Security across abstraction layers: old and new examples

被引:2
|
作者
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Leuven, Belgium
来源
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020) | 2020年
关键词
security; abstraction layers; secure compilation; COMPILATION;
D O I
10.1109/EuroSPW51379.2020.00043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common technique for building ICT systems is to build them as successive layers of abstraction: for instance, the Instruction Set Architecture (ISA) is an abstraction of the hardware, and compilers or interpreters build higher level abstractions on top of the ISA. The functionality of an ICT application can often be understood by considering only a single level of abstraction. For instance the source code of the application defines the functionality using the level of abstraction of the source programming language. Functionality can be well understood by just studying this source code. Many important security issues in ICT system however are cross-layer issues: they can not be understood by considering the system at a single level of abstraction, but they require understanding how multiple levels of abstraction are implemented. Attacks may rely on, or exploit, implementation details of one or more layers below the source code level of abstraction. The purpose of this paper is to illustrate this cross-layer nature of security by discussing old and new examples of cross-layer security issues, and by providing a classification of these issues.
引用
收藏
页码:271 / 279
页数:9
相关论文
共 50 条
  • [1] Linkography Abstraction Refinement and Cyber Security
    Mitchell, Robert
    McBride, Marci
    Jarocki, John
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 595 - 601
  • [2] Abstraction Layers for the Synthesis and Analysis of Production Systems
    Martinez, Nicolas
    Barbieri, Giacomo
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 333 - 340
  • [3] Of "old" and "new" ways: Generations, border control and the temporality of security
    Cote-Boucher, Karine
    THEORETICAL CRIMINOLOGY, 2018, 22 (02) : 149 - 168
  • [4] The Internet and Asia-Pacific security: old conflicts and new behaviour
    Ortis, C
    Evans, P
    PACIFIC REVIEW, 2003, 16 (04) : 549 - 572
  • [5] Regex-Based Linkography Abstraction Refinement for Information Security
    Kothapalli, Abhiram
    Mitchell, Robert
    IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 1 - 7
  • [6] Abstraction Methods for Solving Graph-Based Security Games
    Basak, Anjon
    Fang, Fei
    Thanh Hong Nguyen
    Kiekintveld, Christopher
    AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2016, 10003 : 13 - 33
  • [7] Proposal and Implementation of Cloud Security Algorithm to Enhance the Security of the Layers
    Rajagopal, Chitra P.
    Choudhury, Tanupriya
    Kumar, Praveen
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 316 - 321
  • [8] Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
    Fernandes, Earlence
    Rahmati, Amir
    Eykholt, Kevin
    Prakash, Atul
    IEEE SECURITY & PRIVACY, 2017, 15 (04) : 79 - 84
  • [9] SAVIOR Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis
    Flanagan, Kieran
    Fallon, Enda
    Awad, Abir
    Connolly, Paul
    2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, : 9 - 15
  • [10] Structured streams: a new transport abstraction
    Ford, Bryan
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 361 - 372