Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3205977.3206002acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
invited-talk
Public Access

How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security

Published: 07 June 2018 Publication History

Abstract

Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, buggy implementations, or the lack of appropriate security constructs in the platform. In this talk, I will present examples of insecurity due to inadequate specification, wrong implementations, and deficient platform support. I will particularly focus on how automated reasoning and formal verification techniques can greatly contribute towards detecting vulnerabilities. In the first example, I will show how 4G LTE telecommunication protocol specification lacks security considerations which can be exploited by adversaries to have catastrophic impacts. Next, I will present how incorrect X.509 certificate validation implementations in open-source SSL/TLS libraries leave users prone to impersonation attacks. Finally, I will conclude my talk with a discussion of how lack of hardware support makes enforcing Digital Rights Management (DRM) policies infeasible for mobile devices.

References

[1]
S. Y. Chau, O. Chowdhury, E. Hoque, H. Ge, A. Kate, C. Nita-Rotaru, and N. Li. 2017. SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. In 2017 IEEE Symposium on Security and Privacy (SP). 503--520.
[2]
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE 2018 Network and Distributed System Security Symposium (NDSS).

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
June 2018
271 pages
ISBN:9781450356664
DOI:10.1145/3205977
  • General Chair:
  • Elisa Bertino,
  • Program Chairs:
  • Dan Lin,
  • Jorge Lobo
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2018

Check for updates

Author Tags

  1. 4G LTE
  2. X.509 public-key infrastructure
  3. digital rights management
  4. implementation bugs
  5. inadequate platform constructs
  6. inconsistent specification

Qualifiers

  • Invited-talk

Funding Sources

Conference

SACMAT '18
Sponsor:

Acceptance Rates

SACMAT '18 Paper Acceptance Rate 14 of 50 submissions, 28%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 178
    Total Downloads
  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)9
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media