skip to main content
10.1145/3205977.3206002acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
invited-talk
Public Access

How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security

Published:07 June 2018Publication History

ABSTRACT

Developing a secure system (or, protocol) in general boils down to having a correct and robust specification which developers faithfully implement with the available platform support. Vulnerabilities can thus crop up due to inadequate specification, buggy implementations, or the lack of appropriate security constructs in the platform. In this talk, I will present examples of insecurity due to inadequate specification, wrong implementations, and deficient platform support. I will particularly focus on how automated reasoning and formal verification techniques can greatly contribute towards detecting vulnerabilities. In the first example, I will show how 4G LTE telecommunication protocol specification lacks security considerations which can be exploited by adversaries to have catastrophic impacts. Next, I will present how incorrect X.509 certificate validation implementations in open-source SSL/TLS libraries leave users prone to impersonation attacks. Finally, I will conclude my talk with a discussion of how lack of hardware support makes enforcing Digital Rights Management (DRM) policies infeasible for mobile devices.

References

  1. S. Y. Chau, O. Chowdhury, E. Hoque, H. Ge, A. Kate, C. Nita-Rotaru, and N. Li. 2017. SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. In 2017 IEEE Symposium on Security and Privacy (SP). 503--520.Google ScholarGoogle Scholar
  2. Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, and Elisa Bertino. 2018. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE 2018 Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar

Index Terms

  1. How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
            June 2018
            271 pages
            ISBN:9781450356664
            DOI:10.1145/3205977
            • General Chair:
            • Elisa Bertino,
            • Program Chairs:
            • Dan Lin,
            • Jorge Lobo

            Copyright © 2018 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 June 2018

            Check for updates

            Qualifiers

            • invited-talk

            Acceptance Rates

            SACMAT '18 Paper Acceptance Rate14of50submissions,28%Overall Acceptance Rate177of597submissions,30%

            Upcoming Conference

            SACMAT 2024
          • Article Metrics

            • Downloads (Last 12 months)23
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader