How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.

SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies Indianapolis Indiana USA June, 2018(2018)

引用 0|浏览15
暂无评分
摘要
Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, buggy implementations, or the lack of appropriate security constructs in the platform. In this talk, I will present examples of insecurity due to inadequate specification, wrong implementations, and deficient platform support. I will particularly focus on how automated reasoning and formal verification techniques can greatly contribute towards detecting vulnerabilities. In the first example, I will show how 4G LTE telecommunication protocol specification lacks security considerations which can be exploited by adversaries to have catastrophic impacts. Next, I will present how incorrect X.509 certificate validation implementations in open-source SSL/TLS libraries leave users prone to impersonation attacks. Finally, I will conclude my talk with a discussion of how lack of hardware support makes enforcing Digital Rights Management (DRM) policies infeasible for mobile devices.
更多
查看译文
关键词
Implementation bugs,Inconsistent Specification,X.509 Public-key Infrastructure,4G LTE,Digital Rights Management,Inadequate platform constructs
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要