首页 > 最新文献

Proceedings of the 30th Annual Computer Security Applications Conference最新文献

英文 中文
Advanced Wi-Fi attacks using commodity hardware 使用普通硬件的高级Wi-Fi攻击
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664260
M. Vanhoef, F. Piessens
We show that low-layer attacks against Wi-Fi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs continuous jamming, making the channel unusable for other devices. For the fourth attack we implemented a selective jammer, allowing one to jam specific frames already in the air. The fifth is a novel channel-based Man-in-the-Middle (MitM) attack, enabling reliable manipulation of encrypted traffic. These low-layer attacks facilitate novel attacks against higher-layer protocols. To demonstrate this we show how our MitM attack facilitates attacks against the Temporal Key Integrity Protocol (TKIP) when used as a group cipher. Since a substantial number of networks still use TKIP as their group cipher, this shows that weaknesses in TKIP have a higher impact than previously thought.
我们展示了针对Wi-Fi的底层攻击可以使用用户可修改的固件来实现。因此,廉价的现成Wi-Fi加密狗可以用来进行高级攻击。我们通过使用开源Atheros固件实现五种底层攻击来演示这一点。第一种攻击包括不公平的信道使用,为用户提供更高的吞吐量,同时减少其他人的吞吐量。第二次攻击破坏了旨在防止不公平信道使用的对策。第三种攻击执行连续干扰,使信道无法用于其他设备。对于第四次攻击,我们实施了一个选择性干扰器,允许干扰已经在空中的特定帧。第五种是一种新颖的基于通道的中间人(MitM)攻击,可以对加密流量进行可靠的操作。这些低层攻击为针对高层协议的新攻击提供了便利。为了证明这一点,我们将展示MitM攻击如何在将临时密钥完整性协议(TKIP)用作组密码时促进对其的攻击。由于大量的网络仍然使用TKIP作为他们的组密码,这表明TKIP的弱点比以前想象的有更大的影响。
{"title":"Advanced Wi-Fi attacks using commodity hardware","authors":"M. Vanhoef, F. Piessens","doi":"10.1145/2664243.2664260","DOIUrl":"https://doi.org/10.1145/2664243.2664260","url":null,"abstract":"We show that low-layer attacks against Wi-Fi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs continuous jamming, making the channel unusable for other devices. For the fourth attack we implemented a selective jammer, allowing one to jam specific frames already in the air. The fifth is a novel channel-based Man-in-the-Middle (MitM) attack, enabling reliable manipulation of encrypted traffic. These low-layer attacks facilitate novel attacks against higher-layer protocols. To demonstrate this we show how our MitM attack facilitates attacks against the Temporal Key Integrity Protocol (TKIP) when used as a group cipher. Since a substantial number of networks still use TKIP as their group cipher, this shows that weaknesses in TKIP have a higher impact than previously thought.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware 面向中断的bug门编程:对嵌入式系统固件进行bug门检查的一种极简方法
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664268
Samuel Junjie Tan, S. Bratus, T. Goodspeed
We demonstrate a simple set of interrupt-related vulnerability primitives that, despite being apparently innocuous, give attackers full control of a microcontroller platform. We then present a novel, minimalist approach to constructing deniable bugdoors for microcontroller firmware, and contrast this approach with the current focus of exploitation research on demonstrations of maximum computational power that malicious computation can achieve. Since the introduction of Return-oriented programming, an ever-increasing number of targets have been demonstrated to unintentionally yield Turing-complete computation environments to attackers controlling the target's various input channels, under ever more restrictive sets of limitations. Yet although modern OS defensive measures indeed require complex computations to bypass, this focus on maximum expressiveness of exploit programming models leads researchers to overlook other research directions for platforms that lack strong defensive measure but occur in mission-critical systems, namely, microcontrollers. In these systems, common exploiter goals such as sensitive code and data exfiltration or arbitrary code execution do not typically require complex computation; instead, a minimal computation is preferred and a simple set of vulnerability primitives typically suffices. We discuss examples of vulnerabilities and the new kinds of tools needed to avoid them in future firmware.
我们演示了一组简单的中断相关漏洞原语,尽管看起来无害,但攻击者可以完全控制微控制器平台。然后,我们提出了一种新颖的、极简的方法来为微控制器固件构建可否认的漏洞门,并将这种方法与当前针对恶意计算可以实现的最大计算能力演示的利用研究重点进行了对比。自从引入面向返回的编程以来,越来越多的目标被证明在越来越严格的限制下无意中向控制目标各种输入通道的攻击者提供图灵完全计算环境。然而,尽管现代操作系统防御措施确实需要复杂的计算来绕过,但这种对利用编程模型的最大表达性的关注导致研究人员忽视了其他研究方向,这些方向缺乏强大的防御措施,但发生在关键任务系统中,即微控制器。在这些系统中,常见的漏洞利用者目标(如敏感代码和数据泄露或任意代码执行)通常不需要复杂的计算;相反,最小的计算是最好的,一组简单的漏洞原语通常就足够了。我们讨论了漏洞的例子和在未来固件中避免它们所需的新工具。
{"title":"Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware","authors":"Samuel Junjie Tan, S. Bratus, T. Goodspeed","doi":"10.1145/2664243.2664268","DOIUrl":"https://doi.org/10.1145/2664243.2664268","url":null,"abstract":"We demonstrate a simple set of interrupt-related vulnerability primitives that, despite being apparently innocuous, give attackers full control of a microcontroller platform. We then present a novel, minimalist approach to constructing deniable bugdoors for microcontroller firmware, and contrast this approach with the current focus of exploitation research on demonstrations of maximum computational power that malicious computation can achieve. Since the introduction of Return-oriented programming, an ever-increasing number of targets have been demonstrated to unintentionally yield Turing-complete computation environments to attackers controlling the target's various input channels, under ever more restrictive sets of limitations. Yet although modern OS defensive measures indeed require complex computations to bypass, this focus on maximum expressiveness of exploit programming models leads researchers to overlook other research directions for platforms that lack strong defensive measure but occur in mission-critical systems, namely, microcontrollers. In these systems, common exploiter goals such as sensitive code and data exfiltration or arbitrary code execution do not typically require complex computation; instead, a minimal computation is preferred and a simple set of vulnerability primitives typically suffices. We discuss examples of vulnerabilities and the new kinds of tools needed to avoid them in future firmware.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120847563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals CPS:通过定时对传感器信号进行DoS攻击,将网络物理系统驱动到不安全的操作条件
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664290
M. Krotofil, A. Cárdenas, Bradley Manning, Jason W. Larsen
DoS attacks on sensor measurements used for industrial control can cause the controller of the process to use stale data. If the DoS attack is not timed properly, the use of stale data by the controller will have limited impact on the process; however, if the attacker is able to launch the DoS attack at the correct time, the use of stale data can cause the controller to drive the system to an unsafe state. Understanding the timing parameters of the physical processes does not only allow an attacker to construct a successful attack but also to maximize its impact (damage to the system). In this paper we use Tennessee Eastman challenge process to study an attacker that has to identify (in realtime) the optimal timing to launch a DoS attack. The choice of time to begin an attack is forward-looking, requiring the attacker to consider each opportunity against the possibility of a better opportunity in the future, and this lends itself to the theory of optimal stopping problems. In particular we study the applicability of the Best Choice Problem (also known as the Secretary Problem), quickest change detection, and statistical process outliers. Our analysis can be used to identify specific sensor measurements that need to be protected, and the time that security or safety teams required to respond to attacks, before they cause major damage.
对用于工业控制的传感器测量的DoS攻击可能导致过程控制器使用过时的数据。如果DoS攻击的时间不合适,控制器使用陈旧数据对进程的影响有限;但是,如果攻击者能够在正确的时间发起DoS攻击,那么使用陈旧的数据可能会导致控制器将系统驱动到不安全状态。了解物理过程的定时参数不仅可以让攻击者构建成功的攻击,还可以使其影响(对系统的损害)最大化。在本文中,我们使用田纳西伊士曼挑战过程来研究攻击者必须(实时)识别发起DoS攻击的最佳时机。开始攻击的时间选择是前瞻性的,要求攻击者考虑每一个机会与未来更好机会的可能性,这使其成为最优停止问题的理论。我们特别研究了最佳选择问题(也称为秘书问题)、最快变化检测和统计过程异常值的适用性。我们的分析可用于识别需要保护的特定传感器测量,以及安全或安全团队在攻击造成重大损害之前响应攻击所需的时间。
{"title":"CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals","authors":"M. Krotofil, A. Cárdenas, Bradley Manning, Jason W. Larsen","doi":"10.1145/2664243.2664290","DOIUrl":"https://doi.org/10.1145/2664243.2664290","url":null,"abstract":"DoS attacks on sensor measurements used for industrial control can cause the controller of the process to use stale data. If the DoS attack is not timed properly, the use of stale data by the controller will have limited impact on the process; however, if the attacker is able to launch the DoS attack at the correct time, the use of stale data can cause the controller to drive the system to an unsafe state. Understanding the timing parameters of the physical processes does not only allow an attacker to construct a successful attack but also to maximize its impact (damage to the system). In this paper we use Tennessee Eastman challenge process to study an attacker that has to identify (in realtime) the optimal timing to launch a DoS attack. The choice of time to begin an attack is forward-looking, requiring the attacker to consider each opportunity against the possibility of a better opportunity in the future, and this lends itself to the theory of optimal stopping problems. In particular we study the applicability of the Best Choice Problem (also known as the Secretary Problem), quickest change detection, and statistical process outliers. Our analysis can be used to identify specific sensor measurements that need to be protected, and the time that security or safety teams required to respond to attacks, before they cause major damage.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security 使用自动语音识别攻击声学验证码:可用性和安全性之间的权衡
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664262
H. Meutzner, Viet-Hung Nguyen, Thorsten Holz, D. Kolossa
A common method to prevent automated abuses of Internet services is utilizing challenge-response tests that distinguish human users from machines. These tests are known as CAPTCHAs (Completely Automated Public Turing Tests to Tell Computers and Humans Apart) and should represent a task that is easy to solve for humans, but difficult for fraudulent programs. To enable access for visually impaired people, an acoustic CAPTCHA is typically provided in addition to the better-known visual CAPTCHAs. Recent security studies show that most acoustic CAPTCHAs, albeit difficult to solve for humans, can be broken via machine learning. In this work, we suggest using speech recognition rather than generic classification methods for better analyzing the security of acoustic CAPTCHAs. We show that our attack based on an automatic speech recognition system can successfully defeat reCAPTCHA with a significantly higher success rate than reported in previous studies. A major difficulty in designing CAPTCHAs arises from the trade-off between human usability and robustness against automated attacks. We present and analyze an alternative CAPTCHA design that exploits specific capabilities of the human auditory system, i.e., auditory streaming and tolerance to reverberation. Since state-of-the-art speech recognition technology still does not provide these capabilities, the resulting CAPTCHA is hard to solve automatically. A detailed analysis of the proposed CAPTCHA shows a far better trade-off between usability and security than the current quasi-standard approach of reCAPTCHA.
防止自动滥用互联网服务的一种常用方法是利用挑战-响应测试来区分人类用户和机器。这些测试被称为captcha(完全自动化的公共图灵测试来区分计算机和人类),应该代表一个对人类来说很容易解决,但对欺诈程序来说很难解决的任务。为了使视障人士能够访问,除了众所周知的视觉验证码之外,通常还提供声音验证码。最近的安全研究表明,尽管人类很难破解大多数声音验证码,但可以通过机器学习破解。在这项工作中,我们建议使用语音识别而不是通用分类方法来更好地分析声学验证码的安全性。我们表明,基于自动语音识别系统的攻击可以成功击败reCAPTCHA,成功率明显高于之前的研究报告。设计captcha的一个主要困难来自于人的可用性和对自动攻击的健壮性之间的权衡。我们提出并分析了一种替代的CAPTCHA设计,该设计利用了人类听觉系统的特定能力,即听觉流和对混响的容忍度。由于最先进的语音识别技术仍然不提供这些功能,因此产生的CAPTCHA很难自动解决。对提议的CAPTCHA的详细分析表明,在可用性和安全性之间的权衡比当前的准标准的reCAPTCHA方法要好得多。
{"title":"Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security","authors":"H. Meutzner, Viet-Hung Nguyen, Thorsten Holz, D. Kolossa","doi":"10.1145/2664243.2664262","DOIUrl":"https://doi.org/10.1145/2664243.2664262","url":null,"abstract":"A common method to prevent automated abuses of Internet services is utilizing challenge-response tests that distinguish human users from machines. These tests are known as CAPTCHAs (Completely Automated Public Turing Tests to Tell Computers and Humans Apart) and should represent a task that is easy to solve for humans, but difficult for fraudulent programs. To enable access for visually impaired people, an acoustic CAPTCHA is typically provided in addition to the better-known visual CAPTCHAs. Recent security studies show that most acoustic CAPTCHAs, albeit difficult to solve for humans, can be broken via machine learning. In this work, we suggest using speech recognition rather than generic classification methods for better analyzing the security of acoustic CAPTCHAs. We show that our attack based on an automatic speech recognition system can successfully defeat reCAPTCHA with a significantly higher success rate than reported in previous studies. A major difficulty in designing CAPTCHAs arises from the trade-off between human usability and robustness against automated attacks. We present and analyze an alternative CAPTCHA design that exploits specific capabilities of the human auditory system, i.e., auditory streaming and tolerance to reverberation. Since state-of-the-art speech recognition technology still does not provide these capabilities, the resulting CAPTCHA is hard to solve automatically. A detailed analysis of the proposed CAPTCHA shows a far better trade-off between usability and security than the current quasi-standard approach of reCAPTCHA.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Challenges and implications of verifiable builds for security-critical open-source software 对安全至关重要的开源软件的可验证构建的挑战和影响
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664288
Xavier de Carné de Carnavalet, Mohammad Mannan
The majority of computer users download compiled software and run it directly on their machine. Apparently, this is also true for open-sourced software -- most users would not compile the available source, and implicitly trust that the available binaries have been compiled from the published source code (i.e., no backdoor has been inserted in the binary). To verify that the official binaries indeed correspond to the released source, one can compile the source of a given application, and then compare the locally generated binaries with the developer-provided official ones. However, such simple verification is non-trivial to achieve in practice, as modern compilers, and more generally, toolchains used in software packaging, have not been designed with verifiability in mind. Rather, the output of compilers is often dependent on parameters that can be strongly tied to the building environment. In this paper, we analyze a widely-used encryption tool, TrueCrypt, to verify its official binary with the corresponding source. We first manually replicate a close match to the official binaries of sixteen most recent versions of TrueCrypt for Windows up to v7.1a, and then explain the remaining differences that can solely be attributed to non-determinism in the build process. Our analysis provides the missing guarantee on official binaries that they are indeed backdoor-free, and makes audits on TrueCrypt's source code more meaningful. Also, we uncover several sources of non-determinism in TrueCrypt's compilation process; these findings may help create future verifiable build processes.
大多数计算机用户下载编译后的软件并直接在他们的机器上运行。显然,对于开源软件也是如此——大多数用户不会编译可用的源代码,并且隐式地相信可用的二进制文件是从发布的源代码编译而来的(即,没有在二进制文件中插入后门)。为了验证官方二进制文件确实与发布的源代码相对应,可以编译给定应用程序的源代码,然后将本地生成的二进制文件与开发人员提供的官方二进制文件进行比较。然而,这种简单的验证在实践中是不容易实现的,因为现代编译器,更一般地说,软件打包中使用的工具链,在设计时并没有考虑到可验证性。相反,编译器的输出通常依赖于与构建环境密切相关的参数。在本文中,我们分析了一个广泛使用的加密工具,TrueCrypt,以验证其官方二进制文件与相应的源代码。我们首先手动复制了16个最新版本的TrueCrypt for Windows的官方二进制文件,直到v7.1a,然后解释了剩余的差异,这些差异可以完全归因于构建过程中的不确定性。我们的分析为官方二进制文件提供了缺失的保证,即它们确实没有后门,并使对TrueCrypt源代码的审计更有意义。此外,我们还发现了TrueCrypt编译过程中的几个不确定性来源;这些发现可能有助于创建未来可验证的构建过程。
{"title":"Challenges and implications of verifiable builds for security-critical open-source software","authors":"Xavier de Carné de Carnavalet, Mohammad Mannan","doi":"10.1145/2664243.2664288","DOIUrl":"https://doi.org/10.1145/2664243.2664288","url":null,"abstract":"The majority of computer users download compiled software and run it directly on their machine. Apparently, this is also true for open-sourced software -- most users would not compile the available source, and implicitly trust that the available binaries have been compiled from the published source code (i.e., no backdoor has been inserted in the binary). To verify that the official binaries indeed correspond to the released source, one can compile the source of a given application, and then compare the locally generated binaries with the developer-provided official ones. However, such simple verification is non-trivial to achieve in practice, as modern compilers, and more generally, toolchains used in software packaging, have not been designed with verifiability in mind. Rather, the output of compilers is often dependent on parameters that can be strongly tied to the building environment. In this paper, we analyze a widely-used encryption tool, TrueCrypt, to verify its official binary with the corresponding source. We first manually replicate a close match to the official binaries of sixteen most recent versions of TrueCrypt for Windows up to v7.1a, and then explain the remaining differences that can solely be attributed to non-determinism in the build process. Our analysis provides the missing guarantee on official binaries that they are indeed backdoor-free, and makes audits on TrueCrypt's source code more meaningful. Also, we uncover several sources of non-determinism in TrueCrypt's compilation process; these findings may help create future verifiable build processes.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
TroGuard: context-aware protection against web-based socially engineered trojans TroGuard:上下文感知保护,防止基于网络的社会工程木马
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664270
Rui Han, Alejandro Mesa, Mihai Christodorescu, S. Zonouz
Despite the increasing number of social engineering attacks through web browser applications, detection of socially engineered trojan downloads by enticed victim users remains a challenging endeavor. In this paper, we present TroGuard, a semi-automated web-based trojan detection solution, that notifies the user if the application she downloaded behaves differently than what she expected at download time. TroGuard builds on the hypothesis that in spite of millions of currently downloadable executables on the Internet, almost all of them provide functionalities from a limited set. Additionally, because each functionality, e.g., text editor, requires particular system resources, it exhibits a unique system-level activity pattern. During an offline process, TroGuard creates a profile dictionary of various functionalities. This profile dictionary is then used to warn the user if she downloads an executable whose observed activity does not match its advertised functionality (extracted through automated analysis of the download website). Our experimental results prove the above mentioned premise empirically and show that TroGuard can identify real-world socially engineered trojan download attacks effectively.
尽管通过web浏览器应用程序进行的社会工程攻击越来越多,但检测受引诱的受害者用户下载的社会工程木马仍然是一项具有挑战性的工作。在本文中,我们介绍了TroGuard,这是一种半自动的基于web的木马检测解决方案,如果用户下载的应用程序的行为与下载时的预期不同,它会通知用户。TroGuard建立在这样一个假设之上:尽管目前互联网上有数百万个可下载的可执行文件,但几乎所有这些文件提供的功能都是有限的。此外,由于每个功能(例如文本编辑器)都需要特定的系统资源,因此它呈现出独特的系统级活动模式。在离线过程中,TroGuard创建各种功能的配置文件字典。如果用户下载的可执行文件所观察到的活动与其宣传的功能不匹配(通过对下载网站的自动分析提取),则使用此配置文件字典来警告用户。我们的实验结果从经验上证明了上述前提,并表明TroGuard可以有效地识别现实世界中的社会工程木马下载攻击。
{"title":"TroGuard: context-aware protection against web-based socially engineered trojans","authors":"Rui Han, Alejandro Mesa, Mihai Christodorescu, S. Zonouz","doi":"10.1145/2664243.2664270","DOIUrl":"https://doi.org/10.1145/2664243.2664270","url":null,"abstract":"Despite the increasing number of social engineering attacks through web browser applications, detection of socially engineered trojan downloads by enticed victim users remains a challenging endeavor. In this paper, we present TroGuard, a semi-automated web-based trojan detection solution, that notifies the user if the application she downloaded behaves differently than what she expected at download time. TroGuard builds on the hypothesis that in spite of millions of currently downloadable executables on the Internet, almost all of them provide functionalities from a limited set. Additionally, because each functionality, e.g., text editor, requires particular system resources, it exhibits a unique system-level activity pattern. During an offline process, TroGuard creates a profile dictionary of various functionalities. This profile dictionary is then used to warn the user if she downloads an executable whose observed activity does not match its advertised functionality (extracted through automated analysis of the download website). Our experimental results prove the above mentioned premise empirically and show that TroGuard can identify real-world socially engineered trojan download attacks effectively.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122219998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots 这是愚蠢的心理学:启发式如何解释软件漏洞,启动如何照亮开发人员的盲点
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664254
Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan Yeh, Justin Cappos, Yanyan Zhuang
Despite the security community's emphasis on the importance of building secure software, the number of new vulnerabilities found in our systems is increasing. In addition, vulnerabilities that have been studied for years are still commonly reported in vulnerability databases. This paper investigates a new hypothesis that software vulnerabilities are blind spots in developer's heuristic-based decision-making processes. Heuristics are simple computational models to solve problems without considering all the information available. They are an adaptive response to our short working memory because they require less cognitive effort. Our hypothesis is that as software vulnerabilities represent corner cases that exercise unusual information flows, they tend to be left out from the repertoire of heuristics used by developers during their programming tasks. To validate this hypothesis we conducted a study with 47 developers using psychological manipulation. In this study each developer worked for approximately one hour on six vulnerable programming scenarios. The sessions progressed from providing no information about the possibility of vulnerabilities, to priming developers about unexpected results, and explicitly mentioning the existence of vulnerabilities in the code. The results show that (i) security is not a priority in software development environments, (ii) security is not part of developer's mindset while coding, (iii) developers assume common cases for their code, (iv) security thinking requires cognitive effort, (v) security education helps, but developers can have difficulties correlating a particular learned vulnerability or security information with their current working task, and (vi) priming or explicitly cueing about vulnerabilities on-the-spot is a powerful mechanism to make developers aware about potential vulnerabilities.
尽管安全社区强调构建安全软件的重要性,但在我们的系统中发现的新漏洞的数量正在增加。此外,已经研究多年的漏洞仍然经常在漏洞数据库中报告。本文提出了一个新的假设,即软件漏洞是开发人员启发式决策过程中的盲点。启发式是一种简单的计算模型,可以在不考虑所有可用信息的情况下解决问题。它们是对我们短暂工作记忆的适应性反应,因为它们需要较少的认知努力。我们的假设是,由于软件漏洞代表了使用不寻常信息流的角落案例,它们往往被开发人员在编程任务中使用的启发式方法所忽略。为了验证这一假设,我们对47名开发者进行了一项使用心理操纵的研究。在这项研究中,每个开发人员在六个易受攻击的编程场景上工作了大约一个小时。会议从没有提供有关漏洞可能性的信息,发展到让开发人员了解意外结果,并明确提到代码中存在漏洞。结果表明(i)安全性在软件开发环境中不是优先考虑的,(ii)安全性不是开发人员编码时思维方式的一部分,(iii)开发人员为他们的代码假设常见情况,(iv)安全思维需要认知努力,(v)安全教育有助于,但开发人员可能难以将特定的学习漏洞或安全信息与他们当前的工作任务联系起来。并且(vi)现场启动或明确提示漏洞是一种让开发人员意识到潜在漏洞的强大机制。
{"title":"It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots","authors":"Daniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan Yeh, Justin Cappos, Yanyan Zhuang","doi":"10.1145/2664243.2664254","DOIUrl":"https://doi.org/10.1145/2664243.2664254","url":null,"abstract":"Despite the security community's emphasis on the importance of building secure software, the number of new vulnerabilities found in our systems is increasing. In addition, vulnerabilities that have been studied for years are still commonly reported in vulnerability databases. This paper investigates a new hypothesis that software vulnerabilities are blind spots in developer's heuristic-based decision-making processes. Heuristics are simple computational models to solve problems without considering all the information available. They are an adaptive response to our short working memory because they require less cognitive effort. Our hypothesis is that as software vulnerabilities represent corner cases that exercise unusual information flows, they tend to be left out from the repertoire of heuristics used by developers during their programming tasks. To validate this hypothesis we conducted a study with 47 developers using psychological manipulation. In this study each developer worked for approximately one hour on six vulnerable programming scenarios. The sessions progressed from providing no information about the possibility of vulnerabilities, to priming developers about unexpected results, and explicitly mentioning the existence of vulnerabilities in the code. The results show that (i) security is not a priority in software development environments, (ii) security is not part of developer's mindset while coding, (iii) developers assume common cases for their code, (iv) security thinking requires cognitive effort, (v) security education helps, but developers can have difficulties correlating a particular learned vulnerability or security information with their current working task, and (vi) priming or explicitly cueing about vulnerabilities on-the-spot is a powerful mechanism to make developers aware about potential vulnerabilities.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131410261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Exploring and mitigating privacy threats of HTML5 geolocation API 探索和减轻HTML5地理定位API的隐私威胁
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664247
Hyungsub Kim, Sangho Lee, Jong Kim
The HTML5 Geolocation API realizes location-based services via theWeb by granting web sites the geographical location information of user devices. However, the Geolocation API can violate a user's location privacy due to its coarse-grained permission and location models. The API provides either exact location or nothing to web sites even when they only require approximate location. In this paper, we first conduct case studies on numerous web browsers and web sites to explore how they implement and utilize the Geolocation API. We detect 14 vulnerable web browsers and 603 overprivileged web sites that can violate a user's location privacy. To mitigate the privacy threats of the Geolocation API, we propose a novel scheme that (1) supports fine-grained permission and location models, and (2) recommends appropriate privacy settings to each user by inspecting the location sensitivity of each web page. Our scheme can accurately estimate each web page's necessary geolocation degree (estimation accuracy: ~93.5%). We further provide suggestions to improve the Geolocation API.
HTML5地理定位API通过授予网站用户设备的地理位置信息,从而通过web实现基于位置的服务。然而,由于其粗粒度的权限和位置模型,Geolocation API可能会侵犯用户的位置隐私。这个API要么提供准确的位置,要么什么都不提供,即使网站只需要大概的位置。在本文中,我们首先对许多web浏览器和web站点进行案例研究,以探索它们如何实现和利用地理定位API。我们检测到14个易受攻击的web浏览器和603个权限过大的网站,这些网站可能侵犯用户的位置隐私。为了减轻地理定位API的隐私威胁,我们提出了一种新的方案:(1)支持细粒度的权限和位置模型;(2)通过检查每个网页的位置敏感性,为每个用户推荐适当的隐私设置。我们的方案可以准确地估计出每个网页所需的地理定位度(估计精度:~93.5%)。我们进一步提供了改进地理定位API的建议。
{"title":"Exploring and mitigating privacy threats of HTML5 geolocation API","authors":"Hyungsub Kim, Sangho Lee, Jong Kim","doi":"10.1145/2664243.2664247","DOIUrl":"https://doi.org/10.1145/2664243.2664247","url":null,"abstract":"The HTML5 Geolocation API realizes location-based services via theWeb by granting web sites the geographical location information of user devices. However, the Geolocation API can violate a user's location privacy due to its coarse-grained permission and location models. The API provides either exact location or nothing to web sites even when they only require approximate location. In this paper, we first conduct case studies on numerous web browsers and web sites to explore how they implement and utilize the Geolocation API. We detect 14 vulnerable web browsers and 603 overprivileged web sites that can violate a user's location privacy. To mitigate the privacy threats of the Geolocation API, we propose a novel scheme that (1) supports fine-grained permission and location models, and (2) recommends appropriate privacy settings to each user by inspecting the location sensitivity of each web page. Our scheme can accurately estimate each web page's necessary geolocation degree (estimation accuracy: ~93.5%). We further provide suggestions to improve the Geolocation API.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115681522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Assisted deletion of related content 协助删除相关内容
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664287
H. Ritzdorf, N. Karapanos, Srdjan Capkun
On primary storage systems content is often replicated, converted or modified, and the users quickly lose control over its dispersal on the system. Deleting content related to a particular project from the system therefore becomes a labor-intensive task for the user. In this paper we present IRCUS, a system that assists the user in securely removing project-related content, but does not require changes to the user's behavior or to any of the system components, such as the file system, kernel or applications. IRCUS transparently integrates within the user's system, operates in user-space and stores the resulting metadata alongside the files. We implemented and evaluated our system and show that its overhead and accuracy are acceptable for practical use and deployment.
在主存储系统上,内容经常被复制、转换或修改,用户很快就失去了对其在系统上分布的控制。因此,从系统中删除与特定项目相关的内容成为用户的劳动密集型任务。在本文中,我们介绍了IRCUS,一个帮助用户安全地删除项目相关内容的系统,但不需要更改用户的行为或任何系统组件,如文件系统、内核或应用程序。IRCUS透明地集成在用户系统中,在用户空间中操作,并将结果元数据与文件一起存储。我们实现并评估了我们的系统,并表明它的开销和准确性对于实际使用和部署是可以接受的。
{"title":"Assisted deletion of related content","authors":"H. Ritzdorf, N. Karapanos, Srdjan Capkun","doi":"10.1145/2664243.2664287","DOIUrl":"https://doi.org/10.1145/2664243.2664287","url":null,"abstract":"On primary storage systems content is often replicated, converted or modified, and the users quickly lose control over its dispersal on the system. Deleting content related to a particular project from the system therefore becomes a labor-intensive task for the user. In this paper we present IRCUS, a system that assists the user in securely removing project-related content, but does not require changes to the user's behavior or to any of the system components, such as the file system, kernel or applications. IRCUS transparently integrates within the user's system, operates in user-space and stores the resulting metadata alongside the files. We implemented and evaluated our system and show that its overhead and accuracy are acceptable for practical use and deployment.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127316560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Leveraging semantic signatures for bug search in binary programs 利用语义签名在二进制程序中进行bug搜索
Pub Date : 2014-12-08 DOI: 10.1145/2664243.2664269
Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, C. Rossow
Software vulnerabilities still constitute a high security risk and there is an ongoing race to patch known bugs. However, especially in closed-source software, there is no straightforward way (in contrast to source code analysis) to find buggy code parts, even if the bug was publicly disclosed. To tackle this problem, we propose a method called Tree Edit Distance Based Equational Matching (TEDEM) to automatically identify binary code regions that are "similar" to code regions containing a reference bug. We aim to find bugs both in the same binary as the reference bug and in completely unrelated binaries (even compiled for different operating systems). Our method even works on proprietary software systems, which lack source code and symbols. The analysis task is split into two phases. In a preprocessing phase, we condense the semantics of a given binary executable by symbolic simplification to make our approach robust against syntactic changes across different binaries. Second, we use tree edit distances as a basic block-centric metric for code similarity. This allows us to find instances of the same bug in different binaries and even spotting its variants (a concept called vulnerability extrapolation). To demonstrate the practical feasibility of the proposed method, we implemented a prototype of TEDEM that can find real-world security bugs across binaries and even across OS boundaries, such as in MS Word and the popular messengers Pidgin (Linux) and Adium (Mac OS).
软件漏洞仍然构成很高的安全风险,修补已知漏洞的竞赛正在进行。然而,特别是在闭源软件中,没有直接的方法(与源代码分析相反)来找到有bug的代码部分,即使bug被公开披露。为了解决这个问题,我们提出了一种称为基于树编辑距离的等式匹配(TEDEM)的方法来自动识别与包含参考错误的代码区域“相似”的二进制代码区域。我们的目标是在与参考错误相同的二进制文件和完全不相关的二进制文件(甚至为不同的操作系统编译)中找到错误。我们的方法甚至适用于缺乏源代码和符号的专有软件系统。分析任务分为两个阶段。在预处理阶段,我们通过符号简化来压缩给定二进制可执行文件的语义,以使我们的方法对不同二进制文件的语法更改具有鲁棒性。其次,我们使用树编辑距离作为代码相似度的基本块中心度量。这使我们能够在不同的二进制文件中找到相同错误的实例,甚至发现其变体(称为漏洞外推的概念)。为了证明所提出方法的实际可行性,我们实现了一个TEDEM的原型,该原型可以跨二进制文件甚至跨操作系统边界发现现实世界的安全漏洞,例如MS Word和流行的信使Pidgin (Linux)和Adium (Mac OS)。
{"title":"Leveraging semantic signatures for bug search in binary programs","authors":"Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, C. Rossow","doi":"10.1145/2664243.2664269","DOIUrl":"https://doi.org/10.1145/2664243.2664269","url":null,"abstract":"Software vulnerabilities still constitute a high security risk and there is an ongoing race to patch known bugs. However, especially in closed-source software, there is no straightforward way (in contrast to source code analysis) to find buggy code parts, even if the bug was publicly disclosed. To tackle this problem, we propose a method called Tree Edit Distance Based Equational Matching (TEDEM) to automatically identify binary code regions that are \"similar\" to code regions containing a reference bug. We aim to find bugs both in the same binary as the reference bug and in completely unrelated binaries (even compiled for different operating systems). Our method even works on proprietary software systems, which lack source code and symbols. The analysis task is split into two phases. In a preprocessing phase, we condense the semantics of a given binary executable by symbolic simplification to make our approach robust against syntactic changes across different binaries. Second, we use tree edit distances as a basic block-centric metric for code similarity. This allows us to find instances of the same bug in different binaries and even spotting its variants (a concept called vulnerability extrapolation). To demonstrate the practical feasibility of the proposed method, we implemented a prototype of TEDEM that can find real-world security bugs across binaries and even across OS boundaries, such as in MS Word and the popular messengers Pidgin (Linux) and Adium (Mac OS).","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
期刊
Proceedings of the 30th Annual Computer Security Applications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1