SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Hedin Daniel) "

Sökning: WFRF:(Hedin Daniel)

  • Resultat 1-10 av 86
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  •  
3.
  •  
4.
  •  
5.
  • Schoepe, Daniel, 1989, et al. (författare)
  • SeLINQ: Tracking information across application-database boundaries
  • 2014
  • Ingår i: SIGPLAN Notices (ACM Special Interest Group on Programming Languages). - New York, NY, USA : ACM. - 0730-8566. - 9781450328739 ; 49:9, s. 25-38
  • Konferensbidrag (refereegranskat)abstract
    • The root cause for confidentiality and integrity attacks against computing systems is insecure information flow. The complexity of modern systems poses a major challenge to secure end-to-end information flow, ensuring that the insecurity of a single component does not render the entire system insecure. While information flow in a variety of languages and settings has been thoroughly studied in isolation, the problem of tracking information across component boundaries has been largely out of reach of the work so far. This is unsatisfactory because tracking information across component boundaries is necessary for end-to-end security. This paper proposes a framework for uniform tracking of information flow through both the application and the underlying database. Key enabler of the uniform treatment is recent work by Cheney et al., which studies database manipulation via an embedded language-integrated query language (with Microsoft's LINQ on the backend). Because both the host language and the embedded query languages are functional F#-like languages, we are able to leverage information-flow enforcement for functional languages to obtain information-flow control for databases "for free", synergize it with information-flow control for applications and thus guarantee security across application-database boundaries. We develop the formal results in the form of a security type system that includes a treatment of algebraic data types and pattern matching, and establish its soundness. On the practical side, we implement the framework and demonstrate its usefulness in a case study with a realistic movie rental database.
  •  
6.
  •  
7.
  • Ahmadpanah, Seyed Mohammad Mehdi, 1996, et al. (författare)
  • LazyTAP : On-Demand Data Minimization for Trigger-Action Applications
  • 2023
  • Ingår i: Proceedings - IEEE Symposium on Security and Privacy, vol. 2023. - : Institute of Electrical and Electronics Engineers Inc.. - 1081-6011. - 9781665493369 ; , s. 3079-3097
  • Konferensbidrag (refereegranskat)abstract
    • Trigger-Action Platforms (TAPs) empower applications (apps) for connecting otherwise unconnected devices and services. The current TAPs like IFTTT require trigger services to push excessive amounts of sensitive data to the TAP regardless of whether the data will be used in the app, at odds with the principle of data minimization. Furthermore, the rich features of modern TAPs, including IFTTT queries to support multiple trigger services and nondeterminism of apps, have been out of the reach of previous data minimization approaches like minTAP. This paper proposes LazyTAP, a new paradigm for fine-grained on-demand data minimization. LazyTAP breaks away from the traditional push-all approach of coarse-grained data over-approximation. Instead, LazyTAP pulls input data on-demand, once it is accessed by the app execution. Thanks to the fine granularity, LazyTAP enables tight minimization that naturally generalizes to support multiple trigger services via queries and is robust with respect to nondeterministic behavior of the apps. We achieve seamlessness for third-party app developers by leveraging laziness to defer computation and proxy objects to load necessary remote data behind the scenes as it becomes needed. We formally establish the correctness of LazyTAP and its minimization properties with respect to both IFTTT and minTAP. We implement and evaluate LazyTAP on app benchmarks showing that on average LazyTAP improves minimization by 95% over IFTTT and by 38% over minTAP, while incurring a tolerable performance overhead. 
  •  
8.
  • Ahmadpanah, Seyed Mohammad Mehdi, 1996, et al. (författare)
  • Poster : Data Minimization by Construction for Trigger-Action Applications
  • 2023
  • Ingår i: CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. - : Association for Computing Machinery, Inc. - 9798400700507 ; , s. 3522-3524
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Trigger-Action Platforms (TAPs) enable applications to integrate various devices and services otherwise unconnected. Recent features of TAPs introduce additional sources of data such as queries in IFTTT. The current TAPs, like IFTTT, demand that trigger and query services transmit excessive amounts of user data to the TAP. To limit the data to what is actually necessary for the execution to comply with the principle of data minimization, input services should send no more than the necessary data. LazyTAP proposes a new paradigm of data minimization by construction in TAPs, introducing a novel perspective for data collection from input services. While the existing push-all approach of TAPs entails coarse-grained data over-approximation, LazyTAP pulls input data on-demand at the level of attributes, once accessed by the app execution. Thanks to the fine granularity provided by LazyTAP, multiple trigger and query services can be naturally minimized while the behavior of app executions is preserved. In addition, a great benefit of LazyTAP is being seamless for third-party app developers. By leveraging laziness, LazyTAP defers computation and proxies objects to load necessary remote data behind the scenes. Our evaluation study on app benchmarks shows that on average LazyTAP improves minimization by 95% over IFTTT and by 38% over minTAP, with a tolerable performance overhead. This poster goes into further details about LazyTAP and elaborates on its prototype implementation. 
  •  
9.
  • Ahmadpanah, Seyed Mohammad Mehdi, 1996, et al. (författare)
  • SandTrap : Securing javascript-driven trigger-action platforms
  • 2021
  • Ingår i: Proceedings of the 30th USENIX Security Symposium. - : USENIX Association. - 9781939133243 ; , s. 2899-2916
  • Konferensbidrag (refereegranskat)abstract
    • Trigger-Action Platforms (TAPs) seamlessly connect a wide variety of otherwise unconnected devices and services, ranging from IoT devices to cloud services and social networks. TAPs raise critical security and privacy concerns because a TAP is effectively a “person-in-the-middle” between trigger and action services. Third-party code, routinely deployed as “apps” on TAPs, further exacerbates these concerns. This paper focuses on JavaScript-driven TAPs. We show that the popular IFTTT and Zapier platforms and an open-source alternative Node-RED are susceptible to attacks ranging from exfiltrating data from unsuspecting users to taking over the entire platform. We report on the changes by the platforms in response to our findings and present an empirical study to assess the implications for Node-RED. Motivated by the need for a secure yet flexible way to integrate third-party JavaScript apps, we propose SandTrap, a novel JavaScript monitor that securely combines the Node.js vm module with fully structural proxy-based two-sided membranes to enforce fine-grained access control policies. To aid developers, SandTrap includes a policy generation mechanism. We instantiate SandTrap to IFTTT, Zapier, and Node-RED and illustrate on a set of benchmarks how SandTrap enforces a variety of policies while incurring a tolerable runtime overhead. 
  •  
10.
  • Ahmadpanah, Seyed Mohammad Mehdi, 1996, et al. (författare)
  • Securing Node-RED Applications
  • 2021
  • Ingår i: Protocols, Strands, and LogicEssays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. - Cham : Springer Science and Business Media Deutschland GmbH. ; , s. 1-21, s. 1-21, s. 1-21
  • Konferensbidrag (refereegranskat)abstract
    • Trigger-Action Platforms (TAPs) play a vital role in fulfilling the promise of the Internet of Things (IoT) by seamlessly connecting otherwise unconnected devices and services. While enabling novel and exciting applications across a variety of services, security and privacy issues must be taken into consideration because TAPs essentially act as persons-in-the-middle between trigger and action services. The issue is further aggravated since the triggers and actions on TAPs are mostly provided by third parties extending the trust beyond the platform providers. Node-RED, an open-source JavaScript-driven TAP, provides the opportunity for users to effortlessly employ and link nodes via a graphical user interface. Being built upon Node.js, third-party developers can extend the platform’s functionality through publishing nodes and their wirings, known as flows. This paper proposes an essential model for Node-RED, suitable to reason about nodes and flows, be they benign, vulnerable, or malicious. We expand on attacks discovered in recent work, ranging from exfiltrating data from unsuspecting users to taking over the entire platform by misusing sensitive APIs within nodes. We present a formalization of a runtime monitoring framework for a core language that soundly and transparently enforces fine-grained allowlist policies at module-, API-, value-, and context-level. We introduce the monitoring framework for Node-RED that isolates nodes while permitting them to communicate via well-defined API calls complying with the policy specified for each node.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 86
Typ av publikation
konferensbidrag (38)
tidskriftsartikel (36)
rapport (3)
doktorsavhandling (3)
forskningsöversikt (2)
licentiatavhandling (2)
visa fler...
bok (1)
annan publikation (1)
visa färre...
Typ av innehåll
refereegranskat (64)
övrigt vetenskapligt/konstnärligt (21)
populärvet., debatt m.m. (1)
Författare/redaktör
Bai, Y. (3)
Brown, J. (3)
Chen, C. (3)
Chen, H. (3)
Chen, S. (3)
Francis, D. (3)
visa fler...
Huang, Y. (3)
Li, B. (3)
Li, H. (3)
Liu, B. (3)
Liu, M. (3)
Liu, Y. (3)
March, L. (3)
Pinder, A. (3)
Sanchez, A. (3)
Silva, J. (3)
Walker, R. (3)
Wang, F. (3)
Wang, J. (3)
Webb, S. (3)
White, S. (3)
Williams, S. (3)
Wilson, A. (3)
Xu, L. (3)
Yang, Y. (3)
Zhang, H. (3)
Zhang, J. (3)
Zhang, L. (3)
Zhu, Y. (3)
Brenner, L. (3)
Simon, D. (3)
Zhou, C. (3)
Brown, G. (3)
Ellis, K. (3)
Rose, A. (3)
Zhao, L. (3)
Ahmad, A. (3)
He, M. (3)
Ryan, P. (3)
Schmitz, M. (3)
Zhao, T. (3)
Gupta, A. (3)
Joseph, J. (3)
Kennedy, J. (3)
Li, J. (3)
Yuan, J. (3)
Zhang, Q. (3)
Ren, Y. (3)
Martin, J. (3)
Alexander, M. (3)
visa färre...
Lärosäte
Chalmers tekniska högskola (27)
Kungliga Tekniska Högskolan (19)
Karolinska Institutet (15)
Mälardalens universitet (13)
Linköpings universitet (11)
Göteborgs universitet (10)
visa fler...
Lunds universitet (9)
Uppsala universitet (7)
Stockholms universitet (7)
Örebro universitet (6)
Mittuniversitetet (6)
Umeå universitet (2)
Högskolan Kristianstad (1)
RISE (1)
visa färre...
Språk
Engelska (78)
Svenska (7)
Latin (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (43)
Medicin och hälsovetenskap (26)
Teknik (16)
Samhällsvetenskap (8)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy