Skip to main content

2018 | OriginalPaper | Buchkapitel

25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking

verfasst von : Pascal Birnstill, Christoph Bier, Paul Wagner, Jürgen Beyerer

Erschienen in: Computer and Network Security Essentials

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data usually takes different shapes and appears as files, windows, processes’ memory, network connections, etc. Information flow tracking technology keeps an eye on these different representations of a data item. Integrated with a usage control (UC) infrastructure, this allows us to enforce UC requirements on each representation of a protected data item. To enable UC enforcement in distributed settings, we need to be able to track information flows across system boundaries. In this paper, we introduce a state-based information flow model for tracking explicit flows between systems equipped with UC technology. We demonstrate the applicability of our approach by means of an instantiation in the field of video surveillance, where systems are increasingly accessed via insecure mobile applications. Based on usage control and inter-system information flow tracking, we show how video data transmitted from a video surveillance server to mobile clients can be protected against illegitimate duplication and redistribution after receipt.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Basin, D. A., Harvan, M., Klaedtke, F., & Zalinescu, E. (2013). Monitoring data usage in distributed systems. IEEE Transactions on Software Engineering, 39(10), 1403–1426.CrossRef Basin, D. A., Harvan, M., Klaedtke, F., & Zalinescu, E. (2013). Monitoring data usage in distributed systems. IEEE Transactions on Software Engineering, 39(10), 1403–1426.CrossRef
2.
Zurück zum Zitat Demsky, B. (2011). Cross-application data provenance and policy enforcement. ACM Transactions on Information and System Security, 14(1), 6.CrossRef Demsky, B. (2011). Cross-application data provenance and policy enforcement. ACM Transactions on Information and System Security, 14(1), 6.CrossRef
3.
Zurück zum Zitat Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems, 32(2), 5.CrossRef Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems, 32(2), 5.CrossRef
4.
Zurück zum Zitat Feth, D., & Pretschner, A. (2012). Flexible data-driven security for android. In 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE) (pp. 41–50). New York: IEEE.CrossRef Feth, D., & Pretschner, A. (2012). Flexible data-driven security for android. In 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE) (pp. 41–50). New York: IEEE.CrossRef
5.
Zurück zum Zitat Harvan, M., & Pretschner, A. (2009). State-based usage control enforcement with data flow tracking using system call interposition. In Proceedings of NSS (pp. 373–380). Harvan, M., & Pretschner, A. (2009). State-based usage control enforcement with data flow tracking using system call interposition. In Proceedings of NSS (pp. 373–380).
6.
Zurück zum Zitat Kelbert, F., & Pretschner, A. (2013). Data usage control enforcement in distributed systems. In Proceedings of CODASPY (pp. 71–82). Kelbert, F., & Pretschner, A. (2013). Data usage control enforcement in distributed systems. In Proceedings of CODASPY (pp. 71–82).
7.
Zurück zum Zitat Kelbert, F., & Pretschner, A. (2014). Decentralized distributed data usage control. In Proceedings of CANS (pp. 353–369). Kelbert, F., & Pretschner, A. (2014). Decentralized distributed data usage control. In Proceedings of CANS (pp. 353–369).
8.
Zurück zum Zitat Kim, H. C., Keromytis, A. D., Covington, M., & Sahita, R. (2009). Capturing information flow with concatenated dynamic taint analysis. In Proceedings of ARES (pp. 355–362). Kim, H. C., Keromytis, A. D., Covington, M., & Sahita, R. (2009). Capturing information flow with concatenated dynamic taint analysis. In Proceedings of ARES (pp. 355–362).
9.
Zurück zum Zitat Lovat, E. (2015). Cross-layer Data-centric Usage Control. Dissertation, Technische Universität München, München, Germany. Dissecting scanning activities using ip gray space. Lovat, E. (2015). Cross-layer Data-centric Usage Control. Dissertation, Technische Universität München, München, Germany. Dissecting scanning activities using ip gray space.
10.
Zurück zum Zitat Lovat, E., & Kelbert, F. (2014). Structure matters - A new approach for data flow tracking. In Proceedings of SPW (IEEE) (pp. 39–43). Lovat, E., & Kelbert, F. (2014). Structure matters - A new approach for data flow tracking. In Proceedings of SPW (IEEE) (pp. 39–43).
11.
Zurück zum Zitat Lovat, E., Oudinet, J., & Pretschner, A. (2014). On quantitative dynamic data flow tracking. In Proceedings of CODASPY (pp. 211–222). Lovat, E., Oudinet, J., & Pretschner, A. (2014). On quantitative dynamic data flow tracking. In Proceedings of CODASPY (pp. 211–222).
12.
Zurück zum Zitat Park, J., & Sandhu, R. S. (2004). The ucon\(_{\mbox{ abc}}\) usage control model. ACM Transactions on Information and System Security, 7(1), 128–174.CrossRef Park, J., & Sandhu, R. S. (2004). The ucon\(_{\mbox{ abc}}\) usage control model. ACM Transactions on Information and System Security, 7(1), 128–174.CrossRef
13.
Zurück zum Zitat Pretschner, A., Hilty, M., & Basin, D. A. (2006). Distributed usage control. Communications of ACM, 49(9), 39–44.CrossRef Pretschner, A., Hilty, M., & Basin, D. A. (2006). Distributed usage control. Communications of ACM, 49(9), 39–44.CrossRef
14.
Zurück zum Zitat Pretschner, A., Lovat, E., & Büchler, M. (2011). Representation-independent data usage control. In Proceedings of DPM (pp. 122–140). Pretschner, A., Lovat, E., & Büchler, M. (2011). Representation-independent data usage control. In Proceedings of DPM (pp. 122–140).
15.
Zurück zum Zitat Wüchner, T., & Pretschner, A. (2012). Data loss prevention based on data-driven usage control. In Proceedings of ISSRE (IEEE) (pp. 151–160). Wüchner, T., & Pretschner, A. (2012). Data loss prevention based on data-driven usage control. In Proceedings of ISSRE (IEEE) (pp. 151–160).
16.
Zurück zum Zitat Yin, H., Song, D. X., Egele, M., Kruegel, C., & Kirda, E. (2007). Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of CCS (ACM) (pp. 116–127). Yin, H., Song, D. X., Egele, M., Kruegel, C., & Kirda, E. (2007). Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of CCS (ACM) (pp. 116–127).
17.
Zurück zum Zitat Zhang, Q., McCullough, J., Ma, J., Schear, N., Vrable, M., Vahdat, A., Snoeren, A. C., Voelker, G. M., & Savage, S. (2010). Neon: system support for derived data management. In Proceedings of VEE (pp. 63–74). Zhang, Q., McCullough, J., Ma, J., Schear, N., Vrable, M., Vahdat, A., Snoeren, A. C., Voelker, G. M., & Savage, S. (2010). Neon: system support for derived data management. In Proceedings of VEE (pp. 63–74).
Metadaten
Titel
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
verfasst von
Pascal Birnstill
Christoph Bier
Paul Wagner
Jürgen Beyerer
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_25

Neuer Inhalt