25th CSEC Group Meeting

Date
May 21, 2004

Location
Sony Computer Entertainment Inc. Access MAP (Japanese)
Akasaka, Minato-ku, Tokyo 107-0052, JAPAN (Japanese)

Transportation
Aoyama-itchome (GINZA Line or Oedo Line)


25th CSEC Group Meeting Program
(1) Building Method of Long Term Electronic Signature Formats for Digital Documents on the Server
Shigeyoshi SHIMA (NEC Corporation, System Platform Software Development Division)
Ayako KOMATSU (NEC Corporation, System Platform Software Development Division)

When a public key certificate is not valid, Digital documents with electronic signature are not valid. If a digital signature is held on the long term of validity, a signer or a verifier will collect some validation data of electronic signature and build a long term electronic signature. In this paper, we propose building method of long term electronic signatures by the server.

(2) Development and evaluation of a more efficient electronic document SUMI coating system
Takanobu MASUBUCHI (School of Engineering, Tokyo Denki University)
Noriko OGAWA (School of Engineering, Tokyo Denki University)
Hiroshi KASHIMURA (School of Engineering, Tokyo Denki University)
Saneyuki ISHI (School of Engineering, Tokyo Denki University)
Ryoichi SASAKI (School of Engineering, Tokyo Denki University)

Digital signature does not allow any alteration of the document. However, "appropriate" alteration should be allowed for some signed document because of other security requirements etc. Disclosure of official information is a typical example of this. Sensitive information such as private information should be sanitized from the original digitally signed document when it is disclosed. "Digital document sanitizing problem" is the problem that signed document cannot be verified if some part of the signed document is concealed. The already proposed SUMI coating system which can solve digital document sanitizing problem. In this paper, we developed and evaluation of a more efficient electronic document SUMI coating system. Furthermore, we examine consideration of a user interface gentle to people and mount it on the above system.

(3) Locking Protocol for Information Flow Control
Ryung Chon (Dept. of Computers and System Engineering Tokyo Denki University)
Tomoya Enokido (Dept. of Computers and System Engineering Tokyo Denki University)
Makoto Takizawa (Dept. of Computers and System Engineering Tokyo Denki University)

This paper discusses a novel locking protocol to prevent illegal information flow among objects in a role-based access control (RBAC) model. In this paper, we newly define a conflicting relation "a role R1 conflicts with another role R2" to show that illegal information flow may occur if a transaction with R1 is performed before another transaction with R2. Here, we newly introduce a role lock on an object to abort a transaction with R1 if another transaction with R2 had been already performed on the object. Role locks are not released even if transactions issuing the role locks commit. A role lock on an object can be released if information brought into the object got obsolete. We discuss how to release obsolete role locks.

(4) Development of the visual information Leak Prevention system from a Display
Kei Takeuchi (School of Engineering, Tokyo Denki University;School of Engineering, Tokyo Denki University)
Yosiki Nisimoto (School of Engineering, Tokyo Denki University)
Ryoichi Sasaki ()

When an information terminal machine is used in the space in which two or more persons are,the information displayed through a display is defenseless to the peep act by the others. There is PPT technology as measure technology to this problem now. PPT technology is the system which consists of an exclusive display and exclusive glasses, and it has The information leak prevention effect on vision that you cannot see the contents on an exclusive display without exclusive glasses. But, this technology contains the big problem that all exclusive displays will be able to be seen with one exclusive glasses. In order to solve this problem, we performed the proposal and the trial production using RFID technology of a system. This system prevents the problem which PPT technology has by supervising the exclusive glasses carrying the RFID tag and telling a user about the dishonest act called peep act by the glasses possessor etc.

(5) Research on Epidemiologic Approach for Anti Computer Viruses - 1 -Development of Virus Diffusion and Control Simulator-
Satoshi Seki (Global Information and Telecommunication Institute, Waseda University)
Ryoichi Sasaki (Department of Information Systems and Multimedia Design, School of Engineering, Tokyo Denki University)
Mitsuru Iwamura (Graduate School of Asia-Pacific Studies, Waseda University)

Referring to similarity between computer viruses and physical viruses, we intended to confirm effectiveness of epidemiological approaches, which are usually applied to physical viruses, on computer viruses. As the first step of this research, we searched on diffusion of computer virus infection and its control method by way of the simulation that is one of theoretical epidemiological methods. The simulator we constructed is one modeled by the System Dynamics theory on diffusion of computer viruses infection within a controlled network such as an office LAN which is connected to the Internet restrictedly. We confirmed affects for infection diffusion from changing some environmental conditions of the model.

(6) An Anomaly Detection Technique for IDS Events using Deviations of Information Entropy
Keisuke TAKEMORI (KDDI R&D Laboratories Inc.)
Yutaka MIYAKE (KDDI R&D Laboratories Inc.)
Toshiaki TANAKA (KDDI R&D Laboratories Inc.)
Iwao SASASE (Dept. of Info.& Computer Science, Keio Univ.)

Recently, rapid increasing attacks that influence network services have become critical issues on the Internet. A detection technique for large scale attacks and worm infected hosts needs to estimate degree of its propagation. In this research, we propose an anomaly detection technique for IDS (Intrusion Detection System) events using the information entropy. And the information entropy is adapted to a profiling approach which compares the current information entropy with mean and standard deviations of the past information entropies. Experimental evaluations with real IDS events show that the detection ratio of false positives nd false negatives for the large scale attacks or the worm attacks on our approach is better than that using event counts on previous approach. Furthermore, the combination system of our approach and previous approach is able to detect potential issues perfectly. We also adapt the techniques to a thereat indicator, and its objective alarms effect with quick and reliable response for security operators.

(7) Status Tracking Notes; Event sharing based on time series
Masato Terada (Graduate School of Science and Technology, Keio University,Systems Development Laboratory, Hitachi Ltd.)
Hiroyuki Kido (Graduate School of Information Science, Nara Institute of Science and Technology)
Daisuke Kikuchi (Graduate School of Science and Engineering, Chuo University.)
Shingo Takada (Graduate School of Science and Technology, Keio University)
Norihisa Doi (Graduate School of Science and Technology, Keio University,Graduate School of Science and Engineering, Chuo University.)

The providing environment of the security information has been improved including the JVN. In order to protect the unauthorized access and eliminate the vulnerability, it is necessary to improve the follow-up environment of the incidents and the vulnerability. This paper described the overview of TRnotes (Status Tracking Notes), which supports the follow-up security events about vulnerability and incidents.

(8) Examination of inspection system of software to have vulnerability
Daisuke Kikuchi (Graduate School of Science and Engineering, Chuo University.)
Masato Terada (Faculty School of Sciencd and Technology, Keio University.,Research and Development Initiative Chuo University.)
Yuji Chiba (Research and Development Initiative Chuo University.)
Kenichi Yada (Research and Development Initiative Chuo University.)
Norihisa Doi (Graduate School of Science and Engineering, Chuo University.)

This paper shows a study on a vulnerable software detection system, that detects vulnerable software installed in the target machine. The system has two components: one is a database that contains information on vulnerable software, and the other is a detection software that lists up software installed in the target machine and then sends the list to the database to search for vulnerablility. One of the problems in the design of the system is the implementation of the search key, which is an element of the list sent to the database. The search key must not only be information that the detection software can retrieve from the target software, but also stands for the status of the target software, such as version number or applied patches, for correct search result. We experimentally implemented the search key as a pair of target software name and its version number for quantitative research on the availability of version number and the correctness of the search result.

(9) Model Checking Configurations for Tag-Switched Computer Networks
Hideki Sakurada

In tag-switched computer networks, errors in the configurations of the nodes can cause the frames to leak into unexpected segments or not to reach the destination segments. Frame leakage, in particular, can be a security problem. This paper describes a method to model tag-switched networks and check the reachability of frames by model checking. The model is implemented on NuSMV, a tool for symbolic model checking. The method is useful for checking configurations before they are activated and for analyzing the cause of trouble.

(10) Definition of Fairness and Verification of Authentication Protocol By Modal Logic
Kenji IMAMOTO (Graduate School of Information Science and Electrical Engineering, Kyushu University)
Kouichi SAKURAI (Faculty of Information Science and Electrical Engineering, Kyushu University)

We define fairness by SVO logic based on model logic, and verify the security of a fair exchange protocol. In this paper, we focus on certified mail protocol. We verify the fairness of the protocol proposed by Schneier et al. [4], and clarify assumptions needed to achieve defined fairness.

(11) A Survey of Network and Distributed System Security Symposium
Yuki KOTEGAWA (Graduate School of Information Science and Electrical Engineering, Kyushu University)
Toshihiro TABATA (Faculty of Information Science and Electrical Engineering, Kyushu University)
Yoshiaki HORI (Faculty of Information Science and Electrical Engineering, Kyushu University)
Kouichi SAKURAI (Faculty of Information Science and Electrical Engineering, Kyushu University)

This paper reports the 11th Annual Network and Distributed System Security Symposium (NDSS'04) held on 5-6 February 2004 in San Diego, California, U.S.A. A survey of research trends on NDSS is also presented.


[home]

Valid HTML 4.01! Valid CSS!