Security across abstraction layers: old and new examples

被引:2
|
作者
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Leuven, Belgium
来源
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020) | 2020年
关键词
security; abstraction layers; secure compilation; COMPILATION;
D O I
10.1109/EuroSPW51379.2020.00043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common technique for building ICT systems is to build them as successive layers of abstraction: for instance, the Instruction Set Architecture (ISA) is an abstraction of the hardware, and compilers or interpreters build higher level abstractions on top of the ISA. The functionality of an ICT application can often be understood by considering only a single level of abstraction. For instance the source code of the application defines the functionality using the level of abstraction of the source programming language. Functionality can be well understood by just studying this source code. Many important security issues in ICT system however are cross-layer issues: they can not be understood by considering the system at a single level of abstraction, but they require understanding how multiple levels of abstraction are implemented. Attacks may rely on, or exploit, implementation details of one or more layers below the source code level of abstraction. The purpose of this paper is to illustrate this cross-layer nature of security by discussing old and new examples of cross-layer security issues, and by providing a classification of these issues.
引用
收藏
页码:271 / 279
页数:9
相关论文
共 50 条
  • [41] The Future of Education in Defence and Security in Relation to the New Security Environment
    Tsenkov, Yuri
    9TH INTERNATIONAL CONFERENCE THE FUTURE OF EDUCATION, 2019, : 669 - 672
  • [42] Information Security, new approach
    Elachgar, Hicham
    Regragui, Boubker
    2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 51 - 56
  • [43] New directions for African security
    Haastrup, Toni
    Dijkstra, Hylke
    CONTEMPORARY SECURITY POLICY, 2017, 38 (01) : 102 - 108
  • [44] Security personnel of new generation
    Ljubymenko, Krystyna
    Adamek, Milan
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 192 - 195
  • [45] ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack
    Madi, Taous
    Jarraya, Yosr
    Alimohammadifar, Amir
    Majumdar, Suryadipta
    Wang, Yushun
    Pourzandi, Makan
    Wang, Lingyu
    Debbabi, Mourad
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (01)
  • [46] New hologram by high security
    Maripov, A
    Shamahiev, T
    SIGNAL AND DATA PROCESSING OF SMALL TARGETS 2001, 2001, 4473 : 484 - 493
  • [47] A new model of security for metasystems
    Chapin, SJ
    Wang, CX
    Wulf, WA
    Knabe, F
    Grimshaw, A
    FUTURE GENERATION COMPUTER SYSTEMS, 1999, 15 (5-6) : 713 - 722
  • [48] The privacy/security tradeoff across jointly designed linear authentication systems
    Goldberg, Adina
    Draper, Stark C.
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1279 - 1286
  • [49] Interfirewall Optimization Across Administrative Domains for Enabling Privacy Preserving and Security
    Devi, Aruna R.
    Arivanantham, Pon.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [50] Across-step access control in E-business security
    Liu, Guohua
    Yi, Chuanjiang
    Liu, Weihua
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 453 - 458