Security across abstraction layers: old and new examples

被引:2
|
作者
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Leuven, Belgium
来源
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020) | 2020年
关键词
security; abstraction layers; secure compilation; COMPILATION;
D O I
10.1109/EuroSPW51379.2020.00043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common technique for building ICT systems is to build them as successive layers of abstraction: for instance, the Instruction Set Architecture (ISA) is an abstraction of the hardware, and compilers or interpreters build higher level abstractions on top of the ISA. The functionality of an ICT application can often be understood by considering only a single level of abstraction. For instance the source code of the application defines the functionality using the level of abstraction of the source programming language. Functionality can be well understood by just studying this source code. Many important security issues in ICT system however are cross-layer issues: they can not be understood by considering the system at a single level of abstraction, but they require understanding how multiple levels of abstraction are implemented. Attacks may rely on, or exploit, implementation details of one or more layers below the source code level of abstraction. The purpose of this paper is to illustrate this cross-layer nature of security by discussing old and new examples of cross-layer security issues, and by providing a classification of these issues.
引用
收藏
页码:271 / 279
页数:9
相关论文
共 50 条
  • [32] User perception of Bitcoin usability and security across novice users
    Alshamsi, Abdulla
    Andras, Peter
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 126 : 94 - 110
  • [33] Managing security debt across PLC phases in a VSE context
    Larrucea, Xabier
    Santamaria, Izaskun
    Fernandez-Gauna, Borja
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2020, 32 (03)
  • [34] The impact of security on travelers across the Canada-US border
    Bradbury, Susan L.
    JOURNAL OF TRANSPORT GEOGRAPHY, 2013, 26 : 139 - 146
  • [35] Smart home security: challenges, issues and solutions at different IoT layers
    Touqeer, Haseeb
    Zaman, Shakir
    Amin, Rashid
    Hussain, Mudassar
    Al-Turjman, Fadi
    Bilal, Muhammad
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (12) : 14053 - 14089
  • [36] Security layers and related services within the Horizon Europe NEUROPULS project
    Pavanello, Fabio
    Marchand, Cedric
    Jimenez, Paul
    Letartre, Xavier
    Chaves, Ricardo
    Marastoni, Niccolo
    Lovato, Alberto
    Ceccato, Mariano
    Papadimitriou, George
    Karakostas, Vasileios
    Gizopoulos, Dimitris
    Bardini, Roberta
    Carmona, Tzamn Melendez
    Di Carlo, Stefano
    Savino, Alessandro
    Lerch, Laurence
    Ruhrmair, Ulrich
    Gutierrez, Sergio Vinagrero
    Di Natale, Giorgio
    Vatajelu, Elena Ioana
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [37] Smart home security: challenges, issues and solutions at different IoT layers
    Haseeb Touqeer
    Shakir Zaman
    Rashid Amin
    Mudassar Hussain
    Fadi Al-Turjman
    Muhammad Bilal
    The Journal of Supercomputing, 2021, 77 : 14053 - 14089
  • [38] 5G Security Challenges and Solutions: A Review by OSI Layers
    Sullivan, S.
    Brighente, Alessandro
    Kumar, S. A. P.
    Conti, M.
    IEEE ACCESS, 2021, 9 : 116294 - 116314
  • [39] A Security Theater of Dreams: Supporters' Responses to "Safety" and "Security" Following the Old Trafford "Fake Bomb" Evacuation
    Ludvigsen, Jan Andre Lee
    Millward, Peter
    JOURNAL OF SPORT & SOCIAL ISSUES, 2020, 44 (01) : 3 - 21
  • [40] A New Bluetooth Security Architecture
    Philip, Mintu
    Das, Asha
    TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 507 - 515