2011
DOI: 10.1007/978-3-642-21554-4_25
|View full text |Cite
|
Sign up to set email alerts
|

Composable Security Analysis of OS Services

Abstract: Abstract. We provide an analytical framework for basic integrity properties of file systems, namely the binding of files to filenames and writing capabilities. A salient feature of our modeling and analysis is that it is composable: In spite of the fact that we analyze the filesystem in isolation, security is guaranteed even when the file system operates as a component within an arbitrary, and potentially adversarial system. Our results are obtained by adapting the Universally Composable (UC) security framewor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Using UC Canetti et al [34] show how the UC framework can be used to analyze the simple components of a file system in isolation and to guarantee that these components maintain their behavior in the larger system even under adversarial conditions. This demonstrates basic integrity properties of the file system, i.e., the binding of files to filenames and writing capabilities.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Using UC Canetti et al [34] show how the UC framework can be used to analyze the simple components of a file system in isolation and to guarantee that these components maintain their behavior in the larger system even under adversarial conditions. This demonstrates basic integrity properties of the file system, i.e., the binding of files to filenames and writing capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…For our analysis, we apply the style of [34] to the larger and more complex OpenStack framework and utilize aspects of [35,36] to achieve secure communication. We further use our construction to demonstrate security flaws in OpenStack's current authorization mechanism and assess the improvements provided by our suggested changes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At the algorithmic layer, one way to provide separation of responsibilities is via universal composability (UC) [49]. UC has been specialized and simplified for the MPC setting [50], and the potential value of UC has been shown throughout the computing stack [51]- [53].…”
Section: B Accessibility and Composabilitymentioning
confidence: 99%