Securing Web servers against insider attack

被引:10
|
作者
Jiang, S [1 ]
Smith, S [1 ]
Minami, K [1 ]
机构
[1] Dartmouth Coll, Inst Secur Technol Studies, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
10.1109/ACSAC.2001.991542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Too often, "security of Web transactions" reduces to "encryption of the channel" -and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator-but gives clients no basis for that trust. In this paper, we apply secure coprocessing and cryptography to solve this real problem in Web technology. We present a vision: using secure coprocessors to establish trusted co-servers at Web servers and moving sensitive computations inside these co-servers; we present a prototype implementation of this vision that scales to realistic workloads; and we validate this approach by building a simple E-voting application on top of our prototype. By showing the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments-such as at web servers with risk of insider attack-this work also helps demonstrate that "secure hardware" can be more than synonym for "cryptographic accelerator'.
引用
收藏
页码:265 / 276
页数:12
相关论文
共 50 条
  • [21] Cyber Attack on Pilz: Securing the Smart Factory against Emotet
    Schulz, Clemens A.
    ATP MAGAZINE, 2020, (1-2): : 61 - 63
  • [22] Security Enhancement to a Group Key Transfer Protocol Against Insider Attack
    Huang, Juan
    Li, Yajun
    Liu, Yining
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 4 - 8
  • [23] ID-Based Encryption with Equality Test Against Insider Attack
    Wu, Tong
    Ma, Sha
    Mu, Yi
    Zeng, Shengke
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 168 - 183
  • [24] Evaluation of a low-rate DoS attack against application servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesue E.
    Garcia-Teodoro, Pedro
    COMPUTERS & SECURITY, 2008, 27 (7-8) : 335 - 354
  • [25] Trust Evaluation Model against Insider Attack in Wireless Sensor Networks
    Lu, Yifan
    Lin, Kai
    Li, Keqiu
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 319 - 326
  • [26] LoRDAS: A Low-Rate DoS Attack against Application Servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesus E.
    Garcia-Teodoro, Pedro
    de Toro-Negro, Francisco
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 197 - 209
  • [27] Evaluation of a low-rate DoS attack against iterative servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesus E.
    Garcia-Teodoro, Pedro
    COMPUTER NETWORKS, 2007, 51 (04) : 1013 - 1030
  • [28] On the design of a low-rate DoD attack against iterative servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesus E.
    Garcia-Teodoro, Pedro
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 149 - 156
  • [29] Securing Wireless Medium Access Control Against Insider Denial-of-Service Attackers
    Chang, Sang-Yoon
    Hu, Yih-Chun
    Liu, Zhuotao
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 370 - 378
  • [30] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18