The Fine Print of Security

Summary form only given. Simple views of systems are often convenient in their design and analysis. However, attackers may attempt to exploit any oversimplification. For security, it is therefore useful to understand the value and the limitations of simplistic models. Computational-soundness theorem...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2010 25th Annual IEEE Symposium on Logic in Computer Science s. 110
Hlavný autor: Abadi, M
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.07.2010
Predmet:
ISBN:9781424475889, 1424475880
ISSN:1043-6871
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Summary form only given. Simple views of systems are often convenient in their design and analysis. However, attackers may attempt to exploit any oversimplification. For security, it is therefore useful to understand the value and the limitations of simplistic models. Computational-soundness theorems, which are the main subject of this lecture, can sometimes shed light on this question. We discuss them first in the context of security protocols. There, two distinct, rigorous views of cryptography have developed over the years. One of the views relies on a simple but powerful symbolic approach; the other, on a detailed computational model that considers issues of probability and complexity. In the last decade, however, we have made substantial progress in bridging the gap between these views. This progress, of which a paper with Phil Rogaway was one of the early steps, is due to many researchers. By now, this line of work provides computational justifications for formal treatments of cryptographic operations and security protocols, and also explores hybrid approaches. Similar ideas can apply in the domain of software protection, although they are less mature in this domain. Specifically, we can relate high-level security guarantees, of the kind offered by programming-language semantics, with lower-level properties of implementations. Layout randomization, one popular and effective implementation technique, again brings up issues of probability and complexity. The lecture introduces some recent work with Gordon Plotkin on this topic.
AbstractList Summary form only given. Simple views of systems are often convenient in their design and analysis. However, attackers may attempt to exploit any oversimplification. For security, it is therefore useful to understand the value and the limitations of simplistic models. Computational-soundness theorems, which are the main subject of this lecture, can sometimes shed light on this question. We discuss them first in the context of security protocols. There, two distinct, rigorous views of cryptography have developed over the years. One of the views relies on a simple but powerful symbolic approach; the other, on a detailed computational model that considers issues of probability and complexity. In the last decade, however, we have made substantial progress in bridging the gap between these views. This progress, of which a paper with Phil Rogaway was one of the early steps, is due to many researchers. By now, this line of work provides computational justifications for formal treatments of cryptographic operations and security protocols, and also explores hybrid approaches. Similar ideas can apply in the domain of software protection, although they are less mature in this domain. Specifically, we can relate high-level security guarantees, of the kind offered by programming-language semantics, with lower-level properties of implementations. Layout randomization, one popular and effective implementation technique, again brings up issues of probability and complexity. The lecture introduces some recent work with Gordon Plotkin on this topic.
Author Abadi, M
Author_xml – sequence: 1
  givenname: M
  surname: Abadi
  fullname: Abadi, M
  organization: Microsoft Res., Univ. of California, Santa Cruz, CA, USA
BookMark eNo1jkFLw0AQRkesYFtz8qaX_IHU2ezs7uxRgtVCQKH1XDbbCa5oKkk89N8bUN_l410-3gJm3bETgGuFK6XQ39WbarsqcVJ_BgtFJZEz7P05ZN7xv7OfwVwh6cKyU5eQDcM7TpApnaI53OzeJF-nTvKXPnVjfmzzrcTvPo2nK7how8cg2d8u4XX9sKueivr5cVPd10VSaMaiYXYOGzQBKTpiK9gYZ7XXJJrDFHFQTWz5YDkGbto2WG8lBG0IS7JRL-H29zeJyP6rT5-hP-2Ncei90T-TGT3M
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/LICS.2010.9
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library (LUT)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1424475899
9781424475896
EndPage 110
ExternalDocumentID 5570995
Genre orig-research
GroupedDBID --Z
23M
29P
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i105t-b88770b05a04c7486e0b5763934e38a475d1bcf8d68ca8bffa696eaa3540246c3
IEDL.DBID RIE
ISBN 9781424475889
1424475880
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000287454900014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1043-6871
IngestDate Wed Aug 27 03:06:33 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i105t-b88770b05a04c7486e0b5763934e38a475d1bcf8d68ca8bffa696eaa3540246c3
PageCount 1
ParticipantIDs ieee_primary_5570995
PublicationCentury 2000
PublicationDate 2010-July
PublicationDateYYYYMMDD 2010-07-01
PublicationDate_xml – month: 07
  year: 2010
  text: 2010-July
PublicationDecade 2010
PublicationTitle 2010 25th Annual IEEE Symposium on Logic in Computer Science
PublicationTitleAbbrev LICS
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452714
ssj0002640
Score 1.7311056
Snippet Summary form only given. Simple views of systems are often convenient in their design and analysis. However, attackers may attempt to exploit any...
SourceID ieee
SourceType Publisher
StartPage 110
SubjectTerms Complexity theory
Computational modeling
Cryptography
Protocols
Semantics
Silicon
Title The Fine Print of Security
URI https://ieeexplore.ieee.org/document/5570995
WOSCitedRecordID wos000287454900014&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED21FQNTgRZB-VAGRkyd2vHHXFGBVFWVClK3ynYcqUuKSsrv55y4QUgsbI6VIafYfnfne-8AHhyGGSKUVbBUaMIdtcR4lxKfIfjSokAPpVbXn8vFQq3XetmBx5YL472vi8_8UxjWd_n5zh1Cqmwc5KK0zrrQlVI2XK02nxKkwWWAmngKI9BHJQJGBEYFR1IX-seq1XqKzzoS91Kqx_PX6aqp-NK_Gq7UeDPr_-9Lz2D4Q9xLli0knUPHlxfQP3ZuSOJGHsAIV0cyQwcT396WVbIrklVsZDeE99nz2_SFxC4JZIu-UUUsHhOSWpoZyp3kSnhqMYhgmnHPlEED89S6QuVCOaNsURihhTcmJHwmXDh2Cb1yV_orSERQ87KOB016rujEYvCXM8kmXkqRM30Ng2Dq5qMRwthEK0d_T9_AaXPVHmpbb6FX7Q_-Dk7cV7X93N_Xf-8b29mP7A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH5BNNETKhjFXzt4tNKtXX-ciQTiJCRgwo2sXZdwGQSHf7_tVmZMvHjrmh32srbfe6_v-x7Ak7ZhBnNlFSRkElGNFUqNDpGJLfjiPLceSqWun_DpVCyXctaC54YLY4ypis_MixtWd_nZRu9dqmzg5KKkjI_gOKY0Cmu2VpNRceLg3IGNP4ct1HstAoKYjQsOtC7rIYtG7ck_S0_dC7EcJJPhvK75kr9arlSIM-r871vPofdD3QtmDShdQMsUl9A59G4I_FbuQt-uj2BkXUz79roog00ezH0rux58jF4XwzHyfRLQ2npHJVL2oOBY4TjFVHMqmMHKhhFEEmqISK2BWah0LjImdCpUnqdMMpOmLuUTUabJFbSLTWGuIWBOz0tp6lTpqcCRsuFfRjiJDOcsI_IGus7U1baWwlh5K_t_Tz_C6XjxnqySyfTtFs7qi3dX6XoH7XK3N_dwor_K9efuofqT35aNkzM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+25th+Annual+IEEE+Symposium+on+Logic+in+Computer+Science&rft.atitle=The+Fine+Print+of+Security&rft.au=Abadi%2C+M&rft.date=2010-07-01&rft.pub=IEEE&rft.isbn=9781424475889&rft.issn=1043-6871&rft.spage=110&rft.epage=110&rft_id=info:doi/10.1109%2FLICS.2010.9&rft.externalDocID=5570995
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1043-6871&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1043-6871&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1043-6871&client=summon