Emre Uzun
Rutgers University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Emre Uzun.
symposium on access control models and technologies | 2012
Emre Uzun; Vijayalakshmi Atluri; Shamik Sural; Jaideep Vaidya; Gennaro Parlato; Anna Lisa Ferrara; Madhusudan Parthasarathy
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the administrative models for RBAC have been adopted in recent years. In this paper, we consider the temporal extension of RBAC (TRBAC), and develop safety analysis techniques for it. Safety analysis is essential for understanding the implications of security policies both at the stage of specification and modification. Towards this end, in this paper, we first define an administrative model for TRBAC. Our strategy for performing safety analysis is to appropriately decompose the TRBAC analysis problem into multiple subproblems similar to RBAC. Along with making the analysis simpler, this enables us to leverage and adapt existing analysis techniques developed for traditional RBAC. We have adapted and experimented with employing two state of the art analysis approaches developed for RBAC as well as tools developed for software testing. Our results show that our approach is both feasible and flexible.
Journal of Computer Security | 2014
Emre Uzun; Vijayalakshmi Atluri; Jaideep Vaidya; Shamik Sural; Anna Lisa Ferrara; Gennaro Parlato; P. Madhusudan
Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of todays organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of security policies and helps organizations gain confidence on the control they have on resources while providing access, and devise and maintain policies.In this paper, we consider security analysis for the Temporal RBAC (TRBAC), one of the extensions of RBAC. The TRBAC considered in this paper allows temporal restrictions on roles themselves, user-permission assignments (UA), permission-role assignments (PA), as well as role hierarchies (RH). Towards this end, we first propose a suitable administrative model that governs changes to temporal policies. Then we propose our security analysis strategy, that essentially decomposes the temporal security analysis problem into smaller and more manageable RBAC security analysis sub-problems for which the existing RBAC security analysis tools can be employed. We then evaluate them from a practical perspective by evaluating their performance using simulated data sets.
DBSec 2013 Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXVII - Volume 7964 | 2013
Emre Uzun; Vijayalakshmi Atluri; Jaideep Vaidya; Shamik Sural
The temporal role based access control (TRBAC) models support the notion of temporal roles, user-to-role and permission-to-role assignment, as well as allow role enabling. In this paper, we argue that role hierarchies can be temporal in nature with a dynamism that allows it to have a different structure in different time intervals; and safety analysis of such extensions is crucial. Towards this end, we propose the temporal role based access control model extended with dynamic temporal role hierarchies, denoted as TRBACRH, and offer an approach to perform its safety analysis. We also present an administrative model to govern changes to the proposed role hierarchy.
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy | 2011
Emre Uzun; Vijayalakshmi Atluri; Haibing Lu; Jaideep Vaidya
The primary purpose of Role Mining is to effectively determine the roles in an enterprise using the permissions that have already been assigned to the users. If this permission assignment is viewed as a 0-1 matrix, then Role Mining aims to decompose this matrix into two matrices which represent user-role and role-permission assignments. This decomposition is known as Boolean Matrix Decomposition (BMD). In this paper, we use an Extended BMD (EBMD) to consider separation of duty constraints (SOD) and exceptions, that are common to any security system, in the role mining process. Essentially, in EBMD, we introduce negative assignments. An additional benefit of allowing negative assignments in roles is that, a less number of roles can be used to reconstruct the same given user-permission assignments. We introduce Extended Role Mining Problem and its variants and present their optimization models. We also propose a heuristic algorithm that is capable of utilizing these models to find good decompositions.
IFIP Annual Conference on Data and Applications Security and Privacy | 2015
Emre Uzun; David Lorenzi; Vijayalakshmi Atluri; Jaideep Vaidya; Shamik Sural
Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the traditional Discretionary Access Control (DAC). If RBAC proves to be beneficial, organizations may choose to migrate from DAC to RBAC. There have been many algorithms developed to generate RBAC configurations from DAC configuration. Although these algorithms provide an RBAC configuration, the quality of the generated RBAC configuration could vary among different algorithms and DAC configurations. In this paper, we propose a decision support framework, which provides a basis for comparison among different potential RBAC derivations from DAC to determine the most desirable outcome with respect to the cost of security administration.
international conference on information systems security | 2012
David Lorenzi; Jaideep Vaidya; Emre Uzun; Shamik Sural; Vijayalakshmi Atluri
CAPTCHAs have become the de-facto standard in providing protection from automated robot attacks against online forms and services. These captchas can take on many forms, combining the use of text, images or other cognitive tasks that are difficult for computers to solve but easy for humans. In this paper, we focus on captchas where the challenge to be solved is an image recognition task. We show that well established image classification techniques and algorithms can be used by attackers to “crack” such captchas. Specifically, we examine three state of the art image recognition captchas, SQ-PIX, ESP-PIX, and ASIRRA, and show that with modern image processing tools, the CAPTCHAs do not provide much security and can be easily circumvented.
symposium on access control models and technologies | 2015
David Lorenzi; Pratik Chattopadhyay; Emre Uzun; Jaideep Vaidya; Shamik Sural; Vijayalakshmi Atluri
As online automation, image processing and computer vision become increasingly powerful and sophisticated, methods to secure online assets from automated attacks (bots) are required. As traditional text based CAPTCHAs become more vulnerable to attacks, new methods for ensuring a user is human must be devised. To provide a solution to this problem, we aim to reduce some of the security shortcomings in an alternative style of CAPTCHA - more specifically, the image CAPTCHA. Introducing noise helps image CAPTCHAs thwart attacks from Reverse Image Search (RIS) engines and Computer Vision (CV) attacks while still retaining enough usability to allow humans to pass challenges. We present a secure image generation method based on noise addition that can be used for image CAPTCHAs, along with 4 different styles of image CAPTCHAs to demonstrate a fully functional image CAPTCHA challenge system.
information security conference | 2015
David Lorenzi; Emre Uzun; Jaideep Vaidya; Shamik Sural; Vijayalakshmi Atluri
Text based CAPTCHAs are the de facto method of choice to ensure that humans (rather than automated bots) are interacting with websites. Unfortunately, users often find it inconvenient to read characters and type them in. Image CAPTCHAs provide an alternative that is often preferred to text-based implementations. However, Image CAPTCHAs have their own set of security and usability problems. A key issue is their susceptibility to Reverse Image Search (RIS) and Computer Vision (CV) attacks. In this paper, we present a generalized methodology to transform existing images by applying various noise generation algorithms into variants that are resilient to such attacks. To evaluate the usability/security tradeoff, we conduct a user study to determine if the method can provide “usable” images that meet our security requirements – thus improving the overall security provided by Image CAPTCHAs.
IFIP Annual Conference on Data and Applications Security and Privacy | 2017
Emre Uzun; Gennaro Parlato; Vijayalakshmi Atluri; Anna Lisa Ferrara; Jaideep Vaidya; Shamik Sural; David Lorenzi
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one must exist. Thus, to eliminate unauthorized flows, it is sufficient to remove all one-step flows, thereby avoiding the need for expensive transitive closure computations. This new insight allows us to develop an efficient methodology to identify and prevent all unauthorized flows leading to confidentiality and integrity violations. We develop separate solutions for two different environments that occur in real life, and experimentally validate the efficiency and restrictiveness of the proposed approaches using real data sets.
Journal of Computer Security | 2017
David Lorenzi; Emre Uzun; Jaideep Vaidya; Shamik Sural; Vijayalakshmi Atluri