Many damaging cybersecurity attacks are enabled when an attacker can access residual sensitive information (e.g. cryptographic keys, personal identifiers) left behind from earlier computation. Attackers can sometimes use residual information to take control of a system, impersonate a user, or manipulate data. Current approaches to addressing access to residual sensitive information aim to patch individual software or hardware vulnerabilities. While such patching approaches are necessary to mitigate sometimes serious security vulnerabilities in the near term, they cannot address the underlying issue: explicit requirements for adequately eliminating residual information and explicit representations of the erasure capabilities of systems are necessary to ensure that sensitive information is handled as expected. This position paper introduces the concept of intentional forgetting and the capabilities that are needed to achieve it. Intentional forgetting enables software and hardware system designers at every level of abstraction to clearly specify and rigorously reason about the forgetting capabilities required of and provided by a system. We identify related work that may help to illuminate challenges or contribute to solutions and consider conceptual and engineering tradeoffs in implementations of forgetting capabilities. We discuss approaches to modeling intentional forgetting and then modeling the strength of a system's forgetting capability by its resistance to disclosing information to different types of detectors. Research is needed in a variety of domains to advance the theory, specification techniques, system foundations, implementation tools, and methodologies for effective, practical forgetting. We highlight research challenges in several domains and encourage cross-disciplinary collaboration to one day create a robust theory and practice of intentional forgetting.
翻译:当攻击者能够获取先前计算留下的残余敏感信息(例如密码钥匙、个人识别特征)时,就能够进行许多破坏性的网络安全攻击。攻击者有时可以使用残余信息来控制一个系统,冒冒用用户或操纵数据。目前处理获取残余敏感信息的方法旨在弥补个别软件或硬件的脆弱性。虽然这种补丁办法对于在近期内减轻有时严重的安全脆弱性是必要的,但它们无法解决根本问题:充分消除残余信息的明确要求和明确表述系统失密能力是必要的,以确保敏感信息得到预期的处理。本立场文件介绍了有意忘却的概念和实现这一目标所需的能力。有意忘却使各级软件和硬件系统设计者能够明确和严格地说明系统所要求的和提供的忘却能力。我们确定相关工作可能有助于阐明挑战或有助于解决问题,并考虑在实施忘却能力时在概念和工程上的权衡取舍取取取取。我们讨论了如何模拟并随后建模一个系统的力量,即通过披露刻意遗忘信息的能力来消除故意忘却一个系统,以及实现这一目的所需的能力。有意忘记使软件和硬件系统设计者能够清楚地了解各种研究方法。我们需要研究各种方法,在各种方法方面,在各种方法方面,研究中鼓励一种方法的改进。