies and two different fusion techniques: support vector machines and matcher weighting. Results are clearly improved when a previous normalization based on histogram equalization is done before the fusion of the monomodal scores.
Download

Short Papers
Paper Nr: 37
Title:

ON THE SELF-SIMILARITY OF THE 1999 DARPA/LINCOLN LABORATORY EVALUATION DATA

Authors:

Kun Huang and Dafang Zhang

Abstract: While intrusion detection systems (IDSs) are becoming ubiquitous defence, no comprehensive and scientifically rigorous benchmark is available to evaluate their performances. In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comprehensive evaluation of IDSs and produced the DARPA off-line evaluation data to train and test IDSs. However, there is the lack of detailed characteristics of the DARPA/Lincoln Laboratory evaluation data. This paper examines the self-similarity of the 1999 DARPA/Lincoln Laboratory evaluation data sets for training and indicates that the evaluation data clearly exhibits self-similarity during preceding tens of hours period, while not during other time periods. Also the likely causes failing self-similarity are explored. These finding results can help evaluators to understand and use the 1999 DARPA/Lincoln Laboratory evaluation data well to evaluate IDSs.
Download

Paper Nr: 49
Title:

USING ATTACK GRAPHS IN AD HOC NETWORKS - For Intrusion Prediction Correlation and Detection

Authors:

Marianne Azer, Sherif El-kassas and Magdy El-soudani

Abstract: Ad hoc networks have lots of applications; however, a vital problem concerning their security aspects must be solved in order to realize these applications. Hence, there is a strong need for intrusion detection as a frontline security research area for ad hoc networks security. Among intrusion detection techniques, anomaly detection is advantageous since it does not need to store and regularly update profiles of known attacks. In addition the intrusion detection is not limited to the stored attack profiles, which allows the detection of new attacks. Therefore, anomaly detection is more suitable for the dynamic and limited resources nature of ad hoc networks. For appropriately constructed network models, attack graphs have shown their utility in organizing combinations of network attacks. In this paper, we suggest the use of attack graphs in ad hoc networks. As an example, we give an attack graph that we have created for the wormhole attack. For anomaly prediction, correlation, and detection in ad hoc networks, we suggest the use of two methods that rely basically on attack graphs. The first method is based on the attack graph adjacency matrix and helps in the prediction of a single or multiple step attack and in the categorization of intrusion alarms’ relevance. The second method uses the attack graph distances for correlating intrusion events and building attack scenarios. Our approach is more appropriate to ad hoc networks’ collaborative and dynamic nature, especially at the application level.
Download

Paper Nr: 85
Title:

QUANTITATIVE ANALYSIS AND ENFORCEMENT OF THE PRINCIPLE OF LEAST PRIVILEGE IN ROLE-BASED ACCESS CONTROL

Authors:

Chunren Lai and Chang N. Zhang

Abstract: Role-based access control (RBAC) models ease security administration and reduce overheads by introducing roles between users and privileges. RBAC provides the possibility to enforce the principle of least privileges that a user should be assigned just enough privileges to complete his/her job in order to prevent the possible information leaking and other wrong doing. This paper defines several concepts to quantitatively measure how well a user-role assignment meets the principle of least privilege and presents algorithms to find the perfect user-role assignment (i.e., without bringing any extra privilege) and the optimal user-role assignment (i.e., limiting any extra privilege to the minimum). The proposed approach for the enforcement of the principle of least privilege is particularly useful for automatic generation of user-role assignment in large-scale RBAC systems.
Download

Paper Nr: 69
Title:

ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS

Authors:

Wenhua Qi

Abstract: Collaborative peer groups means that multiple self-organizing peers aggregating in a controlled manner to accomplish some collective goals. Peer groups share the properties of peer-to-peer overlay network, including full decentralization, symmetric abilities, and dynamism, which make security problems more complicated. Most prior work focused on authentication, group key management and communication security. However, access control is an important precondition of many security services. Intend for a pure decentralized model without centralized server, our framework employs a distributed delegation authorization mechanism and proposes an authority selection scheme. Multiple authorities could exist in this design, which could avoid single point of failure. Based on the role-based trust management language RT, this paper presents an attribute-based access control framework, and describes a formal joint authorization protocol under voting scheme, to satisfy security requirements of multiple peers. We also introduce our implementation experience by applying JXTA technology.
Download

Paper Nr: 124
Title:

DIGITAL PSEUDONYM IDENTITY FOR E-COMMERCE

Authors:

Rafael Martínez-Peláez, Francisco J. Rico-Novella and Luis A. Zarza López

Abstract: The identity is a unique and intransitive property which any human being possesses. Due to its characteristics is used in Internet. Unfortunately, when a user discloses his personal information to web site does not know the risks about his identity’s privacy. This paper describes the usefulness of user’s identity in Internet and the problems related with their usage in web sites. To improve the user's privacy we propose a digital pseudonym identity as an alternative to replace the used of genuine identity in Internet.
Download

Paper Nr: 138
Title:

PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH

Authors:

Ahmed R. Kaced and Jean-claude Moissinac

Abstract: By breaking the end-to-end nature of the communication, proxies render the task of providing end-to-end security much harder or even impossible in some cases. In this paper, we will address the questions of when and how end-to-end security, like confidentiality and authenticity can be preserved, in a multimedia content delivery platform, when having one or more adaptation proxies in the data path. We describe SEMAFOR, a platform for protecting adaptive multimedia content delivery in heterogeneous environments. SEMAFOR aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while allowing content adaptation by intermediary proxies between the content transmitter and the final users. Adaptation and authentication management are done by the intermediary proxies, transparently to connected hosts, which totally make abstraction of these processes. SEMAFOR provides AMCA a new content authentication based on multi-hop signature scheme using a Merkle Hash Tree, and XSST a secured transaction protocol that gives securely exchanges of transactions in SEMAFOR.
Download

Area 3 - Network Security and Protocols

Full Papers
Paper Nr: 75
Title:

LAYERED ARCHITECTURE FOR SECURE E-COMMERCE APPLICATIONS

Authors:

Amir Herzberg and Igal Yoffe

Abstract: We present a layered architecture for secure e-commerce applications and protocols with fully automated dispute-resolution process, robust to communication failures and malicious faults. Our design is modular, with precise yet general-purpose interfaces and functionalities, and allows usage as an underlying secure service to different e-commerce, e-banking and other distributed systems. The interfaces support diverse, flexible and extensible payment scenarios and instruments, including direct buyer-seller payments as well as (the more common) indirect payments via payment service providers (e.g. banks). Our design is practical, efficient, and ensures reliability and security under realistic failure and delay conditions.
Download

Paper Nr: 77
Title:

SECURE ACCESS MODULES FOR IDENTITY PROTECTION OVER THE EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures

Authors:

Pascal Urien and Mohamad Badra

Abstract: Identity protection and privacy became increasingly important in network communications; especially in wireless LAN. In this optic, Privacy Enhancing Technologies (PET) have been introduced to provide anonymous exchange and to protect personal data. In this paper, we present the SAM (Secure Access Module) architecture, which is a couple of smartcards (client and server) that process EAP-TLS, a transparent transport of TLS (Transport Layer Security) over EAP (Extensible Authentication Protocol). This architecture provides mutual authentication, identity protection and data un-traceability by preventing undesired and unnecessary processing of personal data.
Download

Paper Nr: 82
Title:

PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK

Authors:

Chuan-wen Loe and Khoongming Khoo

Abstract: In the literature, several encryption modes of operation based on cipher block chaining (CBC) has been proven to be secure under non-adaptive chosen plaintext attack (CPA-1) in the left-or-right (LOR) or find-then-guess (FTG) security models. However, it was shown by Joux et. al. at Crypto 2002 that if we allow the adversary to perform an adaptive chosen plaintext attack (CPA-2), then CBC, ABC and GEM are susceptible to FTG attacks. In this paper, we propose a new CBC-type encryption called input-output masked CBC (IO-CBC) which can protect against FTG and LOR attacks based on forcing an input collision, protects against Joux’s FTG attack under proper implementation, and increases the difficulty of linear and differential cryptanalysis. The efficiency of IO-CBC is comparable to CBC because it does only one additonal encryption when compared with CBC. We also reasoned that the security proof of an IO-CBC variant follows from that of OCB.
Download

Paper Nr: 97
Title:

FORWARD-SECURE AUTHENTICATED-ENCRYPTION IN MULTI-RECEIVER SETTING

Authors:

Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki and Atsushi Fujioka

Abstract: In this paper we study a generic construction of forward-secure authenticated-encryption in unidirectional, multi-receiver setting. By “multi-receiver setting” we mean the situation in which a single center transmits large data to a dynamically changing group of receivers. In such scenario a direct application of bidirectional, unicast methods would lead to multiple problems. In particular, we focus on the problem of vulnerability against a type of denial-of-service (DoS) attack. We show that this problem can be effectively resolved by a mechanism we call “MAC-then-MAC” structure. As the name suggests, this structure uses two independent MACs, but we illustrate how it can be realized without losing efficiency in transmission rate, storage size and computational overhead. Despite the fact that one of the MACs uses a constant key, our construction guarantees integrity in the sense of forward security. We provide a concrete security model showing that our construction achieves confidentiality and strong integrity (replay avoidance, in-order packet delivery, etc.) both in the sense of forward security.
Download

Paper Nr: 118
Title:

ON THE DESIGN OF A LOW-RATE DOS ATTACK AGAINST ITERATIVE SERVERS

Authors:

Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-teodoro

Abstract: Recent research exposes the vulnerability of current networked applications to a family of low-rate DoS attacks based on timing mechanisms. A kind of those attacks is targeted against iterative servers and employs an ON/OFF scheme to send attack packets during the chosen critical periods. The overall behaviour of the attack is well known and its effectiveness has been demonstrated in previous works. Nevertheless, it is possible to achieve a trade off between the performance of the attack and its detectability. This can be done by tuning some parameters of the attack waveform according to the needs of the attacker and the deployed detection mechanisms. In this paper, a mathematical model for the relationship among those parameters and their impact in the performance of the attack is evaluated. The main goal of the model is to provide a better understanding of the dynamics of the attack, which is explored through simulation. The results obtained point out the model as accurate, thus providing a framework feasible to be used to tune the attack.
Download

Paper Nr: 131
Title:

A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL

Authors:

Gregory Bard

Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guessed from a likely set of 2–1000 options. SSL and TLS are widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL and TLS standards mandate the use of the cipher block chaining (CBC) mode of encryption which requires an initialization vector (IV) in order to encrypt. Although the first IV used by SSL is a (pseudo)random string which is generated and shared during the initial handshake phase, subsequent IVs used by SSL are chosen in a deterministic, predictable pattern; in particular, the IV of a message is taken to be the final ciphertext block of the immediately-preceding message, and is therefore known to the adversary. The one-channel nature of web proxies, anonymizers or Virtual Private Networks (VPNs), results in all Internet traffic from one machine traveling over the same SSL channel. We show this provides a feasible “point of entry” for this attack. Moreover, we show that the location of target data among block boundaries can have a profound impact on the number of guesses required to recover that data, especially in the low-entropy case. The attack in this paper is an application of the blockwise-adaptive chosen-plaintext attack paradigm, and is the only feasible attack to use this paradigm with a reasonable probability of success. The attack will work for all versions of SSL, and TLS version 1.0. This vulnerability and others are closed in TLS 1.1 (which is still in draft status) and OpenSSL after 0.9.6d. It is hoped this paper will encourage the deprecation of SSL and speed the adoption of OpenSSL or TLS 1.1/1.2 when they are finially released.
Download

Paper Nr: 134
Title:

INTERNET ROUTING SECURITY: AN APPROACH TO DETECT AND TO REACT TO INCORRECT ADVERTISEMENTS

Authors:

Ines Feki, Xiaoli Zheng, MOHAMMED ACHEMLAL and Ahmed Serhrouchni

Abstract: Internet is composed of thousands of autonomous systems (AS). The Border Gateway Protocol (BGP) is the exterior routing protocol used to exchange network reachability information between border routers of each AS. The correctness of the exchanged information in BGP messages is crucial to the Internet routing system. Unfortunately, BGP is vulnerable to different attacks that have considerable impacts on routing system. Network prefix hijacking, where an AS illegitimately originates a prefix is one of the most important attacks. It allows the attacker to receive traffic in destination to the prefix owner. The attacker is then able to blackhole the traffic or to force it to take another path. Proposed solutions rely on public key infrastructures and cryptographic mechanisms to prevent incorrect routing information propagation. In practice these approaches involve many parties (Internet Service Providers, Operators, Vendors, and Regional Internet Registries) and are difficult to deploy. In this paper we formally define routing information correctness, especially the legitimacy of an AS to originate a prefix. We also propose a method to associate with an AS a legitimacy level to originate a prefix. We use Regional Internet Registry databases to initialize the legitimacy level. We also use received announcements and public routing data to update this legitimacy level. We finally describe all conceivable reactions facing origin AS changes.
Download

Paper Nr: 142
Title:

TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES

Authors:

Adam Wierzbicki

Abstract: The article considers trust management in Peer-to-Peer (P2P) systems without using reputation. The aim is to construct mechanisms that allow to enforce trust in P2P applications, where individual peers have a high possibility of unfair behaviour that is strongly adverse to the utility of other users. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems.
Download

Short Papers
Paper Nr: 3
Title:

SECURE EFFICIENT DISTANCE VECTOR ( S E A D ) ROUTING

Authors:

Morteza Seradj

Abstract: An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vector approaches, they have generally assumed a trusted environment. In this paper, we design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV). In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service (DoS) attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.

Paper Nr: 23
Title:

A DOS ATTACK AGAINST THE INTEGRITY-LESS ESP (IPSEC)

Authors:

Ventzislav Nikov

Abstract: This paper describes a new practical DoS attack that can be mounted against the “encryption-only” configuration (i.e. without authenticated integrity) of ESP as allowed by IPSec. This finding can serve as a strong argument to convince those in charge of the IPSec standardization to improve it by banning the “encryption-only” configuration from the standard.
Download

Paper Nr: 43
Title:

A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS

Authors:

Adrian Leung and Chris Mitchell

Abstract: The dynamic yet vulnerable nature of an hoc network presents many new security and privacy challenges. Securing the process of service discovery is one of them. Novel solutions are therefore required. However, in order for appropriate security measures to be devised, all possible security threats must first be identified and thoroughly analysed. In this paper, we present a threat model for service discovery in ad hoc networks. Based on these threats, we proceed to derive the security services required to achieve secure service discovery.
Download

Paper Nr: 61
Title:

SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS

Authors:

Steffen Fries

Abstract: This document describes current state of the art security functionality provided in the four mainly used and standardized Voice over IP (VoIP) signaling protocols, as there are the Session Initiation Protocol (SIP), H.323, Megaco, and the Media Gateway Control Protocol (MGCP). It outlines the security provided by the protocols itself or by dedicated security extensions including lower layer security protocols like Transport Layer Security (TLS) or IPSec. Moreover, vulnerabilities, which still remain in protocols or certain scenarios, are depicted as well. Furthermore discussed are also security approaches for the media data provided by the Secure Real-time Transport Protocol (SRTP) and associated key management schemes. Conclusions are given by identifying work areas, in which further security related work in the area of multimedia communication in general and VoIP in specific has to be done.
Download

Paper Nr: 99
Title:

ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION

Authors:

Rehab El Nemr, Iman Saroit and Sanaa H. Ahmed

Abstract: Security is a burning issue with intelligent security pausing as the most relevant as it is important in all types of applications which suffer from security related concerns. Accordingly, Security has become a need rather than a luxury. GSM Security flaws have been identified several years ago. Some of these flaws have been mended by the 3GPP but others are left to discussion. In this paper we will integrate a well known technique in the system; Public-key technique. Yet, we will introduce the solutions in a different point of view; they are Action-Triggered, meaning; it will work only if the flaw occurs. The original system will work in normal cases. We will also discuss End-to-End security and propose a mechanism of Key management to provide the subscribers with private calls’ option. Phone-Dependent technique is conducted to consider Service provider attacks.
Download

Paper Nr: 6
Title:

ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY

Authors:

Stefan Rass, Mohamed Ali Sfaxi and Solange Ghernaouti-helie

Abstract: Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a network over which messages can be sent unconditionally secure. We will show how quantum cryptography can be implemented in classical protocols and how existing networks can be efficiently extended to suit our needs for unconditional security. We show that graph connectivity is crucial for the security of the transmission. For that matter, we provide secure routing services, so an adversary cannot penetrate any message flow successfully. Furthermore, our protocols are extensible to allow up to t − 1 adversaries (possibly cooperating) while remaining unconditionally secure.
Download

Paper Nr: 90
Title:

PROTOCOL INDEPENDENT LIGHTWEIGHT SECURE COMMUNICATION

Authors:

M. A. Güvensan and A. Gökhan Yavuz

Abstract: This paper introduces a new protocol independent security mechanism, called PILSC (Protocol Independent Lightweight Secure Communication). PILSC utilizes the security feature of IPv4, defined but not used yet, inorder to have standardization in secure communication. We aim to increase the efficiency of the secure data transfer by means of examining the shortages of different security protocols. Although IPSec is the only protocol independent protocol, the redundant overhead and its hardly configurable structure encourages us to design a more fast and easy configurable mechanism, whose architecture is presented in detail in this paper. The implementation of PILSC on the kernel-level brings %75-%90 performance enhancement on cryptographic process time in comparison to the implementation of cryptographic processes in the user-space. Moreover, secure data transfer rate of PILSC is %20-25 faster than IPSec and SSL.
Download

Paper Nr: 130
Title:

COMBINATION OF A SMARTCARD E-PURSE AND E-COIN TO MAKE ELECTRONIC PAYMENTS ON THE INTERNET

Authors:

Antonio Ruiz Martínez, Antonio Gómez-skarmeta and Óscar Cánovas

Abstract: Nowadays e-purses are not being offered as payment method on the Internet. This is mainly due to the fact that vendors have to integrate in their devices a security application module (SAM) to exchange security messages between the e-purse and that module during the payment phase. In this paper we introduce a new payment method that combines the main advantages of e-purses and the use of e-coins to make payments. This proposal does not need a SAM to make and verify payments on the Internet. Furthermore, it does not require the e-coin to be checked on-line. Thus, we introduce the possibility that this e-purse can be easily integrated in payment applications that vendors offer on the Internet.
Download

Area 4 - Cryptographic Techniques and Key Management

Full Papers
Paper Nr: 30
Title:

PARALLEL MULTIPLICATION IN F2n USING CONDENSED MATRIX REPRESENTATION

Authors:

Christophe Negre

Abstract: In this paper we explore a matrix representation of binary fields F2n defined by an irreducible trinomial P = X n + X k + 1. We obtain a multiplier with time complexity of TA + (⌈log 2(n)⌉)TX and space 2 complexity of (2n − 1)n AND and (2n − 1)(n − 1) XOR . This multiplier reaches the lower bound on time complexity. Until now this was possible only for binary field defined by AOP (Silverman, 1999), which are quite few. The interest of this multiplier remains theoretical since the size of the architecture is roughly two times bigger than usual polynomial basis multiplier (Mastrovito, 1991; Koc and Sunar, 1999).
Download

Paper Nr: 41
Title:

TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS

Authors:

Hongxia Jin, Jeffory Lotspiech and Mario Blaum

Abstract: In this paper we study the traitor tracing problem, which originates in attempting to combat piracy of copy-righted materials. When a pirated copy of the material is observed, a traitor tracing scheme should allow to identify at least one of the real subscribers (traitors) who participate in the construction of a pirated copy. In this paper, we focus on the pay-per-view type of subscription-based scenarios, in which materials are divided into multiple segments and each segment has multiple variations. We present a systematic way to assign the variations for each segment and for each subscriber using an error-correcting code. We give sufficient conditions for a code to be able to trace at least a traitor when faced with a coalition of m traitors. We also prove that these sufficient conditions are also necessary when the code is an MDS code.
Download

Paper Nr: 50
Title:

DIGITAL CONTRACT SIGNATURE SCHEME BASED ON MULTIPLE CRYPTOSYSTEM

Authors:

Wang Lianhai and Manu Malek

Abstract: This paper presents a new type of signature, contract digital signature, based on Discrete Logarithm(DL) and Elliptic Curve(EC) cryptosystems. Contract signature is similar to a real-life contract. No less than two signers take part in a contract signature. After introducing the concept and definition of contract signature, a scheme based on Discrete Logarithm (DL) and Elliptic Curve (EC) cryptosystems is presented. This scheme allows signers, whose ordinary signature schemes use many different cryptographic systems, to generate a single signature. The scheme requires neither a trusted arbitrator nor a high degree of interaction between signers. We then prove that this scheme is secure under the discrete logarithm assumption.
Download

Paper Nr: 57
Title:

CHOSEN-IV STATISTICAL ATTACKS ON eSTREAM CIPHERS

Authors:

Markku-Juhani O. Saarinen

Abstract: d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were first introduced by Filiol in 2002. We show that there are strong indications that the Gate Complexity of a Boolean function is related to a bias detectable in a d-Monomial test. We then discuss how to effectively apply d-Monomial tests in chosen-IV attacks against stream ciphers. Finally we present results of tests performed on eSTREAM proposals, and show that six of these new ciphers can be broken using the d-Monomial test in a chosen-IV attack. Many ciphers even fail a trivial (ANF) bit-flipping test.
Download

Paper Nr: 64
Title:

EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE

Authors:

Robert P. Mcevoy and Colin C. Murphy

Abstract: All-or-Nothing Encryption is a useful technique which can heighten the security of block ciphers. It can also be used to design faster symmetric-key cryptosystems, by decreasing the number of required encryption operations at run-time. An open problem in the literature regards the speed of all-or-nothing encryption, which we address in this paper by combining two techniques from the literature, forming a new all-or-nothing mode of operation. Trade-offs in the implementation of this design are considered, and theoretical proofs of security are provided.
Download

Paper Nr: 98
Title:

DIGITAL OBJECT RIGHTS MANAGEMENT - Interoperable Client-side DRM Middleware

Authors:

Carlos Serrão, Miguel Dias and Jaime Delgado

Abstract: In a more and more interconnected world where the available bandwidths are increasing at a pace hard to imagine some time ago, multimedia e-content distribution over digital networks has become one of the biggest available services online. Powered not only by the network high availability but also by the emergence of new compression techniques and digital content consumer device, digital content is gaining momentum. However the same factors that power this emergence are also causing some problems, specially related with the digital content IPR management and protection. These problems are being handled employing DRM - Digital Rights Management technology which lack interoperability. This paper presents and discusses a solution that provides interoperability to DRM-protected content through the employment of a client-side DRM middleware layer. This middleware layer sits at the client-side of a broader DRM system (called DoRM) providing the necessary mechanisms to achieve interoperability between the different digital content rendering applications that the users possesses.
Download

Paper Nr: 103
Title:

PROPOSALS FOR ITERATED HASH FUNCTIONS

Authors:

Lars Ramkilde Knudsen and Søren Steffen Thomsen

Abstract: The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.
Download

Short Papers
Paper Nr: 17
Title:

AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATION

Authors:

Hiroshi Toyoizumi

Abstract: We derive the bounds of the mean queue length of an infinite phase size BM AP /M/1 queue which has an M/M /∞-type phase transition, and use them to evaluate the performance of secure group communication. Secure communication inside a groups on an open network is critical to enhance the internet capability. Extending the usual matrix analysis to the operator analysis, we derive a new estimation of the degradation of secure group communication model.
Download

Paper Nr: 39
Title:

MORE ROBUST PRIVATE INFORMATION RETRIEVAL SCHEME

Authors:

Chun-hua Chen and Gwoboa Horng

Abstract: In e-commerce, the protection of users’ privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated and solved. A PIR scheme allows a user to retrieve a data item from an online database while hiding the identity of the item from a database server. In this paper, a new PIR scheme using a secure coprocessor (SC) and including mutual authentication by DSA signature algorithm for protecting the privacy of users, is proposed. Because of using only one server and including the mutual authentication process in the proposed scheme, it is more efficient and more robust (secure) in the real e-commerce environment compared with previous PIR solutions. In addition, a security analysis (proof) for the proposed scheme and comparisons to other PIR schemes are given.
Download

Paper Nr: 71
Title:

AN ALGORITHM FOR AUTHENTICATION OF DIGITAL IMAGES

Authors:

Dumitru Burdescu and Liana Stanescu

Abstract: The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In digital watermarking, robustness is still a challenging problem if different sets of attacks need to be tolerated simultaneously. In this paper we present an original spatial authentication technique for digital images. Our approach modifies blocks of the image by insertion of a spatial watermark. A spatial mask of suitable size is used to hide data with less visual impairments. The watermark insertion process exploits average color of the homogeneity regions of the cover image. The complexity of the algorithms is proved to be O(n2), where ‘n’ is the nodes number of virtual graph for watermark. The authentication method developed below works for all types of digital image.
Download

Paper Nr: 72
Title:

ON USE OF IDENTITY-BASED ENCRYPTION FOR SECURE EMAILING

Authors:

Christian Veigner and Chunming Rong

Abstract: In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption. The original motivation for identity-based encryption was to help the deployment of a public-key infrastructure. The idea of an identity-based encryption scheme is that the public key can be any arbitrary string, for example, an email address, a name or a role. Several solutions were proposed in the following years. In 2001 the first practical and efficient scheme was proposed by Boneh and Franklin. Their encryption scheme was based on the Weil pairing on elliptic curves and proved secure in the random oracle model. In 2005, a new promising suggestion due to Waters was proposed, this time as an efficient solution without random oracles. An identity-based encryption (IBE) scheme does not need to download certificates to authenticate public keys as in a public-key infrastructure (PKI). A public key in an identity-based cryptosystem is simply the receiver’s identity, e.g. an email address. As often, when new technology occurs, the focus is on the functionality of the technology and not on its security. In this paper we briefly review about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms. Later on we show that IBE schemes used for secure emailing render spamming far easier for spammers compared to if a PKI certificate approach is used. With the IBE approach, viruses may also be spread out more efficiently.
Download

Paper Nr: 111
Title:

PRIVATE BIDDING FOR MOBILE AGENTS

Authors:

Bartek Gedrojc, Kathy Cartrysse and Jan C. Van Der Lubbe

Abstract: A major security and privacy threat for Mobile Software Agents are Untrustworthy Environments; which are able to spy on the agents’ code and private data. By combining Multi-Party Computation with ElGamal public-key encryption system we are able to create a protocol capable of letting two agents have a private bidding within an Honest-but-Curious environment only with the help of an Oblivious Third Party. The Oblivious party is able to compare two encrypted inputs without being able to retrieve any information about the inputs.
Download

Paper Nr: 31
Title:

FINITE FIELD MULTIPLICATION IN LAGRANGE REPRESENTATION USING FAST FOURRIER TRANSFORM

Authors:

Christophe Negre

Abstract: The multiplication in Fpn can be performed using a polynomial version of Montgomery multiplication (Montgomery, 1985). In (Bajard et al., 2003) Bajard et al. improved this method by using a Lagrange representation: the elements of Fpn are represented by their values at a fixed set of points. The costly operations in this new algorithm are the two changes of Lagrange representation which require 2r2 operations in Fp with n ≤ r ≤ 2⌈log2 (n)⌉ . In this paper we present a new method to perform the change of Lagrange representation. This method uses Fast Fourier Transform and has a cost equal to 3rlog2 (r) operations in Fp with r = 2⌈log2 (n)⌉ .
Download

Paper Nr: 102
Title:

DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES

Authors:

Luis A. Zarza López, Josep Pegueroles, Miguel Soriano and Rafael Martínez

Abstract: Genetic algorithms techniques are broadly accepted as an easy way to solve optimization problems. They provide, in a reasonable time, optimal or near-to-the-optimal solutions to problems involving a large amount of variables and entries. In this work we present Genetic Algorithms as a tool aiding the design of security protocols. The design process is divided in the following steps: a population consisting in a set of protocols is established; the population evolves according the benefits criteria programmed in the evolution process. The mapping of valid protocol messages to individuals in a population and the election of proper genetic algorithm evolution mechanisms are presented as key items in the whole process. All proposals in this work have been implemented in a software tool including basic features as cryptographic protocols design using public key and symmetric cryptography. Results achieved with simple examples confirm our expectations and point as future work the development of new versions including advanced features.
Download

Paper Nr: 114
Title:

USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS

Authors:

Francisco Pimenta and Carlos Serrão

Abstract: The lack of control inherent to digital content has been put on the spotlight by copyright infringement coupled with massive content distribution online (e.g., Peer-to-Peer). Digital Rights Management seems to be the solution to counter this problem advocating the use of cryptography and other related security mechanisms to protect digital content and to associate rights with it which determine how, when and by whom it can be consumed. The Open Mobile Alliance (OMA) specifies mobile service enablers in order to ensure interoperability throughout the mobile spectrum. As prominent mobile devices, Symbian OS smartphones offer an interesting platform for the demonstration of OMA DRM for the consumption of multimedia content. This article outlines the mechanisms enabling the protected consumption of the open and patent-free audio format (Ogg Vorbis Website), Ogg Vorbis using an OMA DRM 2.0 compliant audio player application running under Symbian OS (directed for mobile devices).
Download

Area 5 - Information Assurance

Full Papers
Paper Nr: 20
Title:

JASTEG2000 - Steganography for JPEG2000 Coded Images

Authors:

Domenico Introna and Francescomaria Marino

Abstract: The steganography is the concept of making invisible a communication, and not only incomprehensible its content (as cryptography does). This is generally achieved hiding a secret message into another one (“cover”), which appears as the only object of the communication. This paper proposes a steganographic method employing JPEG2000 images as “cover”. It reaches high embedding even introducing a low distortion. Experimental results have shown up to 35%-45% embedding rate, with 2 dB of distortion (in the worst case) at 0.5 bpp and 30%-40% with less than 4 dB at 1.0 bpp. Comparing these results with those achieved by JPEG2000-BPCS, it can be seen that our method produces considerably less post-embedding growth and distortion (in some case, they differ for more than 5 dB).
Download

Short Papers
Paper Nr: 112
Title:

NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR

Authors:

Igor Kotenko and Mikhail Stepashkin

Abstract: The approach to computer network security analysis intended for using both at design and exploitation stages is suggested. This approach is based on simulation of malefactor’s behavior, generating common attack graphs and calculating different security metrics. The graph represents possible attack scenarios taking into account network configuration, security policy, malefactor’s locations, knowledge level and strategy. The security metrics describe computer network security at different levels of detail and take into account various aspects of security. Attack scenarios model, common attack graph building procedures, used security metrics, and general security level evaluation are defined. The implemented version of the security analysis system is described, and examples of express-evaluations of security level are considered.
Download

Paper Nr: 63
Title:

SMOOTH BLOCKS-BASED BLIND WATERMARKING ALGORITHM IN COMPRESSED DCT DOMAIN

Authors:

Chun Qi and Haitao Zhou

Abstract: A novel blind watermarking scheme based on smooth blocks in compressed DCT domain is proposed. The smooth blocks are detected by a criterion which uses a relation between the quantized DC coefficients and the variance of AC coefficients in the block and deduced from the Weber’s Law. In the approach, the watermark is embedded by modifying the average value of some low-frequency DCT coefficients in selected blocks, and recovered by the sign of the mean value of corresponding coefficients in detected blocks and there is no need for original image. The experimental results demonstrate that almost no perceptible distortion is found in the watermarked images, and the watermark is robust to some image processing operations such as scaling, noise, filtering and JPEG compression.
Download