scholarly journals Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications

Author(s):  
Bastian Braun ◽  
Caspar Gries ◽  
Benedikt Petschkuhn ◽  
Joachim Posegga
Author(s):  
Bastian Braun ◽  
Patrick Gemein ◽  
Hans P. Reiser ◽  
Joachim Posegga

Author(s):  
Pengfei Qiu ◽  
Yongqiang Lyu ◽  
Jiliang Zhang ◽  
Dongsheng Wang ◽  
Gang Qu

Author(s):  
Paul Muntean ◽  
Matthias Neumayer ◽  
Zhiqiang Lin ◽  
Gang Tan ◽  
Jens Grossklags ◽  
...  

2022 ◽  
Vol 13 (2) ◽  
pp. 1-28
Author(s):  
Yan Tang ◽  
Weilong Cui ◽  
Jianwen Su

A business process (workflow) is an assembly of tasks to accomplish a business goal. Real-world workflow models often demanded to change due to new laws and policies, changes in the environment, and so on. To understand the inner workings of a business process to facilitate changes, workflow logs have the potential to enable inspecting, monitoring, diagnosing, analyzing, and improving the design of a complex workflow. Querying workflow logs, however, is still mostly an ad hoc practice by workflow managers. In this article, we focus on the problem of querying workflow log concerning both control flow and dataflow properties. We develop a query language based on “incident patterns” to allow the user to directly query workflow logs instead of having to transform such queries into database operations. We provide the formal semantics and a query evaluation algorithm of our language. By deriving an accurate cost model, we develop an optimization mechanism to accelerate query evaluation. Our experiment results demonstrate the effectiveness of the optimization and achieves up to 50× speedup over an adaption of existing evaluation method.


2021 ◽  
Vol 5 (OOPSLA) ◽  
pp. 1-30
Author(s):  
Son Tuan Vu ◽  
Albert Cohen ◽  
Arnaud De Grandmaison ◽  
Christophe Guillon ◽  
Karine Heydemann

Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. These side-effects may also be too expensive in fine-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the input/output semantics-preservation contract of compilers. We introduce an opacification mechanism to preserve and enforce a partial ordering of observations. This approach is compatible with a production compiler and does not incur any modification to its optimization passes. We validate the effectiveness and performance of our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.


Author(s):  
Paul Muntean ◽  
Matthias Fischer ◽  
Gang Tan ◽  
Zhiqiang Lin ◽  
Jens Grossklags ◽  
...  

Author(s):  
Salvador Lima ◽  
José Moreira

The Web is a crucial means for the dissemination of touristic information. However, most touristic information resources are stored directly in Web pages or in relational databases that are accessible through ad-hoc Web applications, and the use of automated processes to search, extract and interpret information can hardly be implemented. The Semantic Web technologies, aiming at representing the background knowledge about Web resources in a computational way, can be an important contribution to the development of such automated processes. This chapter introduces the concept of touristic object, giving special attention to the representation of temporal, spatial, and thematic knowledge. It also proposes a three-layered architecture for the representation of touristic objects in the Web. The central part is the domain layer, defining a Semantic Model for Tourism (SeMoT) to describe concepts, relationships, and constraints using ontologies. The data layer supports the mapping of touristic information in relational databases into Resource Description Framework (RDF) virtual graphs following the SeMoT specification. The application layer deals with the integration of information from different data sources into a unified knowledge model, offering a common vocabulary to describe touristic information resources. Finally, we also show how to use this framework for planning touristic itineraries.


Sign in / Sign up

Export Citation Format

Share Document