Skip to main content

2024 | OriginalPaper | Buchkapitel

Hardening Systems Against Data Corruption Attacks at Design Time

verfasst von : John Breton, Jason Jaskolka, George O. M. Yee

Erschienen in: Foundations and Practice of Security

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite advancements in security research, systems continue to be susceptible to all kinds of threats. To better support designers, we present a method and tool called Dubhe that can be employed during the design phase of development to harden systems against data corruption attacks. We highlight the benefits of this approach by applying it to an online seller of merchandise system to analyze various “what-if” scenarios with different defence objectives. Using our approach, Dubhe (1) analyzes the XML form of UML activity diagrams created to define the behavioural view of the system, (2) determines optimal locations for data sanitization using novel protection techniques and activity centrality concepts, and (3) communicates the results to the designers so that they can incorporate the suggestions back into their system designs. This example application of Dubhe shows that our approach can provide valuable security advice to designers to ensure that their systems are designed with protection against data corruption attacks, using only artifacts that designers would normally create during the design phase.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Dubhe is a star in the Ursa Major constellation. It is commonly referred to as a “pointer star” as it helps find Polaris, also known as the North Star.
 
Literatur
2.
Zurück zum Zitat Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z., Iyer, R.K.: Defeating memory corruption attacks via pointer taintedness detection. In: 2005 International Conference on Dependable Systems and Networks, pp. 378–387. DSN 2005 (2005) Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z., Iyer, R.K.: Defeating memory corruption attacks via pointer taintedness detection. In: 2005 International Conference on Dependable Systems and Networks, pp. 378–387. DSN 2005 (2005)
3.
Zurück zum Zitat Cheng, L., et al.: Exploitation techniques and defenses for data-oriented attacks. In: 2019 IEEE Cybersecurity Development (SecDev), pp. 114–128. IEEE (2019) Cheng, L., et al.: Exploitation techniques and defenses for data-oriented attacks. In: 2019 IEEE Cybersecurity Development (SecDev), pp. 114–128. IEEE (2019)
4.
Zurück zum Zitat Chowdhury, I., Chan, B., Zulkernine, M.: Security metrics for source code structures. In: 4th International Workshop on Software Engineering for Secure Systems, pp. 57–64. SESS 2008, ACM (2008) Chowdhury, I., Chan, B., Zulkernine, M.: Security metrics for source code structures. In: 4th International Workshop on Software Engineering for Secure Systems, pp. 57–64. SESS 2008, ACM (2008)
5.
Zurück zum Zitat Fiala, D., Mueller, F., Engelmann, C., Riesen, R., Ferreira, K., Brightwell, R.: Detection and correction of silent data corruption for large-scale high-performance computing. In: 2012 International Conference on High Performance Computing, Networking, Storage and Analysis, pp. 1–12 (2012) Fiala, D., Mueller, F., Engelmann, C., Riesen, R., Ferreira, K., Brightwell, R.: Detection and correction of silent data corruption for large-scale high-performance computing. In: 2012 International Conference on High Performance Computing, Networking, Storage and Analysis, pp. 1–12 (2012)
7.
Zurück zum Zitat Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press, Redmond (2006) Howard, M., Lipner, S.: The Security Development Lifecycle, vol. 8. Microsoft Press, Redmond (2006)
10.
Zurück zum Zitat Kang, S., Kim, S.: CIA-level driven secure SDLC framework for integrating security into SDLC process. J. Ambient. Intell. Humaniz. Comput. 13(10), 4601–4624 (2022)CrossRef Kang, S., Kim, S.: CIA-level driven secure SDLC framework for integrating security into SDLC process. J. Ambient. Intell. Humaniz. Comput. 13(10), 4601–4624 (2022)CrossRef
11.
Zurück zum Zitat Kontouras, E., Tzes, A., Dritsas, L.: Set-theoretic detection of data corruption attacks on cyber physical power systems. J. Mod. Power Syst. Clean Energy 6, 872–886 (2018)CrossRef Kontouras, E., Tzes, A., Dritsas, L.: Set-theoretic detection of data corruption attacks on cyber physical power systems. J. Mod. Power Syst. Clean Energy 6, 872–886 (2018)CrossRef
17.
Zurück zum Zitat Nie, X., Chen, L., Wei, H., Zhang, Y., Cui, N., Shi, G.: KPDFI: efficient data flow integrity based on key property against data corruption attack. In: Computers & Security, pp. 103–183 (2023) Nie, X., Chen, L., Wei, H., Zhang, Y., Cui, N., Shi, G.: KPDFI: efficient data flow integrity based on key property against data corruption attack. In: Computers & Security, pp. 103–183 (2023)
19.
Zurück zum Zitat Ozkaya, M.: Are the UML modelling tools powerful enough for practitioners? a literature review. IET Softw. 13(5), 338–354 (2019)CrossRef Ozkaya, M.: Are the UML modelling tools powerful enough for practitioners? a literature review. IET Softw. 13(5), 338–354 (2019)CrossRef
20.
Zurück zum Zitat Rodríguez, A., Fernández-Medina, E., Piattini, M.: Capturing security requirements in business processes through a UML 2.0 activity diagrams profile. In: Roddick, J.F., et al. (eds.) ER 2006. LNCS, vol. 4231, pp. 32–42. Springer, Heidelberg (2006). https://doi.org/10.1007/11908883_6CrossRef Rodríguez, A., Fernández-Medina, E., Piattini, M.: Capturing security requirements in business processes through a UML 2.0 activity diagrams profile. In: Roddick, J.F., et al. (eds.) ER 2006. LNCS, vol. 4231, pp. 32–42. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11908883_​6CrossRef
21.
Zurück zum Zitat Samuel, J., Jaskolka, J., Yee, G.O.M.: Analyzing structural security posture to evaluate system design decisions. In: 21st IEEE International Conference on Software Quality, Reliability, and Security, QRS 2021, pp. 8–17 (2021) Samuel, J., Jaskolka, J., Yee, G.O.M.: Analyzing structural security posture to evaluate system design decisions. In: 21st IEEE International Conference on Software Quality, Reliability, and Security, QRS 2021, pp. 8–17 (2021)
23.
Zurück zum Zitat Szekeres, L., Payer, M., Wei, T., Song, D.: Sok: eternal war in memory. In: 2013 IEEE Symposium on Security and Privacy, pp. 48–62. IEEE (2013) Szekeres, L., Payer, M., Wei, T., Song, D.: Sok: eternal war in memory. In: 2013 IEEE Symposium on Security and Privacy, pp. 48–62. IEEE (2013)
26.
Zurück zum Zitat Yee, G.O.M.: Reducing the attack surface for private data. In: 13th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2019, pp. 28–34 (2019) Yee, G.O.M.: Reducing the attack surface for private data. In: 13th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2019, pp. 28–34 (2019)
Metadaten
Titel
Hardening Systems Against Data Corruption Attacks at Design Time
verfasst von
John Breton
Jason Jaskolka
George O. M. Yee
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-57537-2_24

Premium Partner