Composable security analysis of OS services

Ran Canetti*, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We provide an analytical framework for basic integrity properties of file systems, namely the binding of files to filenames and writing capabilities. A salient feature of our modeling and analysis is that it is composable: In spite of the fact that we analyze the filesystem in isolation, security is guaranteed even when the file system operates as a component within an arbitrary, and potentially adversarial system. Our results are obtained by adapting the Universally Composable (UC) security framework to the analysis of software systems. Originally developed for cryptographic protocols, the UC framework allows the analysis of simple components in isolation, and provides assurance that these components maintain their behavior when combined in a large system, potentially under adversarial conditions.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings
Pages431-448
Number of pages18
DOIs
StatePublished - 2011
Event9th International Conference on Applied Cryptography and Network Security, ACNS 2011 - Nerja, Spain
Duration: 7 Jun 201110 Jun 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6715 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Applied Cryptography and Network Security, ACNS 2011
Country/TerritorySpain
CityNerja
Period7/06/1110/06/11

Funding

FundersFunder number
U.S. Department of Homeland SecurityFA8750-08-2-0091

    Fingerprint

    Dive into the research topics of 'Composable security analysis of OS services'. Together they form a unique fingerprint.

    Cite this