Advertisement

Towards Authenticated Objects

  • Daniele Midi
  • Ashish Kundu
  • Elisa Bertino
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

In many application domains, objects are transferred, shared, and used across organizational and trust boundaries, which poses serious security concerns. Given the ubiquitous use of objects, it is important to assure at program run-time that the objects received and used have not been modified by any unauthorized program or entity, and are from the authorized programs. In this paper, we propose an authenticated model of objects that facilitates verification of authenticity of objects at program run-time and its possible Java-based implementations.

Keywords

Signature Scheme Application Programming Interface Authentication Scheme Trusted Platform Module Remote Method Invocation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. TISSEC 13(1), 4 (2009)CrossRefGoogle Scholar
  2. 2.
    Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)zbMATHCrossRefGoogle Scholar
  3. 3.
    Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Kundu, A., Atallah, M., Bertino, E.: Leakage-free redactable signatures. In: CODASPY 2012 (2012)Google Scholar
  5. 5.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  6. 6.
    Necula, G.: Proof-carrying code. In: POPL, pp. 106–119. ACM (1997)Google Scholar
  7. 7.
    Smith, G., et al.: A new type system for secure information flow. In: CSFW. IEEE (2001)Google Scholar
  8. 8.
    Sumii, E., Pierce, B.: A bisimulation for dynamic sealing. ACM SIGPLAN Notices 39, 161–172 (2004)CrossRefGoogle Scholar
  9. 9.
    Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.: Improving application security with data flow assertions. In: SOSP 2009, pp. 291–304. ACM, New York (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Daniele Midi
    • 1
  • Ashish Kundu
    • 2
  • Elisa Bertino
    • 1
  1. 1.Department of Computer Science and CERIASPurdue UniversityWest LafayetteUSA
  2. 2.IBM T J Watson Research CenterNew YorkUSA

Personalised recommendations