Effective Vulnerability Assessment of Tamper-Indicating Seals
نویسندگان
چکیده
منابع مشابه
Vulnerability Assessment of Security Seals
Tamper-indicating devices, also called security seals, are widely used to detect tampering or unauthorized entry. We studied 94 different security seals, both passive and electronic, developed either commercially or by the United States Government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low...
متن کاملBasing Cryptographic Protocols on Tamper-Evident Seals
In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the complete...
متن کاملEffective Network Vulnerability Assessment through Model Abstraction
A significant challenge in evaluating network security stems from the scale of modern enterprise networks and the vast number of vulnerabilities regularly found in software applications. A common technique to deal with this complexity is attack graphs, where a tool automatically computes all possible ways a system can be broken into by analyzing the configuration of each host, the network, and ...
متن کاملYou've Got Vulnerability: Exploring Effective Vulnerability Notifications
Security researchers can send vulnerability notifications to take proactive measures in securing systems at scale. However, the factors affecting a notification’s efficacy have not been deeply explored. In this paper, we report on an extensive study of notifying thousands of parties of security issues present within their networks, with an aim of illuminating which fundamental aspects of notifi...
متن کاملOn Tamper-Resistance from a Theoretical Viewpoint - The Power of Seals
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defeat some common privacy protection mechanisms. We propose the theoretical model of trusted agent to formalize the notion of programmable secure hardware. We show that protocols not using tamper-proof devices are not den...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Testing and Evaluation
سال: 1997
ISSN: 0090-3973
DOI: 10.1520/jte11883j