Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 163–178Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems

  • Saket Kaushik18,
  • William Winsborough19,
  • Duminda Wijesekera18 &
  • …
  • Paul Ammann18 
  • Conference paper
  • 596 Accesses

  • 1 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

In this paper we identify an undesirable side-effect of combining different email-control mechanisms for protection from unwanted messages, namely, leakage of recipients’ private information to message senders. The problem arises because some email-control mechanisms like bonds, graph-turing tests, etc., inherently leak information, and without discontinuing their use, leakage channels cannot be closed. We formalize the capabilities of an attacker and show how she can launch guessing attacks on recipient’s mail acceptance policy that utilizes leaky mechanism in an effort to avoid unwanted mail.

The attacker in our model guesses the contents of a recipient’s private information. The recipients’ use of leaky mechanisms allow the sender to verify her guess. We assume a constraint logic programming based policy language for specification and evaluation of mail acceptance criteria and present two different program transformations that can prevent guessing attacks while allowing recipients to utilize any email-control mechanism in their policies.

Keywords

  • Application layer security
  • inference attacks
  • information leakage channels
  • secrecy

Chapter PDF

Download to read the full chapter text

References

  1. Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4), 515–556 (1989)

    CrossRef  Google Scholar 

  2. Dantsin, E., Eiter, T., Gottlob, G., Voronkov, A.: Complexity and expressive power of logic programming. ACM Computing Surveys 33(3), 374–425 (2001)

    CrossRef  Google Scholar 

  3. Delaune, S., Jacquemard, F.: A theory of dictionary attacks and its complexity. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 2–15 (2004)

    Google Scholar 

  4. Denning, D.E., Schlrer, J.: Inference control for statistical databases. IEEE Computer 16(7), 69–82 (1983)

    CrossRef  Google Scholar 

  5. Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transaction on Information Theory 29, 198–208 (1983)

    CrossRef  MathSciNet  MATH  Google Scholar 

  6. Fages, F.: Constructive negation by pruning. Journal of Logic Programming 32/2 (1997)

    Google Scholar 

  7. Jaffar, J., Maher, M.J.: Constraint logic programming: A survey. Journal of Logic Programming 19/20, 503–581 (1994)

    CrossRef  MathSciNet  MATH  Google Scholar 

  8. Kaushik, S., Winsborough, W., Wijesekera, D., Ammann, P.: Email feedback: A policy-based approach to overcoming false positives. In: 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE 2005), Fairfax, VA, pp. 73–82 (November 2005)

    Google Scholar 

  9. Kaushik, S., Winsborough, W., Wijesekera, D., Ammann, P.: Policy transformation for preventing leakage of sensitive information in email systems. Technical Report ISE-TR-06-05, ISE Dept., George Mason University, Fairfax, VA (May 2006)

    Google Scholar 

  10. Loder, T., Alstyne, M.V., Wash, R.: An economic solution to the spam problem. ACM E-Commerce (2004)

    Google Scholar 

  11. Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1(3), 159–176 (1989)

    CrossRef  MathSciNet  MATH  Google Scholar 

  12. Naor, M.: Verification of a human in the loop or identification via the turing test (1996), http://www.wisdom.weizmann.ac.il/~naor/APERS/human_abs.html

  13. Petry, S.: Port 25: The gaping hole in the firewall. In: Proceedings of ACSAC 2002 Annual Computer Security Applications Conference (December 2002)

    Google Scholar 

  14. Reiter, R.: The predicate elimination strategy in theorem proving. In: Proceedings of the Second Annual ACM Symposium on Theory of Computing, Northampton, Massachusetts, pp. 180–183 (1970)

    Google Scholar 

  15. Sato, T.: Equivalence-preserving first-order unfold/fold transformation systems. Theoretical Computer Science 105(1), 57–84 (1992)

    CrossRef  MathSciNet  MATH  Google Scholar 

  16. Simple Mail Transfer Protocol. RFC 2821 (April 2001)

    Google Scholar 

  17. Tamaki, H., Sato, T.: Unfold/fold transformation of logic programs. In: Tarnlund, S.-A. (ed.) Proceedings of the Second International Conference on Logic Programming, Uppsala, pp. 127–138 (1984)

    Google Scholar 

  18. Willenborg, L., de Waal, T.: Statistical disclosure control in practice. Springer, New York (1996)

    CrossRef  MATH  Google Scholar 

  19. Yerazunis, W.S.: Sparse binary polynomial hashing and the CRM114 discriminator. In: 2003 Cambridge Spam Conference Proceedings (2003)

    Google Scholar 

  20. Zhang, M., Tavares, S., Campbell, L.: Information leakage of boolean functions and its relationship to other cryptographic criteria. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCS 1994), Fairfax, pp. 156–165 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Information & Software Engineering, George Mason University, Fairfax, VA, 22030, USA

    Saket Kaushik, Duminda Wijesekera & Paul Ammann

  2. Department of Computer Science, University of Texas at San Antonio, San Antonio, TX, 78249-0667, USA

    William Winsborough

Authors
  1. Saket Kaushik
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. William Winsborough
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Duminda Wijesekera
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Paul Ammann
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Kaushik, S., Winsborough, W., Wijesekera, D., Ammann, P. (2006). Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_12

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature