Policy transformations for preventing leakage of sensitive information in email systems

  • Authors:
  • Saket Kaushik;William Winsborough;Duminda Wijesekera;Paul Ammann

  • Affiliations:
  • Department of Information & Software Engineering, George Mason University, Fairfax, VA;Department of Computer Science, University of Texas at San Antonio, San Antonio, TX;Department of Information & Software Engineering, George Mason University, Fairfax, VA;Department of Information & Software Engineering, George Mason University, Fairfax, VA

  • Venue:
  • DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we identify an undesirable side-effect of combining different email-control mechanisms for protection from unwanted messages, namely, leakage of recipients' private information to message senders. The problem arises because some email-control mechanisms like bonds, graph-turing tests, etc., inherently leak information, and without discontinuing their use, leakage channels cannot be closed. We formalize the capabilities of an attacker and show how she can launch guessing attacks on recipient's mail acceptance policy that utilizes leaky mechanism in an effort to avoid unwanted mail. The attacker in our model guesses the contents of a recipient's private information. The recipients' use of leaky mechanisms allow the sender to verify her guess. We assume a constraint logic programming based policy language for specification and evaluation of mail acceptance criteria and present two different program transformations that can prevent guessing attacks while allowing recipients to utilize any email-control mechanism in their policies.