Securing Web servers against insider attack

被引:10
|
作者
Jiang, S [1 ]
Smith, S [1 ]
Minami, K [1 ]
机构
[1] Dartmouth Coll, Inst Secur Technol Studies, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
10.1109/ACSAC.2001.991542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Too often, "security of Web transactions" reduces to "encryption of the channel" -and neglects to address what happens at the server on the other end. This oversight forces clients to trust the good intentions and competence of the server operator-but gives clients no basis for that trust. In this paper, we apply secure coprocessing and cryptography to solve this real problem in Web technology. We present a vision: using secure coprocessors to establish trusted co-servers at Web servers and moving sensitive computations inside these co-servers; we present a prototype implementation of this vision that scales to realistic workloads; and we validate this approach by building a simple E-voting application on top of our prototype. By showing the real potential of COTS secure coprocessing technology to establish trusted islands of computation in hostile environments-such as at web servers with risk of insider attack-this work also helps demonstrate that "secure hardware" can be more than synonym for "cryptographic accelerator'.
引用
收藏
页码:265 / 276
页数:12
相关论文
共 50 条
  • [31] Securing Wireless Network Coding against Pollution Attack at the Physical Layer
    Kim, Sang Wu
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [32] Mitigation of Insider and Outsider DoS Attack against Signature Based Authentication in VANETs
    Pooja, B.
    Manohara, Pai M. M.
    Pai, Radhika M.
    Ajam, Nabil
    Mouzna, Joseph
    2014 ASIA-PACIFIC CONFERENCE ON COMPUTER AIDED SYSTEM ENGINEERING (APCASE), 2014, : 152 - 157
  • [33] Detection of DoS/DDoS attack against HTTP Servers using Naive Bayesian
    Katkar, Vijay
    Zinjade, Amol
    Dalvi, Suyed
    Bafna, Tejal
    Mahajan, Rashmi
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 280 - 285
  • [34] SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks
    Chang, Sang-Yoon
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3527 - 3540
  • [35] Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach
    Rajendran, Jeyavijayan
    Kanuparthi, Arun Karthik
    Karri, Ramesh
    Zahran, Mohamed
    Addepalli, Sateesh K.
    Ormazabal, Gaston
    IEEE DESIGN & TEST, 2013, 30 (02) : 35 - 44
  • [36] Securing the web
    Baker, Steven
    1997, (15):
  • [37] Where can an insider attack?
    Probst, Christian W.
    Hansen, Rene Rydhof
    Nielson, Flemming
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 127 - +
  • [38] Local web servers
    Udell, J
    BYTE, 1998, 23 (06): : 105 - 107
  • [39] Securing federated learning: a defense strategy against targeted data poisoning attack
    Ansam Khraisat
    Ammar Alazab
    Moutaz Alazab
    Tony Jan
    Sarabjot Singh
    Md. Ashraf Uddin
    Discover Internet of Things, 5 (1):
  • [40] Securing Remote State Estimation against Sequential Logic Attack of Sensor Data
    Wang, Jing
    Feng, Tao
    APPLIED SCIENCES-BASEL, 2022, 12 (04):