Paul C. van Oorschot’s research while affiliated with Carleton University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (262)


DNSSEC+: An Enhanced DNS Scheme Motivated by Benefits and Pitfalls of DNSSEC
  • Preprint

August 2024

·

11 Reads

Ali Sadeghi Jahromi

·

·

Paul C. van Oorschot

The absence of security measures between DNS recursive resolvers and authoritative nameservers has been exploited by both inline and off-path attacks. While many security proposals have been made in practice and previous literature, they typically suffer from deployability barriers and/or inadequate security properties. The absence of a broadly adopted security solution between resolvers and nameservers motivates a new scheme that mitigates these issues in previous proposals. We present DNSSEC+, which addresses security and deployability downsides of DNSSEC, while retaining its benefits. DNSSEC+ takes advantage of the existent DNSSEC trust model and authorizes the nameservers within a zone for short intervals to serve the zone data securely, facilitating real-time security properties for DNS responses, without requiring long-term private keys to be duplicated (thus put at risk) on authoritative nameservers. Regarding name resolution latency, DNSSEC+ offers a performance comparable to less secure schemes. We define nine security, privacy, and deployability properties for name resolution, and show how DNSSEC+ fulfills these properties.


Side-Channel Attacks: A Short Tour

March 2024

·

38 Reads

IEEE Security and Privacy Magazine

We provide a brief, accessible introduction to side-channel attacks, a growing subarea of computer security. We explain the key underlying ideas, give a chronological overview of selected classical attacks, and characterize side-channel attacks along several axes.



Influences of Displaying Permission-related Information on Web Single Sign-On Login Decisions

August 2023

·

22 Reads

·

1 Citation

Web users are increasingly presented with multiple login options, including password-based login and common web single sign-on (SSO) login options such as "Login with Google" and "Login with Facebook". There has been little focus in previous studies on how users choose from a list of login options and how to better inform users about privacy issues in web SSO systems. In this paper, we conducted a 200-participant study to understand factors that influence participants' login decisions, and how they are affected by displaying permission differences across login options; permissions in SSO result in release of user personal information to third-party web sites through SSO identity providers. We compare and report on login decisions made by participants before and after viewing permission-related information, examine self-reported responses for reasons related to their login decisions, and report on the factors that motivated their choices. We find that usability preferences and inertia causes (habituation) were among the dominant factors influencing login decisions. After participants viewed permission-related information, many prioritised privacy over other factors, changing their login decisions to more privacy-friendly alternatives. Displaying permission-related information also influenced some participants to make tradeoffs between privacy and usability preferences.


Figure 2: Tag distribution from coding the 1 0 13-item dataset. C1's results duplicated from ref. [ 5 ] to allow comparison. Summing from figure, total tag counts for C1 (1 0 1 3 + 1 64) and C2 (1 0 13 + 1 08) exceed 1 0 13 due to optional second codes. Actionable/non-actionable bars use separate scale. Note: While the graph shows the number of tags of a given type for each coder, identical counts for, say, P 5 would not imply the same individual items were identically tagged P 5 by both coders (see later section "Deeper view"). * denotes actionable codes.
Figure 3: (a) Q -nonagreement distribution across questions for two coders' tags. (b) Q -nonagreement proportions within each question (showing ratio of: number of Q -nonagreements at a node, to how often both coders encountered that node including both Q -agreements and Q -nonagreements). Figure 4 explains calculation of part (b) Q -nonagreements at each question. Values match Table 5 's 315 SS-type T -agreements (760 − 315 = 445 nonagreements); likewise for SD-type (234 − 130 = 104 nonagreements).
Figure 4: Sum of Q -agreements at each question node (cf. Fig. 3 b). Sum includes agreements on both yes and no answers (see dashed boxes). Number of comparison instances for Q 1 , from Table 5 , is: 760 for SS-type (one tag per coder), 234 for SD-type (one coder giving two tags). The miniature tree (right) allows a visual cross-c hec k of how many codes are impacted by decisions at a question.
Partitioning of T -agreements by type and ordered code pairing.
A close look at a systematic method for analyzing sets of security advice
  • Article
  • Full-text available

July 2023

·

20 Reads

·

3 Citations

Journal of Cybersecurity

We carry out a detailed analysis of the security advice coding method (SAcoding) of Barrera et al., which is designed to analyze security advice in the sense of measuring actionability and categorizing advice items as practices, policies, principles, or outcomes. The main part of our analysis explores the extent to which a second coder’s assignment of codes to advice items agrees with that of a first, for a dataset of 1013 security advice items nominally addressing Internet of Things devices. More broadly, we seek a deeper understanding of the soundness and utility of the SAcoding method, and the degree to which it meets the design goal of reducing subjectivity in assigning codes to security advice items. Our analysis results in suggestions for modifications to the coding tree methodology, and some recommendations. We believe the coding tree approach may be of interest for analysis of qualitative data beyond security advice datasets alone.

Download



A survey and analysis of TLS interception mechanisms and motivations

January 2023

·

37 Reads

·

20 Citations

ACM Computing Surveys

TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy. While TLS helps defend against pervasive surveillance of intercepted unencrypted traffic, it also hinders several common beneficial operations typically performed by middleboxes on the network traffic. Consequently, various methods have been proposed that “bypass” the confidentiality goals of TLS by playing with keys and certificates essentially in a man-in-the-middle solution, as well as new proposals that extend the protocol to accommodate third parties, delegation schemes to trusted middleboxes, and fine-grained control and verification mechanisms. We first review the use cases expecting plain HTTP traffic and discuss the extent to which TLS hinders these operations. We retain 19 scenarios where access to unencrypted traffic is still relevant and evaluate the incentives of the stakeholders involved. Second, we survey 30 schemes by which TLS no longer delivers end-to-end security, and by which the notion of an “end” changes, including caching middleboxes such as Content Delivery Networks. Finally, we compare each scheme based on deployability and security characteristics, and evaluate their compatibility with the stakeholders’ incentives. Our analysis leads to a number of key findings, observations, and research questions that we believe will be of interest to practitioners, policy makers and researchers.



Security Best Practices: A Critical Analysis Using IoT as a Case Study

September 2022

·

26 Reads

·

16 Citations

ACM Transactions on Privacy and Security

Academic research has highlighted the failure of many Internet of Things (IoT) product manufacturers to follow accepted practices, while IoT security best practices have recently attracted considerable attention worldwide from industry and governments. Given current examples of security advice, confusion is evident from guidelines that conflate desired outcomes with security practices to achieve those outcomes. We explore a surprising lack of clarity, and void in the literature, on what (generically) best practice means, independent of identifying specific individual practices or highlighting failure to follow best practices. We consider categories of security advice, and analyze how they apply over the lifecycle of IoT devices. For concreteness in discussion, we use iterative inductive coding to code and systematically analyze a set of 1013 IoT security best practices, recommendations, and guidelines collated from industrial, government, and academic sources. Among our findings, of all analyzed items, 68% fail to meet our definition of an (actionable) practice, and 73% of all actionable advice relates to the software development lifecycle phase, highlighting the critical position of manufacturers and developers. We hope that our work provides a basis for the community to better understand best practices, identify and reach consensus on specific practices, and find ways to motivate relevant stakeholders to follow them.


Citations (60)


... Based on a qualitative exploration of the status quo of online security advice on authentication deployments for developers, we aimed to develop further ideas for improving future advice. Previous work on general security advice for end-users [15,23,46,52,89,91,93] and for developers [2,3,5,10,11,16,27,28,29,31,39,76,92,120] does not address online security advice for developers on implementing usable security for end-users. To the best of our knowledge, we are the first to explore this research gap. ...

Reference:

"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
A close look at a systematic method for analyzing sets of security advice

Journal of Cybersecurity

... The trade-off between confidentiality and accessibility is not new, and has been discussed extensively in many facets before [6,27,82]. The reasons for giving access to protected communication, where today this protection is either accomplished via plain encryption or by secure channels like TLS, may be conflicting security desires [22]. The end-users may wish for malware protection or intrusion detection, as in the Google example above, or may have other, more subtle reasons like caching or compression for performance [54]. ...

A survey and analysis of TLS interception mechanisms and motivations
  • Citing Article
  • January 2023

ACM Computing Surveys

... By adhering to these foundations, organizations enhance security conditions, mitigate risks, and protect critical assets and data from cyber threats. In general, the following points represent best practices for implementing security controls in IoT and IIoT deployments (Phelps, 2022;Barrera, Bellman, & van Oorschot, 2022): ...

Security Best Practices: A Critical Analysis Using IoT as a Case Study
  • Citing Article
  • September 2022

ACM Transactions on Privacy and Security

... Although people obtain the innovative benefits of the Internet, they must also confront potential risks like fraud and theft, as they are exposed without proper defensive measures [1]. Internet security is researched ardently, as even governments, private organizations, and top-notch companies are continuously targeted by various attacks [2]. Cyber attacks that affect the system and network availability are at the top of the attack list because everything is intricately connected through the Internet ( i.e., Internet of Things (IoT)) [3]. ...

A View of Security as 20 Subject Areas in Four Themes
  • Citing Article
  • January 2022

IEEE Security and Privacy Magazine

... Single Sign-On: Single-sign on (SSO) is a federated login technique that centralizes the responsibility for authenticating users with a single primary provider (most commonly Google or Apple [247]) using access delegation protocols such as OAuth and OpenID Connect. SSO adoption has been limited by both legitimate privacy considerations over data sharing with big tech companies [38,88,247,326] and holdouts in adoption due to lack of trust in the underlying technology [324,327], with prior work showing users are less likely to use SSO for more sensitive accounts [69]. ...

Empirical Analysis and Privacy Implications in OAuth-based Single Sign-On Systems
  • Citing Conference Paper
  • November 2021

... The bilinear map is a very useful cryptographic primitive. It provides solutions for many cryptographic applications such as identity-based encryptions [1][2][3], non-interactive zeroknowledge proof systems [4][5][6][7][8][9], attribute-based encryptions [10] and short signatures [11][12][13][14][15], etc. A self-bilinear map is a special variant of bilinear maps whose domain and target groups are identical. ...

SoK: Securing Email—A Stakeholder-Based Analysis
  • Citing Chapter
  • October 2021

Lecture Notes in Computer Science

Jeremy Clark

·

P. C. van Oorschot

·

Scott Ruoti

·

[...]

·

Daniel Zappala

... Thangs faces all of the typical security risks of an internet-accessible software application [32,33], including denial of service and injection attacks. However, the dual purpose nature of the platform has resulted in a wider threat profile; Thangs has already experienced security incidents where malicious users have attempted to sabotage the platform. ...

User Authentication—Passwords, Biometrics and Alternatives
  • Citing Chapter
  • October 2021

... This strategy suggests applying threat modeling to the research process itself. In S&P, threat modeling is the practice of identifying relevant adversaries and enumerating their capabilities and goals (c.f., [141]). Identifying threat models is often the first step that engineers take to incorporate security into system design. ...

Computer Security and the Internet, Tools and Jewels from Malware to Bitcoin
  • Citing Article
  • January 2021

... This issue of base rate fallacy was raised two decades ago [53], and is seen today as an inevitable pitfall of open-world detection: precision of an IDS will always be determined by both the base rate of different attacks and the FPR. Regretfully, however, we lack historical statistics for the base rates of attacks in real computer infrastructures, and measuring them reliably is still considered beyond present capabilities [54]. ...

Intrusion Detection and Network-Based Attacks
  • Citing Chapter
  • October 2021