dc.contributor.advisor |
Focardi, Riccardo |
it_IT |
dc.contributor.author |
Squarcina, Marco <1984> |
it_IT |
dc.date.accessioned |
2017-12-13 |
it_IT |
dc.date.accessioned |
2018-06-22T10:10:31Z |
|
dc.date.issued |
2018-03-05 |
it_IT |
dc.identifier.uri |
http://hdl.handle.net/10579/12918 |
|
dc.description.abstract |
In recent years we have faced a multitude of security flaws posing a serious threat to the
whole society, ranging from individuals to national critical infrastructures. For this reason, it
is of crucial importance to effectively enforce security on real systems, by identifying flaws
and putting in place novel security mechanisms and techniques. Along this path, we provide
practical contributions on Web security and cryptographic APIs.
We first review the field of Web session security by surveying the most common attacks
against web sessions. Existing security solutions are evaluated along four different axes:
protection, usability, compatibility and ease of deployment. We also identify a few guidelines
that can be helpful for the development of innovative solutions approaching web security in
a more systematic and comprehensive way. Additionally, we propose a new browser-side
security enforcement technique for Web protocols. The core idea is to extend the browser
with a monitor which, given the protocol specification, enforces the required confidentiality
and integrity properties, as well as the intended protocol flow.
For what concerns the security of cryptographic APIs, we investigate an effective method
to monitor existing cryptographic systems in order to detect, and possibly prevent, the leak-
age of sensitive cryptographic keys. Key security is stated formally and it is proved that the
method is sound, complete and efficient under the assumption that a key fingerprint is given
for each sensitive key. We also provide a thoughtful analysis of Java keystores, storage facili-
ties to manage and securely store keys in Java applications. We devise a precise threat model
and distill a set of security properties. We report on unpublished attacks and weaknesses in
implementations that do not adhere to state-of-the-art cryptographic standards and discuss
the fixes on popular Java libraries released after our responsible disclosure. |
it_IT |
dc.language.iso |
en |
it_IT |
dc.publisher |
Università Ca' Foscari Venezia |
it_IT |
dc.rights |
© Marco Squarcina, 2018 |
it_IT |
dc.title |
Analysis and prevention of security threats in web and cryptographic applications |
it_IT |
dc.title.alternative |
|
it_IT |
dc.type |
Doctoral Thesis |
it_IT |
dc.degree.name |
Informatica |
it_IT |
dc.degree.level |
Dottorato di ricerca |
it_IT |
dc.degree.grantor |
Dipartimento di Scienze Ambientali, Informatica e Statistica |
it_IT |
dc.description.academicyear |
30° CICLO + PROLUNGAMENTI E SOSPENSIONI 29° CICLO |
it_IT |
dc.description.cycle |
30 |
it_IT |
dc.degree.coordinator |
Focardi, Riccardo |
it_IT |
dc.location.shelfmark |
D001828 |
it_IT |
dc.location |
Venezia, Archivio Università Ca' Foscari, Tesi Dottorato |
it_IT |
dc.rights.accessrights |
openAccess |
it_IT |
dc.thesis.matricno |
814359 |
it_IT |
dc.format.pagenumber |
XI, 145 p. |
it_IT |
dc.subject.miur |
INF/01 INFORMATICA |
it_IT |
dc.description.note |
In recent years we have faced a multitude of security flaws posing a
serious threat to the whole society, ranging from individuals to
national critical infrastructures. For this reason, it is of crucial
importance to effectively enforce security on real systems, by
identifying flaws and putting in place novel security mechanisms and
techniques. Along this path, we provide practical contributions on Web
security and cryptographic APIs.
We first review the field of Web session security by surveying the most
common attacks against web sessions. Existing security solutions are
evaluated along four different axes: protection, usability,
compatibility and ease of deployment. We also identify a few guidelines
that can be helpful for the development of innovative solutions
approaching web security in a more systematic and comprehensive way.
Additionally, we propose a new browser-side security enforcement
technique for Web protocols. The core idea is to extend the browser with
a monitor which, given the protocol specification, enforces the required
confidentiality and integrity properties, as well as the intended
protocol flow.
For what concerns the security of cryptographic APIs, we investigate an
effective method to monitor existing cryptographic systems in order to
detect, and possibly prevent, the leakage of sensitive cryptographic
keys. Key security is stated formally and it is proved that the method
is sound, complete and efficient under the assumption that a key
fingerprint is given for each sensitive key. We also provide a
thoughtful analysis of Java keystores, storage facilities to manage and
securely store keys in Java applications. We devise a precise threat
model and distill a set of security properties. We report on unpublished
attacks and weaknesses in implementations that do not adhere to
state-of-the-art cryptographic standards and discuss the fixes on
popular Java libraries released after our responsible disclosure. |
it_IT |
dc.degree.discipline |
|
it_IT |
dc.contributor.co-advisor |
|
it_IT |
dc.provenance.upload |
Marco Squarcina (814359@stud.unive.it), 2017-12-13 |
it_IT |
dc.provenance.plagiarycheck |
Riccardo Focardi (focardi@unive.it), 2018-01-18 |
it_IT |