Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (10 of 37) Visa alla publikationer
Gunnarsson, M. & Gehrmann, C. (2022). Secure Ownership Transfer for Resource Constrained IoT Infrastructures. In: International Conference on Information Systems Security and PrivacyICISSP 2020: Information Systems Security and Privacy pp 22-47: . Paper presented at International Conference on Information Systems Security and Privacy ICISSP 2020: Information Systems Security and Privacy 25 February 2020 through 27 February 2020 (pp. 22-47). Springer Science and Business Media Deutschland GmbH
Öppna denna publikation i ny flik eller fönster >>Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022 (Engelska)Ingår i: International Conference on Information Systems Security and PrivacyICISSP 2020: Information Systems Security and Privacy pp 22-47, Springer Science and Business Media Deutschland GmbH , 2022, s. 22-47Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some examples are smart home appliances and wireless sensor networks. When IoT devices are deployed and used over an extended time, it is not guaranteed that one owner will control the IoT devices over their entire lifetime. If the ownership of an IoT system shall be transferred between two entities, secure ownership transfer arises. In this paper we propose a protocol that enables secure ownership transfer of constrained IoT devices. The protocol is resource-efficient and only rely on symmetric cryptography for the IoT devices. The protocol has been rigorously analyzed to prove the state security requirements. The security analysis has been done partially using formal protocol verification tools, particularly Tamarin Prover. To show our proposed protocol’s resource efficiency, we have done a proof of concept implementation. This implementation, for constrained IoT devices, has been used to verify the efficiency of the protocol. 

Ort, förlag, år, upplaga, sidor
Springer Science and Business Media Deutschland GmbH, 2022
Nyckelord
Constrained devices, IoT, Ownership transfer, Automation, Cryptography, Domestic appliances, Efficiency, Wireless sensor networks, Appliance sensors, Ownership transfers, Protocol verification, Resource-efficient, Security analysis, Security requirements, Smart homes, Symmetric cryptography, Verification tools, Internet of things
Nationell ämneskategori
Datorteknik
Identifikatorer
urn:nbn:se:ri:diva-58570 (URN)10.1007/978-3-030-94900-6_2 (DOI)2-s2.0-85124029226 (Scopus ID)9783030948993 (ISBN)
Konferens
International Conference on Information Systems Security and Privacy ICISSP 2020: Information Systems Security and Privacy 25 February 2020 through 27 February 2020
Tillgänglig från: 2022-02-18 Skapad: 2022-02-18 Senast uppdaterad: 2022-02-18Bibliografiskt granskad
Tiloca, M., Gehrmann, C. & Seitz, L. (2017). On Improving Resistance to Denial of Service and Key Provisioning Scalability of the DTLS Handshake (8ed.). International Journal of Information Security, 16(2), 173-193
Öppna denna publikation i ny flik eller fönster >>On Improving Resistance to Denial of Service and Key Provisioning Scalability of the DTLS Handshake
2017 (Engelska)Ingår i: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 16, nr 2, s. 173-193Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific Denial of Service (DoS) attack aimed at forcing the establishment of several half open sessions. This may exhaust memory and network resources on the server, so making it less responsive or even unavailable to legitimate clients. Second, although it is one of the most efficient key provisioning approaches adopted in DTLS, the pre-shared key provisioning mode does not scale well with the number of clients, it may result in scalability issues on the server side, and it complicates key re-provisioning in dynamic scenarios. This paper presents a single and efficient security architecture which addresses both issues, by substantially limiting the impact of DoS, and reducing the number of keys stored on the server side to one unit only. Our approach does not break the existing standard and does not require any additional message exchange between DTLS client and server. Our experimental results show that our approach requires a shorter amount of time to complete a handshake execution, and consistently reduces the time a DTLS server is exposed to a DoS instance. We also show that it considerably improves a DTLS server in terms of service availability and robustness against DoS attack.

Ort, förlag, år, upplaga, sidor
Springer, 2017 Upplaga: 8
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-24539 (URN)10.1007/s10207-016-0326-0 (DOI)2-s2.0-84961634159 (Scopus ID)
Projekt
EU FP7 SEGRID (Grant Agreement no. FP7-607109)EIT DIGITAL High Impact Initiative "Advanced connectivity platform for vertical segments"
Tillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2023-05-25Bibliografiskt granskad
Paladi, N., Gehrmann, C. & Michalas, A. (2017). Providing User Security Guarantees in Public Infrastructure Clouds (11ed.). IEEE Transactions on Cloud Computing, 5(3), 405-419, Article ID 7399365.
Öppna denna publikation i ny flik eller fönster >>Providing User Security Guarantees in Public Infrastructure Clouds
2017 (Engelska)Ingår i: IEEE Transactions on Cloud Computing, ISSN 2168-7161, Vol. 5, nr 3, s. 405-419, artikel-id 7399365Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants – insulated from the minutiae of hardware maintenance – rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organisations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.

Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-24528 (URN)10.1109/TCC.2016.2525991 (DOI)2-s2.0-85029938241 (Scopus ID)
Projekt
Infracloud
Tillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2021-01-26Bibliografiskt granskad
Abdelraheem, M. A., Andersson, T. & Gehrmann, C. (2017). Searchable Encrypted Relational Databases:Risks and Countermeasures. In: Joaquin Garcia-Alfaro et al. (Ed.), Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Paper presented at ESORICS 2017 International Workshops: DPM 2017 (pp. 70-85). Gewerbestrasse 11, 6330 Cham, Switzerland: Springer Nature, 10436
Öppna denna publikation i ny flik eller fönster >>Searchable Encrypted Relational Databases:Risks and Countermeasures
2017 (Engelska)Ingår i: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings / [ed] Joaquin Garcia-Alfaro et al., Gewerbestrasse 11, 6330 Cham, Switzerland: Springer Nature , 2017, Vol. 10436, s. 70-85Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We point out the risks of protecting relational databases viaSearchable Symmetric Encryption (SSE) schemes by proposing an infer-ence attack exploiting the structural properties of relational databases.We show that record-injection attacks mounted on relational databaseshave worse consequences than their file-injection counterparts on un-structured databases. Moreover, we discuss some techniques to reducethe effectiveness of inference attacks exploiting the access pattern leak-age existing in SSE schemes. To the best of our knowledge, this is thefirst work that investigates the security of relational databases protectedby SSE schemes.

Ort, förlag, år, upplaga, sidor
Gewerbestrasse 11, 6330 Cham, Switzerland: Springer Nature, 2017
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 10436
Nyckelord
Privacy. SSE Database. Inference Attacks.
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:ri:diva-33180 (URN)10.1007/978-3-319-67816-0 (DOI)2-s2.0-85030152876 (Scopus ID)978-3-319-67816-0 (ISBN)
Konferens
ESORICS 2017 International Workshops: DPM 2017
Projekt
PaaSword
Anmärkning

Publication venue: the 12th Data Privacy and Management (DPM) workshop co-located with ESORICS 2017

Tillgänglig från: 2018-01-23 Skapad: 2018-01-23 Senast uppdaterad: 2019-01-29Bibliografiskt granskad
Paladi, N. & Gehrmann, C. (2017). TruSDN: Bootstrapping trust in cloud network infrastructure. In: Security and Privacy in Communication Networks: . Paper presented at 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), October 10-12, 2016, Guangzhou, China (pp. 104-124).
Öppna denna publikation i ny flik eller fönster >>TruSDN: Bootstrapping trust in cloud network infrastructure
2017 (Engelska)Ingår i: Security and Privacy in Communication Networks, 2017, s. 104-124Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Software-Defined Networking (SDN) is a novel architectural model for cloud network infrastructure, improving resource utilization, scalability and administration. SDN deployments increasingly rely on virtual switches executing on commodity operating systems with large code bases, which are prime targets for adversaries attacking the network infrastructure. We describe and implement TruSDN, a framework for bootstrapping trust in SDN infrastructure using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN components and protect communication between network endpoints. We introduce ephemeral flow-specific pre-shared keys and propose a novel defense against cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary model, with a minor performance overhead.

Serie
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), ISSN 1867-8211 ; 198
Nyckelord
Integrity, Software defined networking, Trust, Virtual switches, Trusted computing, Adversary modeling, Architectural modeling, Commodity operating systems, Network infrastructure, Resource utilizations, Software defined networking (SDN), Network security
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-31100 (URN)10.1007/978-3-319-59608-2_6 (DOI)2-s2.0-85021707665 (Scopus ID)978-3-319-59607-5 (ISBN)978-3-319-59608-2 (ISBN)
Konferens
12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), October 10-12, 2016, Guangzhou, China
Projekt
5G-ENSURE
Tillgänglig från: 2017-08-28 Skapad: 2017-08-28 Senast uppdaterad: 2020-12-01Bibliografiskt granskad
Baumann, C., Näslund, M., Gehrmann, C., Schwarz, O. & Thorsen, H. (2016). A High Assurance Virtualization Platform for ARMv8 (9ed.). In: 2016 European Conference on Networks and Communications (EuCNC): . Paper presented at 2016 European Conference on Networks and Communications (EUCNC 2016), June 27-30, 2016, Athens, Greece (pp. 210-214). , Article ID 7561034.
Öppna denna publikation i ny flik eller fönster >>A High Assurance Virtualization Platform for ARMv8
Visa övriga...
2016 (Engelska)Ingår i: 2016 European Conference on Networks and Communications (EuCNC), 2016, 9, s. 210-214, artikel-id 7561034Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

This paper presents the first results from the ongoing research project HASPOC, developing a high assurance virtualization platform for the ARMv8 CPU architecture. Formal verification at machine code level guarantees information isolation between different guest systems (e.g.~OSs) running on the platform. To use the platform in networking scenarios, we allow guest systems to securely communicate with each other via platform-provided communication channels and to take exclusive control of peripherals for communication with the outside world. The isolation is shown to be formally equivalent to that of guests executing on physically separate platforms with dedicated communication channels crossing the air-gap. Common Criteria (CC) assurance methodology is applied by preparing the CC documentation required for an EAL6 evaluation of products using the platform. Besides the hypervisor, a secure boot component is included and verified to ensure system integrity.

Nyckelord
hypervisor, isolation, assurance, formal verification, Common Criteria, ARMv8
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-24570 (URN)10.1109/EuCNC.2016.7561034 (DOI)2-s2.0-84988950416 (Scopus ID)9781509028931 (ISBN)
Konferens
2016 European Conference on Networks and Communications (EUCNC 2016), June 27-30, 2016, Athens, Greece
Projekt
HASPOC
Anmärkning

This is the author version of the corresponding paper published in the 2016 European Conference on Networks and Communications (EuCNC). The publisher is IEEE. The final publication (DOI: 10.1109/EuCNC.2016.7561034) is available at IEEE Xplore via http://ieeexplore.ieee.org/document/7561034 © © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Tillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2024-04-11Bibliografiskt granskad
Giustolisi, R., Gehrmann, C., Ahlström, M. & Holmberg, S. (2016). A secure group-based AKA protocol for machine-type communications. In: Seokhie Hong, Jong Hwan Park (Ed.), Information Security and Cryptology – ICISC 2016: . Paper presented at 19th International Conference on Information Security and Cryptology (ICISC 2016), November 30 - December 2, 2016, Seoul, South Korea (pp. 3-27). , Article ID 10157.
Öppna denna publikation i ny flik eller fönster >>A secure group-based AKA protocol for machine-type communications
2016 (Engelska)Ingår i: Information Security and Cryptology – ICISC 2016 / [ed] Seokhie Hong, Jong Hwan Park, 2016, s. 3-27, artikel-id 10157Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The fifth generation wireless system (5G) is expected to handle with an unpredictable number of heterogeneous connected devices while guaranteeing a high level of security. This paper advances a groupbased Authentication and Key Agreement (AKA) protocol that contributes to reduce latency and bandwidth consumption, and scales up to a very large number of devices. A central feature of the proposed protocol is that it provides a way to dynamically customize the trade-off between security and efficiency. The protocol is lightweight as it resorts on symmetric key encryption only, hence it supports low-end devices and can be already adopted in current standards with little effort. Using ProVerif, we prove that the protocol meets mutual authentication, key confidentiality, and device privacy also in presence of corrupted devices, a threat model not being addressed in the state-of-the-art group-based AKA proposals. We evaluate the protocol performances in terms of latency and bandwidth consumption, and obtain promising results.

Serie
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743 ; 10157
Nyckelord
Authentication, Bandwidth, Cryptography, Economic and social effects, Security of data, Authentication and key agreements, Bandwidth consumption, Machine type communications, Mutual authentication, Protocol performance, State of the art, Symmetric key encryption, Wireless systems, Network security
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-29381 (URN)10.1007/978-3-319-53177-9_1 (DOI)2-s2.0-85012965501 (Scopus ID)978-3-319-53176-2 (ISBN)978-3-319-53177-9 (ISBN)
Konferens
19th International Conference on Information Security and Cryptology (ICISC 2016), November 30 - December 2, 2016, Seoul, South Korea
Tillgänglig från: 2017-05-11 Skapad: 2017-05-11 Senast uppdaterad: 2020-12-01Bibliografiskt granskad
Abdelraheem, M. A., Gehrmann, C., Lindström, M. & Nordahl, C. (2016). Executing Boolean Queries on an Encrypted Bitmap Index. In: CCSW 2016: Proceedings of the 2016 ACM on Cloud Computing Security Workshop. Paper presented at 8th ACM Cloud Computing Security Workshop (CCSW 2016), October 28, 2016, Vienna, Austria (pp. 11-22).
Öppna denna publikation i ny flik eller fönster >>Executing Boolean Queries on an Encrypted Bitmap Index
2016 (Engelska)Ingår i: CCSW 2016: Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016, s. 11-22Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We propose a simple and efficient searchable symmetric encryption scheme based on a Bitmap index that evaluates Boolean queries. Our scheme provides a practical solution in settings where communications and computations are very constrained as it offers a suitable trade-off between privacy and performance.

Nyckelord
Bitmap index, Boolean query, Conjunctive search, Searchable symmetric encryption
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:ri:diva-28253 (URN)10.1145/2996429.2996436 (DOI)2-s2.0-85001776518 (Scopus ID)9781450345729 (ISBN)
Konferens
8th ACM Cloud Computing Security Workshop (CCSW 2016), October 28, 2016, Vienna, Austria
Tillgänglig från: 2017-02-21 Skapad: 2017-02-21 Senast uppdaterad: 2020-12-01Bibliografiskt granskad
Gehrmann, C. & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom): . Paper presented at 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), December 12-15, 2016, Luxembourg City, Luxembourg (pp. 527-532). , Article ID 7830733.
Öppna denna publikation i ny flik eller fönster >>IoT protection through device to cloud synchronization
2016 (Engelska)Ingår i: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, s. 527-532, artikel-id 7830733Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

This paper addresses the problem of protecting distributed IoT units from network based attacks while still having a high level of availability. In particular we suggest a novel method where the IoT device execution state is modeled with a suitable high level application model and where the execution state of the application of the IoT device is 'mirrored' in a cloud executed machine. This machine has very high availability and high attack resistance. The IoT device will only communicate with the mirror machine in the cloud using a dedicated synchronization protocol. All essential IoT state information and state manipulations are communicated through this synchronization protocol while all end application communication directed towards the IoT units is done towards the mirror machine in the cloud. This gives a very robust and secure system with high availability at the price of slower responses. However, for many non-real time IoT application with high security demands this performance penalty can be justified.

Nyckelord
Cloud, DDoS, IoT, Security, Synchronization, Cloud computing, Clouds, Mirrors, High availability, High level applications, Network-based attacks, Performance penalties, State information, Synchronization protocols, Internet of things
Nationell ämneskategori
Naturvetenskap
Identifikatorer
urn:nbn:se:ri:diva-31062 (URN)10.1109/CloudCom.2016.0092 (DOI)2-s2.0-85012970248 (Scopus ID)978-1-5090-1445-3 (ISBN)
Konferens
8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), December 12-15, 2016, Luxembourg City, Luxembourg
Tillgänglig från: 2017-09-05 Skapad: 2017-09-05 Senast uppdaterad: 2020-12-01Bibliografiskt granskad
Tiloca, M., Gehrmann, C. & Seitz, L. (2016). Robust and Scalable DTLS Session Establishment (5ed.). ERCIM News, 31-32
Öppna denna publikation i ny flik eller fönster >>Robust and Scalable DTLS Session Establishment
2016 (Engelska)Ingår i: ERCIM News, ISSN 0926-4981, E-ISSN 1564-0094, s. 31-32Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The Datagram Transport Layer Security (DTLS) protocol is highly vulnerable to a form of denial-of-service attack (DoS), aimed at establishing a high number of invalid, half-open, secure sessions. Moreover, even when the efficient pre-shared key provisioning mode is considered, the key storage on the server side scales poorly with the number of clients. SICS Swedish ICT has designed a security architecture that efficiently addresses both issues without breaking the current standard.

Ort, förlag, år, upplaga, sidor
ERCIM, 2016 Upplaga: 5
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:ri:diva-22245 (URN)
Projekt
EU FP7 SEGRID
Tillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2023-05-25Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0001-8003-200X

Sök vidare i DiVA

Visa alla publikationer