首页 > 最新文献

Proceedings of the 30th Annual Computer Security Applications Conference最新文献

英文 中文
DNS authentication as a service: preventing amplification attacks DNS认证即服务:防止放大攻击
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664281
A. Herzberg, Haya Schulmann
We present the first defence against DNS-amplification DoS attacks, which is compatible with the common DNS servers configurations and with the (important standard) DNSSEC. We show that the proposed DNS-authentication system is efficient, and effectively prevents DNS-based amplification DoS attacks abusing DNS name servers. We present a game-theoretic model and analysis, predicting a wide-spread adoption of our design, sufficient to reduce the threat of DNS amplification DoS attacks. To further reduce costs and provide additional defences for DNS servers, we show how to deploy our design as a cloud based service.
我们提出了针对DNS放大DoS攻击的第一个防御,它与常见的DNS服务器配置和(重要的标准)DNSSEC兼容。实验结果表明,所提出的DNS认证系统是高效的,能够有效防止基于DNS的放大DoS攻击滥用DNS名称服务器。我们提出了一个博弈论模型和分析,预测我们的设计将被广泛采用,足以减少DNS放大DoS攻击的威胁。为了进一步降低成本并为DNS服务器提供额外的防御,我们将展示如何将我们的设计部署为基于云的服务。
{"title":"DNS authentication as a service: preventing amplification attacks","authors":"A. Herzberg, Haya Schulmann","doi":"10.1145/2664243.2664281","DOIUrl":"https://doi.org/10.1145/2664243.2664281","url":null,"abstract":"We present the first defence against DNS-amplification DoS attacks, which is compatible with the common DNS servers configurations and with the (important standard) DNSSEC. We show that the proposed DNS-authentication system is efficient, and effectively prevents DNS-based amplification DoS attacks abusing DNS name servers. We present a game-theoretic model and analysis, predicting a wide-spread adoption of our design, sufficient to reduce the threat of DNS amplification DoS attacks. To further reduce costs and provide additional defences for DNS servers, we show how to deploy our design as a cloud based service.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Network dialog minimization and network dialog diffing: two novel primitives for network security applications 网络对话框最小化和网络对话框区分:网络安全应用程序的两个新基本要素
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664261
M. Zubair Rafique, Juan Caballero, Christophe Huygens, W. Joosen
In this work, we present two fundamental primitives for network security: network dialog minimization and network dialog diffing. Network dialog minimization (NDM) simplifies an original dialog with respect to a goal, so that the minimized dialog when replayed still achieves the goal, but requires minimal network communication, achieving significant time and bandwidth savings. We present network delta debugging, the first technique to solve NDM. Network dialog diffing compares two dialogs, aligns them, and identifies their common and different parts. We propose a novel dialog diffing technique that aligns two dialogs by finding a mapping that maximizes similarity. We have applied our techniques to 5 applications. We apply our dialog minimization approach for: building drive-by download milkers for 9 exploit kits, integrating them in a infrastructure that has collected over 14,000 malware samples running from a single machine; efficiently measuring the percentage of popular sites that allow cookie replay, finding that 31% do not destroy the server-side state when a user logs out and that 17% provide cookies that live over a month; simplifying a cumbersome user interface, saving our institution 3 hours of time per year and employee; and finding a new vulnerability in a SIP server. We apply our dialog diffing approach for clustering benign (F-Measure = 100%) and malicious (F-Measure = 87.6%) dialogs.
在这项工作中,我们提出了网络安全的两个基本要素:网络对话最小化和网络对话区分。网络对话框最小化(NDM)简化了原始对话框的目标,以便在重播时最小化的对话框仍然可以实现目标,但需要最少的网络通信,从而节省大量的时间和带宽。我们提出了网络增量调试,这是解决NDM的第一种技术。网络对话区分对两个对话进行比较,对它们进行对齐,并识别它们的共同部分和不同部分。我们提出了一种新的对话区分技术,该技术通过寻找最大相似性的映射来对齐两个对话。我们已经将我们的技术应用到5个应用中。我们将对话框最小化方法应用于:为9个漏洞利用工具包构建驱动下载挤奶器,将它们集成在一个基础设施中,该基础设施收集了超过14,000个恶意软件样本,从一台机器上运行;有效地测量了允许cookie重播的流行网站的百分比,发现31%的网站在用户退出时不会破坏服务器端状态,17%的网站提供一个多月的cookie;简化繁琐的用户界面,为单位每年节省3小时的时间和员工;以及在SIP服务器上发现新的漏洞。我们将对话区分方法应用于良性(F-Measure = 100%)和恶意(F-Measure = 87.6%)对话的聚类。
{"title":"Network dialog minimization and network dialog diffing: two novel primitives for network security applications","authors":"M. Zubair Rafique, Juan Caballero, Christophe Huygens, W. Joosen","doi":"10.1145/2664243.2664261","DOIUrl":"https://doi.org/10.1145/2664243.2664261","url":null,"abstract":"In this work, we present two fundamental primitives for network security: network dialog minimization and network dialog diffing. Network dialog minimization (NDM) simplifies an original dialog with respect to a goal, so that the minimized dialog when replayed still achieves the goal, but requires minimal network communication, achieving significant time and bandwidth savings. We present network delta debugging, the first technique to solve NDM. Network dialog diffing compares two dialogs, aligns them, and identifies their common and different parts. We propose a novel dialog diffing technique that aligns two dialogs by finding a mapping that maximizes similarity. We have applied our techniques to 5 applications. We apply our dialog minimization approach for: building drive-by download milkers for 9 exploit kits, integrating them in a infrastructure that has collected over 14,000 malware samples running from a single machine; efficiently measuring the percentage of popular sites that allow cookie replay, finding that 31% do not destroy the server-side state when a user logs out and that 17% provide cookies that live over a month; simplifying a cumbersome user interface, saving our institution 3 hours of time per year and employee; and finding a new vulnerability in a SIP server. We apply our dialog diffing approach for clustering benign (F-Measure = 100%) and malicious (F-Measure = 87.6%) dialogs.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Android security framework: extensible multi-layered access control on Android Android安全框架:Android上可扩展的多层访问控制
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664265
M. Backes, Sven Bugiel, S. Gerling, Philipp von Styp-Rekowsky
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines them with the particular requirements and challenges from the design of Android's software stack. ASF provides a novel security API that supports authors of Android security extensions in developing their modules. This overcomes the current unsatisfactory situation to provide security solutions as separate patches to the Android software stack or to embed them into Android's mainline codebase. This system security extensibility is of particular benefit for enterprise or government solutions that require deployment of advanced security models, not supported by vanilla Android. We present a prototypical implementation of ASF and demonstrate its effectiveness and efficiency by modularizing different security models from related work, such as dynamic permissions, inlined reference monitoring, and type enforcement.
我们介绍了Android安全框架(ASF),这是一个通用的、可扩展的Android安全框架,能够以基于代码的安全模块的形式开发和集成广泛的安全模型。ASF的设计反映了从已建立的安全框架(如Linux安全模块或BSD MAC框架)的文献中吸取的经验教训,并将它们与Android软件堆栈设计的特定需求和挑战交织在一起。ASF提供了一种新颖的安全API,支持Android安全扩展的作者开发他们的模块。这克服了目前不令人满意的情况,即将安全解决方案作为单独的补丁提供给Android软件堆栈或将其嵌入Android的主线代码库。这种系统安全可扩展性对于需要部署高级安全模型的企业或政府解决方案特别有利,而普通Android不支持这些解决方案。我们提出了一个ASF的原型实现,并通过模块化来自相关工作的不同安全模型(如动态权限、内联引用监控和类型强制)来展示其有效性和效率。
{"title":"Android security framework: extensible multi-layered access control on Android","authors":"M. Backes, Sven Bugiel, S. Gerling, Philipp von Styp-Rekowsky","doi":"10.1145/2664243.2664265","DOIUrl":"https://doi.org/10.1145/2664243.2664265","url":null,"abstract":"We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines them with the particular requirements and challenges from the design of Android's software stack. ASF provides a novel security API that supports authors of Android security extensions in developing their modules. This overcomes the current unsatisfactory situation to provide security solutions as separate patches to the Android software stack or to embed them into Android's mainline codebase. This system security extensibility is of particular benefit for enterprise or government solutions that require deployment of advanced security models, not supported by vanilla Android. We present a prototypical implementation of ASF and demonstrate its effectiveness and efficiency by modularizing different security models from related work, such as dynamic permissions, inlined reference monitoring, and type enforcement.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath 垃圾邮件并不像看起来那么多样化:在下面用模板限制OSN垃圾邮件
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664251
Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, A. Choudhary
In online social networks (OSNs), spam originating from friends and acquaintances not only reduces the joy of Internet surfing but also causes damage to less security-savvy users. Prior countermeasures combat OSN spam from different angles. Due to the diversity of spam, there is hardly any existing method that can independently detect the majority or most of OSN spam. In this paper, we empirically analyze the textual pattern of a large collection of OSN spam. An inspiring finding is that the majority (63.0%) of the collected spam is generated with underlying templates. We therefore propose extracting templates of spam detected by existing methods and then matching messages against the templates toward accurate and fast spam detection. We implement this insight through Tangram, an OSN spam filtering system that performs online inspection on the stream of user-generated messages. Tangram automatically divides OSN spam into segments and uses the segments to construct templates to filter future spam. Experimental results show that Tangram is highly accurate and can rapidly generate templates to throttle newly emerged campaigns. Specifically, Tangram detects the most prevalent template-based spam with 95.7% true positive rate, whereas the existing template generation approach detects only 32.3%. The integration of Tangram and its auxiliary spam filter achieves an overall accuracy of 85.4% true positive rate and 0.33% false positive rate.
在在线社交网络(osn)中,来自朋友和熟人的垃圾邮件不仅会降低上网的乐趣,还会对不太安全的用户造成损害。前期对策从不同角度打击OSN垃圾邮件。由于垃圾邮件的多样性,几乎没有任何现有的方法可以独立检测大部分或大部分的OSN垃圾邮件。本文对大量OSN垃圾邮件的文本模式进行了实证分析。一个令人鼓舞的发现是,大多数(63.0%)收集到的垃圾邮件是使用底层模板生成的。因此,我们提出提取现有方法检测到的垃圾邮件模板,然后将邮件与模板进行匹配,以实现准确、快速的垃圾邮件检测。我们通过Tangram实现这种洞察力,这是一个OSN垃圾邮件过滤系统,对用户生成的消息流执行在线检查。Tangram自动将OSN垃圾邮件划分为多个段,并根据这些段构建模板,过滤以后的垃圾邮件。实验结果表明,该算法具有较高的准确率,能够快速生成模板来抑制新出现的活动。具体来说,Tangram检测到最普遍的基于模板的垃圾邮件的真阳性率为95.7%,而现有的模板生成方法仅检测到32.3%。Tangram及其辅助垃圾邮件过滤器的集成实现了85.4%的真阳性率和0.33%的假阳性率的总体准确率。
{"title":"Spam ain't as diverse as it seems: throttling OSN spam with templates underneath","authors":"Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, A. Choudhary","doi":"10.1145/2664243.2664251","DOIUrl":"https://doi.org/10.1145/2664243.2664251","url":null,"abstract":"In online social networks (OSNs), spam originating from friends and acquaintances not only reduces the joy of Internet surfing but also causes damage to less security-savvy users. Prior countermeasures combat OSN spam from different angles. Due to the diversity of spam, there is hardly any existing method that can independently detect the majority or most of OSN spam. In this paper, we empirically analyze the textual pattern of a large collection of OSN spam. An inspiring finding is that the majority (63.0%) of the collected spam is generated with underlying templates. We therefore propose extracting templates of spam detected by existing methods and then matching messages against the templates toward accurate and fast spam detection. We implement this insight through Tangram, an OSN spam filtering system that performs online inspection on the stream of user-generated messages. Tangram automatically divides OSN spam into segments and uses the segments to construct templates to filter future spam. Experimental results show that Tangram is highly accurate and can rapidly generate templates to throttle newly emerged campaigns. Specifically, Tangram detects the most prevalent template-based spam with 95.7% true positive rate, whereas the existing template generation approach detects only 32.3%. The integration of Tangram and its auxiliary spam filter achieves an overall accuracy of 85.4% true positive rate and 0.33% false positive rate.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Towards automated integrity protection of C++ virtual function tables in binary programs 二进制程序中c++虚函数表的自动完整性保护
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664249
R. Gawlik, Thorsten Holz
Web browsers are one of the most used, complex, and popular software systems nowadays. They are prone to dangling pointers that result in use-after-free vulnerabilites and this is the de-facto way to exploit them. From a technical point of view, an attacker uses a technique called vtable hijacking to exploit such bugs. More specifically, she crafts bogus virtual tables and lets a freed C++ object point to it in order to gain control over the program at virtual function call sites. In this paper, we present a novel approach towards mitigating and detecting such attacks against C++ binary code. We propose a static binary analysis technique to extract virtual function call site information in an automated way. Leveraging this information, we instrument the given binary executable and add runtime policy enforcements to thwart the illegal usage of these call sites. We implemented the proposed techniques in a prototype called T-VIP and successfully hardened three versions of Microsoft's Internet Explorer and Mozilla Firefox. An evaluation with several zero-day exploits demonstrates that our method prevents all of them. Performance benchmarks both on micro and macro level indicate that the overhead is reasonable with about 2.2%, which is only slightly higher compared to recent compiler-based approaches that address this problem.
Web浏览器是当今最常用、最复杂和最流行的软件系统之一。它们很容易产生悬空指针,从而导致“自由后使用”漏洞,这是利用它们的实际方法。从技术角度来看,攻击者使用称为虚表劫持的技术来利用此类漏洞。更具体地说,她制作了虚假的虚拟表,并让一个释放的c++对象指向它,以便在虚拟函数调用位置获得对程序的控制。在本文中,我们提出了一种新的方法来减轻和检测针对c++二进制代码的这种攻击。提出了一种静态二进制分析技术,以自动提取虚拟函数调用站点信息。利用这些信息,我们检测给定的二进制可执行文件,并添加运行时策略来阻止非法使用这些调用站点。我们在一个名为T-VIP的原型中实现了所提出的技术,并成功地加固了三个版本的微软Internet Explorer和Mozilla Firefox。对几个零日漏洞的评估表明,我们的方法可以防止所有这些漏洞。微观和宏观层面的性能基准测试表明,大约2.2%的开销是合理的,与最近解决这个问题的基于编译器的方法相比,这个开销只稍微高一些。
{"title":"Towards automated integrity protection of C++ virtual function tables in binary programs","authors":"R. Gawlik, Thorsten Holz","doi":"10.1145/2664243.2664249","DOIUrl":"https://doi.org/10.1145/2664243.2664249","url":null,"abstract":"Web browsers are one of the most used, complex, and popular software systems nowadays. They are prone to dangling pointers that result in use-after-free vulnerabilites and this is the de-facto way to exploit them. From a technical point of view, an attacker uses a technique called vtable hijacking to exploit such bugs. More specifically, she crafts bogus virtual tables and lets a freed C++ object point to it in order to gain control over the program at virtual function call sites. In this paper, we present a novel approach towards mitigating and detecting such attacks against C++ binary code. We propose a static binary analysis technique to extract virtual function call site information in an automated way. Leveraging this information, we instrument the given binary executable and add runtime policy enforcements to thwart the illegal usage of these call sites. We implemented the proposed techniques in a prototype called T-VIP and successfully hardened three versions of Microsoft's Internet Explorer and Mozilla Firefox. An evaluation with several zero-day exploits demonstrates that our method prevents all of them. Performance benchmarks both on micro and macro level indicate that the overhead is reasonable with about 2.2%, which is only slightly higher compared to recent compiler-based approaches that address this problem.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"205 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
MACE: high-coverage and robust memory analysis for commodity operating systems MACE:用于商用操作系统的高覆盖率和健壮的内存分析
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664248
Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin
Memory forensic analysis collects evidence for digital crimes and malware attacks from the memory of a live system. It is increasingly valuable, especially in cloud computing. However, memory analysis on on commodity operating systems (such as Microsoft Windows) faces the following key challenges: (1) a partial knowledge of kernel data structures; (2) difficulty in handling ambiguous pointers; and (3) lack of robustness by relying on soft constraints that can be easily violated by kernel attacks. To address these challenges, we present MACE, a memory analysis system that can extract a more complete view of the kernel data structures for closed-source operating systems and significantly improve the robustness by only leveraging pointer constraints (which are hard to manipulate) and evaluating these constraint globally (to even tolerate certain amount of pointer attacks). We have evaluated MACE on 100 memory images for Windows XP SP3 and Windows 7 SP0. Overall, MACE can construct a kernel object graph from a memory image in just a few minutes, and achieves over 95% recall and over 96% precision. Our experiments on real-world rootkit samples and synthetic attacks further demonstrate that MACE outperforms other external memory analysis tools with respect to wider coverage and better robustness.
内存取证分析从实时系统的内存中收集数字犯罪和恶意软件攻击的证据。它越来越有价值,尤其是在云计算领域。然而,对商品操作系统(如Microsoft Windows)的内存分析面临以下主要挑战:(1)内核数据结构的部分知识;(2)歧义指针处理困难;(3)依赖于容易被内核攻击破坏的软约束,缺乏鲁棒性。为了应对这些挑战,我们提出了MACE,这是一个内存分析系统,它可以为闭源操作系统提取更完整的内核数据结构视图,并通过仅利用指针约束(难以操作)和全局评估这些约束(甚至容忍一定数量的指针攻击)来显着提高鲁棒性。我们在Windows XP SP3和Windows 7 SP0的100个内存映像上评估了MACE。总的来说,MACE可以在几分钟内从内存图像构建内核对象图,并且达到95%以上的召回率和96%以上的精度。我们对真实世界的rootkit样本和合成攻击的实验进一步证明,MACE在更广泛的覆盖范围和更好的鲁棒性方面优于其他外部内存分析工具。
{"title":"MACE: high-coverage and robust memory analysis for commodity operating systems","authors":"Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin","doi":"10.1145/2664243.2664248","DOIUrl":"https://doi.org/10.1145/2664243.2664248","url":null,"abstract":"Memory forensic analysis collects evidence for digital crimes and malware attacks from the memory of a live system. It is increasingly valuable, especially in cloud computing. However, memory analysis on on commodity operating systems (such as Microsoft Windows) faces the following key challenges: (1) a partial knowledge of kernel data structures; (2) difficulty in handling ambiguous pointers; and (3) lack of robustness by relying on soft constraints that can be easily violated by kernel attacks. To address these challenges, we present MACE, a memory analysis system that can extract a more complete view of the kernel data structures for closed-source operating systems and significantly improve the robustness by only leveraging pointer constraints (which are hard to manipulate) and evaluating these constraint globally (to even tolerate certain amount of pointer attacks). We have evaluated MACE on 100 memory images for Windows XP SP3 and Windows 7 SP0. Overall, MACE can construct a kernel object graph from a memory image in just a few minutes, and achieves over 95% recall and over 96% precision. Our experiments on real-world rootkit samples and synthetic attacks further demonstrate that MACE outperforms other external memory analysis tools with respect to wider coverage and better robustness.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123983810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
NodeSentry: least-privilege library integration for server-side JavaScript NodeSentry:服务器端JavaScript的最低权限库集成
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664276
Willem De Groef, F. Massacci, F. Piessens
Node.js is a popular JavaScript server-side framework with an efficient runtime for cloud-based event-driven architectures. Its strength is the presence of thousands of third-party libraries which allow developers to quickly build and deploy applications. These very libraries are a source of security threats as a vulnerability in one library can (and in some cases did) compromise one's entire server. In order to support the least-privilege integration of libraries, we developed NodeSentry, the first security architecture for server-side JavaScript. Our policy enforcement infrastructure supports an easy deployment of web-hardening techniques and access control policies on interactions between libraries and their environment, including any dependent library. We discuss the implementation of NodeSentry, and present its practical evaluation. For hundreds of concurrent clients, NodeSentry has the same capacity and throughput as plain Node.js. Only on a large scale, when Node.js itself yields to a heavy load, NodeSentry shows a limited overhead.
Node.js是一个流行的JavaScript服务器端框架,为基于云的事件驱动架构提供了高效的运行时。它的优势在于提供了数千个第三方库,允许开发人员快速构建和部署应用程序。这些库是安全威胁的来源,因为一个库中的漏洞可能(在某些情况下确实)危及整个服务器。为了支持库的最低权限集成,我们开发了NodeSentry,这是第一个用于服务器端JavaScript的安全架构。我们的策略实施基础设施支持在库及其环境(包括任何依赖库)之间的交互上轻松部署web加固技术和访问控制策略。我们讨论了节点入口的实现,并给出了它的实际评价。对于数百个并发客户端,NodeSentry具有与普通Node.js相同的容量和吞吐量。只有在大规模的情况下,当Node.js本身屈服于沉重的负载时,NodeSentry才会显示出有限的开销。
{"title":"NodeSentry: least-privilege library integration for server-side JavaScript","authors":"Willem De Groef, F. Massacci, F. Piessens","doi":"10.1145/2664243.2664276","DOIUrl":"https://doi.org/10.1145/2664243.2664276","url":null,"abstract":"Node.js is a popular JavaScript server-side framework with an efficient runtime for cloud-based event-driven architectures. Its strength is the presence of thousands of third-party libraries which allow developers to quickly build and deploy applications. These very libraries are a source of security threats as a vulnerability in one library can (and in some cases did) compromise one's entire server. In order to support the least-privilege integration of libraries, we developed NodeSentry, the first security architecture for server-side JavaScript. Our policy enforcement infrastructure supports an easy deployment of web-hardening techniques and access control policies on interactions between libraries and their environment, including any dependent library. We discuss the implementation of NodeSentry, and present its practical evaluation. For hundreds of concurrent clients, NodeSentry has the same capacity and throughput as plain Node.js. Only on a large scale, when Node.js itself yields to a heavy load, NodeSentry shows a limited overhead.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125449991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the privacy provisions of Bloom filters in lightweight bitcoin clients 轻量级比特币客户端中Bloom过滤器的隐私规定
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664267
Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth consumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain---thus supporting the usage of Bitcoin on constrained devices, such as smartphones. SPV clients rely on Bloom filters to receive transactions that are relevant to their local wallet. These filters embed all the Bitcoin addresses used by the SPV clients, and are outsourced to more powerful Bitcoin nodes which then only forward to those clients transactions relevant to their outsourced Bloom filters. In this paper, we explore the privacy of existing SPV clients. We show analytically and empirically that the reliance on Bloom filters within existing SPV clients leaks considerable information about the addresses of Bitcoin users. Our results show that an SPV client who uses a modest number of Bitcoin addresses (e.g., < 20) risks revealing almost all of his addresses. We also show that this information leakage is further exacerbated when users restart their SPV clients and/or when the adversary has access to more than one Bloom filter pertaining to the same SPV client. Motivated by these findings, we propose an efficient countermeasure to enhance the privacy of users which rely on SPV clients; our proposal can be directly integrated within existing SPV client implementations.
由于减少了资源和带宽消耗,轻量级比特币客户端在比特币用户中得到越来越多的采用。这些客户端支持简化的支付验证(SPV)模式,因为它们只需要下载和验证区块链的一部分,从而支持在智能手机等受限设备上使用比特币。SPV客户端依赖Bloom过滤器来接收与其本地钱包相关的交易。这些过滤器嵌入了SPV客户端使用的所有比特币地址,并外包给更强大的比特币节点,然后只将与外包Bloom过滤器相关的交易转发给那些客户端。本文探讨了现有SPV客户端的隐私问题。我们通过分析和经验表明,对现有SPV客户端中Bloom过滤器的依赖泄露了有关比特币用户地址的大量信息。我们的研究结果表明,使用少量比特币地址(例如,< 20)的SPV客户端可能会暴露几乎所有地址。我们还表明,当用户重新启动其SPV客户端和/或攻击者访问属于同一SPV客户端的多个Bloom过滤器时,这种信息泄漏会进一步加剧。基于这些发现,我们提出了一种有效的策略来增强依赖SPV客户端的用户的隐私保护;我们的建议可以直接集成到现有的SPV客户端实现中。
{"title":"On the privacy provisions of Bloom filters in lightweight bitcoin clients","authors":"Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun","doi":"10.1145/2664243.2664267","DOIUrl":"https://doi.org/10.1145/2664243.2664267","url":null,"abstract":"Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth consumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain---thus supporting the usage of Bitcoin on constrained devices, such as smartphones. SPV clients rely on Bloom filters to receive transactions that are relevant to their local wallet. These filters embed all the Bitcoin addresses used by the SPV clients, and are outsourced to more powerful Bitcoin nodes which then only forward to those clients transactions relevant to their outsourced Bloom filters. In this paper, we explore the privacy of existing SPV clients. We show analytically and empirically that the reliance on Bloom filters within existing SPV clients leaks considerable information about the addresses of Bitcoin users. Our results show that an SPV client who uses a modest number of Bitcoin addresses (e.g., < 20) risks revealing almost all of his addresses. We also show that this information leakage is further exacerbated when users restart their SPV clients and/or when the adversary has access to more than one Bloom filter pertaining to the same SPV client. Motivated by these findings, we propose an efficient countermeasure to enhance the privacy of users which rely on SPV clients; our proposal can be directly integrated within existing SPV client implementations.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks JShield:面向实时、基于漏洞的污染驱动下载攻击检测
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664256
Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge
Drive-by download attacks, which exploit vulnerabilities of web browsers to control client computers, have become a major venue for attackers. To detect such attacks, researchers have proposed many approaches such as anomaly-based [22, 23] and vulnerability-based [44, 50] detections. However, anomaly-based approaches are vulnerable to data pollution, and existing vulnerability-based approaches cannot accurately describe the vulnerability condition of all the drive-by download attacks. In this paper, we propose a vulnerability-based approach, namely JShield, which uses novel opcode vulnerability signature, a deterministic finite automaton (DFA) with a variable pool at opcode level, to match drive-by download vulnerabilities. We investigate all the JavaScript engine vulnerabilities of web browsers from 2009 to 2014, as well as those of portable document files (PDF) readers from 2007 to 2014. JShield is able to match all of those vulnerabilities; furthermore, the overall evaluation shows that JShield is so lightweight that it only adds 2.39 percent of overhead to original execution as the median among top 500 Alexa web sites.
利用网络浏览器的漏洞来控制客户端计算机的下载攻击已经成为攻击者的主要手段。为了检测此类攻击,研究人员提出了许多方法,如基于异常的[22,23]和基于漏洞的[44,50]检测。然而,基于异常的方法容易受到数据污染的影响,现有的基于漏洞的方法无法准确描述所有驱动下载攻击的漏洞状况。在本文中,我们提出了一种基于漏洞的方法,即JShield,它使用新颖的操作码漏洞签名,一种在操作码级别具有变量池的确定性有限自动机(DFA)来匹配驱动下载漏洞。我们研究了2009年至2014年web浏览器的所有JavaScript引擎漏洞,以及2007年至2014年便携式文档文件(PDF)阅读器的漏洞。JShield能够匹配所有这些漏洞;此外,总体评估表明,JShield是如此轻量级,它只增加了2.39%的开销,作为前500名Alexa网站的中位数。
{"title":"JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks","authors":"Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge","doi":"10.1145/2664243.2664256","DOIUrl":"https://doi.org/10.1145/2664243.2664256","url":null,"abstract":"Drive-by download attacks, which exploit vulnerabilities of web browsers to control client computers, have become a major venue for attackers. To detect such attacks, researchers have proposed many approaches such as anomaly-based [22, 23] and vulnerability-based [44, 50] detections. However, anomaly-based approaches are vulnerable to data pollution, and existing vulnerability-based approaches cannot accurately describe the vulnerability condition of all the drive-by download attacks. In this paper, we propose a vulnerability-based approach, namely JShield, which uses novel opcode vulnerability signature, a deterministic finite automaton (DFA) with a variable pool at opcode level, to match drive-by download vulnerabilities. We investigate all the JavaScript engine vulnerabilities of web browsers from 2009 to 2014, as well as those of portable document files (PDF) readers from 2007 to 2014. JShield is able to match all of those vulnerabilities; furthermore, the overall evaluation shows that JShield is so lightweight that it only adds 2.39 percent of overhead to original execution as the median among top 500 Alexa web sites.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117265317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system DRAKVUF动态恶意软件分析系统的可扩展性、保真性和隐蔽性
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664252
Tamas K. Lengyel, S. Maresca, B. Payne, George D. Webster, S. Vogl, A. Kiayias
Malware is one of the biggest security threats on the Internet today and deploying effective defensive solutions requires the rapid analysis of a continuously increasing number of malware samples. With the proliferation of metamorphic malware the analysis is further complicated as the efficacy of signature-based static analysis systems is greatly reduced. While dynamic malware analysis is an effective alternative, the approach faces significant challenges as the ever increasing number of samples requiring analysis places a burden on hardware resources. At the same time modern malware can both detect the monitoring environment and hide in unmonitored corners of the system. In this paper we present DRAKVUF, a novel dynamic malware analysis system designed to address these challenges by building on the latest hardware virtualization extensions and the Xen hypervisor. We present a technique for improving stealth by initiating the execution of malware samples without leaving any trace in the analysis machine. We also present novel techniques to eliminate blind-spots created by kernel-mode rootkits by extending the scope of monitoring to include kernel internal functions, and to monitor file-system accesses through the kernel's heap allocations. With extensive tests performed on recent malware samples we show that DRAKVUF achieves significant improvements in conserving hardware resources while providing a stealthy, in-depth view into the behavior of modern malware.
恶意软件是当今互联网上最大的安全威胁之一,部署有效的防御解决方案需要对不断增加的恶意软件样本进行快速分析。随着变形恶意软件的泛滥,基于签名的静态分析系统的有效性大大降低,使分析变得更加复杂。虽然动态恶意软件分析是一种有效的替代方法,但由于需要分析的样本数量不断增加,给硬件资源带来了负担,因此该方法面临着重大挑战。同时,现代恶意软件既可以检测到监控环境,也可以隐藏在系统中不受监控的角落。在本文中,我们提出了DRAKVUF,一种新的动态恶意软件分析系统,旨在通过构建最新的硬件虚拟化扩展和Xen管理程序来解决这些挑战。我们提出了一种通过启动恶意软件样本的执行而不在分析机中留下任何痕迹来提高隐身性的技术。我们还提出了一些新技术,通过扩展监视范围以包括内核内部函数,并通过内核的堆分配监视文件系统访问,从而消除内核模式rootkit造成的盲点。通过对最近的恶意软件样本进行广泛的测试,我们表明DRAKVUF在节省硬件资源方面取得了显着改进,同时提供了对现代恶意软件行为的隐形,深入的看法。
{"title":"Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system","authors":"Tamas K. Lengyel, S. Maresca, B. Payne, George D. Webster, S. Vogl, A. Kiayias","doi":"10.1145/2664243.2664252","DOIUrl":"https://doi.org/10.1145/2664243.2664252","url":null,"abstract":"Malware is one of the biggest security threats on the Internet today and deploying effective defensive solutions requires the rapid analysis of a continuously increasing number of malware samples. With the proliferation of metamorphic malware the analysis is further complicated as the efficacy of signature-based static analysis systems is greatly reduced. While dynamic malware analysis is an effective alternative, the approach faces significant challenges as the ever increasing number of samples requiring analysis places a burden on hardware resources. At the same time modern malware can both detect the monitoring environment and hide in unmonitored corners of the system. In this paper we present DRAKVUF, a novel dynamic malware analysis system designed to address these challenges by building on the latest hardware virtualization extensions and the Xen hypervisor. We present a technique for improving stealth by initiating the execution of malware samples without leaving any trace in the analysis machine. We also present novel techniques to eliminate blind-spots created by kernel-mode rootkits by extending the scope of monitoring to include kernel internal functions, and to monitor file-system accesses through the kernel's heap allocations. With extensive tests performed on recent malware samples we show that DRAKVUF achieves significant improvements in conserving hardware resources while providing a stealthy, in-depth view into the behavior of modern malware.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 172
期刊
Proceedings of the 30th Annual Computer Security Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1